[House Hearing, 112 Congress]
[From the U.S. Government Printing Office]
THE DHS CYBERSECURITY MISSION: PROMOTING INNOVATION AND SECURING
CRITICAL INFRASTRUCTURE
=======================================================================
HEARING
before the
SUBCOMMITTEE ON CYBERSECURITY,
INFRASTRUCTURE PROTECTION,
AND SECURITY TECHNOLOGIES
of the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED TWELFTH CONGRESS
FIRST SESSION
__________
APRIL 15, 2011
__________
Serial No. 112-19
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC] [TIFF OMITTED]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PRINTING OFFICE
72-229 WASHINGTON : 2011
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY
Peter T. King, New York, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Daniel E. Lungren, California Loretta Sanchez, California
Mike Rogers, Alabama Sheila Jackson Lee, Texas
Michael T. McCaul, Texas Henry Cuellar, Texas
Gus M. Bilirakis, Florida Yvette D. Clarke, New York
Paul C. Broun, Georgia Laura Richardson, California
Candice S. Miller, Michigan Danny K. Davis, Illinois
Tim Walberg, Michigan Brian Higgins, New York
Chip Cravaack, Minnesota Jackie Speier, California
Joe Walsh, Illinois Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania Hansen Clarke, Michigan
Ben Quayle, Arizona William R. Keating, Massachusetts
Scott Rigell, Virginia Vacancy
Billy Long, Missouri Vacancy
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Mo Brooks, Alabama
Michael J. Russell, Staff Director/Chief Counsel
Michael S. Twinchek, Chief Clerk
I. Lanier Avant, Minority Staff Director
------
SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY
TECHNOLOGIES
Daniel E. Lungren, California, Chairman
Michael T. McCaul, Texas Yvette D. Clarke, New York
Tim Walberg, Michigan, Vice Chair Laura Richardson, California
Patrick Meehan, Pennsylvania Cedric L. Richmond, Louisiana
Billy Long, Missouri William R. Keating, Massachusetts
Tom Marino, Pennsylvania Bennie G. Thompson, Mississippi
Peter T. King, New York (Ex (Ex Officio)
Officio)
Coley C. O'Brien, Staff Director
Alan Carroll, Subcommittee Clerk
Dr. Chris Beck, Minority Subcommittee Director
C O N T E N T S
----------
Page
Statements
The Honorable Daniel E. Lungren, a Representative in Congress
From the State of California, and Chairman, Subcommittee on
Cybersecurity, Infrastructure Protection, and Security
Technologies:
Oral Statement................................................. 1
Prepared Statement............................................. 2
The Honorable Yvette D. Clark, a Representative in Congress From
the State of New York, and Ranking Member, Subcommittee on
Cybersecurity, Infrastructure Protection, and Security
Technologies................................................... 3
Witnesses
Mr. Sean McGurk, Director, National Cybersecurity and
Communications Integration Center, Department of Homeland
Security:
Oral Statement................................................. 5
Prepared Statement............................................. 7
Mr. Gerry Cauley, President and CEO, North American Electric
Reliability Corporation:
Oral Statement................................................. 15
Prepared Statement............................................. 16
Ms. Jane Carlin, Chair, Financial Services Sector Coordinating
Council:
Oral Statement................................................. 20
Prepared Statement............................................. 22
Mr. Edward Amoroso, Senior Vice President and Chief Security
Officer, AT&T:
Oral Statement................................................. 34
Prepared Statement............................................. 35
THE DHS CYBERSECURITY MISSION: PROMOTING INNOVATION AND SECURING
CRITICAL INFRASTRUCTURE
----------
Friday, April 15, 2011
U.S. House of Representatives,
Committee on Homeland Security,
Subcommittee on Cybersecurity, Infrastructure Protection,
and Security Technologies,
Washington, DC.
The subcommittee met, pursuant to call, at 10:08 a.m., in
Room 311, Cannon House Office Building, Hon. Daniel E. Lungren
[Chairman of the subcommittee] presiding.
Present: Representatives Lungren, McCaul, Meehan, Marino,
Clarke, and Richardson.
Mr. Lungren. The Committee on Homeland Security
Subcommittee on Cybersecurity, Infrastructure Protection, and
Security Technologies will come to order.
I apologize for being a few minutes late. We had a special
Republican Conference.
We are supposed to have votes at 10:15 and then at 11:15
and then at 12:15. So we will be bopping back and forth between
those. Actually, they are single votes, I think, so we can come
right back after that. So I apologize to our panel.
We have had a slightly different schedule so that we would
not have interrupted hearings, but today is a little bit of a
different day. We are only going to vote on visions of the
budget for this coming year and the next 10 years, and this
week we get to talk about trillions instead of billions. So it
is just small votes that we have got today. I am sorry that
that will take us away, but I do thank you for being here.
Today, the subcommittee will examine the relationship
between the Department of Homeland Security and the owners and
operators of critical infrastructure. What is working well,
what could be done better, and how to improve in the future.
So we are meeting today to hear testimony from Sean McGurk,
the Director of National Cybersecurity and Communications
Integration Center, or NCCIC--once we start with all these
initials, it gets confusing, so I will try to stay away from
that as much as possible--Gerry Cauley, President and CEO of
North American Electric Reliability Corporation; Jane Carlin,
Chair of the Financial Services Sector Coordinating Council;
and Dr. Edward Amoroso, the Senior Vice President and CSO of
AT&T.
This is an important hearing, so important I had a nice
long statement. But because of the time that we have, I will
have my statement entered for the record and recognize my
Ranking Minority Member of the subcommittee, the gentlelady
from New York, Ms. Clarke, for any statement she may have.
[The statement of Mr. Lungren follows:]
Prepared Statement of Chairman Daniel E. Lungren
April 15, 2011
Welcome to the second in our series of cybersecurity hearings.
Today's hearing will focus on ``the Department of Homeland Security's
Cybersecurity Mission.''
Homeland Security Presidential Directive 7, issued on December 17,
2003 outlines our National policy for Federal departments and agencies
to partner with the private sector to identify and prioritize United
States critical infrastructure and key resources and to protect them
from terrorist attacks. The Secretary of Homeland Security was given
the responsibility for ``coordinating the overall National effort to
enhance the protection of the critical infrastructure,'' whether owned
and operated by the public or private sector. With the private sector
owning more than 80% of the Nation's critical infrastructure, the DHS-
Private Sector relationship is crucial.
As stated in our previous subcommittee hearing on March 16,
information networks and computer systems face a combination of known
and unknown vulnerabilities, strong and rapidly expanding adversary
capabilities, and a lack of comprehensive threat and vulnerability
awareness. A successful attack on our power grid or our communications
networks could not only cripple our economy but threaten our National
security.
Under current law the vast majority of critical infrastructure fall
outside the Department's direct cybersecurity regulatory authority.
Under the Homeland Security Act of 2002, the Department was authorized
to provide, upon request, analysis and warnings related to threats and
crises management support to private sector owners and operators of
critical information systems. They can also provide technical
assistance to the private sector with respect to emergency recovery
plans when responding to major failures of critical information
systems. The Department does not have the ability to require the
private sector use of any particular cybersecurity processes or tools.
In this environment of ever-changing technology and innovation, I
believe this is sound policy.
It is important to note that just because the Department can not
directly regulate the cybersecurity requirements of various sectors
that the private sector is completely unregulated. The electric power
sector has had mandatory cybersecurity standards in place since 2008
and Sarbanes Oxley Act requires all publically traded companies certify
that they have proper internal controls in place on their financial
accounting systems. This requirement, in essence, equates to requiring
proper cybersecurity in their IT/Finance systems.
Without direct regulatory authority, the Department exercises much
of its responsibility for securing private critical infrastructure as a
coordinating agent. The Department has established a number of
cybersecurity functions and services to help in its role as
coordinator. The National Cybersecurity and Communications Integration
Center (NCCIC) enables the Department to bring together its Federal
partners as well as members of the private sector to integrate
information and provide the focus of cybersecurity operations for the
entire Federal Government. I was privileged to be invited to the
ribbon-cutting ceremony for this cybersecurity and communications
integration center which we all hope will become the model for a
successful public-private cybersecurity partnership.
The public-private partnership remains a key part of the Nation's
efforts to secure and protect its critical cyber-reliant
infrastructure. While criticized by some, it is still evolving since
its inception a decade ago. Because of the leadership of NPPD Under
Secretary Rand Beers and Deputy Secretary Phillip Reitinger, the
Department has strategically positioned cybersecurity resources and
assets in an effort to develop a more trusted and mutually beneficial
public-private partnership that is needed to defend cyberspace. Without
ownership, partnership is the next best thing for promoting
cybersecurity and protecting our critical infrastructure. If properly
developed and implemented, the public-private partnership cybersecurity
model can be leveraged to improve the culture of security and the
willingness of the private sector to make the necessary investments to
secure their critical infrastructure.
With all this cyber expertise, is the Department making a real
difference in defending critical infrastructure? Are they protecting
Government and private sector cyber space and responding effectively to
cyber attacks? Are they assisting the private sector in detecting,
defending, and recovering from cyber attack? Is the Department making
available to its partners the critical threat information they need to
protect their networks?
Today we will hear from the Homeland Security Department and a
number of key economic sectors, whose critical infrastructure is vital
to maintaining our robust economy, on how this public-private
partnership is progressing.
I now recognize the Ranking Member Ms. Clarke for her opening
statement.
Ms. Clarke. Thank you very much.
Good morning and thanks to all of our witnesses for
appearing before us today. I would like to thank you, Chairman
Lungren, for holding our second hearing on cybersecurity this
session and for your intention to move expeditiously on what I
know we both recognize as a critical issue. I know Mr. Lungren
takes this responsibility as seriously as I do, and I look
forward to partnering with him again over these 2 years to
ensure the safety and security of the American people, American
businesses, American infrastructure, and the American way of
life.
Today's hearing will focus on our critical infrastructure
sectors, their cybersecurity posture, and the DHS role in
helping them to be as secure and simultaneously as open and as
efficient as possible.
We rely on information technology in every aspect of our
lives, from our electric grid, financial and communication
systems, and Government functions, to name just a few that our
witnesses here today represent. Interconnected computers and
networks have led to amazing developments in our society.
Increased productivity, knowledge, services, and revenues are
all benefits generated by our modern, networked world.
But in our rush to network everything, few stop to consider
the security ramifications of this new world we are creating;
and so we find ourselves in a very vulnerable situation today.
As I stated at our last hearing, too many vulnerabilities exist
on too many critical networks which are exposed to too many
skilled attackers who can steal from or damage too many of our
systems. Unfortunately, to this day, too few people are even
aware of these dangers, and fewer still are doing anything
about it.
This committee will continue to discuss and examine these
issues in an attempt to raise awareness of the problems we
face, and we hope to identify and implement practical and
effective solutions. There is a very real and significant
threat to our National and economic security that we now face
in cyberspace, and we must do something equally real and
significant to meet this challenge.
As I noted at our hearing last month, we are expecting that
this committee is eager to see a National cybersecurity
strategy from the White House to be released very soon. I also
stated at our last hearing that the Department is finalizing
its National security incident response plan and will also
include a cybersecurity strategy, as called for in the 2010
Quadrennial Homeland Security Review.
Mr. McGurk I hope to hear some good news from you on these
items, because we can't keep waiting for these things. The
Congress is interested in moving legislation to afford DHS the
authority it needs to protect the dot-gov domain and critical
infrastructures in the private sectors. Hopefully, we are
downplaying these Government shutdown games here in Congress,
and we will get on to the business that our constituents
elected us to do.
This cybersecurity issue is complicated, and no one entity
or approach will work. I firmly believe that the U.S.
Government and the private sector must be full partners in this
effort; and both must accept their share of burden,
responsibility, and cost of our combined security.
The intention behind this hearing is to focus on the
protection of the critical infrastructures that sustain our
lives and our economy. These infrastructures are under constant
attack. Cybercrime alone costs this country billions of dollars
a year. We know that our Government networks are attacked tens
of thousands of times per day, and private sector networks are
attacked even more often. We know that our critical
infrastructures are already compromised and penetrated. We need
to absorb this information, get up to speed quickly, and move
forward to address this issue. We have to start protecting
ourselves before an attack big enough to cause irreparable
damage is carried out.
To the witnesses appearing before us today, I thank you for
being here, and I welcome your thoughts on the issues before
us, including what you think an effective National
cybersecurity policy should look like and especially the
critical details needed to make this public-private partnership
work. Chairman Lungren and I intend for this subcommittee as
well as the full committee to play a leading role in shaping
our National cyber posture in the years to come.
Finally, I would like to thank Dr. Chris Beck for his hard
work on behalf of this subcommittee. Dr. Beck has worked
tirelessly on chemical security legislation. He will be leaving
the subcommittee and will be missed.
Thank you, Mr. Chairman; and I yield back.
Mr. Lungren. Thank you very much.
I appreciate the comments, and I would echo the statements
that you made about Dr. Beck. I know he will still be around in
town, and we will be able to see him.
Other Members of the committee are reminded that their
opening statements may be submitted for the record.
We are now pleased to have a very distinguished panel of
witnesses before us on this important topic.
Sean McGurk has over 32 years of experience in advanced
systems operations and information systems security. He joined
DHS in 2008 after a full career in the Navy. He was named
Director of the Control System Security Program and led the
Industrial Control Systems Computer Emergency Response Team
prior to leading NCCIC. NCCIC is a 24-by-7 integrated
cybersecurity and communications operation center, providing
indications and warnings of incidents through cross-domain
situational awareness. It is a hub of information sharing
amongst various Government agencies as well as private-sector
stakeholders.
Gerry Cauley is President and Chief Executive Officer of
the North American Electric Reliability Corporation.
Previously, he served as President and Chief Executive Officer
of the SERC Reliability Corporation, a nonprofit corporation
responsible for promoting and assessing the reliability and
critical infrastructure protection of the bulk power system in
16 southeastern and central States.
Prior to that, Mr. Cauley worked for NERC for 10 years in
positions of increasing responsibility, ultimately as Vice
President and Director of Standards. He was instrumental in
preparing NERC's application to become the electric reliability
organization and spearheaded their development of an initial
set of standards to ensure the reliability of the bulk power
system in North America.
He is also a lead investigator of the August, 2003,
northeast blackout and coordinated all aspects of the NERC Y2K
program, supervising the reporting and readiness of 3,100
electric organizations in the United States and Canada.
Jane D. Carlin, Chair of the Financial Services Sector
Coordinating Council for Critical Infrastructure Protection and
Homeland Security. But in her spare time she is Managing
Director of Morgan Stanley and Global Head of Operational Risk
Management, Business Continuity, Information Security, and Risk
and Insurance Management.
Ms. Carlin has concentrated on legal and risk issues in
banking and investment banking related to international and
domestic securities, derivatives, and commodities as well as
foreign exchange. She received her J.D. from Benjamin Cardoza
School of Law and her B.A. from the State University of New
York at Stony Brook.
Dr. Edward Amoroso is presently Senior Vice President and
Chief Security Officer for AT&T, where he is directly
responsible for managing the day-to-day information, computer,
and network security protection of AT&T's vast global
infrastructure. He and his team of security engineers,
developers, researchers, and consultants design and manage all
security policy, security regulatory issues, scanning,
firewall, intrusion detection, data fusion, anti-virus, anti-
spam, instant response, emergency response, and other
protection systems for the corporation and its customers. He
also directs the design and development of AT&T's rich
portfolio of managed and customized security services for
business and Government clients.
We would ask each of you to try to limit your remarks to
about 5 minutes. We have your prepared remarks. They will be
entered in as a part of the record.
As I say, we probably will have to break and go and vote
and then come back. I am going to see if we can get the opening
statements finished before we have to go vote.
So, Mr. McGurk, you are asked to please give us your best
shot for 5 minutes.
STATEMENT OF SEAN MCGURK, DIRECTOR, NATIONAL CYBERSECURITY AND
COMMUNICATIONS INTEGRATION CENTER, DEPARTMENT OF HOMELAND
SECURITY
Mr. McGurk. Thank you Chairman Lungren, Ranking Member
Clarke, and distinguished Members of the committee. My name is
Sean McGurk, and I thank you for those kind opening words and
introduction.
I also thank you for inviting me to be part of this very
distinguished panel of experts to discuss the challenges
associated with innovation and securing critical
infrastructure.
Recently, Deputy Under Secretary Reitinger testified before
this panel, and the Department greatly appreciates the support
and the guidance that we have been receiving in completing our
essential mission.
As several of the distinguished Members of the committee
have already mentioned, the cyber environment is not a
homogenous environment under a single department, agency, or
private-sector entity. The National Infrastructure Protection
Plan identifies the 18 sectors of the critical infrastructure,
each being unique and diverse. In fact, in many facilities, two
operating plants under the same control of an organization have
completely different network environments. We rely on these
continuously available services for our vast way of life and
the interconnected critical infrastructure to sustain those.
Successful cyberattacks against these systems could potentially
result in a physical damage or loss of life.
We face many challenges--strong and rapidly expanding
adversary capabilities, a lack of comprehensive threat and
vulnerability awareness--and in these efforts we must support
our private-sector partners in securing the systems and
themselves against these malicious activities.
The Government does not have all the answers, so we must
work closely with the private sector to ensure that we have
identified the vulnerabilities and the risks to the critical
infrastructure. There is no one size fits all. There is no
cyber Maginot Line that will enable us to provide security
across the board.
What I have learned in my experience both in the United
States Navy and as a member of the Department in over 34 years,
it is not all about 10-pound brains or bigger guards, gates,
and guns that gets the job done. It is about involving a very
broad audience and sharing information and building a
collective body of knowledge. We must leverage the Government's
expertise and our access to information, including classified
data, along with industry-specific needs, capabilities, and
timelines. Each partner has a role to play and a unique
capability that adds value to the team.
In a recent example involving two-factor authentication, we
worked closely with our law enforcement partners to identify
and hopefully potentially prosecute those responsible. We
worked with the intelligence community and the military to
attribute the activity and also to provide defensive capability
and potential pursuit.
The Department of Homeland Security's primary focus is on
mitigation and risk protection of systems, working closely with
the private sector. In this particular example, we have
representatives from the financial sector, the communications
sector, the energy sector, and the IT sector working on a broad
mitigation strategy to aggressively address those challenges.
We are looking to prepare, prevent, respond, recover, and
restore in the Department's role.
Coordinating a National response under the National cyber
incident response plan enables us to bring these private-sector
partners to the table and their subject matter expertise to
determine the ``what'' and the ``how'' to protect these
networks and not necessarily worry about the ``who'' and the
``why'' until much later.
The NCCIC closely works with all Government agencies and
the private sector through our partnership model. We have
representatives from the Communications Information Sharing and
Analysis Center, along with companies such as AT&T. The IT,
ISAC, and the financial services sector are all physically
represented on the watch floor. We are finalizing our agreement
with the North American Electric Reliability Corporation and
the energy sector ISAC to have full-time support on the watch
floor as well.
