44
44
Dec 10, 2018
12/18
by
CSPAN2
tv
eye 44
favorite 0
quote 0
the weapons systems cybersecurity report is available on the gao website. this is "the communicators" on c-span.
the weapons systems cybersecurity report is available on the gao website. this is "the communicators" on c-span.
38
38
Dec 11, 2018
12/18
by
CSPAN2
tv
eye 38
favorite 0
quote 0
what is the overarching find in your report dealing with weapons and cybersecurity? >> we look at weapons in the development process and what we found is many are vulnerable to be hacked there very vulnerable to cyberattacks in general as they try to penetrate it was relatively easy to do so. a lot of the time it was physical like password management with patch updating and things like that. it is a grim situation they are taking a lot of action recognizing there is a problem but there is a long road ahead of them but the cyberhygiene to take it seriously. >>host: the senate armed services committee requested this report. >>host: both senator reid and the chairman of the committee as well? >> mccain was the chairman at the time. >>host: christina chaplain is our guest this week to talk about this report and we are joined our guest reporter. >> thanks for having me i am curious talking about the systems that they are secure but what are we doing to deter adversaries? >> in the meantime there's a lot that could be done to shore up the culture of dod to pay attention to
what is the overarching find in your report dealing with weapons and cybersecurity? >> we look at weapons in the development process and what we found is many are vulnerable to be hacked there very vulnerable to cyberattacks in general as they try to penetrate it was relatively easy to do so. a lot of the time it was physical like password management with patch updating and things like that. it is a grim situation they are taking a lot of action recognizing there is a problem but there is...
38
38
Dec 17, 2018
12/18
by
CSPAN2
tv
eye 38
favorite 0
quote 0
we will go thrive national press club for discussion on cybersecurity threats on small and medium-size businesses, leaders from microsoft, exxon mobile. we join this in progress. >> but what we learned in commission that small businesses have more in common across sectors with small businesses than they do with large companies and their sectors and so i will make analogy to pediatric medicine, for a long time we said adult medicine needed to be produced for children. we know that pediatric medicine distinct discipline and what the program does define it is discipline and helps create resources to support it. >> thank you, thank you, everybody, for being here. i will open up our q&a. we have -- >> allright, danny, part of headliner's team will be passing the mic around. you have a question please raise your hand and if you have a mic please identify yourself and news organization. >> i'm a student at calvert high school. i heard talking about making it harder for hackers to hack but what i've seen that hackers tend to learn and other companies i've seen that they set up security measure
we will go thrive national press club for discussion on cybersecurity threats on small and medium-size businesses, leaders from microsoft, exxon mobile. we join this in progress. >> but what we learned in commission that small businesses have more in common across sectors with small businesses than they do with large companies and their sectors and so i will make analogy to pediatric medicine, for a long time we said adult medicine needed to be produced for children. we know that...
33
33
Dec 8, 2018
12/18
by
CSPAN2
tv
eye 33
favorite 0
quote 0
p cybersecurity policy. this includes the potential use of offenses cyber capabilities to deter and respond the cyberattacks against u.s. interests. as well as authorization to combat info operations. it also grands the president and defense secretary authority to direct cyber command to respond and deter to "an active and systematic and ongoing campaign attacks" carrieded out by chinas like russia china korea and iran. these powers if used accurately are important components of a cyber doctrine. by definition they require decisech and thoughtfully leadership at the top. i'll leave you with a couple final thoughts. obviously more broadly we need a coherent strategy for how to deal with the hybrid approach of cyber and disinformation that is coming from our adversaries. but let me be clear about what i'm not saying. i am not advocating thest that the u.s. mimic the approach of russia and china. the idea that states have a sovereign right to control or censor information within their borders. frankly that ishe
p cybersecurity policy. this includes the potential use of offenses cyber capabilities to deter and respond the cyberattacks against u.s. interests. as well as authorization to combat info operations. it also grands the president and defense secretary authority to direct cyber command to respond and deter to "an active and systematic and ongoing campaign attacks" carrieded out by chinas like russia china korea and iran. these powers if used accurately are important components of a...
88
88
Dec 23, 2018
12/18
by
CSPAN2
tv
eye 88
favorite 0
quote 0
that's not terrorism, but cybersecurity and the cyber threat. we need to bring our prior experience to bear and we should not have to relearn old lessons which is why incidentally, i think we should restore the position of the cybersecurity coordinator at the white house. we should be enhancing that role and national level coordination of cybersecurity. we need to bring the same prioritization, teamwork and partnership that has been effective against terrorism to cybersecurity to build the same muscle memory for cybersecurity that we developed against terrorism. at the national security division years ago in 2011, we recognized this and we set about clearly to try and make that evolution by setting up the first nationwide network of cybersecurity prosecutors, beginning the case that would become the first of its kind indictment of chinese cyber-enabled economic espionage. john and the team carried that forward and changed how we approached the malicious cyber activity of nation states. that has continued and accelerated in the last two years. as
that's not terrorism, but cybersecurity and the cyber threat. we need to bring our prior experience to bear and we should not have to relearn old lessons which is why incidentally, i think we should restore the position of the cybersecurity coordinator at the white house. we should be enhancing that role and national level coordination of cybersecurity. we need to bring the same prioritization, teamwork and partnership that has been effective against terrorism to cybersecurity to build the same...
