|
<html> |
|
<title> - UNPACKING THE WHITE HOUSE NATIONAL CYBERSECURITY STRATEGY</title> |
|
<body><pre> |
|
[House Hearing, 118 Congress] |
|
[From the U.S. Government Publishing Office] |
|
|
|
|
|
UNPACKING THE WHITE HOUSE |
|
NATIONAL CYBERSECURITY STRATEGY |
|
|
|
======================================================================= |
|
|
|
HEARING |
|
|
|
BEFORE THE |
|
|
|
SUBCOMMITTEE ON CYBERSECURITY, INFORMATION |
|
TECHNOLOGY, AND GOVERNMENT INNOVATION |
|
|
|
OF THE |
|
|
|
COMMITTEE ON OVERSIGHT |
|
AND ACCOUNTABILITY |
|
|
|
HOUSE OF REPRESENTATIVES |
|
|
|
ONE HUNDRED EIGHTEENTH CONGRESS |
|
|
|
FIRST SESSION |
|
|
|
__________ |
|
|
|
MARCH 23, 2023 |
|
|
|
__________ |
|
|
|
Serial No. 118-12 |
|
|
|
__________ |
|
|
|
Printed for the use of the Committee on Oversight and Accountability |
|
|
|
[GRAPHIC NOT AVAILABLE IN TIFF FORMAT] |
|
|
|
|
|
Available on: govinfo.gov |
|
oversight.house.gov or |
|
docs.house.gov |
|
|
|
__________ |
|
|
|
|
|
U.S. GOVERNMENT PUBLISHING OFFICE |
|
51-668 PDF WASHINGTON : 2023 |
|
|
|
----------------------------------------------------------------------------------- |
|
|
|
COMMITTEE ON OVERSIGHT AND ACCOUNTABILITY |
|
|
|
JAMES COMER, Kentucky, Chairman |
|
|
|
Jim Jordan, Ohio Jamie Raskin, Maryland, Ranking |
|
Mike Turner, Ohio Minority Member |
|
Paul Gosar, Arizona Eleanor Holmes Norton, District of |
|
Virginia Foxx, North Carolina Columbia |
|
Glenn Grothman, Wisconsin Stephen F. Lynch, Massachusetts |
|
Gary Palmer, Alabama Gerald E. Connolly, Virginia |
|
Clay Higgins, Louisiana Raja Krishnamoorthi, Illinois |
|
Pete Sessions, Texas Ro Khanna, California |
|
Andy Biggs, Arizona Kweisi Mfume, Maryland |
|
Nancy Mace, South Carolina Alexandria Ocasio-Cortez, New York |
|
Jake LaTurner, Kansas Katie Porter, California |
|
Pat Fallon, Texas Cori Bush, Missouri |
|
Byron Donalds, Florida Shontel Brown, Ohio |
|
Kelly Armstrong, North Dakota Jimmy Gomez, California |
|
Scott Perry, Pennsylvania Melanie Stansbury, New Mexico |
|
William Timmons, South Carolina Robert Garcia, California |
|
Tim Burchett, Tennessee Maxwell Frost, Florida |
|
Marjorie Taylor Greene, Georgia Becca Balint, Vermont |
|
Lisa McClain, Michigan Summer Lee, Pennsylvania |
|
Lauren Boebert, Colorado Greg Casar, Texas |
|
Russell Fry, South Carolina Jasmine Crockett, Texas |
|
Anna Paulina Luna, Florida Dan Goldman, New York |
|
Chuck Edwards, North Carolina Jared Moskowitz, Florida |
|
Nick Langworthy, New York |
|
Eric Burlison, Missouri |
|
|
|
Mark Marin, Staff Director |
|
Jessica Donlon, Deputy Staff Director and General Counsel |
|
Raj Bharwani, Senior Professional Staff Member |
|
Lauren Lombardo, Senior Policy Analyst |
|
Peter Warren, Senior Advisor |
|
Mallory Cogar, Deputy Director of Operations and Chief Clerk |
|
|
|
Contact Number: 202-225-5074 |
|
|
|
Julie Tagen, Minority Staff Director |
|
Contact Number: 202-225-5051 |
|
------ |
|
|
|
Subcommittee on Cybersecurity, Information Technology, and Government |
|
Innovation |
|
|
|
Nancy Mace, South Carolina, Chairwoman |
|
William Timmons, South Carolina Gerald E. Connolly, Virginia |
|
Tim Burchett, Tennessee Ranking Minority Member |
|
Marjorie Taylor Greene, Georgia Ro Khanna, California |
|
Anna Paulina Luna, Florida Stephen F. Lynch, Massachusetts |
|
Chuck Edwards, North Carolina Kweisi Mfume, Maryland |
|
Nick Langworthy, New York Jimmy Gomez, California |
|
Eric Burlison, Missouri Jared Moskowitz, Florida |
|
|
|
|
|
C O N T E N T S |
|
|
|
---------- |
|
Page |
|
Hearing held on March 23, 2023................................... 1 |
|
|
|
Witnesses |
|
|
|
Ms. Kemba Walden, Acting National Cyber Director, Office of the |
|
National Cyber Director |
|
Oral Statement................................................... 5 |
|
|
|
Opening statements and the prepared statement for the witness |
|
are available in the U.S. House of Representatives Repository |
|
at: docs.house.gov. |
|
|
|
Index of Documents |
|
|
|
---------- |
|
|
|
* Article, Wall Street Journal, ``Wave of Stealthy China |
|
Cyberattacks Hits U.S., Private Networks, Google Says''; |
|
submitted by Rep. Lynch. |
|
|
|
* Questions for the Record: to Ms. Walden; submitted by Rep. |
|
Mace. |
|
|
|
* Questions for the Record: to Ms. Walden; submitted by Rep. |
|
Langworthy. |
|
|
|
* Questions for the Record: to Ms. Walden; submitted by Rep. |
|
Connolly. |
|
|
|
Documents are available at: docs.house.gov. |
|
|
|
|
|
UNPACKING THE WHITE HOUSE |
|
NATIONAL CYBERSECURITY STRATEGY |
|
|
|
---------- |
|
|
|
|
|
Thursday, March 23, 2023 |
|
|
|
House of Representatives |
|
|
|
Committee on Oversight and Accountability |
|
|
|
and Government Innovation |
|
|
|
Washington, D.C. |
|
|
|
The Subcomittee met, pursuant to notice, at 3:09 p.m., in |
|
room 2154, Rayburn House Office Building, Hon. Nancy Mace |
|
[Chairwoman of the Subcomittee] presiding. |
|
Present: Representatives Mace, Timmons, Burchett, Edwards, |
|
Langworthy, Connolly, and Lynch. |
|
Ms. Mace. The Subcommittee on Cybersecurity, Information |
|
Technology, and Government Innovation will now come to order. |
|
Welcome everyone, and good afternoon. |
|
Without objection, the Chair may declare a recess at any |
|
time. |
|
I recognize myself for the purpose of making an opening |
|
statement. |
|
Good afternoon, and welcome to this hearing, the |
|
Subcommittee on Cyber, Information Technology, and Government |
|
Innovation. Today, we are going to discuss the White House |
|
National Cybersecurity Strategy, which was issued three weeks |
|
ago today. The strategy in this Administration's proposal for |
|
fighting a battle that, as a Nation, we must win. Key aspects |
|
of our everyday life now rely on the safe flow of data, |
|
computerized systems, and even AI. That includes the delivery |
|
of medical care, the conduct of law enforcement activity, the |
|
operation of utilities, and the smooth flow of ground and air |
|
transportation, and even critical infrastructure. |
|
We must be able to trust the integrity of these systems, |
|
their ability to keep functioning, and to preserve and protect |
|
the data they use. When these systems fall victim to malicious |
|
hackers, the costs are enormous. And I don't have to remind our |
|
witness today, but in December 2020, with SolarWinds, we had 11 |
|
Federal agencies hacked by adversaries aligned with China and |
|
Russia. In my home state of South Carolina, a few summers ago, |
|
we saw the Colonial Pipeline hacked, and that is when we saw |
|
gas prices started to go up, and they really have never come |
|
back down since then. And so, this is an issue that is--affects |
|
everybody, whether in the public or the private sector. |
|
Aside for the enormous costs, these breaches also erode |
|
trust in key institutions. So, for instance, the Federal |
|
Government computer systems, holding confidential data of |
|
millions of Americans, has been compromised by malicious actors |
|
too many times. As I cited before, and most recently, D.C. |
|
Health Link, where we have been advised that over 50,000 people |
|
who use D.C. Health Link in the Federal Government work force, |
|
had been affected by that particular hack. |
|
So, this is truly a national security issue. Many of the |
|
most sophisticated attacks come from abroad and target our |
|
critical infrastructure. In recent years, foreign hackers from |
|
China, Russia, and Iran have sought to disrupt our economy and |
|
society by infiltrating U.S. critical infrastructure systems, |
|
including airports, telecommunications networks, along with |
|
Federal and state government systems. I don't think I can open |
|
up my computer today and look at a news story and not hear |
|
about another cyberattack on one of our systems or one of our |
|
government, Federal, or state, or local agencies, that is |
|
everywhere. It is pervasive, and it is every day. We must have |
|
reliable safeguards against criminal and unauthorized use of |
|
data to ensure economic security, our homeland security, and |
|
our national security. This is going to require intelligent, |
|
coordinated action at the Federal level. |
|
To help the executive branch rise to that challenge, two |
|
years ago, Congress created a new White House office to provide |
|
coherent direction and coordination to agency-level |
|
cybersecurity efforts across the Federal Government. That is a |
|
lot. You have a big shoes to fill, including by spearheading a |
|
National Cybersecurity Strategy. Prior administrations have |
|
released similar cybersecurity strategies, but this is really |
|
the first time it is to be issued since the Office of National |
|
Cyber Director was created into law. |
|
We are pleased to have here today the acting head of the |
|
Office of National Cyber, Director, as our witness today. There |
|
are many burning questions that I have about implementation of |
|
