Transcripts For CSPAN3 National 20240704 : vimarsana.com

CSPAN3 National July 4, 2024

Lisa welcome to the stage please welcome to the intersect stage, iti board member and Vice President global Government Relations at meta. Hi, everyone. That wasnt a very good applause. Are yall asleep after lunch . Come on. Welcome, everyone. Its good to have you here and my honor to welcome you to the Second Annual intersect tech and policy summit. My name is kristin and i run global Government Relations for and i am proud to serve on the iti board of directors. This is a great crowd that we have here today. I dont think everyone is in from lunch and everyone is chitchatting the bit, which is okay, but we also have a lot of people online and over 1000 people registered to participate, which is awesome. Very exciting and i think that testament to all that is currently happening on tech policy. It is his eyes. There is never a dull moment in the world of tech and no exception to that right now. Technology continues to evolve as it always does. This year has been a landmark year for innovation. Generative ai exploding and grabbing everyones attention. Did i hear at lunch that 10 congressional bureaus bills each of the next 10 years . Somehow, it seems to me that they are an important inflection point. Many issues we are working on may truly determine the course of our future. It is fitting that we have taken advantage of the opportunity presented by the States Conference to bring together smart minds from all different backgrounds, professions and opinions to tackle these topics headon. Today, we are going to be taking stock of some of the major tech policy milestones that have transpired over the past year. We discussed the biden ai executive order mensa many of us as the gift that never stops giving. The very people setting the vision for ai in the u. S. Federal government. We will also get an update on how the chips and science act is impacting main streets across america. Cybersecurity and ai stands as a forefront of todays digital landscape. Around the world, the current state of cybersecurity reflects an evergrowing need for robust measures to safeguard our digital infrastructure. With Cyber Threats and increasingly sophisticated attacks continuing to proliferate, including through the use of ai, the imperative for collaboration between the public and private sectors has never been more apparent. As someone who has been in the cybersecurity world for many years, i will not admit how many in front of this large audience, but for not just one, but two of the worlds foremost cybersecurity leaders this afternoon. I had the pleasure to meet one of them backstage a few minutes ago. He will be taking the stage momentarily. I have been lucky to have had the opportunity to attend and host many tech forms as have many of you and work with trade associations over the years and i can tell you that this event and organization really does stand apart. Iti is truly comprehensive on tech policy and covering the full tech waterfront of policy issues. Truly global. Tremendous benefits and the other 79 member companies. These companies, many of whom are here today in the room. Great to see you. Welcome. Our veritable whos who of top talent from around the world. Welcome. We are glad to have everyone together in one place. I also want to get a welcome to our virtual audience who is joining us online to our friends in europe, asia, australia, south america or anywhere else. We are glad you are here with us today, as well. Of course, this would not have been possible without the generous support of sponsors and member companies, so let me give thanks to amazon, cisco systems, cognizant, erickson, mastercard, meta , my own organization, sage, salesforce and siemens for their sponsorship of todays program. I will ask you to censor the internet curators, but dont put them away. We will invite you to share the intersect experience with your audiences. Tweets, post and engage in social media however you like as we move through the programming. You will find us on twitter at iti and hashtag, the intersect 2024. Post away all day long, please. We will also be doing digital polls throughout the program and you will need the phones to participate. You will see instructions showing up on the screen as we go, which you can see and you will be able to scan the qr code or go to the web address and enter code to join. Your submissions will be anonymous and we appreciate your participation. Lets get the ball rolling. If my great pleasure to welcome jason to the stage. He is the president and ceo of iti, fearless leader and will be introducing our opening keynote speaker for jason. [ applause ] thank you for getting us kicked off. It is so good to see you. If the light were shining in my face, it would be great to see you and we really appreciate you taking time to be with us today but it is exciting and we have an amazing lineup and we have already had a terrific and great speakers. We have more to come on behalf of the whole team, so thank you so much for being here with us today. It is now my great honor to welcome our opening keynote speaker who will start the intersect off for us today. The National Cyber director harry coker. He is a graduate of the u. S. Naval academy, Postgraduate School and the Georgetown University law center. He has received numerous accolades from across his many years of service to our nation, such as the national until it Service Medal for Exceptional Service and he has served as the executive director of the nsa and also played a strategic role across the Intelligence Community including sense of experience at cia, as well and marked by leadership