Community center . No, it is way more than that. Comcast is partnering with 10 Community Centers to create wifi enabled li zones, so students from low income milies can get the tools they need to be ready for anything. Comcast supports cspan as a Public Service. Along with these other television providers. Giving you a front row seat to democracy. The director of the cybersecurity and infrastructure Security Agency, jen easterly, testified for a house subcommittee on a range of technical challenges facing the u. S. Artificial intelligence, and concerns about the chinese government. And information sharing. [silence] the committee on Homeland Security subcommittee on Cyber Security and Infrastructure Protection will come to order. The purpose of this hearing is received testimony from jen easterly, director of cybersecurity and infrastructure Security Agency. We now recognize Ranking Members for the purpose of seeking unanimous consent. Thank, you chairman, i asked for unanimous consent
Homeland security subcommittee on cybersecurity and Infrastructure Protection will come to order. The purpose of this hearing is to receive testimony from jen easterly, director of cybersecurity and Infrastructure Security Agency, or cisa. I now recognize Ranking Member swalwell for the purposes of seeking unanimous consent. Mr. Swalwell thank you, chairman. I ask unanimous consent that the gentlelady from new york, ms. Clarke, be permitted to participate in todays hearing. Mr. Garbarino without objection, so ordered. I now recognize myself for an opening statement. Welcome back for our second subcommittee hearing of the congress. Last month, we hosted Industry Leaders to give their perspective on the state of american cybersecurity and particularly how the cybersecurity and Infrastructure Security Agency or cisa has developed since its creation five years ago. Im glad that well hear directly from cisa director jenest easterly on. Director easterly and i have had a fantastic relationsh
Caught before it could do widespread damage, the sophisticated vulnerability could have been one of the highest-impact software supply chain breaches to date.
Nation-state attackers apparently backdoored widely used, open-source data compression software as part of a supply chain attack. Malicious code inserted into