135
135
Sep 16, 2016
09/16
by
CNNW
tv
eye 135
favorite 0
quote 0
cyberthreat is a particular concern.eputy director of the nsa told us that russia today has alarming capabilities not just to hack places bick democratic committee but harm the u.s. homeland. >> you're saying it foreign actors have the ability to shut down key infrastructure via cyberattack. >> yeah. >> russia? >> yeah. >> reporter: say it's too lay late and allowed advantage. >> it's coming home to roost right now. because of that failure on our part we're playing catch-up in a large way. >> u.s. intelligence officials tell me they never took their eyes off russia but grant it's difficult to judge intentions, in particular about putin. he has insular decision-making circle and he can make decisions in foreign policy realm they describe as impulsive. jim sciutto, cnn, washington. >> joining us, former deputy assistant attorney general with the justice department. thanks for coming in. why does it appear that obama administration is reluctant to directly respond to the cyberattacks if it's true they believe it's directed
cyberthreat is a particular concern.eputy director of the nsa told us that russia today has alarming capabilities not just to hack places bick democratic committee but harm the u.s. homeland. >> you're saying it foreign actors have the ability to shut down key infrastructure via cyberattack. >> yeah. >> russia? >> yeah. >> reporter: say it's too lay late and allowed advantage. >> it's coming home to roost right now. because of that failure on our part we're...
80
80
Sep 26, 2016
09/16
by
CSPAN
tv
eye 80
favorite 0
quote 0
to share cyberthreat information regarding election equipment and technology with fusion centers. the right to vote is among the most cherished, and integrity of our election process is fundamental to our democracy. we must protect it. with that i urge my colleagues to support 5459, and i yield back the balance of my time. the speaker pro tempore: the gentleman yields back the balance of his time. the gentleman from new york is recognized. mr. donovan: mr. speaker, i yield myself such time as i may consume. the speaker pro tempore: the gentleman is recognized. mr. donovan: mr. speaker, i once again urge my colleagues to support h.r. 5459, and yield back the balance of my time. the speaker pro tempore: the gentleman yields back the balance of his time. the question is will the house suspend the rules and pass the h.r. 5459, as amended. those in favor say aye. those opposed, no. in the opinion of the chair, 2/3 having responded in the affirmative, the rules are suspended, the bill is passed, and without objection the motion to reconsider is laid on the table. for what purpose does t
to share cyberthreat information regarding election equipment and technology with fusion centers. the right to vote is among the most cherished, and integrity of our election process is fundamental to our democracy. we must protect it. with that i urge my colleagues to support 5459, and i yield back the balance of my time. the speaker pro tempore: the gentleman yields back the balance of his time. the gentleman from new york is recognized. mr. donovan: mr. speaker, i yield myself such time as i...
55
55
Sep 21, 2016
09/16
by
CSPAN
tv
eye 55
favorite 0
quote 0
small businesses are at serious risk from a growing number of cyberthreats. now, there's no doubt that the information technology revolution has provided small businesses with new tools and opportunities to compete in the global economy. however, technology changes mean hackers are coming up with more and more sophisticated methods to go after intellectual property, bank accounts, social security numbers and anything else that can be used for financial gain or a competitive edge. in 2015 the average amount stolen from small business bank accounts after a cyberattack was over $32,000, and according to a recent report by verizon enterprise, a shocking 71% of cyberattacks occurred in businesses with fewer than 100 employees. it's absolutely critical to both the economic and national security of this country that our small businesses have all of the necessary cybertools to protect themselves from cyberattacks. small businesses lack the resources to combat cyberattacks. the federal government needs to step up its game when it comes to protecting the cybersecurity
small businesses are at serious risk from a growing number of cyberthreats. now, there's no doubt that the information technology revolution has provided small businesses with new tools and opportunities to compete in the global economy. however, technology changes mean hackers are coming up with more and more sophisticated methods to go after intellectual property, bank accounts, social security numbers and anything else that can be used for financial gain or a competitive edge. in 2015 the...