the national cybersecurity strategy, so we all look forward to |
|
hearing from you this afternoon about the strategy document |
|
itself. I have it right here and discussing, you know, how and |
|
when the rubber meets the road, on how rhetoric can be |
|
translated into action either now or hopefully soon and in the |
|
future. But before I formally introduce our witness, I will |
|
yield to the Ranking Member Connolly to provide his opening |
|
remarks, and I yield back. |
|
Mr. Connolly. Thank you, Madam Chairwoman. Thank you for |
|
having the hearing, and welcome, Ms. Walden, this afternoon. |
|
Cybersecurity is a defining political, economic, and |
|
national security challenge for our time. From malicious |
|
foreign actors' online destabilization and espionage campaigns |
|
to ransomware incidents that compromise government and private |
|
sector information technology networks, these attacks have cost |
|
the United States billions of dollars and countless critical |
|
strategic disadvantages. In Fiscal Year 2021 alone, U.S. |
|
Federal agencies, which depend on IT systems to carry out |
|
operations and protect the essential information, were the |
|
target of more than 32,500 cybersecurity incidents. In the last |
|
half of 2022, cyberattacks targeting governments jumped 95 |
|
percent worldwide and cost an average of $2.07 million per |
|
incident, a 7.25 percent increase from the previous year alone. |
|
Data breaches also affect the private sector, including |
|
educational institutions and healthcare centers. In 2022, the |
|
FBI received almost 801,000 phishing, personal data breach, and |
|
other complaints representing estimated losses of more than |
|
$10.2 billion dollars. According to a 2021 survey by research |
|
firm, AdvisorSmith, 42 percent of small-and medium-sized U.S. |
|
businesses had experienced a recent data breach--42 percent. |
|
The estimated average cost totals almost $9.5 million per |
|
breach, higher than any other country in the world, and 60 |
|
percent of organizations have raised prices on consumers to |
|
cover those costs. Experts now predict that the annual cost of |
|
cybercrime will climb to over $10 trillion in the next number |
|
of years. |
|
Cyberattacks will eventually hit close to home for |
|
everybody. For Congress, it was most recently the hack of the |
|
D.C. Health Link, which operates the healthcare system used by |
|
most Members of Congress and our staff. Before that, it was the |
|
2015 OPM data breach that exposed the private information of |
|
nearly 22 million individuals, including my own personal |
|
information. Cyber threats are not new, as information security |
|
has been on the Government Accountability Office's high-risk |
|
list since 1997. |
|
For those who are concerned, you are right to be concerned, |
|
but we cannot just throw up our hands. We must act quickly and |
|
decisively to secure digital infrastructure, protect the |
|
integrity and confidentiality of data, and preserve public |
|
trust in government institutions. I am proud that Democrats in |
|
this Committee did just that and helped to lead the bipartisan |
|
fight to establish the Office of the National Cyber Director, |
|
the ONCD, in FY 2021. The ONCD is required to coordinate the |
|
whole of government effort to elevate American safety in the |
|
digital world, including through the development and |
|
implementation of the National Cybersecurity Strategy. I |
|
applaud this and look forward to hearing more from our witness |
|
today. |
|
Drawing on bipartisan ideas, including those vested in the |
|
recommendations of the Cyberspace Solarium Commission, the |
|
Biden-Harris strategy, as presented, is a bold, comprehensive |
|
plan for government and industry to create a safer digital |
|
ecosystem for all Americans. Recognizing that cyber threats cut |
|
through all industries and ignore geographic borders, the plan |
|
will examine the regulatory landscape to harmonize |
|
cybersecurity standards across different sectors and around the |
|
globe. With so much at stake, it is critical that our |
|
regulatory landscape allow industry to focus on security |
|
outcomes, not duplicative or nonsensical compliance burdens. We |
|
also know that if hackers fail to break into one agency system, |
|
they will seek out vulnerable entry points elsewhere, and they |
|
do. |
|
We must address the current patchwork of cyber regulations |
|
to ensure that cybersecurity protections flow seamlessly and |
|
efficiently across industries and government. The strategy |
|
realigns incentives to ensure that Federal Government's |
|
investments enhance the long-term strength of a cybersecurity |
|
posture. For example, it harnesses the Federal Government's |
|
purchasing power to shape market demand for safe and secure |
|
technologies. Through programs such as the Federal Risk and |
|
Authorization Management Program, FedRAMP, which this committee |
|
passed legislation forward that became law, we can bake into a |
|
product rather than an additional expensive feature. |
|
Additionally, the strategy redistributes the responsibility |
|
so that those best positioned to protect the cybersecurity of |
|
our citizens, schools, hospitals, and small businesses are |
|
required to take reasonable steps to do so. For example, it |
|
embraces liability for software companies that fail to use best |
|
practices or take reasonable precautions to secure their own |
|
products. If we do not hold bad actors or actors more focused |
|
on sales than security accountable, we disadvantage responsible |
|
companies that take time to follow these best practices, and we |
|
increase systematic risk for our constituents. |
|
As the Administration works to implement this strategy, |
|
Congress must provide the funding and clarify the authorities |
|
needed to ensure its success. As former chair of Government |
|
Operations Subcommittee and a current Member of this |
|
Subcomittee, I know it is essential that we invest in |
|
modernizing our legacy ID systems and recruit and maintain a |
|
Federal cyber work force for the future. |
|
The Federal Government must improve its internal practices. |
|
It must reap the benefits of the latest cybersecurity |
|
technologies and increase cooperation with the private sector. |
|
I look forward to understanding how the ONCD will leverage this |
|
plan and collaborate with other congressionally empowered IT |
|
and cyber related leaders to promote the kind of accountability |
|
our critical Federal systems need. With that, I yield back. |
|
Ms. Mace. Thank you, Mr. Connolly. I am pleased today to |
|
introduce our witness for the hearing. Ms. Kemba Walden is the |
|
acting director of the White House Office of National Cyber |
|
Director. Ms. Walden came to the ONCD from Microsoft, where she |
|
was the assistant general counsel in the company's Digital |
|
Crimes Unit. Prior to that experience, Ms. Walden spent a |
|
decade at the Department of Homeland Security, holding several |
|
counsel positions, including the Cyber and Infrastructure |
|
Security Agency. Welcome, Ms. Walden. We are pleased to have |
|
you this afternoon. |
|
Pursuant to Committee Rule 9(g), the witness, if you will |
|
please stand and raise your right hand. |
|
Do you solemnly swear or affirm that the testimony that you |
|
are about to give is the truth, the whole truth, and nothing |
|
but the truth, so help you God? |
|
Ms. Walden. Aye. |
|
Ms. Mace. Let the record show the witness answered in the |
|
affirmative. |
|
We appreciate you being here today and look forward to your |
|
testimony and answering some of our questions. Let me remind |
|
the witness that we have read your written statement, and it |
|
will be here in full in the hearing record. Please limit your |
|
oral statement to five minutes today. As a reminder, press the |
|
button on the microphone in front of you so that it is on, and |
|
all Members up here can hear you. When you begin to speak, the |
|
light in front of you will turn green. After four minutes, the |
|
light will turn yellow. When the red light comes on, your five |
|
minutes has expired, and we would ask that you try to wrap it |
|
up at that juncture. |
|
I recognize Ms. Walden to please begin her opening |
|
statement. |
|
|
|
STATEMENT OF KEMBA E. WALDEN, ACTING NATIONAL CYBER DIRECTOR, |
|
THE WHITE HOUSE |
|
|
|
Ms. Walden. Thank you. Thank you, Chairwoman Mace, Ranking |
|
Member Connolly, distinguished Members of the Subcomittee. |
|
Thank you for the privilege to appear before you today to |
|
discuss the Biden-Harris Administration's National |
|
Cybersecurity Strategy. I am eager to share with you how the |
|
President's strategy will make our digital ecosystem more |
|
secure and resilient. It builds on two years of the President's |
|
unprecedented attention on cyber issues as well as the |
|
resources and valuable leadership provided by Congress and this |
