[House Hearing, 114 Congress]
[From the U.S. Government Publishing Office]


   ENHANCING PREPAREDNESS AND RESPONSE CAPABILITIES TO ADDRESS CYBER 
                                THREATS

=======================================================================

                              JOINT HEARING

                               BEFORE THE
                               
                       SUBCOMMITTEE ON EMERGENCY
                        PREPAREDNESS, RESPONSE,
                           AND COMMUNICATIONS

                                AND THE

                     SUBCOMMITTEE ON CYBERSECURITY,
                       INFRASTRUCTURE PROTECTION,
                       AND SECURITY TECHNOLOGIES

                                 OF THE

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                    ONE HUNDRED FOURTEENTH CONGRESS

                             SECOND SESSION

                               __________

                              MAY 24, 2016

                               __________

                           Serial No. 114-71

                               __________

       Printed for the use of the Committee on Homeland Security

[[GRAPHIC NOT AVAILABLE IN TIFF FORMAT]


      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                               __________
                               
                               
                     U.S  GOVERNMENT PUBLISHING OFFICE
23-243 PDF                     WASHINGTON : 2017                     
___________________________________________________________________________________________
For sale by the Superintendent of Documents, U.S. Government Publishing Office, 
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center,
U.S. Government Publishing Office. Phone 202-512-1800, or 866-512-1800 (toll-free). 
E-mail, [email protected].  



                     COMMITTEE ON HOMELAND SECURITY

                   Michael T. McCaul, Texas, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Peter T. King, New York              Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Candice S. Miller, Michigan, Vice    James R. Langevin, Rhode Island
    Chair                            Brian Higgins, New York
Jeff Duncan, South Carolina          Cedric L. Richmond, Louisiana
Tom Marino, Pennsylvania             William R. Keating, Massachusetts
Lou Barletta, Pennsylvania           Donald M. Payne, Jr., New Jersey
Scott Perry, Pennsylvania            Filemon Vela, Texas
Curt Clawson, Florida                Bonnie Watson Coleman, New Jersey
John Katko, New York                 Kathleen M. Rice, New York
Will Hurd, Texas                     Norma J. Torres, California
Earl L. ``Buddy'' Carter, Georgia
Mark Walker, North Carolina
Barry Loudermilk, Georgia
Martha McSally, Arizona
John Ratcliffe, Texas
Daniel M. Donovan, Jr., New York
                   Brendan P. Shields, Staff Director
                    Joan V. O'Hara,  General Counsel
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director
                                 ------                                

  SUBCOMMITTEE ON EMERGENCY PREPAREDNESS, RESPONSE, AND COMMUNICATIONS

               Daniel M. Donovan, Jr., New York, Chairman
Tom Marino, Pennsylvania             Donald M. Payne, Jr., New Jersey
Mark Walker, North Carolina          Bonnie Watson Coleman, New Jersey
Barry Loudermilk, Georgia            Kathleen M. Rice, New York
Martha McSally, Arizona              Bennie G. Thompson, Mississippi 
Michael T. McCaul, Texas (ex             (ex officio)
    officio)
             Kerry A. Kinirons, Subcommittee Staff Director
                    Kris Carlson, Subcommittee Clerk
           Moira Bergin, Minority Subcommittee Staff Director

                                 ------                                

SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY 
                              TECHNOLOGIES

                    John Ratcliffe, Texas, Chairman
Peter T. King, New York              Cedric L. Richmond, Louisiana
Tom Marino, Pennsylvania             Loretta Sanchez, California
Scott Perry, Pennsylvania            Sheila Jackson Lee, Texas
Curt Clawson, Florida                James R. Langevin, Rhode Island
Daniel M. Donovan, Jr., New York     Bennie G. Thompson, Mississippi 
Michael T. McCaul, Texas (ex             (ex officio)
    officio)
               Brett DeWitt, Subcommittee Staff Director
                    Katie Rashid, Subcommittee Clerk
       Christopher Schepis, Minority Subcommittee Staff Director
                            
                            
                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Daniel M. Donovan, Jr., a Representative in 
  Congress From the State of New York, and Chairman, Subcommittee 
  on Emergency Preparedness, Response, and Communications:
  Oral Statement.................................................     1
  Prepared Statement.............................................     3
The Honorable Donald M. Payne, Jr., a Representative in Congress 
  From the State of New Jersey, and Ranking Member, Subcommittee 
  on Emergency Preparedness, Response, and Communications:
  Oral Statement.................................................     3
  Prepared Statement.............................................     5
The Honorable John Ratcliffe, a Representative in Congress From 
  the State of Texas, and Chairman, Subcommittee on 
  Cybersecurity, Infrastructure Protection, and Security 
  Technologies:
  Oral Statement.................................................     5
  Prepared Statement.............................................     7
The Honorable Cedric L. Richmond, a Representative in Congress 
  From the State of Louisiana, and Ranking Member, Subcommittee 
  on Cybersecurity, Infrastructure Protection, and Security 
  Technologies:
  Prepared Statement.............................................     8
The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Ranking Member, Committee on 
  Homeland Security:
  Prepared Statement.............................................     9

                               Witnesses

Mr. Mark Ghilarducci, Director, Emergency Services, Office of the 
  Governor of California:
  Oral Statement.................................................    10
  Prepared Statement.............................................    13
Mr. Daniel J. Cooney, Assistant Deputy Superintendent, Office of 
  Counter Terrorism, New York State Police:
  Oral Statement.................................................    17
  Prepared Statement.............................................    18
Brigadier General Steven Spano, (Retired, USAF), President and 
  Chief Operating Officer, Center for Internet Security:
  Oral Statement.................................................    22
  Prepared Statement.............................................    23
Mr. Mark Raymond, Vice President, National Association of State 
  Chief Information Officers:
  Oral Statement.................................................    28
  Prepared Statement.............................................    30
Mr. Robert Galvin, Chief Technology Officer, Port Authority of 
  New York and New Jersey:
  Oral Statement.................................................    33
  Prepared Statement.............................................    34

 
   ENHANCING PREPAREDNESS AND RESPONSE CAPABILITIES TO ADDRESS CYBER 
                                THREATS

                              ----------                              


                         Tuesday, May 24, 2016

     U.S. House of Representatives,        
      Committee on Homeland Security,      
   Subcommittee on Emergency Preparedness, 
          Response, and Communications, and
     Subcommittee on Cybersecurity, Infrastructure 
             Protection, and Security Technologies,
                                            Washington, DC.
    The subcommittees met, pursuant to call, at 10:07 a.m., in 
Room 311, Cannon House Office Building, Hon. Daniel M. Donovan 
[Chairman of the Subcommittee on Emergency Preparedness, 
Response, and Communications] presiding.
    Present: Representatives Donovan, Walker, McSally, 
Ratcliffe, Watson Coleman, Jackson Lee, Langevin, and Payne.
    Mr. Donovan. The Subcommittees on Emergency Preparedness, 
Response, and Communications and Cybersecurity, Infrastructure 
Protection, and Security Technologies will come to order. The 
subcommittees are meeting today to receive testimony regarding 
efforts to enhance preparedness and response capabilities to 
address cyber threats.
    I now recognize myself for an opening statement. First, I 
would like to thank Chairman Ratcliffe and Ranking Member 
Richmond for working with me and Ranking Member Payne on this 
issue. Also, I would like to thank all out of our witnesses 
today for coming to join us in this important discussion.
    We are all aware the cyber threat is real, from both state 
and non-state actors. The countless cyber attacks against the 
United States and its citizens, including major attacks against 
Target, Home Depot, OPM, and Anthem are just the tip of the 
iceberg.
    I believe that the number and magnitude of attacks will 
only increase, especially as more and more of our lives become 
connected to the internet. It is imperative that we ensure that 
our State and local officials, as well as our first responders, 
are prepared to protect against and respond to a cyber attack.
    Furthermore, we are seeing an increase in the number of 
cyber attacks that, if successful, can cause widespread 
physical damages to a community and require a whole-of-
community response. Already, state and non-state actors have 
attempted to interfere with 9-1-1 call centers, sent out 
inaccurate alerts and warnings, and tried to take over the 
controls of a dam. While we have taken numerous steps to 
enhance our capabilities, we have a long way to go in 
addressing these threats.
    As a member of Chairman Ratcliffe's subcommittee, I have 
heard about the progress the Federal Government, States, and 
localities have made in enhancing our cybersecurity 
capabilities. But I am left scratching my head when I see that 
for the fourth year in a row, the National preparedness report 
released by FEMA indicates that States continue to report 
cybersecurity as the lowest core capability.
    What is preventing us from reaching the appropriate level 
of cybersecurity? What obstacles are States facing, and what 
can we do to help? I am especially interested in learning more 
about what happens after a cyber attack that has physical 
consequences. Who is in charge of the response, and how are 
first responders coordinating with cyber officials who are 
trying to mitigate the attack? I know States like California 
have set up a task force to answer these exact questions.
    Additionally, in 2012, the National-Level Exercise looked 
at the Nation's ability to respond to a large-scale cyber 
attack with physical consequences. One of the key 
recommendations from this exercise was to finalize a cyber 
response plan that clearly defines the roles and 
responsibilities of all of the potential response entities.
    Four years since that exercise and 6 years since the 
interim draft of the National cyber incident response plan was 
released, we do not have a finalized and approved plan. 
Developing and finalizing this plan needs to be a priority of 
the Federal Government. I understand that the Department plans 
to finally begin stakeholder engagement on the development of 
the final plan in the coming weeks. I certainly hope that they 
will be engaging with all of today's witnesses to get their 
feedback.
    Also, I have heard that while sharing cyber information is 
becoming more prevalent, there is still confusion on who States 
should talk to when an incident occurs. The sharing of cyber-
related information with the emergency management and first 
response communities is, at best, ad hoc.
    These people are going to be the first on the scene and 
should have insight into whether the incident they are 
responding to has been caused by a cyber attack. Can States 
utilize their fusion centers to be a force multiplier to 
disseminate critical cyber information? I know that my State is 
taking this approach, and I am interested to hear if it has 
been successful.
    A few years ago, Secretary Johnson made a statement that I 
feel is still true today. He said, ``Cybersecurity is a shared 
responsibility, and it boils down to this: In cybersecurity, 
the more systems we secure, the more secure we are. We are all 
connected on-line, and a vulnerability in one place can cause a 
problem in many other places. So everyone needs to work on 
this. Government officials and business leaders, security 
professionals and utility owners and operators.'' That is why 
we are here today.
    I want to thank all the witnesses for testifying today, and 
I look forward to highlighting the good work that you are all 
doing to enhance your cybersecurity capabilities and learning 
about what areas are still a challenge and how the Federal 
Government can help in mitigating those gaps.
    [The statement of Chairman Donovan follows:]
              Statement of Chairman Daniel M. Donovan, Jr.
                              May 24, 2016
    First, I'd like to thank Chairman Ratcliffe and Ranking Member 
Richmond for working with me and Ranking Member Payne on this issue. 
Also, I would like to thank all the witnesses for coming today to join 
in this important discussion.
    As we are all aware, the cyber threat is real from both state and 
non-state actors. The countless cyber attacks against the United States 
and its citizens, including major attacks against Target, Home Depot, 
OPM, and Anthem, are just the tip of the iceberg. I believe that the 
number and magnitude of attacks will only increase, especially as more 
and more of our lives become connected to the internet. It is 
imperative that we ensure that our State and local officials as well as 
our first responders are prepared to protect against and respond to a 
cyber attack.
    Furthermore, we are seeing an increase in the number of cyber 
attacks that if successful can cause wide-spread physical damages to a 
community and require a whole-of-community response. Already, state and 
non-state actors have attempted to interfere with 9-1-1 call centers, 
send out inaccurate alerts and warnings, and tried to take over the 
controls of a dam. While we have taken numerous steps to enhance our 
capabilities, we have a long way to go in addressing these threats.
    As a Member of Chairman Ratcliffe's subcommittee, I have heard 
about the progress the Federal Government, States, and localities have 
made in enhancing our cybersecurity capabilities, but I'm left 
scratching my head when I see for the fourth year in a row, the 
National Preparedness Report, released by FEMA, indicates that States 
continue to report cybersecurity as the lowest core capability. What is 
preventing us for reaching the appropriate level of cybersecurity? What 
obstacles are States facing and what can we do to help?
    I'm especially interested in learning more about what happens after 
a cyber attack that has physical consequences. Who is in charge of the 
response and how are first responders coordinating with cyber officials 
who are trying to mitigate the attack? I know States like California 
have set up task forces to answer these exact questions.
    Additionally, in 2012, the National Level Exercise looked at the 
Nation's ability to respond to a large-scale cyber attack with physical 
consequences. One of the key recommendations from this exercise was to 
finalize a cyber response plan that clearly defines the roles and 
responsibilities of the all the potential response entities.
    Four years since the exercise and 6 years since the interim draft 
of the National Cyber Incident Response Plan (NCIRP) was released, we 
still do not have a finalized and approved NCIRP. Developing and 
finalizing this plan needs to be a priority of the Federal Government. 
I understand that the Department plans to finally begin stakeholder 
engagement on the development of the final plan in the coming weeks. I 
certainly hope they will be engaging with all of the witnesses at 
today's hearing to get their feedback.
    Also, I have heard that while sharing cyber information is becoming 
more prevalent, there is still confusion on who States should talk to 
when an incident occurs and the sharing of cyber-related information 
with the emergency management and first responder communities is ad hoc 
at best.
    These people are going to be the first on the scene and should have 
insight into whether the incident they are responding to has been 
caused by a cyber attack. Can States utilize their fusion centers to be 
a force multiplier to disseminate critical cyber information? I know my 
State is taking this approach and I'm interested to hear if it has been 
successful.
    A few years ago, Secretary Johnson made a statement that I feel is 
still true today. He said ``[c]byersecurity is a shared responsibility, 
and it boils down to this: In cybersecurity, the more systems we 
secure, the more secure we are. We are all connected on-line and a 
vulnerability in one place can cause a problem in many other places. So 
everyone needs to work on this: Government officials and business 
leaders, security professionals and utility owners and operators.'' And 
that is why we are here today.
    I want to thank all the witnesses for testifying today and I look 
forward to highlighting the good work you all are doing to enhance your 
cybersecurity capabilities and learning about what areas are still a 
challenge and how the Federal Government can help in mitigating those 
gaps.

    Mr. Donovan. The Chair now recognizes the gentleman from 
New Jersey, Mr. Payne, for an opening statement he may have.
    Mr. Payne. Good morning. I would like to thank Chairmen 
Donovan and Ratcliffe for holding today's hearings to assess 
our ability to respond to cyber threats. The last time our 
subcommittee held a joint hearing on the subject was in the 
113th Congress, about 3 years ago. What we have learned is that 
cyber threats are the new frontier of disaster response.
    Our legacy response doctrine from the National Response 
Framework to the Stafford Act are rooted in the era that 
predates reliance on cyber networks and growing threats posed 
by sophisticated actors. Despite our best efforts to ensure 
that our National preparedness doctrine is responsive to 
evolving threats, it has not kept pace with cyber threats.
    My district is rich with critical infrastructure, all of 
which rely on cyber networks. Within 2 miles, we have major 
transit systems, chemical facilities, and refineries mixed 
among homes, schools, and hospitals. A hack of any one of these 
targets could have devastating, cascading effects and could 
risk overwhelming our brave first responders. We know that the 
threat is real.
    Earlier this year, Iranian hackers breached the Bowman 
Avenue's Dam network in Rye, New York. Fortunately, the dam was 
off-line for repair when the authorities discovered this 
breach. But I am worried that it is only a matter of time 
before the hackers are successful, and we need to be prepared 
when they are.
    I applaud efforts at the State level to confront cyber 
threats head on. Some States, like California and my home State 
of New Jersey, have established State-level cyber information-
sharing centers modeled after the National Cybersecurity and 
Communications Integration Center, or NCCIC. I would be 
interested to learn whether these centers facilitate improved 
information sharing and encourage better relationships among 
non-traditional partners who would play an important role in 
cyber response.
    At the same time, I would be remiss if I did not note that 
while States annually indicate that they lack the confidence in 
their cybersecurity capabilities in the National preparedness 
report, very few invest homeland security grant funding to 
address the capability gap. I would be interested in 
understanding why. Is it because the Federal Government has not 
provided adequate guidance on how to address the threat or 
whether the amount of grant funds available after cuts to grant 
programs in the recent years prevent States from investing in 
cyber capability?
    The witnesses at that hearing made two points that stuck 
with me: First, the witnesses emphasized that the response to 
cyber attacks will require people from chief information 
officers to emergency managers to private-sector partners to 
break out of their silos and coordinate with non-traditional 
partners; second, they said that the existing disaster response 
guidance does not adequately address the complexities of 
responding to cyber events these days.
    I look forward to hearing our witnesses' opinions on how 
the National Incident Management System, the National Response 
Framework, and other disaster management doctrine should be 
updated to reflect the unique qualities of a cyber event. I 
appreciate the witnesses for being here today, and I look 
forward to their testimony.
    With that, Mr. Chair, I yield back.
    [The statement of Ranking Member Payne follows:]
            Statement of Ranking Member Donald M. Payne, Jr.
                              May 24, 2016
    The last time our subcommittees held a joint hearing on this 
subject was during the 113th Congress--about 3 years ago. What we 
learned is that cyber threats are the new frontier of disaster 
response.
    Our legacy response doctrine--from the National Response Framework 
to the Stafford Act--are rooted in an era that predates reliance on 
cyber networks and growing threats posed by sophisticated hackers. 
Despite our best efforts to ensure that our National preparedness 
doctrine is responsive to evolving threats, it has not kept pace with 
cyber threats.
    My district is rich with critical infrastructure, all of which rely 
on cyber networks. Within 2 miles, we have major transit systems, 
chemical facilities, and refineries mixed among homes, schools, and 
hospitals. A hack of any one of these targets could have devastating 
cascading effects and could risk overwhelming our brave first 
responders.
    And we know the threat is real. Earlier this year, Iranian hackers 
breached the Bowman Avenue Dam network in Rye, New York. Fortunately, 
the dam was off-line for repair when the authorities discovered the 
breach. But I am worried it is only a matter of time before the hackers 
are successful--and we need to be prepared when they are.
    I applaud efforts at the State level to confront the cyber threat 
head on. Some States--like California and my home State of New Jersey--
have established State-level cyber information-sharing centers modeled 
after the National Cybersecurity and Communications Integration Center. 
I will be interested to learn whether these centers facilitate improved 
information sharing and encourage better relationships among non-
traditional partners who would play important roles in a cyber 
response.
    At the same time, I would be remiss if I did not note that while 
States annually indicate that they lack confidence in their 
cybersecurity capabilities in the National Preparedness Report, very 
few invest Homeland Security Grant funding to address that capability 
gap.
    I will be interested in understanding why--is it because the 
Federal Government has not provided adequate guidance on how to address 
the threat or whether the amount of grant funds available after cuts to 
grant programs in recent years prevents States from investing in cyber 
capabilities?
    While I am on the subject of grant funds, I have been outspoken 
about my opposition to the proposed cuts to the Homeland Security Grant 
Program as well as the Port and Transit Security Grants. I have serious 
concerns that the proposed cuts would only further jeopardize whatever 
progress States and other grantees are making to address cyber threats, 
and I will be interested in the witness' thoughts on that point.
    Finally, as I indicated, our subcommittees held a joint hearing on 
responding to a cyber attack about 3 years ago. The witnesses at that 
hearing made 2 points that stuck with me.
    First, the witnesses emphasized that a response to a cyber attack 
will require people--from chief information officers to emergency 
manager to private-sector partners--to break out of their silos and 
coordinate with non-traditional partners. Second, they said that 
existing disaster response guidance does not adequately address the 
complexities of responding to a cyber event.
    I look forward to hearing our witness' opinions on how the National 
Incident Management System, the National Response Framework, and other 
disaster management doctrine should be updated to reflect the unique 
qualities of a cyber event.

