It is brought to you today by your cable or satellite provider. Nsa director and u. S. Cyber commander admiral Michael Rogers on the need to recruit, train and retain highly skilled cybersecurity professionals. Also hacking on the email servers. Hi, good morning, everyone. Were going to go ahead and get started in a minute, so if we can have you find your seats. Good morning. On behalf of the cyber maryland advisory board, i would like to welcome you to the sixth annual cyber maryland summit. Im david powell. Joining me is rick garetz. Cofounders and cochairs of the cyber maryland advisory board. My great pleasure to welcome the attendees, the speakers, the exhibitors, and the sponsors here to this event today. And also, our local, state, and federal Agency Leaders and policymakers and other dignitaries in the audience. Six years ago, cyber maryland started as an idea to build the Silicon Valley for cybersecurity. To unify the cyber maryland ecosystem around a common theme. To be the epicenter of cybersecurity. And six years later, looking around the room, i would say we have been successful. Wouldnt you agree . [ applause ] but the question that we always ask is, whats next . Cyber maryland has become the model for other states, and earlier today, we made an announcement about a program called cyber usa. Community of communities and cyber states which will be led by the former undersecretary for commerce, bill bond. And the first dhs secretary, tom ridge, former governor of pennsylvania. Rick . Yeah, thanks. So we wanted to kick off the session today, as everyone knows that cybersecurity is the new space race, right . What happened when the space race was going on . Countries were trying to get to the moon. Right now, we have a situation where cybersecurity does not have a zip code. It doesnt represent 21212. You know, colorado, california, and so on. So the first move was to now bring all the states together in a collaborative effort with cyber usa. And then what we wanted to do is one of the major parts of building a cyber ecosystem is building a generation, the next generation, which we call the cyber generation. We thought it would be appropriate to have a student in high school that is teaching introduce our keynote speaker. I had the pleasure of introducing emma rogers in very different sessions and conferences. Whats unique about this is about a year ago, we stood on stage at this conference with rob joyce and cathy hudson and chris alexia, nsa launched a program called the nsa day of cyber. Yesterday, we just reached 5 Million Students that signed up to start to explore their future. And as our introduction to the keynote speaker happens, this all got started here because three years ago, i was teaching a high school at dunbar, a class on technology, and i asked a bunch of students, what do you want to be when you grow up . Their answer was doctor, lawyer, ray lewis. Now what were hearing as early as last month in arkansas, california, virginia, maryland, everywhere, is doctor, lawyer, forensic analyst. Doctor, lawyer, reverse engineer. I think this Grassroots Movement has created a movement that our neighboring states are now starting to work upon and collaborate upon so we can protect the nation and create the cyber generation. So its my pleasure now to introduce a teacher of a local high school, steve morrill, and one of the students to come up to introduce emma rogers, and steve, if you guys would make your way to the stage. And i want to just make a comment about this teacher in general. This is the worlds first cyber teacher who at a High School Level has now built a program in a high school where the most popular sport on campus is cyber. Over 106 middle school, high school and college, i mean middle school and High School Students come after school from 3 00 to 7 00 under their own volition and learn, compete and he has now built this into the Cyber High School and the model. So now, high schools around the country and around the world are modeling this school on how do you give students who have the capabilities to really demonstrate cyber skills to be able to continue and grow this model across the country. So its my pleasure to introduce steve morrill, from loyola high school. Steve. [ applause ] good morning, folks. My name is steve morrill. Im director of technology and cyber science in maryland. Thank you for the opportunity to be here for the cyber maryland kons conference is near and dear to my heart. This was the inspiration five years ago to start our program. Its nice to be in a roomful of like minded folks with the same goal, educating the next cyber generation. Over the last five years, one of loyolas goals and my goal is to solve the Talent Pipeline problem from k12, higher ed and industry. We started five years ago with six students. And i thought, well, that was a fun club for a year. And now we have five years later, 106. I dont hang posters. I dont get on the morning announcements. Its all been driven by Student Interest because students in middle and high school can do more than what we may think. So this morning, were joined by several of our students. One in particular here is junior andrew staman. Hes in his second year with us. This past summer as a sophomore, i think back to my sophomore year in high school, i think i was still mowing grass in my summer. He did an internship at Health Systems in chattanooga, tennessee, where he was a member of the Internet Security team. He brought that information back to loyola and is now teaching sisco routing and switching to our students in great eight through 12. Now hes a junior. Hes already looking forward to continuing his education in college, when he graduates from us in 2018. Hes carrying a full load of a. P. Courses, plays varsity rugby and works in the cyber Science Program because he wants to, not because he has to. So motivation is key. So with that, im pleased to introduce you to andrew. Loyola high school student. [ applause ] thank you. I would also like to thank mr. Powell for inviting me to the maryland cyber summit this morning. As a junior in high school, as mr. Morrill said, i did an internship in chattanooga, tennessee, and i found great passion in the field within two years. It relates to everything we do every day, and it excites me the direction in which the field is heading. This morning, were joined by a man whose position as head of the National Security agency and a Central Security service, two organizations that play a crucial role in todays world. More information about admiral rogers, his career, can be found in your bio in your programs. As all of us are aware, cyber has become the next domain to defend and its a space race of my generation. With the growth of the field, unemployment is nonexistent. Under admiral rogers, im proud to say that the nsa has welcomed more interns my age than ever before. He has faced us with real world challenging issues we face, and im willing and eager to fulfill the needs of the country. By accepting interns from high school and college, i appreciate that admiral rogers has recognized and embraced that us young adults can do more than expected. Its with great honor and privilege that i welcome admiral rogers to the stage. [ applause ] thank you, andrew. Thank you very much. Is that one impressive young man or what . [ applause ] thank you very much. Imagine if you were 16 or 17 years old and somebody asked you to stand up in front of hundreds of people, cameras, to introduce a man you never met and do it in front of a whole lot of people. Andrew, thank you very, very much. I want to thank you all very much for taking time to support cyber maryland. Im here because im part of the maryland cyber ecosystem, both as the commander of the United StatesCyber Command and the director of the National Security agency. Were proud to be a part of this ecosystem. Im here today because i wanted to share a few thoughts on the challenges of cybersecurity. Also selfishly, im here today because if theres a young man or woman in the audience who is interested in challenging work in the cyber field at nsa and Cyber Command, we have great opportunities. Im interested in getting every motivated, talented young individual we can to be a part of our workforce, to help build the future, both in defending structures, networks within the United States government, but more broadly, how we as nsa and Cyber Command, small parts of a bigger team, can do our part in trying to defend our nation and help our friends and allies around the world. Because cyber is the ultimate team activity. And the 35 years i have been a commissioned officer in the United States navy, i have never been part of a mission set before in which your success and the ability to generate operational outcomes is so dependent on a broad variety of partners. That is both challenging but it also represents opportunity. And you see that in this audience today. Among you are High School Students, college students, midshipmen at the Naval Academy. People involved in academic thought, people involved in industry, people involved in the government. At the state, at the federal, and at the local level. Its our ability to harness all of these capabilities that these groups represent into an integrated team thats working on some tough problems. I think we all have to acknowledge were not where we want to be when it comes to cybersecurity. Thats reflected in the increased level of investment. Its reflected in the increased level of activities you read about and whatever your potential source of news is, whether it be print, online media, whatever. You cannot go literally hours without something popping about a major cyber challenge, somewhere, both here in the United States but globally as well, because this is not a phenomena that is restricted to a particular nation, a particular area, or a particular sector or segment. There is literally activity of concern out there in every segment of our private sector, across the u. S. Government, with our allies and friends around the world. And i suspect that that dynamic is not going to be changing in the immediate near term. So collectively, we have to step back and ask ourselves, what can we do working together to attempt to address the challenges associated with the cyber environment were dealing with today. That means information sharing is going to be critical. The government, legislation has been passed in the last 18 months, we have started an initial framework on how to do that. Within the federal government, we have taken time in the last month, under the president s direction, to outline what are the roles of the different parts of the federal government and how are we going to provide support both coordinating internally within the government and perhaps of greater importance to all of you, how are we going to apply that capability more broadly across our nation. As a part of that federal government team, im the first to acknowledge one of our objectives has got to be how can we help to simplify to our private sector friends how you interact with us. We have got to make it easier for you. And we have got to align the insights we generate to generate value for you. You need to define, what is the information you need, how do you need it, and what format, and what truly is the value to me, to you . You dont want us deciding that. We need to partner with you and understand what it is you feel you need. At the same time, we are all out there competing for the same workforce. And that challenge isnt going away. Right now, if you look at the Human Capital piece of this challenge, i would argue in some ways that its the greatest challenge of all. That while the technology is incredibly important to our ability to meet the needs that are associated with the challenges of cyber and cybersecurity, perhaps the greatest challenge is not the technology but its the Human Capital in all of this. How do you make users smarter