|
Committee. While my written testimony goes into more detail |
|
discussing each of the five pillars that make up the document, |
|
I would like to highlight the framing of the strategy and the |
|
two fundamental shifts in policy that are woven throughout it. |
|
As you know well, the magnitude of the threat we face in |
|
cyberspace is real, but it is important to remember that we |
|
defend cyberspace not because it is some distant terrain where |
|
we battle our adversaries. We defend cyberspace because it is |
|
intertwined into nearly every aspect of our lives. We live in a |
|
world that is increasingly digitally dependent. Too often we |
|
are layering new technology onto old systems at the expense of |
|
security and resilience, and, unfortunately, today, an attack |
|
on one organization, industry, or state can rapidly spill over |
|
to other sectors and regions. |
|
We all remember how the Colonial Pipeline ransomware |
|
attack, an incident affecting one company, resulted in a gas |
|
shortage impacting the entire East Coast. It is within these |
|
circumstances in mind that we crafted the President's National |
|
Cybersecurity Strategy--strategies or tools. At their most |
|
basic level, they match our goals where we are trying to go |
|
with the vision we need to get there. |
|
In this strategy, our ultimate goal is a digital ecosystem |
|
that is more defensible, resilient, and aligned with our |
|
values. ``Defensible'' means we have tipped the advantage from |
|
attackers to defenders by designing systems where security is |
|
baked in, not bolted on. ``Resilient'' means that when defenses |
|
fail, which they sometimes will, the consequences are not |
|
catastrophic, and recovery is seamless and swift. Cyber |
|
incidents shouldn't have systemic real-world impacts, and in |
|
creating these conditions, we can and must seize the |
|
opportunity to instill America's values. |
|
The strategy calls for two fundamental shifts in how the |
|
United States allocates roles, responsibilities, and resources. |
|
First, we need to rebalance the responsibility for managing |
|
cyber risk. Today, we tend to devolve responsibility for cyber |
|
risk downwards. We ask individuals, small businesses, and local |
|
governments to shoulder a significant burden for defending us |
|
all. We ask our parents and our kids to be vigilant against |
|
clicking suspicious links, and we expect school districts to go |
|
toe-to-toe with transnational criminal organizations, largely |
|
by themselves. This isn't just unfair, it is ineffective. |
|
Instead, the biggest, most capable, and best positioned |
|
actors in our digital ecosystem can and should shoulder a |
|
greater share of the burden for managing cyber risk and keeping |
|
us all safe, and that includes the Federal Government. We must |
|
do a better job of leading by example and defending our own |
|
systems, something I know is a key priority for this |
|
Subcommittee, but we expect similar leadership from industry, |
|
too. Our mantra is every American should be able to benefit |
|
from cyberspace, but every American should not have the same |
|
responsibility to keep it secure. Second, our economy and |
|
society must incentivize investments that make cyberspace more |
|
resilient and defensible over the long term. Doing that |
|
requires creating conditions so an entity is faced with |
|
tradeoffs between easy, but temporary fixes and harder, but |
|
lasting solutions. They are motivated to choose the latter. |
|
We need the free market and public programs, alike, |
|
rewarding security and resilience. That means building a robust |
|
cyber work force that draws from all parts of society and |
|
embracing security and resilience by design. A cybersecurity |
|
job should be in reach for anyone who wants one. These efforts |
|
also require thoughtful research and development, investments |
|
in cybersecurity to prepare for revolutionary changes in our |
|
technology landscape brought by artificial intelligence and |
|
quantum computing, and working with our allies and partners to |
|
promote the collaborative stewardship of our digital ecosystem. |
|
A strategy is only as good as its implementation, and in |
|
implementing this strategy, the Federal Government will take a |
|
data-driven approach and will measure investments made, |
|
progress, and the outcomes and effectiveness of these efforts. |
|
Closely working with Congress, interagency partners, civil |
|
society, and the broader cybersecurity community will be key to |
|
getting this right and ensuring accountability. Work is already |
|
under way putting this strategy into action. |
|
In conclusion, the President's strategy lays out how the |
|
United States will meet these challenges in cyberspace from a |
|
position of strength, leading in lockstep with our allies, and |
|
working with partners everywhere who share our vision for a |
|
brighter digital future. Thank you for the opportunity to |
|
testify, and I look forward to your questions. |
|
Ms. Mace. Thank you, Ms. Walden, and we are asking about |
|
your mics, and I know you have been moving around. We apologize |
|
for that. I will now recognize myself for five minutes. |
|
The National Cybersecurity Strategy, it really reads like a |
|
vision for the Federal Government, but real results, as you |
|
know, in your work in the private and public sector really |
|
depend on implementation of a vision or of a strategy. So, will |
|
you and your office be leading the implementation of the |
|
strategy, and if not, then who would be doing that? Where do we |
|
start with the strategy to do the implementation side of it? |
|
Ms. Walden. Well, thank you, Chairwoman, for that question. |
|
One of the most exciting parts of the strategy for me is the |
|
last page where we articulate precisely that ONCD, in |
|
collaboration with OMB, are going to lead the development of |
|
this implementation plan. In fact, we have already started that |
|
work. ONCD was built to do that work. This is a plan that, as |
|
we articulate in the strategy, will be public, it will be |
|
developed, it is being developed, in full collaboration with |
|
all the departments and agencies who are going to be charged |
|
with certain action items, and with the private sector, and |
|
with civil society, and with Congress to make sure that the |
|
strategy realizes the vision that we have laid out. This |
|
strategy is new and novel in my mind, because we have attempted |
|
to, where appropriate, place departments and agencies |
|
responsible for certain action items, and we will build that |
|
out in the implementation plan. |
|
Ms. Mace. What do you think, the timeline? I mean, this is |
|
a big plan, a big strategy, but how long will it take to |
|
finally get there from point A to point B? |
|
Ms. Walden. So, we have already started the work. We have |
|
created an implementation plan working group that we have |
|
convened other departments and agencies. We have started the |
|
actual implementation. So, for example, we have started |
|
crafting our work force awareness and education strategy. That |
|
is one of the implementation pieces. We have been implementing |
|
Executive Order 14028, which is that cybersecurity executive |
|
order putting actual action into place alongside of that or as |
|
part of that. We have been implementing our Zero Trust |
|
Architecture Strategy for the Federal enterprise to be more |
|
secure, layer by layer, piece-application by application. So, |
|
we have already started the work. We are moving full speed |
|
ahead. This will be an ever-evolving dynamic process because |
|
cybersecurity and cyberspace is ever evolving and dynamic, but |
|
we have already started the work. |
|
Ms. Mace. And then, on the topic of work force, obviously |
|
we all agree here we want to build a robust cyber work force |
|
drawing from all parts of our society. I think everybody up |
|
here would agree with that. I am working on legislation to try |
|
to accelerate the hiring of Federal employees in the |
|
cybersecurity space, and I would look forward to working with |
|
you and your office on some of the ideas that we have from, you |
|
know, education to--in the way that we hire as well. But even |
|
under existing law, the executive branch has tools at its |
|
disposal it is not necessarily fully utilizing. |
|
A report based on the findings of Solarium Commission cited |
|
specific actions the Administration could take now, should take |
|
now, and it calls for the office to help coordinate some of |
|
those actions. Your thoughts on that, and is that possible? |
|
Your thoughts on getting more employees. You know, as we have |
|
discussed before, we have an ageing work force. We have got |
|
four times as many people over the age of 60 in a lot of these |
|
jobs versus under the age of 30, and so at some point those |
