comparemela.com

What is it . Rep. Hurd it is called the modernizing Government Technology act, or mgt. What it does is quite simple. If a chief Information Officer in the title government saves money by doing Something Like transitioning to the cloud, they saveble to use what they for up to three years in a working capital fund. Why is that important . The federal government why is that of . Why is that important . What the federal government spends on goods and services is outdated legacy systems. That is outrageous. We need to be using our dollars wiser. Cioing able to have the have the authority to introduce new technology, a widget on the widget on the a proverbial two guys in a garage, defendll help the cio our Digital Infrastructure, and this will make our agencies more efficient. Peter is it possible to standardize how the government urges his Information Technology . Purchases Information Technology . Rep. Hurd we should be thinking about outcomes. We should be giving the authority to the cios. The problem with the federal government, the person who assigns the service is not the person using the service, and that creates a disconnect, and thats why you have procurement officers that dont have experience in the technology they are trying to hurt us, chase, and that will create problems. The cio does not work directly to the Deputy Agency had. That does not fly in the private sector. The private sector ceos recognized that your i. T. Group is not just a cost center, it is an agency that can drive interbank drive innovation and improve your bottom line. We need the federal government to start thinking that way. These are basic things that smart people are trying to bring to the federal government that ensure that we have the federal government being innovative in how they defend our Digital Infrastructure and how they provide services. Passed theas house. What is the push back in the senate . Rep. Hurd the senate takes its time, and i am sure we will get this piece of legislation the senate through the senate. We have a deal with a cbo score. Last year when we tried to get this done, we did not have those same problems. I feel confident. I feel like this is some nvidia illustration is interested in seeing something the administration is interested in seeing happen. This is something industry is interested in seeing happen. This is an example of a simple piece of legislation that is going to have tectonic impact on how the federal government is able to provide services. Peter joining our conversation is tim starks, Cyber Security correspondent for politico. Tim some objections have been voiced. Talked to those panels, or have you heard from those sponsors on the senate side about trying to alleviate concerns they still have . Rep. Hurd we have talked to both, and we have talked to our senate sponsors. We are trying to get ron johnsons committee to mark this up fairly soon. We are going to be having conversations over the next several weeks about that topic. Some of the concerns that Senate Appropriators are bringing to the floor, some of the same concerns that we talked through before we even introduced the current form of the legislation. Somethinghink this is that we will get through, some of these concerns. There might need to be a tweak word two here. I think we can get this done. When i was an undercover officer in the cia, chasing terrorists in back alleys, i was thinking about running for congress. I keep your pyramid i. T. Procurement was not one of the issues i was thinking about. Thati got here, i realized when you change the way the federal government operates, you change outcomes, and this is the kind of change we need to see. Not many things pass the house withis significance support of the majority leader, the minority whip, and this is something that i think will give the right momentum and incentive and bring this across the finish line and onto the president s desk. There is another Information Technology law that you paid close attention to, called you have held a number of hearings on how agencies are doing and implement some of these reforms, even ones recently where some of the agencies saw a downward turn and mark your democratic colleagues said this could be a tribute to the trump administrations policies and approach to hiring i. T. Officials. How do you think agencies are doing overall . Are they taking a downturn . Things we one of the score, and we score four or five different symbols. Store datawe consolidation. Not every agency needs to run its own data center. Many of them have dozens, if not hundreds. We have tried to force the consolidation of these data centers or move into the cloud. The federal government operates under a cloud first policy. Some of the pushback that we got from the agency was that just consolidating data centers was not indicative of of some of the changes that they made, so they account take into optimization, and thats basically how much of the service are they using at a certain time. Are they using it the best of their capability . They said, sure, if thats what you think is more fair. Cap the greatest optimization, half is whether you consolidate the datacenter or not. When we did this, most stores with down, except for two. That is one of the issues that caused these pressures. We made the change based on the input from these agencies. I think it is about half of the agencies that dont have a permanent cio. This is a problem and something that needs to be rectified. Getting a federal cio i think it is a high priority, because the role that person plays. But this is a problem that has existed for multiple administrations, and you cant just point to one as being a problem. I want to talk to you about broader Cyber Security issues. We saw the big outbreak of the ransomware where