[House Hearing, 112 Congress] [From the U.S. Government Publishing Office] EXAMINING THE HOMELAND SECURITY IMPACT OF THE OBAMA ADMINISTRATION'S CYBERSECURITY PROPOSAL ======================================================================= HEARING before the SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS FIRST SESSION __________ JUNE 24, 2011 __________ Serial No. 112-33 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC] [TIFF OMITTED] TONGRESS.#13 Available via the World Wide Web: http://www.gpo.gov/fdsys/ __________ U.S. GOVERNMENT PRINTING OFFICE 72-253 WASHINGTON : 2012 --------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Peter T. King, New York, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Daniel E. Lungren, California Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Michael T. McCaul, Texas Henry Cuellar, Texas Gus M. Bilirakis, Florida Yvette D. Clarke, New York Paul C. Broun, Georgia Laura Richardson, California Candice S. Miller, Michigan Danny K. Davis, Illinois Tim Walberg, Michigan Brian Higgins, New York Chip Cravaack, Minnesota Jackie Speier, California Joe Walsh, Illinois Cedric L. Richmond, Louisiana Patrick Meehan, Pennsylvania Hansen Clarke, Michigan Ben Quayle, Arizona William R. Keating, Massachusetts Scott Rigell, Virginia Kathleen C. Hochul, New York Billy Long, Missouri Vacancy Jeff Duncan, South Carolina Tom Marino, Pennsylvania Blake Farenthold, Texas Mo Brooks, Alabama Michael J. Russell, Staff Director/Chief Counsel Kerry Ann Watkins, Senior Policy Director Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director ------ SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES Daniel E. Lungren, California, Chairman Michael T. McCaul, Texas Yvette D. Clarke, New York Tim Walberg, Michigan, Vice Chair Laura Richardson, California Patrick Meehan, Pennsylvania Cedric L. Richmond, Louisiana Billy Long, Missouri William R. Keating, Massachusetts Tom Marino, Pennsylvania Bennie G. Thompson, Mississippi Peter T. King, New York (Ex (Ex Officio) Officio) Coley C. O'Brien, Staff Director Alan Carroll, Subcommittee Clerk Chris Schepis, Minority Senior Professional Staff Member C O N T E N T S ---------- Page Statements The Honorable Daniel E. Lungren, a Representative in Congress From the State of California, and Chairman, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies................................................... 1 The Honorable Yvette D. Clark, a Representative in Congress From the State of New York, and Ranking Member, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies: Oral Statement................................................. 3 Prepared Statement............................................. 4 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security: Oral Statement................................................. 4 Prepared Statement............................................. 5 Witnesses Ms. Melissa E. Hathaway, President, Hathaway Global Strategies, LLC: Oral Statement................................................. 8 Prepared Statement............................................. 10 Mr. Gregory E. Shannon, Chief Scientist for Computer Emergency Readiness Team (Cert), Software Engineering Institute, Carnegie Mellon University: Oral Statement................................................. 17 Prepared Statement............................................. 18 Mr. Leigh Williams, President, BITS, The Financial Services Roundtable: Oral Statement................................................. 21 Prepared Statement............................................. 23 Mr. Larry Clinton, President, Internet Security Alliance: Oral Statement................................................. 28 Prepared Statement............................................. 30 For the Record The Honorable Daniel E. Lungren, a Representative in Congress From the State of California, and Chairman, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies: Statement of the American Chemistry Council.................... 6 Appendix Questions From Chairman Daniel E. Lungren for Melissa Hathaway... 57 Questions From Chairman Daniel E. Lungren for Gregory E. Shannon. 61 Questions From Chairman Daniel E. Lungren for Leigh Williams..... 64 Questions From Chairman Daniel E. Lungren for Larry Clinton...... 65 EXAMINING THE HOMELAND SECURITY IMPACT OF THE OBAMA ADMINISTRATION'S CYBERSECURITY PROPOSAL ---------- Friday, June 24, 2011 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Washington, DC. The subcommittee met, pursuant to call, at 10:05 a.m., in Room 311, Cannon House Office Building, Hon. Daniel E. Lungren [Chairman of the subcommittee] presiding. Present: Representatives Lungren, McCaul, Walberg, Long, Marino, Clarke, Richardson, Richmond, and Keating. Mr. Lungren. With the concurrence of the Ranking Member of the full committee, the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technology will come to order. The subcommittee is meeting today to examine the homeland security impact of the administration's cybersecurity proposal. I would just say at the outset, we have a vote, I guess a single vote, scheduled at about 10:15, so we will have to go over there and then come back. We are going to try and get our opening statements in so that we can proceed directly with our witnesses as soon as we get back from the vote. I recognize myself for an opening statement. We are meeting today to examine the impact of the administration's cybersecurity proposal on the Department of Homeland Security. The proposal touches on a number of issues, such as increasing the penalty for hacking, putting in place a comprehensive regime around the issue of large-scale breaches of personally identifiable information, regulating the cybersecurity of the private-sector critical infrastructure owners and operators, and providing needed clarity on the cybersecurity mission of the Department of Homeland Security. While I may differ on certain elements of their proposal, I am pleased the administration has provided thoughtful inputs to Congress to help us craft an effective National cybersecurity policy. That being said, I believe this proposal is not the end of our effort but the beginning of a much-needed debate on how we, as a Nation, will address these dynamic cybersecurity threats in the future. With the growing number of computer network cyber intrusions and attacks being reported in the media, the need for strengthening cybersecurity is obviously more evident every day. The status quo is not acceptable. The internet and our digital society provide our adversaries multiple attack avenues. We must continue to innovate and to build a culture of cybersecurity. We must also find a way to incentivize critical infrastructure owners and operators to build security into their business model. Although our Nation faces a difficult fiscal environment, securing our critical infrastructure assets cannot be ignored. We must be creative and develop ways to improve the return on our security investments. Developing the right liability safe harbors for growing a more robust and mature cyber insurance market won't happen by itself, particularly in this economic downturn. We must tap the talent of the private sector to develop the appropriate ways and means to improve the cybersecurity economic equation. The cost if we don't secure our critical infrastructure and our business networks and data will be far greater. I thank all of our witnesses for their appearances today. This is the third in our series of hearings on the cyber threat to critical infrastructure. The administration's proposal outlines their cybersecurity vision, and I, frankly, thank them for it. It will help inform our efforts to develop legislation to better secure our critical infrastructure and Government networks. I am eager to hear how the proposed language would impact those in the private sector, how it would increase the authority of the Department of Homeland Security, and how it positions the Department of Homeland Security to be the focal point of our cybersecurity in the civilian government. I believe the Department is the appropriate place within the Government to take responsibility for our cybersecurity operations and establish policies and priorities for protecting our civilian departments and agencies. I think having the Government lead by example is critically important. As Chairman of the House Committee on Administration, I have the cybersecurity responsibility for the House of Representatives. I take that responsibility very seriously and am proud of the job that the CIO and his team have done. Having DHS lead by example is critically important, as I mentioned. We are going to hear from Dr. Greg Shannon this morning about the future of incident response operations. Carnegie Mellon CERT has long been recognized for its excellence in computer emergency response, and I am hopeful that their experience will help DHS build a world-class computer instant response capability. I am also honored to have Melissa Hathaway, the former cybersecurity advisor to both President Bush and President Obama, here to discuss the administration's proposal. She was the director of President Bush's Comprehensive National Cybersecurity Initiative. Additionally, as primary author of this administration's 60-Day Cyberspace Policy Review, she is in a unique position to share with us her expertise and perspective on improving the overall cybersecurity enterprise across Government--in particular, how the Government can best interact with private-sector critical infrastructure owners and operators. I applaud the administration for coming forward with a proposal. They have, I think, some of the answers. I don't think they believe, nor do I believe, that any one of us has all of the answers. But, together, we can certainly forge ahead to improve from where we are now. As I mentioned, we have had a vote called. Interesting, we have a little TV screen up here which shows what is going on, but they have managed to put it in mirror fashion so it is reverse of what it says. But I do believe that means we have 11 minutes left. Somebody has invaded our little system here. But I would like to recognize the Ranking Member from New York, Ms. Clarke, for her opening statement. Ms. Clarke. Thank you very much, Mr. Chairman, Ranking Member Thompson, my colleagues, and to the panelists this morning. We live in a world where it seems that everything relies on computers and the internet. The effective functioning of our critical infrastructure from airports, financial systems, to water systems, factories, the electric grid is highly dependent on computer-based systems called control systems that are used to monitor and control sensitive processes and physical functions. The danger of both unintentional and intentional cyber attack is real. The potential consequences for an attack on control systems vary widely, from the introduction of raw sewage into potable water systems to the catastrophic failure of critical electrical generators due to the change of a single line of code in the critical system. We have come to recognize that public-private partnerships are a key component of securing our Nation's computer-reliant critical infrastructure. Private-sector involvement is crucial, as it collectively owns the vast majority of the Nation's cyber infrastructure and is responsible for protecting its networks and systems from the growing threat of a cyber attack. Enhancing the public-private partnerships by developing an improved value proposition and implementing better incentives, among other measures, will be essential to encouraging greater private-sector involvement. Control systems are not the only computers subject to attack. Every day, thousands of attacks are launched against Federal and private networks by hackers, terrorist groups, nation-states attempting to access classified and unclassified information. The infiltration by foreign nationals of Federal Government networks is one of the most pressing issues confronting our National security. Federal networks have been under attack for years. These attacks have resulted in the loss of massive amounts of critical information, so many of these attacks are classified. We all know that cybersecurity is a critical National security issue, and this committee has taken the lead. My Ranking Member, Mr. Thompson, reintroduced his cybersecurity bill from last year, H.R. 174, in January of this year and made sure it was referred to this subcommittee. The need to improve America's cyber defense posture is clear, and the Homeland Security Committee has been arguing this point for a long time. Now the President has come forward with a comprehensive strategy and some legislative proposals about how it will prevent, detect, and respond to attacks on computer systems and infrastructure. There have been many cyber-related bills in the last session of Congress, and the Members of Congress wrote to the President and asked for his input on cybersecurity legislation. As part of the President's 2-year cyberspace policy review, the White House has put forth a detailed and determined cybersecurity legislative proposal. I look forward to examining that proposal today. I thank you for calling this hearing, Mr. Chairman, and I yield back the balance of my time. [The statement of Ranking Member Clarke follows:] Prepared Statement of Ranking Member Yvette D. Clarke June 24, 2011 We live in a world where it seems that everything relies on computers and the internet. The effective functioning of our critical infrastructure--from airports, financial systems, to water