Well come to order. Without objection, the chair has authorized to declare recess of the committee at anytime. Good morning and welcome to todays hearing entitled bolstering cybersecurity. I recognize myself for five minutes for an opening statement. I want to welcomethe witnesses here today and elcome chairman smith, Oversight Subcommittee Research and Technology Ranking member lipinski, our expert witnesses and members of the audience. Oversight subcommittee research and Technology Ranking member cyd from wannacry. I recognize myself for five minutes for an opening statement. I want to welcome the witnesses here today and welcome chairman smith, oversight subcommittee Ranking Member lipinski, our expert witnesses and members of the audience. Cybersecurity, a concept we hear mentioned frequently, especially in this period of rapidly emerging threats, is an everevolving concept. Maintaining an effective cybersecurity posture requires constant vigilance as new threats emerge and old one
Well come to order. Without objection, the chair has authorized to declare recess of the committee at anytime. Good morning and welcome to todays hearing entitled bolstering cybersecurity. I recognize myself for five minutes for an opening statement. I want to welcomethe witnesses here today and elcome chairman smith, Oversight Subcommittee Research and Technology Ranking member lipinski, our expert witnesses and members of the audience. Oversight subcommittee research and Technology Ranking member cyd from wannacry. I recognize myself for five minutes for an opening statement. I want to welcome the witnesses here today and welcome chairman smith, oversight subcommittee Ranking Member lipinski, our expert witnesses and members of the audience. Cybersecurity, a concept we hear mentioned frequently, especially in this period of rapidly emerging threats, is an everevolving concept. Maintaining an effective cybersecurity posture requires constant vigilance as new threats emerge and old one