38
38
Dec 5, 2018
12/18
by
ALJAZ
tv
eye 38
favorite 0
quote 0
prime minister day two of the debate focusing in on cybersecurity and what they're going to do with it how they're going to handle it how they're going to deconstruct it because cybersecurity is a big deal of course these days identity theft as well but there are elements to all the main treaties that constitute the european union from the treaty of rome to the mastery treaty through talking about cybersecurity so the prime minister space sickly going to be telling the house how they will deconstruct those arrangements as they head towards brecht sits in march of twenty nineteen she had a bruising day yesterday and she lost three areas of her plans and the main one is the slow. the humiliating aspect that journal is talking about there the way that the government had to and they've just done it in the last hour or so publish their legal advice because her attorney general who's basically toeing the line which was what's in the public interest is not the same as being of interest to the public the house of commons however totally disagreed with her and him on that and that's why they've
prime minister day two of the debate focusing in on cybersecurity and what they're going to do with it how they're going to handle it how they're going to deconstruct it because cybersecurity is a big deal of course these days identity theft as well but there are elements to all the main treaties that constitute the european union from the treaty of rome to the mastery treaty through talking about cybersecurity so the prime minister space sickly going to be telling the house how they will...
135
135
Dec 19, 2018
12/18
by
CNNW
tv
eye 135
favorite 0
quote 1
the messages were discovered by the cybersecurity firm area one. and they expose the biggest, most serious concerns of countries around the world. so what's in them, and who broke into the eu's diplomatic system? samuel burke live for us in london, 9:00 a.m. good to see you. how significant is this hack? >> reporter: good morning. incredibly significant. these are years of cables and thousands of them all about the headlines that you've been reporting on every day for the past couple of years in the trump administration. but what this really does is let us know exactly what diplomats all around the world as well as the world leaders, what they're really thinking after some of these encounters and negotiations with president trump. let me just put up on the screen the main topics that have been discovered in these wires starting with trump's negotiations with china. president xi jinping quoted as telling european diplomats that trump is bullying beijing into no rules, freestyle boxing match. the chinese president vowing that his country would not su
the messages were discovered by the cybersecurity firm area one. and they expose the biggest, most serious concerns of countries around the world. so what's in them, and who broke into the eu's diplomatic system? samuel burke live for us in london, 9:00 a.m. good to see you. how significant is this hack? >> reporter: good morning. incredibly significant. these are years of cables and thousands of them all about the headlines that you've been reporting on every day for the past couple of...
65
65
Dec 8, 2018
12/18
by
CSPAN
tv
eye 65
favorite 0
quote 0
the weapons systems cybersecurity report is available on the g.a.o. website. this is the communicators on c-span. [captioning performed by national captioning institute] [captions copyright national cable satellite corp. 2018] c-span, where history unfolds daily. in 1970 nine, c-span was created as a public service by america's cable television companies. today, we continue to bring you unfiltered coverage of congress, the white house, the supreme court, and public policy events in washington dc and around the country. is brought to you by your satellite provider. the supreme court heard arguments for apple incorporated versus pepper. they will be deciding if a group of app purchasers can sue the company for allegedly monopolizing the app store and charging higher prices. >> the argument first this morning in case 17204. apple inc. v. pepper. mr. wall. >> thank you, mr. chief justice, and may it please the court. the only damages in this monopolization is in a 30% commission that apple charges developers, which allegedly causes those of developers to increase
the weapons systems cybersecurity report is available on the g.a.o. website. this is the communicators on c-span. [captioning performed by national captioning institute] [captions copyright national cable satellite corp. 2018] c-span, where history unfolds daily. in 1970 nine, c-span was created as a public service by america's cable television companies. today, we continue to bring you unfiltered coverage of congress, the white house, the supreme court, and public policy events in washington...
84
84
Dec 6, 2018
12/18
by
MSNBCW
tv
eye 84
favorite 0
quote 0
protect yourself and your family now. >> but it's just weird that the cybersecurity expert seen hereeating the dark web with his iphone seems so confused by cyber. his security analysis conspiracy theory that somebody had, quote, invaded his text on twitter when it was pretty clearly he had just fat fingered his tweet was met with universal mockery. sure, grandpa, you might want to have one of the kids explain it to you. another suggested, did you try unplugging it, then plugging it back in? maybe this is the perfect adviser to the guy totally confused about presidenting. >> rudy is an expert on cybersecurity, it's important to him and to what he does. maybe i'll ask rudy to say a few words. >> thank you, very much, mr. president. first of all, congratulations on what is, in fact, a historic start of an administration. i've never seen so much done in so short of a period of time. >>> just before the sun came up, wisconsin republicans rammed through a transparently anti-democratic lame duck legislative measures explicitly designed to restrict what the incoming democratically elected d
protect yourself and your family now. >> but it's just weird that the cybersecurity expert seen hereeating the dark web with his iphone seems so confused by cyber. his security analysis conspiracy theory that somebody had, quote, invaded his text on twitter when it was pretty clearly he had just fat fingered his tweet was met with universal mockery. sure, grandpa, you might want to have one of the kids explain it to you. another suggested, did you try unplugging it, then plugging it back...
166
166
Dec 12, 2018
12/18
by
CSPAN3
tv
eye 166
favorite 0
quote 0
cybersecurity expert? i guess i'll refer that to you mr. krebs. >> yes, ma'am, thank you for the question. so i think it is important to look back over history and the creation of the cybersecurity role established in the early days of president obama's tenure in part because of the relative immaturity or lack of capability across the federal government in terms of a cybersecurity capacity. the department of homeland security under the prior national program director and my old organization was just emerging out of the comprehensive national -- >> i have so many more questions so maybe just -- >> i would not mistake the lack of a coordinator for lack of coordination. i think we find sufficient operational capability. >> okay. very good. and yesterday we saw the reports in the press that it was chinese hackers that stole roughly data -- data on 500 million guests from the marriott hotel chain. this is most recent example as we've discussed in the hearing you've seen more. what outreach and coordination is b
cybersecurity expert? i guess i'll refer that to you mr. krebs. >> yes, ma'am, thank you for the question. so i think it is important to look back over history and the creation of the cybersecurity role established in the early days of president obama's tenure in part because of the relative immaturity or lack of capability across the federal government in terms of a cybersecurity capacity. the department of homeland security under the prior national program director and my old...