systems, factories, the electric grid--is highly dependent on computer-based systems called ``control systems'' that are used to monitor and control sensitive processes and physical functions. The danger of both unintentional and intentional cyber attack is real, and the potential consequences of an attack on control systems vary widely from the introduction of raw sewage into potable water systems to the catastrophic failure of critical electrical generators due to the change of a single line of code in a critical system. We've come to recognize that public/private partnerships are a key component of securing our Nation's computer-reliant critical infrastructure. Private sector involvement is crucial, as it collectively owns the vast majority of the Nation's cyber infrastructure and is responsible for protecting its networks and systems from the growing threat of a cyber attack. Enhancing the public/private partnerships by developing an improved value proposition and implementing better incentives, among other measures, will be essential to encouraging greater private sector involvement. Control systems are not the only computers subject to attack. Every day, thousands of attacks are launched against Federal and private networks by hackers, terrorist groups, and nation-states attempting to access classified and unclassified information, and the infiltration by foreign nationals of Federal Government networks is one of the most pressing issues confronting our National security. Federal networks have been under attack for years; these attacks have resulted in the loss of massive amounts of critical information, though many of these attacks are classified. We all know that cybersecurity is a critical National security issue, and this committee has taken the lead. My Ranking Member, Mr. Thompson re-introduced his cybersecurity bill from last year, H.R. 174, in January of this year, and made sure it was referred to this subcommittee. The need to improve America's cyber defense posture is clear, and the Homeland Security Committee has been arguing this point for a long time. Now, the President has come forward with a comprehensive strategy, and some legislative proposals, about how it will prevent, detect, and respond to attacks on computer systems and infrastructure. There have been many cyber-related bills in the last session of Congress, and Members of Congress wrote to the President and asked for his input on cybersecurity legislation. As part of the President's 2-year Cyberspace Policy Review, the White House has put forth a detailed and determined cybersecurity legislative proposal. I look forward to examining that proposal today, and thank you for calling this hearing Mr. Chairman. Mr. Lungren. I thank the gentlelady. I now recognize the Ranking Member of the full committee, the gentleman from Mississippi, Mr. Thompson, for any statement he may have. Mr. Thompson. Thank you very much, Mr. Chairman, for holding this hearing. I welcome our witnesses also. Being, as you have already indicated, that there is a vote on the way, I will submit my opening statement for the record. [The statement of Ranking Member Thompson follows:] Prepared Statement of Ranking Member Bennie G. Thompson June 24, 2011 When President Obama released his Cyberspace Policy Review almost 2 years ago, he declared that the ``cyber threat is one of the most serious economic and National security challenges we face . . .''. I agree with him and I am pleased that his administration has taken significant steps to put forth a clear path to update our cybersecurity laws. I am also pleased we are examining the President's proposal here today. This committee is the lead on cybersecurity in the House, as it should be, and we have been examining this issue and calling for action since our formation. I re-introduced my cybersecurity bill, H.R. 174, in January of this year with the continuing hope that it might get a hearing in this committee. Frankly, the White House proposal we are examining today has used many of the concepts I suggest in my legislation. We are facing a National and global challenge on cybersecurity, and we must be internationally engaged to make improvements. Simply put, we must figure out how cyberspace is to be governed, and how it is to be secured. We know that decisions being made by international bodies that govern the internet do not necessarily reflect U.S. National interests. Major corporations, financial firms, Government agencies, and allies have all been victims of cybersecurity breaches, and these are just the events we know about. Classified military networks have been penetrated by foreign intelligence agencies, and from the perpetrators' perspective, no one has ever been punished for any of these actions. This is not a record of success. Since 1998, we have repeatedly tried a combination of information sharing, market-based approaches, public/private partnership, and self- regulation in an effort to strengthen our cyber defenses. Hopefully, we are learning from the shortcomings of the past and preparing for future challenges. Mr. Chairman, I look forward to today's examination of the President's proposal, and thank you for calling this hearing. Mr. Lungren. I thank the gentleman for submitting his opening statement. We will recess until we vote and complete the vote. I believe we just have one vote. So we will return immediately and begin with our witnesses. With that, this subcommittee hearing is recessed. [Recess.] Mr. Lungren. The subcommittee will resume. Other Members of the subcommittee are reminded that opening statements may be submitted for the record. We are pleased to have a distinguished panel of witnesses before us today on this most important topic. Melissa Hathaway served in President Obama's administration, 2009, where she coordinated the 60-Day Cyberspace Policy Review. Following the report, she stood up the Cybersecurity Office within the National security staff to conduct work based on the blueprint. Previously, she served under President Bush as cyber coordinator executive and director of the Joint Interagency Cyber Task Force in the Office of the Director of National Intelligence. Ms. Hathaway previously worked as principal with Booz Allen & Hamilton; currently is a strategic consultant in the field of cybersecurity. Mr. Greg Shannon is the chief scientist for the CERT program at Carnegie Mellon University Software Engineering Institute, a Federally-funded research and development center. Mr. Shannon has previously led applied research and development efforts in cybersecurity and data analysis at a number of private companies as well as the Los Alamos National Laboratory. Leigh Williams has served as the president of BITS, the technical policy division of The Financial Services Roundtable, since 2007, focusing on improving operational practices and public policy in the financial sector. Previously, he was a senior fellow at Harvard's Kennedy School of Government, researching public- and private-sector collaboration in the governance of privacy and security. In addition, he has worked at Fidelity Investments, where he was the chief risk officer and chief privacy officer. Then we have Mr. Larry Clinton, president and CEO of the Internet Security Alliance, a multi-sector industry group which was created to integrate advanced technology with the needs of the business community, leading to a secure internet. During his tenure at the Internet Security Alliance, Mr. Clinton created the ``Cyber Security Social Contract.'' He has previously worked as vice president of the USTelecom Association and as legislative director for our former colleague Rick Boucher, who was the subcommittee chair on the Energy and Commerce Committee with jurisdiction over telecommunications and the internet. We welcome all of you. We would ask you to try and stay within the 5 minutes. Your prepared written text will be made a part of the record. Before you begin, I would just ask unanimous consent that a letter that we received from the American Chemistry Council in regard to the subject before this committee be made a part of the record. Without objection, it will be. [The information follows:] Statement of the American Chemistry Council June 24, 2011 acc members are a critical aspect of the nation's economy The American Chemistry Council (ACC) represents the leading companies in the United States who produce the chemical products essential for everyday life. And, the business of chemistry is a critical aspect of our Nation's economy employing more than 800,000 Americans in good-paying, high-tech positions and produces 20% of the world's chemical products. More than 96% of all manufactured goods are directly touched by the business of chemistry. The chemical industry provides vital products and materials that help improve our standard of living, advance green energy objectives and protect the health and welfare of all Americans. Our industry produces critical components used in lifesaving medications, medical devices, body armor for our armed forces and law enforcement, energy-efficient light-weight components for vehicles that improve gas mileage, energy-saving building materials, and the durable, light-weight wind turbine blades that help generate green energy that creates jobs while protecting the environment. cybersecurity is a top priority for acc and the chemical industry Because of our critical role in the economy and our responsibility to our communities, security continues to be a top priority for ACC members. In 2001, our members voluntarily adopted an aggressive security program that became the Responsible Care Security Code (RCSC). Responsible Care implementation is mandatory for all members of the ACC and is regularly reviewed by independent, credentialed third- party auditors. The RCSC is a comprehensive security program that addresses physical and cybersecurity risks. The Security Code requires a comprehensive assessment of its cybersecurity vulnerabilities and implementation of appropriate protective measures throughout a company's supply chain, The RCSC has been a model for State-level chemical security regulatory programs in New Jersey, New York, and Maryland and was deemed equivalent to the U.S. Coast Guard's Maritime Transportation Security Act (MTSA). The Security Code covers the crucial area of cyber and information security and we were gratified that in 2009 the Obama administration made cybersecurity a top priority. Along with physical security, ACC members began actively addressing cybersecurity issues before and after the attacks of September 11, 2001. Cyber experts from member companies also work closely with the DHS National Cyber Security Division (NCSD) in many areas including: National Cyber Storm exercises, information sharing programs, development of the Roadmap to Control Systems Security for the Chemical Sector, A 2009 Program Update can be found on the Obama administration's website--``Making Strides to Improve Cyber Security in the Chemical Sector.'' Security in all its dimensions continues to be a top priority for the ACC and the chemical industry, and we're proud of our record of accomplishment and cooperation on cybersecurity with Congress, DHS, and others. the chemical industry complies with tough cybersecurity regulations On April 9, 2007 the U.S. Department of Homeland Security published the ``Chemical Facilities Anti-terrorism Standards'' (CFATS) regulatory program. This comprehensive Federal regulatory program requires high- risk chemical facilities to register with DHS, conduct a thorough site security assessment and implement protective measures that comply with 18 risk-based performance standards (RBPS). In particular, RBPS No. 8 establishes performance standards for cybersecurity that must be implemented by each covered facility. RBPS No. 8 requires facilities to deter cyber sabotage and prevent unauthorized access to critical process control systems including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCSs), Process Control Systems (PCSs), Industrial Control Systems (ICSs) and other sensitive computerized systems. To do this, RBPS No. 8 requires a combination of policies and practices that high-risk chemical facilities must address to effectively secure a facility's cyber systems from attack or manipulation including: (1) security policy, (2) access control, (3) personnel security, (4) awareness and training, (5) monitoring and incident response, (6) disaster recovery and business continuity, (7) system development and acquisition, (8) configuration management, and (9) audits. In addition, CFATS specifies critical cyber systems that may require certain enhanced security activities including those that monitor and/or control physical processes that contain a chemical of interest (COI); those that are connected to other systems that manage physical processes that contain a COI; or those that contain business or personal information that, if exploited, could result in the theft, diversion, or sabotage of a COI. acc recommendations for effective cybersecurity policies ACC and its members support comprehensive cybersecurity legislation that promotes effective collaboration between the chemical industry and the Department of Homeland Security and ensures that robust cybersecurity practices are implemented across the chemical supply chain, while maintaining the free flow of commerce. To do this ACC recommends the following:Create cybersecurity standards that are prioritized based on risk and focused at protecting critical systems that if compromised would truly pose a significant threat to National security, public safety or