126
126
Sep 15, 2016
09/16
by
WFTS
tv
eye 126
favorite 0
quote 8
. >> and a new cyberthreat is called virtual kidnapping. >> reporter: in this morning's gma first look. a terrifying new virtual kidnapping. list ton the voice of the professional kidnapper. judy says a man called her cell phone claiming he had her daughter. she asked us to hide her identity. you thought you heard your daughter's voice? >> yeah. she kept saying mom, you have to help me. >> reporter: he gave judy 60 seconds to go to the bank. she ran to her neighbor's house. >> she was shaking and out of and the so-called kidnapper never called back. >> even now that i know it is a hoax, i don't think it's funny. >> reporter: coming up at 7:00 a.m., we'll tell you how to protect yourself from becoming z23yez zy6z >>> welcome back. it's 6:24. we're taking action for you. several companies are looking to hire thousands of new employees ahead of the busy holiday shopping season. u.p.s. announced they need 95,000 seasonal workers. toys r us are looking for holiday help taking online applications. target will add about 70,000 employees. >>> this morning, still no official recall for the sams
. >> and a new cyberthreat is called virtual kidnapping. >> reporter: in this morning's gma first look. a terrifying new virtual kidnapping. list ton the voice of the professional kidnapper. judy says a man called her cell phone claiming he had her daughter. she asked us to hide her identity. you thought you heard your daughter's voice? >> yeah. she kept saying mom, you have to help me. >> reporter: he gave judy 60 seconds to go to the bank. she ran to her neighbor's...
153
153
Sep 5, 2016
09/16
by
KNTV
tv
eye 153
favorite 0
quote 0
the cyberthreat continues to evolve at a rapped rate. at such a rate it's difficult for law enforcement to respond. >> this is a much bigger thing than people realize. >> reporter: devin math its believes that the state ignored much of the activity like this in the past thus allowing thieves to steal from victims with little recourse. a state audit found thousands of cases where the same benefit were paid to ten people using the same social security number. >> at what point do you see ten people using the same social security. >> reporter: the secret service office says using the same social security number is a red flag. just in the last five years the agency has investigated 300 cases totaling $27 million in potential stolen money in the bay area alone. >> the victim are the number one priority. >> reporter: the special agent in charge understands the frustration that the victims go through. his own personal bank account has been compromised. >> we try to help the people as much as we can. >> reporter: after a lifetime of saving every
the cyberthreat continues to evolve at a rapped rate. at such a rate it's difficult for law enforcement to respond. >> this is a much bigger thing than people realize. >> reporter: devin math its believes that the state ignored much of the activity like this in the past thus allowing thieves to steal from victims with little recourse. a state audit found thousands of cases where the same benefit were paid to ten people using the same social security number. >> at what point do...
194
194
Sep 16, 2016
09/16
by
KPIX
tv
eye 194
favorite 0
quote 0
. >> the total amount of cyberthreat risk, it's like projected to be above 10 trillion in the next couple reporter: 10 trillion? >> yeah. >> reporter: larsen is technical director at crowd strike. >> crowd strike falcon deploys in seconds. >> reporter: his company investigated the attack on the dnc's network and found a sophisticated code they believe points to russian intelligence agencies because of how the code was behaving. >> they did a lot of checking to see if a security product was checking it. >> they were always looking over their shoulder. >> they were always looking over their shoulder. time to develop a little piece of code like that, it had to be a well-funded professional full-time hacking organization. >> reporter: larsen said those hackers, known as fancy bear and cozy bear, used a classic technique, spearfishing to gain access to dnc computers. >> six seconds, he's in. >> yep. that's all it takes. >> reporter: he showed us how it worked. on a computer under attack from an actual hacker. a victim receives an e-mail that looks legitimate but actually contains links to a we
. >> the total amount of cyberthreat risk, it's like projected to be above 10 trillion in the next couple reporter: 10 trillion? >> yeah. >> reporter: larsen is technical director at crowd strike. >> crowd strike falcon deploys in seconds. >> reporter: his company investigated the attack on the dnc's network and found a sophisticated code they believe points to russian intelligence agencies because of how the code was behaving. >> they did a lot of checking...