21
21
Dec 29, 2018
12/18
by
FBC
tv
eye 21
favorite 0
quote 0
maria: cybersecurity? . >> no. crypto. just crypto but that we do have security companies one is flashpoint dealing with cybersecurity with those dark sources around the world trying to evade everybody for the first time last week i actually was hacked myself so now i have the experience of what it is like. for me it's everything you've got and you never know how it got there. maria: a lot of new names coming in as well. i am expected to have a bigger bite in the small early-stage companies as well? . >> the acorns that we invested in one year ago that started out at ground zero, now skyrocketing dealing with the millennial generation in terms of using phantom money it is an interesting concept to go into starbucks if you have the acorn account if you buy something for $22.12 then 88 cents is put into your acorn account then that is invested in the stock market so the idea is to educate young people. maria: ultimately how many go public how many are your exit strategy and ipo? . >> you ask me the questions i like to answer
maria: cybersecurity? . >> no. crypto. just crypto but that we do have security companies one is flashpoint dealing with cybersecurity with those dark sources around the world trying to evade everybody for the first time last week i actually was hacked myself so now i have the experience of what it is like. for me it's everything you've got and you never know how it got there. maria: a lot of new names coming in as well. i am expected to have a bigger bite in the small early-stage...
102
102
Dec 19, 2018
12/18
by
CNNW
tv
eye 102
favorite 0
quote 0
the messages were discovered by the cybersecurity firm area one. and they expose the biggest, most serious concerns of countries around the world. so what's in them, and who broke into the eu's diplomatic system? samuel burke live for us in london. there is the closest thing to being a fly on the twul conversations from some world -- the wall to conversations from some world leaders. >> reporter: exactly. arguably president trump has a different style interacting with his colleagues all around the world, different from any other president in the history of the united states. what do people really think, diplomats or other world leaders, when they walk away from some of these incredible interactions with president trump? let's put up on the screen some of the most sensitive topics that we see starting with probably the most important to all of us, trump's negotiations with china. president xi quoted as saying "working with trump feels like a no-rules freestyle boxing match." he goes on to say in these cables that beijing will not be bullied. that's
the messages were discovered by the cybersecurity firm area one. and they expose the biggest, most serious concerns of countries around the world. so what's in them, and who broke into the eu's diplomatic system? samuel burke live for us in london. there is the closest thing to being a fly on the twul conversations from some world -- the wall to conversations from some world leaders. >> reporter: exactly. arguably president trump has a different style interacting with his colleagues all...
143
143
Dec 13, 2018
12/18
by
FBC
tv
eye 143
favorite 0
quote 0
cybersecurity is not there to prevent all the time.ey can try to stop. these companies are never going to build a stop cybercrime just like cops are unable to stop crime in cities. and keep an eye knowing what's happening. stuart: no one is going to say you hire us and you'll never be hacked again. they'll never say that while they. >> they might try. i will not trust. the concert to avert the [inaudible conversations] executive is heating up because another canadian has been detained in china for questioning. liz: news crossing china has confirmed that yes it has detained not to canadians. you are looking at dennis rodman and not photo because he has facilitated the cultural exchange visit into north korea. he reportedly has detained in the northeast province of china. he would go in for a visit and never showed up. the other gentleman is a diplomat detained in beijing. the official statement now from china they have been detained for engaging in activities that are at china's national security. the problem now is can i cannot confirm
cybersecurity is not there to prevent all the time.ey can try to stop. these companies are never going to build a stop cybercrime just like cops are unable to stop crime in cities. and keep an eye knowing what's happening. stuart: no one is going to say you hire us and you'll never be hacked again. they'll never say that while they. >> they might try. i will not trust. the concert to avert the [inaudible conversations] executive is heating up because another canadian has been detained in...
84
84
Dec 11, 2018
12/18
by
CSPAN2
tv
eye 84
favorite 0
quote 0
it is impossible for us at this moment to provide our cybersecurity with a desirable level. >> they didn't have many other option encircled by the power to choose the schools with no restrictions at all but on the defensive side you have to rely 100% of the time it's one of the reasons why i think we have to articulate more clearly cyber doctrine that would have as much international body in as possible so that there is a price to be paid when the bad actors act. we focused as we should on the threat that they've been able to steal wit the fuss with virtual impunity because we have been unwilling to push back and i don't think we can continue th that. it seems not to be functioning at all and i'm just concerned that this is a personality-based formula as opposed to some other institutional process that can't be replicated in the case of the senate committee so if you have insight into why it is working for you guys, that would be important. >> i'm not going to comment about the house. in business i was the deal. the only way we got in is done politics may be the only business that i know e
it is impossible for us at this moment to provide our cybersecurity with a desirable level. >> they didn't have many other option encircled by the power to choose the schools with no restrictions at all but on the defensive side you have to rely 100% of the time it's one of the reasons why i think we have to articulate more clearly cyber doctrine that would have as much international body in as possible so that there is a price to be paid when the bad actors act. we focused as we should...