|
individuals will retire. So, just sort of your thoughts. Will |
|
your office take the wheel and steer the effort to this more |
|
robust cyber work force? |
|
Ms. Walden. So, yes, and in partnership with OPM. So, yes, |
|
we have similar concerns about access to good-paying cyber jobs |
|
for anybody that wants one, right? We need to be able to |
|
rethink the barriers that we might have imposed for those entry |
|
level jobs. We need to broaden the scope for how we bring in |
|
new employees, and perhaps we don't need people with four-year |
|
college degrees for---- |
|
Ms. Mace. Hundred percent, yes. |
|
Ms. Walden. Maybe we look at community colleges. Maybe you |
|
just look at the digital skills. I have friends who are |
|
executives in the outside world there who are great at |
|
researching when they were younger. They have the right digital |
|
skills in order to be able to enter this work force. |
|
In terms of the Federal cyber work force, I share a similar |
|
concern. And so, we are working with OPM to shore up and |
|
harmonize the differing Federal authorities across departments |
|
and agencies for hiring and retaining talent in this space. We |
|
are working with OPM to develop a legislative proposal, so, I |
|
would love the opportunity to work with you on those |
|
initiatives. But the idea is to make sure that we are not |
|
putting up or imposing barriers to recruitment and that we are |
|
also putting in incentives for retention. |
|
Ms. Mace. Thank you, and I wish you the best of luck with |
|
the Director of OPM. We had her here two weeks ago. She was the |
|
worst witness our Committee has ever had in the two-plus years |
|
that I have been here. And so, I have much greater confidence |
|
in you and your leadership and hope like hell that you can pull |
|
that off with--because she really couldn't answer any of our |
|
questions about even workforce issues. So, I really hope and |
|
pray that you will be able to work with her, and she will be |
|
able to work with you, and us, too, to expedite getting Federal |
|
employees into our cyber workforce. So, thank you, and I yield |
|
back. |
|
I will now recognize the Ranking Member Connolly for five |
|
minutes. |
|
Mr. Connolly. Thank you, Madam Chairwoman. Ms. Walden, if I |
|
could pick up a little bit on where Ms. Mace was, OK? We are |
|
looking at tens of thousands of positions in IT in the Federal |
|
Government and cyber as a subset of that, for sure. Given the |
|
age cohort of the Federal Government, right, we are looking at |
|
serious numbers of retirements over the next five years. So, |
|
how proactively--I mean you talked about removing barriers and |
|
working with OPM, but how do we proactively persuade, you know, |
|
the millennial generation `you want to come work for the |
|
Federal Government, and we see a 30-year career in your |
|
future.' How do you do that? Do you go to college campuses, and |
|
how do we make Federal services attractive in the sphere when |
|
the private sector alternative is glaringly seductive in terms |
|
of compensation and benefits and everything else? |
|
Ms. Walden. Well, thank you for that question, |
|
Representative Connolly. I personally do go to college |
|
campuses. I go to high schools. I even teach cybersecurity |
|
badge in my daughter's Girl Scout's troop. The pipeline is a |
|
serious part of our focus in the work force strategy. That is |
|
why we call it the work force and education strategy. We really |
|
need to not only focus on the core cyber and IT jobs and how we |
|
fill that, but the pipeline. So, in my experience, you cannot |
|
imagine yourself in a particular career unless you see yourself |
|
in that career. So, it is important to me, for example, to make |
|
sure that I am out there in front, motivating people to |
|
consider this. |
|
So, a couple of thoughts about this. One, the thing that |
|
draws me in and out of the private sector and into the |
|
government is mission. Private sector cannot compete with the |
|
government on mission, and, quite frankly, the government |
|
cannot compete with the private sector on pay. We can do |
|
better, and that is one of the opportunities we are looking at |
|
in this new legislative proposal, being flexible and how we do |
|
pay. But what we really offer is mission as a sense of moral |
|
enlightenment, in many ways. So, yes, reaching out, reaching to |
|
rural areas of the United States, reaching into parents to have |
|
parents understand the benefits of a career in cyber, and |
|
parents are and should be one of the primary influencers of |
|
their children. That is a constituency that I like to reach. |
|
But it is really the mission that is the secret sauce here. |
|
Mr. Connolly. Well, thank you. I will commend you. We have |
|
seen, for example, the excitement generated in high schools |
|
with robotics competition teams. The excitement is incredible, |
|
and I remember that some of our intelligence agencies actually |
|
sponsored cyber competitions. And so, we may want to think more |
|
about expanding that kind of program to get into high schools |
|
and get in people's heads this might be something you might |
|
want to pursue, including in Federal service. |
|
Let me talk about the National Strategy. I mean, candidly, |
|
the National Strategy took a little while to get together. Now, |
|
granted, we were in a pandemic, and we have lots of other |
|
competing things, but cyber is not a new topic. The OPM breach |
|
occurred two administrations ago, affecting 22 million current |
|
and retired Federal employees, and so, it comes to us a little |
|
bit late. And I guess I am worried about implementation because |
|
we talk about a whole-of-government approach. Knowing the |
|
Federal Government, this Subcomittee and its predecessor have |
|
spent a lot of time looking at Federal agencies, the diversity |
|
of capability, the diversity of expertise, the diversity of |
|
proactive strategies to protect, you know, the jewels in a |
|
given agency is very variable. So, how are you going to have a |
|
whole-of-government approach that guarantees all Federal |
|
agencies, whether you are in intelligence or you are in |
|
education, are protected and that are proactively fending off |
|
and maybe even proactively attacking the bad guys? |
|
Ms. Walden. What I can guarantee is that we are, as a whole |
|
of government, proactive in making sure that our systems are |
|
resilient. I feel the same urgency. I feel that we are moving |
|
like a bullet train in this space. There is a sense of urgency |
|
here. We want to get it right, though, so we have all of the |
|
departments and agencies working with us. We work by, with, and |
|
through them. We need mostly consensus to make sure that this |
|
moves forward in a deliberate, thoughtful, but expedient way, |
|
so I share that. That is why we were designed the way that we |
|
are as ONCD. So, we have been implementing, we have been |
|
working for the last two years on shoring up our cybersecurity |
|
resilience. I see my time is up. |
|
Mr. Connolly. Let me just say, because I know the |
|
Chairwoman shares my concern in this regard, I think you have |
|
got your work cut out for you. |
|
Ms. Walden. I do. |
|
Mr. Connolly. And it is an across-the-board kind of thing. |
|
It is the IT we possess, the legacy systems that need to be |
|
retired. It is the encryption that hasn't happened or hasn't |
|
been updated. It is the personnel as the Chair pointed out, I |
|
mean, that the age gap between us and the private sector is |
|
phenomenal. And so, you know, I just think you have got limited |
|
resources, and your ability to try to have a cohesive strategy |
|
that affects everybody and protects everybody is going to be, |
|
well, I hope not a Sisyphean task. I am sorry, Madam |
|
Chairwoman. Thank you. |
|
Ms. Mace. You are good. And it will be some of the Federal |
|
employees that won't want to go along with the national |
|
strategy that is, as you said, it is preeminent. It is deeply |
|
important. I would now like to recognize Representative Timmons |
|
for five minutes. |
|
Mr. Timmons. Thank you, Madam Chair. The National Cyber |
|
Strategy was expected to be released last fall. Was that delay |
|
a reflection of how difficult it is to get the various |
|
interested parties on the same page, or were there other |
|
challenges? |
|
Ms. Walden. You know, it was a bureaucratic process |
|
intentionally so that we can make sure that everybody, every |
|
department and agency, saw themselves in the strategy and are |
|
ready to implement. So, that was just a necessary step that had |
|
to take place in order to make sure that it is successful. |
|
Mr. Timmons. Sure. So, next question. U.S. businesses, no |
|
matter how hard they try to have the best cybersecurity |
|
possible, can still fall victim to nation-state attacks, and |
|
