40
40
May 3, 2016
05/16
by
CSPAN2
tv
eye 40
favorite 0
quote 0
rick weber, inside the cybersecurity. you mentioned critical document you're working on within the administration in the near future you will be publishing them. our day on sharing within the government or the private sector, and how they relate to liability relief under the cybersecurity law? >> with respect to the question of liability, we already and the department of homeland security published a number of documents, and we, of course, i think '02 the public -- we owe to the public educational materials. i think that the documents that we're working on him and not to get too far out in front of the administration and the probably already have achieved that, but i think it really speaks to how we are organized within the government and how we will use our resources in the best service of the public interest. we have heard from the private sector who are we supposed to call if, in fact, we suffer a cyber event? we, of course, want to provide clarity in response to that question. and in an ever increasing arena of change
rick weber, inside the cybersecurity. you mentioned critical document you're working on within the administration in the near future you will be publishing them. our day on sharing within the government or the private sector, and how they relate to liability relief under the cybersecurity law? >> with respect to the question of liability, we already and the department of homeland security published a number of documents, and we, of course, i think '02 the public -- we owe to the public...
99
99
May 9, 2016
05/16
by
CSPAN3
tv
eye 99
favorite 0
quote 0
rick weber at inside cybersecurity. deputy secretary, you mentioned critical documents that you are working on within the administration, in the near future you'll be publishing them. are they on sharing within the government or the private sector and how will they relate to liability relief under the cybersecurity law? >> so, with respect to the question of liability, we already in the department of homeland security published a number of documents, and we, of course, i think, owe to the public additional education materials. i think that the documents that we are working on, and not to get too far out in front of the administration -- and i probably already have achieved that -- but i think it really speaks to how we are organized within the government and how we will use our resources in the best service of the public interest. we have heard from the private sector who are we supposed to call if in fact we suffer a cyber event. we, of course, want to provide clarity in response to that question, and in an ever-increa
rick weber at inside cybersecurity. deputy secretary, you mentioned critical documents that you are working on within the administration, in the near future you'll be publishing them. are they on sharing within the government or the private sector and how will they relate to liability relief under the cybersecurity law? >> so, with respect to the question of liability, we already in the department of homeland security published a number of documents, and we, of course, i think, owe to the...
47
47
May 11, 2016
05/16
by
CSPAN3
tv
eye 47
favorite 0
quote 0
cybersecurity framework. we need to figure out how companies use the cybersecurity framework to measure reductions to show measurable reductions in the cybersecurity risk. we're focusing in the private sector for increasing our capacity in these two key areas. how do we demonstrate to the private sector the value of automated cybersecurity threat information sharing and how do we actually promulgate and measure the effectiveness of best practices being adopted across the private sector and in particular across the nation's critical infrastructure. >> general hoover, when you think of the national guard, they embody the citizen soldier. we can all look back to major crises and recognize that the role that the guard plays in mitigating the consequences of these sorts of attacks. where do you see the national guard fitting into our overall cybersecurity equation? and what more can or should companies and state and local authorities know about the guard's role here? >> sure. so i think there is a couple of things
cybersecurity framework. we need to figure out how companies use the cybersecurity framework to measure reductions to show measurable reductions in the cybersecurity risk. we're focusing in the private sector for increasing our capacity in these two key areas. how do we demonstrate to the private sector the value of automated cybersecurity threat information sharing and how do we actually promulgate and measure the effectiveness of best practices being adopted across the private sector and in...
520
520
May 10, 2016
05/16
by
CSPAN3
tv
eye 520
favorite 0
quote 0
cybersecurity framework. we need to figure out how companies use the cybersecurity framework to measure reductions to show measurable reductions in the cybersecurity risk. we're focusing in the private sector for increasing our capacity in these two key areas. how do we demonstrate to the private sector the value of automated cybersecurity threat information sharing and how do we actually promulgate and measure the effectiveness of best practices being adopted across the private sector and in particular across the nation's critical infrastructure. >> general hoover, when you think of the national guard, they embody the citizen soldier. we can all look back to major crises and recognize that the role that the guard plays in mitigating the consequences of these sorts of attacks. where do you see the national guard fitting into our overall cybersecurity equation? and what more can or should companies and state and local authorities know about the guard's role here? >> sure. so i think there is a couple of things
cybersecurity framework. we need to figure out how companies use the cybersecurity framework to measure reductions to show measurable reductions in the cybersecurity risk. we're focusing in the private sector for increasing our capacity in these two key areas. how do we demonstrate to the private sector the value of automated cybersecurity threat information sharing and how do we actually promulgate and measure the effectiveness of best practices being adopted across the private sector and in...
160
160
May 26, 2016
05/16
by
WRC
tv
eye 160
favorite 0
quote 0
. >> reporter: it's srls that also do cybersecurity. >> reporter: it's sls that also do cybersecurity. >> reporter: it's sls that also do cybersecurity. >> reporter: it's sels that also do cybersecurity. >> reporter: it's srls that also do cybersecurity. >> reporter: it's so ls that also do cybersecurity. also do cybersecurity. >> reporter: it's srls that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >> good neighbors. >> reporter: john bowers family has run the general store since 1929. he hopes whoever buys it will create some jobs. >> i'll throw a few bucks your way if you want to come down here. >> reporter: i'm in. let's take up a colltion. ec >>> lights, camera, access. >>> it's escape, it's hiding, you know? i like hiding. >> that's johnny on the very day wife amber heard filed for divorce. i'm billy bush, and we'll tell you why the timing could not be
. >> reporter: it's srls that also do cybersecurity. >> reporter: it's sls that also do cybersecurity. >> reporter: it's sls that also do cybersecurity. >> reporter: it's sels that also do cybersecurity. >> reporter: it's srls that also do cybersecurity. >> reporter: it's so ls that also do cybersecurity. also do cybersecurity. >> reporter: it's srls that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >>...
80
80
May 27, 2016
05/16
by
CSPAN3
tv
eye 80
favorite 0
quote 0
so taking a step back from cybersecurity, you really can't separate cybersecurity from i.t. acquisition and i.t. management. we don't do cybersecurity for its own sake. we do cybersecurity to support, you know, reliable i.t. and we use i.t. obviously to deliver mission and services to our customers. and what the information technology mod urbanization fund is about, itmf for short, for shorthand, is, you know, we have a long list of legacy i.t. spread across the government. we can bubble wrap it. we can wrap it in duct tape. you know? these systems were not necessarily built with cybersecurity in mind, so what we are doing to protect them is kind of, you know, again, bubble wrap it and duct tape and what we're finding is in a lot of cases -- what we expect to find in many cases is that it is more cost effective both from an immediate budget perspective but also because today's legacy i.t. becomes -- we don't want -- potentially legacy i.t. in five, ten years. it's cheaper to replace it today than it is to keep bubble-wrapping it and duct-taping it. what the i.t. modernizatio
so taking a step back from cybersecurity, you really can't separate cybersecurity from i.t. acquisition and i.t. management. we don't do cybersecurity for its own sake. we do cybersecurity to support, you know, reliable i.t. and we use i.t. obviously to deliver mission and services to our customers. and what the information technology mod urbanization fund is about, itmf for short, for shorthand, is, you know, we have a long list of legacy i.t. spread across the government. we can bubble wrap...