135
135
Sep 11, 2016
09/16
by
WEWS
tv
eye 135
favorite 0
quote 1
. >> our home sland facing new cyberthreats including from russia. i wanted to ask about that. there's a rising chorus in congress saying the administration should publicly blame russia for hacking the dnc system, hold them accountable. here's ben sass. he said the owe what administration has a reason for not clearly attributing these they feel that failing co-call out russia now will invite future attacks. >> well, george, the -- there's still an investigation around the dnc hacks. the message i've been sending to state and local e election officials is that there's a range of that are sophisticated. we have to do our best to protect our election system. our election process. and dhs, my department, is in position to provide assistance if they ask for it. we're having that conversation with state and local authorities now. the question of attribution is a complicated one. >> are we in danger of having a foreign power influence or alter or vote? >> we're concerned about the potential for someone to try to penetrate our election systems to the extent that they're online on the i
. >> our home sland facing new cyberthreats including from russia. i wanted to ask about that. there's a rising chorus in congress saying the administration should publicly blame russia for hacking the dnc system, hold them accountable. here's ben sass. he said the owe what administration has a reason for not clearly attributing these they feel that failing co-call out russia now will invite future attacks. >> well, george, the -- there's still an investigation around the dnc hacks....
197
197
Sep 17, 2016
09/16
by
CNNW
tv
eye 197
favorite 0
quote 3
russia's cyberthreat is of particular kerr.of the nsa tolds that you russia has alarming capability. not just to hack but to harm the u.s. homeland, via cyber attack. >> so, you're saying today that foreign actors already have it's capability of shutting down infrastructure? >> yes. >> via cyber attack? >> yes. >> russia? >> yeah. >> reporter: some say the focus is late and has allowed moscow to gain advantage. >> to properly resource our intelligence agencies vis-a-vis the russian problem is coming home to roost right now. and because of that failure on our part, we're playing catch-up in a very large way. >> u.s. intelligence officials tell me that they never took their eyes off of russia, but they grant it is very difficult to judge russia's intentions, in particular with president putin. they say he has an insular circle and that he can in their view make decisions about foreign policy well as they describe impulsive. jim sciutto, cnn, washington. >> next, we'll get insight into putin and russia at large with a possible col
russia's cyberthreat is of particular kerr.of the nsa tolds that you russia has alarming capability. not just to hack but to harm the u.s. homeland, via cyber attack. >> so, you're saying today that foreign actors already have it's capability of shutting down infrastructure? >> yes. >> via cyber attack? >> yes. >> russia? >> yeah. >> reporter: some say the focus is late and has allowed moscow to gain advantage. >> to properly resource our...
40
40
Sep 11, 2016
09/16
by
KCRG
tv
eye 40
favorite 0
quote 0
that's what we loo >> our homeland is facing new cyberthreats including from russia. i wanted to ask about that. there's a rising chorus in congress saying the administration should publicly blame russia for hacking the dnc e-mail system, hold them accountable for trying to influence our elections. here's ben sass. a nebraska republican. he said the obama administration has a reason for not clearly attributing these hacks to russia, it contradicts their own cyberstrategy. would invite response, that suggests that we're op rate issing from a position of weakness. they feel that failing to call out russia now will invite future attacks. >> well, george, the -- there's still an investigation around the dnc hacks. the message i've been sending to state and local election officials is that there's a range of cyberactors out there that are pretty sophisticated right now. not just nation state. but criminal hackers. a activists. we have to do our best to protect our election system. our election process. and dhs, my department, is in position to provide assistance if they as
that's what we loo >> our homeland is facing new cyberthreats including from russia. i wanted to ask about that. there's a rising chorus in congress saying the administration should publicly blame russia for hacking the dnc e-mail system, hold them accountable for trying to influence our elections. here's ben sass. a nebraska republican. he said the obama administration has a reason for not clearly attributing these hacks to russia, it contradicts their own cyberstrategy. would invite...
61
61
Sep 5, 2016
09/16
by
CSPAN2
tv
eye 61
favorite 0
quote 0
we have cyberthreats and so forth, and they don't look like what we normally think of as crime because sometimes these are threats that can cause death or destruction on a scale that historically is associated with the use of military force by states. but they don't look like war, either. and if you decide that you're going to -- the problem is, one way to put it would be to say we have a world in which there are threats along the whole continuum, from the traditional state on state armed conflict at one end of the continuum. at the other other end we have stuff that looks like individual crime. a guy drives a truck through a crowded nice. so we have threats that are along this continuum with a big area in between, traditional crime and war put we have a legal system that doesn't allow for in betweenness. a legal system that says pick one. either it's war, in the case you get this set of rules, or it's not war in which case you get a totally different set of rules that are some ways diametrically the opposite. we decide -- we don't know how anymore to decide. does the terrorist -- what
we have cyberthreats and so forth, and they don't look like what we normally think of as crime because sometimes these are threats that can cause death or destruction on a scale that historically is associated with the use of military force by states. but they don't look like war, either. and if you decide that you're going to -- the problem is, one way to put it would be to say we have a world in which there are threats along the whole continuum, from the traditional state on state armed...