those attacks can often cost billions of dollars to publicly |
|
traded companies. |
|
Mr. Timmons. Do you think that the Federal Government has a |
|
role in backstopping those businesses? Since, assuming they are |
|
doing everything possible to avoid an attack, it is just not |
|
possible to stand up to nation-state actors. What are your |
|
thoughts on that? |
|
Ms. Walden. So, I will start by saying that the cyberspace |
|
is a global commons. It is a public good. So, the U.S. |
|
Government has a responsibility and a duty to make sure that it |
|
is safe, while the private sector pretty much owns and controls |
|
most of the infrastructure that underlines cyberspace. So, we |
|
have to work together. |
|
So, my response to your specific question about small and |
|
medium businesses, one of the core tenants of the cybersecurity |
|
strategy is to make sure that those small and medium businesses |
|
don't bear the significant brunt of cybersecurity risk all on |
|
their own. So, all of the tools in the strategy are there to |
|
lift and shift that risk, while also making the infrastructure |
|
cyberspace more resilient. You talked about backstopping. That |
|
is indeed one of the tools that we are considering, so cyber |
|
insurance backstop. Think of flood insurance, for example, in |
|
order to make sure that cybersecurity, small and medium |
|
businesses, don't bear the full cost of a cybersecurity breach |
|
while we are also working on making sure that the systems are |
|
resilient. |
|
Mr. Timmons. Sure. Thank you for that. So, let us talk |
|
about ICANN. The original intent was to promote the stability |
|
and security of the internet by creating a transparent multi- |
|
stakeholder governance model for the management of domain name |
|
system. So, in 2016, Department of Commerce, their role in |
|
ICANN expired. Do you have concerns over that, in the U.S.' |
|
leadership in maintaining a secure internet globally? |
|
Ms. Walden. So, I think we need to consider how do we |
|
harmonize standards. Digital ecosystem is--doesn't have |
|
specific borders, so we need to make sure that we harmonize |
|
standards in general, but let me just even take it a step |
|
further back. Cyberspace is composed of three pieces. We have |
|
touched a lot on personnel, people, which is arguably the most |
|
important part of cyberspace, but it is also technology, the |
|
gizmos, the microphone that has an echo, all of that, right? |
|
But it is also governance, it is authorities and |
|
responsibilities. If no one is guarding the gate, then the bad |
|
guy can just walk through. It is that governance layer that you |
|
are getting at. |
|
So, yes, the cybersecurity strategy, generally, is intended |
|
to articulate and find vulnerabilities in that governance |
|
layer, in the roles and responsibilities, figure out who is |
|
guarding the gates, figure out what the vulnerabilities are, |
|
and then close those vulnerabilities. So, that is a symptom of |
|
the challenge that we face. |
|
Mr. Timmons. To that point, what tools does the |
|
Administration plan to use to bolster the security of the |
|
foundation itself? |
|
Ms. Walden. So, there are a couple of tools as articulated |
|
in the strategy. I think it is Pillar 4 we talk about the |
|
technical opportunities in the foundations of the internet, |
|
right, like a faster migration to IPv6 from IPv4. That is one |
|
opportunity in terms of modernizing the backbone of the |
|
internet. But then there are also opportunities for filling |
|
those vulnerabilities, like I described, in the roles and |
|
responsibilities. The implementation plan is going to help us |
|
with that, at least in the departments and agencies. We are |
|
also looking at the idea of harmonizing standards, harmonizing |
|
regulations so that we know exactly what we are certifying to |
|
when we have like IoT device labeling, for example, how that |
|
works across borders, we collaborate with our allies. Pillar 5 |
|
talks about that. So, that is that roles and responsibilities |
|
piece that relates to the backbone of the internet. |
|
Mr. Timmons. Sure. Thank you for being here today. Madam |
|
Chair, I yield back. |
|
Mr. Connolly. Madam Chairwoman, I just want to welcome to |
|
the Subcommittee the former Chairman of our full Committee and |
|
my predecessor in this seat in the 11th District, Virginia, the |
|
Honorable Thomas Davis. Welcome, Tom. |
|
Ms. Mace. Thank you for joining us, sir. I would now like |
|
to recognize Representative--I turned my mic off for you-- |
|
Burchett for five minutes. |
|
Mr. Burchett. Thank you, Chairlady. You mentioned when we |
|
first started this that she doubted that I could spell AI, but |
|
I can assure you I can now. I have researched it. I Googled it. |
|
Ma'am, Chinese-owned media application, TikTok, has over 150 |
|
million active users in the U.S. Do you feel like this is a |
|
national security concern? |
|
Ms. Walden. Yes. |
|
Mr. Burchett. Another question. What countries do you think |
|
are the biggest threats to national cybersecurity? |
|
Ms. Walden. Well, as articulated in the worldwide threats |
|
report that ODNI published, it is China, North Korea, Iran, and |
|
Russia. |
|
Mr. Burchett. All right. 1,600 offshore oil and gas |
|
facilities faces significant risk of cyberattacks. What do you |
|
think the potential impact of a successful cyberattack on these |
|
facilities is, and what steps is your office taking to secure |
|
this infrastructure? |
|
Ms. Walden. Please excuse me, I did not hear the very |
|
beginning of that question. |
|
Mr. Burchett. I said six. OK. Yes, ma'am. I am sorry. I am |
|
from East Tennessee. It is the only place in the country where |
|
people do not speak with an accent. |
|
Mr. Connolly. |
|
[Laugh] |
|
Mr. Burchett. Thank you, Connolly. I appreciate it. 1,600 |
|
offshore oil and gas facilities faces significant risk of |
|
cyberattacks. What is the potential impact of a successful |
|
cyberattack on these facilities, and what is your office doing |
|
to secure this valuable infrastructure? |
|
Ms. Walden. Well, let me start with Pillar 1 of our |
|
National Cybersecurity Strategy, which is focused clearly on |
|
critical infrastructure security. There are several tools that |
|
we have identified in that pillar for making sure that we make |
|
our critical infrastructure more defensible, while also making |
|
investments in making sure that it is resilient regardless of |
|
the attacker or the type of attack. One of those opportunities |
|
is raising baseline cybersecurity requirements across all |
|
critical infrastructure sectors. There are many ways to do it, |
|
but as we do that, we need to make sure that no one, particular |
|
sector is overregulated so that we encourage investment in |
|
raising baseline cybersecurity requirements rather than |
|
investing in compliance. Now, with respect to the offshore oil |
|
rig, I would love to give you a reaction to that question, but |
|
I would need to research what the exposure is and---- |
|
Mr. Burchett. Please do. It has been recently reported, and |
|
I have been informed that that is a major issue, and I can |
|
assure you that if our enemies can turn that spigot off, they |
|
will. |
|
Ms. Walden. Yes. |
|
Mr. Burchett. And they will not do it in an environmentally |
|
sound manner either. If somebody could get with me from your |
|
office, that would be great. |
|
Ms. Walden. Absolutely. |
|
Mr. Burchett. From the cybersecurity perspective, ma'am, |
|
how can we better secure our global financial institutions from |
|
bad actors? I am always afraid they are going to turn the |
|
switch. In early days of eBay, they always said make sure you |
|
use PayPal. Everybody thought it was a racket, and it is a |
|
racket, but it is their racket, so it is just the deal. But |
|
then they would say, you know, you get wired money, and it was |
|
always some kind of lame deal, and people were always getting |
|
ripped off. |
|
Ms. Walden. So, there are several opportunities. First, I |
|
would like to say about the financial services sector that they |
|
are quite mature in their cybersecurity practices. Of course, |
|
more work can always be done. As cybersecurity threat actors |
|
are always evolving and improving, so can our defenses, and so |
|
can our resilience, so it is an evolution. We work closely with |
|
the financial sector. We work closely with the Department of |
|
Treasury. So, for example, we have recently done exercises with |
|
the Department of Treasury for how do we make sure that our |
|
financial services sector becomes more resilient? |
|
Mr. Burchett. Let me get to one more because I am running |
|
out of time. |
|
Ms. Walden. OK. |
|
Mr. Burchett. This is really important to me. Our senior |
|
citizens, they seem like they are on the radar for a lot of |
|
these dirtbags that prey upon them. And what steps can your |
|