86
86
May 16, 2016
05/16
by
CSPAN
tv
eye 86
favorite 0
quote 0
to address cybersecurity risks and incidents. h.r. 4743 allows d.h.s. to work with any consortium, including the ncpc, in a number of ack tests, including providing technical assistance, conducting cross-sector cybersecurity training and simulation exercises and helping states and local communities to develop cybersecurity information sharing programs. allowing d.h.s. to work with organizations already supporting state and local cyberpreparedness and response will provide additional support to state and local entities. so i urge all members to join me in supporting this bill, and i reserve the balance of my time. the speaker pro tempore: the gentleman reserves. the gentleman from mississippi is recognized. mr. thompson: thank you, mr. speaker. mr. speaker, i rise in support of h.r. 4743, the national cybersecurity preparedness consortium act of 2016, and i yield myself such time as i may consume. the speaker pro tempore: the gentleman is recognized. mr. thompson: thank you, mr. speaker. mr. speaker, h.r. 4743 allows the departmen
to address cybersecurity risks and incidents. h.r. 4743 allows d.h.s. to work with any consortium, including the ncpc, in a number of ack tests, including providing technical assistance, conducting cross-sector cybersecurity training and simulation exercises and helping states and local communities to develop cybersecurity information sharing programs. allowing d.h.s. to work with organizations already supporting state and local cyberpreparedness and response will provide additional support to...
67
67
May 25, 2016
05/16
by
CSPAN2
tv
eye 67
favorite 0
quote 0
in the systems were not built with cybersecurity in mind. and it is more cost-effective from a budget perspective especially with legacy in five years and is cheaper to replace it today into rapid in bubble wrap but to basically a identified the systems that they have to be eligible to replaced so the doctor mentioned the congressional and go and to the way we do the cybersecurity budgeting that has that same congressional jurisdictional challenge that is more strategic thereof was discussed meaning one of the goals was to encourage him push it incentivized because they are more efficient from a cost perspective or from the cybersecurity perspective the challenge of that right now with the i.t. budget is authorized and appropriated and how to get to that problem. so asking the president cybercommission to look into. >> and bin to finally see the government stop using windows 2000. [laughter] >> the reason kobolds. [laughter] did you hear that? they are still using cobal. [laughter] the i.t. modernization fund. they're running a legacy i.t. s
in the systems were not built with cybersecurity in mind. and it is more cost-effective from a budget perspective especially with legacy in five years and is cheaper to replace it today into rapid in bubble wrap but to basically a identified the systems that they have to be eligible to replaced so the doctor mentioned the congressional and go and to the way we do the cybersecurity budgeting that has that same congressional jurisdictional challenge that is more strategic thereof was discussed...
65
65
May 25, 2016
05/16
by
CSPAN2
tv
eye 65
favorite 0
quote 1
in the systems were not built with cybersecurity in mind.and it is more cost-effective from a budget perspective especially with legacy in five years and is cheaper to replace it today into rapid in bubble wrap but to basically a identified the systems that they have to be eligible to replaced so the doctor mentioned the congressional and go and to the way we do the cybersecurity budgeting that has that same congressional jurisdictional challenge that is more strategic thereof was discussed meaning one of the goals was to encourage him push it incentivized because they are more efficient from a cost perspective or from the cybersecurity perspective the challenge of that right now with the i.t. budget is authorized and appropriated and how to get to that problem. so asking the president cybercommission to look into. >> and bin to finally see the government stop using windows 2000. [laughter] >> the reason kobolds. [laughter] did you hear that? they are still using cobal. [laughter] the i.t. modernization fund. they're running a legacy i.t. sy
in the systems were not built with cybersecurity in mind.and it is more cost-effective from a budget perspective especially with legacy in five years and is cheaper to replace it today into rapid in bubble wrap but to basically a identified the systems that they have to be eligible to replaced so the doctor mentioned the congressional and go and to the way we do the cybersecurity budgeting that has that same congressional jurisdictional challenge that is more strategic thereof was discussed...
70
70
May 20, 2016
05/16
by
CSPAN
tv
eye 70
favorite 0
quote 0
concerns about cybersecurity are, you know, global. physical location is one element but probably in the case of cybersecurity, not the most important in terms of concerns, it's more about the secure by design sort of notion, you know what have you put in place and how well is it implemented. so those would be more my primary concerns, in some cases the physical location. mr. lynch: my concern is obviously the communist government of vietnam is going to require access. so that was my concern. you suffered enough. i want to yield back. thank you. mr. meadows: thank you. i want to thank all the bnses -- witnesses for being here today and if there is no other business, the subcommittee stands adjourned. [captioning performed by national captioning institute] [captions copyright national able satellite corp. 2016] >> up next vice president joe biden speaks about his political career. then an event with donald trump in new jersey. >> this weekend we'll explore the history and literary life of haties birg, mississippi. don't hurry me down to
concerns about cybersecurity are, you know, global. physical location is one element but probably in the case of cybersecurity, not the most important in terms of concerns, it's more about the secure by design sort of notion, you know what have you put in place and how well is it implemented. so those would be more my primary concerns, in some cases the physical location. mr. lynch: my concern is obviously the communist government of vietnam is going to require access. so that was my concern....
32
32
May 3, 2016
05/16
by
CSPAN2
tv
eye 32
favorite 0
quote 0
i think today the reason is cybersecurity. since it is software-based. but there is technology available that could be useful in this situation. >> i think we will open up to questions now, if the people who want to jump into the conversation with the question. please identify yourself and ask a question or icy in the front row here. >> -- i see in the front row here. >> my name is john gardner, h.e.w. alumnus, former naval intelligence officer but so many years ago is irrelevant. might interest is us versus others. and how this comes up in layered forms. i'm thinking about the general reluctance of the u.s. to what may anybody from syria. this is a political issue now. in europe, there's a great reluctance to bring in muslims, particularly in the case of france, say, from algeria but generally in europe from syria or other conflict areas. so one of the solutions is to pay turkey to take in a whole lot of the refugee flow. so europe and the u.s. don't have to deal with it. but money only deals with a small part of the problem. the food, clothing, shelter
i think today the reason is cybersecurity. since it is software-based. but there is technology available that could be useful in this situation. >> i think we will open up to questions now, if the people who want to jump into the conversation with the question. please identify yourself and ask a question or icy in the front row here. >> -- i see in the front row here. >> my name is john gardner, h.e.w. alumnus, former naval intelligence officer but so many years ago is...