    Mr. Donovan. The gentleman yields.
    The Chair now recognizes the Chairman of the Subcommittee 
on Cybersecurity, Infrastructure Protection, and Security 
Technologies, the gentleman from Texas, Mr. Ratcliffe, for an 
opening statement he may have.
    Mr. Ratcliffe. Good morning, everyone. I want to thank 
Chairman Donovan, Ranking Member Payne, for working with me and 
with Ranking Member Richmond on putting this issue together 
today.
    I also want to thank the witnesses for being here today. I 
am looking forward to hearing your testimony.
    On the Subcommittee on Cybersecurity, Infrastructure 
Protection, and Security Technologies, we talk a lot about the 
variety and high number of growing cyber threats that are out 
there. But today, we are going to hear about the other part of 
the equation, which includes the people, the hours, the 
programs designed and dedicated to preparing for and responding 
to the dangers that these cyber threats pose.
    Hopefully, having this discussion at a National level, will 
help bring to light some of the best practices and most evident 
areas for improvement at every level of government, whether it 
be the Federal, State, or local level. Because the truth is, 
every level of government is constantly having to face and 
respond to these threats, so we all need to be working together 
to understand the tactics and techniques and procedures that 
hackers are using so that we are better equipped to face the 
threats of tomorrow.
    It is important that we spend as much time and energy 
thinking about the solutions that secure Americans as we do 
examining the dangers. The purpose of today's hearing is to 
focus on seeking those solutions to make Americans safer. In 
that spirit, we are constantly seeking to improve upon and 
expand the programs and partnerships in both the private sector 
and State and local governments that function to help keep 
Americans safe. These partnerships are the nuts and bolts to 
secure Americans against the havoc that is possible if a bad 
actor were to successfully disrupt or damage one of the many 
systems that we rely upon for everyday life, like our water and 
our power.
    What we are hoping to gain from today's hearing is what 
more we can be doing to further these partnerships and 
programs. The importance of the flow of information can't be 
stressed enough, as information is the currency with which 
security and insecurity is established in today's digital age.
    As fast as the bad actors are moving in cyber space, we 
have to be constantly moving faster to stay ahead of them, and 
right now we are not. While they have to only be right one time 
to cause damage, we have to always be resilient and stand 
perpetually ready with a plan and with answers. I am glad to be 
having this joint hearing to highlight the interconnectedness 
of the response plans that are in place in case of a 
devastating cyber event, and the first responders who carry 
them out.
    At the Federal level, we have the ability to push out and 
develop plans beyond the capability currently available to the 
50 States. But it is the responders already in those areas who 
will be the first people that those most directly affected will 
see if a catastrophic cyber attack occurs.
    As Chairman Donovan mentioned, the draft National incident 
response plan, or NCIRP, was delivered to the White House in 
fall 2009, and in March 2010, an interim draft was released but 
not approved, subject to on-going review by the administration. 
It has now been 6 years since the release of the interim draft 
with stakeholder engagement just now starting. Six years is 
entirely too long for any type of response plan to sit on a 
shelf in the White House, but it is especially dangerous in the 
case of cyber.
    In 2014, Congress passed a law to require this cyber 
incident response plan to be finalized. Clearly, the 
administration, by not finalizing this plan doesn't seem to be 
taking cyber incident response planning seriously. It begs the 
very obvious questions: What if there is a significant cyber 
attack in the United States? Does every level of government 
know their role? And how cyber response will be coordinated?
    We are neither too ignorant nor too proud to think that a 
major cyber event is outside the realm of possibility right 
now. So I would like to take this moment to convey that we are 
watching the development of this document very closely.
    Look, it is very apparent that we have a lot more work to 
do. Securing our States from cyber threats now includes 
entirely new roles and responsibilities that didn't exist 50 
years ago. Discussing, examining, and encouraging the programs 
and partnerships that Americans rely upon is absolutely 
critical to being able to preserve and guarantee the American 
way of life.
    I look forward to hearing from our witnesses today to learn 
what more we can and what we should be doing to advance the 
security of the American people.
    Thank you. I yield back.
    [The statement of Chairman Ratcliffe follows:]
                  Statement of Chairman John Ratcliffe
                              May 24, 2016
    Good morning, I want to thank Chairman Donovan and Ranking Member 
Payne for working with myself and Ranking Member Richmond on this 
issue. I also want to thank the witnesses for coming today to speak on 
this important topic. On the Subcommittee on Cybersecurity, 
Infrastructure Protection, and Security Technology, which I chair, we 
often discuss the wide variety and high number of cyber threats that 
are out there and growing. Today, we are going to hear about the other 
part of the equation, which is the people, the hours, and programs 
designed and dedicated to preparing for and responding to the dangers 
that these cyber threats pose.
    Hopefully having this discussion at a National level will help 
bring to light some of the best practices and most evident areas for 
improvement that will be applicable to every level of government 
whether it be at the Federal, State, or local level. Because the truth 
is, every level of government is constantly having to face and respond 
to these threats. We all need to work together to understand the 
tactics, techniques, and procedures of hackers in order to better equip 
ourselves and face the threats of tomorrow.
    It is important that we spend as much time and energy thinking 
about the solutions that secure Americans as we do on the examination 
of the dangers. The purpose of today's hearing is to focus on seeking 
those solutions to make America safer. In that spirit, we are 
constantly seeking to improve upon and expand the programs and 
partnerships with both the private sector and State and local 
governments that function to make Americans safe. These partnerships 
are the nuts and bolts to secure Americans against the havoc that is 
possible should a bad actor successfully disrupt or damage one of the 
many systems that we rely on for everyday life such as our water and 
our power.
    What we are hoping to gain from today's hearing is what more we can 
be doing to further these partnerships and programs. The importance of 
the flow of information cannot be stressed enough as information is the 
currency with which security and insecurity is established in today's 
age. As fast as the bad actors are moving in cyber space, we have to be 
constantly moving faster to stay ahead of them. While they only have to 
be right once to do damage, we must be resilient and stand perpetually 
ready with a plan and with answers.
    I'm glad to be having this joint hearing to highlight the 
interconnectedness of the response plans that are in place in the case 
of a devastating cyber event, and the first responders who carry them 
out. At the Federal level we have the ability to push out and develop 
plans beyond the capability currently available to States, but it is 
the responders already in the area who will be the first people that 
those most directly affected will see when a catastrophic cyber attack 
occurs.
    As Mr. Donovan mentioned, the draft National Incident Response Plan 
or NCIRP was delivered to the White House in the fall of 2009. In March 
2010, a draft interim was released but not approved, subject to on-
going review by the administration. It has now been 6 years since the 
release of the interim draft, with stakeholder engagement just now 
starting. While 6 years is entirely too long for any type of response 
plan to sit on a shelf in the White House, it is especially dangerous 
in the case of cyber. In 2014, Congress passed a law to require this 
cyber incident response plan to be finalized. Clearly, this 
administration, by not finalizing this plan, does not take cyber 
incident response planning seriously. It begs the very obvious question 
``What if there is a significant cyber attack in the United States? 
Does every level of government know their role and how cyber response 
will be coordinated?'' We are neither too ignorant nor too proud to 
think that a major cyber incident is outside of the realm of 
possibility so I would like to take this moment to convey that we are 
watching the development of this document very closely.
    It is very apparent that we have a lot more work to do. Securing 
our States from cyber threats now includes entirely new roles and 
responsibilities that didn't exist 50 years ago. Discussing, examining, 
and encouraging the programs and partnerships that Americans rely on is 
absolutely crucial in guaranteeing the solvency of our ways of life. I 
look forward to hearing from the witnesses to learn what more can and 
should be done to advance the security of the American people.

    Mr. Donovan. The gentleman yields back.
    The Chair recognizes the gentleman from New Jersey, Mr. 
Payne.
    Mr. Payne. Mr. Chairman, I ask unanimous consent to submit 
the gentleman from Louisiana, the Ranking Member, Mr. 
Richmond's statement into the record.
    Mr. Donovan. Without objection, so ordered.
    [The statement of Ranking Member Richmond follows:]
             Statement of Ranking Member Cedric L. Richmond
                              May 24, 2016
    In developing policy and budgeting for cyber preparedness and 
response, it is crucial we know what needs protecting, how badly 
protection is needed, and what kinds of redundancies can be made 
available.
    For critical infrastructure entities, after knowing what machines 
are operating on a network, what applications they are running, and 
what privileges have been established, the posture of cybersecurity for 
each of these entities and systems networks is key.
    Also, for critical infrastructure enterprises and supply chains, 
the advent of, ``bring your own devices'', along with the growing 
sophistication of smart phones and tablets involved in day-to-day 
infrastructure operations, compounds cybersecurity efforts and 
increases our resiliency challenges.
    Knowing where to devote efforts to protect our information security 
in critical infrastructure organizations is a core choice, particularly 
in determining how much defense to commit to the perimeter, and how 
much to commit to internal threats.
    Consider the potential for adversaries to employ countermeasures . 
. . as defenses are installed on our systems, we must acknowledge that 
we are dealing with a thinking and competitive opponent in the cyber 
world . . . and that as we install measures to thwart hackers that very 
act tends to induce countermeasures from our foes, as hackers probe for 
ways around or through our new defenses.
    As new versions of cyber attacks emerge affecting critical 
infrastructure, it will be important to have the DHS Industrial Control 
Systems Computer Emergency Response Teams, or ICS-CERT, and the Joint 
Interagency Task Force consisting of the National Institute of 
Standards and Technology, or NIST, the Department of Defense, and the 
intelligence community, clearly delineate and prioritize their roles in 
protecting critical infrastructure, and to have that as well-defined as 
possible.
    A good place to start is to build a body of cyber knowledge on how 
various critical infrastructure cyber systems are likely to fail, which 
is a necessary prerequisite to preventing failure, and then share that 
information among all sectors.
    Most experts tell us this is a daunting proposition, in light of 
the fast pace and range of cyber threat vectors that present themselves 
daily, but we must try.
    In closing, any critical infrastructure sector that is prepared to 
share what went wrong and what could be done better next time, will 
create the most likely scenario to produce higher levels of 
cybersecurity and resiliency for future regional and National cyber 
emergency situations.

    Mr. Donovan. Other Members of the subcommittees are 
reminded that opening statements may be submitted for the 
record.
    [The statement of Ranking Member Thompson follows:]
             Statement of Ranking Member Bennie G. Thompson
                              May 24, 2016
    Over the past 15 years, the Nation has experienced man-made and 
natural disasters that caused damage beyond our expectations and 
overwhelmed the response capabilities of the impacted communities. 
After each disaster--from the 9/11 attacks and Hurricane Katrina to the 
Boston Marathon bombings and Hurricane Sandy--we take the lessons 
learned and adjust the response plans so that we are better prepared 
for the next version of the same event.
    Preparing to respond to those kinds of events has become almost 
routine. We assess terror threats and the potential for various natural 
disasters. We conduct vulnerability assessments of our communities, and 
we hone, train, and exercise our disaster response plans. The doctrine 
guiding how we prevent, protect against, mitigate, respond to, and 
recover from more conventional disasters is well-established and 
incorporates important lessons learned from past events.
    Unfortunately, National guidance of a similar caliber is lacking 
for a response to a cyber attack. When I am home in Mississippi, local 
emergency managers tell me that roles and responsibilities are not 
clearly defined for a cyber response and that the statutory authority 
for the Federal Government to render aid to affected States is murky at 
best.
    We need to do better. The frequency of cyber attacks is increasing 
and the attacks are becoming more sophisticated. I fear a cyber Katrina 
if we do not establish a ``whole community approach'' to prevent, 
respond to, and recover from cyber attacks soon, before hackers disable 
part of the electric grid, gain control of one of our transit systems, 
or infiltrate our water treatment facilities.
    Addressing the growing cyber threat and equipping emergency 
managers with the tools they need to effectively respond to disasters 
triggered by hackers will require at least 3 changes.
    First, we have to improve information sharing. Second, we have to 
improve communication among the emergency response community and non-
traditional response partners, including private-sector infrastructure 
owners and chief information officers. Third, we have to do a better 
job defining roles, responsibilities, and authorities related to a 
cyber response.
    Late last year, the House of Representatives took an important step 
advancing those objectives by passing H.R. 3878, the Strengthening 
Cybersecurity Information Sharing and Coordination in Our Ports Act.
    Introduced by Congresswoman Torres, H.R. 3878 would improve 
information sharing and cooperation in addressing cybersecurity risks 
at our Nation's ports by directing DHS to establish voluntary 
guidelines for reporting of cybersecurity risks, implement a maritime 
cybersecurity risk model, and make recommendations on enhancing the 
sharing of cyber information.
    The legislation also directs the Coast Guard to ensure area 
maritime security and facility security plans address cybersecurity 
risks. H.R. 3878, along with several other important pieces of 
cybersecurity legislation from this committee, has passed the House is 
currently pending in the Senate. I urge our Senate colleagues to act on 
these bills before the summer recess.
    In the mean time, I am eager to learn from our witnesses about 
existing challenges in developing response plans for cyber events and 
what the Federal Government can do to help.

    Mr. Donovan. We are pleased to have a distinguished panel 
before us today on this important topic. Mark Ghilarducci 
serves as the director of the California Governors Office of 
Emergency Services, a position he has held since July 1, 2013. 
As a member of the cabinet, Director Ghilarducci serves as the 
Governor's Homeland Security Adviser, and oversees State-wide 
public safety, emergency management, emergency communications, 
counterterrorism efforts, and a State threat assessment system. 
Mr. Ghilarducci previously served as the secretary of the 
California Emergency Management Agency. Welcome, sir.
    Lieutenant Colonel Daniel J. Cooney currently serves in the 
Office of Counterterrorism of the New York State Police. He 
serves as adviser to the director of the New York State Office 
of Homeland Security and oversees the staff of the New York 
State Intelligence Center, New York's fusion center. He has 
been a New York State police officer for 23 years, and has been 
awarded a master's degree in security studies from the Naval 
Postgraduate School. Welcome, Colonel.
    Brigadier General Steven J. Spano is president and chief 
information officer of the Center for Internet Security. Most 
recently, he served as the general manager for defense and 
national security for Amazon Web Services Worldwide Public 
Sector. Prior to Amazon Web Services, General Spano served over 
28 years in United States Air Force in a variety of leadership 
roles. He retired in 2011 from Air Force combat command where 
he served as the director of communications. Welcome, General, 
and thank you for your service to our country.
    Mr. Mark Raymond began serving as the chief information 
officer for the State of Connecticut Department of 
Administrative Services, Bureau of Enterprise Systems and 
Technology on June 2, 2011. He has over 2 decades of technology 
and business experience consulting in New York, Connecticut, 
and Massachusetts; that includes working in the areas of 
finance, payroll, human services, budgeting, procurement, human 
services revenue, and transportation. As a consultant, he has 
worked with Federal agencies, including the United States 
Treasury, Federal Highway Administration, National Highway 
Traffic Safety Administration, and the U.S. Department of 
Transportation. Welcome, sir.
    Mr. Robert Galvin serves as the chief technology officer 
for the Port Authority of New York and New Jersey, a position 
he has held since December 2013. In this capability, he 
provides oversight, direction, and management for all of the 
agency's technology, information systems, and technology 
service delivery. Prior to joining the Port Authority, Mr. 
Galvin served as the chief technology officer at the New York 
City School Construction Authority.
    The witnesses' full written statements will appear in the 
record. The Chair now recognizes Mr. Ghilarducci for 5 minutes.