peoples computers were essentially held hostage by cyber attackers. We are now seeing a new kind of attack that is surfacing in the news. What is going on . Is this the wave of the future . How do we combat this in any way, shape, or form . The wannacry, before it really hit the u. K. And much of broader europe, months before that, you saw a number of hospitals in california dealing with this issue of ransomware. I think you saw hospitals across theiruntry reviewing digital hygiene and what they needed to do. I think thats why you did not have the impact in the United States that some expected. But yes, the number of attacks that are Digital Infrastructure thenly going to increase more interconnected our economy and society gets. The number of connected devices that we are going to see in a is a number so big, it is mindboggling. We have to be prepared to think about Cyber Security, and we also need to make sure that the federal government and the private sector are actually working together to defend our Digital Infrastructure. It is everything from following good cyber hygiene. Youve got to be sure you patch your software. Youve got to have a strong password which is over 14 and mosts, importantly, employees and individuals cant click on stuffing emails that comes from someone who is not in your address book. These are some of the basics and deal with kind of 80 of the problems we see. When it comes to what you call apt, anddustry an advanced persistent threat, these are the smartest folks. Weve got to be working and sharing information between the federal government and the private sector. Peter congressman, the attack on opm a wild back, how sophisticated was that . Rep. Hurd the opm hack actually was not very sophisticated. In the Cyber Security industry, you have something called a zero day attack. A zero day is something that has never been seen before. It is something that takes advantage of a vulnerability that is not known. When it came to opm, the attackers used existing vulnerabilities that have been known to the Cyber Security community and Broader Community for some time. They were able to use that to escalate the privileges once they got onto a network, which allowed them to rummage through the system. The fact that most americans know what opm is is an indication of how Cyber Security is coming to the forefront of folks minds. I represent a big part of south and west texas, 820 miles of the border. I have done 400 events in the past two plus years. I always get a question about Cyber Security. This is something that most americans are concerned about, especially as we become more interconnected. Tim one of the ways in which americans are getting more of a taste of Cyber Security over the past year was what happened with the election. Re was a conclusion that russians attacked some of these targets. I want to get your impression of what could be done to secure the elections as far as the infrastructure itself, and if there are things that are not being done visavis responding to russia . Rep. Hurd months before the elections, i was calling for, at a minimum, the Russian Ambassador to the kicked out of the country. I thought that was a minimum attempts to manipulate our elections. Russianery clear that intelligence was trying to influence our elections, but they did not manipulate any of the vote tabulation machines. After the election, my Committee Held a hearing looking at the threat to our vote tallying machines. It is hard to, in mass, 0s. Ulate the 1s and this is something we should be focused on. They should be reaching out to the department of Homeland Security for additional resources, if they need that. There are some states that have systems that are votech letting machines that are too old and should be out of service. We need to find a way to figure out how to replace that. I think that will be additional money. We saw that after the 2000 election, where some of the Funds Available for the state to access this kind of information. Again, this is an example of the hack that was used to get into the Democratic National committee and the Democratic Congressional campaign committee. It was not a sophisticated hack. They were able to get access because somebody clicked on the wrong information. The question is, what should the response have been at that time . We have a number of folks my former colleagues in the cia and nsa that are chasing terrorists, and kept our country safe for ,he last 16 years since 9 11 and we know how to do counterterrorism. But what is our National Strategy when it comes to counter covert influence . A covert influence or covert Action Campaign . This is something we need to think about not just with the government, but the broader society, because russians are coming again. They have been trying to use asymmetrical warfare. They have been using asymmetrical warfare for the last couple of decades in eastern europe. They tried to use it in our last election. We have to be prepared for 2018 when i think they are going to try to do it again. How do we harden our infrastructure, but also how do we counter this covert influence . These are the conversations we should be having about this threat and how to deal with it in the future. To be clear, when you were talking about additional funds for making Voting Machines savor, were you thinking of federal funds, or do you have an idea of how much this should cost . Reporter rep. Hurd rep. Hurd i am not clear on the amount that was allocated back in 2000, but there is an existing program that would ultimately appropriate. The conversations are going on about being the time to do that again. About 90n you talk billion being spent by the federal government on Information Technology, does that include Cyber Security . Rep. Hurd it does, and thats a big