This Atlantic Council event is about two hours. Director of the cybersecurity and if a Structure Agency at the u. S. Department of Homeland Security and principal associate Deputy Attorney general at the u. S. Department of justice. Going to go through some questions and we will have time to take questions for b i wonder if you could get us started. Talk through some key framing assumptions for the strategy. What were two or three places you wanted the team to focus on shifting the debate. To talk to you. Strategy. There are some fundamental shifts as you recognized in the strategy. First we have to start with what we wanted cyberspace to look like. What are we trying to achieve, what is our northstar . That is to have a defensible resilient Digital Ecosystem that is aligned with our values. That is what we are trying to achieve. At bottom our constituents are American People. How do we do this for in American People and at its core, it is reliant, significantly rely on collaboration a
Community center . No, it is way more than that. Comcast is partnering with 10 Community Centers to create wifi enabled li zones, so students from low income milies can get the tools they need to be ready for anything. Comcast supports cspan as a Public Service. Along with these other television providers. Giving you a front row seat to democracy. The director of the cybersecurity and infrastructure Security Agency, jen easterly, testified for a house subcommittee on a range of technical challenges facing the u. S. Artificial intelligence, and concerns about the chinese government. And information sharing. [silence] the committee on Homeland Security subcommittee on Cyber Security and Infrastructure Protection will come to order. The purpose of this hearing is received testimony from jen easterly, director of cybersecurity and infrastructure Security Agency. We now recognize Ranking Members for the purpose of seeking unanimous consent. Thank, you chairman, i asked for unanimous consent
Sources supposed consumers. This is about an hour. Expect complex. Thank you for coming up the first u. S. Regulations were drafted when than a century on the 1820s the one i remember it was steamboat of the coast guard that led to the whole safety regulations we see now. Fifty years ago we entered a period of deregulation. We found the balanced approach looks at the burden on companies. Listed needs and safety and security. I got this from michael dan eichler to give him credit and avoids Technology Specifics as much as possible. That would be an ideal system living ahead. We are going to talk aboutns the roy that agencies play to help showcase the approach tsa has putlo forward. As a Success Story i would say of this administration and the other women. Talk about what dhs is doing started, how things have played along the way this is an exciting time for Cyber Security. You know you are a nerd when you say things like that. It is an exciting time. If i dont know when we the regulatio
Source. This is about an hour. Thank you for coming out today. The first u. S. Regulations were drafted more than a century ago. The one i remember was a steamboat explosion that led to safety regulations that we see now. 50 years ago we entered a time of deregulation. We found is a unique balance that looks at the burden on companies, the needs of safety and security. Also, it avoids Technology Specifics as much as possible. That would be an ideal system moving ahead. We are going to talk about the role that agencies and sectors play, the approach that tsa has put forward, one of the Success Stories of this administration and any other. Well talk about what dhs is doing. This is an exciting time for cybersecurity. On a final note, when we look at regulations that began in the 1820s, there is a series of automobiles and telephones. Somewhere between 20 and 40 years it takes to develop adequate regulations for a new technology. The one difference is that unlike some previous efforts, we
Homeland security subcommittee on cybersecurity and Infrastructure Protection will come to order. The purpose of this hearing is to receive testimony from jen easterly, director of cybersecurity and Infrastructure Security Agency, or cisa. I now recognize Ranking Member swalwell for the purposes of seeking unanimous consent. Mr. Swalwell thank you, chairman. I ask unanimous consent that the gentlelady from new york, ms. Clarke, be permitted to participate in todays hearing. Mr. Garbarino without objection, so ordered. I now recognize myself for an opening statement. Welcome back for our second subcommittee hearing of the congress. Last month, we hosted Industry Leaders to give their perspective on the state of american cybersecurity and particularly how the cybersecurity and Infrastructure Security Agency or cisa has developed since its creation five years ago. Im glad that well hear directly from cisa director jenest easterly on. Director easterly and i have had a fantastic relationsh