the National economy. Cybersecurity legislation should establish performance standards to allow for flexibility in their application so that chemical industry entities can use appropriate measures that fit their unique circumstances while ensuring the security of their critical systems. The standards should take advantage of the incredible wealth of knowledge embodied in the international cybersecurity standards community. Establish a public/private partnership to effectively share information that is timely, specific, and actionable and is properly protected from public disclosure. Such a partnership will vastly improve the flow of information and ideas to help quickly identify threats and vulnerabilities. Such an approach will also generate flexible solutions that protect critical cyber systems that operate complex process controls, contain valuable intellectual property and trade secrets and personal information on employees, customers, and suppliers. To help promote the flow of information, information voluntarily provided by the private sector should be adequately protected from public disclosure including Freedom of Information Act requests. Provide limited liability protection for the private sector as a result of a cyber-attack, so long as recognized technologies have been applied to address potential threats. In order to promote the more rapid penetration of state-of-the-art emerging technologies to protect against cyber threats, the Government should hold technology users harmless from damages resulting from cyber-attacks on their IT and control systems, so long as recognized technologies have been applied to address potential threats. For example, the liability protections provided by the Safety Act are appropriate to consider. This will in turn provide the private sector better access to more advanced and affordable end products that are safe and secure as possible. Strengthen U.S. laws against cybercrimes and aggressively prosecute cyber criminals and promote international cooperation, U.S. laws should be updated and strengthened to protect critical infrastructure from cyber-attacks and hold those accountable for perpetrating said acts that are intended to cause harm to critical infrastructure operating systems, steal intellectual property and trade secrets, or obtain personal information for financial gain. Consider the borderless nature of the international cyber community and the challenges that it presents. The U.S. Federal Government should develop strong National and international partnerships to work together in identifying international threats, investigate cyber-crimes, and vigorously prosecute cyber criminals. The American chemical industry is one of the most creative and effective manufacturing enterprises in the world. However, with the advent of the Advanced Persistent Threat (APT), international cyber criminals are attempting to steal our intellectual property with little risk of getting caught. Successful APTs could compromise our industry's ability to compete in the global market place. Without a focused strategy to address this issue, the private sector will continue to fight an uphill battle. ACC encourages the Federal Government to include this issue as a central component of its strategy and strengthen our fight against international cyber theft of intellectual property. conclusion We agree that our shared priority is to enhance cybersecurity across the chemical supply chain Nation-wide. ACC looks forward to a productive debate on cybersecurity legislation that protects our critical information infrastructure while promoting effective and efficient commerce that will continue to strengthen our economy. The members of ACC and the chemical industry are committed to safeguarding America's chemical facilities and the cyber systems that enable their efficient and effective operations. It is in this spirit, that we offer our assistance to work with the DHS and Members of Congress in support of this shared goal. Mr. Lungren. Ms. Hathaway. STATEMENT OF MELISSA E. HATHAWAY, PRESIDENT, HATHAWAY GLOBAL STRATEGIES, LLC Ms. Hathaway. Thank you, Chairman Lungren, Ranking Member Clarke, Members of the committee, for the opportunity to testify on cybersecurity and its importance to homeland security. I am appearing today solely in my individual capacity, and I am not representing any clients or other organizations. Please accept my testimony for the record. My testimony is divided into three sections: It is a review of the threat; it is an assessment of the current legislative docket and unaddressed needs; and a view of the need to clarify the role for the Department of Homeland Security. Target attacks are increasing, and our defensive posture remains weak. Our opponents harness precision-guided bits and bytes to deliver spam, cast phishing attacks, facilitate click fraud, and launch a distributed denial-of-service attack. The frequency of events and affected people and enterprises are alarming. Recent headlines will show that our money, our personal privacy, our infrastructure, and our children are at risk. The NASDAQ breach showed us that our investment plans and money are exposed. The Epsilon breach showed us that our personal credentials and privacy is at risk. The RSA SecureID breach showed us that our trusted transactions and authenticated transactions are at risk. The Sony PlayStation network showed that our children are at risk. Then, finally, the Stuxnet worm showed that our critical infrastructures are at risk. The cybersecurity problem is growing faster than the solution. The Comprehensive National Cybersecurity Initiative, as well as the Cyberspace Policy Review, highlighted the need to address the threat. Clearly, cybersecurity is a topic of interest, based on the sheer number of bills that were highlighted in the 111th Congress--over 55 bills--and now in the 112th Congress, showing that a legislative conversation needs to address the shortfalls in our current laws. As of June 2011, at least 10 pieces of cybersecurity legislation have been introduced in the U.S. Senate, and at least another 9 have been introduced in the U.S. House of Representatives. I have highlighted those in my testimony. The cybersecurity legislative proposals reflect different approaches and priorities. The 21st-Century digital environment requires new laws that, at a minimum, address: Data ownership, data handling, data protection and privacy, evidence gathering, incident handling, monitoring and traceability, rights and obligations related to data breach and data transfers, and access to data based on law enforcement and intelligence services. The administration outlines six proposals that anchor the priorities for debate here in Congress. As Congress considers these proposals, it will be important to gain industry's perspective and understand the second- and third-order effects of these proposals. For example, which sectors will be covered critical infrastructure and, therefore, be subject to regulation under the new rules? The President's international strategy for cyberspace implies that energy, finance, transportation, and the defense industrial base sectors will be named covered critical infrastructures. The proposal attempts to establish a minimum standard of care and an audit and certification function that would be similar in kind to the Securities and Exchange Commission requirement for attestation of material risk. In my view, inserting DHS into a regulatory role in this context could dilute its operational and policy responsibilities and likely distract from the Nation's security posture. Additionally, the administration is proposing new authorities for DHS by establishing a National Cybersecurity Protection Program, which authorizes the DHS to explore countermeasures for the overall infrastructure. The discussion will become even more important as Congress debates the merits of Government involvement in the protection of private-sector networks. As scary and as problematic as these threats are and the intrusions may be and as devastating as they may be, it is important that the defensive posture not overtake our core freedoms. We should also respect the longstanding limitations on the role of the military as it relates to public safety and our civilian activities. I think the most important thing that this committee can address is whether and how we clarify DHS's overall role. Are we going to ask them to be a policy-maker, are we going to be asked them to be a regulator, or are we going to ask them to be an operator? All of the legislative proposals reflect the dilemma of a codependent relationship between the private sector as it develops, owns, and operates the internet-based infrastructure for which the Government is responsible for delivering essential services of power, water, telephone, et cetera, and ultimately providing economic prosperity and security. Our response includes restructuring regulation and attempts to centralize decision-making, all with the intent to reduce vulnerabilities and minimize the damages of intrusion. My testimony reflects different ideas on each of the roles: Operational, regulatory, and policy. In conclusion, the 112th Congress has an opportunity to drive a new legislative conversation and address the shortfalls in current laws. The cybersecurity problem is growing faster than the solution, and we cannot afford to be faced with strategic surprise to address this problem. FISMA reform and a National data breach umbrella are needed. Additionally, modern-day criminals are using our legal system's speed and lack thereof to their advantage. We need to stiffen the penalties and modernize the laws that are not keeping pace with today's digital environment. We need to empower the National security community charged with protecting the Nation and its critical infrastructure from cyber exploitation or attack. The Computer Fraud and Abuse Act, the Electronic Communications and Privacy Act, the Stored Communications Act, the Telecommunications Act, and the Economic Espionage Act are among some of the laws that need to be reviewed and updated. Congress should seek industry's perspective and debate the advantages and challenges associated with fielding a robust and active defense capability, imposing standards and regulation on industry, and demanding more of DHS. An overly restrictive approach should be avoided. We cannot afford to pass legislation that would prove to be feckless. I thank you very much for the opportunity to testify, and I look forward to your questions. [The statement of Ms. Hathaway follows:] Prepared Statement of Melissa E. Hathaway June 24, 2011 Mr. Chairman and Members of the committee: Thank you for the opportunity to testify on the subject of cybersecurity and its importance to homeland security. I am appearing today solely in my individual capacity, and not on behalf of any clients or other organizations. My testimony is divided into three parts: (1) A review of the threat, (2) an assessment of the current legislative docket and the unaddressed needs, and (3) a view on the need to clarify the role of DHS. Targeted attacks are increasing and our defensive posture remains weak.--A sense of urgency is rising because the media reports how our insecure computers are being infected every day. Our opponents harness precision-guided bits and bytes to deliver spam, cast phishing attacks, facilitate click-fraud, and launch a distributed denial of service (DDoS). The frequency of events and affected people and enterprises are alarming. Recent headlines expose that our money, personal privacy, infrastructure, and even our children are at risk. These network intrusions include but are not limited to: NASDAQ.--The operator of the Nasdaq Stock Market said it found ``suspicious files'' on its U.S. computer servers and determined that hackers could have affected one of its internet-based client applications.\1\ Investigators are considering a range of possible motives, including unlawful financial gain, theft of trade secrets, and a National-security threat designed to damage the exchange.\2\ Impact: Our investment plans and money are exposed. --------------------------------------------------------------------------- \1\ Jonathan Spicer. UPDATE 2-Hackers breach Nasdaq's computers. Reuters On-line. 5 February 2011. http://www.reuters.com/article/2011/ 02/05/nasdaq-hackers-idUSN05148621- 20110205. \2\ Devlin Barrett. ``Hackers Penetrate Nasdaq Computers.'' The Wall Street Journal. 5 February 2011. http://online.wsj.com/article/ SB10001424052748704709304576124502351- 634690.html. --------------------------------------------------------------------------- Epsilon.--Epsilon, which sends 40 billion emails annually on behalf of more than 2,500 clients, detected an incident on 30 March 2011. It determined that a subset of Epsilon clients' customer data were exposed by an unauthorized entry into Epsilon's email system. The information that was obtained was limited to email addresses and/or customer names and represented approximately 2% or 50 customers including Walgreens, Disney destinations, Best Buy, and Citigroup.\3\ The worry is that even months down the road, customers could get an email impersonating their bank or credit-card issuer containing poisonous web links. Once clicked, those links could install malicious code on their computers or try to trick them into giving up valuable information, such as credit card information or log-in data to their banks or social media accounts.\4\ Impact: Our personal credentials and privacy are at risk. --------------------------------------------------------------------------- \3\ Epsilon. Public Statement by Epsilon. 