in Digital Innovation, signs and allergy and public affairs. He showcases his commitment to excellence and our nation is very lucky that he decided to return to service as National Cyber director. This is his first speech in washington since being confirmed general, so i ask you all to please join me in welcoming to the intersect stage, National Cyber director harry coker. Good afternoon. Delighted to be here. Thank you, jason, for that introduction. It made me wonder who he was talking about, but i will take it. I am excited to join you all this afternoon to kick off the event and from my eyes, cane, shoes and procedure not long ago, i had my left knee replaced two weeks ago, so i may not be able to kick it off in the fashion i would like to. I still cant get into my dress shoes, so i hope you forgive me for wearing air jordans. I heard i need to kick this thing off, so i will take the power of any athlete, especially the goat to get it done. In all seriousness, i am honored to stand before you as the nations second National Cyber director and i am particularly pleased to be here at itis intersect summit. You have all been great collaborators and we are grateful to an organization like iti for helping to create opportunities for engagement and to drive meaningful change. At the office of the National Cyber director, we like to say to engage early and often. I am in here early in my tenure. I have been in the job for a little over seven weeks. I have to tell you that i was humbled, but also excited to be called back to serve. I dont know that any other position could have brought me out of second retirement with this one due to the potential to make lasting impacts for our nation and it was an easy decision. After 43 years in the navy and Intelligence Community, it truly is a privilege to help a new and Critical Office contribute to the safety and prosperity of the American People. One thing you should know about me is that i love to solve problems, which is the driving factor in my decision to return to Government Service and to begin to quote michael jordan, obstacles dont have to stop you. If you run into a wall, dont turn around and give up, but figure out how to claim it, work through it and get around it. I grew up as a cold war sailor in the navy when our nation faced hard problems of the soviet union. As part of the Intelligence Community, i was extremely proud to take on what we refer to as the great power competition. As part of my contribution to those efforts included in incorporating the open center prize into the agencys director and Digital Innovation and integrated into the mission centers, all of those challenges were hard, but cybersecurity is a different kind of heart problem. It stems from the threat, which is very real and persistent. One example amongst many is the threat from the people of republic of china. Last week, i had the honor of justifying in front of the House Select Committee to focus on the Chinese Communist party with my colleagues from across the federal government in particular and assistant director, fbi director ray and my friend and former boss, who are recently retired u. S. Cyber command. It was an important moment for us to appear together to articulate the full measure of the threat posed by china and to demonstrate coherent collaboration across our general enterprise. They are actively working to gain access into our nations Critical Infrastructure systems with the purpose of disruption or worse, destruction. In the early stages of armed conflict, they want to disrupt our military ability to mobilize and impact the systems that allow us to thrive in our increasingly digital world. Their intention is to drive home with points that so many of us have known for years. In cyberspace, the private sector and American People themselves are on the front lines. As we all know, the vast majority of the Critical Infrastructure our nation is owned and operated by the private sector. Folks, protecting and defending america from the growing number of separate threats is a hard problem. Ensuring the short and longterm production, defense and resilience of the systems that underpin our increasingly digital way of life is a hard problem and ensuring that the internet remains open and free, global, interoperable, reliable and importantly secure and anchored in University Values that respect human rights and fundamental freedoms is a hard problem. It is what we do about it it after all, they have postured their military forces are aggressively for millennia. America has played success and hostile actions outside of the main cyberspace, but as we said last week, the risk we face within the cyberspace today is unacceptable. There are plenty of accidents that we have can and will take to address normative behavior, then the necessity department with so many of you in the room is essential. How do we collectively Sees Initiative from our adversaries . How do we take the talent at organizations and challenged cello are growing number of malicious actors . How do we collectively leverage the amazing technologies you create, which improve the ways that we work, live and play and enjoy that they are a source of strength and not vulnerability. Not just a vulnerability to your companies or federal government, but how do we truly help local government, schools or hospitals working to protect themselves. One of the more than 50,000 public Water Systems spread across our great nation. Thankfully, the president started on the right foot. From the very beginning of the administration, President Biden cybersecurity priority. He brought in outstanding people and some of them will be here with you today. My dear friend and