number. I think that money should be spent more efficiently. One of the frustrations i have is that some of the things we need to be doing are not difficult. It was up until last year that agencies were not using twofactor authentication to get access to sensitive parts of their network. That is a basic thing that people should be following. Something simple like knowing all the software that is on your network. The federal government, when you buy software, you buy a certain number of licenses. If you dont know how many of those licenses are being used, if you are using less than you are paying for, you are wasting money, and if you dont know what software is being used, you cant keep that patched. To theot vulnerable latest attacks. These are some of the basic things that require leadership. A lot of the problems of Cyber Security are not technical challenges. It is making sure we have the right leadership in place in order to have the discipline to see the organization do things like basic digital hygiene. A resistancere from agencies to changing how they use software . Rep. Hurd absolutely. One of the things we saw with fatara is we are trying to give the cios authority over everything on their network. As a member of the oversight committee, if i am going to shine my flashlight on problems and i want to hold someone accountable, they need to have the authority to do everything they need to do. Cios were not having Clear Authority over everything they were able to purchase to defend the network. We want to push that power to the chief Information Officers. They were starting to get friction from cfos within the agency. What did we do . When we started doing hearings, cfo toght the cio and answer questions together. There is always going to be an inertia in the culture of some of these big agencies, and thats why congress is so important, to continue to shine a light on that and put pressure and let them know that we will continue to follow these issues. Tim congressman, one of the causes you have advocated for to improve several security expertise is the creation of Something Like a Cyber National guard. I want you to talk about it that is helpful. Also, have you finalized the mechanics of it . Rep. Hurd thanks for asking. Here is the problem. The federal government is never going to be able to compete with talent in the private sector. We need to recognize that and accept that. The idea of a Cyber National guard is this. Since you were in high school and you wanted to go to college and study something around Cyber Security, we are going to find you scholarships to go to college. You graduate, you have to work in the federal government, not nsa or dod, but in the department of interior, or at the census bureau, and you are going to do that for the same amount of time that you got the scholarship for. When you finish that time and federal service and go work in the private sector, the private sector is going to loan you back to the government for the proverbial one weekend a month 10 days a quarter where this will of truth the crop optimization ideas between the public and private sector. State, in 2015me there were 42,000 computing jobs that went unfilled. The average salary was 89,000. That year, texas only produced 2100 oversight is. You dont 2100 computer scientists. You dont have to be a map nature to figure out the problem. Jobs e about 50,000 excuse me, i think it is to jobs that are,000 unfilled within the i. T. Space across the federal government. We have to make sure we are focused on growing people into those jobs. Our sons ande need daughters and nieces and nephews to go into this industry, because that is what is going to protect us in the future, and weve got to make sure they are prepared for jobs that dont exist today. Tim do you have a timetable for that . Rep. Hurd we are working on starting to put pencil to paper. I dont have an exact time frame, but trust me, tim, you will be one of the first to know. Peter you talked about moving the government to the cloud. Jury e extra should extra Security Issues with that . Rep. Hurd when you talk to folks resisting, they think there is. They think they can do a better job of defending a database than someone who does this every second of the day. This is why we have a cloudstrategy within the federal government, and we should be transitioning into the cloud. Some people act like the cloud is new technology. It is not. This is something where it can save us money and also in security. The federal government is always going to have a role in defending infrastructure, whether it is a server somewhere working on the cloud, and that is where we should ease spending our time, not being resistant to an innovation like the cloud. Did you find it helpful during the Obama Administration to have a enteral cio in place . Rep. Hurd absolutely. I think tony stott did a great job. This is a nonpartisan issue. We worked very closely with tony scott. I am sure we will work closely with the new cio. This is a topic that is very important. Administration came in on the transition team, they weretalking about why cios not reporting directly to agency heads, why some agencies had. Issue of why some agencies had 14 people. This issue is something that is important for this administration as well. Of the few pieces of Cyber Security legislation that congress has the Cyber Security of the nation sharing act information sharing act from 2015. You have talked recently about shortcomings with information sharing. How do you fix those . Rep. Hurd the way you fix those is make sure what the private sector is needing and helping to defend the infrastructure. We also have to understand the talent that we have in the private sector that the federal government could be leveraging. I always say in the Financial