comparemela.com

[background sounds]. [background sounds]. Before we start the program, i have some announcements, for summerlike design earlier this week, open registration for our 22024, Charlie Allen Achievement Award know and its working to come these words spotlight the outstanding work being done by the early to midcareer professionals across our Community Event will take place on the thursday february the 15th oversee army navy and arlington and our keynote for that will be mga deputy directive tonya several celebratory evening and my opinion is one of the best events of the year and its really uplifting just to hear the stories of the six awardees what they been doing such an early point in their career predict i will detail on this are available the website and also, you may have a set on this or got in the way or perhaps you spilled some jelly on it or something, but in yourt. Seat yu willin find copies of our 2023, annual report and it really gives you a great idea and a sense of our membership, even as we do through the year please take it with you and share with some of your colleagues. It showcases the work that we do really bring together the public and private academic sector. And now it is my pleasure to introduce longstanding friend tom ritchie, is Vice President of the deep abilities hill also serves as a member of the Advisory Committee and tumble introduce our moderator and guest speaker tom alternatively you. Good morning everyone im going to do this quick so you can really listen to an illicit we came here to listen to a dog thanks a lot to be half of rick on, i would really well ensure you would all join me in thanking all of the staff for posting this event this morning is really important time in our nations history with the issues atd. Hand and they support say n your Cyber Community number very the data sources provide foundations of the features applications at onyx open source data. And to be proactive in predictor of adversary attacks pretty general as you move forward, pulling resiliency in all aspects of technology, a. I. Policy infrastructure in the workforce, i think that i can speak for all who is here saying that we are all here partnering with you and your goals and omissions to protect the nation. It really is a true honor and privilege to introduce our speaker today. Our moderator accomplishments arguments she served as director and Deputy Director of bia Principal Deputy under secretary of Defense Intelligence Deputy Director of Naval Intelligence to that resume resumed this yer marks or date here, jerry benson so congratulations. [applause] [applause] thank you. I think you for your leadership and having to work with this now for years, i really have such respect for her and her leadership and insight is really moving the nation forward guest of honor today general assume the duties of commander of u. S. Cyber command and director the National Security agency and chief of Central Security service in may of 2018 pretty he previously commanded army Cyber Commandou from 2016 2018 pretty and distinguished career has featured command staff positions acrossfe all of the whole as wel as several assignments of the vote, including serving as director of intelligence, for the interNational Security systems force in afghanistan pretty general suite as you insert everybody please join me in welcoming him here today. [applause] [applause] thank you tom very much for theor kind introduction. The meat out of my good morning and welcome is good tos see everyone here this morning and especially good to see you tom always any work such of friend and w we are always delighted to welcome you back and so is good to see you pretty and not surprisingly, cspan is recording here this morning and they be playing our conversation later today. So lets make this an interesting one and will start with a warmup question pretty talets talk about your priorits for the coming year and it is a Cyber Command talk about them both. Only began first but with my and for small thank you to the sponsors for being able too hold this and obviously to himself which i haveching and also been a part of for a number of years and really pleased with they been able to do too for our communities anything about nearterm priorities not begins morningte with what is our focus our focus begins on a number of different regions of israel hamas new concerns about Russia Ukraine in South China Sea in his understanding are unusual cyber actors also thinking about our facing challenge of china and what we need to be today, tomorrow and in the future pretty regarding our challenges forre what is obviously an exciting time. Okay, that was the warmup. A tool that is very necessary for you to keep up with all of those challenges whether in china malicious actors, no acrosstheboard and is certainly section in the reauthorization and there has been a flurry of off and is impassable weeks revenue bill thats been introduced by senator warner underwater and rubio and your card authorization expires i believe at the end of this month talk about 702 reauthorization and kind of what is next. [speaking in native tongue] seventytwo is the most important authority that we utilize day in and day out induces the essential for the defense protection of our people. And i was we think about 70 lets take a step back and is obviously the governments ability to collect information on foreign targets operating outside of the United States that are utilizing u. S. Commercial Services Like telephone or email. It is absolutely critical in terms of what we can do to be able to understand the scope and scale and sophistication of the threat whether or not is being able to identify all users that are providing the disastrous chemical into the United States will being able too provide insight of what is happening to hostages in gaza. And this is the