National Adviser at the National Security council will join you all later this afternoon as incredible progress from driving the development of the 14028 two pushing for the creation of several trust cyber trust. My white house colleague mayor steve benjamin, from columbia supplemented and currently the director of Public Engagement and you will see him this afternoon, but his outreach on behalf of of his administration is key to strengthening our partnerships and delivering outcomes. We have been lucky to have had them set up organizational course. True champions of this office and our mission. I am proud and lucky to build upon the foundation that those two leaders set for us. We are also standing on the shoulders and let them of congress and who established the cyber director in 2021 following a recommendation by the cyberspace commission. I was pleased to meet with many of those commissioners last week. I can tell you that there inside continues to be great value to me and all of us. Leaders know that you cant tackle hard problems without good people and it also takes a good plan and some good Old Fashioned grit. I am hopeful that this group has heard quite a bit about the National Cyber Security Strategy and the bold shifts that it caused corporate. Shifting responsibility from individuals and Small Businesses and onto the larger institutions capable of bearing more responsibility on cyberspace. Realigning incentives to favor longterm investments in cybersecurity. That has been said before and i agree with this, but allow me to share my take on this important strategy. Its bold because of the underlying vision and tenacity of the work that the office sets out explicitly with heart problems that we have to solve and it takes them headon. This tragedy says, we have to take problems like the facts that the internet was built on insecure foundation, so we are finally in plummeting improvements to the border gateway protocol. The strategy says that we need to hold Software Manufacturers accountable when they rush insecure code to market. We are working with Academic Community and legal experts to explore different liability regimes. We will soon be engaging with the secure the private sector perspective. This tragedy says that regulations minimize the compliance burden on companies. We are working with partners across the interagency to harmonize requirements and using feedback that many of you have already provided us in response to our request for information. This tragedy says that we need to develop a diverse and robust National Cyber workforce, which can be a challenge this decade. We are working aggressively to build and foster ecosystems and in communities across the nation to more than half 1 million cyber jobs that are available today. To that, i have already been to a job fair event at the committee college of Baltimore County and im thrilled to have heard from an incredible array of students, faculty and employers. It was great to see and we made progress. We had some employers that had not visited the institution before, so we will follow up and be doing some events across the country and exposing people to opportunities. Every one of the problems that he mentioned his heart and its all right. Each of the ones i mentioned has not been studied for decades. Each remains unresolved. What makes the National Cyber Security Strategy bold is the clarity that the hard problems issued once themed too complicated are precisely what we need to tackle in order to achieve the initiative from adversaries that will do our nation harm. My predecessors made a clear commitment to transparency and accountability by publishing the National Cyber security Implementation Plan and act as a former Program Manager and i found that it impresses as i have come to watch the team and put the shoulder to the real every day with our counterparts across the agency. Trust is built on openness. We commit to you that when we do report on our progress, you will hear not just where we succeeded, but where we came up short with the intent of getting better. In the coming months, you will see the reports on the efforts to date and the next strategies implementation. I will say one additional thing about this tragedies strategies and petition plans. Policy solutions are not executing. The problems to cyberspace is a fundamental responsibility of our office, but so is carrying them to flourish in. Thankfully, im not alone. There are 80 and cripple patriots that i get to work with every day and experts who hail from the industry, civil society, federal agencies and capitol hill. Their work includes putting the good ideas and powerful solutions, thoughtful tragedy into practice to improve the Digital Foundation of this nation and to make our nation safer. Im excited about the work that is leading on the open resource that makes it difficult to understand the quality of code that we use. That work has a 2016 miss paper that we are continuing to make progress on. We are also pushing government and private sector coders to ensure secure by design and incorporate memory safe programming languages. Some of the most dangerous vulnerabilities that criminals look to exploit our memory safety bugs and memory safe coding languages that prevents errors forever making introduction. Developers have been slow to adopt them, even though they have existed for years. In the coming weeks, you will see us put out a paper that addresses memory safety and software measurability. Additionally, we are developing guidance to help agencies eliminate unnecessary degree requirements contracting cybersecurity positions. While this has been mandated for years, it is another t

© 2025 Vimarsana