70
70
May 20, 2016
05/16
by
CSPAN
tv
eye 70
favorite 0
quote 0
ms. cobert: they will need training, yes, they will. ms. kelly: once the information is collected, a human being will be needed to make a judgment and verify it does belong to the individual in uestion. ms. cobert: we are working to find the processes that will enable us to in fact match individuals. as mr. scott described, there are multiple tony scotts. so we are working through the pilot, and i think this will be an ongoing process to see where are the places we need human intervention? where is the area that technology will help with hat? ms. kelly: mr. evanina, can you speak to the areas that need human beings for data? mr. evanina: this cannot be stated in terms of number one identity resolution, as my colleagues mentioned, the ability to identify bob from -- mr. scott mr. from scott and all that goes with it, the resources that will take to make sure we're firmly in agreement that mr. scott is mr. scott. then if we find out about scott, is it investigatively and adjudicatedly relevant? if it does it will be put in the same box. i wan
ms. cobert: they will need training, yes, they will. ms. kelly: once the information is collected, a human being will be needed to make a judgment and verify it does belong to the individual in uestion. ms. cobert: we are working to find the processes that will enable us to in fact match individuals. as mr. scott described, there are multiple tony scotts. so we are working through the pilot, and i think this will be an ongoing process to see where are the places we need human intervention?...
42
42
May 13, 2016
05/16
by
CSPAN
tv
eye 42
favorite 0
quote 0
ms. cobert, you're recognized for five minutes. . cobert: thank you meadows, -- thank you, chairman meadows and lynch. o.p.m. plays an important role in conducting background investigations for the vast majority of the federal government. currently o.p.m.'s federal vective services annually conducts approximately one million investigations for over 100 federal agencies. approximately 95% of the total background investigations governmentwide. these background investigations include more than 600,000 national security investigations and 400,000 investigations related to suitability, fitness or credentialing each year. as we discussed in february, we are in the process of transitioning to the new national background investigations bureau nbib, which will on sosh fibs. the department of defense with its unique national security perspective will design, build, secure and operate the nbib's investigative i.t. systems in coordination with the nbib. to provide some context for our discussion today, i would like to take a few minutes to review
ms. cobert, you're recognized for five minutes. . cobert: thank you meadows, -- thank you, chairman meadows and lynch. o.p.m. plays an important role in conducting background investigations for the vast majority of the federal government. currently o.p.m.'s federal vective services annually conducts approximately one million investigations for over 100 federal agencies. approximately 95% of the total background investigations governmentwide. these background investigations include more than...
145
145
May 20, 2016
05/16
by
CSPAN
tv
eye 145
favorite 0
quote 0
ms. cobert, you're recognized for five minutes. ms. cobert: thank you meadows, -- thank you, chairman meadows and lynch. o.p.m. plays an important role in conducting background investigations for the vast majority of the federal government. currently o.p.m.'s federal vective services annually conducts approximately one million investigations for over 100 federal agencies. approximately 95% of the total background investigations governmentwide. these background investigations include more than 600,000 national security investigations and 400,000 investigations related to suitability, fitness or credentialing each year. as we discussed in february, we are in the process of transitioning to the new national background investigations bureau nbib, which will on sosh fibs. the department of defense with its unique national security perspective will design, build, secure and operate the nbib's investigative i.t. systems in coordination with the nbib. o provide some context for our discussion today, i would like to take a few minutes to review
ms. cobert, you're recognized for five minutes. ms. cobert: thank you meadows, -- thank you, chairman meadows and lynch. o.p.m. plays an important role in conducting background investigations for the vast majority of the federal government. currently o.p.m.'s federal vective services annually conducts approximately one million investigations for over 100 federal agencies. approximately 95% of the total background investigations governmentwide. these background investigations include more than...