In addition, working with our State, local, Tribal, and
territorial partners through the multi-State Information
Sharing and Analysis Center, we can virtually reach out to each
of the States and localities to ensure that they are fully
aware of the cyber vulnerabilities and risk mitigation
strategies that are being developed.
In conclusion, within our current legal authorities we
continue to engage, collaborate, and provide analysis,
vulnerability, and mitigation assistance to the private sector.
We have the experience and the expertise in dealing with the
private sector in planning steady state and crisis scenarios.
In support of that we deploy numerous incident response and
assessment teams that enable us to help prevent, prepare, and
recover from these cyber impacts.
Finally, we work closely with the private sector and our
interagency partners in law enforcement and intelligence to
provide a full complement and capabilities for preparation for
and in response to significant cyber events.
Chairman Lungren, Ranking Member Clarke, and distinguished
Members of the subcommittee, let me conclude in reiterating
that I look forward to exploring the opportunities to support
this mission and collaborate with the subcommittee and my
colleagues in the public and private sectors.
Thank you again for this opportunity, and I would be happy
to stand by and answer any of your questions.
[The statement of Mr. McGurk follows:]
Prepared Statement Sean P. McGurk
April 15, 2011
introduction
Chairman Lungren, Vice Chairman Walberg, Ranking Member Clarke, and
distinguished Members of the subcommittee, it is a pleasure to appear
before you today to discuss the Department of Homeland Security's (DHS)
cybersecurity mission. Specifically, I will discuss the Department's
cybersecurity mission as it relates to critical infrastructure and our
coordination of this mission with the private sector.
Deputy Under Secretary Philip Reitinger recently testified before
this subcommittee, and I would like to reiterate the Department's
desire to work more with you to convey the relevance of cybersecurity
to average Americans. Increasingly, the services we rely on in our
daily life, such as water distribution and treatment, electricity
generation and transmission, health care, transportation, and financial
transactions depend on an underlying information technology and
communications infrastructure. Cyber threats put the availability and
security of these and other services at risk.
the current cybersecurity environment
The United States faces a combination of known and unknown
vulnerabilities, strong and rapidly expanding adversary capabilities,
and a lack of comprehensive threat and vulnerability awareness. Within
this dynamic environment, we are confronted with threats that are more
targeted, more sophisticated, and more serious.
Sensitive information is routinely stolen from both Government and
private sector networks, undermining confidence in our information
systems and the sharing of information. As bad as the loss of precious
National intellectual capital is, we increasingly face threats that are
even greater. We face threats that could significantly compromise the
accessibility and reliability of our information infrastructure.
Malicious actors in cyberspace, including nation states, terrorist
networks, organized criminal groups, and individuals located here in
the United States, have varying levels of access and technical
sophistication, but all have nefarious intent. Several are capable of
targeting elements of the U.S. information infrastructure to disrupt,
or destroy systems upon which we depend. Motives include intelligence
collection, intellectual property or monetary theft, or disruption of
commercial activities, among others. Criminal elements continue to show
increasing levels of sophistication in their technical and targeting
capabilities and have shown a willingness to sell these capabilities on
the underground market. In addition, terrorist groups and their
sympathizers have expressed interest in using cyberspace to target and
harm the United States and its citizens. While some have commented on
terrorists' own lack of technical abilities, the availability of
technical tools for purchase and use remains a potential threat.
Malicious cyber activity can instantaneously result in virtual or
physical consequences that threaten National and economic security,
critical infrastructure, public health and welfare. Similarly, stealthy
intruders can lay a hidden foundation for future exploitation or
attack, which they can then execute at their leisure--and at their time
of greatest advantage. Securing cyberspace requires a layered security
approach across the public and private sectors.
We need to support the efforts of our private sector partners to
secure themselves against malicious activity in cyberspace.
Collaboratively, public and private sector partners must use our
knowledge of information technology systems and their interdependencies
to prepare to respond should defensive efforts fail. This is a serious
challenge, and DHS is continually making strides to improve the
Nation's overall operational posture and policy efforts.
cybersecurity mission
No single technology--or single Government entity--alone can
overcome the cybersecurity challenges our Nation faces. Consequently,
the public and private sectors must work collaboratively. Cybersecurity
must start with informed users taking necessary precautions and extend
through a coordinated effort among the private sector, including
critical infrastructure owners and operators, and the extensive
expertise that lies across coordinated Government entities. In addition
to leading the effort to secure Federal Executive Branch civilian
departments and agencies' unclassified networks, the National
Protection and Programs Directorate (NPPD) within DHS is responsible
for the following key cybersecurity missions:
Providing technical expertise to the private sector and
critical infrastructure and key resources (CIKR) owners and
operators--whether private sector, State, or municipality-
owned--to bolster their cybersecurity preparedness, risk
assessment, mitigation and incident response capabilities;
Raising cybersecurity awareness among the general public;
and
Coordinating the National response to domestic cyber
emergencies.
In a reflection of the bipartisan nature with which the Federal
Government continues to approach cybersecurity, President Obama
determined that the Comprehensive National Cybersecurity Initiative
(CNCI) and its associated activities should continue to evolve as key
elements of the broader National cybersecurity efforts. These CNCI
initiatives play a central role in achieving many of the key
recommendations of the President's Cyberspace Policy Review: Assuring a
Trusted and Resilient Information and Communications Infrastructure.
Following the publication of those recommendations in May 2009, DHS and
its components developed a long-range vision of cybersecurity for the
Department and the Nation's homeland security enterprise, which is
encapsulated in the Quadrennial Homeland Security Review (QHSR). The
QHSR provides an overarching framework for the Department and defines
our key priorities and goals. One of the five priority areas detailed
in the QHSR is safeguarding and securing cyberspace. Within the
cybersecurity mission area, the QHSR identifies two overarching goals:
To help create a safe, secure, and resilient cyber environment and to
promote cybersecurity knowledge and innovation.
In alignment with the QHSR, Secretary Napolitano consolidated many
of the Department's cybersecurity efforts under NPPD. The Office of
Cybersecurity and Communications (CS&C), a component of NPPD, focuses
on reducing risk to the communications and information technology
infrastructures and the sectors that depend upon them, as well as
enabling timely response and recovery of these infrastructures under
all circumstances. The functions and mission of the National
Cybersecurity Center (NCSC) are now supported by CS&C. These functions
include coordinating operations among the six largest Federal cyber
centers. CS&C also coordinates National security and emergency
preparedness communications planning and provisioning for the Federal
Government and other stakeholders. CS&C comprises three divisions: The
National Cyber Security Division (NCSD), the Office of Emergency
Communications, and the National Communications System. It also houses
the National Cybersecurity and Communications Integration Center
(NCCIC)--DHS' 24-hour cyber and communications watch and warning
center. Within NCSD, the United States Computer Emergency Readiness
Team (US-CERT) is working more closely than ever with our public and
private sector partners to share what we learn from EINSTEIN 2, a
Federal executive agency computer network intrusion detection system,
to deepen our collective understanding, identify threats
collaboratively, and develop effective security responses. EINSTEIN
enables us to respond to warnings and other indicators of operational
cyber attacks, and we have many examples showing that this program
investment has paid for itself several times over.
Teamwork--ranging from intra-agency to international
collaboration--is essential to securing cyberspace. Together, we can
leverage resources, personnel, and skill sets that are needed to
achieve a more secure and reliable cyberspace. Although DHS leads
significant cybersecurity mission activities in the public sector, I
will focus the rest of my testimony on private sector coordination.
The NCCIC works closely with Government at all levels and with the
private sector to coordinate the integrated and unified response to
cyber and communications incidents impacting homeland security.
Numerous DHS components, including US-CERT, the Industrial Control
Systems Cyber Emergency Response Team (ICS-CERT), and the National
Coordinating Center for Telecommunications, are collocated in the
NCCIC. Also present in the NCCIC are other Federal partners, such as
the Department of Defense (DoD) and members of the law enforcement and
intelligence communities. The NCCIC also physically collocates Federal
staff with private sector and non-governmental partners. Currently,
representatives from the Information Technology and Communications
Sectors and the Multi-State Information Sharing and Analysis Center are
located on the NCCIC watch floor. We are also finalizing steps to add
representatives from the Banking and Finance Sector, as well as the
Energy Sector.
By leveraging the integrated operational capabilities of its member
organizations, the NCCIC serves as an ``always on'' cyber incident
response and management center, providing indications and warning of
imminent incidents, and maintaining a national cyber ``common operating
picture.'' This facilitates situational awareness among all partner
organizations, and also creates a repository of all reported
vulnerability, intrusion, incident, and mitigation activities. The
NCCIC also serves as a National point of integration for cyber
expertise and collaboration, particularly when developing guidance to
mitigate risks and resolve incidents. Finally, the unique and
integrated nature of the NCCIC allows for a scalable and flexible
coordination with all interagency and private sector staff during
steady-state operations, in order to strengthen relationships and
solidify procedures as well as effectively incorporate partners as
needed during incidents.
NCSD collaborates with private sector stakeholders to conduct risk
assessments and mitigate vulnerabilities and threats to information
technology assets and activities affecting the operation of private
sector critical infrastructures. NCSD also provides cyber threat and
vulnerability analysis, early warning, incident response assistance,
and exercise opportunities for private sector constituents. To that
end, NCSD carries out the majority of DHS' non-law enforcement
cybersecurity responsibilities.
national cyber incident response
The President's Cyberspace Policy Review called for ``a
comprehensive framework to facilitate coordinated responses by
government, the private sector, and allies to a significant cyber
incident.'' DHS coordinated the interagency, State and local
government, and private sector working group that developed the
National Cyber Incident Response Plan (NCIRP). The NCIRP provides a
framework for effective incident response capabilities and coordination
among Federal agencies, State and local governments, the private
sector, and international partners during significant cyber incidents.
It is designed to be flexible and adaptable to allow synchronization of
response activities across jurisdictional lines. In September 2010, DHS
hosted Cyber Storm III, a response exercise in which members of the
domestic and international cyber incident response community addressed
the scenario of a coordinated cyber event. During the event, the NCIRP
was activated and its incident response framework was tested. Based on
observations from the exercise, the plan is in its final stages of
revision prior to publication. Cyber Storm III also tested the NCCIC
and the Federal Government's full suite of cybersecurity response
capabilities.
providing technical operational expertise to the private sector
DHS has significant cybersecurity capabilities, and we are using
those capabilities to great effect as we work collaboratively with the
private sector to protect the Nation's CIKR. We engage with the private
sector on a voluntary basis to provide onsite analysis, mitigation
support, and assessment assistance. Over the past year, we have
repeatedly demonstrated our ability to materially and expeditiously
assist companies with cyber intrusion mitigation and incident response.
We are able to do so through our trusted and close relationships with
private sector companies as well as Federal departments and agencies.
Finally, our success in assisting the private sector is due in no small
part to our dedication to properly and fully addressing privacy, civil
rights, and civil liberties in all that we do. Initiating technical
assistance with a private company to provide analysis and mitigation
advice is a sensitive endeavor--one that requires trust and strict
confidentiality. Within our analysis and warning mission space, DHS has
a proven ability to provide that level of trust and confidence in the
engagement. Our efforts are unique among Federal agencies' capabilities
in that DHS focuses on civilian computer network defense and protection
rather than law enforcement, military, or intelligence functions. DHS
engages to mitigate the threat to the network to reduce future risks.
Our approach requires vigilance and a voluntary public/private
partnership. We are continuing to build our capabilities and
relationships because the cyber threat trends are more sophisticated
and frequent.
Over the past year, we established the NCCIC and are adding staff
to that center, both from existing DHS personnel and from partner
organizations in the public and private sectors. More broadly, we are
continuing to hire more cybersecurity professionals and increasing
training availability to our employees. The NCIRP is operational, and
we continue to update and improve it with input from senior
cybersecurity leaders. We will be releasing the NCIRP publicly in the
near future. We are executing within our current mission and
authorities now, receiving and responding to substantial netflow data
from our intrusion detection technologies deployed to our Federal
partners, and leveraging that data to provide early warnings and
indicators across Government and industry. With our people, processes,
and technology, we stand ready to execute the responsibilities of the
future.
In addition to specific mitigation work we conduct with individual
companies and sectors, DHS looks at the interdependencies across
critical infrastructure sectors for a holistic approach to providing
our cyber expertise. For example, the Electric, Nuclear, Water,
Transportation, and Communications Sectors support functions across all
levels of government including Federal, State, local, and Tribal
governments, and the private sector. Government bodies and
organizations do not inherently produce these services and must rely on
private sector organizations, just as other businesses and private
citizens do. Therefore, an event impacting control systems has
potential implications at all these levels, and could also have
cascading effects upon all 18 sectors. For example, Water and
Wastewater Treatment, Chemical, and Transportation sectors depend on
the Energy Sector, and failure in one of these sectors could
subsequently affect Government and private sector operations.
US-CERT also collaborates, provides remote and on-site response
support, and shares information with Federal, State, and local
governments; critical infrastructure owners and operators; and
international partners to address cyber threats and develop effective
security responses.
DHS provides on-site and remote incident response assistance to its
public and private sector partners. Upon notification of a cyber
incident, ICS-CERT and/or US-CERT can perform a preliminary diagnosis
to determine the extent of the compromise. At the partner's request and
when appropriate, either ICS-CERT or US-CERT can deploy a team to meet
with the affected organization to review network topology, identify
infected systems, create image files of hard drives for analysis, and
collect other data as needed to perform thorough follow-on analysis.
Both ICS-CERT and US-CERT can provide mitigation strategies, advise
asset owners and operators on their efforts to restore service, and
provide recommendations for improving overall network and control
systems security.
An incident in early 2010 illustrates the incident response support
that DHS provides. In this case, an employee of a company had attended
an industry event and used an instructor's flash drive to download
presentation materials to the company's laptop. The flash drive was
infected with the Mariposa botnet, unbeknownst to the event organizer.
When the employee returned to the work location and used the laptop,
the virus quickly spread to nearly 100 systems. US-CERT and ICS-CERT
had already been tracking a trend of removable media involved in
malware infections, and, on request, deployed a team to the company's
location to help diagnose the malware and identify those infected
systems.
The team spent 2 days with the company reviewing the incident
details, network topology, and the company's control systems
architecture to identify systems of interest. The company was
ultimately able to leverage all of the information to contain the
infection and remove the malware from the infected systems. ICS-CERT
and US-CERT provided follow-on reporting, mitigation measures, and
access to additional resources through the US-CERT secure portal.
US-CERT's operations are complemented in the arena of industrial
control systems by ICS-CERT. The term ``control system'' encompasses
several types of systems, including Supervisory Control and Data
Acquisition, process control, and other automated systems that are
found in the industrial sectors and critical infrastructure. These
systems are used to operate physical processes that produce the goods
and services that we rely upon, such as energy, drinking water,
emergency services, transportation, postal and shipping, and public
health. Control systems security is particularly important because of
the inherent interconnectedness of the CIKR sectors and their
dependence on one another.
As such, assessing risk and effectively securing industrial control
systems are vital to maintaining our Nation's strategic interests,
public safety, and economic well-being. A successful cyber attack on a
control system could result in physical damage, loss of life, and
cascading effects that could disrupt services. DHS recognizes that the
protection and security of control systems is essential to the Nation's
overarching security and economy. In this context, as an example of
many related initiatives and activities, DHS--in coordination with the
Department of Commerce's National Institute of Standards and Technology
(NIST), the Department of Energy, and DoD--has provided a forum for
researchers, subject matter experts and practitioners dealing with
cyber-physical systems security to assess the current state of the art,
identify challenges, and provide input to developing strategies for
addressing these challenges. Specific infrastructure sectors considered
include energy, chemical, transportation, water and wastewater
treatment, health care and public health, and commercial facilities. A
2010 published report of findings and recommendations is available upon
request.
An additional real-world threat emerged last year that
significantly changed the landscape of targeted cyber attacks on
industrial control systems. Malicious code, dubbed Stuxnet, was
detected in July 2010. DHS analysis concluded that this highly complex
computer worm was the first of its kind, written to specifically target
mission-critical control systems running a specific combination of
software and hardware.
ICS-CERT analyzed the code and coordinated actions with critical
infrastructure asset owners and operators, Federal partners, and
Information Sharing and Analysis Centers. Our analysis quickly
uncovered that sophisticated malware of this type potentially has the
ability to gain access to, steal detailed proprietary information from,
and manipulate the systems that operate mission-critical processes
within the Nation's infrastructure. In other words, this code can
automatically enter a system, steal the formula for the product being
manufactured, alter the ingredients being mixed in the product, and
indicate to the operator and the operator's anti-virus software that
everything is functioning normally.
To combat this threat, ICS-CERT has been actively analyzing and
reporting on Stuxnet since it was first detected in July 2010. To date,
ICS-CERT has briefed dozens of Government and industry organizations
and released multiple advisories and updates to the industrial control
systems community describing steps for detecting an infection and
mitigating the threat. As always, our goal is to balance the need for
public information sharing while protecting the information that
malicious actors may exploit. DHS provided the alerts in accordance
with its responsible disclosure processes.
The purpose and function for responsible disclosure is to ensure
that DHS executes its mission of mitigating risk to critical
infrastructure, not necessarily to be the first to publish on a given
threat. For example, ICS-CERT's purpose in conducting the Stuxnet
analysis was to ensure that DHS understood the extent of the risks so
that they could be mitigated. After conducting in-depth malware
analysis and developing mitigation steps, we were able to release
actionable information that benefited our private sector partners.
Looking ahead, the Department is concerned that attackers could use
the increasingly public information about the code to develop variants
targeted at broader installations of programmable equipment in control
systems. Copies of the Stuxnet code, in various different iterations,
have been publicly available for some time now. ICS-CERT and the NCCIC
remain vigilant and continue analysis and mitigation efforts of any
derivative malware.
ICS-CERT will continue to work with the industrial control systems
community to investigate these and other threats through malicious code
and digital media analysis, on-site incident response activities, and
information sharing and partnerships.
interagency and public-private coordination
Overcoming new cybersecurity challenges requires a coordinated and
focused approach to better secure the Nation's information and
communications infrastructures. President Obama's Cyberspace Policy
Review reaffirms cybersecurity's significance to the Nation's economy
and security. Establishment of a White House Cybersecurity Coordinator
position solidified the priority the administration places on improving
cybersecurity.
No single agency has sole responsibility for securing cyberspace,
and the success of our cybersecurity mission relies on effective
communication and critical partnerships. Many Government players have
complementary roles as well as unique capabilities--including DHS, the
intelligence community, DoD, the Department of Justice, the Department
of State, and other Federal agencies--and they require coordination and
leadership to ensure effective and efficient execution of our
collective cyber missions. The creation of a senior-level cyber
position within the White House ensures coordination and collaboration
across Government agencies.
