Transcripts For CSPAN3 National 20240704 : vimarsana.com

CSPAN3 National July 4, 2024

Lisa welcome to the stage board member Vice President of global government relations. Bright light spread hi everyone, that was not very good applause are you all asleep after lunch . Come on. [applause] welcome everyone. It is great to have you here. My honor to welcome you here to the policy summit my name is kristen i run global government relations. I am very proud as well to serve on the board of directors. This is a great crowd we have here today i dont think everyone is all in from lunch everyone is chitchatting a little bit which is okay. We also have a lot of people online. Over 1000 people registered to participate in this. Which is awesome, very exciting that is testament and tech policy today. Its not a surprise or such interest concerning the level of speakers we have today. Its never a dull moment. There is no exception to that right now. This year is been a landmark year for innovation. The generative ai exploding onto the scene and grabbing everyones attention much to some of our dismay here 10 congressional bills each year for the next 10 years. Its an important Inflection Point men of the issues we are working on may truly determine the course of our future. Its a fitting weve taken advantage of the opportunity presented by state conference to bring together smart minds from all different backgrounds, professions and opinions to tackle these topics head on. So today we are going to be taking stock of some that majorr tech policy milestones that have transpired over the past year. We will the ai order known to some of us is the gift who never stops giving. The very people setting the vision for ai in the u. S. Federal government. We will also get an update on how the chips in science act is impacting main streets across america. Cybersecurity ai in particular stand at the forefront of todays digital landscape. Around the world the current state of cybersecurity reflects an evergrowing need for robust measures to safeguard our digital infrastructure. With Cyber Threats and increasingly sophisticated attacks continuing to pull over for a rate including the use of ai the imperative for collaboration viewed the public and private sector has never been more apparent. Which is why it, someone has been the cybersecurity world for many years i will not admit how many infants very large audience. I am thrilled we will hear today from not just one, but two of the worlds most for most Security Leaders this afternoon. I have the pleasure to meet one of them backstage a few moments ago the National Cyber directorate harry coker will be taking the stage momentarily. I have been lucky to have had the opportunity to a tent and host many forms as have you and work with trade associations over the years and i can tell you this event in this organization really do stand apart. Iti is truly comprehensive on tech policy covering the full tech waterfront of policy issues. And truly global. With the tremendous benefit the other 979 Member Companies these Member Companies many of whom are with us here today and the room. Great to see all of you here, welcome it. Our veritable whos who of top tech talent from across the rope so welcome we are glad to have you all here. I want to give a special welcome europe, asia, australia, south america, or anywhere else were really glad youre here with us today as well. Of course this event would not have been possible without the generous support of our sponsors and Member Companies. Let me give special thanks cognizant ericsson, mastercard, meta, organization nielsen sage, salesforce. For their sponsorship of todays program. I will now ask you to silence earphones, turn off your ringers but do not put them away. Well invite you to share the experience with your audiences. Tweet, post, gauge on social media however you would like. As we move through todays program. You will find us on twitter iti underscore tech tweet. Intersect 2024 so go ahead and post away all day long please. Will also be doing digital poles throughout the program you will need your phone to participate in those. You will see instruction showing up on the screen as we go. You will be able to scan the qr code or go to the pigeonholed web address and enter your code to join your submission will be anonymous we appreciate your participation. Set lets get the ball rolling its my great pleasure to welcome jason to the stage is president ceo of iti. Hope enters the keynote speaker. Getting us kicked off hi everybody its so great to see you i cant see any of you that the light were not shining and my face its great to see it we appreciate you taking time to be with us today its exciting days kristen noted we havent asked amazing lineup weve had some terrific speakers we have even more on behalf of the whole iti team thank you so much a ring with us today. Smite great honor to welcome our opening keynote speaker is going to start the intersect off for us. National cyber director harry. Harry is a graduate of the u. S. Naval academy of Postgraduate School in georgetown law center. Director has received numerous accolades from across his many years of service to our nation. Such as a National Intelligence distinguished Service Medal for Exceptional Service he has served as executive director of the nsa. He played a strategic role across the Intelligence Community including extensive experience as well marked by a leadership and digital innovation. And science and technology and n public affairs. Showcases his commitment to excellence and our nation is very lucky he has decided to return to service the cell is 6 feet in washington. I ask you all to please join me National Cyber