60
60
May 13, 2016
05/16
by
CSPAN3
tv
eye 60
favorite 0
quote 0
they have realized if they do not invest enough on cybersecurity and i.t. it's going to hurt their main core operational businesses. so i think now that these recent ransom ware attacks have created the awareness. healthcare providers would have more business incentives to invest on a cybersecurity and insuring patient privacy like other businesses. >> what are those ransom ware attacks? we heard it. i think everybody knows the medstar attack where hackers held hostage a ten history system asking for bitcoins to release the information back. and hospital executives basically had to cancel patient visits. you are not at medstar but you're at a medstar rival. i'm curious. as an executive of a hospital watching this happen what were the meetings like in the board rooms at sibley to make sure you are not the next medstar? >> i don't know if it's a direct quote. there was probably a conversation that started with what's a bitcoin. and that's not throwing stones at my own house i think that's a conversation anybody would have. my point there is the notion is real
they have realized if they do not invest enough on cybersecurity and i.t. it's going to hurt their main core operational businesses. so i think now that these recent ransom ware attacks have created the awareness. healthcare providers would have more business incentives to invest on a cybersecurity and insuring patient privacy like other businesses. >> what are those ransom ware attacks? we heard it. i think everybody knows the medstar attack where hackers held hostage a ten history...
62
62
May 31, 2016
05/16
by
CSPAN2
tv
eye 62
favorite 0
quote 0
cybersecurity. we passed the federal cybersecurity enhancement act of a good measure. protecting our critical interest lecture them are particularly terror attack on a cyberattack from emp mgm v. finally, what can we do as a nation to protect our homeland against islamic terrorists another violent extremists. the hearing is about the last priority, addressing islamic terror and trying to secure our homeland and keep it safe. not an easy task. every last one of these hearings goal is primarily to layout of reality as best we can so that we can identify, find the problem and it happened so we can work towards some common sense solutions, recognizing in this realm the solutions are very, very difficult and they will take quite some time to finally defeat the islamic terror. i just want to layout a couple couple facts developed by staff, recognizing these are estimates. there's nothing hard and fast, but it gives us some indication of what we are dealing with when we talk about isis. apparently, the monthly revenues have dropped from 80 million per month, less than a billi
cybersecurity. we passed the federal cybersecurity enhancement act of a good measure. protecting our critical interest lecture them are particularly terror attack on a cyberattack from emp mgm v. finally, what can we do as a nation to protect our homeland against islamic terrorists another violent extremists. the hearing is about the last priority, addressing islamic terror and trying to secure our homeland and keep it safe. not an easy task. every last one of these hearings goal is primarily...
67
67
May 9, 2016
05/16
by
CSPAN3
tv
eye 67
favorite 0
quote 0
i think today the reason is cybersecurity, since it's software based. there is technology available that could be united statesful in this situation. >> thanks. i think we'll open up to questions now, if there are people who want to jump into the conversation with a question, please identify yourself and ask a question. i see in the front row here. >> my name's john, former naval intelligence officer. how many years ago, it's irrelevant now. my interest is us versus others and how this comes up in layered forms. i'm thinking about the general reluctance of the u.s. to admit anybody from syria or this is a political issue now. in europe, the -- there's a great reluctance to bring in muslims particularly in the case of france, say from algeria, but in general in europe from syria or other conflict areas. so one of the solutions is to pay turkey to take in a whole lot of the -- the refugee flow so that europe and the u.s. don't have to deal with it. but money only deals with a small part of the problem. the food, clothing, shelter, and medicare. but there'
i think today the reason is cybersecurity, since it's software based. there is technology available that could be united statesful in this situation. >> thanks. i think we'll open up to questions now, if there are people who want to jump into the conversation with a question, please identify yourself and ask a question. i see in the front row here. >> my name's john, former naval intelligence officer. how many years ago, it's irrelevant now. my interest is us versus others and how...
196
196
May 6, 2016
05/16
by
KNTV
tv
eye 196
favorite 0
quote 0
cybersecurity experts recently uncovered a massive trove of stolen usernames and passwords, hundreds of millions of them. and as nbc's tom costello tells us, it involves some of the biggest e-mail providers in the world. >> reporter: they were being offered for sale on the so-called dark web, where hackers hawk their goods. 272 million stolen e-mail accounts, among them yahoo! gmail and microsoft addresses including passwords. offered for sale by a russian hacker, and discovered by a milwaukee security consultant alex holden. >> we know that he's a young man in central russia who collected this information from multiple sources. >> reporter: hackers use stolen e-mail information to lure users into giving away more information. including dobs, social security numbers, and bank account details. all the more reason, say experts, to change passwords regularly, even monthly. >> don't reuse a password. don't use the same password for your bank as you do your retail shopping as you do your e-mail. >> reporter: what makes a good password? they do not include names of children, pets or home a
cybersecurity experts recently uncovered a massive trove of stolen usernames and passwords, hundreds of millions of them. and as nbc's tom costello tells us, it involves some of the biggest e-mail providers in the world. >> reporter: they were being offered for sale on the so-called dark web, where hackers hawk their goods. 272 million stolen e-mail accounts, among them yahoo! gmail and microsoft addresses including passwords. offered for sale by a russian hacker, and discovered by a...
242
242
May 27, 2016
05/16
by
KNTV
tv
eye 242
favorite 0
quote 0
thing we did is find the bowlers that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >> good neighbors. >> reporter: john bowers family has run the general store since 1929. he hopes whoever buys it will create some jobs. >> i'll throw a few bucks your way if you want to come down here. >> reporter: i'm in. let's take up a collection. so if you really want to be the master of your own domain, get your bid in now. kevin tibbles, nbc news, sugar grove, west virginia. >>> that's going to do it for us on a thursday night. i'm lester holt. for all of us at nbc news, thank you for watching and good night.where is pearl pinson? the search intensifies for the . nbc bay area news begins with breaking us in. >>> where is pearl pinson, the search intensifies, and the man accused of taking her is now dead in a shootout with the police. >> authorities don't know where the missing girl is. now, she was last seen yesterday morning in vallejo being pulled by a man in on a highway over pass, an amber alert was issued and witnesses that saw here said her faus was
thing we did is find the bowlers that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >> good neighbors. >> reporter: john bowers family has run the general store since 1929. he hopes whoever buys it will create some jobs. >> i'll throw a few bucks your way if you want to come down here. >> reporter: i'm in. let's take up a collection. so if you really want to be the master of your own domain, get your bid in now. kevin tibbles,...