60
60
Dec 8, 2018
12/18
by
CSPAN
tv
eye 60
favorite 0
quote 0
chaplain, alyza covers cybersecurity and the bloomberg news. the weapons systems ybersecurity report is available on the g.a.o. website. communicators on c-span. [captioning performed by national captioning institute] [captions copyright national cable satellite corp. 2018] announcer: c-span, where daily. unfolds in 1979, c-span was created as a by america's cable television companies and today we continue to bring you congress, coverage of supreme house, the court and public policy events in washington, d.c. and around the country. to you by yourht cable or satellite provider. announcer: president trump left the white house this morning heading to speak in kansas city, marine , on the way to 1, he stopped briefly to talk with reporters.
chaplain, alyza covers cybersecurity and the bloomberg news. the weapons systems ybersecurity report is available on the g.a.o. website. communicators on c-span. [captioning performed by national captioning institute] [captions copyright national cable satellite corp. 2018] announcer: c-span, where daily. unfolds in 1979, c-span was created as a by america's cable television companies and today we continue to bring you congress, coverage of supreme house, the court and public policy events in...
75
75
Dec 10, 2018
12/18
by
CSPAN3
tv
eye 75
favorite 0
quote 0
one, in those regimes, congress has that -- has done some important things here in the cybersecurity information sharing act of 2015. in terms of what they said and notwithstanding any other law, you can take certain actions with regard to of course monitoring your systems, sharing cybersecurity indicators with the government and a vital overlooked provision and perhaps one of the most important provisions of that law that was a c change that got little notice at the time that you don't lose any legal privileges or other privileges you may have by sharing information on cybersecurity threats and indicators with the u.s. government. i could say as a practitioner in this area, vastly more important than the specific setup for the sharing of the indicator. so there are the issues with -- there has been the press around gdpr and what does that mean for the ability to look up ip addresses and do attribution and other things from the private sector, investigatory stand point, if that information is blocked to the private sector when you can't trace back and find out where things are happen
one, in those regimes, congress has that -- has done some important things here in the cybersecurity information sharing act of 2015. in terms of what they said and notwithstanding any other law, you can take certain actions with regard to of course monitoring your systems, sharing cybersecurity indicators with the government and a vital overlooked provision and perhaps one of the most important provisions of that law that was a c change that got little notice at the time that you don't lose...
144
144
Dec 26, 2018
12/18
by
CNBC
tv
eye 144
favorite 0
quote 0
cloud z scaler on cybersecurity is probably one of the best names out there.hat's an m&a candidate too. we're seeing more and more trends moving to the cloud 30% going to 55% and another pure play cloud s cybersecurity name is qualys >> is that a similar story on checkpoint >> checkpoint is steady eddie. >> the name has been around. the stock has been around forever. i remember when they ipo'd, and i had a lot more hair. >> it's been around forever, but you want some high-flying names like these, and checkpoint is the barbell approach >> how come nobody talks about oracle anymore >> when you look at the cloud they missed that cloud move in terms of the shift microsoft had the golden touch aws. now google cloud, they hire currian from oracle. but you look at m&a, that's whereracle has to be aggressive >> you referenced a new general manager, a new guy running google cloud, which to me says they will go after amazon web services and microsoft's azure is that a commodity priced race to the bottom? that's the fear. the margins will get whacked as those three big d
cloud z scaler on cybersecurity is probably one of the best names out there.hat's an m&a candidate too. we're seeing more and more trends moving to the cloud 30% going to 55% and another pure play cloud s cybersecurity name is qualys >> is that a similar story on checkpoint >> checkpoint is steady eddie. >> the name has been around. the stock has been around forever. i remember when they ipo'd, and i had a lot more hair. >> it's been around forever, but you want some...
82
82
Dec 19, 2018
12/18
by
CSPAN
tv
eye 82
favorite 0
quote 0
i do think that we have been very lax and united states on cybersecurity. we have dropped the ball. senator mark warner has been aing around promoting cybersecurity doctrine in which carefullyo think more about what kind of technology and privacy we are going to allow into our homes, offices, and personal devices. think -- i do not see it as widespread as the caller, but we need to have policies that take this kind of security risk into account. host: will is in charleston, west virginia. caller: i had a question. in west virginia, our state constitution calls for certain protections around things you check out from a library. do you see may the information collected by these devices bringing about similar legislation? guest: i hope so. i hope you are right. i had not thought about the connection with the privacy over what you check out from the library as being used as a model for what we could have in terms of cyber privacy, that is interesting. we can gain hope ownership over our personal information as they are doing and trying to do further in europe, for example. this should j
i do think that we have been very lax and united states on cybersecurity. we have dropped the ball. senator mark warner has been aing around promoting cybersecurity doctrine in which carefullyo think more about what kind of technology and privacy we are going to allow into our homes, offices, and personal devices. think -- i do not see it as widespread as the caller, but we need to have policies that take this kind of security risk into account. host: will is in charleston, west virginia....
74
74
Dec 30, 2018
12/18
by
FBC
tv
eye 74
favorite 0
quote 0
. >> so cybersecurity and we have security companies and flash point which had is dealing with cybersecurityf concern for -- for the dark sources around the world that are d trying to invae even. websites, for the first time last week, i actually got hacked myself so i now have the experience of what it's like and what you have to do when you do get hacked it is -- permeates everything you've got. >> how horrible. and you never know exactly how it got there. so you have a lot of new names comeing in as well are are you expecting to have a bigger bite in term a bigger investment in small early stage companies in new year? >> one of our hottest companies is acon which we invested in a year ago you may have heard of it start at ground zero and no i i sky is rocketing which is dealing with -- the millennial generation younger people in terms of signing on and using what is calledn found money it is interesting concept if you're a member of acorns you go into starbucks you go into any department store and you haveonn acorns account, if you buy something for 22 dollarss and 12 cents, if my math is
. >> so cybersecurity and we have security companies and flash point which had is dealing with cybersecurityf concern for -- for the dark sources around the world that are d trying to invae even. websites, for the first time last week, i actually got hacked myself so i now have the experience of what it's like and what you have to do when you do get hacked it is -- permeates everything you've got. >> how horrible. and you never know exactly how it got there. so you have a lot of new...