 STATEMENT OF MARK GHILARDUCCI, DIRECTOR, EMERGENCY SERVICES, 
              OFFICE OF THE GOVERNOR OF CALIFORNIA

    Mr. Ghilarducci. Okay. Well, good morning, Chairman and 
distinguished Members of the subcommittee. Mark Ghilarducci, 
and I am the director of OES in California. I am here today on 
behalf of the National Emergency Management Association, which 
represents State emergency management directors of the 50 
States, territories in the District of Columbia.
    I appreciate the opportunity to come before you today to 
discuss concerns related to the consequences of a cyber attack 
and the role of emergency management community in responding to 
this unique and evolving threat. As our lives, our systems, our 
critical infrastructure, as well as our emergency management 
coordination and communication platforms become more and more 
integrated with and dependent upon the Internet of Things, so 
does the proliferation of threats and complexities from cyber 
attacks, and, of course, the need to continue to evolve 
capabilities and countermeasures.
    These emerging threats, ushered in by advancements in 
technology, are a challenge for emergency management at a time 
when the adversary is unpredictable, asymmetrical, and very 
active. The range of threat actors, the methods of attack, 
targeted systems, and victims are ever-expanding. Because 
information systems are now the backbone of critical 
infrastructure in the United States, we are at an age of 
transitioning into next generation public safety due to its 
significance to National and economic security.
    Of concern to the emergency management community is the 
threat and potential cascading impacts of a cyber attack to our 
critical infrastructure systems. Lifelines and assets, whether 
physical or virtual, by actors with malicious intent to exploit 
vulnerabilities, disrupt or destroy control systems, or 
incapacitate the delivery of essential services, all which 
places the security and safety of our communities, our 
citizens, and the economy at great jeopardy.
    Like the consequences of other asymmetrical terrorist 
threats, consequence management of cyber attacks is challenging 
due to its unpredictable and ubiquitous nature. It requires a 
considered and coordinated effort of collaborative planning, 
risk identification and management, communications, information 
sharing, interdiction, response and mitigation.
    As information technology becomes increasingly integrated 
with physical infrastructure operations, emergency management 
must plan and prepare for the increased risk for large-scale or 
high-impact events and that cascading impacts that could harm 
or disrupt services, or worse, cause fatalities or destruction 
in our communities. Widespread and long-term power outages, 
loss of water telecommunications systems, disruption of public 
health or public safety systems, destruction of control 
systems, interruption of food production and distribution, and/
or the movement of commodities or people are just a few 
potential consequences of a successful cyber attack on our 
critical infrastructure; all consequences emergency management 
must consider, plan, and prepare for.
    There is no doubt that the potential aftermath of a 
significant cyber attack resulting in physical consequences 
will challenge existing hierarchies, dependencies, reporting 
structures, and planning assumptions. Emergency managers will 
need to leverage all necessary local, State, and private-sector 
resources; implement redundant capabilities for continuity of 
operations, and possible continuity of Government; and will 
require Federal support for both technical and Stafford Act 
assistance. But it remains unclear today how the consequences 
of an attack will be defined and meet requirements for Stafford 
Act assistance.
    Another challenge facing State emergency management and 
homeland security organizations is the ability to effectively 
manage cyber risk as it is not possible to eliminate it. Like 
many other hazards, both natural and human-caused, State 
leaders must build cybersecurity systems, communication, and 
information capabilities, and procedures designed to not only 
preempt attacks through adequate cyber defense systems, but 
enable an organization to withstand attacks when they succeed, 
or, in other words, to build cyber resilience.
    A logical approach to cybersecurity preparedness and 
incident response begins at all levels of government and in 
partnership with the private sector. As the Federal Government 
continues to build its capabilities, policies, and strategies, 
it has left States to build cybersecurity capacities with 
limited resources, trained personnel, and guidance or a 
specific blueprint to follow, all while facing threat actors 
who are advanced, nimble, quick to adapt, and overcome defenses 
in intending to do harm to private citizens and government 
services.
    Dedicated cybersecurity grants for planning and operational 
capabilities, developing, training, and supporting the 
blueprint of a workforce of cyber warriors, as well as 
identified post-event, remediation funding streams that do not 
currently exist, but are absolutely necessary to ensure States 
are prepared to adequately build cyber capabilities and 
defenses, this needs to be a priority.
    For example, in California, one key cybersecurity 
capability we recently stood up is the California Cybersecurity 
Integration Center as a way to measure our whole-of-Government 
and public/private sector integration approach. The Cal-CSIC, 
as it is called, integrates critical cybersecurity functions 
directly impacting my ability to manage both the homeland 
security and emergency management portfolios in California.
    It is co-located with the California State Threat 
Assessment Center, our State's primary fusion center, which 
maximizes information sharing and allows for communications to 
be properly vetted and classified, ensuring conductivity and 
information sharing between the intelligence community, law 
enforcement, and California's other 5 regional fusion centers, 
and it expands upon our current capabilities focused 
specifically on protecting California.
    It resides within our homeland security division, aligned 
with DHS's organizational structure, and integrates both the 
academic and private sectors. It provides a State-wide nexus 
for cyber threat information sharing for the State of 
California, our critical infrastructure sector partners that 
provide essential services, our 
9-1-1 system, the intelligence community, and law enforcement.
    It promotes proactive situational awareness of the cyber 
threat, cyber hygiene, and best cybersecurity practices, and it 
augments the State Emergency Operation Center during 
activations for emergency incidents through systems analysis 
and resilient communication. Most importantly, it provides 
support to our State's emergency support Function 18, the 
component of the State emergency plan that focuses on the 
impacts and countermeasures related to a major cyber attack.
    A key element for success of this capability, but, 
nonetheless, a challenge we are working with, is establishing a 
blueprint for integrating desperate agency sector efforts and 
mission sets into a unified, coordinated, and streamlined 
operation that reflects the full intelligence cycle from 
collection analysis to dissemination that supports situational 
awareness and the complete emergency management cycle.
    The Cal-CSIC design forces collaboration between all of the 
major State agencies and sector representatives that have a 
role in cybersecurity through protocols and the integration of 
respective cybersecurity staff. This partnership forces down 
the silos and stovepipes and generates a level of collaboration 
on the cyber front not seen before in our State government, 
which helps to define the roles and responsibilities of each 
organization during cyber events at a State-wide significance.
    As well, through partnerships with the National 
Cybersecurity Communications Integration Center and a multi-
State information-sharing analysis center, the Cal-CSIC 
addresses prevention, protection, response, and recovery while 
providing detail on cyber threats and trends specifically to 
California. The Cal-CSIC can use this analysis to notify 
residents of current threats and how to prevent and mitigate 
those threats.
    The consolidation of National, State, and local cyber 
threat data will provide a more strategic picture benefiting 
prevention and response. To further our resiliency platform, we 
are also moving to implement the DHS and CCIC cyber hygiene 
campaign across California's State agencies and departments.
    In closing, collaboration, coordination, training, 
planning, clear protocols, real-time information sharing, and 
processing of indicators of attack are essential elements of a 
robust cybersecurity and emergency management posture for all 
governments. Linking up critical infrastructure assessors and 
analysis, and analysts with cybersecurity personnel and 
emergency planners also needs to be approached holistically and 
sustainably.
    At all levels, Government must be prepared to deal with an 
ever-changing and increasingly complex set of challenges that 
test our traditional approaches to emergency preparedness and 
response to disasters. Changing demographics, emerging 
technologies, and the interdependencies of our infrastructure 
and systems create vulnerabilities that defer from those of the 
past.
    The cyber threats facing our Nation are not subsiding, but, 
in fact, are evolving in such a way that these threats demand 
purposeful, proactive action, adequate funding support, and a 
more forward-thinking and collaborative approach at all 
government levels and critical infrastructure sectors. This has 
to be one team, one fight.
    Thank you.
    [The prepared statement of Mr. Ghilarducci follows:]
                 Prepared Statement of Mark Ghilarducci
                              May 24, 2016
                              introduction
    Thank you Mr. Chairman, Ranking Member, and distinguished Members 
of the committee. My name is Mark Ghilarducci, and I am the director of 
the Governor's Office of Emergency Services as well as the Homeland 
Security Advisor to Governor Jerry Brown for the State of California.
    I am here on behalf of the National Emergency Management 
Association (NEMA), which represents the emergency management directors 
of the 50 States, territories, and District of Columbia. NEMA's 
members, many of whom, like me, also serve as Homeland Security 
Advisors, are prepared to deal with an ever-changing and increasingly 
complex set of challenges that test traditional approaches to natural 
and man-made disasters. I appreciate the chance to come before you 
today to discuss the current concerns related to consequences of cyber 
attacks and the role of the emergency management community in 
responding to these unique events.
                           where are we now?
    We are witnessing a more diverse array of threats than at any other 
time in history. The skill, speed, and adaptability of these threats 
are challenging our defense in ways we have not seen before. The 
emerging threat landscape for the Nation is characterized both by 
standing threats, as well as dynamic and fluid ones ushered in by 
advancements in technology. As we witness our society make 
unprecedented advancements in innovation, we become more and more 
reliant on information technology and increasingly vulnerable to 
devices that are developed and distributed with minimal security 
requirements. The ranges of threat actors, methods of attack, targeted 
systems, and victims are also expanding.
    We are transitioning into Next Generation Public Safety, and 
information systems are now the backbone of National and economic 
security in the United States. Our success as a Nation depends upon 
critical infrastructure functioning reliably at all times. The threat 
to this infrastructure by those with malicious intent to exploit 
vulnerabilities, steal information and money, and disrupt, destroy, or 
threaten the delivery of essential services are unlike any other. 
Cybersecurity threats exploit the risks associated with the increased 
complexity and connectivity of these systems, which places our Nation's 
security, economy, and public safety at greater risk.
    This risk affects both the private and public sectors. We have seen 
``Ransomware'' in the public and private sector in California and 
across the United States designed to prevent public and private 
institutions from accessing their own data. Criminal tools and malware 
are increasingly being discovered on State and local government 
networks.
    As information technology becomes increasingly integrated with 
physical infrastructure operations, there is increased risk for wide-
scale or high-impact events that could cause harm or disrupt services 
upon which our economy and the daily lives of millions of Americans 
depend. Long-term power outages, loss of water, and disruption in the 
movement of goods, services, and people as a result of disrupted 
transportation systems are a few of the potential consequences of a 
successful cyber attack on our critical infrastructure.
    The aftermath of a cyber event with physical consequences will 
challenge existing hierarchies, reporting structures, and planning 
assumptions. In the event of an incident, most emergency managers will 
turn to the Robert T. Stafford Disaster Relief and Emergency Assistance 
Act (Pub. L. 92-288) for Federal assistance, but unless the 
consequences of a cyber attack have large-scale physical consequences, 
funds from the Stafford Act will be limited.
    Many of the fixes, whether administrative or legislatively 
initiated, throughout the last few years seem to only address the 
prevention and preparedness side of cybersecurity. While the pre-event 
aspects of cybersecurity maintain a high level of importance, so too 
will the post-event considerations especially when considering the 
potential disastrous physical consequences of a cyber attack.
 current challenges facing state emergency management/homeland security
    While cybersecurity and cyber response capabilities continually 
rate very low in FEMA's annual National Preparedness Report, 
identifying the capability gaps and needs is often a difficult task for 
State and local government and has limited measurable improvement 
toward the National Preparedness Goal.
   Cyber risk must be managed as it is not possible to 
        eliminate; the diverse possibilities of malicious actors 
        penetrating, intruding, and circumventing from the inside 
        continue to grow and will hold every internet communication 
        technology system at risk for years to come.
   The risk calculus employed by some State and local 
        organizations does not adequately address the top cyber threats 
        or systemic interdependencies across critical infrastructure 
        sectors.
   State leaders must accept the predictability of cyber 
        attacks, and build security systems and procedures that can not 
        only preempt attacks through cyber defense, but enable 
        organizations to withstand attacks when they succeed, or in 
        other words build cyber resilience.
   A coordinated approach to cybersecurity preparedness and 
        incident response is in its nascent stages, even at the Federal 
        level. As the Federal Government is still working to build 
        Federal institutions, policy, and strategy, it has left States 
        to build cybersecurity capacities with limited resources and 
        trained personnel, and a lack of guidance or successful 
        blueprint to follow--all while facing threat actors who are 
        advanced, nimble, quick to adapt and overcome defenses and who 
        intend to harm private citizens and Government services.
   A dedicated cybersecurity grant funding stream would also 
        ensure States were prepared to adequately build their cyber 
        capabilities and defenses. Currently there is no funding 
        dedicated specifically to this priority.
   States are still playing catch-up in developing a ``whole-
        of-Government,'' State-wide approach to cybersecurity.
     best practices at the state level/on-going efforts to improve 
                               resilience
    I am excited to discuss some California examples of best practices 
we are implementing to ensure the Golden State is safe and secure and 
cyber resilient.
   Cyber Hygiene Partnership with DHS's National Cybersecurity 
        Communications Integration Center (NCCIC).--We are moving to 
        embrace and implement the DHS's National Cybersecurity 
        Communications Integration Center's Cyber Hygiene campaign 
        across California State Agencies. Working with NCCIC staff, we 
        are working to push this program to all of California's State 
        executive agencies as a start. This program is voluntary, but 
        it will allow us to baseline State agencies' vulnerabilities 
        and provide an overall State profile for a majority of public-
        facing assets. This is a good metric for performance and will 
        help our team develop a long-term State strategy. To date, only 
        13 organizations across all of California are taking advantage 
        of this Federal program.
   Integrating and Automating Data Feeds.--One of the things we 
        are spearheading in California is a Cal OES-supported project 
        at our California fusion centers that supports automating cyber 
        threat intelligence, as we believe that is a fundamental facet 
        to cyber resilience on all levels of Government. We must get 
        past the manual human-to-human transactions that continue to 
        dominate State and local cyber information sharing and move 
        towards an automated cyber threat intelligence design, which we 
        believe should anchor States' resilience and inform cyber 
        response efforts. We are also working, in conjunction with DHS/
        NCCIC, on a program called Automated Indicator Sharing 
        Initiative, which shares observable cyber ``indicators'' to 
        also help bolster the State's defense through a machine 
        indicator exchange.
   California Cybersecurity Integration Center (Cal-CSIC).--We 
        recently stood up our California Cybersecurity Integration 
        Center (Cal-CSIC) (pronounced Cal-SICK) as a way to mature this 
        approach, but one of the biggest challenges we face is 
        establishing a blueprint for integrating disparate efforts and 
        mission sets into a unified, coordinated, and streamlined 
        operation that reflects the full intelligence cycle from 
        collection, analysis, to dissemination, and that supports a 
        robust cyber response.
    The Cal-CSIC does the following critical cybersecurity functions, 
directly impacting my ability to manage both the homeland security and 
emergency management portfolios in California:
   Expands upon current capabilities in our State's primary 
        fusion center to build out a cybersecurity center focused 
        specifically on protecting California.
   Resides within the Cal OES Homeland Security Division, 
        aligning with DHS's organizational structure.
   Its co-location with the California State Threat Assessment 
        Center (STAC) allows for communications to be properly vetted 
        and classified, ensuring connectivity between the intelligence 
        community, law enforcement, and fusion centers.
   Provides a State-wide nexus for cyber threat information 
        sharing for the State of California, intelligence community, 
        and law enforcement.
   Promotes situational awareness of cyber threats, cyber 
        hygiene, and best cybersecurity practices for all California 
        organizations.
   Augments the State Operations Center activities during 
        emergency incidents through media analysis and resilient 
        communications.
   Marries our critical infrastructure analysts and assessors 
        to our cybersecurity professionals to create a novel holistic 
        security assessments capability.
    The National Cybersecurity Communications Integration Center 
(NCICC) and Multi-State Information Sharing Analysis Center (MS-ISAC) 
operate as focal points for cyber and physical protection of Federal, 
State, local, Tribal, territorial government (FSLTT) and Critical 
Infrastructure/Key Resources (CI/KR) network, storage, and 
communications systems and seeks to address prevention, protection, 
response, and recovery.
    The Cal-CSIC will address prevention, protection, response, and 
recovery while providing detail on cyber threats and trends 
specifically to California. The Cal-CSIC can use this analysis to 
notify residents of current threats and how to prevent and mitigate 
those threats. The consolidation of National and State cyber threat 
data will provide a more strategic picture benefitting prevention and 
response. The NCCIC will also be a partner in the Cal-CSIC as will 
other Federal agencies to ensure for real-time collaboration and 
coordination that is needed.
    The Cal-CSIC design forces collaboration between all of the major 
State agencies that have a role in cybersecurity because those agencies 
have, or are going to, embed their cybersecurity staff there. This 
partnership will force down the siloes and stove pipes, and generate a 
level of collaboration on the cyber front not seen before in State 
government, which helps to define the roles and responsibilities of 
each agency during cyber events of State-wide significance.
   Governor's Cybersecurity Task Force.--This task force 
        facilitates cybersecurity outreach to private industry, 
        academic, law enforcement, and Government partners both inside 
        and outside of California. The Governor's Cybersecurity Task 
        Force is a public-private partnership that serves as the 
        advisory body to the Cal-CSIC to raise awareness of new threats 
        and mitigation techniques.
    Sometimes, simply assembling the right players to have the tough 
conversations is half the battle. In this case, educating cybersecurity 
professionals about emergency management, and vice versa, remains a 
significant challenge. This is why the State of California created the 
Governor's Cybersecurity Task Force to be wide-reaching, pairing up 
local emergency management experts with cybersecurity professionals to 
collaborate on the bigger strategic questions. It has made a tremendous 
impact, but more work needs to be done to align State and local defense 
with Federal efforts.
                     recommendations for the future
    As a Nation we must map out a comprehensive collaborative strategy 
that delivers timely, cost-effective, and actionable responses. This 
will strengthen our National security by better preparing us to respond 
to potential disruptions that would have cascading consequences on the 
country. Collaboration, employee cybersecurity training, enterprise 
defense-in-depth, and real-time information sharing and processing of 
indicators of attacks are essential elements of a robust cybersecurity 
posture for all governments. Marrying critical infrastructure assessors 
and analysts with cybersecurity personnel also will breed unique and 
nuanced synergies by approaching the problem holistically. This would 
include:
   Review current statutory authorities for emergency 
        management personnel and ensure resources can and will be 
        available to respond to a cyber attack.
   Encourage information sharing between intelligence and 
        operational officials to ensure stovepipes do not unnecessarily 
        hinder collaboration and integrated planning.
   Coordinate with State and local officials to ensure their 
        priorities are included in legislative reforms and changes 
        within the administration's cybersecurity policies.
   Avoid mandating State and local governments without also 
        providing Federal funding.
   Provide adequate and sustainable funding to ensure for the 
        development of robust cybersecurity interdiction, response and 
        preparedness/education systems at the State and local levels, 
        to better inform and empower communities, where the 
        consequences of cyber attacks are most impactful.
   Ensure that we communicate to American citizens our 
        commitment to protecting their privacy, when incorporating 
        emerging technology--specifically, the Internet of Things or 
        ``smart devices.''
    While these devices maximize efficiency and carry the allure of 
convenience, we must incorporate the benefits of innovative technology 
into State and local government with the utmost appreciation for their 
potential to threaten data privacy, data integrity, or continuation of 
services. This also opens vulnerabilities by allowing threat actors to 
not only steal data, but also, manipulate it. Threat actors almost 
certainly will adapt and introduce new tactics that will challenge our 
defenses so we must seize the opportunities to implant past 
intelligence from cybersecurity investigations back into the 
intelligence cycle for further analysis and dissemination.
                               conclusion
    At all levels, Government must be prepared to deal with an ever-
changing and increasingly complex set of challenges that test our 
traditional approaches to emergency preparedness and responses to 
disaster. Capability, experience, and flexibility are critical in 
dealing with emerging issues and the unknown. Changing demographics, 
emerging technologies, and the interdependencies of our infrastructure 
and systems create vulnerabilities that differ from those of the past. 
The cyber threats facing our Nation are evolving in such a way that 
demands purposeful action and a more forward-thinking approach in our 
National preparedness efforts.
    I appreciate the opportunity to testify before you today and stand 
ready to answer any questions the committee may have.

    Mr. Donovan. Thank you, Mr. Ghilarducci.
    The Chair now recognizes Lieutenant Colonel Cooney for 5 
minutes.

STATEMENT OF DANIEL J. COONEY, ASSISTANT DEPUTY SUPERINTENDENT, 
       OFFICE OF COUNTER TERRORISM, NEW YORK STATE POLICE

    Mr. Cooney. Good morning, Chairman Donovan, Ranking Member 
Payne, Chairman Ratcliffe, and Members of the subcommittees. 
Thank you for inviting me to testify today.
    My name is Dan Cooney. I am a lieutenant colonel with the 
New York State Police responsible for overseeing the New York 
State Intelligence Center or NYSIC, the State's designated 
fusion center, which is staffed by approximately 90 
individuals, drawn from nearly 20 law enforcement and homeland 
security agencies at the local, State, and Federal levels.
    Since we opened our doors in 2003 as one of the Nation's 
first fusion centers, NYSIC has maintained an all-crimes 
approach with the ultimate goal of preventing criminal and 
terrorist activity in our State, and supporting our partners' 
on-going law enforcement investigations.
    The New York State Police has long had a computer crimes 
unit. NYSIC incorporated cyber threat intelligence into its 
mission in 2014 by creating a cyber analysis unit when the 
NYSIC had just moved to co-locate with the Center for Internet 
Security and the Multi-state Information Sharing and Analysis 
Center.
    Our approach is based on partnerships, intelligence 
production, and outreach. To further our outreach, NYSIC 
spearheaded creation of the New York State cyber partners 
working group, which meets monthly and is comprised of State 
and Federal Government law enforcement, homeland security, and 
information technology personnel, and a National Guard.
    As the intelligence center, our role is to take the lead in 
developing cyber intelligence products for both the technical 
and nontechnical audiences, and we leverage the partnerships 
formed through this group to accomplish this mission.
    The NYSIC also relies on National cyber information-sharing 
networks. Routinely, we access the National Fusion Center 
Association's cyber intelligence network through which over 250 
Federal, State, and local law enforcement members act as a 
virtual fusion center, utilizing a cloud service provided by 
the homeland security information network to share cyber threat 
intelligence in real time at the ``For Official Use Only,'' or 
FOUO level.
    Within the State, our distribution lists are separated by 
sector and between technical and nontechnical audiences to 
ensure recipients receive exactly the information they need: 
Actionable intelligence for IT staff, so they can deploy 
appropriate prevention or mitigation controls; and more 
strategic information on trends in cyber actors' tactics, 
techniques, and procedures for executives and policy makers to 
better inform policy decisions and resource allocation.
    NYSIC's intelligence liaison officer network maintains 
points of contact in fire, EMS, and emergency management 
agencies in each county with whom we engage in 2-way threat 
information sharing. Additionally, nearly all of the 500-plus 
law enforcement agencies in New York State have a designated 
field intelligence officer that regularly communicates with the 
NYSIC. More technical products are shared directly with county 
chief information security officers.
    At both the fusion center and across State agencies, New 
York State is sharing more information more effectively than 
ever before. Despite a constantly changing environment, we have 
made excellent progress. But I want to highlight two specific 
areas for continued growth from the full statement I submitted 
on the record.
    First, the information-sharing lessons of the last 13 years 
in the counterterrorism space must be applied to cybersecurity 
today. At the State level, the fusion center is DHS's single 
point of contact for terrorism-related information, and we know 
from where within DHS this information is coming. This is not 
yet the case with cyber threat information, and more often than 
not, the fusion centers do not receive cybersecurity 
intelligence information in a timely manner. The more 
information that fusion centers receive, the more we can share 
with agencies and businesses within our State, allowing us to 
close the current intelligence gaps, and push information to 
smaller entities that direct Federal sharing currently does not 
reach.
    Second, we observe a large amount of cyber threat 
information is Classified. While fusion centers have the 
capability to receive Classified documents, we cannot share 
useful contents with many of our customers unless the 
classification is downgraded.
    On behalf of New York's fusion center and as part of the 
larger National network of fusion centers, thank you for this 
opportunity to speak before your subcommittees, and I welcome 
any questions.
    [The prepared statement of Mr. Cooney follows:]
                 Prepared Statement of Daniel J. Cooney
                              May 24, 2016
    Good morning Chairman Donovan, Ranking Member Payne, Chairman 
Ratcliffe, Ranking Member Richmond, and Members of the subcommittees: 
My name is Dan Cooney and I am an assistant deputy superintendent with 
the New York State Police, responsible for overseeing the New York 
State Intelligence Center, the State's designated fusion center. Thank 
you for inviting me to speak today about our cyber threat information 
and intelligence-sharing efforts.
    The New York State Intelligence Center, or ``NYSIC'', is managed by 
the New York State Police and staffed by approximately 90 people 
representing nearly 20 law enforcement, homeland security agencies at 
the local, State, and Federal levels. Since we opened our doors in 2003 
as one of the first fusion centers in the Nation we have maintained an 
``all-crimes'' approach, with the ultimate goal of preventing criminal 
and terrorist activity in our State and supporting our partners' on-
going law enforcement investigations. We are primarily responsible for 
supporting the 57 counties outside New York City, but we work closely 
with our New York City Police Department colleagues on New York City-
based issues.
    NYSIC incorporated cyber threat intelligence into its mission in 
2014 by creating a Cyber Analysis Unit. The catalyst was two-fold: We 
recognized the need to dedicate resources to the growing threat of 
cyber attacks, and we had just co-located with the Center for Internet 
Security and the Multi-State Information Sharing and Analysis Center 
(MS-ISAC), which the U.S. Department of Homeland Security has 
designated as the cybersecurity information sharing and analysis center 
for State, local, Tribal, and territorial governments. This provided a 
timely opportunity for us to learn best practices from top 
cybersecurity experts. Over time, we were able to staff the unit with 
an Investigator and 4 intelligence analysts who possess a mix of 
specialized technical knowledge or intelligence and analysis 
experience, a hiring model that has worked well. Our approach is based 
on partnerships, intelligence production, and outreach, and I will 
highlight a few examples of the benefits to the State's cybersecurity 
efforts.
             best practices in information-sharing efforts
    The New York State Police has long had a Computer Crimes Unit, and 
other agencies in New York have worked on cyber threats for some time. 
We have worked to bolster our relationships with other agencies, not 
only to learn from them, but to ensure proper information sharing, 
identify collaborative opportunities, and avoid duplication of effort. 
To that end, the NYSIC spearheaded the creation of the New York State 
Cyber Partners Working Group. This group of State and Federal 
Government agencies--including law enforcement, homeland security, 
information technology and the National Guard, to name a few--formally 
meets on a monthly basis to review cyber threat intelligence and 
discuss training, exercise and joint project opportunities. As the 
intelligence center, our role is to take the lead in developing cyber 
intelligence products for both technical and non-technical audiences, 
and we leverage the partnerships formed through this group to develop 
and share intelligence. The Cyber Partners Working Group also joins 
together for training and exercises. NYSIC, along with its working 
group partners, has participated in table-top and National-level full-
scale cyber-related exercises, as both observers and participants. 
Examples include GridEx III, Cyberstorm V, and New York agency-specific 
tabletops.
    Effective State and Federal collaboration is also vital to 
confronting these challenges. For example, recently NYSIC and its State 
and Federal partners collaborated on the production and dissemination 
of a joint cyber intelligence bulletin detailing the analyses of 
detected malware. During the analysis, which determined the malware was 
a well-documented downloader and credential stealing Trojan, an 
encrypted file was discovered. Encryption often prevents further 
investigation; however in this case the team obtained a tool from a 
partner agency that allowed us to decrypt the file. The file revealed 
specific and actionable data that could protect IT assets. The NYSIC 
published these findings as a joint cyber intelligence bulletin and 
received positive feedback from recipients.
    The NYSIC also relies on National cyber information-sharing 
networks. Routinely, we access the National Fusion Center Association's 
Cyber Intelligence Network (CIN), which is a relatively new network of 
fusion center cyber analysts, to ascertain whether the intelligence we 
are developing in New York may be part of a broader trend. The CIN is 
comprised of over 250 Federal, State, and local law enforcement members 
who focus on cyber crimes. These members come together and act as a 
Virtual Fusion Center utilizing a cloud service provided by the 
Homeland Security Information Network (HSIN) to share real-time cyber 
threat intelligence in support of an incident, event, or mission. This 
level of cyber threat information sharing was impossible only a few 
years ago, yet now is becoming routine.
    There are several instances in which the CIN collaborated during 
high-profile events to great effect. For example, the CIN launched the 
HSIN's secure, web-conferencing platform, called CINAWARE, in response 
to Distributed Denial of Service (DDoS) attacks launched by cyber 
hacktivists against several State and local government networks which 
included law enforcement and emergency medical service entities that 
were responding to an incident. The CIN immediately began sharing real-
time intelligence on the attacks with the relevant local agencies. The 
National Fusion Center Association reports that more than 350 
individuals from fusion centers and other Federal, State, and local 
agencies around the country participated in the CINAWARE room over a 
period of several weeks, with an average of 50 to 90 users in the room 
at any given time. The room was supported 24/7, which included 
overnight support from the MS-ISAC. During that period, more than 250 
queries were submitted and answered via the CINAWARWE room, enabling 
rapid sharing of information with decision makers. Leaders in State, 
local, and Federal agencies were consistently briefed on the 
information from the CINAWARE room.
    Since that event, the CINAWARE room on HSIN has been opened to 
support the response to the Vikingdom DDoS attacks against State and 
local networks across the country, the sharing of cyber-specific 
information related to the Paris Bombings, and to support the law 
enforcement and homeland security mission for Super Bowl 50. The CIN 
also facilitates daily sharing throughout the country of indicators of 
system-compromise identified in discrete geographic regions, issues and 
responds to Requests for Information, and acts as a team of subject-
matter experts to support local operations. All of this sharing occurs 
between fusion centers utilizing the Federal platform, HSIN, and occurs 
at the For Official Use Only (FOUO) level.
    Similarly, the NYSIC's co-location with the Center for Internet 
Security and the MS-ISAC allows our staff to walk downstairs and talk 
with their intelligence or operations analysts about Nation-wide 
reporting and how it may impact New York State. Any relevant, sharable 
information these networks provide NYSIC ultimately benefits our Cyber 
Partners Working Group and the State's broader cybersecurity prevention 
efforts.
    This intelligence is of limited use, however, if we cannot provide 
it to consumers and decision makers. Equally as important is 
communication with those outside of NYSIC. The NYSIC team is constantly 
meeting and briefing local governments and private critical 
infrastructure sectors on cybersecurity concerns. Participants leave 
with contact information needed to build distribution lists for 
intelligence products. Our distribution lists are separated by sector, 
and between technical and non-technical audiences, to ensure recipients 
receive exactly the information they need. We provide IT staff with 
actionable intelligence that can be cross-referenced with traffic on 
their networks, so they can deploy appropriate prevention or mitigation 
controls. Other partners, such as executives, appreciate more strategic 
information on trends in cyber actors' tactics, techniques, and 
procedures relevant to their sectors that can help inform better policy 
decisions. We listen to their feedback and tailor our intelligence 
products appropriately.
    The NYSIC Cyber Analysis Unit may receive or develop intelligence 
that is particularly relevant to the first responder community, or a 
subset thereof. For the Fire/EMS/Emergency Management agencies in New 
York, our team leverages NYSIC's Intelligence Liaison Officer (ILO) 
network--points of contact in each county from those 3 disciplines that 
participate in two-way sharing of threat information with our center. 
We educate them on cyber threat reporting and the types of technical 
and analytical support NYSIC can provide. For example, we crafted a 
cyber bulletin distributed specifically to 9-1-1 call centers with an 
``E-911'' capability based on our receipt of threat and vulnerability 
information relevant to technology that is employed.
    Information specific to law enforcement is pushed to agencies in 
the field using another outreach program called the Field Intelligence 
Officer (FIO) program. In support of this program, nearly all of the 
more than 500 law enforcement agencies in New York has a designated FIO 
that regularly communicates with the NYSIC to advance the homeland 
security and counter-terrorism mission. We utilize these members to 
share cyber information in their jurisdictions as well. More technical 
products, which may include vulnerability and consequence information, 
are shared directly with county Chief Information Security Officers 
(CISOs).
    New York State is currently working to expand its information 
sharing with the health care sector--both public- and privately-owned 
facilities. The NYSIC is finding that this sector is willing to partner 
with the State to discuss intelligence requirements, information 
sharing, training opportunities, and best practices in mitigating cyber 
threats.
      recommendations for continued growth in information sharing
    New York State has made significant strides in building its 
cybersecurity capabilities, both at the fusion center and across State 
agencies. We are sharing more information more effectively than ever 
before. Policies and best practices have been developed by consensus 
through multilateral and interagency policy bodies and professional 
associations. They are reinforced through daily engagements between 
Federal, State, local, and private-sector partners. Despite a 
constantly-changing environment we have made excellent progress.
    In order to build upon our successful efforts, we have identified 4 
areas for continued growth.
    First, information-sharing regarding cyber threats between the 
Federal Government and the States should be further streamlined. The 
information-sharing lessons of the last 13 years in the counter-
terrorism space must be applied in the cybersecurity today. In 2003, as 
the first New York State fusion center director, I remember working 
through information-sharing issues with DHS, FBI, and others. 
Ultimately, an agreed-upon vertical information-sharing pathway was 
developed between Federal partners and the fusion centers. At the State 
level, the fusion center is DHS's single point of contact for 
terrorism-related information, and we know from which subset of DHS to 
expect information. This is not yet the case with cyber threat 
information. There are many entities within DHS that gather, analyze, 
and disseminate various types of cyber threat intelligence, whether 
it's tactical indicators of compromise, strategic intelligence 
assessments, or organizing outreach campaigns with private-sector 
entities in our jurisdiction. Given this information--whether it is raw 
information or finished intelligence--does not come together in one 
place at the Federal level with a designated unit to ensure rapid 
communication with the fusion centers, more often than not the centers 
do not receive information in a timely manner. This problem is 
exacerbated by the fact that other Federal agencies also have a cyber 
mission, and many have not yet built relationships with the fusion 
centers like DHS or FBI have over the last 13 years. This includes 
sector-specific agencies like Energy, Treasury, and Health and Human 
Services that play an important role in protecting key sectors of the 
Nation's critical infrastructure and economy, and who conduct outreach 
and information dissemination campaigns with private-sector entities 
under their jurisdiction. Any steps that DHS can take to streamline the 
overall Federal cyber intelligence-sharing processes with the fusion 
centers will help States and our local partners better understand the 
current threat landscape and more efficiently align our own cyber 
information sharing with the private sector. Working together will 
better enable us to protect against and respond to inevitable cyber 
attacks. The more cyber threat intelligence that fusion centers 
receive, the more we can share with agencies and businesses in our 
jurisdictions. This will close intelligence gaps and help us 
communicate threats to smaller entities that Federal information-
sharing currently does not reach.
    Second, we must also continue to evaluate how we share Classified 
cyber-threat intelligence from the Federal Government to the fusion 
centers. There is no central Federal system that stores indicators of 
compromise against which fusion center cyber analysts can run 
comparisons and lookups. The National Network of Fusion Centers does 
not have a space on the National Cybersecurity and Communications 
Integration Center (NCCIC) floor, and therefore lacks access to that 
critical data source which is available to other Federal information-
sharing partners. The network has interactions at the DHS Office of 
Intelligence and Analysis' Cyber Intelligence and Analysis Division 
(CIAD), but that interaction primarily occurs at the FOUO level and 
involves information being shared up to the Federal level, but not 
necessarily back down. Additionally, we observe that a large amount of 
cyber threat information is Classified. While the NYSIC understands why 
that might be the case, the Federal community needs to continue to 
focus on creating Unclassified tear lines of actionable intelligence. 
The fusion centers may have the capability to receive Classified 
documents, but cannot share useful contents with many of its customers 
unless the classification is downgraded. We would be pleased to work 
with authors of Classified documents to develop Unclassified actionable 
information for our non-cleared partners. I believe there has been some 
effort to share more Unclassified indicators based on recent production 
efforts by one Federal agency, and I hope that effort continues across 
the Federal community.
    Third, we need to continue our efforts to share information with 
local and county governments and private sector. We need to make sure 
there is consistency, and not confusion, regarding ``who to call'' when 
a local government or private entity experiences a cyber incident. We 
successfully worked through similar issues in the counter-terrorism 
area and I believe collective development of clear guidance would 
better serve our customers.
    Finally, the parallels between counter-terrorism and cyber extend 
beyond information sharing. Adequate cyber preparedness requires wide-
spread implementation of best practices and mitigation efforts, which 
invariably can exceed the capacity of local and county governments 
facing a growing myriad of threats. In our ever-more connected world, 
your network is only as strong as its weakest interconnection, yet 
implementing strong cybersecurity solutions is often costly. As we 
continue the hard work of policy development and adoption of best 
practices, the need for Federal Government support of State and local 
cybersecurity preparedness should not be overlooked. Much the same way 
the DHS Homeland Security Grant Program provides essential Federal 
support for counter-terrorism initiatives, similar support for 
cybersecurity would further enhance the capacity of States, fusion 
centers, and local governments to prevent and respond to cyber 
incidents that threaten our Nation's critical infrastructure and 
economy.
    Thank you for this opportunity to speak before your subcommittees. 
On behalf of New York's fusion center, and as part of the larger 
National Network of Fusion Centers, I appreciate the invitation to 
participate in this discussion and I welcome any questions you may 
have.