173
173
May 12, 2016
05/16
by
FBC
tv
eye 173
favorite 0
quote 0
unveiling a product and service at the upgrades that concerns about the state of cybersecurity.e details. reporter: lauren, nicole, good morning. here at tech crunch, the biggest conversation to senator around privacy and security. general michael hayden, former head of the nsa and dia weighed in on the debate and where we stand now as a country. >> the greatest future threat to american security is in the cyberdomain. we need to be really careful we could and cybersecurity even for the chittenden immediate security questions over here. reporter: of course, here at tech crunch at not all about security and privacy. it's also about the next big idea. venture capitalists coming to find those. carmelo anthony of the new york knicks is looking for what is going to come next for his venture capital firm. i asked him if the new york knicks for a startup, would he invest? >> absolutely, absolutely. new york is the greatest city in the world, biggest media market in the world. some of the greatest opportunities here are in new york in the world. of course i would invest in that. reporte
unveiling a product and service at the upgrades that concerns about the state of cybersecurity.e details. reporter: lauren, nicole, good morning. here at tech crunch, the biggest conversation to senator around privacy and security. general michael hayden, former head of the nsa and dia weighed in on the debate and where we stand now as a country. >> the greatest future threat to american security is in the cyberdomain. we need to be really careful we could and cybersecurity even for the...
98
98
May 25, 2016
05/16
by
FOXNEWSW
tv
eye 98
favorite 0
quote 0
>> you don't recognize the cybersecurity risk. >> no question great risks associated with the way shely business when she was secretary of state. that is not a secret anymore, something in public domain. and the 78 page report, the details again how they continue to serve the practice and policies and procedures and laws that apply to other government officials particularly someone in a position like that with a tremendous amount of authority. this is particularly disturbing and troubling and it will present a big concern for her going forward and raises additional questions she is going to have to answer. it is representative, transparency issues that have dogged hillary clinton all the time she has been in public life. bill: how does this affect her run for the white house? >> it continues to raise questions in people's mind about her transparency, trustworthiness, honesty and those are issues that always weigh heavily when people make a decision about who they want to entrust with the greatest responsibility you can have in this country when it comes to public service, the presiden
>> you don't recognize the cybersecurity risk. >> no question great risks associated with the way shely business when she was secretary of state. that is not a secret anymore, something in public domain. and the 78 page report, the details again how they continue to serve the practice and policies and procedures and laws that apply to other government officials particularly someone in a position like that with a tremendous amount of authority. this is particularly disturbing and...
83
83
May 1, 2016
05/16
by
WJLA
tv
eye 83
favorite 0
quote 0
the cybersecurity, of -- did cybersecurity come up or no? >> issues. what is politically viable relative your allies and so on. up --one thing that came we didn't show it in the film but came up quite a bit -- was nuclear spending. on the streets some of the conversations we had, people always said cuts to nuclear spending. you mentioned that before the break. talk to me more about that. why do you think that was something that was highlighted? >> that was cut 13%, nuclear weapons. americans understand we have lots and lots of nuclear weapons that are tremendously destructive, and they don't see a lot of scenarios where those weapons make sense. jill: it is interesting, so much of public opinion is about perception and what they see and read. in your survey they provide a lot of context. with the f 35 we see it in the headlines so often. if he or not, it is a poster child of def spending run amok. how much are people influenced by what they read in the media? are these well-informed responses? >> the average person isn't particularly well-informed but
the cybersecurity, of -- did cybersecurity come up or no? >> issues. what is politically viable relative your allies and so on. up --one thing that came we didn't show it in the film but came up quite a bit -- was nuclear spending. on the streets some of the conversations we had, people always said cuts to nuclear spending. you mentioned that before the break. talk to me more about that. why do you think that was something that was highlighted? >> that was cut 13%, nuclear weapons....
414
414
May 26, 2016
05/16
by
WCAU
tv
eye 414
favorite 0
quote 0
perspective buyer chad bennett is eyeing the place for his cybersecurity firm. >> probably be the first thing we did is find the bowels that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >> good neighbors. >> reporter: john bowers family has run the general store since 1929. he hopes whoever buys it will create some jobs. >> i'll throw a few bucks your way if you want to come down here. >> reporter: i'm in. let's take up a collection. so if you really want to be the master of your own domain, get your bid in now. kevin tibbles, nbc news, sugar grove, west virginia. >>> that's going to do it for us on a thursday night. i'm lester holt. for all of us at nbc news, thank you >>> johnny depp's $400 million divorce. the clues before the split. the prenup shocker. >> now, on "extra." >>> the first photo of amber heard after filing for divorce from johnny. his ex vanessa vanessa paradis to his side today. why amber wanted out. did his family hate her? and johnny's own "extra" confession, questioning the meaning of marriage. >> i never found myself needing
perspective buyer chad bennett is eyeing the place for his cybersecurity firm. >> probably be the first thing we did is find the bowels that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >> good neighbors. >> reporter: john bowers family has run the general store since 1929. he hopes whoever buys it will create some jobs. >> i'll throw a few bucks your way if you want to come down here. >> reporter: i'm in. let's take up...
24
24
May 14, 2016
05/16
by
CSPAN2
tv
eye 24
favorite 0
quote 0
boundaries and concerns about cybersecurity our global.physical location is one element that probably in the case of cybersecurity not the most dispositive in terms of concerns i would have. it's more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one? so those would be more my primary concerns. >> my concern is obviously the communist government of vietnam is going to require access. i have -- i will yield back. .. [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] on night on eight eastern on c-span's q&a. >> now, army colonel for inherent result brief reporter on the pentagon on the fight against isis. he confirms that the u.s. did not carry out the strike that killed the top has blood commander in damascus. this is about 40 minutes. >> good morning everybody. happy friday the 13th. steve, you're looking great and were pleased to have you
boundaries and concerns about cybersecurity our global.physical location is one element that probably in the case of cybersecurity not the most dispositive in terms of concerns i would have. it's more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one? so those would be more my primary concerns. >> my concern is obviously the communist government of vietnam is going to require access. i have -- i will yield back. .. [inaudible]...