Private industry owns and operates the vast majority of the
Nation's critical infrastructure and cyber networks. Consequently, the
private sector plays an important role in cybersecurity, and DHS has
initiated several pilot programs to promote public-private sector
collaboration. In its engagement with the private sector, DHS
recognizes the need to avoid technology prescription and to support
innovation that enhances critical infrastructure cybersecurity. DHS,
through the National Infrastructure Protection Plan partnership
framework, has many years of experience in private sector
collaboration, leveraging our relationships in both the physical and
cybersecurity protection areas. For example, the Office of
Infrastructure Protection and the National Cyber Security Division
partnered with the chemical industry to publish the Roadmap to Secure
Industrial Control Systems in the Chemical Sector in 2009, available at
www.us-cert.gov. To meet the first set of milestones set forth in this
10-year plan, industry, in partnership with DHS, developed a suite of
control systems security awareness materials that will be shared widely
within the Chemical Sector this summer.
DHS engages with the private sector on a voluntary basis in
accordance with our responsibilities under the Homeland Security Act.
We stand by to assist our private sector partners upon their request,
and thus far have been able to do so successfully due to our technical
capabilities, existing private sector relationships, and expertise in
matters relating to privacy and civil rights and civil liberties.
In February 2010, DHS, DoD, and the Financial Services Information
Sharing and Analysis Center (FS-ISAC) launched a pilot designed to help
protect key critical networks and infrastructure within the financial
services sector by sharing actionable, sensitive information. Based on
lessons learned from the pilot, DHS is developing comprehensive
information-sharing and incident response coordination processes with
CIKR sectors, leveraging capabilities from within DHS and across the
response community, through the NCCIC.
In June 2010, DHS implemented the Cybersecurity Partner Local
Access Plan, which allows security-cleared owners and operators of
CIKR, as well as State technology officials and law enforcement
officials, to access secret-level cybersecurity information and video
teleconference calls via State and major urban area fusion centers. In
November 2010, DHS signed an agreement with the Information Technology
Information Sharing and Analysis Center (IT-ISAC) to embed a full-time
IT-ISAC analyst and liaison to DHS at the NCCIC, part of the on-going
effort to collocate private sector representatives alongside Federal
and State government counterparts. The IT-ISAC consists of information
technology stakeholders from the private sector and facilitates
cooperation among members to identify sector-specific vulnerabilities
and risk mitigation strategies.
In July 2010, DHS worked extensively with the White House on the
publication of a draft National Strategy for Trusted Identities in
Cyberspace, which seeks to secure the digital identities of
individuals, organizations, services, and devices during on-line
transactions, as well as the infrastructure supporting the transaction.
The final strategy is set to be released in the near future, fulfilling
one of the near-term action items of the President's Cyberspace Policy
Review. The strategy is based on public-private partnerships and
supports the protection of privacy and civil rights and civil liberties
by enabling only the minimum necessary amount of personal information
to be transferred in any particular transaction. Its implementation
will be led by the Department of Commerce.
In September 2010, Secretary Napolitano and Secretary Gates co-
signed a Memorandum of Agreement between DHS and DoD regarding
cybersecurity. The MOA established a Joint Coordination Element (JCE)
led by a DHS senior official at DoD's National Security Agency. The
intent of the MOA was to enable DHS and DoD to leverage each other's
capabilities, and more readily share cybersecurity information on
significant cyber incidents. The JCE has been in place and building to
fully operational capability since October 2010.
In December 2010, the DHS Science and Technology Directorate and
NIST signed a Memorandum of Understanding with the Financial Services
Sector Coordinating Council. The goal of the agreement is to speed the
commercialization of cybersecurity research innovations that support
our Nation's critical infrastructures. This agreement will accelerate
the deployment of network test beds for specific use cases that
strengthen the resiliency, security, integrity, and usability of
financial services and other critical infrastructures.
collaborative risk management forums
The increased pace of collaborative cybersecurity operations
between DHS and the private sector is due, in part, to standing public-
private forums that support on-going process improvements across the
partnership. A few of these forums--the Cross-Sector Cyber Security
Working Group, the IT CIKR Sector, and the Industrial Control Systems
Joint Working Group--meet under the auspices of the Critical
Infrastructure Partnership Advisory Council and conduct their
activities consistent with the National Infrastructure Protection Plan
(NIPP) partnership framework.
The Cross-Sector Cyber Security Working Group was established to
address cross-sector cyber risk and explore interdependencies between
and among various sectors. The working group serves as a forum to bring
government and the private sector together to address common
cybersecurity elements across the 18 CIKR sectors. They share
information and provide input to key policy and planning documents
including the NCIRP, the President's Cyberspace Policy Review, and the
National Strategy for Trusted Identities in Cyberspace.
The IT CIKR Sector security partnership is comprised of DHS as the
IT Sector Specific Agency, public sector partners in the IT Government
Coordination Council, and private sector partners in the IT Sector
Coordinating Council. This partnership forms to execute the IT Sector's
risk management framework: To identify and prioritize risks to IT
Sector critical functions, to develop and implement corresponding risk
management strategies, and to report on progress of risk management
activities and adjustments to the IT Sector's risk profile. IT Sector
public-private partners worked collaboratively to produce the 2009 IT
Sector Baseline Risk Assessment (ITSRA), prioritizing risks to the
sector's critical functions, and have subsequently been working to
finalize corresponding risk management strategies outlining a portfolio
of sector risk management activities to reduce the evaluated risks from
the ITSRA across the functions. Progress reporting on implementation of
these risk management strategies will be provided in the IT Sector
Annual Report (as required by the NIPP).
In partnership with the Department of Energy, which is the Sector
Specific Agency responsible for the Energy Sector under the NIPP, the
Industrial Control Systems Joint Working Group provides a vehicle for
stakeholders to communicate and partner across all critical
infrastructure sectors to better secure industrial control systems and
manage risk. The Industrial Control Systems Joint Working Group is a
representative group comprising owners and operators, international
stakeholders, Government, academia, system integrators, and the vendor
community. The purpose of the ICSJWG is to facilitate the collaboration
of control systems stakeholders to accelerate the design, development,
deployment, and secure operations of industrial control systems. Based
on public and private sector partner input, CSSP uses the Industrial
Control Systems Joint Working Group to inform its mission activities
and deliver needed products and services.
As you are aware, cybersecurity training is essential to increasing
awareness of threats and the ability to combat them. To that end, CSSP
conducts multi-tiered training through web-based and instructor-led
classes across the country. In addition, a week-long training course is
conducted at CSSP's state-of-the-art advanced training facility at the
Idaho National Laboratory to provide hands-on instruction and
demonstration. This training course includes a red team/blue team
exercise in which the blue team attempts to defend a functional mockup
control system while the red team attempts to penetrate the network and
disrupt operations. The positive response to this week-long course has
been overwhelming, and the classes are filled within a few days of
announcement. To date, more than 16,000 public and private sector
professionals have participated in some form of CSSP training through
classroom venues and web-based instruction.
CSSP also provides leadership and guidance on efforts related to
the development of cybersecurity standards for industrial control
systems. CSSP uses these industry standards in a variety of products
and tools to achieve its mission.
First, CSSP uses and promotes the requirements of multiple Federal,
commercial, and international standards in its Cyber Security
Evaluation Tool (CSET), which has been requested by and distributed to
hundreds of asset owners across each of the 18 CIKR sectors. Tool users
are evaluated against these standards based on answers to a series of
standard-specific questions. CSET is also used by CSSP assessment teams
to train and bolster an asset owner's control system and cybersecurity
posture in on-site assessments. In fiscal year 2010, the program
conducted more than 50 on-site assessments in 15 different States and
two U.S. territories, including several remote locations where the
control systems represent potential single points of failure for the
community. The program is planning for 75 on-site assessments in fiscal
year 2011.
Second, CSSP developed the Catalog of Control Systems Security:
Recommendations for Standards Developers, which brings together
pertinent elements from the most comprehensive and current standards
related to control systems. This tool is designed as a superset of
control systems cybersecurity requirements and is available in the CSET
and on the website for standards developers and asset owners.
Last, the CSSP provides resources, including time and expertise, to
standards development organizations including NIST, the International
Society of Automation, and the American Public Transportation
Association. Experts provide content, participate in topic discussions,
and review text being considered by the standards body.
the general public
While considerable activity is focused on public and private sector
critical infrastructure protection, DHS is committed to developing
innovative ways to enhance the general public's awareness about the
importance of safeguarding America's computer systems and networks from
attacks. Every October, DHS and its public and private sector partners
promote efforts to educate citizens about guarding against cyber
threats as part of National Cybersecurity Awareness Month. In March
2010, Secretary Napolitano launched the National Cybersecurity
Awareness Challenge, which called on the general public and private
sector companies to develop creative and innovative ways to enhance
cybersecurity awareness. In July 2010, 7 of the more than 80 proposals
were selected and recognized at a White House ceremony. The winning
proposals helped inform the development of the National Cybersecurity
Awareness Campaign, Stop. Think. Connect., which DHS launched in
conjunction with private sector partners during the October 2010
National Cybersecurity Awareness Month. Stop. Think. Connect., has
evolved into an on-going National public education campaign designed to
increase public understanding of cyber threats and how individual
citizens can develop safer cyber habits that will help make networks
more secure. The campaign fulfills a key element of President Obama's
Cyberspace Policy Review, which tasked DHS with developing a public
awareness campaign to inform Americans about ways to use technology
safely. The program is part of the NIST National Initiative for Cyber
Education.
DHS is committed to safeguarding the public's privacy, civil
rights, and civil liberties. Accordingly, the Department has
implemented strong privacy and civil rights and civil liberties
standards into all of its cybersecurity programs and initiatives from
the outset. To support this, DHS established an Oversight and
Compliance Officer within NPPD, and key cybersecurity personnel receive
specific training on the protection of privacy and other civil
liberties as they relate to computer network security activities. In an
effort to increase transparency, DHS also publishes privacy impact
assessments on its website, www.dhs.gov, for all of its cybersecurity
systems.
conclusion
Set within an environment characterized by a dangerous combination
of known and unknown vulnerabilities, strong and rapidly expanding
adversary capabilities, and a lack of comprehensive threat and
vulnerability awareness, the cybersecurity mission is truly a National
one requiring broad collaboration. DHS is committed to creating a safe,
secure, and resilient cyber environment while promoting cybersecurity
knowledge and innovation. We must continue to secure today's
infrastructure as we prepare for tomorrow's challenges and
opportunities. Cybersecurity is critical to ensure that Government,
business, and the public can continue to use the information technology
and communications infrastructure on which they depend.
DHS continues to engage, collaborate, and provide analysis,
vulnerability, and mitigation assistance to its private sector CIKR
partners. Our continued dedication to privacy and civil rights and
civil liberties ensures a positive, sustainable model for cybersecurity
engagement in the future. Finally, we work closely with our interagency
partners in law enforcement, military, and intelligence, providing the
full complement of Federal capabilities in preparation for, and in
response to, significant cyber incidents.
Chairman Lungren, Vice Chairman Walberg, Ranking Member Clarke, and
distinguished Members of the subcommittee, let me conclude by
reiterating that I look forward to exploring opportunities to advance
this mission in collaboration with the subcommittee and my colleagues
in the public and private sectors. Thank you again for this opportunity
to testify. I would be happy to answer your questions.
Mr. Lungren. Thank you very much, Mr. McGurk.
Now the Chairman recognizes Mr. Cauley to testify.
STATEMENT OF GERRY CAULEY, PRESIDENT AND CEO, NORTH AMERICAN
ELECTRIC RELIABILITY CORPORATION
Mr. Cauley. Good morning, Chairman Lungren, Ranking Member
Clarke, distinguished Members of the subcommittee, and fellow
panelists. My name is Gerry Cauley. I am the President and CEO
of the North American Electric Reliability Corporation, and I
appreciate the opportunity to testify this morning.
NERC is an independent, nonprofit corporation, and our
mission is to ensure the reliability of the bulk power system
of North America, which includes both the United States and
Canada. I wake up every day thinking of two words,
``reliability'' and ``accountability.'' We assure reliability
of the bulk power system by working closely with industry to
ensure that we are continuously learning and improving and
striving for excellence and reliability of the bulk power
system. We also ensure the accountability for a reliable system
through our mandatory standards and our compliance program.
Some associate NERC as being an industry association.
However, NERC has a very diverse mix of interests that we
represent, including small and large customers, Government
entities, and a diverse range of industry owners, operators,
and users.
NERC was initially formed in 1968 and operated for several
decades as a voluntary organization. In 2006, we were certified
by the Federal Energy Regulatory Commission as the electric
reliability organization within the United States, and we have
similar authorities in Canada. In 2007, our standards became
mandatory and enforceable for the power system, including nine
cybersecurity standards that we have in effect.
In terms of the challenge for the grid, I think everyone
recognizes that there is a lot of concern for the security of
the power grid in North America, and we understand that the
grid is essentially at the hub of all critical infrastructures
and that everyone depends on a reliable supply of electricity.
Over the past couple of decades, the power grid has become
increasingly more digital as the grid was modernized to improve
reliability and efficiency, cost and quality benefits.
What I want to assure you, though, despite becoming more
digital, the underlying power grid is very robust and
resilient. The underlying power grid is nondigital. It is not
as weak as may be conveyed to some and certainly is not
operated over the public internet.
Many companies have taken prudent steps, such as providing
dedicated control networks, redundant systems, tight access
controls, adopting best security practices and patches.
Certainly every day business continuity, reliability, and
security are at the foremost of the industry and the
leadership, the CEO-level leadership of the industry.
That is not to say, however, that there are not
vulnerabilities. There are very serious vulnerabilities and
threats that we face, and there are very serious adversaries
that would do harm to the power grid in North America. The
challenge is that the network has become very interconnected, a
series of very interconnected digital networks and
communications, that we do have portals from our control
systems to the internet and to business systems, and that our
digital assets are very widely distributed. They are varied.
They come from a range of suppliers, and some of those
suppliers are international. So we do have challenges on the
supply side as well.
What is NERC doing with regard to this? We have our
standards, as I mentioned, and we are doing hundreds of audits
across the industry to ensure that our standards are being
followed. We are doing readiness reviews and sharing best
practices. We are conducting an exercise in November of this
year to test our National response capability.
We issue alerts in cooperation with Homeland Security and
other agencies. We have issued alerts on Stuxnet, Aurora, BP,
and tunneling in other areas. We are monitoring activities that
might impact the grid.
I would like to turn finally to just the importance of the
relationship to homeland security and the Federal Government. I
think the key there is the sharing of actionable information
that we can use to protect the grid, not sort of general and
vague information but timely, operational-type information.
Homeland Security has helped us in terms of providing
security clearances not only to NERC staff but to industry
personnel and provides periodic briefings to help us better
understand the threats and vulnerability. As Mr. McGurk
mentioned, we are working on a memorandum of understanding to
integrate our ES-ISAC, our Information Sharing Analysis Center
with the National center that he is the head of.
In conclusion, NERC is working very closely with Homeland
Security and other Government agencies to ensure our critical
infrastructure. Every day I am focused on the reliability and
security of the grid and the interests of the American public.
I am here to answer your questions, and I appreciate the
opportunity to speak today. Thank you.
[The statement of Mr. Cauley follows:]
Prepared Statement of Gerry Cauley
April 15, 2011
introduction
Good morning Chairman Lungren, Members of the subcommittee and
fellow panelists. My name is Gerry Cauley and I am the president and
CEO of the North American Electric Reliability Corporation (NERC). I am
a graduate of the U.S. Military Academy, a former officer in the U.S.
Army Corps of Engineers, and have more than 30 years experience in the
bulk power system industry, including service as a lead investigator of
the August 2003 Northeast blackout and coordinator of the NERC Y2K
program. I appreciate the opportunity to testify today on the topic
``The DHS and the Cybersecurity Mission: Promoting Innovation and
Securing Critical Infrastructure.''
nerc background
NERC's mission is to ensure the reliability of the bulk power
system of North America and promote reliability excellence. NERC was
founded in 1968 to develop voluntary standards for the owners and
operators of the bulk power system (BPS).\1\ NERC is an independent
corporation whose membership includes large and small electricity
consumers, Government representatives, municipalities, cooperatives,
independent power producers, investor-owned utilities, independent
transmission system operators and Federal power marketing agencies such
as TVA and Bonneville Power Administration.
---------------------------------------------------------------------------
\1\ The Bulk Power System (BPS) is defined as generation and
transmission of electricity greater than 100kv, in contrast to the
distribution of electricity to homes and businesses at lower voltages.
---------------------------------------------------------------------------
In 2007, NERC was designated the Electric Reliability Organization
(ERO) by the Federal Energy Regulatory Commission (FERC) in accordance
with Section 215 of the Federal Power Act (FPA), enacted by the Energy
Policy Act of 2005. Upon approval by FERC, NERC's reliability standards
became mandatory across the BPS. These mandatory reliability standards
include Critical Infrastructure Protection (CIP) Standards 002 through
009, which address the security of cyber assets essential to the
reliable operation of the electric grid. To date, these standards [and
those promulgated by the Nuclear Regulatory Commission] are the only
mandatory cybersecurity standards in place across the critical
infrastructures of North America. Subject to FERC oversight, NERC and
its Regional Entity partners enforce these standards, which are
developed with substantial input from industry and approved by FERC, to
accomplish our mission to ensure the reliability of the electric grid.
In its position between industry and government, NERC embodies the
often-invoked goal of creating effective partnerships between the
public sector and the private sector.
As a result of society's growing dependence on electricity, the
electric grid is one of the Nation's most critical infrastructures. The
bulk power system in North America is one of the largest, most complex,
and most robust systems ever created by man. It provides electricity to
more than 334 million people, is capable of generating more than 830
gigawatts of power and sending it over 211,000 miles of high voltage
transmission lines, and represents more than $1 trillion in assets. The
electricity being used in this room right now is generated and
transmitted in real time over a complex series of lines and stations
from possibly as far away as Ontario or Tennessee. As complex as it is,
few machines are as robust as the BPS. Decades of experience with
hurricanes, ice storms, and other natural disasters, as well as
mechanical breakdowns, vandalism and sabotage, have taught the electric
industry how to build strong and reliable networks that generally
withstand all but the worst natural and physical disasters while
supporting affordable electric service. The knowledge that disturbances
on the grid can impact operations thousands of miles away has
influenced the electric industry culture of planning, operating, and
protecting the BPS.
the cybersecurity challenge for the grid
Along with the rest of our economy, the electric industry has
become increasingly dependent on digital technology to reduce costs,
increase efficiency and maintain the reliability of the BPS. The
networks and computer environments that make up this digital technology
could be as vulnerable to malicious attacks and misuse as any other
technology infrastructure. Much like the defense of this country, the
defense of the BPS requires constant vigilance and expertise.
The assets that make up the BPS are varied and widespread.
Consequently, the architecture within the systems varies from operator
to operator. However, the computer systems that monitor and control BPS
assets are based on relatively few elements of technology. Due to
increasing efficiencies and globalization of vendors, the universe of
suppliers for industrial control systems is limited. This trend is
leading toward a fairly homogenous technological underpinning and, as
older proprietary technology is replaced, the variation may decrease
further.
For example, the bulk power system could be as vulnerable to
digital threats as IT systems, but with far more critical implications.