176
176
Dec 11, 2018
12/18
by
CSPAN
tv
eye 176
favorite 0
quote 1
program to include cybersecurity education. whether in our hospitals or power grid, systems that make up our critical infrastructure are internet-enabled. they increase efficiency and service quality. they provide pathways to cyber intruders to wreak havoc. we need to provide training for workers who deal with these systems whether in the transportation, energy or health sectors so they can keep us safe and identify the cybersecurity vullnerkts early on. many programs have strong safety elements. cybersecurity is rarely included and can't think of this as an afterthought. by funding the programs, we can ensure workers have the skills to protect our nation's infrastructure. i thank fred thompson for his partnership and i urge my colleagues to support our bipartisan effort. i yield back. the speaker pro tempore: for what purpose does the gentleman from pennsylvania seek recognition? mr. thompson: request unanimous consent to address the house for one minute and revise and extend my remarks. the speaker pro tempore: without object
program to include cybersecurity education. whether in our hospitals or power grid, systems that make up our critical infrastructure are internet-enabled. they increase efficiency and service quality. they provide pathways to cyber intruders to wreak havoc. we need to provide training for workers who deal with these systems whether in the transportation, energy or health sectors so they can keep us safe and identify the cybersecurity vullnerkts early on. many programs have strong safety...
82
82
Dec 13, 2018
12/18
by
CSPAN
tv
eye 82
favorite 0
quote 0
cybersecurity expert? >> i guess i'll refer that to you mr. krebs. >> yes, ma'am, thank you for the question. so i think it is important to look back over history and the creation of the cybersecurity role coordination we fined sufficient operational capabilities. okay. very good. and yesterday we saw the reports in the press that it was chinese hackers that stole roughly data -- data on 500 million guests from the marriott hotel chain. this is most recent example as we've discussed in the hearing you've seen more. what outreach and coordination is being done with companies and what limitations exist on your ability to share information on the threats both with other government agencies and with businesses? anyone can take it. >> well, i'll start with the idea, and again it is one of the reasons i'm so pleased that the hearing is being held today. we need greater awareness, again, of the gravity of the threat and the methodology and capabilities of our adversary in this regard. i want you to know from all
cybersecurity expert? >> i guess i'll refer that to you mr. krebs. >> yes, ma'am, thank you for the question. so i think it is important to look back over history and the creation of the cybersecurity role coordination we fined sufficient operational capabilities. okay. very good. and yesterday we saw the reports in the press that it was chinese hackers that stole roughly data -- data on 500 million guests from the marriott hotel chain. this is most recent example as we've discussed...
37
37
Dec 10, 2018
12/18
by
CSPAN2
tv
eye 37
favorite 0
quote 0
alyza sebenius covers cybersecurity and the white house for bloomberg news. the weapons systems cybersecurity report is available on the gao website. this is "the communicators" on c-span. >> now health and human services secretary alex these are talks about the trump administration's healthcare policy including its goal of reducing costs and improving choice. he spoke earlier this week at the american enterprise institute. [inaudible conversations] good afternoon. i think we're ready to get started again. thank you all for being here. x of those watching on the live stream and to all who watch the video after the event. i michael strain, director of economic policy studies at aei and is a pleasure to be with you for important discussion of the policy barriers to real choice and competition of the healthcare system and promising opportunities to overcome those barriers. i am pleased and honored that alex azar, sector of health and human services is with us today. i will introduce the secretary in the moment. before i do brief reminder of the rohit chopra the
alyza sebenius covers cybersecurity and the white house for bloomberg news. the weapons systems cybersecurity report is available on the gao website. this is "the communicators" on c-span. >> now health and human services secretary alex these are talks about the trump administration's healthcare policy including its goal of reducing costs and improving choice. he spoke earlier this week at the american enterprise institute. [inaudible conversations] good afternoon. i think we're...
25
25
tv
eye 25
favorite 0
quote 0
wall two biggest economies aside from the tarp problem the reason all the important one which is cybersecurity. and no we're not talking about a james bond movie some immediate reports are a sign of. an initiative order in the new year to declare our national emergency to bar u.s. companies from using telecommunications equipment made by china's. eat these who know the only trouble day ongoing trade talks but also could imply that some come come from china especially towards the u.s. semiconductor industry which makes it nearly thirty percent of its revenue in the chinese market also one of the doors of wide u.s. companies were down on thursday today here in new york or so exchange jose apart from the spy drama a bit some top unease are hurting from this month's climb to such huge buyback schemes earlier in the year. sure and among them ben should not be happy shares of the i phone maker are down a wrong ten percent beginning of the year and the company has lost around nine billion dollars because they decided to invest in itself by buying back some of its shares this is also happening to othe
wall two biggest economies aside from the tarp problem the reason all the important one which is cybersecurity. and no we're not talking about a james bond movie some immediate reports are a sign of. an initiative order in the new year to declare our national emergency to bar u.s. companies from using telecommunications equipment made by china's. eat these who know the only trouble day ongoing trade talks but also could imply that some come come from china especially towards the u.s....