authority the so essential for our nation i would also tell you that also the authority, has is been identified by a series of commissions is the most transparent Surveillance Authority our nation has. As a director National Security i will tell you, that our focus is not only National Security is also the production of our Civil Liberties and this is an authority with the oversight and the transparency that allows both of those things to occur. I think the report that was done by the president intelligence advisory board, showed that. It is about a protection of civil liberty other is the oversight that occurs. And i think we come back to that i think that very critical report but it is also 59 percent of the president ial daily book is based upon 72 authority in 20 e collection and nsa, is obviously focused based upon 1702 allows and then the ability for us to have an insight of what is going on rapidly and if something we turn to 702, it is that important for our nation. Andor we have all the Deputy Director of the fbi here with us this morning as well. I think he would say the same thing. I think so and i think that if you take a look at from the perspective of nsa or cia the National Counterterrorism schism in a system really happy i certainly they would back us up in terms of what we need to be able to do do and be able to provide indications warnings then be able to also provide obviously the warning to people maybe to have been attacked in cyberspace something 72 allows us to do. What happens if it does not get reauthorized. It will be havens reauthorizd im confident that us what our communities focus on the congress isat focus on we will continue to work it is one of the things we do a an entity out and and itt is our number one priority. Theres a roomful of people who think understand the importance ofs this. Talk to senators response in women. There will be a vote so thank you for that paul you are very passionate on that in this is a very important tool. Lets give it a little bit had this is largely an industry audience although we do have a number of government folks here as well. Can you announce the creation of the a. I. Security center are official intelligentnt Security Center over two months ago as a form similar to this. Progress to be made and how is it going and when think im really interested in in the intersection between that center in the collaboration sensor that i thank you so really up and running and doing good work we have no the a. I. Security. This cybersecurity collaboration. Will be a. I. Security center just like the cybersecurity collaboration think that its important to take a bit of a step back to say, one of the really interesting things about our agency with theab past five years is the fact that what we do hasse not changed much in the seven decades that the nsa is been inexistent we do cybersecurity and but healthy we do a completely different pretty and so if you think about we start withng the Cybersecurity Collaboration Center and it stood up in 2019 event now one partner congressional basin now it is 750 partners and being able to operate on shells and classified to be maple to provide that canary nicole my look to what might be happening in the series networks for the world. We would not have done that six years a go. But onlyof understand the importance of this collaboration and partnership and why is so important as we fastforward to the a. I. Security center, who does not believe that Artificial Intelligence will probably be the most transformative thing that we will experience in our lifetime so that transformative, we have to ensure that the information theto infrastructure then, ability for a. I. To operae within this nation has to be secure to National Security work comes in is what we stood up the Artificial Intelligence Security Center of the past two months, we have stood up our organization we obviously been able to bring together series of partners same in the past couple of weeks, recently an informational port on a. I. Security infrastructure in a with herur partner in the uk and incest others to talk about the importance of being an interest or from threats to it and so we see this as a huge step forward in a. I. For the future. Undoubtedly a lot of talent in this room that is very interested in a ready and willing to help you there and so im sure they were interested in hearing that. In order and so you had when i willl call a goal this year to hire 3000 at least 3000 cybersecurity professionals. How is that going for less than a month awayha from the end of e year and areom you meeting your goals and how are you assimilating that. Also is a great question i think she is exactly right, and if you think about nsa and a lot of times we think about the incredibleib Technological Capabilities in the high computers there but at the end of the day what makes us the agency that we are is our talent and so and she indicated our goal for the hiring 3000 votes audacious goal of moving quickly to meet that, but i think that is only one piece of it we think about recruiting. We do fairly well weve made improvements to our recruiting in terms of beingcr able to outreach even outreach to make careers that are leaving the Tech Industry that might be interested in perhaps a little bit more balance being able to serve the nation and being able to attract them as well. Retention we can recruit all the people that we want to without the retention, they will be going right out the door so we stood at the future ready workforce that approaches our workforce much in the same way we would approach National Security challenge and how do we do things differently to obtain artwork first natalie look at this generally and howan to be thing about a population that is over 50 percent millennial engine see. In ten years ago 70 percent workforce was baby boomers and five