1 April 2011. \4\ Ki Mae Heussner. Epsilon Email Breach: What You Should Know. ABC News Online. 4 April 2011. http://abcnews.go.com/Technology/ epsilon-email-breach/story?id=13291589. --------------------------------------------------------------------------- RSA SecureID.--In March 2011, RSA informed its customers of a breach of its corporate network which could reduce the effectiveness of its SecureID two factor authentication token. On 21 May 2011, a leading U.S. defense contractor, Lockheed Martin, had its networks penetrated. The perpetrator(s) used duplicates of RSA's SecureID tokens to gain access to Lockheed's internal network.\5\ After this breach and several others resulting from the SecureID issue, RSA Security says it will replace tokens, upon customer request.\6\ Impact: Our trusted transactions (authenticated transactions) are at risk. --------------------------------------------------------------------------- \5\ Jeffrey Carr. ``An Open Source Analysis Of The Lockheed Martin Network Breach.'' Digital Dao Blog. 31 May 2011. http:// jeffreycarr.blogspot.com/2011/05/open-source-analysis-of-lockheed- martin.html. \6\ http://www.wired.com/threatlevel/2011/06/rsa-replaces-securid- tokens/. --------------------------------------------------------------------------- Sony's PlayStation Network was taken down on 20 April 2011.--A forensics team investigated the scope of the breach and by May 2, the breach reportedly had affected an estimated 100 million people and spread to Sony's Online Entertainment division. In an effort to show how vulnerable Sony was to a breach, the hacker group LulzSec exposed names, birth dates, addresses, emails, passwords, etc. of Sony's customers.\7\ As of the end of May, Sony has spent $171 million closing the vulnerabilities on its network and informing its customers of their exposure.\8\ Impact: Our children are at risk. --------------------------------------------------------------------------- \7\ Andy Bloxham. ``Sony hack: private details of million people posted online.'' The Telegraph. 3 June 2011. http:// www.telegraph.co.uk/technology/news/8553979/Sony-hack-private-details- of-million-people-posted-online.html \8\ Robert Westervelt. ``Sony breach timeline shows missteps.'' Security Bytes on-line. http://itknowledgeexchange.techtarget.com/ security-bytes/sony-breach-timeline-shows-missteps-says-security-firm/ 31 May 2011. --------------------------------------------------------------------------- Citigroup.--In early June 2011, computer hackers breached Citigroup's network and accessed the names, account numbers, and contact data of hundreds of thousands of bankcard holders in North America.\9\ This may be the largest breach of a financial institution to date, arming criminals with victim data. Impact: Our banks and money are at risk. --------------------------------------------------------------------------- \9\ Maria Aspan. ``Regulators pressure banks after Citi data breach.'' Reuters. 9 June 2011. http://news.yahoo.com/s/nm/20110609/ bs_nm/us_citi. --------------------------------------------------------------------------- Stuxnet.--The Stuxnet worm that was used to shut down Iran's nuclear program has been widely analyzed around the world. It targets control system vulnerabilities and its source code has been traded on the black market. Security officials worry that this worm will be used again to attack other critical infrastructures that rely on computers and have the same security flaws.\10\ Impact: Our critical infrastructure is at risk. --------------------------------------------------------------------------- \10\ Stewart Meagher. ``Stuxnet worm hits the black market.'' THINQ. 25 November 2010. http://www.thinq.co.uk/2010/11/25/stuxnet- worm-hits-black-market/. --------------------------------------------------------------------------- The cybersecurity problem is growing faster than the solution.-- Upon review of these cases, it can be determined that it costs less to break into a system or enterprise than it does to defend it. An infected thumb drive (USB key) that costs less than $10 can undermine an enterprise's security in minutes and nullify years' worth of information technology (IT) investments. Organizations everywhere are being penetrated--from small businesses to the world's largest institutions. Policy makers, legislators, and businessmen are assessing the gap between their current defensive posture (the floor) and their needed front-line defense (ceiling) in the face of a growing sophisticated range of actors. All of these facts are exasperated by the prolonged economic recovery that has placed significant pressures on enterprise IT budgets and focused actions toward meeting the minimum regulatory requirements like compliance at the expense of broader information security initiatives. The Comprehensive National Cybersecurity Initiative (CNCI) outlined these multidimensional threats along four attack vectors: Insider access,\11\ proximity access;\12\ remote access;\13\ and supply chain access \14\ and it provided a framework for unifying investments to shore up the Government's defense. President Obama's Cyberspace Policy Review re-stated that the Nation must become more resilient to all types of cyber-based attacks. While there has been activity against many of the recommendations in the Cyberspace Policy Review, there is a lot more that needs to be done. --------------------------------------------------------------------------- \11\ Unauthorized use or access to information, systems, and networks by otherwise trusted agents (employees). \12\ Gaining access to information or systems via deployment of technology in proximity to the target. \13\ Accessing target information and/or systems through network- based technical means (internet). \14\ Gaining advantage, control, and/or access to systems and the information they contain through manipulation by cooperative/witting vendors or unilaterally at any point in the supply chain between the manufacturer and end-user. --------------------------------------------------------------------------- cybersecurity in the 111th and 112th congress The 111th Congress considered more than 50 pieces of cybersecurity legislation. The wide range of topics addressed in these bills included proposed changes to organizational responsibilities; instituting compliance and accountability mechanisms; implementing data accountability standards and reporting requirements for personal data privacy, data breach handling and identity theft; enhancing cybersecurity education; advancing research and development grants; evaluating critical electric infrastructure protection and conducting vulnerability analysis of other critical infrastructures; expanding international cooperation on cybercrime; and addressing procurement, acquisition, and supply-chain integrity. Clearly, cybersecurity is a topic of interest and the sheer number of bills highlights the cross-jurisdictional interest of the subject. The 112th Congress has an opportunity to drive a new legislative conversation and address the shortfalls in our current laws. As of June 2011, at least ten pieces of cybersecurity legislation have been introduced in the United States Senate and at least another nine have been introduced in the United States House of Representatives. Appendix A contains a table that outlines some of the cybersecurity bills under consideration in the 112th Congress. Like many of the bills of the 111th Congress, the bills in the 112th address niches of the cybersecurity problems facing the Nation; even if taken together, none of them address the situation in a comprehensive manner. Cybersecurity legislative proposals reflect different approaches and priorities.--The 21st Century digital environment requires new laws that at a minimum address: data ownership; data handling; data protection and privacy; evidence gathering; incident handling, monitoring and traceability; rights and obligations related to data breach and data transfers; access to data by law enforcement or intelligence services; and degree of Government assistance (e.g., subsidy, information, technology, liability relief) to close the gap between threat, innovation, and competitiveness. The Cyberspace Policy Review identified scores of laws that needed to be updated. In May 2011, the administration put forward its cybersecurity legislative proposal. It reflects the efforts of an interagency, consensus-based system and a diversity of views across six proposals. Like Congress, it shows the jurisdictional focus by specific mission areas. Two specific areas of the administration's package have been debated in the last two sessions of Congress: (1) Amending the Federal Information Security Management Act (FISMA) from a static compliance- based system to one of continuous monitoring; and (2) providing a Federal umbrella to unify guidance of the 47 disparate State data breach laws. The four remaining areas of the administration's package represent new legislative proposals. Briefly, they seek to: (1) Update the Computer Fraud and Abuse Act (CFAA) by stiffening penalties for breaches and theft of information; (2) grant new authorities for DHS-- enabling them to deploy Intrusion Prevention Systems (IPS) in the .gov domain and allow DHS to turn to Internet Service Providers (ISPs) to conduct that mission on behalf of the Government (with liability relief); (3) establish critical infrastructure regulation, set mandatory standards for ``covered'' critical infrastructures, and an audit and compliance regime that mandates private sector entities to attest to cybersecurity risk management plans; and (4) prevents restrictions on data center locations (i.e., States can't specify that a data center be located in a certain State). As Congress considers these proposals, it will be important to gain industry's perspective and understand the second- and third-order effects of the proposals. For example, which sectors will be considered ``covered'' critical infrastructure, and therefore subject to regulation under the new rules? The President's International Strategy for Cyberspace implies that the Energy, Transportation, Financial Services, and Defense Industrial Base (DIB) sectors will be named the ``covered'' critical infrastructures. The legislative proposal states, ``the owners or operators of covered critical infrastructure shall develop cybersecurity plans that identify the measures selected by the covered critical infrastructure to address the cybersecurity risks in a manner that complies with the regulations promulgated, and are guided by an applicable framework designated.''\15\ This proposal attempts to establish a minimum standard of care and an audit and certification function that would be similar in kind to the Securities and Exchange Commission (SEC) requirement for attestation of material risks. In my view, inserting DHS into a regulator role in this context could dilute its operational and policy responsibilities and likely detract from the Nation's security posture. In May 2011, Senator Rockefeller asked the SEC to look into corporate accountability for risk management through the enforcement of material risk reporting.\16\ And in June 2011, Chairman Schapiro said that the SEC would look into the matter. If Congress believes corporations should meet such a reporting requirement then it should turn the Executive Branch Independent Agency that is responsible for this type of reporting and not add an additional mission responsibility to DHS. And while regulation may be necessary, Congress should also consider the use of other market levers (e.g., tax relief, research and development subsidy, etc.) to incentivize industry investment in information security. --------------------------------------------------------------------------- \15\ The White House. Cybersecurity Legislative Package: Cybersecurity Regulatory Framework For Covered Critical Infrastructure Act. Page 3. \16\ Senator Rockefeller letter to SEC Chairman Mary Schapiro. 11 May 2011. --------------------------------------------------------------------------- Additionally, the administration is proposing new authorities for DHS by establishing a National Cybersecurity Protection Program (Section 244) that authorizes DHS to actively protect Federal systems. The package states, ``the Secretary is authorized, notwithstanding any other provision of law and consistent with section 248(a), to acquire, intercept, retain, use, and disclose communications and other system traffic that are transiting to or from or stored on Federal systems and to deploy countermeasures with regard to such communications and system traffic.''\17\ Of course more active measures must be taken to protect Federal systems from cybersecurity threats because passive defenses are simply not enough. The question that Congress needs to carefully consider is which entities in the Government (e.g., Federal Bureau of Investigation (FBI), National Security Agency (NSA), or DHS) are the appropriate entities to help secure the Federal Government systems? Are there appropriate checks and balances in place to oversee these new or extended authorities? --------------------------------------------------------------------------- \17\ The White House. Cybersecurity Legislative Package: Department of Homeland Security Cybersecurity Authority. Page 6. --------------------------------------------------------------------------- This discussion will become even more important as Congress debates the merits of Government involvement in the protection of private sector networks. The Washington Post reported last week that NSA ``is working with internet service providers to deploy a new generation of tools to scan e-mail and other digital traffic with the goal of thwarting cyber-attacks against defense firms by foreign adversaries.''