45
45
Dec 6, 2018
12/18
by
BBCNEWS
tv
eye 45
favorite 0
quote 0
it is a cybersecurity honeypot. the richer the data, the more lucrative to steal.is the answer? is this just the price we pay for the free use of facebook, google. we freely use this social media every day. should we accept the fact that, asa day. should we accept the fact that, as a consequence, they are using our information all the time or should we be fighting them? we have had this sort of experimental phase, piloting this business model that you can have our data and we get a bunch of stuff for free but the people who take your data, the rat third parties trading. —— there. they should be legislated. it is putting all of us at risk now. they acknowledge that they cannot put your data secure. hacks stealing your data secure. hacks stealing your data. if you do not take the data in the first place, there is nothing to steal. the way they are getting around it is the way they have this pop—up messages were you scroll quickly to the bottom... it is not really concerned. in the guardian, and we have been covering this as well, this is such a depressing news. we th
it is a cybersecurity honeypot. the richer the data, the more lucrative to steal.is the answer? is this just the price we pay for the free use of facebook, google. we freely use this social media every day. should we accept the fact that, asa day. should we accept the fact that, as a consequence, they are using our information all the time or should we be fighting them? we have had this sort of experimental phase, piloting this business model that you can have our data and we get a bunch of...
67
67
Dec 18, 2018
12/18
by
LINKTV
tv
eye 67
favorite 0
quote 0
a look at some more headlines, the chinese technology giant hua than $2 spend more billion on cybersecurity. says it secures 25 commercial contracts to build 5g mobile networks despite efforts to stop aties building those networks in their countries. the european union has agreed to cut carbon emissions by more than the other 52030. they say the target is unrealistic. minimum wage will be raised to just over four euro 50 a day. for the firsted time since 1995, bringing the minimum wage in line with the poverty level. lg is reported to be ready to start selling tv screens that can be rolled and stod like a poster. retract after the touch of a button. according to bloomberg, you will 2019.e to buy them from >> that was the business news. time for our press review. starting off in the united kingdom, more brexit confusion. ispolitico is saying brexit becoming a murder mystery. they argue it is time to look the on the impossible and focus on the improbable. it is becoming unlikely because the clock is ticking down. that is before the march deadline. they can deduce clocks are going to be stoppe
a look at some more headlines, the chinese technology giant hua than $2 spend more billion on cybersecurity. says it secures 25 commercial contracts to build 5g mobile networks despite efforts to stop aties building those networks in their countries. the european union has agreed to cut carbon emissions by more than the other 52030. they say the target is unrealistic. minimum wage will be raised to just over four euro 50 a day. for the firsted time since 1995, bringing the minimum wage in line...
50
50
Dec 5, 2018
12/18
by
CSPAN2
tv
eye 50
favorite 0
quote 0
i don't know if we are going to end that but the whole process which include cybersecurity issues maybe it comes down the more i think about this i'm not a china expert it just strikes me that the ownership issue is really important they need to change the so-called joint venture system. that is nearly the root of all evil i don't even know why. if they want american companies to come in but many have had to that gives the chinese the authority to get a pretty good look at our technology in whatever field that happens to be that it has to change. i will continue to emphasize that. that is essential and i'm glad to see a lot of american businessmen and women are talking about this w now because now the center is moving in that direction my friend hank paulson gave a speech on that that is good because really to have as much energy and soybeans that they want that those ownership issues, that has to be addressed and it is so important to the future of the united states and to our relationship and the potential trade deal. you hill or other people from the administration. i will tell you t
i don't know if we are going to end that but the whole process which include cybersecurity issues maybe it comes down the more i think about this i'm not a china expert it just strikes me that the ownership issue is really important they need to change the so-called joint venture system. that is nearly the root of all evil i don't even know why. if they want american companies to come in but many have had to that gives the chinese the authority to get a pretty good look at our technology in...
149
149
Dec 28, 2018
12/18
by
FOXNEWSW
tv
eye 149
favorite 0
quote 0
the senator but it stalled after cybersecurity experts pounced.reviving issue, other hill staffers say both of these issues could be legislated soon. >> leland: we will watch that, as will you, i know. gillian turner in washington. so who is going to take that up in the new congress? there will be lots of new faces. the house will swear in more than 90 new net members once the congress convenes on january 3rd. and the person on fox news who supposed to keep track of all of them is our senior producer, chad program. >> as a kid, i use to collect these, pouring over the names and faces for hours and memorizing entire rosters. we don't have congress cars on capitol hill but perhaps we should. after every election i cram to studying pictures and bios trying to learn members of the freshman class, it's not easy. everyone recognizes new york democrat alexandria ocasio-cortez, but who can pick out carol miller. and that would be the new nonvoting delegate to congress promoting guam. or if you even knew there was an nonvoting. granted, some freshmen are m
the senator but it stalled after cybersecurity experts pounced.reviving issue, other hill staffers say both of these issues could be legislated soon. >> leland: we will watch that, as will you, i know. gillian turner in washington. so who is going to take that up in the new congress? there will be lots of new faces. the house will swear in more than 90 new net members once the congress convenes on january 3rd. and the person on fox news who supposed to keep track of all of them is our...
40
40
Dec 15, 2018
12/18
by
CSPAN2
tv
eye 40
favorite 0
quote 0
with cybersecurity with lawsuits here in the us and to be sure that 1789 they were permitted to make this demand of apple that supported by other tech companies argue this demand was unconstitutional the justice department withdrew itsts command before the court could resolve and they could pay the outside vendor that now they have a specific authority to make these types of demands. into use that authority in the same way and then of the uk which essentially is the nsa had a proposal that tech companies would ask or require as a participant in end to and encrypted chats. you do not even haveou to touch the encryption and that is from the encrypted chat. and in addition to explain that new power i addressed three other three constructs. it allow any independent independent review. such as that capabilities notices and what was passed in 2016 but then section 254 of the uk act does require that judicial commissioner must review and approve the capabilities before the me the issue having questions of the adequacy of this review under the uk law with even greater thoughts to cybersecuri
with cybersecurity with lawsuits here in the us and to be sure that 1789 they were permitted to make this demand of apple that supported by other tech companies argue this demand was unconstitutional the justice department withdrew itsts command before the court could resolve and they could pay the outside vendor that now they have a specific authority to make these types of demands. into use that authority in the same way and then of the uk which essentially is the nsa had a proposal that tech...