52
52
Sep 21, 2016
09/16
by
CSPAN2
tv
eye 52
favorite 0
quote 0
the big challenge as we look at command and control in the united states will be the cyberthreat whichwill be much different than when we created the current. >> should cybercommand be elevated to a separate command? >> yes, i believe it's time to elevate it to a separate command. >> thank you, chairman and thank you, general, for your service to our country. i want to follow up to the answers on your advanced policy questions. what are the most serious strategic threats facing the united states today. and among your answers you mentioned the increasingly provocative and destabilizing behavior by potential adversaries like iran. what i wanted to ask you is why do you believe there's significant concern about the adversary of iran which they have done quite aggressively, even post jcp q away. >> senators, he provided part of the answer when you started talking about ballistic missile program. i think there's three elements that concern me about iran in the last year.nc number one is they continue to be the foremost state sponsor of terrorism in the world.e that should be enough to cause
the big challenge as we look at command and control in the united states will be the cyberthreat whichwill be much different than when we created the current. >> should cybercommand be elevated to a separate command? >> yes, i believe it's time to elevate it to a separate command. >> thank you, chairman and thank you, general, for your service to our country. i want to follow up to the answers on your advanced policy questions. what are the most serious strategic threats...
184
184
Sep 15, 2016
09/16
by
WNCN
tv
eye 184
favorite 0
quote 7
. >>> you're looking at a real-time map of cyberthreats around the world. the map tracks suspicious activity going on right now. you can see how it spans the globe from china to the united recent cyberattacks on general colin powell, the dnc and state election systems are intensifying concerns about vulnerabilities in the u.s. computer networks. last night, russian hackers released another batch of olympians' medical records stolen from the anti-doping agency. information on ten american athletes was included in this batch. michelle miller is outside of minneapolis with the fight to protect your personal data. good morning, michelle. >> reporter: good morning. servers like and other sensitive information that is collected by businesses and government agencies. that makes them prime targets for hackers. one security expert told us that cybercrime is now lucrative than the elicit drug trade. >> old model of trying to rely on anti-virus and fire walls. the bad guys are running circles around that stuff. >> reporter: dan larson is in a >> the title amount of cy
. >>> you're looking at a real-time map of cyberthreats around the world. the map tracks suspicious activity going on right now. you can see how it spans the globe from china to the united recent cyberattacks on general colin powell, the dnc and state election systems are intensifying concerns about vulnerabilities in the u.s. computer networks. last night, russian hackers released another batch of olympians' medical records stolen from the anti-doping agency. information on ten...
84
84
Sep 15, 2016
09/16
by
WMUR
tv
eye 84
favorite 0
quote 6
>>> first that alert about a cyberthreat called virtual kidnapping. crips claiming they've kidnapped your kids and demanding money. abc's abbie boudreau has one mom's frightening story. >> you want me to hang up on you? that's what you want? >> reporter: this is the voice of a man would calls himself a professional kidnapper. >> are you in your car? >> yes. >> honk your horn. iowa tonight listen to your horn. >> reporter: he says he kidnapped this woman's daughter and wants only one thing. >> you know what kidnappers wa >> reporter: judy asked us to hide her identity to protect her family. she says a man called her cell phone first claiming he had her daughter. you thought you heard your daughter's voice. >> she kept saying, mom, you got to help me and do what they say. they're going to hurt me. i'm, you know, i -- i'm scared. i need your help. >> reporter: then he gave judy only 60 seconds to get in her car and drive to the bank. scam called virtual kidnapping. >> i heard my daughter crying. he said you want me to cut off her fingers and send them to
>>> first that alert about a cyberthreat called virtual kidnapping. crips claiming they've kidnapped your kids and demanding money. abc's abbie boudreau has one mom's frightening story. >> you want me to hang up on you? that's what you want? >> reporter: this is the voice of a man would calls himself a professional kidnapper. >> are you in your car? >> yes. >> honk your horn. iowa tonight listen to your horn. >> reporter: he says he kidnapped this...