Services industry, those folks know where the next level of malware is going to be coming take thosets assumptions and turn those into collection priorities. We need to get information on what the hackers are up to and get that back in the hands of our American Companies to defend the elves, to defend themselves and all of our information. We are able to start having this conversation, the fact that the department of Homeland Security has been established as the bellybutton thenteraction between government and private sector, are all important, and that weve got to stay focused on proving that relationship and getting the right information in the right hands. When you do that, you are going to keep bad guys on the run and away from our system. Prior to starting this interview, mr. Starks and i were chatting, and i was picking his brain. Besides yourself, he named some speed onbers up to this issue, and they were all younger members. To the older members understand these issues . Ep. Hurd they do Kevin Mccarthy is running an innovation initiative. I think he has been the key to getting a lot of these uses of legislation off the house for because he understands it. Steve scalise is doing well. A Computer Science background as well. He understands these issues. Look, our information gets stale, and i would say most of our colleagues recognize the importance of Cyber Security and the need to be focused on this. I think thats why a lot of them take the time to try to understand these complicated issues. Will hurd is the chair of the oversight and reform subcommittee on Information Technology. Thank you for your time. Rep. Hurd thank you. Peter tim starks, what did you learn . Tim he is someone i have heard talk about these issues a fair amount. I expected some of these answers. Peter is he a go to person about some of the a go to person for whom to talk to you about how congress is doing . Tim he is. He is advanced on all these issues, but as we were discussing, some of them are newer members. Congressman ted lieus second term. Peter california . Tim yes. And he has given his background. He is always going to have something thoughtful to say. Peter are these bipartisan issues . Most part, although one of the things we are seeing as a result of the controversies over the alleged russian hacking of the election, is that people are throwing these issues at each other a little harder than they might have in the past. There have been democrats writing pointed letters about trumps own Cyber Security on at maralago. It has gotten maybe a little more partisan, but if you go withto several years ago senators lieberman and collins, there was a debate over regulation versus nonregulation. We have seen this as the way to do it, keep it regulation free, but i do wonder if there are more major attacks, you might see more calls for regulation and it becomes more partisan. The pushback you have been hearing about the modernizing Government Technology act . Tim it still has a price tag attached. The earlier version of the bill authorized something in the sorry,f 30 billion 3 billion, and this one is more like 300 million. They have scaled it back, but it and have money attached, some lawmakers dont want any money attached. Peter cspan, where history unfolds daily. 1970 nine, cspan was created as a Public Service by americas Cable Television companies. It is brought to you today by your cable or satellite provider. Americanekend on history tv on cspan tv, appellation State University professor Judkin Browning the failed attempts to take the confederate capital and richland. They have not done a lot of research about what this peninsula looks like and what marching along the peninsula would be like. But he is dead set on not conceding to lincoln that he puts his army on the virginia peninsula in the spring of 1862. P. M. , on the6 30 anniversary of the salem witch they discuss the primary sources compiled in the book records of the salem witch hunt. This is why we know so much about the pleas of innocence, because it was taken down. There is a reason, it reads like a play. She says this, he says that. Hear. Ould not all of those descriptions come from samuel parish and his shorthand. Fornd at 8 00 p. M. , a jfksporter talks about fiveyear campaign. I was a junior in college and it was the first time i heard the word charisma. He had charisma. Richard nixon didnt have charisma. Lbj did not have charisma. But jack kennedy had charisma. That could have possibly tipped the balance in some peoples minds. Complete American History tv schedule, go to cspan. Org. Sunday night on afterwards, naomi klein on her book no is not enough. She is interviewed by medea benjamin. Tell usder if you could a bit about how the stage was set for trump. I see this as a bipartisan process, this table that was set for trial. It is not about politics, it is about media, news coverage. All he needed to do was show up. We were already treating elections like reality tv shows. We already had a media landscape that was much more interested in interpersonal drama between candidates than indepth coverage between the issues. We already had a Democrat Using the tools of corporate branding themselves. President obama was a fantastic brand. He used cutting edge marketing techniques, and many of us felt that behind the claims that he was leading this deep change and transformation that there was not enough change, and that also helped set the table for trump. Afterwards at 9 00 p. M. Next, cia director mike pompeo talks about counterterrorism challenges and threats from north korea, russia, and iran. This was added dinner for security and intelligence. It is just under an hour. Tonight, i am pleased to announce cia director mike pompeo. As director

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.