so theyre making smart, intelligent, well informed decisions . Because you can have the greatest defensive strategy in the world, but if your users are making choices that undermine that security, youve made your job that much tougher. By the same token, you need an incredibly motivated and focused workforce. You not only have to have a workforce in which segments have very specified, specialized training and information in technology and cybersecurity, but as i said, we have to raise the Knowledge Level of every single individual within our structures. So the human dimension here and the ability to generate trained men and women with the right kind of background and insight is a challenge that as a nation were only beginning to come to grips with. I dont think theres any of us here in this audience that would tell you, oh, yeah, i have all the people i need with all the right skills and all the right backgrounds. Clearly are not where we need to be there. Thats one of the reasons why i like to do things like cyber maryland. Nsa and Cyber Command, we want to be part of the solution. You heard in the introduction some of the things were doing in terms of out reach to the private sector about in terms of the academic world with students. One of the things andrew mentioned was our Internship Program. Like many organizations, we have come to the conclusion that the greatest things for us is getting young men and women familiar with us at cybercommand and nsa earlier and earlier. We have a pretty aggressive internship for our organization. In fact, ive been a director at nsa for a little over two and a half years. And i can remember the first week on the job one of the things i like to do is go down, walk around, walk the halls, eat lunch in the cafeteria to talk to the work force. The first week on the job i go down stairs from my office and i stop and say hello to two young ladies. After lunch i go back to my office and i said to my team that works with me in my office, i cant believe how young were hiring people. I met two young ladies who i swear looked like they were 14, 15 years old. I got, sir, they were probably interns. I said we have interns . The thought to me, again, just starting the job was, you mean were giving security clearances to, you know, 15 and 16 year olds . Im the first to admit i was struck by this is a different world and were going to have to do things a little differently than we have historically done. I would tell you the Internship Program has among the highest returns on things we do. Over 65 of the people who intern with us end up working with us once they complete their education. Thats a great place for us to be. You see that investment not just in us. Other organizations are doing it. As a naval officer i highlight what were doing, you see midshipman here with us today. Were making cyber courses mandatory now for the Naval Academy. Cyber is foundational to the future. We are past the time where i dont need to worry about that. Thats what my i. T. Guys do. I dont have to know a thing about this. Given the challenges associated with User Behavior thats not going to work. We have cyber major, we have broken the ground or soon will, this month, on a new cyber center at the Naval Academy and were directly commissioning officers out of the Naval Academy within the cyber arena, something we had not done until a few years ago. We recognize that the world around us is changing and we realize we have to do things differently. You see that in what the secretary has done in terms of our Defense Innovation and experimentation unit out in california in Silicon Valley. Where we acknowledge as a department we have to go where the best technology and innovation resides, its outside the government, outside the department of defense. Weve got to be willing to go to the outside world and say what can we learn from you. How can we partner . What kind of capabilities and insights do you have that will generate value for us and help us in our missions to help defend the nation as well as defend our key friends and allies. Another thing that im always telling the work force at nsa and Cyber Command, the defensive side is a core aspect of our jobs. We must constantly drive for success, but at the same time we must acknowledge despite our best interest there will be times we will fail. We must be prepared to deal with failure in an aggressive way. When i started my personal time in cyber i can remember thinking to myself, the entire focus was to keep the opponent out of your network. Thats the primary driver. But after 15 years doing this in the department, ive come to the conclusion you must not only spend time focused on that, but you must acknowledge that despite your best efforts youre likely to be penetrated. Given that, what are you going to do. I would tell you as a individual that has to deal with major penetrations in networks in the department of defense. Its a different thought process, a different methodology and a different leadership style at times when im dealing with problem and the investments were trying to make, trying to forestall opponents ability to enter networks, as opposed to when we find them there. Its a great leadership challenge. It goes back to the Human Capital piece. As important as the technology is, dont forget about the importance of motivated men and women. Because without motivated men and women, i dont care what your technology is, i dont care how good your defense scheme is, how great your Network Structure is. Without motivated men and women, you dont have the edge that you really need. And thats what gives you the difference. Thats why i think so many of you being here today is very, very important to the future. Weve got to roll our sleeves up as a nation. Weve got to realize this is not a short term phenomenon. This is long term, hard work for all of us. We got to step back and ask ourselves what do we need to do to change the current dynamic were in. As i said earlier, i