102
102
Dec 27, 2018
12/18
by
CSPAN2
tv
eye 102
favorite 0
quote 0
probably would not have 10 years ago thought to talk about the challenge of cybersecurity and what has happened in elections across the united states and europe with the interference of external powers in those elections through technological platforms.and so, i will start with the question and are like joe, perhaps you will start and will have conversation maybe neil, you can respond. we know that information used, weaponization of information has been with us a very long time. but we are seeing something different. how is social media, how the technologies that we are employing now, how does that change the information age and the interaction between the states and weaponization of information? >> if you go back to the end of the cold war, the 90s, when the world wide web was just getting really established, what is intriguing is how optimistic we all were. we finally slain the ghost of george orwell and the internet was going to make people free, president clinton famously said that in china, trying to control the internet was like nailing jell-o to the wall. well, the chinese have
probably would not have 10 years ago thought to talk about the challenge of cybersecurity and what has happened in elections across the united states and europe with the interference of external powers in those elections through technological platforms.and so, i will start with the question and are like joe, perhaps you will start and will have conversation maybe neil, you can respond. we know that information used, weaponization of information has been with us a very long time. but we are...
38
38
Dec 12, 2018
12/18
by
CSPAN2
tv
eye 38
favorite 0
quote 0
in this recently the sec issued guidance on cybersecurity disclosures, and i'm hoping the sec doesn't lose focus. what i would ask him a couple of your colleagues that five that the guidance didn't quite go far enough and i'm just, wondering if you could talk briefly about what you're seeing from companies about after the guidance was issued and if there are other improvements for these disclosures that you think might be prudent going forward? >> i have discussed those issues with my colleagues, and understand, i think that they understand the difficult it would be to be more precise. for a long time i thought this disclosure was not where it should be in terms of what the real risk was i think we've seen improvements we've seen improvement in okay here's the general risk and we seen some improvement in reporting when you haven't issue. have general risk applies to your company. i'd like to see more disclosure about what companies are doing to minimize that risk. i'll be collecting less data? i ability and how we operate our business so if you less susceptible? and now not just looki
in this recently the sec issued guidance on cybersecurity disclosures, and i'm hoping the sec doesn't lose focus. what i would ask him a couple of your colleagues that five that the guidance didn't quite go far enough and i'm just, wondering if you could talk briefly about what you're seeing from companies about after the guidance was issued and if there are other improvements for these disclosures that you think might be prudent going forward? >> i have discussed those issues with my...
54
54
Dec 7, 2018
12/18
by
BLOOMBERG
tv
eye 54
favorite 0
quote 0
. >> cybersecurity is the biggest issue, i think. the rubric current action going back quite a few years, sanctions against iran, huawei, but the bigger concern is cybersecurity and the fact that huawei those in stall a lot of network equipment and they are worried about backdoors being put in there. david: you were just saying, sir? andf you think about huawei the history, there have been concerns about cybersecurity, but the timing is interesting, because we're starting to ramp up five g to claimants. fiveg deployments. bandalia and new zealand huawei components. they found their growth in the 3g 4g network deployment rollout. 5g get slowed, that could hamstring huawei and give competitors an opportunity. david: thank you so much for chiming in. rish. rishaad: let's have a look at chinese markets. hang seng up .1%. move slightly to the downside for h-shares. nothing reflected in the shanghai composite. it is pretty flat. volumes on the thin side. story one to the big these story on these markets, pharmaceutical-related stocks. the
. >> cybersecurity is the biggest issue, i think. the rubric current action going back quite a few years, sanctions against iran, huawei, but the bigger concern is cybersecurity and the fact that huawei those in stall a lot of network equipment and they are worried about backdoors being put in there. david: you were just saying, sir? andf you think about huawei the history, there have been concerns about cybersecurity, but the timing is interesting, because we're starting to ramp up five...
49
49
Dec 15, 2018
12/18
by
CSPAN2
tv
eye 49
favorite 0
quote 0
into products and services to undermine the security for all would harm everyone's privacy with cybersecurity and that we are all victims of criminal activity. in addition what the oti hosted last month to protect economic security and personal safety and freedom of individuals including victims of domestic violence this debate has been going on for years has now gone global to australia this past august the australian government believed the exposure draft of the telecommunications and other legislation amendment unlike u.s. congress which takes months and months or years before passing anything else on modesto australia parliament wrapped up consideration in four months following a public comment period on the exposure draft a slightly modified version of the bill was introduced in parliament and referred to the joint committee which opened a new public comment. my organization organized an international coalition with tech companies and trade associations and we had three rounds of public comments on the bill outlining concerns which i will describe in a moment the committee held a series
into products and services to undermine the security for all would harm everyone's privacy with cybersecurity and that we are all victims of criminal activity. in addition what the oti hosted last month to protect economic security and personal safety and freedom of individuals including victims of domestic violence this debate has been going on for years has now gone global to australia this past august the australian government believed the exposure draft of the telecommunications and other...
40
40
Dec 21, 2018
12/18
by
ALJAZ
tv
eye 40
favorite 0
quote 0
side is making groundless accusations against china on cybersecurity by fabricating facts and making up a story out of. the us is charging two chinese in the name of so-called cyber theft this move seriously runs counter to the norms of international relations seriously harms china u.s. cooperation and is in essence extremely nasty china is resolutely against this and has launched stern represent tensions in the first instance schools and universities have been suspended in sudan's capital after eight people died in protests against rising fuel prices demonstrations spread to khartoum on thursday and there's a state of emergency in place in the city. and got a rough protesters are angry about inflation which is now at nearly seventy percent one of the highest in the world. opposition supporters in the democratic republic of congo are waiting to hear their leaders response to the election delay demonstrators rallied outside the headquarters of one of the opposition parties to vent their anger at the decision voting will now take place a week later that will be on december thirtieth co
side is making groundless accusations against china on cybersecurity by fabricating facts and making up a story out of. the us is charging two chinese in the name of so-called cyber theft this move seriously runs counter to the norms of international relations seriously harms china u.s. cooperation and is in essence extremely nasty china is resolutely against this and has launched stern represent tensions in the first instance schools and universities have been suspended in sudan's capital...