As proprietary industrial control systems continue to integrate
Commercial Off-The-Shelf (COTS) systems, these platforms could inherit
the embedded vulnerabilities of those systems. As illustrated by the
Stuxnet malware, industrial control system software can be changed and
a loss of process control can occur without intrusions even being
detected. The Stuxnet intrusion methods may serve as a blueprint for
future attackers who wish to access controllers, safety systems, and
protection devices to insert malicious code that could result in
changes to set points and switches, as well as the alteration or
suppression of measurements. NERC, through the Electricity Sector-
Information Sharing and Analysis Center (ES-ISAC), issued an alert on
Stuxnet, as it has done with other vulnerabilities, to inform the
industry and recommend preventative action.
Establishment and continued refinement of NERC's enterprise risk-
based programs, policies, and processes to prepare for, react to, and
recover from cybersecurity vulnerabilities need to continue to be a
high priority for the industry. The bulk power system has not yet
experienced wide-spread debilitating cyber-attacks due in large part to
the traditional physical separation between the industrial control
system environment and business and administrative networks. However,
the increased sharing of internet and computer networking by control
systems and business and administrative networks means that digital
infrastructures that were formerly physically separated are now
becoming susceptible to common threats.
the role of nerc and critical infrastructure protection reliability
standards
The NERC CIP standards require electric sector entities to develop
a risk-based security policy based upon their specific assets,
architecture, and exposure. This policy, if properly implemented, will
provide insight into the entity's systems and provide the opportunity
to mitigate potential threats and vulnerabilities before they are
exploited. Compliance with the NERC CIP standards is a first step in
properly securing the BPS. However, there is no single security asset,
security technique, security procedure, or security standard that, even
if strictly followed or complied with, will protect an entity from all
potential threats. The cybersecurity threat environment is constantly
changing and our defenses must keep pace. Security best practices call
for additional processes, procedures, and technologies beyond those
required by the CIP standards. Simple implementation of enforceable
standards, while valuable and a necessary first step should not be seen
as the security end-state.
It is important to emphasize the difficulty of addressing grid
security through a traditional regulatory model that relies principally
on mandatory standards, regulations, and directives. The defensive
security barriers mandated by CIP standards can be effective in
frustrating ordinary hackers by increasing the costs and resources
necessary to harm to the grid. They may not, however, stop the
determined efforts of the intelligent, adaptable adversaries supported
by nation states or more sophisticated terrorist organizations.
NERC is moving forward with a number of actions to complement our
mandatory CIP standards and provide enhanced resilience for the grid.
As chair of the Electricity Sub-Sector Coordinating Council (ESCC), I
work with industry CEOs and our partners within the Government,
including the Department of Energy, Department of Defense, and
Department of Homeland Security, to discuss and identify critical
infrastructure protection concepts, processes, and resources, as well
as to facilitate information sharing about cyber vulnerabilities and
threats. This type of public/private partnership is key to coordination
and communication efforts on cybersecurity topics and initiatives. NERC
is also developing a North American cybersecurity exercise to prepare
for and test a National response plan for the electric sector.
The most effective approach for combating sophisticated adversaries
is to apply resiliency principles, as outlined in a set of nine
recommendations the National Infrastructure Advisory Council delivered
to the White House in October 2010. I served on that Council, along
with a number of nuclear and electric industry CEOs. Resiliency
requires more proactive readiness for whatever may come our way.
Resiliency includes providing an underlying robust system; the ability
to respond in real-time to minimize consequences; the ability to
restore essential services; and the ability to adapt and learn. The
industry is already resilient in many aspects, based on system
redundancy and the ability to respond to emergencies. To further
enhance resiliency, examples of the NIAC team's recommendations
include: (1) A National response plan that clarifies the roles and
responsibilities between industry and Government; (2) improved
information sharing by Government regarding actionable threats and
vulnerabilities; (3) cost recovery for security investments driven by
National policy or interests; and (4) a National strategy on spare
equipment with long lead times, such as transformers. At NERC, we are
working with stakeholders to develop programs that build upon the
resiliency inherent in the grid to better secure critical assets and
ensure the continued reliability of the BPS.
information exchange is critical
NERC and the electric industry can only deal with the risks they
are aware of. It is impractical, inefficient, and impossible to defend
against all possible threats or vulnerabilities. Entities must
prioritize their resources to ensure that they are protected against
those risks that pose the greatest harm to their assets, their
business, and their customers. The electric industry is in the best
position to understand the impact that a particular event or incident
could have on the BPS, but they do not have the same access to
actionable intelligence and analysis that the Government does. This
lack of information leads the industry to be, at best, a step behind
when it comes to protecting against potential threats and unknown
vulnerabilities. Too often the industry has heard from Government
agencies that the threats are real, but are given little or no
additional information. This leads to frustration among the private
sector leaders who are unable to respond effectively due to ill-defined
and nebulous threat information.
nerc and dhs
Improving the amount and quality of actionable intelligence
available to industry is a priority for NERC and is reflected in a
number of joint projects underway with DHS and DOD.
NERC is working with DHS' National Cybersecurity and Communications
Integration Center to develop a Memorandum of Understanding for bi-
directional sharing of critical infrastructure protection information
between the Government and the electricity sector in North America. The
MOU will result in cybersecurity data flow, analytical collaboration,
and incident management activities across the spectrum of cybersecurity
coordination to include detection, prevention, mitigation, and
response/recovery.
NERC and DHS cooperative activities will align differing, but
related missions, business interests, strengths, and capabilities to
identify and develop mitigations for emerging cybersecurity risks,
which will enhance the protection of critical infrastructure and
Government networks and systems that are vital to National security and
the Nation's economy. Under this MOU, NERC, as the ES-ISAC, will act as
a clearing house, disseminating actionable intelligence, including
classified contextual information to appropriately cleared staff within
the BPS community. NERC also will provide anonymous situational
awareness to DHS analysts to supplement the information DHS received
from the intelligence community. We see this effort as crucial to
improving the level of threat awareness within the industry and
improving information between Government and industry.
As noted before, NERC also uses the ES-ISAC to send Alerts and
Notifications to registered BPS entities. These Alerts and
Notifications are developed with the strong partnership of Federal
technical partners, including DHS and the Department of Energy National
Laboratories, and BPS subject matter experts, called the HYDRA team by
NERC.
NERC also provides leadership to two significant DHS-affiliated
public-private partnerships. These are the Partnership for Critical
Infrastructure Security (PCIS) and the Industrial Control Systems Joint
Working Group (ICSJWG). The PCIS is the senior-most policy coordination
group between public and private sector organizations. On the
Government side, PCIS is comprised of the National Infrastructure
Protection Plan (NIPP) Federal Senior Leadership Council (FSLC) and the
State, Local, and Tribal Government Coordinating Council (SLTGCC), as
well as the chairs of all of the other Government Sector Coordinating
councils. On the private side, PCIS is comprised of the chairs of all
of the private sector coordinating councils. The ICSJWG is a cross-
sector industrial control systems working group that focuses on the
areas of education, cross-sector strategic roadmap development,
coordinated efforts on developing better vendor focus on security needs
and cybersecurity policy issues.
nerc, doe, and dod
NERC is engaged with other agencies besides DHS, including DOD and
DOE National laboratories, to further the level of awareness and
expertise focused on cybersecurity, especially as it pertains to the
BPS. We are working with Pacific Northwest National Laboratory on
developing certification guidelines for Smart Grid Cyber Operators and
the Electric Sector Network Monitoring initiative. Similarly, we are
working with the Idaho National Laboratory to promote the Cyber
Security Evaluation Tool for use within the electric sector. NERC also
is partnering with the Industrial Control Systems Cyber Emergency
Response Team to share threat, vulnerability, and security incident
information.
Additionally, NERC is working with DOE and the National Institute
of Standards and Technology to develop comprehensive cybersecurity risk
management process guidelines for the entire electric grid, including
the BPS and distribution systems. We believe this to be particularly
important with the increasing availability of smart grid technologies.
While the majority of technology associated with the smart grid is
found within the distribution system, vulnerabilities realized within
the distribution system could potentially impact the BPS. Everyone
engaged in smart grid implementation should ensure that appropriate
security applications and technologies are built into the system to
prevent the creation of additional threats and vulnerabilities.
conclusion
As our Nation becomes more dependent upon electricity and as the
BPS becomes more dependent on information systems, we must secure those
systems that enable our way of life. As discussed today, NERC is
committed to working with DHS and other Government agencies on several
efforts to promote innovation and secure our critical infrastructure.
As Congress considers policy decisions in this arena, NERC would
suggest that the ESCC and the ES-ISAC be considered as key elements in
the cybersecurity mission. NERC continues to work with Government and
industry to utilize its expertise and promote thoughtful innovation as
we address the question of how to ensure security in our open society.
The cybersecurity challenges facing us are not intractable--they are
the result of our own great innovation and can be overcome through our
own great ingenuity.
Mr. Lungren. Thank you very much, Mr. Cauley.
Now the Chairman would recognize Ms. Carlin to testify.
STATEMENT OF JANE CARLIN, CHAIR, FINANCIAL SERVICES SECTOR
COORDINATING COUNCIL
Ms. Carlin. Thank you, Chairman Lungren and other Members
of the committee, for hearing our thoughts today in this
important area and for inviting me to testify on behalf of the
Financial Services Sector Coordinating Council.
I am Jane Carlin, and I serve as chairperson of the council
that we refer to as FSSCC. I have submitted a detailed written
statement that addresses several areas, including how the FSSCC
and others in the sector engage with DHS on cybersecurity
issues, lessons learned from recent cyberattacks,
recommendations for improved public-private information
sharing, and comments on cybersecurity legislation. In the
interest of time, I would like to focus mostly on information
sharing today following a brief overview of the FSSCC.
FSSCC was created in 2002 in response to the September 11
attacks. It operates under the support of the U.S. Treasury as
our sector-specific agency in harmony with a Presidential
directive. The FSSCC does not collect dues. It is entirely a
volunteer organization. Accordingly, it relies heavily on the
time members contribute and to the expertise and leadership
roles members play within their respective financial
institutions and associations.
In recent years, FSSCC has had a highly productive and
expanding relationship with DHS at the most senior levels and
on many fronts, including information sharing, research and
development, cyber exercises, and cross-sector coordination.
Information sharing is of critical importance to the
financial services sector for several reasons. First, financial
institutions and others that make up the critical
infrastructure are on the front line of cybercrime and
malicious attacks. When a financial institution is the victim
of a cyberattack, it is concerned about protecting its
customers, its reputation, and complying with all relevant
regulatory requirements.
Second, others in the sector may be concerned about the
impact that this attack could have on its organization and
counterparties, as well, of course, as the potential for
systemic risk to the entire financial services sector.
Third, the Government is responsible for enforcing laws and
promoting critical infrastructure protection, and the
Government ultimately holds important information that is both
technical and contextual. Technical information such as malware
signatures, contextual in terms of what type of entity appears
to be initiating the attack.
There is a strong need to establish appropriate and well-
understood protocols to share information so that we
collectively understand the problems and risks that we face in
order to arrive at the right response or solution. When attacks
occur, the FSSCC has a defined crisis management process,
escalation and notification protocols, including sending rapid
notifications to members throughout financial services.
Although we have made good progress in creating
information-sharing entities and mechanisms for information
sharing, we have not adequately tackled the critically
important issues associated with timeliness and completeness of
information sharing. We now need to focus on clarifying and
compartmentalizing information so that so-called actionable
intelligence can be disseminated to responsible parties that
will use it to protect critical infrastructure.
What I mean by actionable intelligence is simply redacted
technical and contextual information without revealing sources
and uses or tipping off criminals or adversaries.
The fundamental issue of striking a balance between
confidentiality for criminal investigations and timely
information sharing remains a work in progress. An example of
an incident where too much secrecy led to an increased exposure
was the cyberattacks on a major exchange which was discovered
by the exchange in October, 2010. The exchange alerted its
primary regulator in law enforcement for a variety of reasons,
including an investigation of the attack by law enforcement and
intelligence agencies. Information about the attack and its
impact on other financial institutions was not disclosed to
others in the financial services sector for 102 days. The lack
of meaningful information sharing for more than 3 months left
the entire sector unnecessarily vulnerable.
In this connection, we would like to suggest two
recommendations: First, a more transparent decision-making
process to facilitate information sharing would accelerate the
dissemination of information without interfering or undermining
criminal or National security investigations. To implement this
kind of information-sharing protocol, the FSSCC and senior DHS
officials have agreed in principle to collaborate on protocols
for sharing technical and contextual information, again without
interfering with an on-going investigation.
Second, we believe that DHS needs to regularly leverage the
security clearances that DHS and other Government agencies have
sponsored for members of the FSSCC as part of the information-
sharing framework. The Government should be able to more easily
consult with industry experts and to better understand the
systemic risk implications of these cyber events by leveraging
the secured and cleared community.
On behalf of the FSSCC, I ask this committee in its
oversight capacity to support DHS's work in these areas. It is
my hope that this good work to enhance the public-private
partnership will continue so that together we can be more
resilient and combat those who would seek to undermine our
economy and stability, be they homegrown or foreign, criminal
or terrorist, rogue- or State-sponsored. It is only by working
together that we will prevail in the complex and ever-changing
internet-connected world.
Thank you.
[The statement of Ms. Carlin follows:]
Prepared Statement of Jane Carlin
April 15, 2011
Chairman King, Subcommittee Chairman Lungren, Ranking Member
Thompson and Members of the subcommittee on Cybersecurity,
Infrastructure Protection, and Security Technologies of the Homeland
Security Committee, I am Jane Carlin. I serve as the chairperson of
Financial Services Sector Coordinating Council for Critical
Infrastructure Protection and Homeland Security (``FSSCC''). I also am
the Managing Director and Global Head of Operational Risk, Business
Continuity, Information Security, and Risk and Insurance Management at
Morgan Stanley.
Thank you for inviting me to testify on behalf of the Financial
Services Sector Coordinating Council for Homeland Security and Critical
Infrastructure Protection (``FSSCC'') on ``The Department of Homeland
Security Cybersecurity Mission: Promoting Innovation and Securing
Critical Infrastructure.'' My testimony today will address the
following: Background information on the FSSCC, engagement with DHS,
lessons learned from recent cyber attacks, recommendations for
improving public-private partnership, and comments on cybersecurity
legislation.
background on fsscc and public-private partnership
The FSSCC was established in 2002 in response to the September 11,
2001 attacks and at the request of the U.S. Treasury Department in
harmony with Presidential Decision Directive 63 of 1998. Presidential
Decision Directive 63 required sector-specific Federal departments and
agencies to identify, prioritize, and protect United States critical
infrastructure and key resources and to establish partnerships with the
private sector.
The FSSCC has 52 member associations and financial institutions
representing clearinghouses, commercial banks, credit rating agencies,
exchanges/electronic communication networks, financial advisory
services, insurance companies, financial utilities, Government-
sponsored enterprises, investment banks, merchants, retail banks, and
electronic payment firms.\1\ FSSCC members dedicate a significant
amount of time and resources to this partnership for critical
infrastructure protection and homeland security. The FSSCC does not
collect dues and its success as a volunteer organization relies heavily
on the time members contribute and to the expertise and leadership
roles members play within their respective financial institutions and
associations. Appendix A includes the current FSSCC organizational
chart, including those who serve in leadership roles of seven
committees that address crisis event management, cross-sector
coordination, cybersecurity, international, long-range vision, policy,
and research and development.
---------------------------------------------------------------------------
\1\ Members including: American Bankers Association, American
Council of Life Insurers, American Insurance Association, American
Society for Industrial Security International, BAI, Bank of America,
Bank of NY/Mellon, Barclays, BITS/The Financial Services Roundtable,
CME Group, ChicagoFIRST, Citigroup, The Clearing House, CLS Group,
Consumer Bankers Association, Credit Union National Association, The
Depository Trust & Clearing Corporation, Fannie Mae, Financial Industry
Regulatory Authority, Financial Information Forum, Financial Services
Information Sharing and Analysis Center, Freddie Mac, Futures Industry
Association, Goldman Sachs, ICE Futures U.S., Independent Community
Bankers of America, Investment Company Institute, JP Morgan Chase,
Managed Funds Association, Morgan Stanley, NACHA--The Electronic
Payments Association, The NASDAQ Stock Market, Inc., National Armored
Car Association, National Association of Federal Credit Unions,
National Futures Association, Navy Federal Credit Union, NYSE Euronext,
The Options Clearing Corporation, Securities Industry and Financial
Markets Association, State Farm, State Street Global Advisors,
Travelers, VISA USA Inc.
---------------------------------------------------------------------------
On August 3, 2010, I was selected by members of the FSSCC to serve
as the chairperson. I am preceded by four FSSCC chairpersons: Shawn
Johnson of State Street Global Advisors (SSGA) from 2008-10, George
Hender of the Options Clearing Corporation (OCC) from 2006-08, Don
Donahue of Depository Trust and Clearing Corporation (DTCC) from 2004-
06, and Rhonda MacLean of Bank of America from 2002-04. Prior to my
selection, I served as FSSCC's vice chairperson and head of the FSSCC
Cybersecurity Committee from June 2008 to August 2010. Additionally, I
serve on the Executive Committee and Board of the Partnership for
Critical Infrastructure Security (PCIS), which is the private sector
organization that coordinates homeland security issues for all National
critical infrastructure sectors.
Each year the FSSCC submits an annual report on our activities.
This annual report is published by the Department of Homeland Security
along with reports from the other CIP sectors. Appendix B is the
executive summary of our most recent Sector Annual Report which
provides an overview of our role and activities. Our partnership is
frequently heralded as the model and aspired to by the other 17
critical infrastructure sectors.
The goal of the FSSCC is to continue to improve the resilience and
availability of financial services by working through its public-
private partnership to address the evolving nature of threats and
vulnerabilities and the risks posed by the sector's dependence on other
critical sectors. In support of this goal, the FSSCC established four
objectives in 2010:
Identify threats and promote protection;
Drive preparedness;
Collaborate with the Federal Government;
Coordinate crisis response.
In support of these objectives the FSSCC's current priorities
include:
Information sharing;
Crisis event management;
Threat matrix dissemination and management;
Communication and outreach;
Identity assurance.
In 2002, the Treasury Department also chartered the Financial and
Banking Information Infrastructure Committee (FBIIC) under the
President's Working Group on Financial Markets.\2\ The FBIIC is charged
with improving coordination and communication among financial
regulators, enhancing the resiliency of the financial sector, and
promoting the public/private partnership. The U.S. Department of the
Treasury serves as the Sector Specific Agency (SSA) for the Banking and
Finance Sector. The FSSCC-FBIIC public-private partnership was
confirmed in Homeland Security Presidential Directive 7 of 2003.
---------------------------------------------------------------------------
\2\ The FBIIC was organized under Executive Order 13231 of October
16, 2001 entitled Critical Infrastructure Protection in the Information
Age. Members of the FBIIC include: American Council of State Savings
Supervisors; Commodity Futures Trading Commission; Conference of State
Bank Supervisors; Department of the Treasury; Farm Credit
Administration; Federal Deposit Insurance Corporation; Federal Housing
Finance Agency; Federal Reserve Bank of New York; Federal Reserve
Board; National Association of Insurance Commissioners; National
Association of State Credit Union Supervisors; National Credit Union
Administration; North American Securities Administrators Association;
Office of the Comptroller of the Currency; Office of Thrift
Supervision; Securities and Exchange Commission; and Securities
Investor Protection Corporation.