46
46
Sep 15, 2016
09/16
by
CSPAN3
tv
eye 46
favorite 0
quote 0
instead of deal with a vacancy on the supreme koufrt of the united states and foreign cyberthreats toour upcoming election, both issues which if unaddressed threaten the foundations of our constitutional democracy, we are here relitigating a complex and important issue, but which the senate has already reviewed in great depth. we are here today to have a hearing about the transition of the functions to a multistate holding. they've also had two full hearings on this topic in this congress. stewardship of the internet assigned numbers authority relates to the technical coordination. and under its current contract with the internet corporation for assigned numbers and names, or icann, they verifies that establishes policies and procedures are verified when icann processes changes. once it's formed that verification, ntia authorizes the implementation. the transition about which this hearing centrally is concerned would remove ntia's intered myiary in this essentially clerical process allowing the process to be completed more quickly. it is not, as many or some have suggested, the united
instead of deal with a vacancy on the supreme koufrt of the united states and foreign cyberthreats toour upcoming election, both issues which if unaddressed threaten the foundations of our constitutional democracy, we are here relitigating a complex and important issue, but which the senate has already reviewed in great depth. we are here today to have a hearing about the transition of the functions to a multistate holding. they've also had two full hearings on this topic in this congress....
53
53
Sep 19, 2016
09/16
by
CSPAN3
tv
eye 53
favorite 0
quote 0
emp, aging infrastructure, cyberthreats, kinetic attacks and growing infrastructure interdependencies. they are in our laws and orders designed to protect our citizens and economies from those from malevolent intent and from natural disaster. challenges like these underscore the need to rethink energy security in light of modern, domestic and global energy markets, the subject of this hearing. in june 2014, the g7 and the eu endorsed a set of seven modern energy security principles. these principles are premised on the recognition of energy security as a collective responsibility among allies and friends. the first two principles deal with market structures, flexible, transparent and competitive energy markets. diversification of fuels and sources and routes, including indigenous sources. the next three highlight the transition to a low carbon economy through clean energy and efficiency, innovation and deployment as key to enduring energy security. and the last two principles deal with the need for energy infrastructure resilience and effective response to disruptions of all types, in
emp, aging infrastructure, cyberthreats, kinetic attacks and growing infrastructure interdependencies. they are in our laws and orders designed to protect our citizens and economies from those from malevolent intent and from natural disaster. challenges like these underscore the need to rethink energy security in light of modern, domestic and global energy markets, the subject of this hearing. in june 2014, the g7 and the eu endorsed a set of seven modern energy security principles. these...
239
239
Sep 23, 2016
09/16
by
CNBC
tv
eye 239
favorite 0
quote 0
and faa advisory panel recommending action to prevent cyberthreats to planes in the air as well as on the ground. and minneapolis fed president neel kashkari speaking today saying he's more worried about raising rates too fast than too slow. we begin with politics. the countdown is on in three hours -- three days and seven hours or thereabouts. hillary clinton and donald trump go head to head in the first president ideal debate out at hofstra university. what happens on the stage there could have a profound impact not only on the election, but on your money. aymeamon javers with the rhetor we should expect to hear from both. >> so much to watch for in this showdown on monday evening, including whether or not the two candidates single out any particular companies by name for criticism. something we have seen out on the campaign trail, all through the year. this can really be clenched teeth time for ceos of american companies as they watch it debate and wait to see whether they are dinged by the candidates, both donald trump and hillary clinton have singled out particular companies. tru
and faa advisory panel recommending action to prevent cyberthreats to planes in the air as well as on the ground. and minneapolis fed president neel kashkari speaking today saying he's more worried about raising rates too fast than too slow. we begin with politics. the countdown is on in three hours -- three days and seven hours or thereabouts. hillary clinton and donald trump go head to head in the first president ideal debate out at hofstra university. what happens on the stage there could...
37
37
Sep 30, 2016
09/16
by
CSPAN3
tv
eye 37
favorite 0
quote 0
but just as horses and bayonets are not the tools of modern warfare, the cyberthreats we face today are not especially well guarded by these prohibitions. moreover, these policies can create artificial constraints that make it tough for broadcasters to access funding on a global scale. this is not right, and it's not fair. so today we update our policies by extending to broadcast licensees the same streamlined rules and procedures applicable to common carrier licensees under the law. we clarify our rules on foreign investment across the board. and we also improve our method for counting foreign ownership in both common carriers and broadcasters. these actions remove barriers for investment and provide clarity for broadcasters seeking support for new technologies and new ways to reach the communities they serve. this effort has my full support. >> thank you, commissioner. commissioner pie? >> four years ago i called for the fcc to relax restrictions. at the time, i said this could give broadcasters greater access to capital and the commission's rules with respect to foreign investment di
but just as horses and bayonets are not the tools of modern warfare, the cyberthreats we face today are not especially well guarded by these prohibitions. moreover, these policies can create artificial constraints that make it tough for broadcasters to access funding on a global scale. this is not right, and it's not fair. so today we update our policies by extending to broadcast licensees the same streamlined rules and procedures applicable to common carrier licensees under the law. we clarify...