\18\ Certainly other nations are turning to their ISPs as a front line of defense in protecting their Government and private sector networks. But, is this a mission that we want NSA to lead, or is it one that we expect DHS to undertake? --------------------------------------------------------------------------- \18\ Ellen Nakashima. ``NSA allies with internet carriers to thwart cyber attacks against defense firms'' The Washington Post. 7 June 2011. --------------------------------------------------------------------------- As scary and as problematic as these threats are and intrusions may be (and as devastating as they may be), it is important that the defensive posture not overtake our core freedoms. We should also respect the long-standing limitations on the role of the military as it relates to public safety and civilian activities. This is why, in my opinion, the administration's legislative package proposes the section (245) for voluntary disclosure of cybersecurity information. It addresses shortfalls in the law and aims to extend the Provider Exception (i.e., 18 U.S.C. 2511(2)(a)(i)) to include protection against network attacks and prevention of delivery of malware to the end user and provides liability relief for the reporting mechanism back to the Government (currently not permitted under the law). One could argue that this is what is being mandated via the code of conduct in Australia and via the recent pan-European telecommunications reform that will be transposed into National laws in the coming months. The European mandate obliges the ISPs to take more responsibility for providing enhanced security services to their customers and report all security incidents to the European Network and Information Security Agency (ENISA). clarifying dhs's role: policy, operational, or regulatory All of the legislative proposals reflect the dilemma of a co- dependent relationship between the private sector that develops, owns, and operates the internet-based infrastructure for which the Government is responsible for delivering essential services (e.g., power, water, telephone, etc.) and ultimately providing economic prosperity and security. Our responses include organizational restructuring, regulation, and attempts to centralize decisionmaking all with the intent to reduce the vulnerabilities and minimize the damages of intrusions. We appear to be asking DHS to take on new cybersecurity roles and missions while it is establishing its basic core competencies. Is this reasonable? Do we want DHS to become a first- party regulator? Do we want DHS to assume an operational role that provides actionable information to the private sector and provides active defense of Federal systems? Or do we want DHS to assume a broader policy role and become the National architect for a more secure and resilient infrastructure? Perhaps it would be better to focus DHS on becoming a center of excellence in one or two areas. 247 information security capability (operational) Becoming an operational center of excellence that disseminates timely and actionable cybersecurity threat, vulnerability, mitigation, and warning information, including alerts, advisories, indicators, signatures, and mitigation and response measures, to improve the security and protection of Federal systems and critical information infrastructure is necessary. To be successful requires DHS to adopt a 247 ``customer service'' business model, where its customers are other Federal agencies; State, local, Tribal, and territorial governments; the private sector; academia; and international partners. It would need to learn from successful customer service industries and embed the necessary industry partners (like the member companies of the National Security Telecommunications Advisory Committee) within its operations. It would need to pass knowledge onto its customers that removes the sensitive sources and methods that make it classified and therefore make it more readily available and actionable. There are many other aspects of a 247 information security operation that DHS could take on. Some of these capabilities are outlined in the administration's legislative package and some additional capabilities are outlined in other pieces of pending legislation. Yet it is important to admit that establishing an effective 247 operation is no small task. It requires real specialization and technical expertise, a commitment to providing a 100% up-time service, and if an incident occurs, an ability to turn to the private entities that will likely be called upon to operate in a degraded state and restore operations (and infrastructures) quickly. While it is possible that the National Cybersecurity and Communications Integration Center (NCCIC) could evolve and assume this role, it would require it to become an independent operational unit carved out of the headquarters entity of DHS--akin to United States Secret Service or the Drug Enforcement Agency. If we are truly interested in setting up a 247 operation immediately, then DHS in cooperation with the Department of Defense (DoD) could call up specialist cybersecurity units within the National Guard or DoD Reserve Forces. DHS could also turn to outside organizations, such as the Carnegie Mellon Computer Emergency Response Team (CERT-CC) to further augment its staff. national architect and advocate for secure and resilient infrastructures (policy) Congress and the administration also turn to DHS raise awareness, fund education initiatives, incubate technology, and broadly set cybersecurity policies for the critical infrastructures. At the forefront, DHS is responsible for increasing public awareness. It is currently sponsoring a competition to develop a public service announcement (PSA) on cybersecurity to augment the October Cybersecurity Awareness Month. It is also conducting a review of the university participation in the National Centers of Academic Excellence in Information Assurance to determine how it can increase the number of universities participating, obtain full 50-State participation, increase the output of students per program, and align more closely with the National Science Foundation's Scholarship for Service. Linking these programs to hands-on experiential learning like that of the high- school, university, and professional competitions sponsored by the U.S. Cyber Challenge would be a natural next step. Moreover, DHS's recently released a paper entitled, ``Enabling Distributed Security in Cyberspace Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action'' that explores the idea of a healthy, resilient--and fundamentally more secure--cyber ecosystem of the future. It envisions an environment of cyber participants, including cyber devices, that are able to work together in near-real time to anticipate and prevent cyber attacks, limit the spread of attacks across participating devices, minimize the consequences of attacks, and recover to a trusted state.\19\ If DHS were to drive the implementation of this vision it will require DHS to modify its relationship with industry, consolidate the number of private-public partnerships, and drive the development of standards in partnership with the National Institute of Standards and Technology (NIST). It will also require DHS to lead the discussion on behalf of the Executive Branch for the following questions: ``What are the business drivers that will incentivize the necessary investments? What are the appropriate roles and responsibilities of the public and private sector in delivering the healthy ecosystem? Which elements should be prioritized for early realization? As a healthy cyber ecosystem emerges, governance questions become salient. Will system owners cede decisionmaking to the community? Who sets policy for inter- enterprise information exchange and deployment of countermeasures? What liability regimes apply for collateral consequences of countermeasure deployment (or the failure to deploy known countermeasures)? What legal authorities should local and National governments, as well as international entities, have to compel action by devices owned by or serving private parties in order to secure the larger cyber commons?''\20\ --------------------------------------------------------------------------- \19\ Department of Homeland Security. ``Enabling Distributed Security in Cyberspace Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action.'' 23 March 2011. \20\ Department of Homeland Security. ``Enabling Distributed Security in Cyberspace Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action.'' 23 March 2011. Page 27. --------------------------------------------------------------------------- Like the operational role, this policy-based role requires personnel who are steeped with background in policy development and the art of negotiation. It also requires understanding of the technical underpinnings of the next generation hardware and software and knowledge of the standards-setting processes. Raising awareness and advocating a new architecture of hardware and software products for industry to build toward is no small task. If Congress and the administration want DHS to be the National voice for cybersecurity, they cannot necessarily be saddled with all of the operational and regulatory missions that are recommended in the legislative proposals. first-party regulatory role vice-setting standards Is it possible for regulation to keep pace with technology development and adoption? Has the market failed to produce secure and resilient hardware and software products? Many of the critical infrastructures are already regulated (e.g., energy, finance, telecommunications) and NIST works with the Sector Agency and DHS to set the standards by which industry has to meet. But as evidenced by the three volume edition on Guidelines for Smart Grid Cybersecurity,\21\ the standards are not always published in time for market penetration and adoption. So, what is the role of the private sector in policing itself, adapting to new industry standards and upgrades, and coping with accelerating threats? The North America Electric Reliability Corporation (NERC) works across the electric power sector to set the standards and help ensure compliance. However, due to the intermingling of State and Federal regulation the industry usually adopts a lower standard leaving some vulnerabilities unaddressed. Existing standards will never be sufficient in light of a sophisticated, perhaps nation-state adversary, but they can be strengthened. --------------------------------------------------------------------------- \21\ Department of Commerce, National Institute of Standards and Technology. Guidelines for Smart Grid Cybersecurity (3 volumes). August 2010. --------------------------------------------------------------------------- What may be more useful would be if DHS, supported by the FBI and intelligence community, were to inform industry of the threats they are facing and how they are being exploited or penetrated. A training program that educates corporate leadership on how to mitigate the risk of being a high-value target including providing them with briefings about the threat to their industry using specific case studies may go along way to reducing the number of incidents and loss of confidential information. Furthermore, as some companies are ``personally'' touched by the penetration of their networks (e.g., Sony and Citigroup), they may be extra motivated to invest in and promote stronger information security standards for their industry and customers alike. As Congress considers placing DHS into more of a regulatory role, it should consider the impact of the possible dilution of its operational and policy responsibilities. While some say DHS's input and support of streamlining CIP standards has had a positive affect, is it making enough of a difference? Is it best to educate the first-party regulators and help them improve the security posture of the Nation? How are the other existing regulatory bodies (SEC, FCC, FERC, or FTC) using their current authorities to address the situation? Would strengthening the regulatory oversight of the SEC, FCC, FERC, or FTC help or hurt the situation? conclusion The 112th Congress has an opportunity to drive a new legislative conversation and address the shortfalls in our current laws. The cybersecurity problem is growing faster than the solution and we cannot afford to be faced with strategic surprise to address the problem. FISMA reform and a National data breach umbrella are needed. Additionally, modern-day criminals are using our legal systems' speed, or lack thereof, to their advantage. We need to stiffen penalties and modernize the laws that are not keeping pace with today's digital environment. We need to empower the National security community charged with protecting the Nation and its critical infrastructure from cyber exploitation or attack. The Computer Fraud and Abuse Act, Electronic Communications and Privacy Act, Stored Communications Act, Telecommunications Act, and Economic Espionage Act are among some of the laws that need to be reviewed and updated. Congress should seek industry's perspective and debate the advantages and challenges associated with fielding a robust active defense capability, imposing standards and regulation on industry, and demanding more of DHS. An overly restrictive approach should be avoided yet, we cannot