years ago gen z in the millennials overtook the baby boomers and five years from now, it will be 70 percent will be gen zz e millennials office te workforce this coming into our agency so this is an agency that is looking much differently and how we retain a workforce in the final piece some of the area we still have work to do, that is the third arm returned. Why is it so hard when you leave the government and perhaps come back when you want to come back and i never stay for three decades for service if you sit for fivefi years any five for te private sector for five years, why not come back plus one of the areas software to do that we are looking at. And there are any number of folks want to come back so when you crack that happily sure that across the community and across the department because there are folks who want to come back and or folks who have been working industry entire career and at the end of it they want to come into the senior level of this not so hard to do and so ill give you that is a challenge. I look forward to it. And so i have a ton of questions just going to keep going and that we do have a colg question cards pretty and is it we do have a few thank you and i will look at these as i asked my next question first and am going to give it actually, think that i wanted to ask on his held piece, because i that you have an initiative to bring folks on board before they were cleared, to work in an unclassified state perhaps the Collaboration Center as that taken off and how was i going. It has and i think that we done in the locations so is a Global Organization we started to look and say to possibility that weo could have facility tt is in texas that can attract the talent in the workforce we are looking for is moving maybe not as quickly as we like but again i think that this is part of the culture change that we have to address is an agency as well and i know the energy is doing out of their going out in st. Louis where you know the borders is halfou of it in the space so taking advantage of the talent is really critical wherever you can find it. Thats so lets pivot and looking toward the future, quantum the big buzzword out there now is being quantum ready. Has Agency Working to be quantum ready as winners quantum computing or algorithms or introducing you know that will make your job tougher. And so what we look at quantum we say that agencies founded on two different really important things about we make coding we break who owed list of a making code as we think about Quantum Computers we think many of you probably saw the 60 minutes sorry best we can about and thinks National Security does is the key codes and cryptography the International Systems International Systems obviously enduring about the Intelligence Committee and department of defense pretty is national manager. For our National Security systems, where we are at is ensuring that we have been able to deliver the algorithms that are going to an event a lot of the different quantum resistant encryption the nation will be able to do and also working with mr. Chair the algorithms of the first four algorithms have been developed as many no national scaredy member can 2022, indicated that are nation needed to move to quantum resistant encryption by the mid 2030s for the path to be able to deliver the algorithms that are so critical for that i think the question becomes able to implement those and operationalize that type of encryption tour National Security systems and importantly a private sector pretty. Is a very important obviously a lot of the crown jewels from the work they do supporting the department in the Intelligence Community and i will tell you as a private citizen i am happy to hear that and you are on page so well done there. And south one of our toughest mpcompetitors thus adversaries when it comes to quantum, china talk about china as a leasing front and you also in your opening remarks had obviously a number of other adversaries out there that we are always trying to stay a step ahead of and so staying a step ahead of them looking towards the future, while balancing israel and hamas Russia Ukraine, africa what is going on the continent their pretty how do you manage the balance the Current Operations which you have not seen a case like this in a long time versus being ready to echo the military and i would say is like a binary approach to our threats you have piece of war and we were ready for the soviet union to come across the plains in western germany and to be t able to encounter them and be able to mobilize their ports and today look at it d differently we look at it National Defense strategy had a series of campaigns of being able to campaign a competition and conflict and being able to do that means that you are alwayss persistently engaged with your a adversaries and this is what cyberspace is telling us, we dont want to be reactive we want to be able to causally be engaged with our adversaries of what they are doing is something about that, we think a lot about how to achieve agility and agility through partnerships you know United States has incredible partners with the Intelligence Community look at her partnerships and that is truly one of the competitive advantage that we have always have a guesser adversaries. But the other thing is coming back to this idea of how we do things and let me give you an example on the 30th of november, many of you heard about malicious cyber attack against a series of Water Systems throughout the United States and connecting by cyber adventures as of the 30th of november pretty by the sixth of december, National Security agencies susa wi, Cyber Command, and the Israel National cybersecurity defense element, race report Cyber Security rate, thats unclassified. The tells you who did it, gives clear retribution in the technical aspects of the attack and what to do