---------------------------------------------------------------------------
The FSSCC and FBIIC meet jointly at least three times a year,
supplemented by monthly conference calls. Earlier this week, over 80
executives, experts, and officials from the FSSCC and FBIIC met in
Chicago to discuss a wide range of issues, including: Information
sharing, regional coalitions, threats, and cyber incident reviews.
In addition to the collaboration with the FBIIC, it is important to
remind the committee that the financial services sector is highly
regulated by international, Federal, and State authorities. Through
numerous laws enacted by Congress over the past 150 years, Federal
financial regulators have implemented a complex regime that includes
supervision of the financial institutions' operational, financial, and
technological systems. Regulators, such as the Federal Reserve, Federal
Deposit Insurance Corporation, Office of the Comptroller of the
Currency and Securities and Exchange Commission, conduct examinations
to assess the adequacy of controls to address financial and other
risks. These examinations focus on information security, business
continuity, vendor management, and other operational risks.
In addition to these public sector entities, self-regulatory
organizations (SROs), such as the Municipal Securities Rulemaking Board
(MSRB), the Financial Industry Regulatory Authority (FINRA), the
National Futures Association (NFA), and exchanges, such as the Chicago
Mercantile Exchange (CME), and the New York Stock Exchange (NYSE), also
play an important role in industry oversight.
engagement with dhs
The FSSCC has a productive and expanding relationship with the
Department of Homeland Security (DHS), but more is needed. Our
engagement with DHS covers a wide range of activities, including crisis
management, information sharing, research and development, and managing
the risks posed by our sector's dependency on other critical sectors,
such as communications and information technology, for which DHS serves
as the SSA. In addition to meeting with senior officials at DHS, the
FSSCC and FS-ISAC have engaged in numerous projects and initiatives to
improve critical infrastructure and cybersecurity, including:
Information Sharing and Threat Identification.--On a daily basis,
there are cyber attacks. The financial services sector develops its own
information about threats, vulnerabilities, and incidents. These
threats, vulnerabilities, and incidences are shared within the
protection protocols of the sector. Financial institutions view the
risk environment much broader than just within our individual
organizations. Given the interconnections and risk exposure among
participants and counterparties, an attack on one institution could
have cascading implications for others in the sector.
When cyber attacks occur, the FSSCC has a defined crisis management
process, escalation and notification protocols to share information. As
part of this process, our sister organization, the Financial Services
Information Sharing and Analysis Center (known as the ``FS-ISAC''),
sends rapid notifications to member firms to protect critical systems
and assets.
The FS-ISAC reaches more than 20,000 sector participants daily and
promotes information sharing between the public and private sectors.
The FS-ISAC allows its members to receive threat and vulnerability
information immediately; communicate within a secure portal to share
vulnerability assessments and other information anonymously; and access
new data feeds of threat and vulnerability information. In addition,
the FS-ISAC has implemented a crisis communications system to notify
its members of emergencies in minutes.
In 2010, the Financial Services Information Sharing and Analysis
Center (FS-ISAC), which serves as the information-sharing operational
arm of the FSSCC, the Department of Defense and DHS, collaborated to
launch the Government Information Sharing Framework initiative (GISF)
based on initiatives with the Defense Industrial Base (DIB). This pilot
program consists of information sharing of threat and attack data
between the Federal Government and about a dozen financial services
firms. Beyond this, the FS-ISAC is the third sector (following the
Communications and IT sectors) to embed at the classified level, senior
and operational representatives within the DHS National Cybersecurity
and Communications Integration Center (NCCIC) as core members of the
watch and response teams. The Government's plan is to use these
examples as models for public-private sector information sharing for
other sectors to follow.
In early April, senior DHS officials and the FSSCC agreed to
collaborate on developing guidelines for when information should be
shared, especially information that is technical and contextual. This
decision to collaborate arose in response to a review of lessons
learned from recent cyber attacks, which I will review in greater
detail later in my testimony. In addition, the FSSCC is working with
the National Infrastructure Assurance Council (NIAC) on an information-
sharing study.
Sponsoring Security Clearances for Industry Professionals.--At the
urging of the FSSCC years ago, DHS and the Treasury have increased the
number of clearances for senior executives and experts from our sector.
In addition, DHS and the Treasury have arranged classified level
briefings each year, typically in conjunction with the FSSCC and FBIIC
meetings. Dozens of FSSCC members and all member firms represented on
the FS-ISAC Threat Intelligence Committee (TIC) are cleared to at least
the SECRET level. In addition, at least seven financial services
private sector individuals with cybersecurity responsibilities are
cleared at TOP SECRET/SCI level. For those individuals who have been
cleared, the process took a significant amount of time (not to mention
the time and expense from the Government side).
Collaborate on R&D.--The FSSCC R&D Committee has been working
closely with the Science and Technology Directorate of DHS for many
years. Our collaboration began in 2005 when the FSSCC established an
R&D Committee and shared the results of our efforts to identify the top
R&D priorities.\3\ Recently, we have focused considerable attention on
improving identity assurance. Our collaboration resulted in a
groundbreaking Memorandum of Understanding (MOU), which was signed on
December 6, 2010 by the FSSCC, DHS, and the National Institute of
Standards and Technology (NIST) with active support by the White House
Cybersecurity Advisor and head of the Office of Science and Technology
Policy.\4\ The MOU lays the foundation for developing an identity
assurance test bed that will focus on improving the accuracy and
timeliness of identity proofing, and reducing identity impersonation.
The collaborative initiative includes the concept of a ``financial
services credential verification gateway'' to enable direct
verification of identity credentials with the authenticating
authorities.
---------------------------------------------------------------------------
\3\ See https://www.fsscc.org/fsscc/news/default.jsp for the list
of top R&D priorities including: Advancing the state of the art in
designing and testing secure applications; making financial transaction
systems more secure and resilient; improving enrollment and identity
credential management; understanding human insider threats and
developing deterrence and detection; developing data-centric protection
strategies to better classify and protect sensitive information;
devising better measures of the value of security investments; and
developing practical standards to reduce risk and enhance resiliency.
\4\ See http://www.whitehouse.gov/blog/2010/12/06/partnership-
cybersecurity-innovation.
---------------------------------------------------------------------------
As a follow-up to the MOU, the FSSCC is working with DHS and NIST
on a Cooperative Research and Development Agreement (CRADA) on identity
proofing. Also envisioned in the MOU is an effort to define and test
the concept of establishing a secure domain within the larger internet,
where critical industries and Government can more securely exchange
sensitive information and complete high-risk transactions. This effort
also includes planning and testing for IPv6 and DNSSEC transitioning.
Other R&D activities include establishing and/or expanding
relationships with academia, DHS, National Science Foundation (NSF),
NIST, and the Department of Defense's Networking and Information
Technology Research and Development (NITRD) to provide financial
services expertise and enhance the transfer of promising research into
commercial use. In addition, members of the FSSCC have participated in
an insider threat study that DHS's U.S. Secret Service has been
conducting for several years.
Comments on Strategies and Cyber Incident Response Plans.--The
FSSCC has worked with DHS and White House officials in commenting on
the National Strategy for Trusted Identities in Cyberspace (NSTIC). The
FSSCC also has provided input into the National Cyber Incident Response
Plan and supported the National Security Telecommunications Advisory
Committee (NSTAC) Cross Sector Information Sharing Pilot.
Cross-Sector Coordination.--The FSSCC continues to work with cross-
sector councils. For example, the FSSCC and FS-ISAC participate in the
DHS Cross Sector Cyber Security Working Group (CSCWG), which has
representation across the 18 critical infrastructure sectors and meets
monthly to review cross-sector cybersecurity strategies, programs, and
projects of interest. From a crisis management perspective, the FS-ISAC
presence in both the National Infrastructure Coordination Center (NICC)
and the NCCIC supports close cooperation and coordination for disaster,
physical security, and cybersecurity events. We also are working with
the other critical sectors through the Partnership for Critical
Infrastructure Security (PCIS), an ``arm'' of DHS's partnership
structure outlined in the NIPP, to share critical contact information
for each sector as a first step to developing an efficient all hazards
cross-sector crisis response plan.
In 2010, a more formal cross-sector information-sharing pilot was
funded by the President's National Security Telecommunications Advisory
Committee (NSTAC). Four sectors participated in this pilot: Financial
services, communications, IT, and the defense industrial base. The FS-
ISAC provided the secure portal by which the four sectors exchanged
cyber threat data. Relevant and actionable cyber threat information was
exchanged during the pilot, which would not have been known to the
other sectors. As a result of the program's success, the pilot was
extended in 2011 with the intent of rolling it out to all interested
sectors later in the year. Furthermore, the FSSCC is involved in cross-
sector work of the PCIS in order to share critical contact information
for each sector as a first step to developing an efficient cross-sector
crisis response plan.
Participation in Cyber Exercises and Crisis Playbooks.--The
financial services sector has performed multiple exercises testing
various perceived vulnerabilities and establishing follow-up actions as
a result of lessons learned. Significant tests were run to evaluate
sector preparedness related to social engineering attacks, payment
processing attacks, and communication during a crisis. In particular,
the 2009 Cyber Financial Industry and Regulators Exercise (CyberFIRE)
and Cyber Attack against Payment Processes (CAPP) exercise were jointly
executed by the FSSCC, FS-ISAC, and included many FBIIC members, the
U.S. Secret Service, the Federal Bureau of Investigation (FBI), DHS,
and more than 800 individual participants. Members of the FSSCC are
also planning to participate in the upcoming National Level Exercise
No. 13 in May. The FSSCC and FS-ISAC have created crisis response
playbooks in order to clarify lines of communication during crises. The
sector provided leadership for recent events requiring a coordinated
response, including the earthquake in Haiti, pandemic flu, and
hurricane situations.
Support for Regional Coalitions and Fusion Centers.--Since 2002,
the FBIIC and the FSSCC have supported the formation of regionally-
based financial partnerships and coalitions dedicated to enhancing the
resilience of the financial community in specific geographic areas. At
present, there are nearly two dozen regional coalitions that consist of
private sector members who partner with the public sector. DHS and the
Treasury Department have been very supportive of these organizations,
primarily through the Regional Partnership Council (RPCfirst), the
umbrella organization to which the coalitions belong. Chicago FIRST, as
the Chair of RPCfirst, partnered with the DHS National Cyber Security
Division (NCSD) to develop ``cyber tabletop in a box.'' Regional
coalitions are conducting these tabletop exercises involving Federal,
State, and local law enforcement in their respective regions. In
addition, there are 72 fusion centers where experts from various
Federal and local government agencies share information and collaborate
with private sector participants.
Supply Chain Risks.--One of the emerging issues that FSSCC members
are evaluating is the security of the global supply chain. Members
continue to seek better assurances from our vendors that the major
information technology and communications hardware and software systems
that we deploy in our networks employ secure development practices and
are free from malware or other threats that may have been implanted in
the supply chain process. For example, in 2010, the sector published,
the Resilient International Telecommunications Guidelines for the
Financial Services Sector, highlighting the international risks
associated with the undersea cables network.\5\ This report identified
both the risks associated with a critical infrastructure component,
provided guidelines for managing those risks, and the need for
increased international collaboration. The FSSCC worked closely with
FBIIC members, most notably the Federal Reserve Board, and the National
Communications System, a division of DHS, that works closely with major
telecommunications providers.
---------------------------------------------------------------------------
\5\ See https://www.fsscc.org/fsscc/publications/default.jsp.
---------------------------------------------------------------------------
information sharing lessons learned from recent cyber attacks
Information sharing is of critical importance to the financial
services sector, other critical infrastructure sectors and the
Government. Without it, none of the FSSCC's other top priorities--
crisis event management, threat matrix dissemination and management,
identity assurance--would be achievable. Although we have made good
progress in creating information-sharing entities, to share information
securely and efficiently, we have not adequately tackled the critically
important issues associated with the timeliness and completeness of
information. We now need to focus on clarifying and compartmentalizing
information so that ``actionable intelligence'' can be disseminated to
responsible parties that will use it to protect critical
infrastructure. What I mean by ``actionable intelligence'' is redacted
technical information and contextual information without revealing
sources and uses or tipping off criminals or adversaries.
Information sharing among financial institutions, other critical
infrastructure sectors, and the Government is important for several
reasons. First, a company that is a victim of a cyber attack is
concerned about protecting its customers, its reputation and complying
with regulatory requirements. Second, others in the sector are
concerned about the impact that this a cyber attack could have on its
organization and counterparties or provider might have on their
operations, as well as the potential for systemic risk to entire
financial services sector. Third, the Government is responsible for
enforcing laws and promoting protecting critical infrastructure
protection. The Government also holds important information that is
both technical, such as malware signatures, and contextual, such as
what type of entity appears to be initiating the attack. This is due to
the Government's own operations in cyberspace and other roles including
law enforcement, defense, and regulation.
There is a strong need to establish appropriate and well-understood
protocols to share information so that we collectively understand the
problems and risks that we face in order to arrive at the right
response or solution. The fundamental issue of striking a balance
between confidentiality for criminal investigations and timely
information sharing remains a work in progress.
An example of an incident where too much secrecy led to an
increased exposure was the cyber attack on a major exchange, which was
discovered by the exchange in October 2010. The exchange alerted its
primary regulator and law enforcement. For a variety of reasons,
including an investigation of the attack by law enforcement and
intelligence agencies, information about the attack and its impact on
other financial institutions was not disclosed to others in the
financial services sector for 102 days. This 102-day period included
year-end, when financial institutions closed their books and prepare
annual reports. This could have had an enormous impact on employees,
stockholders, large and small, and the market as a whole. The lack of
meaningful information for more than 3 months left the entire sector
unnecessarily vulnerable.
In response to this event and recent discussions with senior DHS
officials, the FSSCC and DHS have agreed to collaborate on developing
guidelines for when information should be shared, especially
information that is technical and contextual. FSSCC members believe
that a more transparent decision-making process would accelerate the
dissemination of information without interfering or undermining
criminal and National security investigations. We also hope that these
protocols will elevate the priority that government places on sharing
information associated with protecting critical infrastructure. Also,
by leveraging the security clearances that DHS and other Government
agencies have sponsored for members of the FSSCC, the Government could
consult with industry experts to better understand the systemic risk
implications of the cyber events.
recommendations for improving public-private partnership
FSSCC recommends the following activities to improve the public-
private partnership with DHS and other Government agencies:
1. Protecting Critical Infrastructure Through Enhanced Information
Sharing.--We have made good progress in creating utilities to share
information securely and efficiently. However, we have not adequately
tackled the critically important issues associated with the timeliness
and completeness of information. We now need to focus on clarifying and
compartmentalizing information so that it can be disseminated via the
FS-ISAC. This is also important for the Government to better understand
the significance of information, including the impact on the critical
infrastructure sectors. We cannot assume the Government will know how
to evaluate the risks unless experts from the financial services sector
(or other CIP sectors) have a seat at the table. We also recognize that
there will be times when the Government cannot consult with industry
sectors and thus there needs to be clarity as to when and how
information will be shared.
As noted earlier in my testimony, FSSCC and DHS have agreed to
collaborate on developing guidelines for when information should be
shared, especially information that is technical and contextual.
Together, we need to learn from the recent breaches and establish
guidelines where we have more predictability in knowing when
information will be shared.
Building trust and enhancing understanding is a compelling reason
for expanding the number of clearances to senior executives and experts
in the financial services sector who are in position to
``operationalize'' timely and relevant threat and attack intelligence.
We also urge DHS to establish clearer protocols for the sponsorship of
private sector security clearances that are not directly related to a
Government contract and for non-U.S. citizens. We recognize that this
is a fairly new development and one which does not have clear
protocols, either among the sponsoring agencies, or in the private
sector. A system that would identify and categorize critical job
functions into ``need to know'' status should effectively expand the
community of private sector stakeholders who can get early Government
notification of significant issues. FSSCC members also suggest better
``tearline'' documents and the availability of classified information
on a geographically, disaggregated basis. Moreover, nationality is a
consideration not covered under current ``cold war''-derived clearance
protocols as not all the appropriate individual's in corporate
information security group who have a ``need-to-know'' homeland
cybersecurity information are U.S. citizens. We propose that the
clearance mechanism should expand to consider at minimum clearing
individuals from the UKUSA agreement countries (United Kingdom, Canada,
Australia, and New Zealand) and other countries, as possible, based on
government-to-government background check arrangements.
We need to enhance improve information sharing with the
communications, information technology, and electricity sectors.
Currently the FS-ISAC and FSSCC have little to no operational
transparency into other sectors. This may somewhat be addressed by the
embedding of personnel in the NCCIC however further policy and
engagement is required to provide a Common Operating Picture (COP)
across those dependent infrastructures.
2. Conduct more exercises and training.--In addition to clearances
and information sharing, we have found that we build greater trust
through exercises and training. By routinely engaging in exercises and
training through tabletop exercise, meetings, and awareness campaigns
we bring the right public and private sector participants together on a
regular basis. Working together, building relationships and
establishing trust are essential parts of creating a culture that can
share useful and timely information. The embedding of financial sector
personnel in the NCCIC and NICC is a positive step in that engagement
process.
3. Invest in R&D.--In addition to supporting the MOU and CRADAs on
identity assurance, we also encourage the Government to look to
emerging research on automated methods of attack detection,
communication, and prevention. As an example of the possibilities that
could be considered, DHS released a white paper entitled, Enabling
Distributed Security in Cyberspace. While this was only a concept
paper, it suggests a thoughtful, if ambitious vision for the future
where: ``A healthy cyber ecosystem would interoperate broadly,
collaborate effectively in a distributed environment, respond with
agility, and recover rapidly. With a rich web of security partnerships,
shared strategies, preapproved and prepositioned digital policies,
interoperable information exchanges, . . . healthy cyber ecosystem
could defend against a full spectrum of known and emerging threats,
including attacks against the supply chain, remote network-based
attacks, proximate or physical attacks, and insider attacks . . .''.\6\
---------------------------------------------------------------------------
\6\ http://www.dhs.gov/xlibrary/assets/nppd-healthy-cyber-
ecosystem.pdf.
---------------------------------------------------------------------------
4. Coordinate efforts internationally.--Cybersecurity is not an
issue that can be defined by geographic or political borders. The
National Cybersecurity and Communications Integration Center is slowly
making strides in bringing together industry and Government operational
capabilities under one roof, breathing the same air, to create a cross-
sector common operational picture about our cyber threats and
vulnerabilities. The FS-ISAC has a seat in the NCCIC, and both FSSCC
and FS-ISAC are participating in the Unified Coordination Group that is
developing the NCCIC's information sharing and incident response
process.