55
55
Sep 21, 2016
09/16
by
CSPAN3
tv
eye 55
favorite 0
quote 0
the big challenge as we look at command and control in the united states will be the cyberthreat which will be much different than when we created the current. >> should cybercommand be elevated to a separate command? >> yes, i believe it's time to elevate it to a separate command. >> thank you, chairman and thank you, general, for your service to our country. i want to follow up to the answers on your advanced policy questions. what are the most serious strategic threats facing the united states today. and among your answers you mentioned the increasingly provocative and destabilizing behavior by potential adversaries like iran. what i wanted to ask you is why do you believe there's significant concern about the adversary of iran and the impact of the pursuit of their ballistic missile program which they've done quite aggressively even post-jcpoa. >> so i think you answered -- you provided part of the answer when you started talking about the ballistic missile program. there's three elements that concern me about iran in the last year. element one, they continue to be the foremost sta
the big challenge as we look at command and control in the united states will be the cyberthreat which will be much different than when we created the current. >> should cybercommand be elevated to a separate command? >> yes, i believe it's time to elevate it to a separate command. >> thank you, chairman and thank you, general, for your service to our country. i want to follow up to the answers on your advanced policy questions. what are the most serious strategic threats...
44
44
Sep 23, 2016
09/16
by
CSPAN3
tv
eye 44
favorite 0
quote 0
there legislative authorities that are needed to address the specific aspects of countering the cyberthreats to our country. >> i don't know it's a matter of legislative authority. i think those authorities are there, and i think we are making some progress. a couple of areas that have already been mentioned, and i think were not fully exploiting. one is colonel price is absolutely correct. there's an extraordinary trove of documents produced by al qaeda, produced by isil, which i don't know why they're classified. i don't see that it's our responsibility to maintain our enemy's, protect their secrets. these would be better served in the public domain because i think they would -- they would be really indestructive. i would -- instructive. i would make those available. another underutilized source is we have some of these people coming back from this experience. we do have -- they can be utilized more. i know our tendency is, and it's understandable, this is a nation of law, to say, well, we'll lock them up and put them away and forget them. that's fine, but that is an underutilized resource
there legislative authorities that are needed to address the specific aspects of countering the cyberthreats to our country. >> i don't know it's a matter of legislative authority. i think those authorities are there, and i think we are making some progress. a couple of areas that have already been mentioned, and i think were not fully exploiting. one is colonel price is absolutely correct. there's an extraordinary trove of documents produced by al qaeda, produced by isil, which i don't...
44
44
Sep 7, 2016
09/16
by
CSPAN2
tv
eye 44
favorite 0
quote 0
industry and the cyberthreat landscape.nice job on the deadbeat or direct your at the technologies program, and also worked with u.s. industry and an expert on cybersecurity and technology innovation. and robert manning at the atlantic council comes from dni state departments, policy planning office and regional issues. so with that, let's dive into the conversation. i'll conversation. all welcomed the panel is to come up and we can begin the discussion. i thought we would begin today first i talking about very briefly before a main pillars chinese cyberstrategy and i take you to use the opportunity to dive into each of these pillars looking at economic and industrial motivation for chinese cyberoperations as well as the geopolitical or policy mentions, and domestic information control. these are all overlapping a very important pillars of the way the chinese leadership and cyberstrategy. so i wanted to first begin with a topic that is timely as ambassador huntsman mentioned was coming up on the one-year anniversary after t
industry and the cyberthreat landscape.nice job on the deadbeat or direct your at the technologies program, and also worked with u.s. industry and an expert on cybersecurity and technology innovation. and robert manning at the atlantic council comes from dni state departments, policy planning office and regional issues. so with that, let's dive into the conversation. i'll conversation. all welcomed the panel is to come up and we can begin the discussion. i thought we would begin today first i...