654
654
May 9, 2016
05/16
by
CSPAN2
tv
eye 654
favorite 0
quote 0
because at the end of the day, in cybersecurity it's a 1s and 0s problem, right? so there's very little determined to be if there's an insider threat or outsider threat. looking for those things digitally, you're not going to tell a difference. behavioralically is what you are looking for. -- behaviorally. there's some key foundational components when developing a program like this for any size organization, and it's really helping the organization understand its risk appetite. where that information sits and how they want to secure it. >> and, brian, i mean, and i think jeff hit on a point we were chatting about earlier, and that's looking at behavioral analytics. but where do the two converge? where do they come together, and then shed some light a little bit on where we see the various threat actors and ranging from disgruntled employees to -- >> sure. >> --obvious nation-state sorts of threats. >> i'll answer the second part first. i tend to think of the four gs, grandmothers, gangsters, government and guerrillas. minor actors such as hactivists and nation-sta
because at the end of the day, in cybersecurity it's a 1s and 0s problem, right? so there's very little determined to be if there's an insider threat or outsider threat. looking for those things digitally, you're not going to tell a difference. behavioralically is what you are looking for. -- behaviorally. there's some key foundational components when developing a program like this for any size organization, and it's really helping the organization understand its risk appetite. where that...
42
42
May 13, 2016
05/16
by
CSPAN
tv
eye 42
favorite 0
quote 0
concerns about cybersecurity are, you know, global. physical location is one element but probably in the case of ybersecurity, not the most important in terms of concerns, it's more about the secure by design sort of notion, you know what have you put in place and how well is it implemented. so those would be more my primary concerns, in some cases the physical location. mr. lynch: my concern is obviously the communist government of vietnam is going to require access. so that was my concern. you suffered enough. i want to yield back. thank you. mr. meadows: thank you. i want to thank all the bnses -- witnesses for being here today and if there is no other business, the subcommittee stands adjourned. [captioning performed by national captioning institute] [captions copyright national cable satellite corp. 2016] >> president obama will host leaders from norway, sweden, finland, denmark and iceland as part of a in orderic leaders summit. he's holding a state dinner for the in orderic leaders tonight. see the arrival of the guests at the w
concerns about cybersecurity are, you know, global. physical location is one element but probably in the case of ybersecurity, not the most important in terms of concerns, it's more about the secure by design sort of notion, you know what have you put in place and how well is it implemented. so those would be more my primary concerns, in some cases the physical location. mr. lynch: my concern is obviously the communist government of vietnam is going to require access. so that was my concern....
198
198
May 5, 2016
05/16
by
KNTV
tv
eye 198
favorite 0
quote 0
fortify military security. >> problems they are addressing are complex. >> specifically cybersecurity. >> this is a great opportunity to be of service to the country. >> stanford calls it hacking for defense. >> it feels like a start up. >> students using their skills to help make america's military safer. >> when you think about it a little bit, it's making you work harder, you know for a lot of the teams, people's lives are on the line. >> an interesting problem that you are trained in a certain discipline as an engineer, but it's about problem solving. >> the professor, former army colonol. >> we were wondering if people would show up. >> and to transfer it to something meaningful, that affects a serious national security issue that is exciting. >> and an army major. >> the exposer to some cutting edge technology, and really some of the cutting edge minds and that problem solving ability that we talked about, is huge. >> students on the farm, working to help soldiers on the field of battle. >> the class at stanford runs through may. organizers and the military say they are encourag
fortify military security. >> problems they are addressing are complex. >> specifically cybersecurity. >> this is a great opportunity to be of service to the country. >> stanford calls it hacking for defense. >> it feels like a start up. >> students using their skills to help make america's military safer. >> when you think about it a little bit, it's making you work harder, you know for a lot of the teams, people's lives are on the line. >> an...
59
59
May 16, 2016
05/16
by
KTVU
tv
eye 59
favorite 0
quote 0
cybersecurity experts will be among those participating in a similar cyberattack in boston, and hosting the event with experts and the experts from the homeland security and fbi will participate with more than 100 representatives from public and private agencies, and it is the mock incident taking place, legal and technical challenges in stopping and responding to an attack. >>> the wildfire in canada is raging on, and the officials have released and app to help the victims, they can survey the property, but they warned that doing this satellite images may be traumatic. the fire broke out on may 3, burning nearly 600,000 acres. more than 80,000 people were forced to evacuate and no deaths or injuries have been reported from the fire, but two people did die in a traffic accident while trying to evacuate. >>> a prostitution ring is busted, and the latest in that crackdown. >>> new information on the swarm of killer bees in the east bay that attacked several people, killing two back dogs. -- two dogs. >>> traffic is doing pretty well on the east shore freeway and we will talk more about th
cybersecurity experts will be among those participating in a similar cyberattack in boston, and hosting the event with experts and the experts from the homeland security and fbi will participate with more than 100 representatives from public and private agencies, and it is the mock incident taking place, legal and technical challenges in stopping and responding to an attack. >>> the wildfire in canada is raging on, and the officials have released and app to help the victims, they can...
38
38
May 29, 2016
05/16
by
FBC
tv
eye 38
favorite 0
quote 0
. >> cybersecurity will grow. >> adam. >> s&p 500 large cap growth. some names they'll know in there. >> ben. >> spiders, the usual and it's done great. >> you are not worried or are worried about kids who stay at home? that they're sucking -- is that your view? >> i'm not worried about them at all. they're big babies, but there have always been a lot of big babe be byes. >> puts it in perspective. >> trump economics is a recipe for lower wages, fewer jobs, more debt. he could bankrupt america like he's bankrupted his company. >> hillary clinton warning voters that a president trump would mean fewer jobs in america, but some here say trump is the only presidential candidate who actually created jobs in america, so who's right and who's wrong? hi, everybody, welcome to forbes on fox. let's go in focus with mr. steve forbes. rich carlguard, mike and elizabeth mcdonald, john and bruce jackson. so, rich, what does hillary actually know about business? >> well, not much. i
. >> cybersecurity will grow. >> adam. >> s&p 500 large cap growth. some names they'll know in there. >> ben. >> spiders, the usual and it's done great. >> you are not worried or are worried about kids who stay at home? that they're sucking -- is that your view? >> i'm not worried about them at all. they're big babies, but there have always been a lot of big babe be byes. >> puts it in perspective. >> trump economics is a recipe for...