    Mr. Donovan. Thank you, Lieutenant Colonel.
    The Chair now recognizes General Spano for 5 minutes.

 STATEMENT OF BRIGADIER GENERAL STEVEN SPANO, (RETIRED, USAF), 
  PRESIDENT AND CHIEF OPERATING OFFICER, CENTER FOR INTERNET 
                            SECURITY

    Mr. Spano. Mr. Chairman, Ranking Members, Members of the 
committee, I am Steve Spano, the president and chief operating 
officer for the Center for Internet Security, or CIS. I 
appreciate the opportunity to share our thoughts on the state 
of National cybersecurity, and offer a number of suggestions 
and address some of the challenges that lie ahead.
    I would like to talk a little bit about our organization, 
what we do, our primary ambition, and how that feeds into our 
assessment of the current state of cybersecurity in the area 
that we know best, which is State, local, Tribal, and 
territorial governments. Then I will talk a little bit about 
how we service and are enhancing that mission, working with our 
partners, like the fusion center, and State and local 
governments, and then offer some ideas moving forward 
strategically that perhaps this committee can begin to address 
as the challenges we face continue to grow.
    About CIS, it began in 2000 out of the passion and the 
belief that everybody deserves a secure on-line experience. The 
100-plus professionals work collaboratively to enhance the 
cybersecurity mission, readiness, and response, and we do that 
in 3 core areas: Beginning from the foundation, we believe that 
it is inherently practical and important to establish a secure 
framework to build your cyber strategy on and evolving to.
    We call that security framework the critical security 
controls, or the CIS controls. They are a set of prioritized 
actions that organizations of any size can take in a priority 
order to deal with the current threats that exist in today's 
environment. That security framework serves as a foundation for 
some of the products and services that we offer, one such being 
the security benchmarks, which are automated configurations 
that lock down devices, operating systems, and software. So 
these security benchmarks help execute and implement the CIS 
controls, along with many of the services and products that our 
partners out in industry also support and provide.
    The controls, the benchmarks, the products, and services 
are put into execution in our primary mission, and that is 
running the Multistate Information Sharing and Analysis Center, 
or the MS-ISAC. The ISAC was established in a partnership with 
DHS in 2010, and we began the journey of beginning to monitor 
all 56 SLTTs, where we are approximately more than two-thirds 
of the way through bringing the States and these local 
governments and Tribal networks onto our network.
    We currently have 41 that we actively monitor that we 
provide network intrusions, that we provide intelligence 
analysis to, that we provide forensics capability and response 
as part of a computer emergency response team. That mission 
continues to grow and strengthen.
    What I would like to talk about now is how that mission 
feeds our assessment of where we believe the current state of 
National cybersecurity is within the SLTTs. We inform it 
through the day-to-day mission and the operation over the last 
several years, our experience, and global situational awareness 
and engagement. We are also responsible for producing the 
National cybersecurity in this report to DHS, which every 2 
years is provided to Congress. We are working to finalize this 
year's report.
    The NCSR is a self-assessment by the States in 13 key 
categories, and we measure those categories in a number of ways 
through the self-assessment amongst these entities. We find 
that in each of the 13 categories, while year to year, there 
has been improvements among the States, there are still 
challenges that reside in all 13 categories to meet the self-
prescribed benchmarks metrics that they want to achieve.
    Progress is being made. I characterize in my written 
testimony that the current state within the SLTTs is improving, 
but there are still a number of challenges that are facing the 
States, to include under-resource budgets, a workforce that I 
would characterize as high-demand, low-density in its assets 
and that is insufficient to address on many of the challenges, 
and a number of other areas of dealing with basic hygiene in 
terms of executing some of their strategies. But progress is 
being made, and I would characterize it as improving.
    I look forward to the dialogue and the questions and to 
diving into some of the specific details on how we can improve 
moving forward in two key areas: One is establishing a basic 
hygiene campaign, whether that is a built upon the critical 
security controls or other frameworks; and the other areas I 
mentioned that I believe is a strategic challenge for us 
Nationally is how to inspire and generate a cybersecurity 
workforce that can grow and meet the challenges. Because as I 
mentioned, they are high-demand, low-density asset across, and 
the trends we are seeing within K through 12 and interest in 
STEM, colleges and universities are offering programs but it is 
insufficient to get to scale. We are seeing that just the basic 
capabilities to keep up with the growing threats and the 
expertise and the training of existing professionals is a 
challenge for a lot of the SLTTs.
    Thank you very much for the opportunity to address you. I 
look forward to your questions.
    [The prepared statement of Mr. Spano follows:]
                   Prepared Statement of Steven Spano
                              May 24, 2016
    Chairmen Donovan and Ratcliffe, Ranking Members Payne and Richmond, 
and Members of the committee, thank you for inviting me today to this 
hearing. My name is Steve Spano, and I serve as the president and chief 
operating officer of the Center for Internet Security--or ``CIS.'' I 
appreciate the opportunity today to share our thoughts on the current 
state of National cybersecurity, focusing in the area we know best: 
State, local, Tribal, and territorial (SLTT) government entities. As 
the Nation addresses the complicated issue of cybersecurity, your 
efforts to assess the current state of National cyber preparedness and 
response capabilities and determine how best to improve our National 
cybersecurity posture is noteworthy. I look forward to offering our 
ideas on how we can collectively build on the progress being made in 
this important area of critical National security.
    Established in 2000 as a not-for-profit organization, CIS's primary 
mission is to advance cybersecurity readiness and response. CIS was 
instrumental in establishing the first guidelines for systems hardening 
at a time when there was little on-line security leadership. In 2010, 
the U.S. Department of Homeland Security (DHS), under the National 
Protection and Programs Directorate (NPPD), partnered with CIS to host 
the Multi-State Information Sharing and Analysis Center, or MS-ISAC. 
Under a cooperative agreement with DHS, the MS-ISAC was established as 
a 24x7 cybersecurity operations center that provides real-time network 
monitoring, threat analysis, and early warning notifications to SLTTs. 
MS-ISAC also consolidates and shares threat intelligence information 
with the DHS National Cybersecurity and Communications Information 
Center (NCCIC), where we have 2 employees serving as liaisons for MS-
ISAC. In 2015, we became the home of the CIS Critical Security 
Controls, previously known as the SANS Top 20. With this expanded 
operational mission, CIS has evolved as a trusted resource to help 
public and private organizations start secure and stay secure.
    Today, CIS collaborates with the global security community to lead 
Government and private-sector entities to on-line security solutions 
and resources. While I will elaborate more fully below, the 100-plus 
professionals at CIS provide cyber expertise in three main program 
areas:
    1. As I just mentioned, the MS-ISAC operates a 24x7 Secure Ops 
        Center to support SLTTs.
    2. The CIS Critical Security Controls (CIS Controls), a consensus-
        driven, prioritized set of cyber best practices created to stop 
        today's most pervasive and dangerous cyber attacks. The CIS 
        Controls are referenced in several policy and security 
        frameworks such as the NIST 800.43; and
    3. The Security Benchmarks, a program that provides well-defined 
        configuration best practices to help organizations world-wide 
        assess and improve their cybersecurity. Over 100 consensus-
        based Security Benchmarks have been developed to date, and 
        Security Benchmarks members can access tools and automated 
        content for both traditional hardware and software as well as 
        cloud-based services.
    More information about CIS is included at Attachment A and 
incorporated herein by reference.
            the current state of cybersecurity preparedness
    CIS's assessment of the current state of cybersecurity preparedness 
and response capabilities is based on our collective daily experience 
with the MS-ISAC, represented by over 1,000 SLTT members (including all 
50 States), as well as our dealings with those using the CIS Security 
Benchmarks and the CIS Controls, all of which provide us unique and 
wide-ranging insight into the cybersecurity posture of those we serve.
    Today, thanks to Congressional and DHS support and SLTT 
participation, the MS-ISAC is actively monitoring the networks of 41 
States and territories. In 2016, our goal is to have all 50 States and 
all 6 territories being monitored by the MS-ISAC. Our members represent 
local governments, public universities, critical infrastructure 
entities, and public authorities that own and operate critical 
infrastructures. In 2015, our monitoring program analyzed over 3 
trillion records, which generated over 56,000 actionable alerts to our 
SLTT partners. In 2015, our CERT team managed 161 incidents for our 
partners, largely focused on computer forensics. Their efforts actively 
identify types of threats, origins of attack, and root causes of the 
attack. Our intelligence team has produced a large number of analytical 
reports that both DHS and the FBI have cited as key resources to help 
in their investigations and high-level threat detection. Our cyber 
support for SLTTs also includes a computer emergency response 
capability, and the issuance of real-time cyber alerts, advisories, and 
intelligence products.
    Based on this work, we can state that since 2004, when the MS-ISAC 
partnership with DHS began, we have seen progress in the state of 
cybersecurity of our SLTT partners that can be characterized as 
improving, with many positive trends. There are, however, significant 
challenges that we are collectively working to improve. These 
challenges include under-resourced cybersecurity budgets, poorly 
crafted and vulnerable software provided by vendors, misconfigured 
networks, and insufficient numbers of qualified professional staff.
    Our assessment of SLTT cybersecurity preparedness and response 
capability is supported in the findings of the DHS-funded Nation-wide 
Cyber Security Review (NCSR). This annual review, tasked to the MS-ISAC 
by DHS, is produced in conjunction with the National Association of 
Counties and the National Association of State Chief Information 
Officers, and is reported to Congress by DHS every 2 years. It is a 
voluntary, self-assessment survey designed to evaluate cybersecurity 
management within, and the cybersecurity posture of, SLTT governments. 
To gauge the Nation-wide level of cybersecurity readiness, the NCSR 
measures maturity of cybersecurity programs within the SLTT community 
by assessing how SLTTs are performing in 13 key cybersecurity areas. 
The 2013 and 2014 NCSRs found SLTT respondents continuing to improve 
towards the highest level of maturity, ``risk aware'', in all 13 of 
these measured functions, but they have not yet reached that maturity 
level in any of the 13 categories. Further support for our assessment 
is found in the DHS 2015 National Preparedness Report (the 
``Preparedness Report''), which acknowledges both that SLTTs place 
significant emphasis on the importance of cybersecurity, but have been 
challenged to find sufficient financial resources and staffing to meet 
growing cybersecurity demands.
    The MS-ISAC, the NCSR and the Preparedness Report all recognize 
that steady progress is being made in many areas of SLTT cybersecurity, 
in the face of cyber threats that continue to increase in scope, 
sophistication, and number, but that challenges remain for SLTTs to 
reach full cybersecurity preparedness. This reality will not change any 
time soon. The strategy and execution of defensive responses must 
evolve at a faster pace. This will require continued investment, strong 
leadership, and collaboration at all levels of government.
    Outside of the SLTT space, our experience with our Security 
Benchmarks customers and those using the CIS Controls also show 
increased efforts to improve organizations' cybersecurity posture. In 
the last 3 years, the number of organizations purchasing Security 
Benchmarks memberships has almost tripled, and the growth in the use of 
automated machine image versions of the Benchmarks has grown tenfold 
since they were first released a year ago. This shows us that there is 
increasing emphasis on ensuring that organizational networks and 
devices are securely configured.
    In October 2015, we released Version 6 of the CIS Controls. In the 
period of time since the release, the CIS Controls have been downloaded 
over 32,000 times. This data, coupled with on-going requests for 
information and assistance in learning more about the Controls, shows 
us that companies and organizations are seeking guidance in how to 
start secure and stay secure, and are looking for the roadmap to tell 
them how to get there.
       how cis is working to increase cybersecurity preparedness
    Since its inception, CIS's mission has been focused on increasing 
cybersecurity preparedness, both for SLTT governments through the MS-
ISAC and for the private sector as well with the CIS Controls and 
Security Benchmarks programs. I appreciate the opportunity to highlight 
our work in these 3 areas, and why we believe our work is making a 
difference.
MS-ISAC
    The on-going work of the MS-ISAC has and will continue to improve 
the cybersecurity posture of SLTT governments. Our continuous 
monitoring of SLTT networks across the country provides us with the 
ability to see and analyze the scope of potential malicious activity 
and identify when there are multiple incidents of the same nature and 
source. As noted above, in 2015 alone, MS-ISAC detected and analyzed 
malicious activity events that generated over 56,000 incident reports. 
We provide response assistance if needed, including CERT team 
assistance. Equally importantly, we provide timely issue alerts to all 
our SLTT members, which include steps to take to avoid or mitigate the 
risk of the identified malicious activity event. We also share SLTT 
event information with Federal agencies and other trusted partners 
through our liaisons on the NCCIC floor, so our work also informs the 
cybersecurity posture of the Federal Government and the Nation as a 
whole.
    In addition to our monitoring and response services, we produce a 
monthly situational awareness report that shares timely cybersecurity 
information with our over 1,000 members. We distribute weekly reports 
of cyber threat indicators and support an automated indicator sharing 
platform (STIX/TAXII). We hold monthly webcasts focusing on particular 
cybersecurity issues. We also offer group purchasing opportunities for 
cybersecurity training and products, with substantially discounted 
pricing for SLTTs, educational and not-for-profit entities. Since 
starting the purchasing alliance in 2012, we have been able to save 
SLTT governments almost $30 million in their purchase of essential 
cybersecurity training and products. Our work with the NCSR is 
providing SLTTs with a tool to monitor and track their progress, both 
internally and against other SLTT entities.
    More information on MS-ISAC services is included in Attachment B 
and incorporated herein; further information is available here: https:/
/msisac.cisecurity.- org/.
CIS Critical Security Controls
    CIS is the home of the Critical Security Controls, the set of 
internationally recognized prioritized actions that form the foundation 
of basic cyber hygiene, demonstrated to prevent 80-90% of all known 
pervasive and dangerous cyber attacks. The CIS Controls were initially 
created, and are regularly updated, by a global network of cyber 
experts based on actual attack data derived from a variety of public 
and private threat sources, so they are informed by both professional 
expertise and real-world threat information.
    The CIS Controls act as a blueprint for network operators to 
improve cybersecurity by suggesting specific actions to be done in a 
priority order. In this regard, we strongly believe that the CIS 
Controls can help all organizations, especially the small- and mid-
sized entities, many of which need help in identifying exactly what to 
do and when.
    The CIS Controls are recognized by a number of cybersecurity 
frameworks and reports as an effective and practical tool for improving 
an organization's cybersecurity preparedness. The CIS Controls are 
specifically called out in the NIST Cybersecurity Framework as one of a 
handful of cybersecurity tools that help organizations implement the 
Framework. Just recently, the California Attorney General released the 
California Data Breach Report (2016), which specifically points to the 
Controls as a tool that if followed, would meet the requirement of 
``reasonable security'' under California law. (The full report can be 
accessed here: https://oag.ca.gov/breachreport2016).
    Additionally, the Controls are included in the following 
foundational frameworks, reports, and documents:
   NIST Framework
   Symantec 2016 Internet Security Threat Report, https://
        www.symantec.com/content/dam/symantec/docs/reports/istr-21-
        2016-en.pdf, pages 75-77
   Verizon DBIR 2015, page 55
   Tripwire, ``The Executive's Guide to the Top 20 Critical 
        Security Controls,'' http://www.tripwire.com/state-of-security/
        featured/20-csc-list-post/
   Zurich Insurance/Atlantic Council ``Risk Nexus: Overcome by 
        Cyber risks? Economic Benefits and Costs of Alternate Cyber 
        Futures''--page 28
   NGA ``National Governors Association Call to Action on 
        Cybersecurity'', page 4
   UK CPNI (the British infrastructure protection directorate--
        entire web page references the Controls)
   Conference of State Bank Supervisors, ``Cybersecurity 101: A 
        Resource Guide for Bank Executives, pages 8, 12, 24, https://
        www.csbs.org/CyberSecurity/Documents/
        CSBS%20Cybersecurity%20101%20Resource%20Guide%20- FINAL.pdf
    We make the CIS Controls available for download at no cost to the 
general public, as well as free companion guides that provide more 
detailed information and support for the implementation of the CIS 
Controls. Find out more information about the Controls and download 
them for free at: https://www.cisecurity.org/critical-controls.cfm. 
Additional information about the CIS Controls is also included at 
Attachment C and incorporated herein by reference.
CIS Security Benchmarks
    CIS is also the world's largest producer of authoritative, 
community-supported, and automatable security configuration benchmarks 
and guidance. The CIS Security Benchmarks (also known as 
``configuration guides'' or ``security checklists'') provide highly 
technical, detailed security recommendations for specific components of 
information technology, such as operating systems and devices, and are 
vital for any credible security program. The Security Benchmarks are 
developed though a collaborative effort of public and private-sector 
security experts. CIS has developed over 100 consensus-based Security 
Benchmarks have been developed today and are available in PDF format 
free to the general public, or in an automated format through the 
purchase of a membership. We have also created a number of Amazon 
Machine Images (AMIs) for the most utilized Security Benchmarks, which 
are available for purchase in the AWS Marketplace and in Amazon 
GovCloud, and we are discussing similar arrangements with other cloud 
providers. CIS Security Benchmarks are used world-wide by organizations 
ranging from small, nonprofit businesses to Fortune 500 companies.
    The CIS Security Benchmarks are referenced in a number of 
recognized security standards and control frameworks, including:
   Payment Card Industry (PCI) Data Security Standard v3.1 
        (PCI) (April 2016)?
   NIST Guide for Security-Focused Configuration Management of 
        Information System;
   Federal Risk and Authorization Management Program (FedRAMP) 
        System Security Plan;
   DHS Continuous Diagnostic Mitigation Program; and
   CIS Critical Security Controls, Version 6
    More information about CIS Security Benchmarks is included at 
Attachment D and incorporated herein by reference.
                         what more can be done?
    The current cyber threat is clear, unmistakable, and unlikely to 
abate anytime soon. Fortunately, much is currently being done to 
improve cybersecurity--but more needs to be done. We would like to 
focus our comments on 2 areas that we believe are of significant 
importance to both SLTT and non-SLTT organizations: (1) Improving cyber 
hygiene; and (2) creating a comprehensive approach to both increasing 
and improving the cybersecurity workforce.
Improving Cyber Hygiene
    Probably the single most important effort that we can undertake to 
dramatically make our networks more secure is to adopt basic cyber 
hygiene. Like personal hygiene, it involves basic, regular routines and 
actions that are needed to maintain basic safety and security.
    Despite a growing understanding of the threats and vulnerabilities 
in the technical community, wide-spread adoption of safe cyber behavior 
in cyber space is the exception, not the norm. It is our experience 
that the vast majority of cyber incidents result from either the 
failure to patch known vulnerabilities in software and web applications 
or failure to adopt proper security configurations on network operating 
systems or devices.
    We believe that part of the difficulty in getting more traction for 
cyber hygiene is the existence of a plethora of defensive tools, 
security frameworks, and guidelines, combined with the complexity of 
our networks, which have simply overwhelmed and confused consumers, 
private-sector companies and governments. For example, while the NIST 
Framework lays out a process for beginning a dialogue on cybersecurity 
measures, it is by design not a framework listing prioritized actions 
based on effectiveness.
    As we have discussed above, we believe that the CIS Controls 
provide the specific, actionable controls in priority order that will 
thwart the most pervasive attacks. This is supported in a study by the 
Australian government Department of Defense, which revealed that 85% of 
known cybersecurity vulnerabilities can be mitigated by deploying the 
Top 5 CIS Controls. Whether by using the CIS Controls or some other 
framework, increased efforts by the Federal Government to promote a 
roadmap for basic cyber hygiene will yield proven results in mitigating 
the most prevalent and pervasive cyber attacks.
Creating a Comprehensive Approach to Improving Our Cybersecurity 
        Workforce
    One of the major reasons that organizations have struggled in 
achieving basic cyber hygiene is the lack of available and qualified 
cybersecurity professionals to undertake the necessary cyber protection 
actions, particularly on an on-going basis. There are simply too few 
qualified cyber professionals in the workforce. This is the result of 
several factors:
   too few students in the K-12 level of education are 
        interested in pursuing further education in computer science 
        and cybersecurity;
   too few universities and colleges are offering cybersecurity 
        degree or certificate programs that offer the practical 
        training needed to meet the qualifications of cybersecurity 
        professional roles;
   there is a need for more continuing cyber education of staff 
        in the current cybersecurity workforce to keep up with the 
        ever-changing technical landscape of cyber threats; and
   for SLTTs and smaller organizations, the ability to hire 
        from the limited existing cybersecurity workforce is hampered 
        by the inability to compete with private-sector salary levels.
    We believe that there are several areas in which the Federal 
Government can assist with increasing and improving the cybersecurity 
workforce:
    1.   Help to increase awareness and promote STEM education at the 
        K-12 level;
    2.   Because of our DHS support, CIS is able to recruit students 
        from the National Science Foundation's Scholarship for Services 
        Program (SFS) for certain MS-ISAC positions. This program has 
        been a great tool in helping us recruit and maintain entry-
        level cyber professionals. We would recommend considering 
        additional funding for the SFS program to open the program up 
        to more students. This would assist in growing the number of 
        students entering cybersecurity studies at the college level. 
        We would also suggest considering broadening the organizations 
        that qualify to hire SFS students to include non-governmental 
        critical infrastructure organizations and not-for-profits, all 
        of whom share the same challenges that Federal and SLTT 
        governments face in recruiting and retaining cyber talent.
    3. Providing more opportunities for cyber exercises and simulations 
        and expand participation by SLTT entities. In addition to 
        allowing SLTTs more opportunities to assess their cyber 
        readiness and response capabilities, these exercises and 
        simulations provide on-going training for the SLTT 
        cybersecurity workforce.
    The threat to our Nation is real and extends down to every 
individual. As such, improving our cybersecurity defense of this 
country demands the combined efforts of us all. We will continue our 
efforts at CIS to help SLTTs protect citizen data at every level of 
Government. We will also continue our excellent partnership with the 
Federal Government as we work to extend monitoring services to all 56 
States and territories as the foundation of best practice in 
cybersecurity information sharing.
    I want to thank the committee for the opportunity to participate in 
this important hearing, and look forward to addressing any questions 
you might have.
    Find out more information about CIS here: https://
www.cisecurity.org/.
Attachment A.--The Center for Internet Security
Attachment B.--MS-ISAC
Attachment C.--CIS Critical Security Controls
Attachment D.--CIS Security Benchmarks