dont think any of us would argue we are where we want to be right now in terms of cyber security. And with that, lets open it to some questions. You guys are a very quiet audience. Very quiet. Good morning, my name is dave bittner, and im the host and producer of the cyber wire podcast. We have some questions that were sent in through the Conference App through social media from some of our local Media Outlets and were going to have some time to take questions from the audience as well. Were going to start off with this one, is our ability to defend cyber space better today than five years ago, are we improving or deteriorating and how and what needs to happen . Certainly, if you read the news rngs its ease stoi tell yourself its just getting worse and worse. What i try to tell our team is lets step back for a moment. Lets think about where weve come in the last five years. The first thing i remind people is look, we are way past debating about whether this is something that merits attention. Five years ago, i was spending a lot of time in discussions with leaders about is this something i should really care about . Why should i put time, people, resources against this . We dont have those discussions anymore. So the number one positive for me is we have wide spread recognition we have a set of challenges here that are going to take focused effort and investment to deal with. We have created, again, on the government side, i would argue, partnering with the private sector, weve created welldefined lanes in the road, we have articulated how were going to provide support and partnership with the private sector. And we have created the mechanisms to do that. Those are the things i think are strong positives. On the other hand, i also remind myself, i think as i said earlier, i think we have to acknowledge were not where we want to be. So im just not interested in sitting back, patting ourselves on the back and saying, hey, look how much Better Things are now than they were. Thats interesting, but its not particularly applicable or the primary focus to me. Its about what do we need to do to keep moving forward. So when i think about what do we need to do to keep moving forward, im struck by on the government side, weve got a transition point coming up in january. Thats a great opportunity for us to step back and do a little internal assessment, where are we, are we happy with the structures weve created. Are the assumptions weve made proving out to be actually factual. Do we need to step back and reassess . How do we get a broader set of teamwork out there . And then dont ever forget the international dynamic in this. Cyber doesnt recognize geographic boundaries. Its challenging to come up with solutions that only work for one particular country. We have to acknowledge we have to do something more global mere. One of your predecessors, general hayden described russian hacking of the dnc as a legitimate intelligence operation. They are not welcome and call for a response. Do you have any reactions to his characterization . I love it when people say so and so said x, what do you think about it . We have acknowledged that russians were behind the penetrations in Democratic National committee and several other targets designed to generate insights with respect to political activity. We need to step back as a nation and think about what is the implications, is that something were comfortable with . In some ways i would argue this is a pattern of behavior in terms of the use of information, the attempt to persuade, manipulate others has been a fairly consistent pattern for the russians over time. Cyber adds a whole other dimension to this. It enables individuals, actors, groups, nation states to acquire data at massive scale and divulge that and make that data publicly available. Theres a lot of things weve got to think through with respect to that. Fundamentally, as a nation, its important to us that we all believe and trust that the mechanisms of governance are going to generate outcomes we can all believe in. Thats foundational for us. As we work our way through this particular issue. Thats always at the forefront of our mind. How do we help engender trust and confidence in our citizens and how do we send strong messages to others in the world outlining what is acceptable and what is not acceptable. What are the Biggest Challenges facing a split between nsa and the u. S. Cyber command outside of the previous comments on finding the right time and process for a split . So ive already talked publicly about, hey thats a matter thats under review by the president. He as the chief executive will make the ultimate decision. Im not going to get into the specifics, good, bad, how would we. Lets give it time and see what the process generates. Hey as a good subordinate my job is to make it work to the best of my ability. Thats what were going to do at National Security. All right. The Technology Evolution is currently outpacing the education of the work force. What is nsa and u. S. Cyber command doing to address maintaining a work force from the tech nickal revolution from the acquisition perspective . On the acquisition side, the thing i find very gratifying is saz an Intel Organization we have flexibility and capabilities that make us fairly fast and agile when it comes to generating capability in term ofs what were able to do internally as well as partnering with the private sector. Cyber command, the challenges are a little different. Cyber command is a Traditional Department of defense operational command. Its not an acquisition operation, it doesnt buy capability or design and generate. Yet our experience with six years now as an organization, is we need to step back and ask ourselves, does that make sense and is that the model of the future . Theres a test in the different language from last years acquisition act which grants u. S. Cyber command on a test basis for the first time both Acquisition Authority and a small amount of