afford to pass legislation that would prove to be feckless. I thank you very much for the opportunity to testify, and look forward to your questions. Exhibit A REVIEW OF CYBERSECURITY LEGISLATION IN THE 112TH CONGRESS ------------------------------------------------------------------------ United States House of United States Senate Representatives ------------------------------------------------------------------------ S. 8, Tough and Smart National Security H.R. 76, Cybersecurity Act. Education Enhancement Act of 2011. S. 21, Cyber Security and American H.R. 96, Internet Freedom Act Cyber Competitiveness Act of 2011. of 2011. S. 28, Public Safety Spectrum and H.R. 174, Homeland Security Wireless Innovation Act. Cyber and Physical Infrastructure Protection Act of 2011. S. 372, Cybersecurity and Internet H.R. 607, Broadband for First Safety Standards Act. Responders Act of 2011. S. 413, The Cybersecurity and Internet H.R. 668, Secure High-voltage Freedom Act of 2011. Infrastructure for Electricity from Lethal Damage Act (SHIELD Act). S. 709, Secure Chemical Facilities Act. H.R. 1136, Executive Cyberspace Coordination Act of 2011. S. 813, Cyber Security Public Awareness H.R. 1389, Global Online Act of 2011. Freedom Act of 2011. S. 968, Preventing Real Online Threats H.R. 1540, National Defense to Economic Creativity and Theft of Authorization Act for Fiscal Intellectual Property Act of 2011 Year 2012. (PROTECT IP Act). S. 1101, Electronic Communications and ............................... Privacy Act--Amendments Act (Digital Privacy Bill). S. 1151, Personal Data Privacy and ............................... Security Act of 2011. ------------------------------------------------------------------------ Mr. Lungren. Thank you very much for your testimony. Now Dr. Shannon. STATEMENT OF GREGORY E. SHANNON, CHIEF SCIENTIST FOR COMPUTER EMERGENCY READINESS TEAM (CERT), SOFTWARE ENGINEERING INSTITUTE, CARNEGIE MELLON UNIVERSITY Mr. Shannon. Thank you, Chairman Lungren, Ranking Member Clarke, and other Members of the subcommittee, for me to talk about, this morning, the future of cyber incident response. I applaud the current efforts of Congress to mitigate risks to our public and private critical information infrastructures. CERT, as you mentioned, is a Federally-funded Department of Defense research and development lab. We have over 250 staff that have been working on this challenge of incident response since 1988, when the Morris worm first was experienced. For example, we catalogue over a quarter-million malware artifacts each month. We assist in major, on-going cybersecurity incidents of National importance. We release security coding guidelines and technologies for the C, C++, and Java programming languages. While much is said about risk mitigation, incident response receives less focused attention as a strategic technical area, yet it is critically important. Vigorous attacks on our network environments will continue for the foreseeable future, failures will occur, and effective responses are required. The Federal Government must look at incident response as strategic, just as it looks at preventative efforts. The U.S. CERT and other capabilities are a part of this effort. Our country needs legislation that will facilitate capable, scalable, cost-effective cybersecurity incident response for critical Government infrastructure. Things will fail in unexpected ways, and our Nation must have the capacity to respond accordingly. I believe that the most difficult technical challenge to both effective risk mitigation and incident response is selecting practices that are scientifically sound and operationally proven. We do not want to be guessing. I encourage you to consider in the rulemaking language that valid approaches be considered. The complexity of practices and regimes being proposed will probably have unintended and unexpected consequences. Some approaches aren't fully proven, experimentally or operationally. Again, I encourage you to use language that calls that out in the rulemaking. I believe that the most difficult policy challenge for effective Government incident response is harmonizing the responsibilities, authorities, capabilities, and communication across the various agencies, as Ms. Hathaway has highlighted. At CERT, part of our value to the Government has been the ability to bridge these gaps and misalignments in the midst of the response to a critical cybersecurity incident. But we recognize that that is not the ideal way, going forward, to be ad hoc. Three areas that we highlight in the written testimony is: Data sharing, forensics, and training. I would encourage--I applaud the effort of safe harbors in Section 246 for organizations and individuals that are attempting to do the right thing. The notion of ``right thing'' in incident response is a well-founded principle that individuals, organizations often know what the right thing to do is, and it is important that the policies and such be aligned to support that. On the forensics side, what we are seeing is an excellent use of potential cloud-based computing, private clouds, to support a broad capability for the law enforcement community to do investigations at scale. As these incidents increase in scope and scale, the ability to respond quickly with appropriate forensics, to maintain the velocity of the investigation, as well as to collect the evidence that could be used in court, is important. Finally, on training, one of the key challenges is how to train as the technical people work, or, as the Department of Defense says, train as you fight. The environments that we are in are complex. The threats that are experienced are even more complex and less likely to be experienced. Part of the work we do is to encourage the ``train as you work'' mentality, to be realistic. We at CERT look forward to the day when our Nation's cybersecurity resiliency is founded on the effective mitigation of cyber risks and pervasive capabilities to respond to cybersecurity incidents. I see this legislation and the related modifications and efforts as an important step in the right direction. For your benefit, I would like to also submit an article from Nature. It talks about the Stuxnet. This was in the June issue. At the end of it, it highlights some of the technical challenges from a science-of-security point of view. I would like to also submit that into the written record. Mr. Lungren. Without objection, that shall be accepted.* --------------------------------------------------------------------------- * The information has been retained in committee files and is available at http://www.nature.com/news/2011/110608/full/474142a.html. --------------------------------------------------------------------------- Mr. Shannon. Okay. Thank you for your time. [The statement of Mr. Shannon follows:] Prepared Statement of Gregory E. Shannon June 24, 2011 Chairman Lungren, Ranking Member Clarke, and other distinguished Members of the subcommittee, thank you for the opportunity to testify, it is my pleasure to be here this morning to discuss cyber incident response. about cert The CERT Program is part of Carnegie Mellon University's Software Engineering Institute, a Federally-funded research and development center, and is located on the Carnegie Mellon campus in Pittsburgh, Pennsylvania. The CERT program (http://www.cert.org/) was charged by DARPA in 1988 to set up the first Computer Emergency Response Team (CERT) as a response to the Morris worm incident. We continue to develop and promote the use of appropriate technology and systems management practices to resist attacks on networked systems, limit damage, and restore continuity of critical services. CERT works both to mitigate cyber risks and coordinate cyber incident responses at local, National, and global levels. Over the last 23 years CERT has helped to establish over 200 CERT computer security incident response teams (CSIRTs) around the world--including the DHS US-CERT. We continue to have proven success transitioning research and technology to those who can implement it on a National scale. Dr. Greg Shannon is the Chief Scientist for the CERT Program, where he works to establish and enhance the program's research visibility, initiatives, strategies, and policies. testimony Today's operational cyber environments are complex and dynamic. User needs and environmental factors are constantly changing, which leads to unanticipated usage, reconfiguration, and continuous evolution of practices and technologies. New defects and vulnerabilities in these environments are continually being discovered, and the means to exploit these environments continues to rise. The CERT Coordination Center cataloged 250,000 instances of malicious artifacts last month alone. From this milieu, public and private institutions respond daily to repeated attacks and also to the more serious previously un-experienced failures (but not necessarily unexpected); both demand rapid, capable, and agile responses. Incident response, as a discipline, is maturing. Over the last two decades, it has emerged from the shadows of IT and risk management, to achieve recognition as a robust and growing discipline.\1\ Signs of this progress include the emergence of process models, meta-models, bodies of knowledge, common data representations, and auditable standards. Further development, and continued funding, will enable faster and more efficient dissemination of information to trusted partners in larger trust networks. --------------------------------------------------------------------------- \1\ For example, this fall, CERT and the Institute for Information Infrastructure will hold a workshop on Coordinated Private-Sector Responses to Cyber Security Incidents. This is a follow on to I3P's 2009 workshop on Protecting Critical Infrastructures: The National Capital Region as a Model for Cyber Preparedness. --------------------------------------------------------------------------- I applaud the current efforts of the Federal Government to mitigate risk to our public and private critical information infrastructures; CERT has worked tirelessly to improve cybersecurity in areas such as secure coding, insider threat, and vulnerability analysis. But, while much is said about risk mitigation, incident response is often not as thoroughly addressed, and is critically important. Networked environments will continue to be vigorously attacked for the foreseeable future. Failure will occur and effective responses are required. Incident response is not a single action but rather a complex function that includes containment, repair, and recovery.\2\ The Federal Government must look at incident response as strategic, just as it looks at preventative efforts. Our country needs legislation that will facilitate capable, scalable, and cost-effective cyber-incident response for critical and Government infrastructure. Things will fail in unexpected ways and our Nation must have the capacity to respond accordingly. --------------------------------------------------------------------------- \2\ Some contend that retaliation is part of incident response; I disagree. The response community does not consider it in scope for incident response as practiced today. Other organizations and disciplines are better suited to address this issue. --------------------------------------------------------------------------- I believe that the most difficult technical challenge to effective risk mitigation and incident response is selecting practices that are scientifically sound and operationally proven. The complexity of practices and regimes being proposed in legislation and elsewhere will probably have unintended and unexpected consequences. I encourage the subcommittee to use language in legislation that encourages practices that are both experimentally and operationally validated. I believe that the most difficult policy challenge for effective Government incident response is harmonizing the responsibilities, authorities, capabilities, and communication across the various agencies involved. I support the current efforts in this. In my remaining testimony I discuss three areas that we at CERT believe are key to the future of incident response. information sharing We all realize how critical it is for stakeholders to share information, but good incident response is contingent upon sharing the right information, with the right people, at the right time. High- quality and actionable information comes from superior situational awareness only possible with robust information sharing and sufficient visibility into one's own enterprise. Currently, our technical capabilities allow us to see and respond to variant indicators, but to better detect, share, and respond to incidents analysts need to be able to look past narrowly-focused indicators. Achieving this enhanced situational awareness will require continued research on network traffic and data. The ability to detect malicious markers that are invariant, such as behavioral-based indicators (e.g. insider threats) will enable a more proactive response. To facilitate innovation, richer data needs to be shared with the research community, not only incident data itself, but also data- sets that will enable an understanding of what ``normal'' resembles. Currently, the community does not have a clear understanding of what this data set would look like. If situational awareness is to develop beyond simple indicators, regulatory frameworks must allow access to everyday data, so that investigators can begin to recognize what data- set are important. This data sharing should start with limited access to high-fidelity