    Mr. Donovan. Thank you, General Spano.
    The Chair now recognizes Mr. Raymond for 5 minutes.

STATEMENT OF MARK RAYMOND, VICE PRESIDENT, NATIONAL ASSOCIATION 
              OF STATE CHIEF INFORMATION OFFICERS

    Mr. Raymond. Thank you, Chairman Donovan, Chairman 
Ratcliffe, and Ranking Members Payne and Richmond for inviting 
me to testify for you today.
    My name is Mark Raymond, and I serve as the chief 
information officer for the State of Connecticut and the vice 
president of the National Association of State Chief 
Information Officers. NASCIO is a nonprofit association that 
represents State CIOs and IT executives and managers from 
States, territories, and the District of Columbia.
    Today, I would like to provide the committee with an 
overview of cybersecurity preparedness in the States, what 
States are doing to improve our resilience, and opportunities 
to enhance the security profile of our Nation.
    State CIOs are Executive branch officials who serve as 
business leaders, advisers of IT policy, and implementation at 
the State level. The most critical role for the CIO today 
includes the security of State networks, protection of State 
data, and helping formulate the response for cyber incident or 
disruption. These responsibilities are shared with the chief 
information security officer, or CISO, a position that exists 
among all 50 States and for whom are becoming increasingly 
standardized in their roles.
    State CIOs and CISOs operate in an increasingly challenging 
environment. In the 2014 Deloitte-NASCIO Cybersecurity Study, 
we found that the top barriers for States addressing 
cybersecurity were insufficient budgets, increased 
sophistication of threats, and the inadequate availability of 
security professionals.
    Regarding insufficient funding, the majority of the States 
spend in the range of 1 to 2 percent of their overall IT budget 
on cybersecurity. The Federal Government spends around 14 to 16 
percent. Combined with recent events, this disparity shows that 
there is no one correct amount or percentage. States must 
assess their cybersecurity risk and spend commensurate with 
that risk.
    The lack of qualified IT security professionals are also a 
challenge for States. People with IT security skills are the 
most difficult to recruit and retain for States, and the State 
government salary rates and pay structures are the biggest 
challenge in bringing on IT talent.
    Another obstacle for CIO and CISOs is the increasing 
sophistication of threats. The top 3 are malicious code, 
hacktivism, and zero-day attacks. State CIOs are playing 
defense, but we have been able to better prepare for known 
threats through information sharing.
    Despite these challenges, States are progressing towards a 
more secure cyber environment. NASCIO has long called for 
States to adopt a cybersecurity framework, and quickly endorsed 
the NIST framework upon its release. From 2015 data, we know 
that 80 percent of the States have adopted a cybersecurity 
framework based on National standards and guidelines.
    States are utilizing public and private resources to 
enhance their cybersecurity posture in both times of relative 
rest and in times of emergency. To better identify and detect 
cyber threats, States are increasingly sharing threat 
information through fusion centers and MS-ISAC. Eighty percent 
of States have established trusted partnerships for information 
sharing and response. Eighty percent of the States have also 
acquired and implemented continuous vulnerability monitoring 
capabilities to better identify and detect malicious cyber 
activity.
    Many States also participate in ALBERT, a joint program 
between MS-ISAC and DHS, which brings an EINSTEIN-based, cyber-
traffic monitoring system to the States. Knowing that the 
ability to identify and detect is our first line of defense, 
Connecticut is the first State to take advantage of DHS's 
threat intelligence offering provided by iSight partners.
    In the realm of response and recoveries, States are also 
showing maturity. In a disaster, State officials expect the 
State CIO to maintain reliable and secure infrastructure, 
coordinate with other State officials, and restore 
communications services. I am responsible for these duties in 
my State as outlined in our disaster response framework.
    Recognizing that States could face a catastrophic disaster 
that coincides with or is caused by a cyber event, NASCIO has 
called on States to develop a cyber disruption plan that 
contemplates massive disruptions to the business of State 
government. States like Michigan have taken the whole-community 
approach and have developed disruption plans that outline roles 
and responsibilities during a disaster.
    A key partner to the States has been DHS. States are heavy 
utilizers of DHS State and local cyber programs like ICS-CERT 
and FedVTE. Also Federal programs like CyberCorps helps shore 
the IT security workforce gap that all States are facing.
    Another way the Federal Government could aid in enhancing 
State's ability to identify, protect, detect, respond, and 
recover is by harmonizing Federal security requirements. CIOs 
must comply with IRS publication 1075, FBI-CJIS, HIPAA, FERPA, 
CMS's MARS-E, amongst others. Regulation harmonization could 
lessen the burden on States, enabling us to focus on providing 
security services rather than checking off boxes.
    Thank you for holding this important hearing and for the 
opportunity to testify today on this truly critical issue.
    [The prepared statement of Mr. Raymond follows:]
                   Prepared Statement of Mark Raymond
                              May 24, 2016
    Thank you Chairmen Ratcliffe and Donovan and Ranking Members Payne 
and Richmond for inviting me to testify before you today.
    My name is Mark Raymond and I serve as the chief information 
officer (CIO) for the State of Connecticut and also as the vice 
president of the National Association of State Chief Information 
Officers (NASCIO). At NASCIO, I also co-chair the cybersecurity 
committee. NASCIO is a nonprofit, 501(c)(3) association representing 
State chief information officers and information technology executives 
and managers from the States, territories, and the District of 
Columbia.
    Today, I would like to provide the committee an overview of the 
status of cybersecurity preparedness in the States, what States are 
doing to improve and enhance resilience to cyber attacks, and 
opportunities to enhance the security profile of our Nation.
    State chief information officers are State executive branch 
officials who serve as business leaders and advisors of information 
technology policy and implementation at the State level.--All States 
have a CIO and all CIOs serve within the executive branch of State 
government. The office of the State CIO takes many forms, some are 
cabinet officials and others are executive directors; regardless of the 
title, all State CIOs share a common function of setting and 
implementing a State's IT policy.
    State CIOs are also responsible for providing IT services to State 
executive branch agencies. This not only includes the more typical 
business of provisioning enterprise data or phone services but also 
securing the digital business of State government. The most critical 
role today for the CIO includes the security of State networks, 
protection of State data, and helping formulate the response for a 
cyber incident or disruption. These responsibilities are shared with 
the chief information security officer (CISO), a position that exists 
among all 50 States and duties for whom are becoming increasingly 
standardized.
    State CIOs and CISOs operate in an increasingly challenging 
environment.--In the 2014 Deloitte-NASCIO Cybersecurity Study, State 
governments at risk: Time to move forward, (2014 Deloitte-NASCIO Study) 
[http://www.nascio.org/Portals/0/Publications/Documents/Deloitte-
NASCIOCybersecurityStudy_2014.pdf], we studied the current 
cybersecurity environment in the States, common challenges, and 
barriers to a strong State cybersecurity posture. The 2014 Deloitte-
NASCIO Study showed that the top barriers to States addressing 
cybersecurity were insufficient budgets, increased sophistication of 
threats, and the inadequate availability of security professionals. 
These challenges remained the same in 2015.
    Insufficient budgets for cybersecurity have been cited as a top 
barrier since the inception of the Deloitte-NASCIO Cybersecurity Study 
in 2010. The majority of States spend in the range of 1-2 percent of 
their overall IT budget on cybersecurity. The Federal Government spends 
around 14-16 percent of their IT budget on cybersecurity. Combined with 
recent events, this disparity shows that there is no one correct amount 
or percentage; States must assess their cybersecurity risk and spend 
commensurate with that risk.
    Funding challenges also affect the ability of States to hire and 
retain skilled IT security personnel. NASCIO's State IT Workforce: 
Facing Reality with Innovation [http://www.nascio.org/Portals/0/
Publications/Documents/NASCIO_StateIT- WorkforceSurvey2015_WEB.pdf] 
survey shows that a shortage in the State IT workforce has been 
predicted for some time and States are finding that those with IT 
security skills are the most difficult to recruit and retain (67.3%) 
followed by application development, programming, and support (57.1%); 
and architecture (55.1%). Ninetey-two percent of respondents reported 
that salary rates and pay structures are a challenge in bringing on top 
IT talent. States are responding to the dearth of qualified IT security 
personnel by getting innovative.
    In Maine, State CIO Jim Smith confronted the reality that 24 
percent of his 480 State IT workers would be eligible to retire in the 
next 2 years thus highlighting the need to recruit and retain new IT 
talent. He has addressed 1 aspect of the workforce issue by updating 
the application process, moving it on-line, and making it mobile 
friendly. He has also created an IT intern program and over 70 percent 
of those interns have become full-time employees. High school students 
are also welcome to visit Maine's Office of Information Technology for 
its annual ``Technight,'' [http://www.maine.gov/oit/technight/
index.shtml] where students participate in a variety of tech-related 
activities, which introduces them to exciting IT careers.
    While insufficient budgets and workforce shortages continue to be 
obstacles for State CISOs, 3 out of 5 also reported that the increasing 
sophistication of threats was also a major barrier to addressing 
cybersecurity. In the 2014 Deloitte-NASCIO Study, CISOs reported their 
top 3 cyber concerns: Malicious code (74.5%), hacktivism (53.2 %), and 
zero-day attacks (42.6%). Malicious cyber activity happens daily in 
State government, but State CIOs have been able to better prepare for 
known threats through information sharing, a concept with which 
emergency managers are acutely aware.
    Despite these challenges, States are progressing toward a more 
secure cyber environment. NASCIO has long called for States to adopt a 
cybersecurity framework and quickly endorsed [http://nascio.org/
Newsroom/ArtMID/484/ArticleID/34/NASCIO-Supports-Adoption-of-the-NIST-
Cybersecurity-Framework] the National Institute of Science and 
Technology's (NIST) Framework for Improving Critical Infrastructure 
Cybersecurity (NIST Cybersecurity Framework) upon its release in 
February, 2014. In the 2014 Deloitte-NASCIO Study, we found that 88 
percent of States were reviewing or planning to leverage the NIST 
Cybersecurity Framework within the year. In the NASCIO, Grant Thornton, 
CompTIA 2015 State CIO Survey, The Value Equation: Agility in Sourcing, 
Software and Services, [http://www.nascio.org/Portals/0/Publications/
Documents/2015/NASCIO_- 2015_State_CIO_Survey.pdf] we found that 80 
percent of States had adopted a cybersecurity framework based on 
National standards and guidelines.
    States are adapting to shared cybersecurity challenges and 
utilizing public and private resources to enhance their cybersecurity 
posture both in times of relative rest and in times of emergency. The 
NIST Cybersecurity Framework identifies 5 basic functions: Identify, 
protect, detect, respond, and recover. States are making progress in 
each of these areas.
    To better identify and detect cyber threats to protect a wealth of 
State digital assets, States are increasingly sharing threat 
information through established forums like fusion centers and the 
Multi-State Information Sharing and Analysis Center (MS-ISAC). From the 
2015 State CIO Survey, we know that 80 percent of States have 
established trusted partnerships for information sharing and response. 
Additionally, 80 percent of States have also acquired and implemented 
continuous vulnerability monitoring capabilities in order to better 
identify and detect malicious cyber activity. Knowing that the ability 
to identify and detect are our first line of defense, NASCIO has called 
on States to invest in advanced cyber analytics as a part of the 
practice of business intelligence and recently published, Advanced 
Cyber Analytics: Risk Intelligence for State Government. [http://
www.nascio.org/Portals/0/Publications/Documents/2016/
NASCIO_AdvancedCyberAnalytics_FINAL_- 4.18.16.pdf] To that end, 
Connecticut is the first State to take advantage of DHS's threat 
intelligence offering provided via iSight Partners. Many States also 
participate in ALBERT, a joint program between MS-ISAC and DHS which 
brings an EINSTEIN-based, cyber-traffic monitoring system to the 
States.
    In my State, in addition to participating in the information 
sharing through MS-ISAC and utilizing ALBERT, Emergency Management 
Deputy Commissioner and State Homeland Security Advisor, William Shea, 
and I co-chair a cybersecurity task force whose membership includes a 
diverse mix of stakeholders including higher education, law 
enforcement, public utilities, private businesses, and others. We meet 
regularly to discuss the latest threat and vulnerability information 
because we know that information sharing is key to cultivating a 
culture of information security and is a best practice to which States 
should conform.
    In the realm of response and recovery, States are also showing 
maturity.--State CIOs are expected to play a role in helping State 
governments respond to and recover from natural and man-made disasters. 
According to the 2015 State CIO Survey, the top 3 functions for which 
State CIOs were responsible are maintaining a robust, reliable, and 
secure infrastructure; coordinating with other State officials; and 
restoring communications services.
    When riots broke out in and Baltimore, Maryland, Governor Larry 
Hogan declared a state of emergency. Maryland's CIO organization, led 
by Secretary of Information Technology David Garcia, assisted with the 
swift deployment of ``Maryland First Responders Interoperable Radio 
System Team (FIRST),'' the State-wide radio communications equipment 
for first responders and stood up a website, ``Maryland Unites'' to 
which State and local leaders could direct members of the affected 
community. They also worked with public and private partners to reverse 
engineer Anonymous' attack on State networks. Information sharing was 
also helpful; officials in Missouri shared their experience with 
Maryland as they had faced a similar crisis. In ways like these, State 
CIOs are showing maturity in response in both the cybersecurity and 
emergency management fronts and especially when those two worlds 
collide.
    Recognizing that States could face a catastrophic emergency event 
that coincides with or is caused by a cybersecurity event, NASCIO has 
called on States to develop a cyber disruption plan and recently 
released the ``Cyber Disruption Response Planning Guide.'' [http://
www.nascio.org/Portals/0/Publications/Documents/2016/
NASCIO_CyberDisruption_040616.pdf] A cybersecurity disruption is 
defined as: ``an event or effects from events that are likely to cause, 
or are causing, harm to critical functions and series across the public 
and private sectors by impairing the confidentiality, integrity, or 
availability, of electronic information, information systems, services, 
or networks that provide direct information technology services or 
enabling and support capabilities for other services; and/or threaten 
public safety, undermine public confidence, have a negative effect on 
the state economy, or diminish the security posture of the state.'' A 
cybersecurity disruption differs from a cybersecurity incident which is 
limited in scope and impact.
    Examples of a cybersecurity disruption include: A cyber attack on 
the power grid which leads to a loss of power for a significant 
population; a cyber attack on water treatment and delivery leading to a 
loss of water supply to a significant population; a cyber attack on 
network capabilities leading to loss of communications which then 
hampers, interrupts, or prevents the operation of government and 
requires implementation of a continuity of operations plan; or a 
hurricane, flood, or other natural disaster that impairs or destroys 
key infrastructure assets that then precipitates the loss of 
connectivity over the internet or internal network.
    With these scenarios in mind, States like Michigan, taking the 
``whole community'' approach, convened State and local government 
representatives and private-sector critical infrastructure owners and 
operators to develop the Michigan Cyber Disruption Response Strategy, 
initially completed in 2013. Michigan's Cyber Disruption Response 
Strategy [https://www.michigan.gov/documents/cybersecurity/
Michigan_Cyber_Disruption_Response_Strategy_1.0_438703_7.pdf] provides 
a common framework to encourage a State-wide effort among public and 
private partners to defend Michigan's critical networks. Specifically 
the plan prompts critical infrastructure owners and operators to 
address: Data backup, disaster recovery/business continuity, halt key 
processes, equipment shutdown, log file, communications, and how to 
activate the cyber disruption response plan.
    States like the Commonwealth of Massachusetts, New Hampshire, and 
Rhode Island have taken a regional approach to cyber disruption 
planning, an effort supported by FEMA's Regional Catastrophic 
Preparedness Grant Program and Urban Areas Security Initiative (UASI) 
funding. In 2012, as part of the New England Regional Catastrophic 
Preparedness Imitative (NERCPI), these 3 States along with the city of 
Boston and Providence completed regional cyber disruption planning and 
created a Cyber Disruption Response Annex which outlines how cyber 
responders will support industrial control system (ICS) structure in 
each jurisdiction, how critical cyber incident information will be 
shared, and how IT organizations can support public safety and each 
other. NERCPI also created cyber disruption teams in each State and the 
city of Boston; these teams are comprised of experts from IT, emergency 
management and public safety and are responsible for coordinating 
resources and information during catastrophic events.
    As these previous examples exhibit, protection from cybersecurity 
attacks requires a ``team'' or ``whole community'' approach and a key 
partner to the States has been the U.S. Department of Homeland Security 
(DHS). States are heavy utilizers of DHS's cybersecurity-focused State 
and local programs including: ICS-CERT, FedVTE (virtual training 
environment), and cybersecurity advisors (CSA). Also, Federal programs 
like ``CyberCorps: Scholarship for Service'' allow qualifying students 
to serve in an IT assurance role with a Federal, State, or local 
government after graduation; this helps shore the IT security workforce 
gap that all States are facing.
    The Federal Government, principally through DHS, has and hopefully 
will continue to provide support for successful cybersecurity programs. 
There is, however, another way the Federal Government could aid in 
enhancing States' ability to identify, protect, detect, respond, and 
recover--by harmonizing Federal security requirements.
    When States receive Federal funds, they are required to certify 
that certain security measures are in place; this is mandated by the 
Federal Information Security Management Act (FISMA). CIOs and CISOs 
must also comply with a variety of Federal regulations, typically 
promulgated in a silo-ed fashion. Some of the Federal regulations with 
which our community must comply include: IRS Publication 1075, FBI-
Criminal Justice Information Services (FBI-CJIS), the Health Insurance 
Portability and Accountability Act (HIPAA), social security 
administration security standards, Family Educational Rights and 
Privacy Act (FERPA), Office of Child Support Enforcement (OCSE) 
security requirements, the Center for Medicare and Medicaid Services' 
Minimum Acceptable Risk Standards for Exchanges (MARS-E), among others.
    The overarching goal of these regulations is data/information 
security. Knowing that the vast majority of States are utilizing 
National standards like those issued by NIST, the Federal Government 
could lessen the regulatory burden on States by harmonizing Federal 
requirements especially since most if not all of these regulations 
share a common security goal.
    Cybersecurity is an issue that will only become more complex as we 
enter an age where the Internet of Things will become more prominent 
and technology like unmanned aerial systems (UAS), body-worn cameras, 
and cloud adoption are a norm. New technologies will require State 
governments to constantly assess security vulnerabilities as citizens 
demand consumer-level technology services to be deployed on a whole-of-
Government or enterprise basis. Given this background, the Congress and 
Federal agencies should continue to partner with State CIOs and CISOs 
when reviewing or promulgating new data security laws or regulations to 
ensure that the goal of security is achieved without undue burden or 
redundancy.
    Thank you for opportunity to testify today on this critical issue.