money. Were working our way through with the department of defense whats the framework were going to put in place to grant those authorities to Cyber Command and how were going to execute those. Youll see that start to roll out in the current fiscal year, 17. Then we owe a report back to congress on whats our experience been. All right. Mobility is a mess within the federal government and dod. Certifications get completed after devices have been mothballs, not allowing mobile devices inside the agency is creating hiring issues for younger employees. The threat for these products grows. How do you see mobility today and in the future and how is the agency trying to improve the certification process . So, clearly mobility is foundational to the future and the world were living. I bet less than 10 do not have a digital device on you right now. Thats the nature of the world we are living in. I dont see that changing. Its given us great benefit. Im the first to acknowledge. You know, as soon as i leave here and get in the vehicle, first thing ill do is pull out my device and getting connected back into the world again and seeing whats going on. So its foundational to the future. At the same time, we also have to acknowledge its a bit of a double edged sword. It represents both connectivity and opportunity, but it also represents potential vulnerability. Each organization has to make an assessment of risk and given that potential vulnerability, whats the level of risk youre comfortable with given your mission and the levels in kind of information you have. What might be acceptable for one organization, say, a company thats doing Public Service might be very acceptable versus as the National Security agency is a leader of an intelligence organization. Maybe that level of risk isnt acceptable to us. This is not going to be oo one size fits all. We have to educate our young work force. I have two young millenial sons in their 20s. One of whom is a naval officer. They both believe the constitution forgot the part where they should have talked about and the ability to access data in the format of your choice at the time and place and in the device of you choice. For the life theyve lived, its all theyve ever known. I can get whatever data i want in whatever format i want on any one of multiple devices or mediums. Whats the matter with you that you dont get it . Im here to be your fossils, sons. And its funny, i have this conversation with both of them, with the older one thats a naval officer. I say, i got it, step back and look at this from the perspective of a naval officer. Were concerned about the security and the ability of others to use that device to gain insight as to where you are, what youre doing and who youre communicating with. Trust me, there are nation states, actors, groups out there who are doing that every day. Who have interest in individuals and will use that connectivity as a vehicle to generate insights as to where they are and what theyre doing. By the same token, i also acknowledge it offers great benefit. So i always remind them, hey, for example, to the older one ill say what works for your brother who happens to work in the private sector, son, isnt necessarily going to work for you. It goes back to its not a one size fits all. Thats great challenge for leaders to find that balance. So for us, were trying to do it at lets take nsa and Cyber Command as an example. The compromise were working on is, let us provide you that unclassified connectivity in a format by means that we have high confidence we have minimized the risk. Rather than each one of you bringing in your own device, let us generate the means for you to access that information while youre at work and do it in multiple formats in a multiple mediums. You know, thats what well sign up to. We think theres value here, we want you to be able to do it. We understand, again, as i said, to many of our work force, i want to have access to this anytime, anyplace. When i cant bring my device in, i dont like that. I find that unsettling. Its something im not comfortable with. And its not a sacrifice maybe that im prepared to make. Remember, the people were all competing for in terms of Human Capital, theyve got a lot of options out there. For example, if that portable device and the connectivity that it implies is important to them, they may say, hey im going to go somewhere where i can do that. Were trying to anticipate and deal with this phenomenon. Its not unique to us. We are going to open up to the audience for questions, if you have a question, i believe we have some runners with microphones. Raise your hand. Well get the runners to you. And in the meantime, im going to ask you another question. What do you see as the significance open Source Intelligence will play in National Security as technology continues to be compromised at an alarming rate . I would argue open sources by open source thats the phrase we use in the Intelligence Community to describe information which is unclassified and readily available to all. We tend to use the phrase open source. Unclassified, readily available to all. Experience is telling us that open source represents another primary means of acquiring information and insight that are potentially of value. Signal intelligence, our focus on one of our two missions at the National Security imagery, human intelligence, that open source offers an attractive set of insights that we may not have access to via other means. By the same token as an intelligence professional i remind people every source of intelligence and insight has inherent limitations. Not one single one of them. I dont care if its human, its automatic goal whatever you see or hear you can believe. Open source is no different. And so we just always need to keep that in mind. And so open source, all of us with the Intelligence Community are trying to work on how can we bring that as another tool to compliment the work that were already doing . Because, again, a