office do to work with us to ensure that these folks are |
|
protected from these hostile foreign actors and groups? |
|
Ms. Walden. My mom might hate me saying this on live C- |
|
SPAN, but I have got a mom who might be classified as a senior |
|
citizen, and it concerns me every time she does online banking. |
|
Mr. Burchett. Mama had a Sunday school class and they |
|
called them ``seasoned.'' |
|
Ms. Walden. I like it. |
|
Mr. Burchett. Well, she said, I did not like that, honey. |
|
It makes it sound like a bunch of cannibals, so my mama was a |
|
pretty cool lady. But go ahead, I am sorry. |
|
Ms. Walden. No, but we need to make sure that all of the |
|
technology, all of the devices that we have, need security |
|
built in, right? We need to make that commercial where there is |
|
an easy button. That is what I envision when I am envisioning |
|
security built in for senior citizens. They should be able to |
|
turn on their computer, login is already enabled by default, |
|
multi-factor authentication is already enabled by default. All |
|
the different security options that you can take should be |
|
enabled by default. Security has to be built in. |
|
Mr. Burchett. And I know we are out of time, but a recent |
|
former Director of the FBI got ripped off on one of these |
|
deals. And they went after them and got his money back, and I |
|
was glad they did that. But I was ticked off because I have had |
|
people that the FBI just gives me lip service, and if they |
|
could do it for one, they can do it for all of them, and |
|
dadgummit, they need to start doing it. So, thank you, ma'am. |
|
Ms. Mace. Thank you, Mr. Burchett. |
|
Mr. Burchett. I am sorry. I went out of time. |
|
Ms. Mace. Are you yielding back? |
|
Mr. Burchett. Do what? |
|
Ms. Mace. Are you yielding back? |
|
Mr. Burchett. Yes, ma'am, I yield---- |
|
Ms. Mace. Yes, you are. Yes, you are. |
|
Mr. Burchett [continuing]. None of my time back. |
|
Ms. Mace. All right. I would now like to recognize |
|
Representative Langworthy for five minutes. |
|
Mr. Langworthy. Thank you, Madam Chairwoman. Ms. Walden, I |
|
just want to thank you for being here today and providing this |
|
Subcommittee with the invaluable insight on the path forward in |
|
the cybersecurity sector. |
|
So, I would like to start off by looking at cloud service |
|
providers. And the strategy correctly notes that cloud-based |
|
services enable better and more economical cybersecurity |
|
practices at scale, and their security is crucial for critical |
|
infrastructure in government systems. However, the strategy |
|
also is looking to close gaps in regulatory authorities for |
|
cloud services. Now, I am concerned that this categorical |
|
effort to sweep in an all cloud-based services is inconsistent |
|
with a risk-based approach. Can you explain the rationale for |
|
the blanket approach that you plan to pursue? |
|
Ms. Walden. So, cloud service providers provide some |
|
cybersecurity risk protections, particularly for small and |
|
medium businesses, and even for large enterprises, so let us |
|
start there. The cloud service providers operate in a highly |
|
regulated environment as it is. They are a participant in all |
|
of the regulations that their customers bear. Wouldn't it be |
|
fantastic if we had harmonized system regulations so that those |
|
that are highly regulated and that cloud service providers |
|
provide the compliance for, equal--and we reward that |
|
investment and cause others to invest in cybersecurity best |
|
practices by looking at how they are regulated. But cloud |
|
services providers have publicly acknowledged--we have worked |
|
with them directly in developing the strategy, but they have |
|
publicly acknowledged the need for regulatory minimum |
|
cybersecurity requirements baselines to be brought up and for |
|
harmonization to take place. |
|
So, cloud service providers, cloud environments are more |
|
secure than on-prem, but there is some work still to be done. |
|
And we are ready, willing, and able to work directly with cloud |
|
service providers, not necessarily to kowtow to their demands, |
|
but to make sure that we have effective harmonization across |
|
all sectors for these purposes of making cloud services more |
|
secure. |
|
Mr. Langworthy. You spoke in an interview recently saying |
|
that of cloud services, that if they were disrupted, they could |
|
create large and potentially catastrophic disruptions to our |
|
economy and to our government. Can you talk a little bit about |
|
this? You had mentioned how cyber criminals in malign foreign |
|
countries disrupt cloud services. |
|
Ms. Walden. So, cyber criminals will typically spin up |
|
infrastructure using cloud services to do so. I was part of a |
|
team that would find that infrastructure and use all means |
|
appropriate to tear it down. I think that we can do that at |
|
scale. We need to be able to work with cloud service providers |
|
to remove infrastructure, or at least to harden infrastructure, |
|
so that cyber criminals cannot leverage it. Of course, there |
|
are other opportunities for making sure that we reduce or we |
|
increase the cost of cybercrime. We can arrest people. We can |
|
lean into our authorities more. But we also need to work with |
|
private sector, owners and operators of managed service |
|
providers, and cloud service providers to tear down |
|
infrastructure where infrastructure is being used by |
|
cybercriminals. |
|
Mr. Langworthy. OK. Now, the Stafford Act, generally |
|
speaking, is an all-encompassing document for disasters in the |
|
United States. A largescale cyberattack could plausibly be |
|
considered a disaster. However, cyber-related disasters are not |
|
mentioned in the Stafford Act. What would our strategy be in |
|
case of a large-scale attack? |
|
Ms. Walden. This is the reason why we have designed the |
|
strategy the way that we have. We need to make sure that we |
|
have our ducks in a row so that we make it more defensible. But |
|
the focus really needs to be on what investments do we need to |
|
make in order to make sure that cyberattacks are not |
|
catastrophic and do not cause systemic failure or long-term |
|
failure, that we have shorter downtimes. We have a seamless |
|
response. So, that is the reason why we have the Cybersecurity |
|
Strategy. On your specific questions about the Stafford Act, I |
|
would be happy to come back to you with some thoughts about |
|
that, but that is the reason why we have the strategy the way |
|
it is. |
|
Mr. Langworthy. Thank you very much. |
|
Mr. Langworthy. And I yield back, Madam Chair. |
|
Ms. Mace. Thank you. I would now like to recognize |
|
Representative Edwards for your five minutes. |
|
Mr. Edwards. Thank you, Madam Chair. Ms. Walden, thanks for |
|
being with us. As I sit here and read your testimony and listen |
|
to your responses, I cannot think of a less enviable position |
|
than yours. We are certainly appreciative of you taking this |
|
on. I served on a bank board for a number of years, and I knew |
|
the thing that kept us awake most at night was the chance of a |
|
cyber threat, and you have got a whole country to look out for. |
|
Can you see any, at this time, I do not want to talk about the |
|
plan so much, I want to talk about right now. Can you see any |
|
coordinated efforts from foreign governments right now to hack |
|
into systems in the United States, or are the threats out there |
|
from universities or just ne'er-do-wells or that sort of thing? |
|
Ms. Walden. Thank you for that question. What I can say is |
|
that the Worldwide Threats Report that was published by ODNI is |
|
the preeminent description of cyber threats and nation-state |
|
actors. That is not classified. I would refer you to that, and |
|
I agree with everything that is in that report. If you are |
|
asking me about specifics, that might get into classified |
|
nature of a conversation, and I am not prepared to do that |
|
today. |
|
Mr. Edwards. I respect that. Thanks. How do you coordinate |
|
with the private sector? We have all seen examples of how they, |
|
too, are under attack, and your responsibility is vast. How do |
|
you include the private sector? |
|
Ms. Walden. You know, you can always just pick up the phone |
|
and call. So, there are opportunities, right? ONCD, my office, |
|
collaborated with the private sector in a robust way in a |
|
development of the strategy. We are not an operational office. |
|
We are, by design, a strategic policymaking office, but |
|
operationally, there are several different models. We need to |
|
meet the private sector where they are. We have recognized that |
|
we need proactive operational collaboration, and this is |
|
different than information sharing when I left government the |
|
last time. So, it is exciting for me to see how we are doing it |
|
now. |
|