    Mr. Donovan. Thank you, Mr. Raymond.
    The Chair now recognizes Mr. Galvin for 5 minutes.

  STATEMENT OF ROBERT GALVIN, CHIEF TECHNOLOGY OFFICER, PORT 
              AUTHORITY OF NEW YORK AND NEW JERSEY

    Mr. Galvin. Good morning, Chairman Ratcliffe, Chairman 
Donovan, Ranking Member Payne, and Members of the 
subcommittees. Thank you for this opportunity to discuss 
strategies for strengthening our Nation's cybersecurity.
    Since December 2013, it has been my privilege to serve the 
Port Authority of New York and New Jersey as its chief 
technology officer. The Port Authority builds, operates, and 
maintains infrastructure critical to New York and New Jersey 
transportation and regional trade. These facilities include 
America's busiest airport system, including JFK, LaGuardia, and 
Newark Liberty International Airports, the World Trade Center, 
the PATH rail transit system, 6 tunnels and bridges between New 
York and New Jersey, the Port Authority Bus Terminal, Hudson 
River ferries, and marine terminals.
    For more than 90 years, the Port Authority has worked to 
improve the quality of life for more than 18 million people who 
live, work, and visit New York and New Jersey metropolitan 
region.
    Safety is the No. 1 priority across all of the authority's 
locations. Technology touches virtually all of our operations 
so the secure and reliable functioning of our computing assets 
is vital to public safety.
    In our limited time, I would like to briefly discuss 3 
areas in which I believe the Federal Government can assist 
technology professionals in addressing cyber threats. These 
areas are communication, readiness, and public education. In 
the realm of communication, events like today's public hearing 
play a valuable role. Government and technology leaders need to 
work together to create safe forums to discuss prevention 
strategies and deconstruct cybersecurity incidents. Through the 
avenues of improved communication, best practices can be shared 
across many organizations to the benefit of the whole.
    Turning now to readiness. When I joined the Port Authority, 
the organization was in the planning stages of designing a 
comprehensive cybersecurity program. We adopted a framework, 
the NIST 800-53, which was developed by a joint task force of 
people from the National Institute of Standards and Technology, 
DOD, Department of Homeland Security, intelligence community, 
and Committee on National Security Systems. This was an 
invaluable tool saving us time and money as we put our 
cybersecurity program in place.
    I believe the Federal Government has a similar opportunity 
to assist organizations by coordinating regular drills, 
simulating large-scale cybersecurity events. Facilitating these 
exercises would allow those involved to understand whether they 
have the right procedures in place to respond effectively and 
to identify any deficiencies. At the Port Authority, our Office 
of Emergency Management conducts regular readiness drills 
simulating such things as active-shooter scenarios and aircraft 
emergencies. From these exercises, teams learn how to improve 
their response. Cybersecurity professionals can benefit from 
the same rigorous testing of our readiness.
    Like many organizations, the Port Authority invests 
resources to detect, prioritize, and examine suspicious 
activity on our computer networks. We also use strong, complex 
passwords across all mission-critical systems, restrict 
administrator access to only essential personnel, and staff a 
247 operations center to respond to alarms generated by our 
cybersecurity tools and alerts received from other agencies.
    But probably the single most important thing we do to 
improve our cybersecurity posture is to require all staff who 
access Port Authority computers to participate in mandatory 
cybersecurity training programs. Themes such as ``Think Before 
You Click on Email Links'' and ``Be Aware Before You Share on 
Social Media'' encourage people to contact our help desks and 
the operations center before they open questionable links and 
attachments.
    Education is essential. I believe the Federal Government 
can play a significant role in strengthening America's 
cybersecurity by sponsoring a National public education 
campaign to promote safe computing practices. In my experience, 
people are more likely to exercise good cyber hygiene if they 
understand the important role their individual actions play in 
keeping our computer network secure.
    In the physical world, we rely on the American public to 
see something and say something. We need to develop Nation-wide 
awareness and training programs to empower people to do the 
same in the realm of cybersecurity. I thank the committee and 
look forward to your questions.
    [The prepared statement of Mr. Galvin follows:]
                  Prepared Statement of Robert Galvin
                              May 24, 2016
                              about the pa
    The Port Authority of New York & New Jersey conceives, builds, 
operates, and maintains infrastructure critical to the New York/New 
Jersey region's trade and transportation network. These facilities 
include America's busiest airport system, including: John F. Kennedy 
International, LaGuardia, and Newark Liberty International airports, 
marine terminals and ports, the PATH rail transit system, 6 tunnels and 
bridges between New York and New Jersey, the Port Authority Bus 
Terminal in Manhattan, and the World Trade Center. For more than 90 
years, the Port Authority has worked to improve the quality of life for 
the more than 18 million people who live and work in New York and New 
Jersey metropolitan region.
I. It is important to keep the Authority up and running
    The Authority operates a diverse groups of facilities that can have 
both logistic and economic impacts that can reach across the globe if 
the facilities were to be shut down by a cyber attack. These facilities 
have implemented many different internet-based technologies to add 
efficiencies to how they operate. However, it is these technologies 
that make these facilities more vulnerable to cyber attacks.
II. The Authority relies of its supply chain to operate
    The Authority relies on its supply chain in 2 States (New York and 
New Jersey) in order to operate its facilities. Required resources are 
provided by multiple suppliers. If fuel cannot be provided, or if 
electricity is impacted in either State, the Authority cannot operate 
at full capacity. It is critical that these supply chains are resilient 
to cyber attacks and have resilient business continuity plans.
III. The Port Authority takes cybersecurity seriously and has an 
        evolving program
    The Port Authority takes cybersecurity very seriously. In 2012, the 
Authority conducted an audit of its cybersecurity posture, and as a 
result, immediately started to build a cybersecurity program. Working 
with a consultant to identify the requirements of our cybersecurity 
program, the authority decided to use the NIST SP 800-53 guidelines as 
a standard for organizing teams, and developing and implementing the 
program. Leveraging this existing standard created by a joint task 
force of NIST (National Institute of Standards and Technology), the 
Department of Defense, Department of Homeland Security, the 
intelligence community and the Committee on National Security systems 
saved The Port Authority time and effort we otherwise would have had to 
develop a framework implementing cybersecurity.
    The first step the Authority took to advance the cybersecurity 
program was to implement services from MS-ISAC (Multi-State Information 
Sharing and Analysis Center). MS-ISAC analyzes all the logs generated 
by our perimeter security tools and provides the authority visibility 
into potential indicators of compromise.
    The Authority built and staffs a 24x7 Cybersecurity Operations 
Center (CSOC) that responds to all of the alarms generated by our 
cybersecurity tools, and to alerts received from the agency partners 
and cybersecurity services.
    We created and manage a mandatory cybersecurity awareness and 
training program for all staff who access the authority's computing 
resources.
    Through this process, Port Authority developed and maintains strong 
partnerships with DHS, FBI, NYPD, NJSP, MS-ISAC (multi-State 
information sharing and analysis centers), US-CERT, and ICS-CERT. We 
continue to engage these agencies to perform vulnerability assessments 
and to assist with incident response. We also strengthened internal 
partnerships within the Port Authority between the Chief Security 
Office, Office of Emergency Management, Office of Inspector General and 
the Technology departments. Early on we recognized that no one team or 
group would have the total solution.
    From these efforts, the Port Authority has seen positive results, 
but much work remains to protect critical assets. The technology we put 
in place provides visibility into emerging threats and have shown 
results, such as the ability to detect and automatically block 90% of 
critical incidents. We continue to make improvements in our 
cybersecurity operations. Last year, we reduced our critical incident 
response time by one-third over the previous year.
    However, just as the technology sector continuously innovates, 
criminal organizations, nation-states, and hacktivists are also 
innovating their methods for exploiting vulnerabilities presented by 
new technologies, ``apps'', and new attack surfaces like the Internet 
of Things.
IV. The Port Authority's Biggest Cybersecurity Concerns
   Like many organizations, The Port Authority uses a large 
        number of ICS (Industrial Control Systems) to operate its 
        facilities, for example: tunnel ventilation systems, PATH Train 
        Control Systems and Airport Airfield Lighting Systems. Some of 
        these systems, if compromised, could cause loss of life. This 
        year, the Authority initiated a program to better understand 
        our vulnerabilities and properly patch and mitigate these 
        systems. But, it is an enormous task.
   In order to properly respond to a massive cyber attack or 
        the breach of a partner organization, the PA must be in 
        communication with partner organizations in real time and have 
        specific remediation actions or practices to follow. Today's 
        ISACs while useful, do not provide such real-time breach 
        notification. According to Verizon's 2015 Data Breach 
        Investigations Report, 75% of attacks spread from the first 
        victim to the second victim within 24 hours, and 40% spread 
        from the first victim to the second in 1 hour.
   In order to operate all these diverse facilities and 
        business functions, the Agency hires thousands of contractors. 
        These individuals have access to some of our most critical 
        systems. The Authority has recognized that insider threat is 
        potential attack vector.
   The Authority invests in resources and money to implement 
        cybersecurity tools. We have learned from telecommunications 
        carriers and cybersecurity service providers that it is 
        possible for aggressive nation-states to obtain these tools 
        through third parties and to reverse engineer them to determine 
        how these detection and prevention tools may be circumvented.
V. How can the Federal Government help?
   Education.--I think there is a clear role for the Federal 
        Government to play by launching a massive public education 
        campaign to practice ``Safe Computing''. The weakest link in 
        our cybersecurity chain is the end-user. Phishing scams, e-
        mails with links to malevolent sites are often the first step 
        toward a breach. Two-thirds of cybersecurity incidents that fit 
        a pattern of cyber-espionage feature phishing scams. (DBIR, 
        2015). Raising our internal education & awareness level was a 
        crucial step in improving the security posture at the Port 
        Authority. I think PSAs (public service announcements) to 
        inform the public about how technology works, responsible 
        measures such as good passwords, ``Think before your click'' 
        and other safe computing practices should be taught to the 
        American public, beginning in school.
   Communication.--Events such as today's, not built around an 
        incident or a breach, but a conversation between technology and 
        policy makers to reach understanding go a long way to help both 
        technologists and our Government make better decisions. 
        Government and technology leaders need to work together to 
        create safe forums to discuss prevention strategies and de-
        construct cybersecurity incidents. The Federal Government can 
        conduct in-depth reviews following an organizational breach, 
        similar to the investigations conducted following plane crashes 
        or what hospitals do after a medical mistake. These non-
        punitive approaches have been very successful improving airline 
        safety and in reducing medical mistakes in the hospitals and 
        emergency rooms--I would think it could have a significant 
        impact improving cybersecurity. The name of the breached 
        organization could be withheld, and the Federal Government can 
        inform agencies of findings and recommendations after 
        completing the review. Case studies provide more than technical 
        remediation requirements; they inform industry how to prevent 
        problems over the long term.
   Simulations.--The Federal Government can assist the PA and 
        related agencies by coordinating an exercise or drill 
        simulating a large-scale cybersecurity event. This drill would 
        allow the agencies to understand where our deficiencies lie, 
        and whether we have the right procedures and external 
        relationships in place to respond correctly. For example, the 
        operations of the Port Authority rely on several Federal 
        Agencies: The CBP (Customs & Border Protection), TSA, FAA. If 
        their systems were compromised, the impact on the Port 
        Authority would be substantial. if the TSA cannot perform pre-
        screening, we cannot board passengers, if the CBP cannot review 
        manifests, we cannot transport cargo, if the FAA air traffic 
        controllers are impacted, our regional airports can be shut 
        down. The operational stability of these Federal entities has a 
        direct impact on the Port Authority's ability to provide 
        services to the region. Post-drill, the Fed can assist the 
        agencies to ensure that their comprehensive cybersecurity 
        programs and resilient business continuity plans are complete 
        and coordinate with related agencies.
   Consider oversight of cybersecurity tool developers to 
        ensure their intellectual property is not compromised. The 
        Authority, like many public and private-sector organizations, 
        invests resources and money into their cybersecurity tools. If 
        aggressive nation-states obtained these same tools through 
        third parties and reverse-engineered them to determine how they 
        can be circumvented, the protection we seek from cybersecurity 
        tools would be lost. The tech industry and Federal Government 
        must work together to protect the intellectual capital that 
        represents the vanguard of our security apparatus for it to 
        operate effectively. The Federal Government may be able to 
        provide oversight of the developers of cybersecurity tools to 
        ensure that they are not sold to malicious third parties.
   Consider stopping the Federal Government's participation in 
        ``bug bounty'' programs which encourage grey hat hackers to 
        sell zero-day vulnerabilities to the highest bidder. The amount 
        governments are willing to pay for some vulnerabilities 
        inflates their value and creates a potentially lucrative 
        secondary market for trading vulnerabilities and may even 
        encourage programmers to `build in' vulnerabilities they can 
        later sell.
VI. Challenges related to planning for, and responding to, 
        cybersecurity
    The first challenge of planning for cybersecurity is the wide 
variety of threat scenarios an organization must plan for: Viruses, 
ransomware, hacktivists, nation-states, simple human error, Point-of-
Sale intrusion, payment card skimmers, web app attacks, denial-of-
service attacks, and cyber espionage.
    The second challenge is the size, configuration, and expanding 
nature of the attack surface: Internet presence (websites), internal 
network, desktops and servers, cloud-based software systems & file 
storage, public WiFi infrastructure, portable storage devices, VOIP 
systems, and the looming Internet of Things. This list includes the 
traditional boundary of the organization. However, we are seeing a 
common entry point into an organization being the subcontractors and 
consultants who bring equipment onsite or connect their organization's 
networks to provide services. The computing networks and infrastructure 
of suppliers who provide critical support services to an organization 
should be considered part of any organization's `attack surface' that 
could be exploited by a malevolent entity.
    Another challenge is the speed with which threats evolve and time 
required to detect a breach before damage can be done. This is often 
referred to the ``volume, velocity, and variation'' of malware. At a 
high level, there are approximately 5 malware events globally every 
second (170 million in 2015). Most of this is filtered out by an 
organization's firewalls and other cybersecurity technology, but half 
of all organizations discover malware during 35 or fewer days per year. 
This seems to align with `releases' of malware during specific periods, 
rather than all year long. As for variation, 70-90% of malware samples 
in 2015 were unique to the organizations in which they were found. This 
combination shows that adversaries are getting more sophisticated to 
overcome defenses and more targeted in their approaches.

