63
63
Aug 31, 2015
08/15
by
CSPAN2
tv
eye 63
favorite 0
quote 0
the n-kick is also the place where we manage the einstein system. let me say our ability to improve cybersecurity is limited by statutory authorities and we are working with congress to try to get legislation to address that and specifically we believe congress should express the authorize behind the einstein program and eliminating remaining legal obstacles. second, we must incentvise texas incentivise them to share the information in a twhhat provide protection for those who share the indicators and protects privacy. we believe we need a national data breach reporting system instead of the existing patch p patchwork of state laws on the subject. let me turn to aviation security now. much of our homeland security is counterterrorism efforts center around aviation security measures. we are constantly making adjustments to respond to new threats and stay ahead. in response to changes in the threat environment last summer we started requiring enhanced scriping at certain overseas airports -- screening -- and we prioritized the expansion of pre-clearan
the n-kick is also the place where we manage the einstein system. let me say our ability to improve cybersecurity is limited by statutory authorities and we are working with congress to try to get legislation to address that and specifically we believe congress should express the authorize behind the einstein program and eliminating remaining legal obstacles. second, we must incentvise texas incentivise them to share the information in a twhhat provide protection for those who share the...
32
32
Aug 27, 2015
08/15
by
CSPAN2
tv
eye 32
favorite 0
quote 0
first it authorizes einstein program or a sensually the federal intrusion that worked attention protection system known as einstein. what we tried to do this mandate and put it in place. there was a lot of criticism about einstein because of the known threats and we want to get to those things that we don't know about it so we put in place the language and adult i would try to get to that issue of getting to the known. >> but at the end of the day the language was again there because there was a lot was a lot of legal ambiguity on what they could do with respect to another agency information they have their own own wall in place place and how they control their information there was a lot of question about what they could and couldn't share with dhs. from what i understand it's about 50% of the government so that is the real reason behind that to push it forward as fast as possible. the bill also requires a certain best practice and leading practice. this is the term that you will hear a lot after the authentication testing so we try to put those in place and require that agency. and finally this
first it authorizes einstein program or a sensually the federal intrusion that worked attention protection system known as einstein. what we tried to do this mandate and put it in place. there was a lot of criticism about einstein because of the known threats and we want to get to those things that we don't know about it so we put in place the language and adult i would try to get to that issue of getting to the known. >> but at the end of the day the language was again there because...
40
40
Aug 27, 2015
08/15
by
CSPAN2
tv
eye 40
favorite 0
quote 0
we have been working with a renewed sense of urgency to encourage full implementation of the einstein system which is a basic layer of cyberprotection that we had dhs make available to all federal, civilian agencies and departments. we also expand the end check which i'm sure you know stands for the cybersecurity and communication integration center and that is the government's 24/7 hub for information sharing and was on thin cord nation. let me say a little more about that. 13 u.s. departments and agencies and 16 private sector entities have regular dedicated liaisons to the end kick and well over 100 private sector entities collaborate and share information on a routine basis. it shares information on cyberthreats and in demand and provides on-site assistance to victims of cyberattacks and in this year alone it has shared over 16,000 bulletins, alert the morning then responded on-site to 32 incidents, over double the number of on-site responses for the prior year. it is also the place to be managed system. let me say her ability to improve cybersecurity is limited by her current statutory
we have been working with a renewed sense of urgency to encourage full implementation of the einstein system which is a basic layer of cyberprotection that we had dhs make available to all federal, civilian agencies and departments. we also expand the end check which i'm sure you know stands for the cybersecurity and communication integration center and that is the government's 24/7 hub for information sharing and was on thin cord nation. let me say a little more about that. 13 u.s. departments...
76
76
Aug 27, 2015
08/15
by
CSPAN2
tv
eye 76
favorite 0
quote 0
it's also the place we manage the einstein system. let me say that our ability to improve cybersecurity is to limit the statutory authorities. we try to get the legislation to address that and specifically agree congress should expressly authorized program and eliminate any remaining legal obstacles to its deployment across the entire government. we must share cyber ferret indicators - cyber threat indicators in a manner that provides principles and criminal liabilities and the chair of these indicators and also protects privacy. and third we need a national data breach reporting system. what we now turn to aviation security. much of our homeland security counterterrorism efforts continue to center around aviation security. we are constantly making adjustments to respond to new threats and to try to stay ahead of our adversaries. for some of the changes in the threat environment we started requiring enhanced screening of select overseas airports with direct flights to the united states. we've also prioritized the expansion of pre- cle
it's also the place we manage the einstein system. let me say that our ability to improve cybersecurity is to limit the statutory authorities. we try to get the legislation to address that and specifically agree congress should expressly authorized program and eliminate any remaining legal obstacles to its deployment across the entire government. we must share cyber ferret indicators - cyber threat indicators in a manner that provides principles and criminal liabilities and the chair of these...
67
67
Aug 26, 2015
08/15
by
FBC
tv
eye 67
favorite 0
quote 0
system. deirdre: i know you like to point out einstein's definition of insanity when we talk about the fed, right? >> if we were going to quantitative easing 4 or five after the first two or three haven't worked terribly well, we would be with einstein why they're doing same thing over and over and expecting a different result. deirdre: hold bob rice, he will be back in a it about. we want to talk about chinesing. authorities investigating possible stock crimes. some say it's a blame shift for the recent collapse in the shanghai market. senior fellow at the kate stow institute dan mitchell with me now. dan, is this china not wanting to accept responsibility for uncomfortable relationship with free markets and still having a communist system? >> first i have no idea whether there are some traders and financial market people in china did some bad things. let's set that aside as possibility. it doesn't change the fact though that china's government has had too much cronyism, complete lack of transparency, lots of fake stimulus, that make what is obama did trivial by comparison. they haven't been wil
system. deirdre: i know you like to point out einstein's definition of insanity when we talk about the fed, right? >> if we were going to quantitative easing 4 or five after the first two or three haven't worked terribly well, we would be with einstein why they're doing same thing over and over and expecting a different result. deirdre: hold bob rice, he will be back in a it about. we want to talk about chinesing. authorities investigating possible stock crimes. some say it's a blame...
40
40
Aug 6, 2015
08/15
by
CSPAN2
tv
eye 40
favorite 0
quote 0
system. our most recent iteration einstein suite of tools that allows you to block known malicious activity hascoming in. we are rapidly developing technology working with the private sector to be able to detect and block things we've never seen before the data attributes of bad behavior or look risky for a variety of reasons using our large amounts of data and analytics that the private sector helps us to do. so that is that but then that's never going to be perfect. there's no silver bullet. you have to assume they will get into your system. we have this suite of tools working with the private sector, continuous diagnostic and mitigation. tell you on a near real-time continuous basis about the health of your system, if it is configured properly set up to the next phase will tell you who is on your system and the third phase we will tell you what they're doing on your system. and begin those are ways to address both of those but also detection we have to get much faster at detecting because we've got to know that they're going to get through. we've got to be taken quickly. in working with her
system. our most recent iteration einstein suite of tools that allows you to block known malicious activity hascoming in. we are rapidly developing technology working with the private sector to be able to detect and block things we've never seen before the data attributes of bad behavior or look risky for a variety of reasons using our large amounts of data and analytics that the private sector helps us to do. so that is that but then that's never going to be perfect. there's no silver bullet....