The FSSCC recognizes that this is a difficult endeavor--one that
involves numerous complexities around National security intelligence,
legal authorities, regulatory requirements, privacy protections, and
contractual restrictions. We are not where we need to be yet, but we
are moving in the right direction--to an envisioned end state where
private sector members of the NCCIC are able to communicate threat
intelligence in real time to their sector partners and coordinate
protective or mitigating action jointly with the Government and other
sectors.
comments on cybersecurity legislation
The committee had also asked for me to comment on cybersecurity
legislation. In general, the FSSCC is supportive of policies in which a
``rising tide lifts all boats''. By that I mean the Government should
offer incentives and, in some cases, require minimum security and
resiliency standards for utilities that service critical infrastructure
sectors. These utilities include entities like internet service
providers and others with whom our sector and other critical
infrastructure sector are dependent. For example, we need to ensure
that these utilities adopt practices to protect networks, manage
incidences, and address our long-standing concerns with internet
congestion during a time of crisis.\7\ The development of these
standards should be driven by private sector, consensus-driven bodies.
What has been lacking is a comprehensive cross-cutting review of the
cyber risk, mitigation, and regulatory dynamics across all of the
critical sectors to ensure that any ``minimum standards'' legislation
can allow specific security gaps in each sector to be addressed without
imposing one-size-fits-all standards that contradict existing sector
regulation.
---------------------------------------------------------------------------
\7\ U.S. Department of Homeland Security, Pandemic Influenza Impact
on Communications Networks Study, December 2007. http://www.ncs.gov/
library/pubs/
Pandemic%20Comms%20Impact%20Study%20%20Best%20Practices.pdf; GAO,
Influenza Pandemic: Key Securities Market Participants Are Making
Progress, but Agencies Could Do More to Address Potential Internet
Congestion and Encourage Readiness, GAO-10-8, October 2009. http://
www.gao.gov/new.items/d108.pdf.
---------------------------------------------------------------------------
The FSSCC supports the following provisions:
Commitment to two-way public-private information sharing and
cross-sector information-sharing efforts, leveraging the
Information Sharing and Analysis Centers (ISACs), the Sector
Specific Agencies (SSAs), US-CERT, safe harbors, clearances,
and confidentiality guarantees. Such a commitment is vital to
facilitate the sharing of actionable and timely information,
particularly during cyber emergencies.
Focused efforts to address critical interdependencies such
as our sector's reliance on telecommunications, information
technology, energy, and transportation sectors.
Leveraging Federal cybersecurity supply chain management and
promotion of cybersecurity as a priority in Federal
procurement.
Public education and cybersecurity awareness campaigns to
promote safe computing practices.
Enhanced international collaboration and accountability in
law enforcement and industry, including increased funding for
law enforcement and facilitating the development of global
cybersecurity standards.
Increasing funding for applied research and encouraging
collaboration with Government research agencies on
authentication, access control, identity management,
attribution, social engineering, data-centric solutions, and
other cybersecurity issues. It is only through such public-
private efforts, combined with adequate funding, that leading-
edge research in these important areas can enhance our ability
to secure on-line transactions, maintain data integrity, and
enhance user confidence.
Attention to ICANN and other international internet
governance bodies especially as ICANN begins a new application
round for what could be as many as a thousand new top-level
internet domains later this year. It is vitally important that
effective oversight exist to enhance security and privacy
protections.
Need for enhanced supervision of service providers on whom
financial institutions depend, while at the same time
recognizing the role of Federal financial regulators in issuing
regulations and supervisory guidance on security, privacy
protection, business continuity, and vendor management for
financial institutions and for many of the largest service
providers. Strengthening Government-issued credentials (e.g.,
birth certificates, driver's licenses and passports) that serve
as foundation documents for private sector identity management
systems.
The FSSCC does not support provisions that provide sweeping new
authority for the Executive branch to remove access to the internet and
other telecommunications networks, without clarifying how, when, and to
what extent this would be applied to our critical infrastructures. Such
a provision also sets the wrong precedent in light of recent
restrictions on internet use imposed in other countries.
conclusion
In conclusion, I would like to thank the committee for inviting me
to testify today on behalf of the FSSCC on the DHS cybersecurity
mission and how they interact with private sector owners. Both the
public and private sector financial services organizations recognize
the importance of improving information sharing as part of continuity
planning, crisis management, and enhancing resiliency in preparing for
and responding to significant events. We know that during a real crisis
we cannot operate as independent entities and thus we must establish
trusted relationships and plan ahead of time so that we are prepared to
respond to a real crisis. It is my hope that the good work done to date
in bridging the public-private divide by FSSCC and DHS continues and
that we find additional ways to effectively combat those who would seek
to undermine our economy and stability--be they homegrown or foreign,
criminal or terrorist, rogue or state-sponsored. It is only by working
together that we will prevail in the complex and every changing
internet-connected world.
Appendix A: FSSCC Org Chart
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Appendix B: Executive Summary of Sector Annual Report
executive summary
In 2003, the Banking and Finance Sector, hereinafter referred to as
the Financial Services Sector, was identified as a critical
infrastructure sector pursuant to Homeland Security Presidential
Directive 7 (HSPD-7); the U.S. Department of the Treasury was
identified as the Sector-Specific Agency (SSA) for the sector. As the
SSA, the Treasury Department works with its public and private sector
partners to maintain a robust sector that is resilient against manmade
or natural incidents. The Financial Services Sector is essential to the
efficiency of world economic activity. This Sector Annual Report
outlines the requirements for current and future protective programs
based on HSPD-7.
Both the private and public sectors, through the Financial Services
Sector Coordinating Council for Critical Infrastructure Protection and
Homeland Security (FSSCC) and the Financial and Banking Information
Infrastructure Committee (FBIIC), respectively, have key roles in
implementing the Financial Services Sector's critical infrastructure
and key resources (CIKR) protective programs. Through direct mandates
and regulatory authority, Federal and State financial regulators have
specific regulatory tools that they can implement in response to a
crisis. In addition, the Department of the Treasury--along with the
FBIIC, the FSSCC, Financial Services Information Sharing and Analysis
Center (FS-ISAC), and regional partnerships--have developed and
continue to implement numerous protective programs to meet the
Financial Services Sector's goals. The protective programs range from
developing and testing robust emergency communication protocols, to
identifying critical Financial Services Sector threats, to addressing
cybersecurity protection needs. The success of the public-private
partnership has proven critical to the Financial Services Sector's
achievements through one of the most challenging periods for the sector
with respect to credit and liquidity risks.
The scope of the Financial Services Sector includes public and
private institutions involved in carrying out the primary sector
functions of clearing, payment, settlement, and trading. Multiple
organizations perform these functions and collectively represent the
Financial Services Sector.
Clearinghouses
Commercial banks
Credit rating agencies
Exchanges/electronic communication networks
Financial advisory services
Financial utilities
Government and industry regulators
Government subsidized entities
Investment banks
Merchants
Retail banks
Insurance companies
Electronic payment firms
Through the public-private partnership, the following vision
statement for the Financial Services Sector has been established.
``Vision Statement
``To continue to improve the resilience and availability of financial
services, the Banking and Finance Sector will work through its public-
private partnership to address the evolving nature of threats and the
risks posed by the sector's dependence on other critical sectors.''
The Financial Services Sector pursues this vision by working toward
its three sector goals:
1. To achieve the best possible position in the face of myriad
intentional, unintentional, manmade, and natural threats
against the sector's physical and cyber infrastructure;
2. To address and manage the risks posed by the dependence of the
sector on the Communications, Information Technology, Energy,
and Transportation Systems Sectors; and
3. To work with the law enforcement community, financial regulatory
authorities, the private sector, and our international
counterparts to address threats facing the Financial Services
Sector.
In support of the sector goals, the FSSCC has recently updated its
mission and objectives, as is further described in Section 3.
Representing the strategic arm of the Financial Services Sector, the
FSSCC has established the following objectives:
Identify Threats and Promote Protection
Drive Preparedness
Collaborate with the Federal Government
Coordinate Crisis Response
The Financial Services Sector's goals and objectives guide our
activities in managing significant sector risks. Significant sector
risk considerations have been identified and are described in greater
detail in Section 2. They are summarized as follows:
Confidence Risk
Concentration Risk
Supply Chain Risk
Infrastructure Risk
Geographic Proximity Risk
Technology Risk
Management of these risks has resulted in the identification of the
following potentially significant sector vulnerabilities:
1. Confidentiality.--Maintaining the confidentiality of clients and
meeting all legal requirements for maintaining confidentiality;
2. Integrity.--Ensuring transactional integrity to support
financial transactions; and
3. Availability.--Ensuring that financial services are available to
maintain the smooth flow of capital.
The sector's goals, initiatives, and activities are in pursuit of
achieving the four objectives identified above to effectively manage
sector risks and vulnerabilities.
The following sections summarize the significant activities that
are described in subsequent chapters of this Financial Services Sector
Annual Report.
ES.1 Strategic Goals
Over the past year, the Financial Services Sector set forth the
following objectives and goals that drive the FSSCC activities and
guide activities of the sector's multiple organizations.
------------------------------------------------------------------------
Strategic Objectives 2010 Goals
------------------------------------------------------------------------
Identify Threats and Promote Finalize updated Threat Matrix.
Protection. Disseminate Threat Matrix and build into
strategy.
Build Threat Matrix into ongoing planning
and execution of FSSCC goals.
Drive Preparedness........... Establish regularized process for
escalating events and disseminating
information in the form of actionable
intelligence.
Establish more direct international
relationships.
Further the undersea cables work.
Develop supply chain frameworks.
Disseminate CyberFIRE and Cyber Attack
against Payment Processes (CAPP)
Exercise learning.
Support regional coalitions.
Collaborate with the Federal Establish on-going interaction with (1)
Government. the new White House Cybersecurity
Coordinator and (2) DHS/National
Security Agency (NSA).
Address internet congestion as part of
DHS interaction.
Develop Identity Management Principles
and request for investment.
Implement Government Information Sharing
Framework initiative with Department of
Defense (DoD) and DHS.
Develop sector-wide position on Internet
Corporation for Assigned Names and
Numbers (ICANN).
Engage in conversation on cyber and
critical infrastructure legislation and
determine appropriate next steps.
Deliver a finance and banking educational
session.
Coordinate Crisis Response... Expand and improve crisis management
response playbooks.
Improve usefulness and mindshare of
playbooks.
------------------------------------------------------------------------
ES.1.1 Identify Threats and Promote Protection
The Financial Services Sector is developing a comprehensive All-
Hazards Threat Matrix accounting for over 1,900 individual threats. A
risk-ranking methodology is being used that can be applied at the
sector level and adopted by individual organizations to adapt to their
specific needs. As a major initiative for the sector, begun in 2009, it
will continue throughout 2010 and serve as the foundation for strategic
efforts going forward.
Additionally, the sector published the Resilient International
Telecommunications Guidelines for the Financial Services Sector
(Undersea Cables Report), highlighting the international risks
associated with our undersea cables network. This significant report
highlights both the risks associated with a critical infrastructure
component and the need for increased international collaboration.
Additionally, the sector has elevated its focus on cybersecurity.
Several exercises have been run to identify cyber threats, and research
and development (R&D) efforts have been focused on addressing
vulnerabilities through a collaborative public-private joint effort.
The sector made significant contributions to the National Cyber
Incident Response Plan, created new FSSCC working groups focusing on
Identity Management and Supply Chain issues, and engaged with the
Director of National Intelligence and the intelligence community on
multiple cyber issues.
ES.1.2 Drive Preparedness
The sector has performed multiple exercises testing various
perceived vulnerabilities and establishing follow-up actions as a
result of the learning. Significant tests were run to evaluate sector
preparedness related to social engineering attacks, payment processing
attacks, and communication during a crisis. In particular, the Cyber
Financial Industry and Regulators Exercise (CyberFIRE) and Cyber Attack
against Payment Processes (CAPP) Exercises were jointly executed by the
FSSCC, FS-ISAC, and FBIIC and included the U.S. Secret Service, the
Federal Bureau of Investigation (FBI), and the U.S. Department of
Homeland Security (DHS), plus more than 800 individual participants.
Sector crisis response playbooks have been created and strategic
and tactical efforts have been delivered to clarify lines of
communication critical in crisis response. The sector coordinated over
45 operators and associations and performed multiple other FS-ISAC and
regional exercises throughout the year.
ES.1.3 Collaborate with the Federal Government
The Financial Services Sector has stepped up its partnership with
the U.S. Government, academia, and related sectors. The sector has
established successful working relationships with academia, the
National Institute of Standards and Technology (NIST), the Department
of Homeland Security, the National Science Foundation (NSF), and the
Networking and Information Technology Research and Development (NITRD)
program; participated in a roundtable with the DHS Secretary; and
established a working dialogue with the White House's Office of Science
and Technology Policy (OSTP) through Aneesh Chopra.
The sector has further contributed significantly to Government-led
initiatives in identity management and the development of incident
response plans. Coordination among intelligence agencies, regulators,
other Government agencies, and the private sector has received
considerable focus and is a hallmark of the sector's achievements.
The FS-ISAC has collaborated with DoD and DHS to launch the
Government Information Sharing Framework initiative. This pilot program
has been implemented in 2010 and consists of large-scale information
sharing of threat and attack data between the Federal Government and
financial services firms that have agreed to participate. The
Government's plan is to use this as a public-private sector
information-sharing model for other sectors and other Federal
Government agencies to follow.
ES.1.4 Coordinate Crisis Response
The sector collaborated to develop crisis response plans for all
hazards, as well as specific plans for hurricanes. The sector provided
leadership for recent events requiring a coordinated response,
including Haiti, pandemic flu, and hurricane situations.
ES.1.5 Conduct Research and Development
Led by the FSSCC R&D Committee, the sector has identified and
progressed on seven R&D priorities it has established (further
described in Section 5):
Advancing the State of the Art in Designing and Testing
Secure Applications
Making Financial Transaction Systems More Secure and
Resilient
Improving Enrollment and Identity Credential Management
Understanding Human Insider Threats and Developing
Deterrence and Detection
Developing Data-Centric Protection Strategies to Better
Classify and Protect Sensitive Information
Devising Better Measures of the Value of Security
Investments
Developing Practical Standards to Reduce Risk and Enhance
Resiliency.
The FSSCC R&D Committee has proposed to senior White House and
other Government officials a public-private sector collaboration to
improve identification validation and has drafted a proposal on an
identity credential verification gateway. Further, it participated in
the Federal Government's National Cyber Leap Year Summit and put forth
the Financial Communications and Authentication Pilot (``testbed'') in
response to discussions among the FSSCC R&D Committee, senior White
House personnel, and NIST and DHS officials.
Outreach for R&D efforts has been significantly expanded. Several
comment letters have been sent, and engagements have occurred with
multiple Government organizations, including the U.S. Department of
State on ``Current Challenges and Future Strategies for Improving
Identity Management,'' the Critical Infrastructure Protection Congress
on identity management, and the Internet Corporation for Assigned Names
and Numbers (ICANN) on the expansion of top-level domains, among
others.
ES.2 Sector Challenges and Looking Forward
Looking forward to the next year, the Financial Services Sector
will build on its substantial success achieved in the past year. While
priorities will be set later in the year, significant efforts are
expected to focus on the following:
Evaluating the top threats to the Financial Services Sector
Coordinating multiple Government activities
Researching internet congestion
Investigating ICANN proposals to expand top-level domains
Exploring identity management issues
Expanding international coordination.
Mr. Lungren. Thank you very much.
Now Dr. Amoroso.
STATEMENT OF EDWARD AMOROSO, SENIOR VICE PRESIDENT AND CHIEF
SECURITY OFFICER, AT&T
Mr. Amoroso. Well, thank you very much.
This is a topic I have spent the last 30 years thinking
about exclusively. So I am not a lot of fun at cocktail
parties. But it is something that I know a fair bit about.
Let me see if I can boil down the fundamental issue of
cybersecurity in particular as it relates to homeland security.
It is something that I think people can pretty well understand.
That is how you protect your home computer.
Like if I had asked everybody in the room to take a moment
and think about what you do at home, you probably went to
Staples or something and bought, you know, a box of internet
security or it came with the computer. You enabled it, and that
is pretty much it. You are completely on your own. Like you
might call the Geek Squad if you get in trouble, or you might
have a really smart teenager in the family who can do something
if you get hopelessly tangled up. Or you might just give up and
go buy a new computer, right, if you think that you are full of
malware and other types of things.
This experience that we all have at home is exactly the
experience that small businesses and Government agencies and
large businesses have as well. We go out and we buy software
and systems that we hope are going to work, and then we are
pretty much on our own. I know in each of the districts that
you represent, you probably hear that from small business
owners all the time. Citizens are starting to recognize that
this is an issue.
I think from a homeland perspective, this causes a big
problem, right, because, as you all know, the new battlefield
that we work from a cyber perspective includes all our home
PCs, right? That is how botnets are created. We are in some
sense kind of negligent in protecting our PCs, and criminals
and terrorists and enemy states take advantage of that and
create weapons in that respect.
So we have prepared some formal remarks that we have issued
that have some suggestions, but I just want to summarize a
couple of them.
If you think about that question of coordination, like when
a group is under attack, it is the case now in 2011 that there
is no good way to share information in real time. I know that
at AT&T, for me to try to do something like that with
Government involves as many lawyers as there are in this room
for us to just share something. It is ironic that I can
probably share information back and forth with a hacking group
with complete impunity, but with the Government I have to have
a team of lawyers present.
So that concept and the whole issue of a National sort of
cyber coordinating capability that has real-time information
sharing--and I don't mean after the fact. I mean something that
would allow us in real time to share and to coordinate.
Let's say you are in Brooklyn and you are living and you
see something funny going on that you are not sure is normal in
your neighborhood. We are all kind of trained to kind of take
action. You can imagine that a nation of businesses and
agencies and individuals who in some sense have it in their
best interest to behave accordingly and to share that
information would make us all a heck of a lot safer.
There really is no mechanism for that. I know at AT&T
sometimes we find that kind of frustrating. Because we have
information that may be very useful at times to DHS, and we
know DHS does as well. I think the NCCIC is a good example of
moving in the right direction toward trying to sort of connect
different groups together. But I think the essence of real
time, the essence of situational awareness, these are things
that are very immature in our country right now.
I would add, you will see in the remarks that we have
prepared for the group, it extends to global as well. It turns
out that political boundaries don't map too nicely to
cybersecurity infrastructure. There are ways that we do naming,
for example, on the internet, the way you get your website
named or your e-mail address named. These are global standards,
and they run on systems that transcend political boundaries. I
have infrastructure at AT&T that is located around the globe,
under different jurisdictions with different laws. So even if
we got our act together and really laid out a good domestic
plan, it is not enough. We have to go out and work it globally.
So I hope you will read our prepared remarks. We make some
suggestions there. But keep in mind that the challenge you have
at home with your home PC is a good model for the kinds of
problems that Government agencies and businesses have as well.
So I appreciate the invite and look forward to the
discussion.