54
54
May 3, 2016
05/16
by
CSPAN2
tv
eye 54
favorite 0
quote 0
clearly, cybersecurity had to be a number one priority despite the differences and components.quickly established it and we have made enormous progress in improving the cybersecurity of the dhs systems. from that experience, earlier this year, the cio that at the dmag approved, the winter study to look at our infrastructures across all the component to make sure our information infrastructure is up to date, working, delivering necessary services, did a review, came up with a common approach to measuring and testing whether an analytical approach to see what works, what was then prioritize. so it might be the cbp as cementing status before i need this because it is so critical and have gained alignment on how to improve our infrastructure with much more commonality, much more common approach going forward, based on the dmag discussion, openness, clarity, we are now in the process of using the funding we have two most importantly prioritized how we are improving our infrastructure. i hope these examples underscore the opportunity to collaborate when it make sense and still remain
clearly, cybersecurity had to be a number one priority despite the differences and components.quickly established it and we have made enormous progress in improving the cybersecurity of the dhs systems. from that experience, earlier this year, the cio that at the dmag approved, the winter study to look at our infrastructures across all the component to make sure our information infrastructure is up to date, working, delivering necessary services, did a review, came up with a common approach to...
71
71
May 5, 2016
05/16
by
CSPAN2
tv
eye 71
favorite 0
quote 0
cybersecurity is not. you have adversaries and a whole lot more complexity but i also think what we'll end up doing is happening to employ a whole lot segmentation and isolation way we set up our dependence. you don't have to put software and bluetooth on everything. you don't have to connect it to everything else. it will take a lot of stumbling and fumbling before we get there. anybody else for that particular point? >> i will just briefly compliment one of your points. so on the point of a minimum standard of care for security, federal trade commission has instituted a reasonableness standard for security in all companies and in all products as super protection measure. so their enforcement activity and over 50 enforcement auctions with respect to security and reasonableness is the hallmark of that activity and there is a report called the start with security report that provides a list of practices that have been considered in various enforcement actions and it is intended partially in assisting docume
cybersecurity is not. you have adversaries and a whole lot more complexity but i also think what we'll end up doing is happening to employ a whole lot segmentation and isolation way we set up our dependence. you don't have to put software and bluetooth on everything. you don't have to connect it to everything else. it will take a lot of stumbling and fumbling before we get there. anybody else for that particular point? >> i will just briefly compliment one of your points. so on the point...
128
128
May 25, 2016
05/16
by
MSNBCW
tv
eye 128
favorite 0
quote 0
this is well documented in a series of audit, they're bad at it and cybersecurity. there's a general feeling among state officials if they want to get something done quickly they need to use an outside account. by the time secretary clinton took office these issues were not as pronounced as colin powell. there was a widespread e-mail system established she could have used and she chose not to. >> thank you. we know you've been working throughout the day. the inspector general report we heard from our road warriors this does provide fresh ammunition against hillary clinton as candidate, former congressman tom delay represented texas from 1985 to 2006 and joins us now. good to have you with us. >> i want to thank you, erica. >> i'd like to first get your reaction to the report and to what we're hearing. >> well, my reaction is the democrats must be really concerned right now because what people have been saying all along and has been reflected in the polls, and trump calling hillary clinton crooked hillary is coming to bear. this report -- and i haven't read it yet, b
this is well documented in a series of audit, they're bad at it and cybersecurity. there's a general feeling among state officials if they want to get something done quickly they need to use an outside account. by the time secretary clinton took office these issues were not as pronounced as colin powell. there was a widespread e-mail system established she could have used and she chose not to. >> thank you. we know you've been working throughout the day. the inspector general report we...
52
52
May 2, 2016
05/16
by
CSPAN3
tv
eye 52
favorite 0
quote 0
we've conducted examinations to identify cybersecurity risks and assess cybersecurity preparedness among broker/dealers and investment advisors. we published our intended areas of focus. after conducting exams, ocie published a summary of our observations. we're continuing to conduct cybersecurity examinations including access and control rights, vendor management and incident response. the final priority i will mention is liquidity. in light of changes over the past several years, ocie is examining advisors to mutual fund, etfs and private funds. include a review of various controls, trading activity and valuation policies. thank you for inviting me to testify today and i would be happy to answer any questions. >> thank you for your testimony. at this point, i'll recognize myself for five minutes to begin questions. i'll begin with mr. butler. one of the areas that there was actually buy partisan support in dodd-frank was with regard to removal of references to credit rating agencies 939-a. that was an area that i work with chairman frank at the time to get included in the -- in the dod
we've conducted examinations to identify cybersecurity risks and assess cybersecurity preparedness among broker/dealers and investment advisors. we published our intended areas of focus. after conducting exams, ocie published a summary of our observations. we're continuing to conduct cybersecurity examinations including access and control rights, vendor management and incident response. the final priority i will mention is liquidity. in light of changes over the past several years, ocie is...
121
121
May 18, 2016
05/16
by
FBC
tv
eye 121
favorite 0
quote 1
why the fbi is ramping up cybersecurity to protect the presidential campaigns and why do big corporateroups favor hillary clinton over businessman donald trump? we'll talk to art laffer about that and whether he would vote for hillary if she appoints bill as her economic czar. melissa: come on! david: he voted for bill twice. you don't want to miss this coming up. you wouldn't order szechuan without checking the spice level. it really opens the passages. waiter. water. so why would you invest without checking brokercheck? check your broker with brokercheck. burning, pins-and-needles of beforediabetic nerve pain, these feet played shortstop in high school, learned the horn from my dad and played gigs from new york to miami. but i couldn't bear my diabetic nerve pain any longer. so i talked to my doctor and he prescribed lyrica. nerve damage from diabetes causes diabetic nerve pain. lyrica is fda approved to treat this pain, from moderate to even severe diabetic nerve pain. lyrica may cause serious allergic reactions or suicidal thoughts or actions. tell your doctor right away if you hav
why the fbi is ramping up cybersecurity to protect the presidential campaigns and why do big corporateroups favor hillary clinton over businessman donald trump? we'll talk to art laffer about that and whether he would vote for hillary if she appoints bill as her economic czar. melissa: come on! david: he voted for bill twice. you don't want to miss this coming up. you wouldn't order szechuan without checking the spice level. it really opens the passages. waiter. water. so why would you invest...