So, for example, CISA runs the Joint Cyber Defense |
|
Collaborative, known as the JCDC. It is a model where different |
|
private sector entities are able to come together, exchange |
|
ideas, exchange information with CISA, with each other. And |
|
there are other models like the National Security Agency's |
|
Cyber Collaboration Center, the CCC, which does cyber |
|
information sharing with their defense industrial base, maybe |
|
one-on-one, in a classified nature, however it is. But we need |
|
to meet the private sector where they are. We need to find |
|
opportunities to identify problems together, come up with |
|
solutions and operational plans for mitigating that problem |
|
together, and then executing and deploying that solution |
|
together. |
|
Good example, one that makes me really excited and I think |
|
is a pivotal moment that really did inform the strategy, was |
|
that on the eve of, or the weeks leading up to the Russian |
|
invasion of Ukraine, we collectively, we the government, |
|
collectively figured out that we had intelligence that the |
|
private sector may not have. Understanding, particularly in the |
|
financial sector, that if we sanction Russia, that there might |
|
be some retaliatory effects on the financial sector here at |
|
home, that there is more that could be done with the |
|
intelligence that we had by those that actually operate and |
|
control the infrastructure in the financial services sector. We |
|
delivered that intelligence so that they can take action. We |
|
worked the intelligence. We worked the action together. And I |
|
would like to think that that is a success story. We did not |
|
see any retaliatory effect on the financial services sector. |
|
Mr. Edwards. I am running out of time, but a question that |
|
has been burning on my mind for years, we have heard of this |
|
threat that maybe computers, PCs that we buy through foreign |
|
entities that may come from China, Korea, the chips may contain |
|
in their bias, some sort of code that is sniffing out activity |
|
here in the U.S. and just ready to be called whenever the |
|
foreign entity decides. Are you aware of that? Is that actually |
|
happening? Has it happened? |
|
Ms. Walden. Well, I would like to point you to the |
|
strategy, and perhaps you might understand why the strategy |
|
talks about understanding the supply chain implications of |
|
chips manufacturing. That is partly what the CHIPS and Science |
|
Act is intended to mitigate, any opportunity like that, |
|
hypothetically, could happen like that. Wouldn't it be nice if |
|
we understood what was in our software, right, what code |
|
libraries were in our software and how they were assembled? |
|
Wouldn't it be nice if we could make sure that the final |
|
assemblers, for example, of software, were held liable for what |
|
is in it so that it is not buggy, or, and it does not have some |
|
nefarious code written into it. |
|
That is one of the most intriguing parts of the National |
|
Cybersecurity Strategy, from my perspective, is how do we make |
|
sure that software is built with security in mind. How do we |
|
make sure that market focuses on securing the market rather |
|
than first to market? What are the incentives that we need to |
|
shift in order to make sure that that hypothetical situation |
|
does not happen? |
|
Mr. Edwards. Thank you. Madam Chair, I yield. |
|
Ms. Mace. Thank you. I am going to do one more quick round |
|
of questions. I may be the only one with questions, and then we |
|
are going to close it out, if that would be OK to the Ranking |
|
Member. I am going to recognize myself for five minutes and |
|
hopefully less than that. |
|
One of my burning questions is on legacy systems. So, Y2K, |
|
I was learning COBOL, C++, we called it. COBOL was legacy back |
|
then in the late 1990's and early 2000's, and it is sort of |
|
shocking to me to see how many systems that we have that are |
|
still legacy today. So, for example, there is a 46-year-old |
|
Department of Education System handling 20 million student |
|
financial aid applications annually, running on COBOL. There is |
|
a 50-year-old HHS system supporting clinical and patient admin |
|
activities coded in C++. I mean, so the list goes on and on of |
|
all of these examples of these legacy systems. So you know, |
|
your thoughts on--the Government Accountability Office has |
|
pointed this out repeatedly--we need these upgrades. We have |
|
needed it for decades. How does the strategy play into getting |
|
this done across the board? |
|
Ms. Walden. You know, IT modernization is part of the story |
|
here. It has to happen. We cannot have 50-year-old systems. |
|
Ms. Mace. It has to happen. |
|
Ms. Walden. It has to happen. |
|
Ms. Mace. I mean, there is--yes. |
|
Ms. Walden. But it has to happen in a way that is smart and |
|
thoughtful, but it has to happen. There is some urgency behind |
|
it. We have already started working on that process. |
|
Ms. Mace. What about the agencies and Federal employees |
|
that are dragging their feet on some of this? I mean, we have |
|
seen, like, at the VA right now, EHR, I mean, just taking over |
|
a decade to do something that really should not take as long as |
|
it is. How do we get them to come along with this? |
|
Ms. Walden. Well, I would love to take that particular |
|
question back about the VA and give you a detailed answer. |
|
Ms. Mace. Yes. |
|
Ms. Walden. But I share your urgency. I am 51. |
|
Ms. Mace. And a lot of examples. |
|
Ms. Walden. Yes. |
|
Ms. Mace. I will not go into all of it. But the other quick |
|
thing I wanted to ask about, and you have talked about this, |
|
too. Our first hearing was on AI in this committee, and there |
|
are things that we cannot even imagine how AI will be used. I |
|
read a story the other day about ChatGPT getting through |
|
CAPTCHA, like, with a TaskRabbit employee, and told them that |
|
they were visually impaired, to break into that. We cannot even |
|
imagine how it might be used for good and then also for bad, |
|
which is one of my concerns. How are we going to use some of |
|
these tools to ensure that we defend ourselves against breaches |
|
that we cannot even be aware of right now? Where is AI? I know |
|
it is mentioned in the plan, but where do you see AI in the |
|
overall strategy? |
|
Ms. Walden. So, it is mentioned in the strategy, but I |
|
think our first conversation was around AI at some point, and |
|
so, I have been giving this some thought. I think of AI and the |
|
cybersecurity pieces of it in three buckets, right? Data that |
|
fuels AI, the compute power for AI, and the algorithms. There |
|
are cybersecurity components of each piece of that, that we can |
|
use to not only shore it up so that it is not used for |
|
nefarious purposes, or at least we reduce the chances of it |
|
being used for nefarious purposes, but we can also use it for |
|
the benefit of security, right? |
|
So, I am thinking in terms of data. I am thinking through |
|
data security measures, thinking through cryptography. How do |
|
we do data analytics without decrypting? Thinking about compute |
|
power and the work we are doing right now, as articulated in |
|
the strategy, on quantum is all about compute power. The work |
|
that we are doing on chip supply chain the gentleman here |
|
raised, it is all about compute power. And then the algorithms, |
|
how do we think about that? So, we are purposefully thinking |
|
through how to make sure that AI, the cybersecurity elements of |
|
AI, are used for good purposes, and that we are reducing the |
|
likelihood of---- |
|
Ms. Mace. We do not want China to eat our lunch or Russia, |
|
or Iran, or any of that. |
|
Ms. Walden. Absolutely. |
|
Ms. Mace. My last question is part of the strategy |
|
contemplates more regulation, but from your lips, God's lips to |
|
my ears, you said you did not want to overregulate. So, thank |
|
you for making that statement, much appreciated because I think |
|
that we could stifle innovation by overregulating. But in terms |
|
of regulation, that framework, who is going to coordinate the |
|
cybersecurity regulatory regime and then also de-conflict when |
|
that is necessary? |
|
Ms. Walden. Well, we do have language, and not in this |
|
strategy, offering that ONCD in collaboration with OMB will |
|
lead a regulatory harmonization taskforce, for example, where |
|
we will think through precisely what are the gaps, what are the |
|
regulations, what are the authorities that exists now that we |
|
are underutilizing for regulatory purposes of cybersecurity. |
|
How do we fill any gaps that might exist? But most importantly, |
|
you and I agree, that we need to harmonize so that we make sure |
|
that we incentivize investment in cybersecurity requirements |
|
and not compliance, which some sectors are doing right now. |
|
And so, that is an all-of-department and--agency effort. We |