[The statement of Mr. Amoroso follows:]
Prepared Statement of Edward Amoroso
April 15, 2011
Chairman Lungren and Ranking Member Clarke, I would like to thank
you and all the Members of the subcommittee for this invitation to
address the significant challenges facing the private sector and the
Department of Homeland Security in securing critical infrastructure
from cyber threats. In my testimony, I will try to identify current
challenges as well as the actions that can be taken to address those
challenges; and in particular how to coordinate the Government's
cybersecurity capabilities with the private sector's investment in
infrastructure and operational capabilities.
my background
I currently serve as senior vice president and chief security
officer of AT&T, where I have worked in the area of cybersecurity for
the past 26 years. My educational background includes a Bachelor's
degree in physics from Dickinson College, as well as Masters and Ph.D.
degrees in computer science from the Stevens Institute of Technology,
where I have also served as an adjunct professor of computer science
for the past 22 years. I am a graduate of the Columbia Business School,
and have written many articles and five books on the topic of
cybersecurity. My most recent book is entitled ``Cyber Attacks:
Protecting National Infrastructure'' (Butterworth-Heinemann, 2011).
My current responsibilities include design and operation of the
security systems and processes that protect AT&T's vast domestic and
international wired and wireless infrastructure. This infrastructure is
the core asset that permits AT&T to provide the wide variety of
advanced network services that AT&T offers to its many millions of
customers around the world, ranging from the largest global business
enterprises to individual consumers. AT&T has also had the opportunity
to work with the Department of Homeland Security (DHS) in a variety of
ways in the decade since the Department was created.
For instance, we actively participate with DHS in the National
Cybersecurity Communications Integration Center (NCCIC) in both its
National security/emergency preparedness and cybersecurity missions. We
are also active participants in the President's National Security
Telecommunications Advisory Council (NSTAC) and the Communications
Sector Information Sharing and Analysis Center, both of which are
administered by DHS. We have also supported DHS in the testing and
evaluation of prototype network-based cybersecurity capabilities over
the last several years. Finally, we were the first company to obtain a
formal Authority-To-Operate to provide Trusted Internet Connection
service to Government Agencies through the General Services
Administration (GSA)/DHS joint Managed Internet Protection Service
initiative under the GSA Networx contracts.
what is cybersecurity?
Simply put, from the perspective of protecting the Nation's
critical infrastructure, cybersecurity is the ability to protect
critical systems from disruption, or critical information from
alteration or theft. Potential threats range from disgruntled
individuals to criminal elements to transnational actors to
sophisticated and well-resourced nation states. Motives can range from
mischief to deliberate acts of hostility through sabotage and
terrorism. The methods and forms of infrastructure intrusion are
continually advancing so as to bypass standard preventive measures such
as the application of firewalls and intrusion detection systems between
the critical system and the internet at large. One such form of
evolving cyber attack uses ``botnets''--which are run by malicious
parties who are increasingly adept at harnessing the power of dispersed
personal computers and other smart devices attached to the Nation's
networks and using them to attack unsuspecting victims.
As the largest provider of communications and network services in
the world, AT&T takes very seriously its responsibility to protect our
infrastructure and our customers from the vast and ever-changing cyber
threats. Cybersecurity is a business imperative at AT&T, and we work
very hard at it, investing significant resources to innovate and keep
pace with technology that may be either the source or target of the
threats. The size and scope of AT&T's global network, coupled with our
industry-leading cybersecurity capabilities, gives AT&T a unique
perspective into malicious cyber-activity. AT&T offers one of the
world's most advanced and powerful global backbone networks, carrying
23.7 Petabytes of data traffic on an average business day to nearly
every continent and country (a Petabyte is a million billion bytes of
data, or a ``one'' followed by 15 zeros), and we expect that to double
every 18 months for the foreseeable future. Our intelligent network
technologies give us the capability to analyze traffic flows to detect
malicious cyber-activities, and in many cases, identify very early
indicators of attacks before they have the opportunity to become major
events. For example, we have implemented the capability within our
network to automatically detect and mitigate most Distributed Denial of
Service Attacks within our network infrastructure before they affect
service to our customers, and we continue to improve our ability to
provide global coverage to mitigate denial-of-service attacks from
multiple locations across the United States, as well as nodes in Europe
and Asia. We are constantly improving our cyber capabilities, including
the ability to detect and mitigate Advanced Persistent Threats, the
most sophisticated and pernicious forms of cyber attack.
what needs to be done?
I would like to outline four broad themes for your consideration
during today's hearing. Improving the overall cybersecurity posture of
the United States is a daunting task. We cannot undertake this
challenge unilaterally--it is clearly a global issue in all its
dimensions. The administration and the Congress have put forth a
variety of ideas and initiatives on how we can begin to tackle this
challenge; some are helpful, and some would stifle the innovation and
flexibility we need to identify and respond to the ever-changing
threats. Improving our National cybersecurity posture is a long journey
that will not be solved by simple pronouncements or regulatory
dictates. We can, however, start to put some foundational elements in
place to build on for the future.
1. Build a Collaborative Active Cyber-Defense Capability.
First and foremost, the United States needs to build a
collaborative active cyber-defense capability. The global
communications infrastructure is the primary vehicle for delivery of
cyber attacks against U.S. interests, yet there is no comprehensive
coordination mechanism for rapidly detecting and analyzing attacks and
responses. Each Tier One communications network operator and service
provider monitors its own network to varying degrees, with varying
capabilities to mitigate or block attacks. In addition, the multiple
Government programs which already exist are focused on monitoring
traffic to and from multiple Government networks--none of which are
operationally integrated. Given the increasing sophistication and scope
of cyber attacks, we can no longer expect that individual companies or
consumers, or disparate Government network monitoring programs, provide
adequate protection against evolving threats.
Attack-related protective information might be known to the Federal
Government, for example, but otherwise unknown to private industry. In
the event that a Government agency becomes aware of a malicious attack
signature that could be deployed into intrusion detection systems to
protect industrial, non-Government assets, the Government should have
the confidence that it can be so deployed without further delay or
review. A collaborative active cyber-defense capability to detect,
analyze, and mitigate malicious cyber activities in the core networks
that make up the internet itself will enable cyber attacks to be
detected and attempts be made to stop them before they reach their
target.
Such a capability should leverage and build upon the existing
cybersecurity capabilities of the Tier One network operators and
service providers whose networks are the core of the internet in the
United States, as well as the complimentary capabilities of the
security technology and software industries. Critical National systems,
large and small business, industrial concerns, and individual internet
users can all be better protected by this umbrella approach. Combining
these elements to work in a collaborative and coordinated fashion can
provide the basic foundation for the active cyber-defense capability.
National intelligence capabilities to identify cyber threats and
provide advanced warning can also be leveraged. In this way, a new
collaborative cyber defense capability will both feed into and
strengthen existing public-private coordination and response efforts.
2. Government Leadership in Acquisitions and Cyber Management.
The United States Government should lead by example in
cybersecurity. The Federal Government is the largest single purchaser
of information technology and network services in the United States,
and its leadership and buying power can have great influence on the
cybersecurity marketplace. Several worthwhile Federal initiatives are
in place to improve cybersecurity for the ``.gov'' domain, such as the
Trusted Internet Connection effort by the Office of Management and
Budget (OMB) and its instantiation via the General Service
Administration/Department of Homeland Security joint initiative on
Managed Trusted Internet Protection Service, but they are being applied
inconsistently. The Department of Defense also has its own effort to
protect ``.mil'', separate from the ``.gov'' efforts. These initiatives
do not yet take full advantage of the portfolio of managed security
services offered by many private sector network service providers, such
as network-based protection against Distributed Denial of Service
(DDOS) attacks. The Federal Government needs a clear and comprehensive
strategy for cybersecurity of all Federal systems which make up
``.gov'' and ``.mil''--one which effectively leverages existing
cybersecurity capabilities offered by the network service providers.
Further, the current roles and authorities of the various Federal
agencies overlap and are unclear with respect to cybersecurity for
Federal Government infrastructure, as well as the protection of other
critical infrastructure, National assets and individual consumers.
Congress can lead by establishing the respective and definitive roles
and authorities of the various Executive Branch elements involved in
all aspects of cyber security--including the National Security Council
and the Cyber Policy Coordinator, the Office of Management and Budget,
the Office of Science and Technology Policy, the Department of Homeland
Security, the Department of Commerce including the National Institute
of Standards and Technology and the National Telecommunications and
Information Administration, the Department of Defense including U.S.
Cyber Command and the National Security Agency, the Department of
State, the Federal Communications Commission, and the Federal Trade
Commission. The United States needs a unified Federal effort on
cybersecurity with a clear understanding of the roles involved--not the
confusion, inconsistency, and overlap that currently exists.
3. Global Strategy.
The United States must move forward aggressively to create a
comprehensive strategy for addressing global cooperation in
cybersecurity. We must reinforce the leadership of the United States in
shaping the future of the internet, and assuring its stable, reliable,
and secure operation, concurrent with the expansion of U.S. enterprise
in the global internet marketplace. In particular, all members and
participants of the global internet community must achieve consensus on
the fundamental point that malicious cyber activities of any sort will
simply not be tolerated. Concurrent with these efforts, Congress should
also expand incentives for investment by the private sector to help
invigorate U.S. technology leadership in cybersecurity and the
internet.
4. Cyber literacy.
We all must redouble our efforts in cybersecurity education and
awareness across the full spectrum of the internet user base--from the
boardrooms of our largest companies to the millions of individuals who
surf the 'net. Current efforts in cybersecurity education and awareness
are fragmented and the messaging is often confusing. The ultimate key
to improving our National cybersecurity is technology innovation driven
by market demand from informed users and purchasers of all kinds. By
creating market demand for cybersecurity through heightened consumer
awareness, we can spur fundamental security innovation at all levels of
the internet eco-system, and allow the United States to continue as a
leader in internet development. To that end, Congress should designate
a lead agency on cybersecurity education, and support that designation
with an appropriate level of funding to make it effective. The roles of
other Federal agencies in supporting this effort should also be
clarified. AT&T is itself actively engaged in the provision of
cybersecurity information and protective tools to our customers, and
actively participates in pan-industry cyber awareness education efforts
such as ``Stop.Think.Connect,'' the coordinated messaging effort
spearheaded by the Anti-Phishing Working Group and the National Cyber
Security Alliance and comprised of Government agencies, private sector
entities, and not-for-profit corporations.
In the past, cybersecurity legislative proposals have included a
variety of regulatory schemes, such as certification regimes, that,
while well-intentioned, are too often the antithesis of innovation--
such requirements could have an unintended stifling effect on making
real cybersecurity improvements. Our cyber adversaries are very dynamic
and ever more sophisticated, and do not operate under a laboriously
defined set of rules or processes. The challenges we face in
cybersecurity simply cannot be solved by imposing slow-moving,
consensus-based bureaucracy on those who build, operate, and use cyber
space. Overbroad regulation and certification requirements can have
unintended consequences, such as emphasizing the status quo by focusing
on yesterday's challenges. An overly prescriptive approach can only
serve to stifle internet innovation and the technology leadership of
the United States in the global information infrastructure.
The internet itself was created through innovation. Some key early
investments by the Government helped spur that innovation. Congress and
the administration have leadership roles to play in assuring that the
United States continues to focus on technology innovation. Burdening
the private sector with the cost of unnecessary and ineffective
regulations and processes is contrary to that objective, and will only
slow advances in cybersecurity. Congress must insist on and support
initiatives that provide the flexibility needed to deal with the
dynamics of the threat and the technology, while creating innovation
and investment through market demand.
I thank the subcommittee for its timely and focused attention on
cybersecurity, and I look forward to providing on-going guidance,
assistance, and recommendations as we collectively work to reduce the
cybersecurity threat to our Nation and our critical infrastructure.
Mr. Lungren. Thank you very much.
I thank all the panelists for your testimony.
We will go into a round of questioning of 5 minutes a
piece, and I will start with that.
Dr. Amoroso, in your testimony you talked about if we were
to have enhanced market demand for cybersecurity through
heightened consumer awareness that might be an element to help
us along the way in creating those kinds of mechanisms
necessary from the ultimate consumer to major corporations.
This is one of the things that has always been presented to
me. How do we make it bottom-line relevant for both individuals
and businesses? Because when you say increasing consumer
awareness will lead to that, that presumes that people will be
aware enough to spend the money to do those things that are
necessary and to spend the time to take those simple steps that
would be necessary to engage those systems that they have on a
regular basis.
Do you have any suggestions about how we do that,
particularly with corporations so that corporations--look, in
the financial services industry and in the communications
industry, I think it is fairly more self-evident to people
that, bottom line, it is important. Cybersecurity destroys your
very product, your very service.
In others, they might hedge and say, well, the chance that
someone is going to attack me in a way that is really going to
hurt me may not be that great. If they really do succeed, that
would hurt me, but the chances of them doing that are not very
great. So how can I justify that to my shareholders?
Could you give us some insight on that?
Mr. Amoroso. Well, one thing Government can do is lead by
example. Certainly I think a lot of the cybersecurity
mechanisms that are laid out, say through GSA and DHS and other
places, are applied pretty unevenly. I know that my team owns
and operates infrastructure in support of the GSA network's
MTIPS program, which is a trusted internet connection. I will
say that it is applied somewhat unevenly. There are some
excellent services that GSA provides, data analysis service,
real-time capabilities for making sense of what is happening on
a given network.
I think that one of the responsibilities of Government is
to look first inward at civilian and defense and other types of
agencies, even State and local to the degree that we have that
kind of jurisdiction, and to show by example that not only is
this important but it can actually be done.
There are two problems. One is, a lot of groups--to your
point--don't necessarily see it as urgent. But perhaps more
troublesome, even if they saw this urgent, they are not really
sure what they should even be doing, right, just as you would
at home.
If I convinced you tomorrow that identity theft was the
most important thing in your life, how would your PC usage
change? You would probably shrug and say, all right, I am a
believer. What do I do?
We start these things by saying how complex a problem it
is. Here is one of the dimensions that makes this particularly
troublesome for this committee. Once we get our arms around
some techniques that seem to work, the technology has already
changed.
I am guessing most of the people in here have a Smartphone
in their pocket. That is an internet-connected computer that
you have in your pocket that probably has more power than a
data center had when you started your career, and now you carry
it around with you in your pocket. Just graph that out another
10 years, and that is the threat that we should be planning for
now, not the threat that exists today. It makes it extremely
difficult, because the technology changes so dramatically.
So, again, cooperation, coordination, those are the types
of things that we really need to foster. Because the hacking
community seems to do that maybe even better than we do as a
Federal Government.
Mr. Lungren. Ms. Carlin, if you could respond to that.
Also, you made some suggestions about how we might be able to
improve some things in a coordinating council. Part of that is
relationship building. You can have it all in the schematic,
but unless people have trust that they can share information
they won't do that and not even get to Dr. Amoroso's point
about how you make it in real time. Could you just comment
first on the bottom-line relevance and then secondly about
specific improvements maybe we need on the Government side with
respect to a coordinating council?
Ms. Carlin. Sure. Thank you.
As to the first question, I guess I think of it a little
differently maybe than Dr. Amoroso in the following sense: Many
of the institutions that make up the financial services
marketplace, including the critical infrastructure components
we depend on, are then each regulated often by different
regulators. Many of the regulators in financial services
already have robust standards around data security principles
and standards they expect the banks and other regulated
entities to observe.
Where I think there is really a significant remaining gap
is in what I think of as utility standards. There are utilities
operating that constitute critical infrastructure assets who
themselves are not subject to baseline minimum standards
related to data security.
Now I don't think of that, quite frankly, as regulation or
legislation, for that matter but, rather, baseline minimum
operating standards, recognizing the interconnectedness and
interdependence that we all have. A failure of one represents a
failure of all, and we have seen it over and over and over
again.
As to the second question and our specific recommendations,
what we are recommending is a documented protocol that will
provide a more regularized and repeatable process to the
decision of when to disclose information to the community. So
rather than making it up each time as we go along and treating
it almost as an artist's project, let's inject some science
into that question. What are the considerations that the law
enforcement, intelligence, regulatory, and private industry
communities bring to bear when an event happens? How do we
appropriately balance, as an example, the importance of an on-
going investigation with the public policy considerations
related to disclosure? The event that I refer to in my
testimony, the 102-day delay, cut across fiscal year end for
the vast majority of public companies in the United States. How
did we do that without this information?
Mr. Lungren. Thank you very much.
I recognize now for 5 minutes the Ranking Member from
Brooklyn.
Ms. Clarke. Thank you, Mr. Chairman.
Mr. McGurk, you have told my staff on previous occasions
that when your office conducts analysis of control systems in
critical infrastructure sectors, such as the electric sector,
they often report to you that those systems are air gapped or
physically separated from their business system. But, in fact,
when you check their system, that is almost never the case. Can
you tell us about that, please? Is it your experience that,
once this is pointed out, that the companies fix the problem or
do they just ignore it? Are there other sectors where this is
the case?
Mr. McGurk. Yes, ma'am. Thank you very much for that
question.
Indeed, the results of our on-site assessments as well as
our incident and response events have identified that in no
case had we ever found a situation where the operations network
and enterprise networks were fully air gapped. There were
always types of connections and, for many systems, very good
reasons why they are connected. The challenge runs the gamut of
service-level agreements, regulatory reporting requirements, or
other information-sharing information. So there are good
reasons.
What we found is that not necessarily is there a good cyber
hygiene approach to securing those communications networks or
those nodes. There is technology available which provides
unidirectional flow of information that cannot be breached so
that they could put processes and procedures in place to
prevent the flow of information or preventing a malicious actor
from coming back into those networks and those systems. So
those technologies are out there, and they have been analyzed,
and they have been validated by various members of our National
lab complex.
We work closely with the private sector in identifying
those vulnerabilities. Once we do, in every case, the asset
owners and operators have taken necessary and proactive steps
to close or mitigate those vulnerabilities by actually
incorporating new procedures or new technology to mitigate that
risk. The private sector has been very responsive in complying
with those requirements and those necessary risk mitigation
strategies.
Ms. Clarke. So in speaking with the sector now that that
has been identified, has there been a new terminology that is
utilized? Because I mean I am just trying to think of the
mindset that would believe that, you know, they have got this
air gapped situation in place and not really acknowledging the
vulnerability that exists because of the connection. Has there
been a change in thought from your perspective in working with
the sector?
Mr. McGurk. In each case, in several sectors that we have
worked with and many of the sectors are being proactive about
it, they are focusing on trusted connections, as opposed to no
connections. People recognize that there is a need for the
connections, but they must be trusted connections. There are a
number of industry and Federally identified standards which
focus on increasing that level of security and that level of
trust.
So, yes, ma'am, they are certainly taking those necessary
steps.
Ms. Clarke. Wonderful.
Mr. Cauley, it is good to see you again; and thank you for
participating in the Electric Infrastructure Security Summit on
Tuesday. Your contributions were very valuable, and your
presence here today is very important as well.
I want to follow up with you on the question I just asked
Mr. McGurk. Do you recommend that critical control systems be
air gapped? What are some of the recommended or required
approaches? How are you ensuring that the electric sector
companies are putting them in place? I think this sort of goes
to Ms. Carlin's point with respect to the financial sector. It
is the utilities that I think we are all relying on as part of
an ecosystem, if you will.