    Mr. Donovan. Thank you, Mr. Galvin.
    I now recognize myself for 5 minutes for questions. Since 
each of us only has 5 minutes, I would like to give each of you 
an opportunity to answer. I think I would like to just ask the 
entire panel just one question and ask each of you to spend a 
minute on a response.
    States have constantly ranked their cyber capabilities the 
lowest among their core capabilities, and it makes sense that 
States would look towards the Federal Government for 
assistance. Each of you, in 1 minute, can you tell me--and some 
of you hit on it--declassification of information, training as 
we do it, active-shooter demonstrations we should do with cyber 
attacks. Could each of you just tell me what you think the No. 
1 priority of the Federal Government should be for each of the 
States to help them in securing their cyber terrorist 
capabilities?
    Mr. Ghilarducci. Mark Ghilarducci. Really, 2 areas: No. 1, 
information sharing is really critical here so that we are all 
on the same page with regards to the threat streams; and 
dedicated funding to implement that collective footprint or 
blueprint as we move forward working together to minimize the 
threat. There is no dedicated funding for cybersecurity. It 
needs to be raised on the priority scale.
    Mr. Donovan. Lieutenant Colonel.
    Mr. Cooney. In the post-9/11 environment, there was a 
tremendous amount of effort and time put together to create a 
structure and a network for counterterrorism, and that is, you 
know, the National network of fusion centers. I compare the 
cyber environment now to that environment then where, you know, 
we should leverage this structure that took so long to build, 
you know, to share this threat, this cyber threat information. 
I think, as I mentioned in my testimony, I think that is 
something that is there, we just need to take it a little 
further, and I think--if I had to name one thing, that would be 
my one topic.
    Mr. Donovan. Thank you, sir.
    General.
    Mr. Spano. Yeah, I would probably say the workforce is 
probably the biggest challenge and where the Federal Government 
can help. In that area, the States are really struggling, both 
to compete with industry, and so when they do hire cyber 
professionals, because, again, they are in such demand, it is 
hard to compete with industry who also is requiring and 
demanding and hiring of those cyber professionals.
    So looking at the catalyst of how to start in K through 12 
to get more interest in STEM, to look at the scholarship for 
service and how perhaps we can broaden that into other areas of 
not-for-profits and other businesses that surround critical 
security controls and critical infrastructures would be a clear 
role for the Federal Government to sort-of serve as a catalyst.
    I would say very closely to that would be tighten in the 
command and control in the apparatuses that link the State 
governments through the fusion centers, through the ISAC, to 
continue to strengthen the situational awareness that we 
present from the ISAC to DHS, which informs many National and 
international threats and actions and fusing that together and 
presenting it for National action. So they would be my 2 areas.
    Mr. Donovan. General, I suspect that one of your 
frustrations is that all of you train people who then 
eventually go onto industry.
    Mr. Spano. Yeah.
    Mr. Donovan. Yes. Mr. Raymond.
    Mr. Raymond. Thank you. Two areas: No. 1 is, I think, 
continuing to raise the recognition of cyber risks as equally 
as critical as physical infrastructure risk to our critical 
infrastructure. I think the second is to leverage--broader 
leveraging of funding that is available to the States for a 
variety of different directed programs; that if we could 
leverage that more broadly to address the cyber risk across the 
State, that would be tremendously beneficial to the States.
    Mr. Donovan. Thank you, sir.
    Mr. Galvin.
    Mr. Galvin. Chairman, thank you. So I outlined 3 in my 
opening remarks. If I had to narrow it down to--I could narrow 
it down to 2, which I think is in the area of readiness. I 
talked a little bit about coordinating cybersecurity simulation 
incidents. My intent there is really not so much to exercise 
the cybersecurity plans of each organization or agency, but to 
look at the coordination between agencies and organizations. 
For example, the Port Authority relies heavily on Customs and 
Border Protection and the FAA. But there is no one organization 
that is responsible for overseeing a coordinated response to a 
coordinated attack, which is a very high concern for me.
    The other I talked about is public education. So as a 
technology practitioner professional who has been working in 
the technical areas for 30 years, frankly, I don't know how 
most normal individuals who have training in other areas deal 
with the onslaught of technology that comes at them every day. 
We have all been trained as technology professionals in 
information access and security and control mechanisms and so 
on and so forth.
    Today, people buy WiFi devices, they come home, and they 
set them up. They buy televisions that interconnect with their 
WiFi networks and their cable systems. There are protections 
that you can use and leverage, but without some kind of a 
training plan, I don't know how people deal with it. I assume 
that what happens is most of them, if they don't have someone 
in their life that works in the technology sphere to come and 
help them set up, I think they take it out of the box, they 
plug it in, and if it works, they declare victory and they 
leave it until it breaks and they buy another one.
    So I think public education has a huge role in protecting 
individuals' information as well as the information at risk in 
organizations, because what we are seeing is social media being 
leveraged by people who are posing a threat in order to gain 
access to corporate and agency systems.
    Mr. Donovan. Thank you, sir. I thank you, all, for your 
testimony and sharing your expertise with us.
    The Chair now recognizes the gentleman from New Jersey, Mr. 
Payne, for questions.
    Mr. Payne. Thank you, Mr. Chairman.
    Just on Mr. Galvin's last question, I resemble some of 
those remarks. I was the relative back in the 1980s that hooked 
everyone's VCR up. So I went around to all my aunts and uncles 
and that was my job for a while, so I understand what you are 
saying in terms of that.
    I will stay with you, Mr. Galvin. You know, like 
California, we in New Jersey have established a State 
cybersecurity and communications integration cell with the goal 
of bringing together diverse stakeholders, promote State-wide 
awareness and local cyber threats and wide-spread adoption of 
cybersecurity best practices.
    In your opinion, is New Jersey cybersecurity cell carrying 
out its mission effectively? What is it doing well and what 
should it be doing better?
    Mr. Galvin. Great. Thank you.
    One thing I want to make clear is that, you know, the work 
of securing our information assets and ensuring the reliable 
function of our systems is performed by a, in my organization, 
a hardworking staff of technology and security professionals, 
and also in our partners' agencies. I am truly fortunate to 
work with such a talented and dedicated set of public servants. 
I assume that other members of the panel have a similar 
experience.
    This is a team effort. You know, we recognized early on 
putting our cybersecurity program together that there was no 
one group or individual that was going to have the total 
solution. So we have developed strong partnerships with New 
Jersey CISC, New York CIG, New Jersey State Police, NYPD, FBI, 
DHS, the MS-ISAC, US-CERT, and ICS-CERT, and we continue to 
engage with those agencies to perform vulnerability assessments 
and to assist with incident response.
    Likewise, we also, in this process of putting our 
cybersecurity program together, strengthen internal 
partnerships between the chief security office, which the Port 
Authority is responsible for the PAPD, the Office of Emergency 
Management, the Office of Inspector General, and the technology 
departments. So it's definitely a coordinated team approach 
that--I think you said it very well, Mr. Ghilarducci, that it 
is a team solution.
    Mr. Payne. So you feel that you are breaking through the 
silos of these different entities and working together to 
better assess these threats?
    Mr. Galvin. We do. We spent time--I assume this will 
probably be a question--breaking down the NIST 853 framework, 
and we did a RACI diagram--responsible, accountable, consulted, 
and informed--to identify who was in the lead for each of the 
different tasks. It was a very lengthy exercise, but it was 
extremely valuable to us in helping put our plan together.
    Mr. Payne. Thank you.
    Mr. Ghilarducci, every year the National Preparedness 
Report reveals that of the 32 core capabilities, States are 
least confident in cybersecurity. At the same time, States 
invest very little of their homeland security grant funds into 
improving that cybersecurity capability. Why do you think that 
is?
    Mr. Ghilarducci. Well, I think that part of it is because 
really the emphasis from DHS to States, to the State 
administrative agents or to the HSAs that are doing the 
investment justifications, are not necessarily clear.
    The whole concern about cyber, as has been stated here, 
really isn't fully yet understood. This is an evolving threat. 
It is getting more complex. It is getting worse as the days go 
on. I think that we, as DHS and the States, really we need to 
catch up with the fact that this threat is not going away.
    So once the DHS--and of course Congress--allocate funding 
specifically targeted towards the cyber threat, I think that 
then you will start to see States start to implement more of 
that capability.
    Now, I would say that just this year, I, as the SSA, went 
into our investment justification and broadened the investment 
justification to include cybersecurity and countering violent 
extremism to be able to push down to local grant recipients at 
other State agencies and local governments so that they could 
utilize what funds they do have and repurpose those funds. But, 
as you know, funds are pretty limited as they are, and it is 
hard to sort-of move one thing to start working on the other. 
So it is a constant prioritization and reprioritization issue.
    Mr. Payne. Thank you.
    Mr. Chair, I will yield back.
    Mr. Donovan. The gentleman yields.
    The Chair now recognizes the gentleman from Texas, Mr. 
Ratcliffe, for questions.
    Mr. Ratcliffe. Thank you, Mr. Chairman.
    Earlier, I guess the end of last year, we passed an 
information-sharing bill in this Congress aimed at improving 
our ability to timely share cyber threat indicators.
    I want to start with you, General Spano. How would you 
characterize the quality of the information flow that the MS-
ISAC has with the NCCIC?
    Mr. Spano. I would say that the quality, I believe, as 
representative and testified by FBI and other DHS of 
information that we provided from monitoring State networks, is 
very high quality, and it is fused. We have representatives 
from the MS-ISAC that sit on the NCCIC floor as liaison, so 
they are very integrated into that mission.
    Mr. Ratcliffe. So is that how you give feedback in terms of 
what information you are getting that is valuable?
    Mr. Spano. The feedback of what we provide comes from our 
analysis within the MS-ISAC from our monitoring mission. So, 
for instance, 2015, we analyzed 3 trillion records and provided 
56,000 alerts, sifting through all of those that were 
actionable for the States, but we also fed into the NCCIC for 
further analysis and fusing with other sources of intelligence.
    We have supported FBI investigations with some of our 
analysis of what we have seen at the State level. So the 
conduit and the function and the command and control has been 
working extremely well based upon the maturity of the ISAC 
mission and its capabilities year over year.
    Mr. Ratcliffe. Okay. So I am pleased to hear that the 
sharing is going extremely well.
    Can you offer, would you offer anything to improve the 
efficiency or effectiveness?
    Mr. Spano. Again, what we provide is, I think, moving up in 
its intelligence. The processes are lean and getting better as 
we continue to strengthen that relationship. The challenges, I 
think, are more downward into the State levels, as I talked 
about with respect to some of the resources.
    Mr. Ratcliffe. Yes. You talked about the workforce being a 
challenge.
    Mr. Spano. Right.
    Mr. Ratcliffe. I think you characterized it as high-demand, 
low-density.
    So what can DHS do to create a workforce that is well-
trained and fully-equipped to respond to cyber threats?
    Mr. Spano. I don't know that it is any one responsibility 
or one responsibility of any single agency. I believe it is a 
collaborative effort at all levels--public, private, 
facilitated, encouraged by DHS. They have a number of programs 
that the ISAC implements to try to encourage younger students. 
We do a poster contest, and the CIS offers some summer camps to 
try to encourage it. There is a scholarship for service under 
the National Science Foundation, which is really important. We 
believe that looking at that and examining whether we can 
continue to do that.
    It is not any silver bullet that is going to solve this 
problem. It is a generational problem where if the pipeline at 
the K through 12 is not satisfying the growing demand, you are 
sort-of always chasing. Looking at it from a comprehensive 
perspective of how to ignite that STEM capability at all levels 
and then balancing the differences between the public and 
private partnerships, I think will help create a stop-gap with 
programs that are specific to workforce exercises, joint 
exercises, to raise awareness.
    Mr. Ratcliffe. All right. Thank you.
    Let me turn to you, Mr. Raymond. Last month I held a field 
hearing in my district where I got perspectives from fire 
chiefs and local law enforcement officials on how they are 
responding to cyber incidents. I want your perspective from the 
State, the NASCIO perspective.
    What is the greatest limitation out there right now for 
States in terms of defending their cyber networks? I guess part 
2 of that is, are there shared best practices that NASCIO is 
using to coordinate between State CIOs and local first 
responders and law enforcement?
    Mr. Raymond. Thank you for that question.
    I would say that the biggest challenge is the velocity of 
the threat and the changing threat. So continued improvement on 
providing information and actionable information as efficiently 
as it can be provided almost to machine-to-machine level to 
allow us to react will continue to allow the States to be able 
to defend as best we can. It does help with the workforce issue 
in many ways where we can have our machines responding on our 
behalf.
    In terms of working out with the field, NASCIO has put out 
over 31 different publications that are responsible or 
intending to work with both the education aspects, so making 
sure that our leaders understand how important cyber, is all 
the way to practitioners. We have over a 100-page cyber guide 
and a set of information for State information security 
officers on best practices that we have assembled across the 
States to help them as they are new to these rules. We do have 
turnover, that they can pick it up quickly and understand the 
very diverse environment that we have across all States.
    Mr. Ratcliffe. Terrific. Thanks very much.
    I appreciate you all being here and your testimony.
    My time has expired, so I will yield back.
    Mr. Donovan. The gentleman yields back.
    The Chair now recognizes the gentleman from Rhode Island, 
Mr. Langevin.
    Mr. Langevin. Thank you, Mr. Chairman.
    I want to thank our panel here today. Your testimony was 
excellent, and I appreciate your work that you are doing in 
this field.
    Let me start, if I could, with Mr. Raymond and Mr. Galvin. 
Let's say that the State of Connecticut or the Port Authority 
has experienced what you, Mr. Raymond, in your testimony term a 
cyber disruption event. Whom do you call first?
    Mr. Raymond. For Connecticut, we actually have a cyber 
working group. So the homeland security adviser, Deputy 
Commissioner Bill Shea, and I work closely with this. Our first 
call is to the fusion center and then to MS-ISAC in terms of 
coordinating our events. We pull together a cyber response team 
that includes both homeland security and my office in terms of 
dealing with the response.
    Mr. Langevin. Okay.
    Mr. Galvin. For our organization, we have a cybersecurity 
operations center that would likely be the initial point of 
contact or the discovery point for a potential incident. We 
would assess as much as possible the depth of the breach before 
reaching out. But we would certainly contact MS-ISAC. Usually 
they find out the same time we do. If we identify that the 
breach involves personally identifiable information or 
something of that sort, we would initiate a call to the FBI.
    Mr. Langevin. Okay. Thank you.
    As a follow-up, Colonel Cooney and Mr. Ghilarducci, as 
individuals with emergency management roles, whom do you 
recommend New Yorkers or Californians call in the event of a 
disruption event?
    Mr. Cooney. For us it depends on the nature, but, of 
course, I would say the NCCIC, the fusion center being 
collocated with the MS-ISAC, and then we would take it from 
there depending on the nature of it.
    Mr. Ghilarducci. As well, it depends on the nature. With 
this new integration center we built, this will be the central 
point where all information and reporting will flow into. If 
there is a criminal predicate associated with the intrusion, 
our State police that has a cyber crime investigation unit will 
sort-of take the lead and be supported by the rest of the 
entities that have come together in a collaborative way.
    But that is the process. Because the center also includes 
connections with DHS and FBI, they are right there with us, and 
then we can move on as rapidly as possible.
    Mr. Langevin. Do you all feel comfortable with knowing who 
in particular who to call at the Federal level and who would 
respond to you in the event of a cyber disruption event? I have 
found that that is something that is unclear to many, whether 
it is big businesses or even Government agencies. Are you all 
clear on that, and who would you call?
    Mr. Ghilarducci. Well, this is a question, I mean, we 
typically would turn to the FBI, DHS as information sharing. 
But the FBI would be working with us on the actual analysis of 
the intrusion. But the Secret Service also plays a role in it. 
So there is a little bit of a conflict there. But, typically, 
our next step is to go to the FBI.
    Mr. Langevin. Okay.
    Mr. Galvin. I think your point is well taken, though, that 
in the private sector I think there is less awareness of who to 
call. You have got a panel of people who work in Government and 
who spend time putting together cybersecurity program, so we 
more than anybody are going to know the right individuals to 
call.
    But I think you are correct that depending on the nature of 
the entity, particularly a privately-held organization, I am 
not sure they would know who to reach out to.
    Mr. Langevin. I think that is why we have to work at the 
Federal level here to help get the word out more. One of the 
first places to go, in addition to FBI, would also be the NCCIC 
or US-CERT to request Federal assistance.
    But, Mr. Raymond, if I could, in your testimony you mention 
that NASCIO recommends that the States have a cyber disruption 
response plan. I know you highlighted New Hampshire, 
Massachusetts, and my home State of Rhode Island. I know what 
we have been doing in Rhode Island, that our cyber disruption 
team that we have created has visited all the stakeholders at 
the table, emergency management people, State police. We have 
our colleges and universities, as well as the private sector at 
the table. It has really proven to be very effective at 
bringing the stakeholders to the table to plan for a response 
to a cyber disruption event.
    Is there a way for the Federal Government that we can 
encourage this type of approach?
    Mr. Raymond. I believe as it related to education and 
continuing to hold exercises, continuing to participate through 
homeland security and having the States describe their 
disruption plans, I think all of those encouragement points are 
very helpful in organizing States' response to incidents like 
that.
    Participation. NGA is holding a cyber policy academy for 
several States. Connecticut is one of those participating. That 
helps brings best practices across the States. I know that DHS 
is a good partner in that exercise as well.
    Mr. Langevin. Thank you all.
    I yield back.
    Mr. Donovan. The gentleman yields back.
    The Chair now recognize the Vice Chairman of the 
Subcommittee on Emergency Preparedness, Response, and 
Communications, the gentleman from North Carolina, Mr. Walker.
    Mr. Walker. Thank you, Mr. Chairman.
    Thank you, panel, for being here and the professional 
testimony. Very detailed, very important to us.
    Mr. Raymond, I have a question here. Two-part question, so 
I may break it up. How can the roles of information-sharing 
organizations such as MS-ISAC and ISAC be more strongly defined 
and effectively implemented?
    Mr. Raymond. I know that we actively work with MS-ISAC, and 
we find that it is fairly defined. I am not sure I understand 
how more strongly----
    Mr. Walker. Let me add a little more description. Should 
their responsibilities be strengthened to increase information-
sharing efficiency? Is that fair?
    Mr. Raymond. Yes. I believe the velocity of information 
sharing specifically across all players can be improved.
    Mr. Walker. Okay.
    General Spano, what efforts does the MS-ISAC take to gauge 
customer satisfaction with the States that they are engaging 
with?
    Mr. Spano. Sure. So we have an executive committee that is 
comprised of several of the representatives from the CISO's 
office and the security professionals. We have monthly calls 
with all the members. We have over a thousand members, although 
the 56 are the ones that we actively are pursuing monitoring 
with. We have an annual conference that they attend. We provide 
newsletters, efforts, the NCSR we manage on behalf of DHS to 
get their self-assessments to work. So it is a very strong and 
growing collaborative environment.
    Mr. Walker. In your testimony, I believe you described the 
value add of a State being a member of the MS-ISAC?
    Mr. Spano. Correct.
    Mr. Walker. What additional services or capabilities do you 
see the MS-ISAC being able to provide taking up the next 5 to 
10 years?
    Mr. Spano. The next 5 to 10 years, I believe that as we 
help solidify the basic hygiene of the security framework, such 
as the controls, as the foundations at the State level, and 
begin to help them evolve from the basics of just trying to 
keep their systems patched and configured correctly, I think 
the whole state or posture of cybersecurity will eventually 
begin to increase at a much more rapid pace. That is one 
specific area.
    As technology evolves to the Internet of Things and into 
the cloud environment, there may be a different dimension to 
cybersecurity that has not yet fully matured or evolved or is 
understood.
    Mr. Walker. Sure.
    Mr. Spano. So we have started to move out by offering those 
hardened images within Amazon Web Services, and we are talking 
to the other cloud providers like Microsoft to be able to 
provide the same type of hardened machine images in their cloud 
so that as the States begin to move toward cloud they can do it 
much more securely than they are now, because there are 
tremendous advantages and cost savings that could help fuel 
resources to help in the cybersecurity area.
    Mr. Walker. My next question was, what kind of steps do you 
see there to effectively get us there? But I think you just 
touched on some of that.
    Let me take, if I could, please, going back to Mr. Raymond, 
what do you currently see as the greatest limitation of the 
States' ability to defend just against the general cyber 
attacks? Can you speak to that for a second, talk about the 
problems there?
    Mr. Raymond. Different States are organized very 
differently. We a critical infrastructure provider from State 
data centers to State networks. I think if we look at sort-of 
the complexity of the business that we serve, from schools, 
libraries, in some instances hospitals, so the diversity of the 
population that we serve and that sort of discreet nature of 
how funding comes in, doesn't allow us to leverage things as 
broadly as we would like. So I would say that that is one of 
the primary challenges.
    Mr. Walker. Can I open that up to anybody else on the 
panel? I have got 57 seconds left. Anybody else want to touch 
on the States, sort-of the obstacles there?
    Mr. Spano. I think one of the bigger challenges that they 
have that makes implementing cybersecurity tougher is a more 
strategic problem in how software and applications are 
developed. So many of the software products are coming out of 
the box with inherent vulnerabilities, and I think they are 
poorly crafted and require a lot of lift to continue to sustain 
it.
    That is not going to be solved in any sweeping legislation, 
but it has to be addressed, because the competitive nature of 
providing software and services and applications to get the 
speed and agility that you need to compete means you are 
getting beta versions and you are a little bit sloppier in the 
production. The applications that you are building, even 
internally, to do specific things are oftentimes poorly crafted 
and have security vulnerabilities that tax your cyber 
professionals.
    Mr. Walker. My time has expired.
    Mr. Ghilarducci, you looked like you were in agreement 
there. Did you need to add anything to that?
    Mr. Ghilarducci. I would just say that cyber, what I call 
low-hanging fruit, just cyber hygiene training across the board 
can go a long way in making sure that State employees and State 
networks are as robust against attacks. That is one of the 
things that there is really not a lot of consistent and 
standardized training that is really made available, and I 
think that more of that would help a great deal.
    Mr. Walker. Thank you, Mr. Chairman.
    Mr. Donovan. The gentleman's time has expired.
    The Chair now recognizes the gentlewoman from New Jersey, 
Mrs. Watson Coleman.
    Mrs. Watson Coleman. Thank you, Mr. Chairman.
    Good morning, gentlemen. Thank you for your testimony.
    Mr. Galvin, frequently the first person to decide what to 
do in response to a cyber incident is not the CEO or even 
senior leadership, it is the operational personnel level and 
often physical security professionals who are vastly more 
comfortable protecting against physical threats than threats to 
a network.
    My question is: What are the most important relationships 
emergency responders should maintain with private-sector 
employees at all organizational levels?
    Mr. Galvin. It is a very good question, Congresswoman. 
Thank you for it.
    I think your observation is entirely accurate, that the 
person who is sitting at the facility overseeing operations is 
the person who is going to see the symptoms or the effects of a 
cyber attack first and foremost. I think there are several 
important relationships. One, within any organization, there 
has to be training to make sure that the person who is 
operating the facility is aware of what they should do in order 
to pick up the phone and contact, in our case our help desk or 
our CSOC, cyber security operations center.
    Then from there it goes from a technical professional who 
is going to field the call and take a look at the nature of the 
threat and make a determination as to whether this is an 
opportunistic thing that is just a latent incident that has 
been there active for a while versus something that is 
emergent. Then that person escalates it internally in our 
organization, and I would suspect that a lot of organizations 
are similar. There is a kind of a tiered operation that goes 
on. It goes to a second- or a third-level person in order to 
investigate and follow up further on.
    So I think the relationships are first and foremost between 
the operations personnel and the technical personnel, and then 
second is the escalation in the partnerships that happen within 
an organization as well as awareness as to where to escalate it 
further if the threat cannot be contained.
    Mrs. Watson Coleman. Thank you. This is a question I would 
like to start with you, Mr. Galvin, and then kind-of move on 
down as quickly as we possibly can. This has to do with sort-of 
just imagine a cyber Katrina.
    So our question is, I mean, if we fail to develop, 
implement, and train on doctrine to respond to a cyber event 
with physical or collateral consequences because it is 
something we have not seen before, then we will be inventing 
the wheel as we try to drive the car when we have these 
attacks. So my question is: From your perspective, what is the 
most important action the Federal Government can take to ensure 