director harry coker. Good afternoon. I am delighted to be here and thank you, jason for that gracious introduction. He wondered who we were talking about but i will take it. I am excited to join well this afternoon to kick off this event i had a procedure i had my old left knee replaced two weeks ago so i may not build a kick this off in the fashion i would like too. I still cannot get into my dress shoes i hope you will forgive me for wearing air jordans. I heard i need to kick this thing off so i will take the power of any athlete especially the go to get it done. But, and all seriousness im honored to stand before you as a nation the second National Cyber director. Im particularly pleased to be here at the summit you all have been great collaborators were grateful to an organization like iti for helping to create opportunities for engagement that drives meaningful change. At the office of the National Cyber director we like to say engage early and often i will be here early in my tenure. Ive been in the job for a little over seven weeks and i have to tell you i was humbled but also quite excited to be called back to serve. I do not know any position could have brought me out of my second retirement due to the potential to make a Lasting Impact for our nation was an easy decision for me. After 43 years in the navy and the Intelligence Community it truly is a privilege to help new and tribute to the safety and the prosperity of the American People. But one thing you should know about me i love to solve harder problems that was a driving factor in my decision to return to Government Service and to quote the goat Michael Jordan obstacles dont have to stop you. If you run into a wall dont turn around and give up figure out how to climate and go through it or work around it. Our problems do energize me i grew up as a cold or sailor in the navy when our nations face the hard problem with the soviet union. Part of the Intelligence Community i was extremely proud to take on what we now refer to as the great power competition. Part of my contribution to those efforts included incorporating the open source enterprise into the agencies and into the centers. All of those challenges were hard with cybersecurity is a different kind of a hard problem. That stems from the threat which is very real and persistent. One example amongst many is the threat from the peoples republic of china. Last week i had the honor of testifying in front of the House Select Committee to focus on the Chinese Communist party with my colleagues from across the federal government in particular. Assistant director easterly fbi director wray my friend and former boss recently retired commander of u. S. Cyber command and director. It was an important moment for us to appear together to articulate the full measure of the threat posed by china. And to demonstrate coherence and collaboration across our federal enterprise. Cyber actors from the peoples republic of china are actively working to gain access into our nations Critical Infrastructure systems with the purpose of disruption or worse, destruction. In the early stages of Armed Conflict they want to disrupt our militarys ability to mobilize and to impact the systems that allow us to thrive in our increasingly digital world. Their intention is to drive home a point so many of us have known for years. In cyberspace and the private sector as well as the American People themselves are on the front lines. And as we all know the vast majority of Critical Infrastructure in our nation is owned and operated by the private sector. Folks, protecting and defending america from a growing number of Cyber Threats is a hard problem. Ensuring the short and longterm protections of a defense and resilience of the systems that underpin our increasingly digital way of life is a hard problem. In ensuring internet remains open, free, global and operable and importantly secure anchored in universal values that respect human rights and fundamental freedoms is a hard problem. Harder still is what we do about it. After all belligerent states have postured their military forces aggressively for millennia. America said plenty of success lastminute domain of cyberspace but as we said last week the risk we face within the cyberspace today is unacceptable. There are plenty of actions that we have, can, and will take to address counters normative behavior and the necessity to partner with so many of you in this room is absolute essential. How do we collectively how do we take the talent your organizations and channel our collective energy toward countering the growing number of malicious actors. How do we collectively the technology to create and make sure they are source how do we truly help local governments one of the more than 50000 public Water Systems spread across our great nation. Thankfully the present has started sat on the right foot. From the very beginning of this administration present by the mid cybersecurity priority. He brought in some outstanding people and some of them will be with you here today. My dear Friend National security advisor at the National Security council who will join you all later this afternoon has made incredible progress. 