359
359
May 28, 2016
05/16
by
FOXNEWSW
tv
eye 359
favorite 0
quote 0
just a different era where the threats of cybersecurity were far less sophisticated than they are today. >> what's the larger political impact of this among democrats? still got the california primary coming up. this going to hurt her among democrats? >> all it does is is backs up the idea that she is untrut worthy. and you know, this has been her biggest problem all along in this election, those numbers and polls saying americans don't believe what she has to say. now, you've got a report in which the ig demolishes again everything she's done over the last year and she's till out claiming and spinning it is something other than it is. >> all right. when we come back, hillary clinton and donald trump sharpen their attacks as they look ahead to the general election. trump is is rehashing the clinton scandals of the 1990s while hillary is focusing on her rival's record as a business man, so, will either strategy work? i thought i married an italian. my lineage was the vecchios and zuccolis. through ancestry, through dna i found out that i was only 16% italian. he was 34% eastern european.
just a different era where the threats of cybersecurity were far less sophisticated than they are today. >> what's the larger political impact of this among democrats? still got the california primary coming up. this going to hurt her among democrats? >> all it does is is backs up the idea that she is untrut worthy. and you know, this has been her biggest problem all along in this election, those numbers and polls saying americans don't believe what she has to say. now, you've got a...
539
539
May 26, 2016
05/16
by
KNTV
tv
eye 539
favorite 0
quote 0
the report blames the state department for long-standing cybersecurity failures. lester? >> andrea mitchell tonight, thank you. >>> let's turn to the latest in the long tsa lines at airports we've been seeing nationwide. just as the summer vacation season sets to kick off this weekend. the man who runs the tsa today said the agency is making progress in cutting the wait times at many airports, but there's still 4,000 to 5,000 screeners short. we learned today on hundreds of occasions, tsa officers have been pulled from airports to work political events. here's nbc's tom costello. >> reporter: one big reason the tsa is in trouble, the numbers just don't add up. in 2011, there were 45,000 screening officers at the nation's airports. five years later, 2,500 fewer are on the job. with 100 million more passengers flooding the system. that's what the checkpoint backup stretching one, two, even three hours. tens of thousands of passengers missing their flights. >> we have a challenge this summer which we are aggressively meeting head-on. >> reporter: the tsa chief on the capitol
the report blames the state department for long-standing cybersecurity failures. lester? >> andrea mitchell tonight, thank you. >>> let's turn to the latest in the long tsa lines at airports we've been seeing nationwide. just as the summer vacation season sets to kick off this weekend. the man who runs the tsa today said the agency is making progress in cutting the wait times at many airports, but there's still 4,000 to 5,000 screeners short. we learned today on hundreds of...
160
160
May 26, 2016
05/16
by
KNTV
tv
eye 160
favorite 0
quote 0
. >> reporter: she did not talk about the report that said she violated cybersecurity guidelines by using a private e-mail. >> she is as crooked as they come. she had bad news today. >> reporter: with california's june primary around the corner, political analysts say the timing of the report is not good for clinton. >> this is a chance for sanders to stay in the game and for clinton, it's a chance for sanders to put her away. >> bay area news. >> i just couldn't take it anymore. >> she said she told police she was molested but it took nearly two years for the authorities to arrest the accused abuser. up next, a stunning admission from the district attorney's office about what happened and why the da is now apologizing. >> also ahead, hollywood drama that ends in handcuffs, what we have learned about a man who climbed, yep, on one of the world's most famous signs this evening. >> and good evening, i'm jeff renieri, we are tracking a warm up that now you whi-- that now includes 90s. >>> a teenage girl found the courage to report sexual abuse she said that she endured since being second gra
. >> reporter: she did not talk about the report that said she violated cybersecurity guidelines by using a private e-mail. >> she is as crooked as they come. she had bad news today. >> reporter: with california's june primary around the corner, political analysts say the timing of the report is not good for clinton. >> this is a chance for sanders to stay in the game and for clinton, it's a chance for sanders to put her away. >> bay area news. >> i just...
67
67
May 10, 2016
05/16
by
WTXF
tv
eye 67
favorite 0
quote 0
the nyc cybersecurity company has expanded rapidly, now in jersey, across the u.s., overseas, and heocal municipalities and governments. why such a response? it could be because his sublet spies have a 100% success rate. >> everyone that's come to us whether they've got multiple units, we come back to them and say here's an airbnb in your building. >> they use the most advanced technology, searching thousands of databases. now, for the naysayer that thinks he's ruining it for people like you and me that just want to make an extra buck, he says he's going after the mass network that has now become what he's calling organized crime. >> this is not some mom and pop trying to scrape by and make a few extra dollars. in fact, more than half the listings that airbnb talks about, completely inactive. the bulk of their business is coming from these professional illegal hotel operators. it's organized crime, and that's what we're hunting, not some, you know, poor, starving artists. >> with such a successful system in place, one would hope that new york city and other cities looked at them for
the nyc cybersecurity company has expanded rapidly, now in jersey, across the u.s., overseas, and heocal municipalities and governments. why such a response? it could be because his sublet spies have a 100% success rate. >> everyone that's come to us whether they've got multiple units, we come back to them and say here's an airbnb in your building. >> they use the most advanced technology, searching thousands of databases. now, for the naysayer that thinks he's ruining it for people...
78
78
May 20, 2016
05/16
by
CNBC
tv
eye 78
favorite 0
quote 0
cybersecurity is big here in san diego.r to the north, it's really established itself as a hot bed for startup activity. in the last go years it's named the top ten startup city. that cybersecurity and technology background, they really become the backbone of the startup team here. that's where darren anderson launched cyber attack in 2012. they have accelerator programs for companies focusing on everything from robotics to drones to securing the internet of things. >> i really became passionate about what it means to be able to be in an innovative place like san diego, but to do so from a digital standpoint. we have so many adversaries making to look our lives heard, stealing our intellectual properties, our ideas, was something that really got me originally riled up. >> reporter: now, he said they've got technology that actually hacked into drones and tells them to land. he said there's no place rather than san diego that he could actually launch this because of their military and defense background, but also because of t
cybersecurity is big here in san diego.r to the north, it's really established itself as a hot bed for startup activity. in the last go years it's named the top ten startup city. that cybersecurity and technology background, they really become the backbone of the startup team here. that's where darren anderson launched cyber attack in 2012. they have accelerator programs for companies focusing on everything from robotics to drones to securing the internet of things. >> i really became...
161
161
May 14, 2016
05/16
by
CSPAN2
tv
eye 161
favorite 0
quote 0
boundaries and concerns about cybersecurity our global.physical location is one element that probably in the case of cybersecurity not the most dispositive in terms of concerns i would have. it's more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one? so those would be more my primary concerns. >> my concern is obviously the communist government of vietnam is going to require access. i have -- i will yield back. .. [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] on. [inaudible] >> this sunday night on q and a, historian adam and his books and spain in our hearts, on the american involvement on the spanish civil war in the late 19 thirties. >> of this attempt hapten in spain when all over the country, right winged army officers tried to seize power and imparts of parts of the country succeeded in seizing power in 1936. it sent a shockwave
boundaries and concerns about cybersecurity our global.physical location is one element that probably in the case of cybersecurity not the most dispositive in terms of concerns i would have. it's more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one? so those would be more my primary concerns. >> my concern is obviously the communist government of vietnam is going to require access. i have -- i will yield back. .. [inaudible]...