about it and so this is that how weve done things that much of different youif think about how we do things, the means that are adversaries now have to be able to react to that they would never anticipate that and so i think that the shows obviously this idea being able to campaign engaged and being able to do things differently with a series approach. And certainly the release of intelligence information is doing things very differently has done before the invasion on february 24th. What is interesting as you mentioned this a few return to the fall of 2211 of those kind of aha moments, it was when the discussion was hey we think we need to release a series of a differentif intelligence reports that talk about whatta the russians are going to do it okay that was fantastic conversation to have with our workforce right sable going to take all sensitive intelligence were going to release it to the world. And he relies that you have the discussion and say you need to access this and they are the nations access and its going to be able to build a coalition, construct an adversary, and empower a partner, why would we not do that and then again talks to the how would you think today, it is different. Absolutely and as always we dont get to those release of sources and methods were not and it is going to detour absolutely and so the questions are rolling in and there are some really Big Questions and lets stay on the threats pretty heres one from the audience about china card and the u. S. Information advantage over china so can you talk a little bit about our collection and analyticco capabilities with them make us all feel good on how were doing again. 2019 interagency we took a look and said, how should we posture for the future. In 2019 and many of you remember most of her focus was on counterterrorism and organizations run so me out of obviously 911 that point in time we knew it was an agency that we had a look at trying to differently and so from that point forward, the vast majority very sources that have been lookingva at, counter terrorismy an extreme as organizations that we need to know for those on strategic threats of china and russia so i 2019, we have moved a good portion of our language analysts and our intel analysts, two strategic competitions of the beginning starts really in 2019. By 2020, and beyond covid19, we start to see really impact of a number of different events throughout the world and think about what weve learned from russia and ukraine being able to share intelligence and securely in a partners critical and differently obviously how we build the cybersecurity of in the big in the pacific reason we been working hard that above, from essay perspective and you cyber counts perspective this one of the key lessons that we have learned from Russia Ukraine is one of the things that you know its hard competitive advantage as a nation. Also another question, along those lines is the thinking about this as 12, and it is really as important or mores important, and the graduate levels of the number of folks at chinas graduating a lot from here in the u. S. And in the r d arena and how do we keep up with that here in the u. S. Said what i do think that the supply of what we need to do in our people have to grow is one of the things we do as an agency is a program called you know jen fiber which looks at the k12 population over 40 different camps inducted throughout the United States for the students and katie through 12 of the teachers right because we want to be able to influence the ability for the teachers to talk about Science Technology Engineering Mathematics differently we want to look at different populations of the United States to say, the future here. The girls the code is a good example of the ability for us to reach out to the population perhaps does not or has not been as prevalent and what we do and so building this is important to National Security team and almost 400 Different University centers of Academic Excellence were able to tprovide thoughts and engage wh them regarding with the future looks like in being able to help the development of curriculum thats an important piece of evidence the end of the day you know i always come back to work in innovative nation and were an innovative nation because we have an incredible secondary schools and we have to ensure that her colleges and universities continue to provide the spark of innovation because at the end of the day thats really what part of her National Economy and possibilities. Absolutely is and i think thats another competitive advantage that we have you mightve seen this question, because it talks about the innovationn, pipeline card can u give us have an update on the red ventures innovation pipeline which im not familiar with and it is to help counter the chinese threat. Some of the things weve done and are trying to Security Center is to reach out to look for a new and innovative ideas that are able to spark an advantage for the advantages cuinterNational Security to provide again one of those advantages that we have looked out his three approach of future and whether or not vincent computing or encryption or whether or not another your risk of this is our ability to engage with the private sector and individuals to be able to see these ideas. So how can the industry help. A good way to Cybersecurity Collaboration Centers another really good way to engage with us as well. Okay. And another good question fromio the audience, talk on the hill about standing up and cyber service. What are your thoughts on an independent side. In the 2023 National Defense authorization act of them seven different sections look at cyber readiness in one of those that takes a look at the generation of cyber force process working with the department to come back with an answer to the study of the secretary of defense to take a look at it and i think that all options are on the table except status quo for soap we have to have you know cyber force 2. 