data sets for researchers so that data with scientifically proven value is considered for sharing operationally. Otherwise, policymakers and experts are left to speculate what is the right data to share. To further improve the future efficiency and effectiveness of incident response, the community also needs to develop and use automated tools and techniques to analyze and correlate the vast amount of log files, artifacts, and other event information. Moreover, compliance-driven information sharing will only lead to the bare minimum disclosure of sensitive information related to problems, concerns, and vulnerabilities. Building trusted relationships with stakeholders becomes essential to avoiding such limited information exchange and is a fundamental ingredient to a successful response. We also have to trust the people in the field and those who first respond to incidents. I applaud the effort in this legislation to support actions to do the ``Right ThingTM''; this is an important principle in the response community and is the basis of successful responses in many highly stressful incidents. Safe harbor measures such as Sec. 246 in the administration's Cybersecurity Legislative Proposal work towards continued encouragement to share data; however in response scenarios it is worthwhile to consider including the actions of cyber ``first responders'' into good faith legislation as well. forensics While gains have been made in the field of incident response the nature of the ever-evolving cyber threat poses a huge challenge and demand for incident response expertise that has far outstripped the supply. Computers are no longer just the targets of crime; our adversaries now use them to facilitate every aspect of their illicit activities and achieve effects at scale. Once an incident occurs Federal agencies are facing several hurdles to recover the needed data in order to locate the source of the incident and contain the problem. First, computer forensic labs are constrained by a lack of resources, creating an enormous backlog rendering them unable to handle the megafold increases in the volumes of data that need to be examined for evidence. While some agencies may have the qualified examiners, and many do not, they lack the funds to properly equip them for the mission. For example, current examination methods rely heavily on processor power, but due to dramatically increased computer memory, examination stations often cannot keep up. Finally, the current state of the practice does not allow examiners to easily access varied levels of expertise in a timely or cost-effective way; frequently people are sent Temporary Duty or images are shipped to higher level units, resulting in time delays and increased costs. To successfully respond to cyber incidents these obstacles must be overcome in a way that allows for high-quality collaborative examinations. For instance, what would happen if an adversary perpetrated an actual, severe cyber event with National consequences? Currently there is no one facility or lab that could support the volume of data these kinds of events would generate. Under current conditions, data would have to be distributed, adding to the time and complexity of conducting examinations. Agencies will need to augment scarce resources by having multiple users viewing the same data either remotely or locally, while maximizing the application of specialized computing resources, and allowing for massive, coordinated efforts. Analysts and investigators will need flexible, secure access to high-performance systems, to increase productivity and facilitate effective distributed collaboration in a scalable and cost-effective way. training In order to rapidly handle cyber incidents the Federal Government needs a workforce educated and equipped to respond. However, the rapid changes and dynamic nature of cybersecurity make keeping the workforce up to date a very challenging problem. Responding to critical cyber events requires technical knowledge and skills, decision-making abilities, and effective coordination--all while moving rapidly. Moreover, a lack of preparation inhibits secondary incident-handling activities, such as: Evidence gathering, identifying the attacker, and reporting the incident to other affected organizations. The Federal Government must have an agile and prepared workforce to deal with cyber incidents, and should to be able to train them in a cost-effective and scalable manner. The most common workforce development training solution is the traditional classroom training model. While this training model is easy to implement and is widely used, there are a number of reasons why it is not adequate for providing effective, large-scale training to a technical workforce, including time, cost, and scalability. Furthermore, traditional classroom training is not optimal for rapidly- changing fields such as cybersecurity. The best way to prepare the workforce is to have them practice under realistic conditions with interactive simulations, and the ability to interface with participants across multiple locations who can work together to analyze and respond to the latest threats and attacks. Individuals need to be trained on a platform that safely mimics how the internet would respond to stress and exposes them to real-world scenarios, events, and activities that are similar to those they will encounter in their jobs. In addition, there are two incident response domains where we see an immediate need for further training. The first is reverse engineering, to grow capacity in analyzing malware recovered from an incident. The second domain is embedded systems, which pose many unique challenges for incident response and which some experts believe will be a major cybersecurity problem area in the near future. The workforce needs to not only be trained, but also educated. For example, in the case of forensics, much of the training the workforce receives is how to use tools, but when those tools are not effective no one is educated on how to manage the situation or apply critical thinking to determine alternative approaches. What's more, to train the workforce to manage cyber incidents the Federal Government needs to expand the scope of computer or cybersecurity training to include first responder training and best practice guidance. Without proper education a first responder may unintentionally cause irrevocable damage by doing something as simple as turning off a computer. This will not only cause lost data, but can also result in severely slowing an investigation and compromise the potential prosecution of the perpetrator. In conclusion, I thank the subcommittee again for inviting me and considering my testimony. Our Nation will continue to see significant serious cyber incidents for the foreseeable future. CERT's mission is to help ensure that these incidents are not catastrophic and that we recover as quickly as possible. We at CERT look forward to the day when our Nation's cyber resiliency is founded on the effective mitigation of cybersecurity risks and pervasive capabilities to respond to cybersecurity incidents. I see this legislation and the related modifications and efforts as an important step in the right direction. Mr. Lungren. Mr. Williams. STATEMENT OF LEIGH WILLIAMS, PRESIDENT, BITS, THE FINANCIAL SERVICES ROUNDTABLE Mr. Williams. Thank you, Chairman Lungren, Ranking Member Clarke, and Members of the committee. My name is Leigh Williams, and I am president of BITS, the technology policy division of The Financial Services Roundtable, where we address security fraud and other technology issues on behalf of our 100 member institutions, their millions of customers, and all of the stakeholders in the U.S. financial system. In my remarks today, I will briefly describe cybersecurity in financial services, explain why The Roundtable supports the Obama administration's cybersecurity legislation, and comment on some of the strong provisions of H.R. 174. In my view, most cybersecurity protection arises from individual institutions investing literally tens of billions of dollars and tens of millions of hours in voluntary measures for business reasons. Up at the industry level, BITS and several other coalitions promote best practices for protecting customer information. For example, BITS is currently addressing security in mobile, cloud computing, social networking, protection from malicious software, and security training and awareness. Beyond these voluntary efforts, our members are also subject to a range of oversight mechanisms to ensure consistency throughout the industry. Just to take security and privacy provisions of Gramm-Leach-Bliley as an example, Congress enacted GLB; the banking regulators detailed it in Reg P; Reg P was translated into examination guidance; banks used that guidance to manage their risk and the risk of their service providers; examiners audit the banks against it; Treasury monitors their consistency; and then just to bring this whole process full circle, the Congress oversees Treasury and the agencies. Beyond this sector-specific work, we collaborate more and more with DHS, with law enforcement, with the intelligence community, and with other industries on a variety of projects, including one that we have launched recently with DHS, the Cyber Operational Resiliency Review, where institutions can invite DHS to review their control practices and their network traffic. As the committee considers action on cybersecurity, I would urge Members to appreciate these current safeguards and these existing collaborations so that we might leverage all of them for maximum benefit. Even given this headstart, we believe that comprehensive cybersecurity legislation is warranted. It can improve security throughout the cyber ecosystem, including in telecom networks, in software and hardware supply chains, in Federal systems, and in our sector. Specifically, The Roundtable supports the administration's legislative proposal. We support many of the provisions on their individual merits, and we see the overall proposal as an important first step in building a more integrated approach. We do believe that harmonizing the comprehensive approach and the sector-specific mechanisms will be a challenge. There are at least a couple of ways of bridging this ecosystem sector divide. First, Congress could establish uniform standard but with exceptions where substantially similar requirements already are in place, as in the banking regulators' breach notification rules. Or Congress could reserve more autonomy for the sectors. For example, it could be the sector-specific agencies, and not DHS, that designate the critical sector entities or systems or assets. In other specific provisions of the proposal, we support strengthening penalties for computer crime, including the theft of intellectual property. We support a uniform national standard for breach notification with strong preemption. And we support the Federal systems provisions, both to safeguard the data that we report and to the systems and because we believe, as the Chairman has suggested, that Government should use its procurement power to model good behavior. On H.R. 174, the Homeland Security Cyber and Physical Infrastructure Protection Act, we see two more promising options for harmonizing DHS and sector-level work. DHS can delegate authority to the sector, and DHS is instructed to use the primary regulators as conduits to the covered companies. With these options, delegation and conduit, and the options in the administration proposal already in place, and sector plus aggregation, we should be able to take full advantage of both the sector and DHS. Finally, we appreciate H.R. 174's focus on risk-based performance-based regulation, on R&D, and on information-sharing among the critical companies and key agencies. In conclusion, may I just say that at The Financial Services Roundtable we will continue to strengthen security around our customers' information, we will help answer the question of ecosystem sector balance, and we will support and we will work to implement the administration's cybersecurity proposal. Thank you very much for your time. [The statement of Mr. Williams follows:] Prepared Statement of Leigh Williams June 24, 2011 Thank you Chairman Lungren, Ranking Member Clarke, and Members of the committee for the opportunity to testify before you today. My name is Leigh Williams and I am president of BITS, the technology policy division of The Financial Services Roundtable. BITS addresses issues at the intersection of financial services, technology, and public policy, on behalf of its 100 member institutions, their millions of customers, and all of the stakeholders in the U.S. financial system. From this perspective, I will briefly describe cybersecurity and data protection in financial services, including private sector efforts, sector-specific oversight and inter-sector interdependencies. I will explain why The Financial Services Roundtable supports the cybersecurity proposal delivered by the Obama administration to the Congress on May 12. Finally, I will comment on the key provisions of H.R. 174, which I understand is under active consideration by the committee. financial institutions' voluntary cybersecurity efforts Within the financial services sector, the greatest amount of cybersecurity protection arises from voluntary measures taken by individual institutions for business reasons. To protect their retail customers, commercial clients and their own franchises, industry professionals--from Chief Information Security Officers to CIOs to CEOs--are increasingly focused on