|
would love to have a task force that does that work. We are |
|
already working on that. We work on that through the CIRC, the |
|
Cyber Incident Response Council, and CIRCIA. We are working on |
|
that with independent agencies in terms of thinking through how |
|
do we harmonize the regulations that independent agencies are |
|
imposing, but there is more work to be done. |
|
Ms. Mace. Thank you. And I would now like to recognize |
|
Representative Lynch for five minutes. |
|
Mr. Lynch. Thank you, Madam Chair, and I thank the Ranking |
|
Member for holding this hearing, and I want to welcome Ms. |
|
Walden for giving her testimony and helping the committee with |
|
this work. |
|
Ms. Walden, the Administration's National Cybersecurity |
|
Strategy represents, I think, an important step in our response |
|
as a Nation in dealing with the cyber threat landscape. We know |
|
that autocratic and oppressive governments like Russia and |
|
China are not only operating full spectrum surveillance of |
|
their own citizens, but we also know that they are taking |
|
advantage of the freedoms that we have in our country by |
|
surveilling our personnel, our citizens as well. And they are |
|
leveraging espionage, influence campaigns, ransomware, critical |
|
infrastructure attacks, and emerging technologies to pursue all |
|
those goals. |
|
Your strategy, as I read it, mentions ``the dark vision for |
|
the future of the internet that the People's Republic of China |
|
and other autocratic governments,'' I presume, Russia, what |
|
``those regimes promote.'' Can you sort of flesh that out a |
|
little bit and talk about what does that look like, the dark |
|
vision that Russia and China present in terms of our future on |
|
the internet? |
|
Ms. Walden. So, the way I think about the internet, is that |
|
it carries our values. It carries the values of those that |
|
design and build it. We have democratic values here. We need to |
|
lead and lean into that as we think about the future resilience |
|
of internet. We cannot allow autocratic societies like China, |
|
like Russia, to set our agenda to have internet, to have a |
|
cyberspace that we envision in the document that we presented |
|
here today. That is the idea. That is the big idea in this |
|
strategy is that we need to set what we think the future of |
|
cyberspace is. We need to invest in that future of cyberspace, |
|
and that is the resilience piece of it, rebalancing the risk |
|
piece of it. But we cannot let China, Russia, et cetera, et |
|
cetera, set our agenda. We are getting really great at |
|
defending against, but wouldn't it be great if we got in front |
|
of? That is a better opportunity from my perspective. |
|
Mr. Lynch. Absolutely. |
|
Ms. Walden. That is what we mean. |
|
Mr. Lynch. OK. In some ways, and in frightening ways, this |
|
dark future that you identify in your National Cybersecurity |
|
Strategy, that dark future seems more immediate, to be honest |
|
with you. For example, The Wall Street Journal reported last |
|
week, and I have an article here that I will ask for unanimous |
|
consent. It talks about China's use of state-sponsored hackers, |
|
teams of hackers, to employ novel hacking techniques. |
|
Madam Chair, I ask unanimous consent to submit this Wall |
|
Street Journal article entitled, ``Wave of Stealthy China |
|
Cyberattacks Hits U.S. and Private Networks, Google Says.'' |
|
Ms. Mace. Without objection. |
|
Mr. Lynch. Thank you, Madam Chair. These techniques have |
|
allowed China to spy on governments and businesses for years |
|
without detection. These activities are so stealthy that, ``The |
|
scope of Chinese intrusion into U.S. and Western targets is |
|
likely far broader than currently known.'' Ms. Walden, what |
|
solutions do we have in terms of--does the strategy include |
|
solutions to root out and combat these type of aggressive |
|
attacks by autocratic state actors, and how successful have we |
|
been thus far? |
|
Ms. Walden. So, Pillar 2 of the strategy, in my mind, is |
|
quite aggressive and forward leaning. It really projects the |
|
concept that defense is the new offense in this space. But we |
|
need to lean further into the authorities that we do have to |
|
dismantle and disrupt while shoring up opportunities with the |
|
private sector to remove infrastructure that we know that these |
|
hackers are leveraging. So, there are opportunities for that, |
|
but really, what is going to happen here is we are going to |
|
have a cyberspace that is more resilient. There are going to |
|
always be some sort of holding our infrastructure at risk. We |
|
need to get in front of that. We cannot just keep playing |
|
whack-a-mole, essentially. That is the general idea. But I |
|
would direct your attention to Pillar 2 about our opportunities |
|
to disrupt and dismantle. |
|
Mr. Lynch. Thank you, Madam Chair. My time has expired, and |
|
I yield back. Thank you. |
|
Ms. Mace. And I will recognize the Ranking Member Connolly |
|
for five minutes. |
|
Mr. Connolly. I thank the Chair, and I will not take five |
|
minutes. I do want to thank the Chair for holding this hearing, |
|
which is one of a series of hearings planned on cybersecurity, |
|
AI, IT management in general. And I just want to say thank you |
|
to Ms. Walden, but I also want to urge, and I know you share |
|
this view, Madam Chairwoman, we will have you back, and we are |
|
going to talk about implementation of the strategy because we |
|
are eager to see that happen. |
|
And I do believe the task in front of you is herculean. A |
|
whole-of-government approach to this subject, noble, worthy, |
|
but very challenging, and we have been working a lot on those |
|
issues for a long time on this Subcommittee as predecessors. |
|
So, we certainly want to help, and we want to give you the |
|
opportunity to share successes and frustrations as we move |
|
forward. |
|
I, also, Madam Chair, and then I will yield back. We talked |
|
earlier about hiring, and I just wanted to commend the three |
|
bills we are working on. One I have introduced, called the OPM |
|
Reform Bill to improve our hiring practices. The second I am |
|
working with Virginia Foxx, Congresswoman Foxx of North |
|
Carolina, called the Chance to Compete Act, which addresses |
|
what you were talking about earlier to Madam Chairwoman, to |
|
increase hiring of people with non-traditional credentials. And |
|
the third is the NextGen Fed Employee Act, a bill I have |
|
introduced, which is to try to systematize and professionalize |
|
the use of internships in the Federal Government. We are so far |
|
behind the private sector in the use of internships to recruit |
|
the talent we need for the future, and I am working with |
|
Chairman Comer on that bill as well. |
|
So anyway, we are working on trying to bolster how we hire, |
|
who we hire, and not only recruit but retain that work force of |
|
the future, and it is particularly acute and important in U.S. |
|
sphere. With that I yield back, and I thank the Chair. |
|
Ms. Mace. Thank you, and in closing, and I agree with the |
|
Ranker, that this is a herculean effort, the tasks before you, |
|
but know that we are here to assist and help you. We will have |
|
you back. We are going to want to hear about implementation and |
|
how that is progressing along as well. The importance, as |
|
Representative Lynch said earlier, it seems like it is needed |
|
faster and faster. In particular, I am going back to AI, |
|
everything that I come back to, because it is advancing so |
|
quickly. |
|
We just do not know what we do not know, and we do not know |
|
how it will impact us, the vulnerabilities that we have. And I |
|
have great concern, but not just the public sector, but the |
|
private sector, as well, on this issue, and so we want to offer |
|
as much support as we can. We will be putting out a portfolio |
|
of legislation to be helpful, and so in any way that any of us, |
|
you need us, you call us, and we will be there to assist here. |
|
So, in closing, I want to thank Ms. Walden for her |
|
presence. Your testimony today was clearly knowledgeable. It |
|
was fantastic, and we really appreciate it. We are very |
|
interested to learn about how the Administration, as |
|
Congressman Connolly said, will implement this strategy, and we |
|
are going to want more details on that in our next |
|
conversation, and we will invite you back. |
|
So, with that and without objection, all Members will have |
|
five legislative days within which to submit materials and to |
|
submit additional written questions for the witness, which will |
|
be forwarded to the witness for her response. |
|
Ms. Mace. If there is no further business, and without |
|
objection, the Subcomittee stands adjourned. |
|
[Whereupon, at 4:15 p.m., the Subcomittee was adjourned.] |
|
|
|
[all] |
|
</pre></body></html> |
|
|