Mr. Cauley. Ranking Member Clarke, I think you have really
hit on a really critical issue. The challenge is the power
system, if you look at it from the bulk power all the way down
to the meter, is everywhere. There are hundreds of thousands of
substations. We are distributed on down every street and every
corner. So the concept of air gapping the power system is
really a conceptual one, and I think it has merit, and we are
looking at it.
I agree with most of the comments of Mr. McGurk. I think
the awareness of the industry has improved. There have been
efforts. You have vendors or employees who can dial in remotely
and access equipment to do maintenance and special tasks.
The number of those ports have been reduced. The number of
interfaces between the control systems and the business systems
have been reduced. I think there is a general awareness. But to
say we could air gap the power system is really challenging
just because of the hundreds of thousands of locations and
computers and equipment. So I think we have to challenge
ourselves.
Also, there is an enormous dependency between operating the
power grid and the communications that underlie it. Many of the
companies depend on telecom companies, phone companies for the
wires that connect the communications between the power grid
stations. So it is an important issue.
Can we get to an air-gapable power system or an electric
system? I think we are a ways away from that. Right now, we are
prioritizing on critical assets and making sure they are
firewalled and protected and that we have proper protocols.
I think the issue of one-way data communications is new. We
are pressing to get that more widely used in the industry.
Thank you.
Ms. Clarke. Thank you, Mr. Chairman.
Mr. Lungren. Mr. McCaul from Texas is recognized for 5
minutes.
Mr. McCaul. Thank you, Mr. Chairman.
I am not Mr. King. I just wanted to see what it felt like
to be King for a day. I hope Pete is not watching this hearing.
It feels good.
Let me thank the witnesses for being here.
We have had hearings on the dot-mil and the dot-gov; and
today's hearing, in my judgment, is on the dot-coms and how do
we protect the private sector that controls a majority of the
critical infrastructures? What can the Government do and what
can we do in Congress in terms of the legislation? I think
there is some legislation out there--our first credo should be
to do no harm. I think sometimes we legislate, and there is a
law of unintended consequences, and I will get to that in a
minute.
I remember working at the Justice Department, with the FBI,
and then the ISACs came around, and they have been around for
about a decade. We are still not there, in my judgment, with
the ISACs in terms of full--Dr. Amoroso, as you mentioned--full
real-time information sharing.
You made a comment that I wanted to follow up on that,
thought it was real interesting, that you need a team of
lawyers to talk to the Government. I know there is a FOIA
exemption for critical infrastructure sharing, but I don't know
if that is always applied or if that exemption always attaches
to that information sharing. But could you elaborate, Doctor,
on that point that you made?
Mr. Amoroso. This is a concept I know you are aware of,
signature. So somebody figures out that there might be an
attack, and if you look for this particular file or this
command or some little tip that would help either an operator
or a government or anybody figure out that this attack is going
on, it is sort of the currency that we all work in. That is how
we tip each other off in cybersecurity. We provide signatures.
For the Government to provide a signature to a carrier that
we would then embed into our services to protect customers and
so on and so forth, there is a tremendous lack of clarity
around whether that is legal or not or whether we would be
operating as an agent of the Federal Government or whomever.
As I sort of joked, if I am wandering around a hacker
conference and somebody gives me the same information, not in
Government, some hacker dude with a Grateful Dead t-shirt on or
something, I pop it right into our infrastructure and
everything works great. So that lack of clarity, it really
points to the fact that, depending on which attorneys you are
talking to or which person, some might say, oh, no, no, no, no,
you can't do that. Others would say, no way can you do that. I
work for a very conservative firm, so we are going to err on
the side of not doing it. So we need clarity there.
Mr. McCaul. That is an interesting point. Mr. McGurk, how
can we fix that? What would you propose? I assume we are going
to be legislating cyber out of this committee, subcommittee.
What would you propose?
Mr. McGurk. Yes, sir. Actually, we are currently sharing
that information with our private-sector partners but not
insofar as signatures. Because, going back a bit, a signature
is specific to whatever box--to use the analogy--that you
pulled off the shelf at Staples. It may be system-specific or
product-specific.
So what we can share and derive are the smaller part of
that called indicators, and we publish those indicators
routinely. Those indicators can then be taken by the technical
representatives of each of the facilities or firms and generate
those signatures that then are specific to those pieces of
equipment. So we are currently doing that.
In fact, in light of the recent situation with the two-
factor authentication issue, we produced about 26 indicators
that asset owners and operators could then load into their
systems to look for malicious activity. So it is a very complex
but multi-pronged approach that we are taking to provide
actionable intelligence to the community.
Mr. McCaul. I agree with Dr. Amoroso. I think clarity would
be helpful, whether that comes through legislation or through
policy within the Executive branch.
But, lastly, just to throw out there, how do we incentivize
the private sector to harden its networks? AT&T, certainly you
guys are ahead of the curve, but a lot of companies aren't.
There is the Senate bill which is very comprehensive. It has
DHS regulating the industry. I personally don't agree with that
legislation. But how can we incentivize the private sector to
harden their networks?
Mr. McGurk. Sir, I believe a comment was made earlier that
we can lead by example, and that is one of the areas that we
are really looking to focus on both at the National and at the
Federal and international level, is how can we provide
guidelines and steps? The Department actually publishes and
updates on a quarterly basis procurement standards for asset
owners and operators that are buying new technology or
incorporating new pieces of equipment. In addition, we write a
comprehensive guide for standards developers so that they
understand what the market is driving as far as requirements.
So by providing that and also identifying best practices
through either Federal standards or industry adopted standards,
we can identify what a network topology can and may look like
to increase security.
But, again, it is more descriptive in nature, not
proscriptive. Because no one network or network configuration
is going to operate--an automobile manufacturing plant, a
chemical processing facility, or a nuclear power plant, they
are all unique and different, which is why we have to take a
very sector-specific approach.
Mr. McCaul. That is a good point.
I yield back.
Mr. Lungren. The gentlelady from California, Ms.
Richardson, is recognized for 5 minutes.
Ms. Richardson. Thank you, Mr. Chairman.
I have got five questions, so hopefully we can get through
them pretty quickly.
Mr. McGurk, what would you rate as the rating for DHS when
you hosted your Cyber Storm III exercise?
Mr. McGurk. As far as an opportunity to learn and to
explore, I would say it was probably, on a scale of 1 to 10,
about a 7. Because we had a very large play this time with both
of our State partners, private-sector partners, and
international partners. We learned a lot of important lessons,
and this was actually the first time we got to exercise the
National cyber incident response plan and execute it in
accordance with the system and the NCCIC. So it really helped
us out.
Ms. Richardson. Have you briefed this committee on that
yet?
Mr. McGurk. I don't believe so, ma'am, but I would have to
check with our team back at headquarters.
Ms. Richardson. If not, if you would work with Mr. Lungren
and with our staff and hopefully maybe we could get some
further information on it.
No. 2, do you think the NCCIC, which is your organization,
should be voluntary with the private sector?
Mr. McGurk. It is currently voluntary with the private
sector, ma'am. We have----
Ms. Richardson. I said, do you think it should be
voluntary? Or should it be mandatory?
Mr. McGurk. I am not really sure what you mean by voluntary
versus mandatory. As far as participation, we open it up to the
broad sectors. Each of the sectors have the potential of being
represented, but the products that we produce and the
information that we share goes to the broad community. So we do
not restrict it in any way.
Ms. Richardson. No. What I mean is, the private sector--
let's take, for example, AT&T. Although it is a private
company, you know, has its own business, it is still providing
a very important service that we, as the American public,
expect to be able to use our phones in the event of an
emergency. I am saying, has there been a discussion ever that
maybe your role would need to be a mandatory or a more formal
relationship versus voluntary involvement?
Mr. McGurk. No, ma'am. At the present, we are not looking
at that particular type of involvement. AT&T has been
represented in the National Coordination Center for
Telecommunications since its inception as well as the NCCIC
since October, 2009. So they have been a direct partner with us
since the beginning of the organization.
Ms. Richardson. Are there any industries that you have felt
you needed to work with that you currently don't really have
the authority and the ability to do so?
Mr. McGurk. No, ma'am. Each of the sectors have been very
responsive and receptive to coordinating, sharing information,
and receiving information from the Department.
Ms. Richardson. Okay. Within your voluntary public-private
partnerships, how many would you say are corporation size, mid-
size, small business, if you could give a percentage of who you
work with.
Mr. McGurk. It is actually very broad. We work with Fortune
One companies, the large carriers, and the large manufacturing
facilities here in the United States, all the way down to small
companies which employ only seven employees.
Ms. Richardson. But of those that you work with, what would
you say would the percentage be? So would you say corporations,
you spend 50 percent of your time and small business 10
percent? What is kind of a percentage?
Mr. McGurk. It is more of a broad range. I would say that
we spend 100 percent of our time within each of the sectors
focusing on, from the small community up to the large
community. In the case of developing mitigation strategies and
plans, we are looking more for the subject matter expertise,
not necessarily at what level they reside. So we do try to
focus across the board a very broad spectrum.
Ms. Richardson. Okay. How many approximately in your
private sector have you worked with, approximately? One
thousand? Two thousand?
Mr. McGurk. It is very hard to quantify, ma'am. I would
have to get back with you on that type of number.
During the last mitigation development process, we had over
50 companies from six sectors represented full time working on
mitigation plans.
Ms. Richardson. Okay, so if you could supply to the
committee the different levels that you worked with and
approximately how many. So, for example, of corporations, if
out of the 2,000 you have worked with, 1,500 are major Fortune
500 companies, then say that. If 10 percent are small business,
say that.
Mr. McGurk. Yes, ma'am.
Ms. Richardson. My last question. In the event of a
cyberattack, who is in charge?
Mr. McGurk. In the event of a cyberattack, ma'am, the
President is in charge. The President has designated the
Secretary of Homeland Security as the senior Federal official
for incident response and incident coordination.
Ms. Richardson. Do you believe that is understood with the
Pentagon and NSA and so on?
Mr. McGurk. I believe that the Pentagon and NSA understand
that the President is in charge.
Ms. Richardson. If something were to happen in the private
sector, what would be the response?
Mr. McGurk. The response, in accordance with the National
Cyber Incident Response Plan, would be a coordination effort on
the part of the Department, working with those private-sector
entities or those individual companies to mitigate the risk and
prevent it from cascading into other areas.
Ms. Richardson. Thank you very much.
Mr. McGurk. Thank you, ma'am.
Ms. Richardson. I yield back.
Mr. Lungren. Thank you.
The gentleman from Pennsylvania is recognized for 5
minutes.
Mr. Marino. Thank you, Mr. Chairman.
I have a question for each of you. I have 5 minutes, so we
have about a minute and 15 seconds for each, so I will start
with Dr. Amoroso.
Can we really stay ahead of the criminals?
Mr. Amoroso. Well, historically, we haven't, and we
probably should assume that we won't. I mean, it makes sense to
take a pretty conservative view as we build out our protection
approaches. So I think the answer to that is ``no.''
Mr. Marino. Because they are going to have the information
that--even if the Government puts out there that the citizens
are aware of, and they are always trying to manipulate and
massage that. So we have to come up with a system whereby we
try to step ahead of them, if that is possible.
Mr. Amoroso. Right.
Mr. Marino. Attorney Carlin, I am an attorney, too. I was a
prosecutor for 18 years. So I know, as the doctor said, once
you get some attorneys involved, particularly at the
bureaucratic level, it can be a real catastrophe. But what
legal issues do you think we face from a liability standpoint
if the Government gets involved and, for example, mandates?
Ms. Carlin. First, I am a reformed lawyer. So I am not
actively practicing, but I am in inactive status.
I think there are plenty of legal and policy issues that
have not been sorted through, and I think that is part of what
we would contemplate, including in this information-sharing
protocol or framework exercise, including, quite obviously,
privacy issues.
A couple of points, just to add them to your consideration.
One is, when we talk about information sharing, we mean
that bilaterally. So there is an equivalent interest on the
part of Government in having private industry disclose events
as they are happening in our respective companies as there is
on the part of private industry in having the Government
disclose when they are, frankly, working on something that we
may not be aware of.
The emphasis that I have placed on contextual information I
think is part of the secret sauce of being more proactive on a
going-forward basis. The signatures, the technical information
is obviously critical to shutting down that board, that
opportunity for malicious behavior. But the context is what
allows us to plan for the next attack.
It is not that the same person will do it in the same way,
attacking the same server. It is extrapolating from the
experience that we have had to contemplate other comparable
vulnerabilities and to get ahead in that way by shutting them
down.
Mr. Marino. All right. Thank you.
If you haven't noticed, I am taking advantage of your
educational backgrounds. Mr. Cauley, you have an MBA. Does a
company or the Government, for that matter, balance the
implementation, the cost to the risk before making any
decision?
Mr. Cauley. Thank you for the question. I am really an
engineer, but the MBA was incidental.
We really strive to do that both at NERC, as the industry
organization, as well as across the industry to assess risk
priorities. We deal with hurricanes and other natural disasters
as well as these emerging new risks. So it is always a
challenge to make the greatest value of the customers', the
rate payers' investment in reliability and a reliable supply of
electricity.
So I think cost is always a consideration, and I think
maximizing value against the risks that we are facing is always
something that we are looking at.
Mr. Marino. Okay. Thank you.
Mr. McGurk, taking advantage of your psychology background,
can we really persuade the public in business and, for that
matter, as a last resort, the Government to take the steps
necessary to effectuating protection against ourselves? What do
we need to do to persuade people like myself, not only the
computer in my home but the computer in my office and the small
business that my wife has?
Mr. McGurk. Thank you for the question, sir.
I would like to also add on to what Mr. Cauley had said, is
that when we are evaluating risk--and in the Department we
define risk as threat, vulnerability, and consequence--each of
those variables is relevant. Then you need to divide that over
cost. So we have to identify where can we get the most benefit
or the most gain by addressing the vulnerabilities, the
threats, or the consequences.
So making it actionable for the asset owners and operators
of the general public and making it understandable, taking all
the ones and zeros out and putting it in a language that people
can readily understand, helps us convey that message. Getting
away from the geek speak and getting into the real speak is
what our primary focus is.
Mr. Marino. Good. Thank you.
I yield.
Mr. Lungren. The other gentleman from Pennsylvania, Mr.
Meehan, is recognized for 5 minutes.
Mr. Meehan. Thank you, Mr. Chairman.
I want to thank the panel for their testimony. I apologize,
because of the nature of our work, we aren't always able to be
here for the full time. But I did take the time to read each of
your written testimonies last night. As a former prosecutor,
United States Attorney, I am very interested in these issues.
Let me just ask, stepping back, because, Mr. Amoroso, I was
struck by some of your comments. In our effort to try to assure
that both the private sector and the Government are working
together in this area of assuring cybersecurity, you know, you
have some testimony that says the initiatives don't take full
advantage of the portfolio of managed services offered by many
private-sector network service providers. You were discussing
the Federal Government.
Just the panel, in essence, we have the National
Infrastructure Protection Plan. It was put in place to pull the
Federal Government together with the private sector to use all
of our assets to try to do, you know, protect this
infrastructure. What should we be doing? Is it working? What is
not working?
Mr. Amoroso, I want to ask you specifically because you
made this note. If other panelists in my remaining 3 minutes
and 40 seconds have observations, I would like to hear from you
as well.
Mr. Amoroso. Well, most of the ideas are great. It is just
the technology and infrastructure changes so quickly that it is
hard to keep up.
For example, we talk about air gap. My company is in the
business of using the air to connect systems. So it is almost--
it doesn't make a lot of sense to even talk architecturally
about something that made a lot of sense 10 years ago. I spent
a lot of time trying to air gap systems in AT&T. We used to
have two jacks in the wall; and, depending on what network you
were on, you would sort of air gap between this and that.
In 2011, that makes no sense. Equipment comes built in with
3G, 4G connectivity. You have to change all the assumptions.
So the problem is, private sector, you know, through
competition and through mobility and cloud and all these
exciting things that we use to try to generate interest amongst
customers to buy our services, we are moving at a rate that is
almost impossible to keep up with from the perspective of kind
of the way we legislate and regulate. It takes a long time to
debate these issues. By the time you have debated and come to
some agreement on something it is largely irrelevant. So we
really have to come to a different approach.
Mr. Meehan. Well, how do you do that? How do you police
that? Because, in essence, you are right. The technology is
always going to be ahead. The only thing is that the cyber
sleuths are trying to catch up with the technology. That may be
that you are one step ahead, but, as Mr. Marino pointed out,
there is a lot of people that are still using simplistic
systems that are being victimized as well.
Mr. Amoroso. It is tricky. You have to build forward-
looking constructs and then let them work the way you set them
up to work without sort of worrying about every little thing.
Every day-to-day detail has to be allowed to track technology
growth and innovation.
So, you know, the comment I made earlier about signatures,
you know, the fact that anytime some information sharing is
posed, at least in our company, there is a big debate about
each and every situation. I think what we need is a broader
framework that allows us a little bit more leeway so that if
technology goes in this direction or that direction or
whatever, the framework would be broad enough to allow us to be
flexible. I think we have been too inflexible in that regard.
Mr. Meehan. Thank you.
Ms. Carlin, did you have a thought?
Ms. Carlin. I just wanted to add one comment. I am not a
native technologist, by the way, so maybe it gives me a
different perspective.
I don't think it is all about technology and sort of trying
to keep apace with the criminal and the nation state elements
and such. I think there is a large component that relates to
behavior and practices, and I will give you one quick example.
As we have seen in all these incidents, the criminals are
increasingly targeting what we might call target-rich
environments. You see that in all kinds of respects. You see it
at the exchange level. You saw it in the RSA incident. You see
it in Epsilon. Why Epsilon? Because it was a warehouse of all
of these other connections and such.
So on the practices level, there are many opportunities for
improvement, and I will share one with you. We have privileged
users--so-called privileged users in our environment who are
often IT administrators who have much broader access to data
and applications than the average employee would have. We have
significantly tightened standards around behavior by IT
administrators, how they access the network, how they change
their passwords, how frequently, password sharing. I could give
you a litany of practices.
So I think let's not put all of our eggs in the--we need
the new-age technology. That is part of it.
Mr. Meehan. Thank you, Mr. Chairman.
Mr. Lungren. Thank you.
I want to thank the witnesses. The reason why we were able
to stay here this long is they changed the votes on the floor,
and now we have a series of votes. So I thank you for being
with us, and we were able to get through the panel and not have
to keep you here in suspense.
One of the things I would just ask is that I hope that you
would continue to work with us. We don't, obviously, have all
the answers. We have got some of the questions. We probably
don't have all the questions. Perhaps the overarching question
we have is: How do we make it work better? That is, the
Government/private-sector partnership. It is a continuing
question that is going to bedevil us, but we need to look at it
and work with it, and you folks have helped us today. But I
hope we could ask you to help us in the future as well.
We thank you very much for your testimony. It has been
very, very helpful. There may be some questions offered by some
of the Members of the panel in writing to you; and if that is
done, we would hope that you would respond to that to help us.
Again, your full statements are made a part of the record.
We thank you for being with us, and this hearing is
adjourned.
[Whereupon, at 11:16 a.m., the subcommittee was adjourned.]
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|