that the communities can effectively respond to a cyber event 
of this nature?
    Mr. Galvin. Again, I think it relates to the readiness and 
the preparedness. We haven't really talked about this yet, but 
one of the things that keeps me awake at night, and I am sure 
it keeps a lot of CIOs awake, is industrial control systems or 
operational technology.
    So we have talked a little bit about IT systems and the 
fact that there is patching required. We are used to that as 
technology professionals--oh, there is a fix that came out. You 
know, Microsoft has patch Tuesday, and it has turned into cyber 
threat Wednesday, right? Because they release the 
vulnerability, people know about it, and they try to leverage 
it.
    But there is no analog to the operational technology world, 
the things that control lighting systems or fire alarm systems 
or ventilation systems or things of that nature, and those pose 
a real threat for us.
    I am sorry. I am getting lost in your question. But----
    Mrs. Watson Coleman. What do you see the Federal 
Government----
    Mr. Galvin. Yeah. So, again, I think it has to do with the 
preparedness, making sure that the plans are in place to 
respond and that there is coordination between organizations, 
not just within a single organization.
    Mrs. Watson Coleman. Thank you.
    Is there anyone else who would like to respond to this 
question?
    Mr. Raymond.
    Mr. Raymond. Thank you.
    I think continuing to sponsor and participate in exercises 
that allow the States to demonstrate their preparedness as 
Internet of Things continues to grow, unmanned vehicle systems, 
all of that will continue to get more complex. So being an 
important sponsor to allow us to play and work through these 
exercises in advance and think through them helps us really 
prepare for real events when they do occur.
    Mrs. Watson Coleman. Thank you. Thank you.
    One quick question, since we can't go down there. On a 
scale of 1 to 10 being the very best, how well are we doing in 
incorporating risk into emergency response plans and developing 
contingency operations?
    I should just probably give that to you, Mr. Ghilarducci. 
Did I slay that name?
    Mr. Ghilarducci. You did great. Thanks.
    Well, I appreciate the question, Congresswoman. We don't 
need to reinvent the wheel with regards to all-hazard planning. 
I mean, we have a national construct, a National Incident 
Management System, and having those capabilities in place to 
respond to the consequences, the cascading consequences of a 
cyber attack, should be reinforced and exercised and built 
upon.
    The delta or the challenge is that the traditional systems 
that we depend upon for communications and situational 
awareness may be actually impacted by a cyber attack. So we 
need to make sure we have continuity of operations redundancies 
put in place. This was an area where the Federal Government can 
support States. You want to leverage that public-private 
capability so that you are utilizing the most information you 
can get to be able to make the right decisions.
    So in your training and in your focus you need to also plan 
for--you know, don't just always plan for the technology is 
going to be operational. Start to do exercises and plans where 
you lose all that. How are you going to continue to 
communicate? How are you going to continue to get resources and 
get situational awareness in a timely way to make sure you 
protect lives and property?
    So those are some of the things. But it has to start with 
the construct of that all-hazards environment and our NIMS 
construct.
    Mrs. Watson Coleman. Thank you. Thank you very much.
    I yield back my time, even though I am over it.
    Mr. Donovan. The gentlewoman yields back the time that she 
doesn't have.
    We have a few more moments, and our panel travelled so far, 
I would just like to offer a second round of quick questions 
for my colleagues.
    I just would like to start. We spoke about your challenges, 
and each of you told us about the challenge of lack of 
resources, competing, the competition for talent with industry, 
the inability to share information because of its 
classifications.
    Would each of you just share with us what you think your 
biggest achievement is or your biggest success, without 
divulging trade secrets to our enemies, that maybe some of your 
colleagues would be able to piggyback on and use in their 
various environments?
    Mr. Ghilarducci. I will start. I guess two areas. Again, it 
continues to evolve for us, and we are working hard at it. But 
that is the establishment of a public-private nongovernmental 
academic cybersecurity task force to be able to share 
information and best practices and recommendations and ideas to 
help us as a State drive those ideas forward, and the 
establishment of this integrated cybersecurity fusion center, 
if you would, that collocates with our primary fusion center 
and our critical infrastructure protection team, they can come 
together and all be looking at similar threat streams together 
with an effort to be able to mitigate prior to the event 
actually having the greatest impact.
    So I think those are two areas. Then spinoffs from those is 
working with K through 12 and community colleges. We have 
actually implemented a cyber warrior program in California that 
has just taken off--I hate to use the word like wildfire, 
because we have a lot of those--but has really taken off in 
California. The cyber warrior program for high school students 
and community college students has really been well-received, 
and really we are trying to make that cyber warrior work for 
us.
    Mr. Donovan. Thank you, sir.
    Lieutenant Colonel.
    Mr. Cooney. I think it would be the establishment of our 
cyber analysis unit at our fusion center. I think we were 
fortunate to find the right people and the right mix between 
technical capability and the ability to do intelligence 
analysis. It has worked well for us in an area that, as I 
mentioned in my testimony, that when it comes to cyber 
intrusion and the intel up front in the prevention realm, this 
is still relatively new for us. We got into it in about 2014 
and so far we have made some good progress. So I would say if 
other States could emulate that, then they may find that 
beneficial.
    Mr. Donovan. Thank you, sir.
    General.
    Mr. Spano. Yeah, I would say that the success of the ISAC 
in terms of showing how public and private can come together to 
address an issue of such National importance. Within the ISAC, 
I probably would highlight our CERT function, which is probably 
one of the best, certainly, in the Nation. I would like to say 
that it is probably world-recognized in terms of its ability to 
conduct forensics and analysis for a plethora of customers, 
predominantly, of course, focused at the SLTT.
    Mr. Donovan. Thank you. Mr. Chairman.
    Mr. Raymond.
    Mr. Raymond. Thank you. One of the things that I think we 
are really proud of in Connecticut is that we have been sort-of 
baking telecommunications and networking into our incident 
response teams. So we have had several weather events over the 
past few years and through that it has become really critical 
that citizens rely on communication technology much more so 
than they ever had before.
    So we do have a response team associated with restoring 
commercial networks and communication structures. Having those 
relationships at the ready has allowed us to respond very 
quickly when Superstorm Sandy came and to be able to restore 
communications as much as possible.
    Mr. Donovan. Thank you, sir.
    Mr. Galvin.
    Mr. Galvin. Thank you. At the Port Authority, the 
technology, the policies, the procedures, and the personnel 
that we have put in place, we have been able to detect and 
automatically block 90 percent of the critical incidences that 
we can see on our network, and we have been able to reduce our 
critical incident response time by two-thirds in the past year.
    So we are proud of these things, but there is a lot of work 
that remains to protect our critical technology assets. As many 
people on the panel have already talked about and I won't 
repeat, the threat continues to evolve and the attack surface 
continues to expand with mobile devices and the emerging 
Internet of Things. So we are confident, but we are continuing 
to work diligently.
    Mr. Donovan. Thank you, sir.
    The Chair now recognizes the gentleman from New Jersey, Mr. 
Payne.
    Mr. Payne. Thank you, Mr. Chairman.
    Mr. Galvin, in your testimony you note that the Port 
Authority has undertaken an effort to better understand cyber 
vulnerabilities and address them. What is the biggest challenge 
in carrying out this task? What has the Port Authority learned 
in the process that might help other ports or critical 
infrastructure owners conduct a similar assessment?
    Mr. Galvin. Thank you very much.
    So I think the size of the task is enormous. We have 
approximately 690 applications to assess. I think the lesson 
that I would give to other organizations is to start now. It 
doesn't decrease in effort or size as time goes on, because 
there are new techniques, new technologies that every day get 
introduced into the organization whether or not you are aware 
of them. They do require an assessment.
    So it is a huge effort, and the limiting factor, I think, 
is the size of the staff and the ability of our organization to 
absorb what we learn.
    Mr. Payne. Thank you.
    Mr. Ghilarducci, you have observed that risk assessments 
used by some States do not adequately address the top cyber 
threats or systematic interdependencies. How can we help States 
better assess their cyber vulnerabilities? Should FEMA be 
improving the bureau guidance, or should the Federal Government 
be providing separate guidance on how to conduct cyber 
assessments more thoroughly?
    Mr. Ghilarducci. Well, the guidance, I mean, really, the 
standards for assessments that we are using really are the NIST 
standards. I think that we would all agree that a little bit 
more meat could be put on the bones around doing assessments 
that speak a little bit more to the various aspects of the 
emergency management or public safety spectrum.
    I know we are looking at networks, but when you look at the 
networks' vulnerabilities, we also need to think about in the 
long term what would be the consequences should we lose certain 
networks and sort-of play that out in a little longer bit way. 
So FEMA would be a good entity to be able to provide some 
additional guidance there.
    The other thing is DHS, through their protective service 
analysts that work with our critical infrastructure protection 
folks, they do provide some additional support, and we 
appreciate that. But we probably need to get some area 
associated with the cyber networks, particularly when looking 
at private sector, given that most of the infrastructure is 
owned by the private sector.
    We need to continue to work to link those together with 
regards to the assessment process, because sometimes 
information sharing is a little bit challenging, because of 
proprietary and competitive kind of issues, but we need to find 
a place that we continue to share information to strengthen our 
capability as much as possible.
    Mr. Payne. You also talked about States playing catch-up in 
developing a whole-of-the-government approach to cybersecurity 
and noted that even in California only 13 organizations have 
participated in the cyber hygiene partnership.
    Why do you think more agencies within the States are not 
participating? What can the Federal Government do to encourage 
improved buy-in for cybersecurity efforts among State and local 
agencies or even in the private sector?
    Mr. Ghilarducci. Well, I think maybe Mr. Raymond and others 
may be a little bit more to talk about the challenges in State 
government. I know for us it has been, I think, one, framing 
and understanding of the threat. It means different things to 
different people. We need to be more outgoing, external, like 
we do with a lot of other preparedness programs.
    This is where the Federal Government, through cyber hygiene 
initiatives and other kind of training opportunities to build 
that knowledge base as to what it means to sit at a device or 
get onto the internet and what kind of challenges you could be 
faced with with regards to threats. So training and education 
is one thing.
    The second piece is, I think because there is a lack of 
knowledge, particularly at the Executive level in making 
decisions on funding allocations for doing assessments, quite a 
few times it is, you know, because you don't understand it, it 
is not made as a priority as it should be.
    Let's face it, we as a collective country, and it is just 
across the board, are behind the power curve with regard to 
this threat. We all are working very hard collectively, but we 
do need to do more to step this up. You can't just say it is a 
priority, we need to put resources behind it to really and 
truly make it a priority. Just like we have done with other 
kinds of threats, whether it is natural or human-caused 
threats, we throw a lot of resources at that to make sure that 
we are in front of it and are effectively all knowledgeable 
about it.
    Mr. Payne. Okay.
    I yield back, Mr. Chairman.
    Mr. Donovan. The gentleman yields.
    The Chair recognizes the gentleman from Rhode Island, Mr. 
Langevin.
    Mr. Langevin. Thank you, Mr. Chairman.
    I just want to go back to something we had talked about in 
terms of knowing who to call.
    Mr. Ghilarducci, maybe I have a question for you. I just 
wanted to follow up with a point that Mr. Galvin had made about 
the private sector knowing who to call.
    So just so I understand, so if PG&E has a cyber incident, 
do you recommend that they contact you or DOE or DHS first? Are 
you concerned about losing visibility if critical 
infrastructure providers go Federal first?
    Mr. Ghilarducci. We have the California Utilities Emergency 
Association, it is an entity that is funded and supported by 
all of the major utilities in California, embedding into your 
cyber integration center. It gives them that one sort of belly 
button, so to speak, to be able to make the call and open all 
of the contacts in a one-call sort-of format.
    It is challenging, I think, for them now because they do 
have a lot of people that they need to be reporting to. 
Inadvertently, what happens is that someone, some entity that 
needs to know what is going on falls through those cracks.
    The other thing is that, historically, there hasn't been a 
lot of desire, I guess, so to speak, to let too many people 
know what is going on because of demonstrating vulnerabilities 
that an organization may have.
    So by utilizing authorities and procedures that are being 
put in place through this integrated approach, it gives the 
utilities and the privates, the health industry similar kind of 
thing, a single belly button to make the call. We are all 
looking at it at the same time, and all of the required 
notifications can be made at one point.
    Mr. Langevin. Okay. Thank you.
    Yeah, I think that the point about being reluctant to 
share, by the way, we have got to work at getting over that, 
because, obviously, if one is vulnerable, everybody is 
vulnerable, and that is what, hopefully, information sharing 
will help to mitigate.
    You know, we have been talking a lot about assessments this 
morning, but equally important is not only knowing the 
vulnerabilities that may exist in your assets, in your systems, 
but also knowing the value of the data that you are holding.
    So for Mr. Spano, Mr. Raymond, in Rhode Island, where I am 
from, our Governor, Governor Raimondo, set up a cybersecurity 
commission to examine the State cyber posture. One of the 
biggest initial findings had to do with managers not 
understanding the value of the data or systems and their 
vulnerability to attack.
    Incidentally, this is the same problem that the Federal 
Government faced with the OPM attack, knowing that their 
systems were vulnerable, but also not understanding the value 
really of the data that they were responsible for protecting.
    In your experience, how well do State agencies, particular 
those that aren't focused on IT, understand their exposure and 
also the value of their data?
    Mr. Spano. The value question is hard to quantify other 
than to say that the question of the scope and standards of 
protection has been one that has been discussed and debated 
since sort-of the evolution of the internet into the challenges 
that we are facing today: What do I protect and how much 
protection is enough?
    We have got the full classification of systems. So I think 
there is a clear understanding of Secret, Top Secret. It is 
within that Unclassified regime of understanding personal 
identifiable information, HIPAA information. I think, by and 
large, there is a rudimentary understanding at sort-of the 
basic masses of employees that deal in those environments and 
with that information.
    There are isolated and pockets of excellence where managers 
are being trained in how to deal with HIPAA and identify PII, 
but by and large it is a challenge with educating your existing 
workforces against the basic cyber threats and the basic 
protections that they can do, as well as sort-of the 
identification of what that value is of information.
    Mr. Langevin. Okay. Thank you.
    Mr. Raymond.
    Mr. Raymond. I think that the States' response--it has been 
my experience that there are sort-of 2 buckets, right? One is 
for those who have regulated data, whether it is HIPAA, 
protected medical information, FERPA data, IRS, those 
organizations are very much aware of the value of the 
information that they have.
    I think for those that have nonregulated data but that may 
be important to protect, I think that the reliability of--or 
the awareness of what they have and the importance to protect 
it may be a little bit less.
    I know in Connecticut we have a data classification policy 
that makes you look at what data you have and how valuable it 
is in terms of treating it for data sharing or at least 
protecting, and I think having that kind of approach for all 
States can really raise that visibility level that you 
describe.
    Mr. Langevin. Very good.
    Thank you, Mr. Chairman. I yield back.
    Mr. Donovan. The gentleman yields back.
    The Chair now recognize the gentlewoman from Texas, Ms. 
Jackson Lee.
    Ms. Jackson Lee. Let me thank the Chair for his courtesies. 
Let me acknowledge the Chair and Ranking Member sitting, 
wearing many hats, Mr. Payne, to the full committee Chair and 
the full committee Ranking Member. We have overlapping 
committees, and I just came out of the Judiciary Committee, so 
I thank you for your courtesies.
    This is a very important hearing, which is one of the 
reasons I did the mad dash, because I chaired this committee 
when it was the Transportation and Infrastructure Committee, 
which included all of the Nation's technological networks. I 
remember visiting water and sewer plants and seeing the 
openness and the expanse and wondering what potential terrorist 
act or manipulation of the technology dealing with it. I just 
came back from Silicon Valley, and they are pleading for 
individuals who can code or to write code.
    So I want to offer to you some thoughts. Obviously, you 
have not looked at it, but I have a bill, H.R. 53, 
Cybersecurity Education and Federal Workforce Enhancement, 
which is to target in and focus in on building up the workforce 
for the Federal Government, dealing with technology. Also H.R. 
60--one is H.R. 53 dealing with education--H.R. 60, the 
National Guard Act to develop a civilian force that can be 
activated in the event of a major cyber attack or event.
    Now, if we were domestic, we know that we have NORTHCOM 
that would rise up and be part of dealing with any attack to 
the United States in a very massive way. I pushed NORTHCOM to 
be engaged on State and local. But this is technology, this is 
a cyber attack.
    So if you can answer the question, the importance of 
building the workforce, and as well the importance of having 
well-experienced individuals for a massive attack that deals 
with infrastructure, such as water and sewer, such as our 
electrical grid, and the one that I live with every day, the 
petrochemical industry, which is highly automated at each stage 
of the process through energy extraction, transportation, 
processing, and distribution. As you well know, that is an arm 
of the movement of the economy in this Nation.
    So if you could answer those, I would appreciate it. I will 
listen to you. Thank you. Is there someone who wants to take--
thank you.
    Mr. Raymond. I think education and workforce are incredibly 
important for us being able to respond. I would just add one 
comment. Specifically around the Guard and Guard response, I 
think that as it relates to us being able to have and retain 
workforce, because many of these folks are highly trained 
individuals and they can gain higher salaries in the private 
sector, having that capability of applying that in the event it 
happens at a State level is important.
    We do work very closely. We have a monthly cyber meeting 
where members of the Guard participate in that for awareness 
capabilities. So it is one sort of creative way for the States 
to be able to utilize that capability and bring those skills to 
bear.
    Ms. Jackson Lee. Thank you.
    Mr. Galvin. I have a comment as well.
    Ms. Jackson Lee. Thank you. I appreciate it.
    Mr. Galvin. I think there are several different skills that 
are involved in doing incident response in cybersecurity. They 
not all of them require coding skills. I think the ability to 
think creatively, to think on your feet, to stay calm under 
pressure, I think those are all important skills that don't 
necessarily require coders.
    On the other side, after an incident is detected and you 
are trying to figure out how to protect yourself in the future 
from similar attacks, because the nature of cybersecurity 
events is you have something that is novel and that is unique, 
and then you have multiple copies of it replicated with slight 
variations. So if you can protect yourself against one, you can 
kind of replicate the protection going forward. That is where 
you need a coder, a skill, someone who can take apart the 
threat or at least work with someone who can take it apart, 
because these are getting increasingly more complex as time 
goes on.
    I think the other thing that you brought up was having a 
well of individuals to respond in the event of an attack on the 
grid or water systems or other such critical infrastructure is 
extremely important. Frankly, I think you have to talk to the 
operations people who would oversee the facilities to talk 
about what kind of staff those people are. If it is an attack 
on the grid, they are not IT people, because we don't function 
when there is no electricity.
    So the question is really back to your response plan, and 
back in the day when a lot of us did initial kind of major 
systems implementations, there was always the plan, like, what 
happens if we are not going to go live and we have to go back 
to the old system? That was an old product that was dusted off.
    So we have to go back and start looking at having those 
kinds of plans in place. Like, if the payroll system goes down, 
you go back to writing checks and doing things like that. So we 
need to start thinking about that in the face of these kinds of 
very major attacks on electrical infrastructure, for example.
    Ms. Jackson Lee. Let me pursue, if I could--thank you for 
that. I think it is important to emphasize calmness, 
creativity, and thinking on your feet. But this whole concept 
of code, what I gleaned from Silicon Valley, they are looking 
at it from one perspective, we don't have enough individuals 
Nation-wide. Maybe you would comment. I want to be able to see 
a far reach to be able to have those that can take apart a 
threat, which I believe that we are susceptible to.
    So anyone want to comment on building that code, coding and 
coders, body of infrastructure in the human resource?
    Mr. Spano. Yeah, we talked about that a little bit earlier 
in terms of sort-of the urgency or the burning platform of it 
is a challenge to look at this problem as we have and other 
challenges where capacity could solve it. The challenges we 
face in cyber are challenges of complexity. Capacity can't 
solve a complexity issue, so we have to think about it in a 
much different way.
    The workforce is not a simple fix of just going out and 
trying to figure out how you are going to compete with the 
availability. It is how do you produce a pipeline where there 
is zero unemployment?
    That starts back from K through 12 and STEM and getting 
much more interest in those areas at a much younger age, 
encouraging colleges and universities to develop more 
curriculum and more degrees. It is tied to loan forgiveness and 
scholarship for service beyond that to encourage them to move 
into those areas.
    So it has to be comprehensive and looked at across a 
broader spectrum of time.
    Ms. Jackson Lee. Yes, sir.
    Mr. Ghilarducci. Thanks for the question. I think it is a 
good one. I agree with everything that has been said.
    I think it is important that we sort-of understand kind-of 
talking about pre-event and post-event. Really the pre-event is 
where you need that workforce multiplier, those folks that are 
the coders, the folks that are going to interdict and mitigate 
prior to the event actually taking place.
    The consequences of power outages or a dam release or 
something where there is infrastructure impact, our systems 
that are in place currently for consequence management need to 
be leveraged, and those are the ones that are going to be 
responding to the consequences. Unless there is an on-going 
series of cyber attacks, the attack itself may be done once and 
then you have got now a resulting series of consequences that 
you have to deal with.
    The key thing, I think, is really in the pre-event phase, 
is trying to have that workforce. You mentioned the National 
Guard. I think the National Guard across the States is a model, 
a good model, that could be utilized for building real-time 
capabilities, where in the case of California there are a lot 
of people that work in Silicon Valley, actually, or in the IT 
industry, that are also guards men and women, and they bring 
them in on State Active Duty and be able work on the cyber 
topic. But they give you a workforce multiplier that you can 
continue to build upon.
    But that is not exclusive, mutually exclusive, to the need, 
as the general was saying, in building out workforce from the 
high school level moving forward.
    So I think that it is important that we think about it from 
the standpoint of, what do we have to prevent, interdict, and 
mitigate to minimize the impact? Then our consequence managers, 
the people who are going to respond, we need to train them with 
an understanding that, unlike a wildfire or earthquake, you may 
be operating in an environment with no IT, no situational 
awareness through the computer network, and you may have to go 
back to pen and paper to be able to get the job done. Those are 
the things that I think are important to understand.
    Ms. Jackson Lee. I want to thank the Chairman for his 
indulgence. If I can just, as I close, I would cite the 
petrochemical industry as one that argues for all that you 
said.
    Anybody just want to comment on that?
    Just because these industries are dealing not only with 
technology, but they are dealing with chemicals, it is just a 
combination that you need this holistic viewpoint.
    Mr. Spano. I think that is shared across finance, health 
care, electricity, and other critical infrastructures equally 
as well. Some are at varying levels of maturity in their 
thought, strategy, and execution.
    Ms. Jackson Lee. Well, let me say that I could listen to 
the experts that are here quite more extensively, but let me 
say that I am hoping to move these bills and also reviewing 
something called COIN technology--you may not have heard of 
it--or may have heard of it--that is supposed to be dealing 
with the bigger picture that you all are looking at.
    Being on this committee for so long, I will just say that 
when we started, we knew that 80 percent of the infrastructure, 
which includes all that you are speaking about, was in the 
private sector. It may have gone up now, maybe 85 percent. So 
we know what our work is, and we know what our work is going 
forward, and this is a very important hearing for collaboration 
between Government and the private sector.
    I thank you to the Chairman and Ranking Member, and I yield 
back.
    Mr. Donovan. The gentlewoman yields back.
    I thank the witnesses for their valuable testimony and the 
Members for their questions. The Members of the subcommittees 
may have some additional questions for the witnesses. We will 
ask you to respond to these in writing. Pursuant to the 
Committee Rule VII(E), the hearing record will be held open for 
10 days.
    Without objection, the subcommittee stands adjourned.
    [Whereupon, at 12:03 p.m., the subcommittees were 
adjourned.]

                                 [all]