0 and what we call Cyber Command and we built our force in 2012, and 2013 we had tremendous experiences the scope threatophistication and has change in private sector has her partners have changed pretty think we gotta be able to take a look and how we will change as well in terms of service at the end of the day to be decision secretary will make but i think that being able to provide a series ofvi options. Well said. And so seeking with that same lets talk about maybe modernization across the board you know everything about modernization for both nsa and Cyber Command as you think ahead and realize youre not going to be here. But in 2030, 2040, 2050, need to be doing somee of that planning now. That we are nothing is being talked about Artificial Intelligence and Machine Learning and transformative thanks, that we see for the near mid and long term for countries future, we be hundred that i think it is a wells look at our ability to the crypto mission being able to also break encryption and so obviously comes back to highperformance computers but i also want to tell you that one of the things weve learned is to beget the partnerships much more entwined with both the private sector had so we have an understanding of what is being done weve done that pretty effectively through our 71 years of existence but we can do it even better today and as i i recommend we are in a pathway for a fiveyear plan for Artificial Intelligence they are building a completely new infrastructure in terms of how wewe will operate from and so these are nearterm things that i think will have a tremendous ndadvantage. And you talked about the a. I. Security center and really thinking about Artificial Intelligence in implementing and ten you know across the board in a secure way and how do you think vulnerability because certainly Artificial Intelligence introduces vulnerability. Yes that is really the reason why we should have the Security Center pretty we have a mission and role in an understanding about the threat can do so again having a discussion with the private sector and having a discussion with element of government this is what the o private sector should know about the threat coming your target wind of this of the type of tradecraft that theyre going to apply against you these are the types of threats you have to be poised to react to it and this is how you can protect yourself we had a number of different discussion of the number of the leading u. S. A. I. Firms in the nation. To be able to provide that information and this is what we do in his life is so important to ensure the Security Center does well. So i wouldnt say theres a lot of opportunities for this audience and getting to nsa. Gov and the Security Center and of course the private security Collaboration Center. And im going to give it back to a couple of my questions here, stupid questions that will come back to have a little bit of time but if you have more questions, please do not hold back rated lets talk about the department of Cyber Security. There are four pillars there. And it is exploit any fence and involved in it. I can listen pillars im sure you know them in your sleep is not just nsasa are the Cyber Command for the parts of the department and how are you thinking about the fulfillment of the requirements that are laid outui in the strategy. The first one obviously comes in 2011 as we start to think about this new domain a cyberspace and this new command this dude up u. S. Cyber command and as i think about it i think about really the major changes that are taken place strategy and one of them is the importance of partnerships and alliances have a work with a series of partners to ensure the weekend make one plus one equals ten and i think that is the key piece that we are looking at a set week have a really important impact with a series of different partners with are not the only way the private sector not is a foreign partner they think differently about how we approach the partnerships given the strategy jessica pieces clearly campaigning and this comes back to our National Defense strategy we campaign ane so we are ready and competition in crisis or conflict and again different than then approach of being a just peace or war we continually engage with our adversaries in this what Election Security is taught us, right back to 2018 Russia Small Group and how you enable an act in a comes from this idea that your adversaries in cyberspace are continually operating. You have to understand them you have to work with a series of partners and you have to take action pretty that action is action from the department of state or from the fbi off of the department of defense, that is action pretty. Very good and you already answer to my follow up question and so, lets look about election. Thank you so a decent topping to have a discussion here. I have a number ofe other questions getting ready for the election and wee work with you Cyber Command National Security agency. As part of the whole of government, the effort ensure a safe and secure election. Was going to be different and i think the differences really are differences in threat and we beganwe in 2018 with him as a singular focus on russia and Research Agency as you wrote recall series of connectors trying to utilize social media we start to see the rise of the iranians a different elections and then by 2024, we start to think about was what role of the thread adversaries such as china and willow be similar to what they did in 2022 when they targeted a series of specific elections were more blood in the other question we have is what is the impact of Artificial Intelligence Machine Learning rated we all have seen the imperative deep thanks so we ensure that we are prepared for predictive