little bit to me is like the digital piece. It is not going to go away. And it represents an amazing potential source of insights. I want to take advantage of the insights. Do we have questions ready out in the audience . Yes, sir. Sir, you spoke have we met before . I believe we have, sir. I thought so, you looked familiar. How you doing today . Doing well, sir, thank you. Okay. So, sir, you spoke towards our struggles as a nation trying to as a work force, to catch up to the cyber threat. A good example being trying to reinforce our electrical grid against bombs or cyber attacks. With the accelerating rate that cyber is growing and the change of the approaching internet of things it seems this idea of mobility and that our only threat to our own personal information being our cell phones is changing to all the objects in our homes and around us. With this interconnected network thats growing within our nation, not only in the private sector but in the military as well. How are we preparing ourselves to address such a drastic change with objects that were never designed to be cyber safe, such as wifi enabled toys or pacemakers . My first comment would be, i think weve got to be honest with ourselves, as a society, we do not truly understand all of the implications of the internet of things being the most visibility largest em bodiment. This is an autonomous object. No, its connected to a broader set of capabilities. Those connections offer both potential opportunity, make our lives easier, but they also offer potential points of vulnerability. To me youll see this in many ways, the most visible manifestation of this phenomenal, its only going to get tougher is the automobile. Hey, when i got my license, the automobile was an autonomous mechanical device, had no software systems. It had no Decision Making capability. Its only ability to receive information was largely unless you were a cb individual, one way in the form of a radio. And its only ability to communicate to the outside world was either orally through a horn or visually through lights and signals. That was a car. That is not the automobile of the 21st century. The automobile of today that most of us, as were all looking at, you know, getting transportation, the automobile of today is a series of integrated and Autonomous Software sets of capabilities in which a plethora of connectivity to the outside world is occurring at a level we dont understand or have awareness as the operator of the vehicle. Its built into the car in a way that none of us truly know and understand. So think through the so think of the implications of that. Put another way, not just the internet of things, it is it goes to the first part of your question. I have this discussion with my family at times, where i will tell them, so tell me what you think autonomy and privacy means in the digital world. How do we as individuals achieve the degree of autonomy and privacy that were comfortable with. Realizing that the footprints that we are all leaving are growing in the number of footprints, and in the duration. We have really got to step back and ask ourselves what does that mean. So for me, it is things like talking to the work force about you need to think about the social media profile that you are creating. You need to think about the information that you are comfortable sharing with others. Because in the world were living in, and as weve seen over the last several months, the idea that many of the things were doing on the networks and digital world, the increased probability that these will become more readily accessible is a sad consequence in some ways in the world we find ourselves in now. I dont see that phenomenon changing in the near term. Weve got to ask ourselves, what does it mean for us. Both as the leader of an organization, what does it mean for the two organizations that i lead, i think about that as a father, as a husband, with a family, hey what, does that mean. And for myself. We need to step back and think about what does it mean as a nation. And one other thing before a question, just a target of opportunity. I think another challenge that we have got to acknowledge is we find ourselves in a world right now where technology has outpaced the legal and policy frame works that we have in place. Im not trying to argue, is that good or bad. Im trying to say hey, look, folks, weve got to acknowledge, and weve got to ask ourselves, number one, are we comfortable with that. Two, the next question is what is the right level of the second question i think we need to ask ourselves not only are we comfortable, what does it mean. What are the changes, given the incredible rate of technological change. If you take the emotion out, thats at the heart of the encryption discussion right now. Where technology and legal frame works weve had in place are totally mismatched right now. We need to step back and ask ourselves, are we comfortable with that and what are the implications for that. Thanks very much. Thank you, sir. Weve got time for a couple of more questions. This gentleman right here with your hand up. Good morning, sir. You mentioned the dius and placement in Silicon Valley in boston. How does the robust Innovation Community here in maryland, northern virginia, plug into the department of defense so that were also helping to inform decisions about innovation and opportunity. So remember, diux, we often highlight as kind of the most visible manifestation of a broader set of initiatives were trying to execute. I dont want anybody thinking it is the only way were trying to address the challenge of innovation and how does dod interface with the private sector and do it in a much broader way. If my memory is right, and apologize, i havent done it in a few weeks, so i may be wrong. If you go to the dod website on the unclassified side, my memory is that youll see, there is a poll down there, the private sector, how do you connect with dod, and it talks to you about what particular