32
32
Dec 15, 2018
12/18
by
CSPAN2
tv
eye 32
favorite 0
quote 0
she focuses on national security issues surrounding cybersecurity cybersecurity, oversight of the intelligence community. and finally april doss is a partner where she chairs privacy practice group. part of that as senior counsel on the russia investigation counsel. april and susan are prior -- at the national security agency. they have been in the business and know what it looks like, and know what is and is not possible. i want to kick this off with a definitional question. exactly how do we define the deep-state. let me give you the cambridge dictionary definition here. this is from the online definition. organizes such as military police ear political groups that are said to work secretly, in order to rule a country without being elected. there is a little side ' bar note that the cambridge folks added. the cried that there is a deep state governing behind the scenes is mismissed by some as a conspiracy theory. susan, hennessy, is there a deep state? >> i suppose you could stack the deck so the term "deep states" which was originally applied to the turkish government. applies to an extra j
she focuses on national security issues surrounding cybersecurity cybersecurity, oversight of the intelligence community. and finally april doss is a partner where she chairs privacy practice group. part of that as senior counsel on the russia investigation counsel. april and susan are prior -- at the national security agency. they have been in the business and know what it looks like, and know what is and is not possible. i want to kick this off with a definitional question. exactly how do we...
81
81
Dec 18, 2018
12/18
by
CNNW
tv
eye 81
favorite 0
quote 0
going into 2020 is one, we have to make sure that we are shoring up -- that we are shoring up our cybersecurity. we have to triple-check where information comes from. we need to find the source. but also we need to nominate really good candidates. we need to have a very robust nominating process on the democratic side of the aisle so that the person that comes out understands and wants to knock doors in michigan and wisconsin. i voted for hillary clinton. i think the clinton campaign did some really good work. i think there were some gaps and those gaps are evident. >> symone, thank you. either you're having an earthquake there in d.c. or it's really windy because the camera's doing a lot of jumping around. >> thank you. we'll be right back. ♪ can you feel it ♪ can you feel it put a smile on everyone's face this holiday with great gifts from amazon. with low prices and fast, free delivery with prime. ♪ can you feel it for everything you need this holiday, visit amazon. get stronger... get closer. start listening today to the world's largest selection of audiobooks on audible. and now, get more.
going into 2020 is one, we have to make sure that we are shoring up -- that we are shoring up our cybersecurity. we have to triple-check where information comes from. we need to find the source. but also we need to nominate really good candidates. we need to have a very robust nominating process on the democratic side of the aisle so that the person that comes out understands and wants to knock doors in michigan and wisconsin. i voted for hillary clinton. i think the clinton campaign did some...
69
69
Dec 5, 2018
12/18
by
ALJAZ
tv
eye 69
favorite 0
quote 0
to our correspondent jonah hall so john i think today they're talking about the implications on cybersecurity not the most exciting topic but something that's got to be argued out give or take the pluses and minuses all the same anyway. well they're having to touch on and talk about all the elements of the deal of a future relationship with the european union of course and in terms of the vote. currently slated to take place next tuesday on this deal that reason may have struck with the european union both a with drawl agreement the protocol for the exit mechanism of the u.k. from the e.u. and. the sort of broad outline of a future relationship that takes in things like free trade and among other things security and cyber security it's a deal in tremendous trouble at the moment because they don't appear to be anything like the numbers in parliament that she would require to reserve may a majority to get that deal through and formalize as it were brags that there is a massive amount of opposition to the deal in her own party more than one hundred m.p.'s have spoken against it put that together
to our correspondent jonah hall so john i think today they're talking about the implications on cybersecurity not the most exciting topic but something that's got to be argued out give or take the pluses and minuses all the same anyway. well they're having to touch on and talk about all the elements of the deal of a future relationship with the european union of course and in terms of the vote. currently slated to take place next tuesday on this deal that reason may have struck with the...
62
62
Dec 14, 2018
12/18
by
CSPAN2
tv
eye 62
favorite 0
quote 0
so whether it's as a pathway or as a model, yes john law creates risks to cybersecurity and privacy that extend well beyond australia's borders. thank you. [applause] >> thanks so much, sharon. next up, the french philosopher is known for his analysis of the tight link between surveillance and training or discipline. his book, , usually translated n english as discipline into punishment is in french -- which could be equally meant to surveilled and to punish. so very naturally close monitoring is always a key part of training and indoctrination, no surprise children are often closely monitored as we're teaching them that it's perhaps an inevitable part of raising children safely that it also means we need to worry about whether we are training them for compliance. as a technological capability to monitor children ever more closely becomes both a reality and widespread use, i often wonder whether we are preparing children to accept as normal a world in which everything they do is constantly scrutinized. to look at one aspect of that social media service posted on what to invite rachel lev
so whether it's as a pathway or as a model, yes john law creates risks to cybersecurity and privacy that extend well beyond australia's borders. thank you. [applause] >> thanks so much, sharon. next up, the french philosopher is known for his analysis of the tight link between surveillance and training or discipline. his book, , usually translated n english as discipline into punishment is in french -- which could be equally meant to surveilled and to punish. so very naturally close...