already stood at the Election Agency group run by senior atth the Security Agency and a flag officer from u. S. Cyber command. We also line the methodology that we used in 2018 and 2020 and 2022, one to generate insights what is your intelligence and information were to take action. This is what we will date with a series of Partners Operating outside of the unitedin states d this is wherere our purview is n our competitive advantage is meghan and we have to get everybody to receive thatec information but that is not your job pretty so as you reflect on your over 60 years in the job and you talked a little bit about what is change differed how about Lessons Learned. Yes about Lessons Learned, my number one us an artist think the fact that you know we operate in a world that is completely different than we were five plus years ago and i think back to you know 2018 when i began to think how dynamic it the Environment Security environment we operate today so i think the first Lesson Learned is just dynamic approach to our National Security environment dont remember anybody returning me for a Global Pandemic pretty and you know that 17th of march, 2020, im standing before the assembled audience of the National Security agency cyber plan and said were voided take down a good portion of our workforce make sure that we are safe and secure. That was obviously a pretty pretty interesting moment and then being able to bring the workforce back by september of 2020, to prepare for an election getting ready to start as i think the first thing is a dynamic environment in which offering and secondly today, we come back to a people. And i am amazed again it all the lessons ive learned as a young lieutenant apply when youre leaving an agency like u. S. Cyber command and it truly is the tell of the makes a difference and you know i think the final pieces just the ability to operate with a series and i look at paul be here who is the deputy federal bureau of investigations and the director and b myself spent a lot of time together thinking about the security challenges and how we operate together to look at the authorities and the ability the fbi has any authorities and abilities of Cyber Command send message and an probably different than any of our former directors of nsa but i think that is incredibly important for the future night just have one example the partnership. The agility piece when i was director of a covid19 gave me any indication on how to lead through this administration so the pandemic and you know those of the things that you fall back on all of your training. In order to leap through. And we have a question from the press. And you know he just mentioned a little bit about authority and so with enhanced Budget Authority what are some concrete authorities and actions snow to commander u. S. Cyber found to be able to have greater oversight over Cyber Mission forces within the services thevi readiness. Thats one of my staff i was over here. A good be bad but im here. Okay so in december of 2020, have her secretary defense of the time is at play the things that you Cyber Command needs to do is to be able to have greater control of the resources pretty as of the secretary of defense of the time said that would be enhanced budget control we were able to provide control over 700 million what are command does but 2. 9 billion at the services apply to Cyber Mission forces pretty this is a lesson we learn from special operations get mad right the idea to be able to control the resource to be able to prys prioritizing directives resources whether threats are coming and obviously the importance of where we need to be able to develop capabilities and so that comes in this year end 24 months the budget is defined and what will provide the commander is to be able to prioritize the most important things where we need to put their resources, whether or not sent to enforce a greater training or investments and i think this is the agility we need to provide even a better force than we have today to have any challenges associated with his. So i think that always in terms of the challenges regarding you know being able to ensure that you have the processes set up upon which you can do that and this will be done effectively is committed i think a great opportunity though is to think differently about a force that is really being able to make changes rapidly. Havego a number of recent and reasonably good questions here. And so you know i asked you broadly about Lessons Learned are there any Lessons Learned from the current conflict. Ukraine. We think coming back to Russia Ukraine, when we learned we have learned the fact that what we do in terms of being able to provide book for an intelligent cybersecurity are critically important if not one of the other is the fact of being able to provide sanitizing intelligence to the public in terms of what iss going on to be keable to build a coalition impt adversary to enable a partner but its also thele cyber secury piece right being able to understand that you have an adversary they can get into your weapons your data and being to impact your networks and having mature and secure network data reference system that you have Cyber Command and National Security due to very well that continues to hold pretty i dont ever remember that discussion in 20 years its a different world because we take a look at israel hamas, think again come a becomes this idea was being able to understand the collection and analysis that you do and how that can be impactful to providing a situation wherein until necessary everything a day being able to provide you a Central Command we understanding of the region what has happening in iraq and what is happening. What is happening in the red sea. This Letter Agency and command does very well. Is a following on from that, as a functional combatant command, how