352
352
May 26, 2016
05/16
by
WRC
tv
eye 352
favorite 0
quote 0
the report also blames the state department foron cybersecurity failures. "the washington post" editorial board has come out against clinton on the issue saying clinton displayed inexcusable willful disregard for the rules. >>> breaking news overnight. a deadly shooting at a new york city concert hall where rapper t.i. was scheduled to perform. police say someone opened fire last night in a green room in irving plaza. three men and one woman hit by bullets and one man died at the hospital. witnesses say the shooting sparked a stampede sending panicked concert goers running for the exist and no arrests have been made and no word on the possible motive. metal detectors were in place but one was told new york city security was laxed. t.i. had not taken the stage when the shooting occurred. >>> the head of the tsa says the agency is adding staff to help deal with increasingly long airport security lines. >> we have a challenge this summer which we are aggressively meeting head-on. we are providing more overtime we are also converting with the help of congress a
the report also blames the state department foron cybersecurity failures. "the washington post" editorial board has come out against clinton on the issue saying clinton displayed inexcusable willful disregard for the rules. >>> breaking news overnight. a deadly shooting at a new york city concert hall where rapper t.i. was scheduled to perform. police say someone opened fire last night in a green room in irving plaza. three men and one woman hit by bullets and one man died at...
50
50
May 26, 2016
05/16
by
WCAU
tv
eye 50
favorite 0
quote 0
it concludes clinton violated cybersecurity guidelines by using a private e-mail account as secretary of state. the report finds in evidence that clinton got approval, as she has claimed in the past, to use her own blackberry and e-mail server. other secretaries of state used private accounts, but the report says clinton's failures were more serious because the state department had more guidelines during her tenure. her gop rival donald trump jumped on the report's findings. >> inspector general's report, not good. she's got bad judgment. she's got horribly bad judgment. >> clinton has denied any wrongdoing or deception. the inspector general's report is separate from the fbi probe into a possible criminal violation. >>> an exhibit telling jackie robinson's story of breaking baseball's color baarrier goes n display at the national institution center today. we got a preview yesterday as workers put the finishing touches on the exhibit. it features two contracts signed by robinson, one with the montreal royals in 1946, the other with the brooklyn dodgers in 1947. those signings came nea
it concludes clinton violated cybersecurity guidelines by using a private e-mail account as secretary of state. the report finds in evidence that clinton got approval, as she has claimed in the past, to use her own blackberry and e-mail server. other secretaries of state used private accounts, but the report says clinton's failures were more serious because the state department had more guidelines during her tenure. her gop rival donald trump jumped on the report's findings. >> inspector...
63
63
May 16, 2016
05/16
by
CSPAN
tv
eye 63
favorite 0
quote 0
the clerk: a bill to authorize the he secretary of homeland security to establish a national cybersecurity could shore shum and for other purposes. the speaker pro tempore: the question is will the house suspend the rules and pass the bill as amended. members will record their votes by electronic device. this is a 15-minute vote. [captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned coverage of the house proceedings for political or commercial purposes is expressly prohibited by the u.s. house of representatives.] the speaker pro tempore: on this vote, the yeas are 394, the nays are 3. 2/3 being in the affirmative, the rules are suspended, the bill is passed and without objection the motion to reconsider is laid on the table. without objection the title amended. the unfinished business is the vote on the motion of the gentleman from new york, mr. katko, on which the yeas and nays ared ored. caller: h.r. 4407, a bill to amend the homeland security act of 2002, to establish in the
the clerk: a bill to authorize the he secretary of homeland security to establish a national cybersecurity could shore shum and for other purposes. the speaker pro tempore: the question is will the house suspend the rules and pass the bill as amended. members will record their votes by electronic device. this is a 15-minute vote. [captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned...
158
158
May 1, 2016
05/16
by
WABC
tv
eye 158
favorite 0
quote 0
the whole issue of cybersecurity and data protection, whether you're just a man or woman on the street, a young person, or a big corporation or a government -- all the data that's in your cellphone, in your hard drive, which is in the internet and everything -- everything has a hard drive. we, or any other responsible recycler, turns the data into dust. >> oh, wow. >> and this is the whole key to the whole issue now. not only do we need to protect the environment, but everyone needs to protect their data. so, when we keep the electronics, in partnership with veolia and the city of new york, out of the landfills here, we then responsibly recycle it, 100% of it gets recycled -- all the plastics, the metals, and the glass -- and all your data turns into dust. so, this way you don't have to worry about somebody finding the data. right now, as we're taping this show, the former secretary of state is, uh -- you know, her hard drive is being de-encrypted, uh, and they're -- right now, the fbi is looking to see if there were any e-mails that may be potentially dangerous to -- you know, with to
the whole issue of cybersecurity and data protection, whether you're just a man or woman on the street, a young person, or a big corporation or a government -- all the data that's in your cellphone, in your hard drive, which is in the internet and everything -- everything has a hard drive. we, or any other responsible recycler, turns the data into dust. >> oh, wow. >> and this is the whole key to the whole issue now. not only do we need to protect the environment, but everyone needs...
56
56
May 24, 2016
05/16
by
CSPAN3
tv
eye 56
favorite 0
quote 0
an example might be in cybersecurity.you're trying to defend your network and attacks are coming in, we are at a point now where we think the power of machines looking at the patterns and the ones and zeros and the net flow data, that those machines are going to be able to see the patterns of attack and discern what's happening and alert you so that you can do something about it in a way that humans can't. statistically if they guess wrong, the world doesn't end. it's going to be very, very valuable in starting to get a handle on cybersecurity. >> if you think of the kinds of methods that are developed to analyze data this in field, they range from fully human, which doesn't really work -- it works fine at the microlevel, but no human can process the amounts of d that that are coming in today. then you can go to a fully automated system that are extremely efficient and incredibly dumb. imagine a driverless car where you don't tell the human where to go. the best technology in most areas is human empowered and computer ass
an example might be in cybersecurity.you're trying to defend your network and attacks are coming in, we are at a point now where we think the power of machines looking at the patterns and the ones and zeros and the net flow data, that those machines are going to be able to see the patterns of attack and discern what's happening and alert you so that you can do something about it in a way that humans can't. statistically if they guess wrong, the world doesn't end. it's going to be very, very...