area might you be interested in connecting with. Having said that, i think were all within the government trying to come to grips with the phenomenon of how do we create the mechanisms to go from talking about this to actually doing something. Because im the first to admit, as i always tell the teams i lead, dont ever forget, it is all about outcomes. Weve got to get to outcomes. Whatever were doing ought to be focused on driving us to generating outcomes. Im not interested just to talk about things for the sake of talking about things, as im not interested in introducing technology for the sake of technology. I work, i lead two very technologically focused organizations, many of whom Love Technology for the sake of technology. Ill listen and ill go, very interesting. Im very grateful, but tell me how that ties to a Mission Outcome for us. In the end, dont ever forget, thats why we were created. Thats why the nation invests us in us, and thats who we have to be accountable for. We have to generate outcomes within our abilities. I would suggest that would be a good starting point. I thank you and others for your willingness to do that with the dod. Were the first to acknowledge, we can be a cumbersome, unwielding and Bureaucratic Organization to deal with. I acknowledge that. So it is what can we do working together to try to overcome that. All right oh, water. We have time for one more question. Down front here. [ inaudible question ] in order to increase the standardization of education with the within the various countries in nato. So nato has adopted a policy in which they acknowledge cyberism and operational domain. That was done in the warsaw summit in the summer, as a member of the alliance, United States is one of the 28 nations that are members of the alliance. Very supportive of that idea. We had been working with our nato teammates to try to say, hey, here is whats been our experience, we think it has great applicability, and cyber domain and the alliance came to that decision and announced at the warsaw summit earlier this year. Now, you know, again, as a member of the alliance, now weve got to work our way through, so now that youve recognized that, what is implications. How do you create a work force . How do you create an operational structure . How do you prioritize and define risk . The alliance is working through that and were part of that discussion. Not easy trying to bring 28 nations to consensus is fought always easy, but im very grateful were part of an alliance willing to have those discussions and committed to working its way through it. With that, i want to say thank you all, very much. Remember what cyber maryland is all about. Eco system that we have here in the state. Were proud to be part of the Cyber Command and the National Security agency. How can we Work Together to maximize outcomes. Thats the power. You see that in the guard and reserve effort here in the state. You see that in the academic arena. Colleges as well as high school and below levels. You see that in states trying to do. You see it at what employers and many others, you know. This is an amazing place when it comes to cyber. There is a lot of great capability, a lot of great people. There is a sense of, hey, look, this is important to us as a region. We can do some good things here. I thank you for your willingness to be a part of that. I thank you for your willingness to roll up your sleeves. Ladies and gentlemen, as a state, we have a lot of hard work. It is amazing what you can do with motivated men and women. Thank you all very much. [ applause ] thank you, admiral rogers and thank you for the work you do for the nsa and for the Cyber Command. And can i have another round of applause for admiral rogers. [ applause ] also, i would like to thank dave bitner, thank you for hosting and moderating that session. Thank you. [ applause ] and also, one more recognition for Steve Morrell and andrew sayman. From loyola blake field high school. So were off to a great couple of days here. I just want to make sure that everyone is aware we do have a Conference App and everyone has a chance to download it. Download it to your smartphone, there are instructions on a poster outside or on in the program. If anyone has any questions about it, see some of the event staff. But it is a great way to network. We are going to be communicating any changes or updates to the event. In realtime to the app. Make sure you download it. It is a great networking tool. And have a great couple of days. Thank you for being here with us. And this will conclude this mornings session. Thank you again. [ applause ] cspans washington journal, live everyday, with news and policy issues that impact you. Coming up Tuesday Morning on election day, pedro cortez, pennsylvanias secretary of state, joins us to talk about the preparedness of polling locations and potential voter turnout around the state. Then well talk about Key Senate Races that could determine if democrats end up taking over the majority. Well also discuss early voter turnout. Preparations for election night. And concerns over cyber attacks. Be sure it watch cspans washington journal live at 7 00 a. M. Eastern Tuesday Morning. Join the discussion. With election day tomorrow, American History tv takes a look now at programs produced by past president ial campaigns that aired on National Television the night before the general election. First the program from the 1956 eisenhower campaign. After that, we hear from president Lyndon Johnson in a 1964 broadcast. Later, a look at the 1972 campaign between president Richard Nixon and senator george mcgovern. Road to the white house rewind brip rewind brings you archival coverage of the president ial races. Up next, the 1956 president ial campaign of dwight eisenhower, airing on the eve of the general election, including eisenhower rallies from around the country and remarks from the white house by the president and Vice President nixon. President eisenhower