do you see the emigration of the Global Operations and how is that going of you seen a changeover im sure you have over the span of your career that is director. Yes, i think the big change in cyberspace is the fact that no longer do we just think about you know after the fact. Now it is how we think about defending our nation how we think about defending our networks and how we think about being able to enable a partner is all part of the early discussions give the pieces just the rich discussion between provide commanders with are not as general guerrilla a bully whether or not it is admiral, its always about what can we do to support you whether or not a cybersecurity error thats information operations. Okay, big event braided several questions here on the listing of the congressional pulled on nominations. Actually, nominations but on i cannot think of the word. Approval but are not going to go there and am not going to ask you that question i am thinking posively as i know you are that there will be a change of command and a change of directorship and sometime in the near future. So look back at what you see as your top things. So i think really it comes backt to if i was going to taka look at five plus years we begin with gotta go back to the russia warn you have to go back into the fall of 2018, because, we start with this idea that one will going to get to an outcome safe and secure election two oh look differently the partnership between u. S. Cyber command nsa in thaten time everybody was thinking it was libido from the idea that we come together very when commanded does so well new jersey does so welcome for the nation pretty third thing al lt of the ideas regarding private sector, they are formed at that time frame you may recall the fall 2018, you spent forward to ukraine. We collect a lot of malware we share it with a Cybersecurity Consortium and they say, this is russian malware t the spread inn antidote forn the users throughout the world this was the idea that it thinks differently is that we get to scale and so i think i reflect back on it i go back to the full 2018 view some much of what are ocommanded our agency has done since and is based on that success. We will have future time to brominated really think think of all for just all that you have done and serving nation it really has been extraordinary. Big game on saturday. [laughter] [laughter] is there any prediction. Will going to be the navy. [laughter] [laughter] i back my back. You know im going to say go navy. Given my background. Thats the beauty of the business. Yes it is indeedth and so pal thank you so much and as i said, when we started youre always welcome to you and youve always been a good friend and i think that you have long recognized you said here today, partnership between government and industry and academia, takes a partnership and you throw and of course also our International Partnership and it is important and you have a room full of supporters in a room full of folks who really wanted to hear from you so that they can better help and thank you for all youve done andte thank you for all you are doing. Thank you. [applause] [applause] [applause] [applause] thank you and i would like to thank you so much. [applause] i back. Also like to extend once again i thank you to all of our sponsors this morning, andsp im is webbs services to secure technologies claires job. Com and others and of course again thank you everyone for coming this concludes our programs on behalf of the entire team of one of wish everybody a happy holiday and you can please help yourself to the funeral arrangements and toor get help s someone that you love and thank you. [background sounds]. [backgroundme sounds]. [inaudible conversations]. [inaudible conversations]. [inaudible conversations]. American history tv, 70s on cspan2, explain the people and events until the american story, 70 amazing, we continue with a series free to choose and code produced by nobel prizewinning economist treatment and his wife Rose Friedman episode titled anatomy of crisis in the Great Depression and Lessons Learned that an 8 00 p. M. Eastern on lectures of history come the first of two part lecture by university of maryland history professor michael roth 1925 scopes monkey trial about teaching evolution as cultural significance in 1920s america and 9 30 p. M. Eastern on the presidency other matthew l geo talks about his book, when hearing that pablo looking back at former president harry truman part of Pablo Picasso time together in 1958 during a mediterranean vacations were details cold war era politics modern are communism and others human forged unlikely bond and at 10 30 p. M. Eastern, or series, Historic Campaign first a look at his 1992 speech by democratic president ial candidate bill clinton and New Hampshire followed by president ronald reagan, spoke at the Iowa Republican caucus kickoff in 1984 predict exploring the american story, watch American History tv, saturdays on cspan2, and find a fl schedule in your program guide, or watch online anytime a cspan. Org history. This weekend, cspans campaign 2024 coverage continues th events in South Carolina ep on saturday, president bide at president ial candidate is dean phillips theou Carolina Democratic Party first in the nation dinner and celebration in colbi thats live starting at 6 00 p. M. Eastern on csn and then sunday, fme South Carolina governor think head the speak to the voters that allow partly coverage begins at 5 00 p. M. Eastern alson cspan at both events will also stream live on cspan now free mobile video out line is cspan. Org. Theres been another retime in congress, cspan capitol hill producer ray kaplan reporting live in turn Maryland Democratic congressman ropers berger, has senior has appropriate are running for reelection for his

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.