99
99
Jun 23, 2017
06/17
by
WRC
tv
eye 99
favorite 0
quote 0
dr. thompson because what he does, he's the best at it. >> dr. thompson has performed more than 1,000 of these surgeries. he hopes to focus more attention on identifying and fixing pfos. something you may want to ask your doctor about if you or someone you know has had a stroke. >> amazing. good story. >>> so rain on the way to work tomorrow, huh? >> rain, rain -- never mind. i was going to say it's -- >> rain rain go away? >> rain, rain go away. we'll be seeing it for a couple of hours. >> we could use the rain. >> we need the rain but it's not going to come during the afternoon. tomorrow will not be a washout. i'm going to rewrite that script. i don't know who wrote this stuff for me. take a look outside. show you what's happening. we have nice conditions. it is warm and humid. temperatures right now 81 degrees. you're walking around. winds out of the south about 7 miles an ur. everybody is in the 70s for the most part, 80s along the water in d.c., along the water in annapolis. to still on the warm side all across the region. no rain in the imme
dr. thompson because what he does, he's the best at it. >> dr. thompson has performed more than 1,000 of these surgeries. he hopes to focus more attention on identifying and fixing pfos. something you may want to ask your doctor about if you or someone you know has had a stroke. >> amazing. good story. >>> so rain on the way to work tomorrow, huh? >> rain, rain -- never mind. i was going to say it's -- >> rain rain go away? >> rain, rain go away. we'll be...
69
69
Jun 20, 2017
06/17
by
CSPAN
tv
eye 69
favorite 0
quote 0
dr. thompson? dr. thompson: this is an interesting attack. we spent a lot of time in our research labs looking at both the code used in wannacry but also where wannacry communicated out to. and there were very, very close similarities to other kinds of attacks that we have seen. specifically attacks that we attribute to a group called lazarus. and these attacks, malware, the reuse of strings in that malware, the reuse of command and control infrastructure out on the internet by that malware led our researchers to believe this is strongly linked to the lazarus group. now similar to my colleague on the end, we're not the intelligence community either. and i agree with those comments that attribution is often difficult. but what we've seen leads us to believe it was a part of this lazarus group. separately the f.b.i. has linked the lazarus group with north korea. and i think chairman lahood, the article that you're referring to from yesterday is another potential evidence point on that as well from the n.s.a. mr. lahood: thank you. dr. neino, we
dr. thompson? dr. thompson: this is an interesting attack. we spent a lot of time in our research labs looking at both the code used in wannacry but also where wannacry communicated out to. and there were very, very close similarities to other kinds of attacks that we have seen. specifically attacks that we attribute to a group called lazarus. and these attacks, malware, the reuse of strings in that malware, the reuse of command and control infrastructure out on the internet by that malware led...
174
174
Jun 19, 2017
06/17
by
CSPAN3
tv
eye 174
favorite 0
quote 0
dr. thompson being ph.d. mathematicians. jerry was here, a member of congress i believe our only mathematician in congress. and mr. nin, 0, congratulations on winning the hacking tournament. i never had a chance to say that before. it's very cool. and general tuhill it's cool that after all of the things you've done combat and diplomacy and first ciso to be up there at carnegie mellon with their buggy races around the park. every university has something that makes it cooler than even place else. and general, i'll start with you. you talked in your long written testimony about hr 1224 co-sponsored here but we expressed a lot of concern about the audit function that nist would be asked to take on. i was fastynated by your points which we didn't raise when we had the hearing here, that it would make it much more difficult for nist to be reviewed as an honest broker, that this would change the perceptions about their current and future roles, have a chilling effect on many of the relationships that nist has in government and de
dr. thompson being ph.d. mathematicians. jerry was here, a member of congress i believe our only mathematician in congress. and mr. nin, 0, congratulations on winning the hacking tournament. i never had a chance to say that before. it's very cool. and general tuhill it's cool that after all of the things you've done combat and diplomacy and first ciso to be up there at carnegie mellon with their buggy races around the park. every university has something that makes it cooler than even place...
93
93
Jun 16, 2017
06/17
by
CSPAN
tv
eye 93
favorite 0
quote 0
dr. thompson? >> thank you. thanks for that question because i think what you're hitting on is probably one of the most important and underinvested areas in cyber security in general this human element cannot be separated from the technology. nauven the security community, we talk about advance persistent threats. and most people when they think about that think about very sophisticated code, malware. but information, what we're seeing is the root of many of these advanced persistent track is the initial way a company got -- or a person got infected. was an individual made in retrospect a bad choice. >> they doan downloaded a file. and we're seeing attackers becoming more socially sophisticated in the way they attack. we're seeing personalize attacks, looking for information on social met working sights for example. so they can create credibility. message. or tax they you're convinced that this is a reasonable thing to do. i think from an entry perspective. i want to give you one data point that i think might be
dr. thompson? >> thank you. thanks for that question because i think what you're hitting on is probably one of the most important and underinvested areas in cyber security in general this human element cannot be separated from the technology. nauven the security community, we talk about advance persistent threats. and most people when they think about that think about very sophisticated code, malware. but information, what we're seeing is the root of many of these advanced persistent...