95
95
May 17, 2016
05/16
by
CSPAN3
tv
eye 95
favorite 0
quote 1
ms. cobert, mr. scott, do you want to take a bite at that or are you all set? >> i would just say one of the lessons learned i think worldwide has been that cyber security knows no national boundaries. and concerns about cyber security are, you know, global. physical location is one element, but probably in the case of cyber security not the most dispositive in terms of concerns i would have. it's more about the secure by design sort of notion, you know, what have you put in place and how well is it implemented and so on. so those would be more my primary concerns. >> yeah, my -- >> in some cases the physical location. >> right. my concern is obviously the communist government in vietnam is going to require access. so that was my concern. you've suffered enough. i want to yield back. thank you. >> i thank you. and i want to thank all the witnesses for being here today. and if there's no further business before the subcommittees, the subcommittees stand adjourned. >>> the house oversight committee mee
ms. cobert, mr. scott, do you want to take a bite at that or are you all set? >> i would just say one of the lessons learned i think worldwide has been that cyber security knows no national boundaries. and concerns about cyber security are, you know, global. physical location is one element, but probably in the case of cyber security not the most dispositive in terms of concerns i would have. it's more about the secure by design sort of notion, you know, what have you put in place and how...
51
51
May 13, 2016
05/16
by
CSPAN3
tv
eye 51
favorite 0
quote 0
ms. cobert, mr. scott, do you want to take a bite at that or are you all set? >> i would just say one of the lessons learned i think worldwide has been that cyber security knows no national boundaries. and concerns about cyber security are, you know, global. physical location is one element, but probably in the case of cyber security not the most dispositive in terms of concerns i would have. it's more about the secure by design sort of notion, you know, what have you put in place and how well is it implemented and so on. so those would be more my primary concerns. >> yeah, my -- >> in some cases the physical location. >> right. my concern is obviously the communist government in vietnam is going to require access. so that was my concern. you've suffered enough. i want to yield back. thank you. >> i thank you. and i want to thank all the witnesses for being here today. and if there's no further business before the subcommittees, the subcommittees stand adjourned. >>> the importance of cyber security at medical facilities around the country was the focus of an e
ms. cobert, mr. scott, do you want to take a bite at that or are you all set? >> i would just say one of the lessons learned i think worldwide has been that cyber security knows no national boundaries. and concerns about cyber security are, you know, global. physical location is one element, but probably in the case of cyber security not the most dispositive in terms of concerns i would have. it's more about the secure by design sort of notion, you know, what have you put in place and how...
51
51
May 14, 2016
05/16
by
CSPAN2
tv
eye 51
favorite 0
quote 0
ms. cobert and mr. scott in the time i have i would be derelict among my constituents of that in return for obium security breach and if he can take some time to bring us up today to date. weaknesses identified have been addressed so they can't -- so there can't be a recurrence and how are we coming in trying to make people whole again in terms of the compromise of their personal information? >> let me respond to that. in terms of improving the security of our systems we have made significant strides in our ongoing effort and we will continue to do so working closely with dhs, with dod as part of the nbi bestand that. we have staff from the land be working with us as well as ongoing working sessions. we have installed the latest versions of einstein. we have got a whole series of improvements we have made to our firewalls. we now have the ability. >> einsein iii. not in place now. >> we were one of the first agencies to put in place. >> it was in place at the time. >> no. we continue to put in place a w
ms. cobert and mr. scott in the time i have i would be derelict among my constituents of that in return for obium security breach and if he can take some time to bring us up today to date. weaknesses identified have been addressed so they can't -- so there can't be a recurrence and how are we coming in trying to make people whole again in terms of the compromise of their personal information? >> let me respond to that. in terms of improving the security of our systems we have made...
24
24
May 14, 2016
05/16
by
CSPAN2
tv
eye 24
favorite 0
quote 0
ms. cobert or mr. scott you want to take a bite of that?>> i would say one of the lessons learned i think worldwide has been cybersecurity knows no national boundaries and concerns about cybersecurity our global. physical location is one element that probably in the case of cybersecurity not the most dispositive in terms of concerns i would have. it's more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one? so those would be more my primary concerns. >> my concern is obviously the communist government of vietnam is going to require access. i have -- i will yield back. .. [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] on night on eight eastern on c-span's q&a. >> now, army colonel for inherent result brief reporter on the pentagon on the fight against isis. he confirms that the u.s. did not carry out the strike that killed the top has blood
ms. cobert or mr. scott you want to take a bite of that?>> i would say one of the lessons learned i think worldwide has been cybersecurity knows no national boundaries and concerns about cybersecurity our global. physical location is one element that probably in the case of cybersecurity not the most dispositive in terms of concerns i would have. it's more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one? so those would be more...