14028 pushing for the creation of cyber trust. And i would be remiss if i did not mention my white house colleague kobe, South Carolina but currently the director public engagement. Youll see him this afternoon for his outreach on behalf of the administrations key to strengthening our partnerships and delivering outcomes. At oh ncd we have been lucky to have had chris english setter organization on the right course. We were champions of this office and our mission. I am proud and lucky to build upon the foundation those two leaders said for us. We are also standing on the shoulders and the wisdom of the office of cyber director in 2021 following a recommendation by the cyberspace solarium commission. I was pleased to meet with many of those commissioners last week. I did tell you their insight continues to be a great value to me and frankly to all of us. Leaders note you cannot tackle hard problems. Good old fashion grip. And i am hopeful this group has heard quite a bit about the National Cybersecurity strategy. The two bold shifts. Number one, shifting the responsibility away from individuals and Small Businesses and onto the larger institutions capable of bearing more responsibility in cyberspace. A number to a real lighting incentives to favor longterm investments in cybersecurity. That has been said before and i agree with that but allow me too share my take on this important strategy. Its bold because the underlying vision and the tenacity. The work of the off it sets out explicitly the hard problems wee had to solve and takes them head on. The strategy says we have to take problems the fact the insured was built on insecure foundations. We are finally implementing improvements through the border gateway protocol. Accountable when that russian rh insecure code to market. We are working with the Academic Community and legal expert to explore different liability regimes. Will soon be engaging with you for the private sector perspective. Thats smart regulations minimize compliance burden on companies. We are one of partners across inter agencies to harmonize requirements using the feedback many of you have already provided us in response to our request for information. The strategy says we need and diverse and robust Cyber Workforce to meet the challenge of this decisive decade. We are working aggressively to foster ecosystems across the nation to fill the more than half a million cyber jobs that are available today. Too that end i have already been to a job fair and career event and thrilled to have heard from an incredible array of students, faculty and employers. Its great to see it weve made progress. Some employers that had not visited that institution before and came away impressed rowing to follow up on that. Well be doing events across the country exposing people to opportunities. But every one of the problems i have mentioned his heart in its own right. Each of the ones i mentioned has been studied for decades. Each remained pernicious but unresolved. What makes National Cybersecurity strategy bold is its clarity. One seem to complicate our precisely what we need to tackle to seize the initiative my predecessors made a clear commitment to transparency and accountability by publishing the National Cybersecurity implementation plan. Act as a former Program Manager i found it impressive as i come to watch the team put the shoulder to the real every day across inter agency. Trust is openness. We commit to you when we report on our progress not just where we succeeded but where we came up short. With the intent of getting better. In the coming months you will see the reports on the efforts to date in the next phase of the strategies of limitation. And i will say one additional thing for the implement strategy and plan. Policy solutions are not selfexecuting. It is true developing solutions to the hard problems in cyberspace is a fundamental responsibility of our office but so is carrying them to fruition. Thankfully i am not alone there are 80 incredible patriots that i get to work with every day. Experts who hail from the industry, civil society, federal agencies in capitol hill. Their work includes putting the good ideas and powerful solutions to thoughtful strategy into practice to improve the Digital Foundation of this nation and to make our nation safer. I am excited about the work the talented staff is leading on the open Research Problem of software measurability that makes it difficult to understand the quality of code we use. 2016 newspaper we are continuing to make progress on. Are also pushing government and private sector coders to ensure secure by design incorporates memory safe programming languages. Some of the most dangerous vulnerabilities that criminals look to exploit our memory safety bugs and memory safe coding languages to prevent those errors from ever making into production and yes developers have been slow to adopt them even though many have existed for years. In the coming weeks you will see us put out a paper that addresses memory safety and software measurability. Additionally we are developing guidance to help agencies eliminate un necessary degree requirements for contacting cybersecurity positions. While this has been mandated for years its another tough challenge that has yet to be fully implemented. In many cases it turns out implementing the solution is the hardest part of all. That will take partnership the first shift in the strategy is about rebalancing responsibility in cyberspace to the most capable actors. That means the government, yes, it also means all the organizations represented in the rooms today and all of you. Make sure the cloud improves cybersecurity takes Meaningful Partnership to stop adversaries from using our own systems. As home or Office Routers to launch their attacks. To bring coherence to the federal Mission Coordination to unwind the sea of licenses agencies deal with on a daily basis. It will take Innovative Partnership in your technological knowhow to Scale Solutions that protect pipelines delivering gas to homes in minneapolis or to a hospital with lifesaving care in my hometown. It will not be easy and that is why the National Cybersecurity strategy is our northstar. I appreciate its t

© 2025 Vimarsana