safeguards, investing tens of billions of dollars in data protection. They recognize the criticality of confidentiality, reliability, and confidence to their success in the marketplace. This market-based discipline is enforced through an increasingly informed consumer base, and by a very active commercial clientele that often specifies security standards and negotiates for audit and notification rights. At the industry level, BITS and several other coalitions facilitate a continuous process of sharing expertise, identifying and promoting best practices, and making these best practices better, to keep pace in a dynamic environment. For example, as BITS and our members implement our 2011 business plan, we are addressing the following items associated with protecting customer data: Security standards in mobile financial services. Protection from malicious or vulnerable software. Security in social media. Cloud computing risks and controls. Email security and authentication. Prevention of retail and commercial account takeovers. Security training and awareness. While much of this institution-level and industry-level effort is voluntary--not driven primarily by regulation--it is not seen by industry executives as discretionary or optional. The market, good business practices and prudence all require it. oversight To strengthen public confidence and to ensure consistency across a wide variety of institutions, Federal financial regulators codify and enforce an extensive system of requirements. Many of these represent the distillation of previously voluntary best practices into legislation introduced in Congress, enacted into law, detailed in regulation, enforced in the field, with feedback to the Congress in its oversight capacity. In addition to these Federal authorities, institutions are subject to self-regulatory organizations like the Financial Industry Regulatory Authority (FINRA), State regulators like the banking and insurance commissioners, independent auditors, outside Directors, and others. These various oversight bodies, for example, apply the Financial Services Modernization Act of 1999 (GLB), the Fair and Accurate Credit Transactions Act (FACTA), Electronic Funds Transfers (Regulation E), Suspicious Activity Reporting (SARs), the International Organization for Standardization criteria (ISO), the Payment Card Industry Data Security Standard (PCI), BITS' own Shared Assessments and many, many more regulations, rules, guidelines, and standards. inter-sector collaboration Commensurate with the escalating cybersecurity challenges and increasing interconnectedness among sectors, more and more of our work entails public/private and financial/non-financial partnerships. Our Financial Services Sector Coordinating Council (FSSCC) of 52 institutions, utilities, and associations actively partners with the 17 agencies of the Finance and Banking Information Infrastructure Committee (FBIIC). [For additional detail on the FSSCC's perspective on cybersecurity, research and development, and international issues, please refer to the April 15, 2011 testimony of FSSCC Chair Jane Carlin before this subcommittee.] Our Financial Services Information Sharing and Analysis Center (FS-ISAC) is in constant communication with the Department of Homeland Security (DHS), law enforcement, the intelligence community and ISACs from the other critical infrastructure sectors, to address individual incidents and to coordinate broader efforts. Other examples of collaboration with non-financial partners, drawn just from BITS' 2011 agenda, include: The Cyber Operational Resiliency Review (CORR) pilot, in which institutions may voluntarily request Federal reviews of their systems, in advance of any known compromise--with DHS and the Treasury. Multiple strategies for enhancing the security of financial internet domains--with the Internet Corporation for Assigned Names and Numbers (ICANN) and Verisign, in partnership with the American Bankers Association (ABA) and in consultation with members of the Federal Financial Institutions Examination Council (FFIEC). A credential verification pilot--with DHS and the Department of Commerce--building on private sector work that began in 2009, was formalized in a FSSCC memorandum of understanding in 2010, and was featured in the April 15, 2011 announcement of the National Strategy for Trusted Identities in Cyberspace (NSTIC). Through the processes and initiatives above and in many other efforts, financial institutions, utilities, associations, service providers and regulators continue to demonstrate a serious, collective commitment to strengthening the security and resiliency of the overall financial infrastructure. As the committee considers action on cybersecurity, I urge Members to be conscious of the protections and supervisory structures already in place and the collaborations currently underway, and to leverage them for maximum benefit. need for legislation Even given this headstart and substantial momentum, we believe that cybersecurity legislation is warranted. Strong legislation can catalyze systemic progress in ways that are well beyond the capacity of individual companies, coalitions, or even entire industries. For example, comprehensive legislation can: Raise the quality and consistency of security throughout the full cyber ecosystem, including the telecommunications networks on which financial institutions depend. Enhance confidence among U.S. citizens and throughout the global community. Strengthen the security of Federal systems. Mobilize law enforcement and other Federal resources. Enable and incent voluntary action through safe harbors and outcome-based metrics, rather than relying primarily on static prescriptions. Attached are a list of 13 policy approaches that the FSSCC recently endorsed, along with three that it deemed problematic. We urge the committee to consider the FSSCC's input, particularly in light of the FSSCC's leadership of the financial services industry on this issue. administration proposal On May 12, 2011, on behalf of the administration, the Office of Management and Budget transmitted to Congress a comprehensive legislative proposal to improve cybersecurity. The Financial Services Roundtable supports this proposal and looks forward to working for its passage. We support many of the provisions of this proposal on their individual merits, and we see the overall proposal as an important step toward building a more integrated approach to cybersecurity. Given that our member institutions operate Nationally, are highly interdependent with other industries, and are already closely supervised by multiple regulators, we appreciate that this proposal promotes uniform National standards, throughout the cyber ecosystem, with the active engagement of sector-specific agencies and sector regulators. Consistent with its comprehensive approach, the proposal strives to address cybersecurity both at the level of the entire ecosystem and also within specific sectors. For example: The DHS Cybersecurity Authority title naturally stresses DHS' role, but it also mentions ``other relevant agencies'' and sector coordinating councils. The Regulatory Framework title focuses largely on DHS leadership and standardized evaluations, but it also mentions ISACs and sector-specific regulatory agencies, and provides for sector- level exemptions. We believe that harmonizing the comprehensive approach with the need to incorporate sector-specific mechanisms will be one of the most important challenges as the Congress considers this proposal. As this committee considers DHS' role, and its relationship to the sector- specific roles, we urge Members to leverage existing financial services protections and circumstances, and their analogs in other sectors, while preserving the inter-sector quality of the proposal. Below, we offer the committee two potential approaches and illustrations for addressing this DHS/sector nexus: Establish a uniform standard with specified exceptions.--In the Data Breach Notification title, the Federal Trade Commission (FTC) could enforce the requirements enacted under this bill, but defer to sector-specific regulators where substantially similar sector-specific rules and guidelines already are in place (e.g. the FFIEC could continue to enforce its 2005 interagency breach response guidance, and the Department of Health and Human Services could continue to enforce HITECH). Preserve sector autonomy with centralized information aggregation and coordination.--In the Regulatory Framework title, rather than requiring DHS to list critical infrastructure entities for every sector, the sector-specific agencies could make that determination, just as the Financial Stability Oversight Council is responsible for designating Systemically Important Financial Institutions. Given the likely fluidity of the overall solution, we cannot yet make a definitive recommendation for either approach. We do believe that this question of ecosystem/sector balance warrants careful deliberation. Law Enforcement We support the proposal's clarification and strengthening of criminal penalties for damage to critical infrastructure computers, for committing computer fraud, and for the unauthorized trafficking in passwords and other means of access. We also urge similar treatment for any theft of proprietary business information. With this extension to intellectual property, the law enforcement provisions will improve protections for both consumers and institutions, particularly when paired with expanded law enforcement budgets and the recruitment of personnel authorized in later titles. For purposes of this title and others, we presume that many, but not all, financial services systems and entities will be designated as critical infrastructure vital to National economic security, and we look forward to further work on the associated criteria. Data Breach Notification We support the migration to a uniform National standard for breach notification. Given existing State and financial services breach notification requirements, this migration will require both strong pre- emption and reconciliation to existing regulations and definitions of covered data. [Please see the 2005 FFIEC Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice.] We support the exemptions for data rendered unreadable, in breaches in which there is no reasonable risk of harm, and in situations in which financial fraud preventions are in place. DHS Authority We support strengthening cybersecurity authorities within DHS--and the active collaboration of DHS with the National Institute of Standards and Technology (NIST), sector-specific agencies such as the Treasury Department, and sector regulators such as our banking, securities, and insurance supervisors. This title demonstrates both the administration's commitment to an integrated approach and the challenge of achieving it. Federal and commercial systems, financial and non- financial information, DHS planning and sector coordinating council collaboration, are all addressed here and all will need to be very carefully integrated. Within financial services, we are conscious of the many current mechanisms for oversight, information-sharing and collaboration, but we are also conscious of the need for better alignment with our partners in other sectors. We look forward to further work in this area of integration and harmonization, at both the legislative and implementation stages. We also believe that two areas mentioned in this section--fostering the development of essential technologies, and cooperation with international partners--merit considerable investment. As DHS and NIST pursue their research and development agenda, and as the administration pursues its recently announced International Strategy for Cyberspace, we hope to see substantial resource commitments and advances in these areas. Regulatory Framework We support all of the purposes of this section, including, especially: The consultation among sector-specific agencies, regulators, and infrastructure experts; and the balancing of efficiency, innovation, security, and privacy. We recognize that giving DHS a window into financial services' cybersecurity risks, plans, and incident-specific information is an important element of building a comprehensive solution. Reconciling all of these elements--Treasury and our regulators' sector-specific roles, DHS' integration role, and the dual objectives of flexibility and security--will be critically important if we are to capitalize on existing oversight, avoid duplication, and avoid the hazards of public disclosures of sensitive information. Federal Information Security Policies We are encouraged by the proposal of a comprehensive framework for security within Federal systems. As institutions report more and more sensitive personal and financial data to regulators (and directly and indirectly to DHS), it is critically important that this data be appropriately safeguarded. Protecting this data, modeling best practices, and using Federal procurement policies to expand the market for secure products, are all good motivations for adopting these proposed mandates. Personnel Authorities Because we recognize how difficult it is to recruit the most talented cybersecurity professionals, we support the expanded authorities articulated in this section. We particularly support reactivating and streamlining the program for exchanging public sector and private sector experts. Data Center Locations Consistent with our view of financial services as a National market, we support the presumption that data centers should be allowed to serve multiple geographies. We encourage Congress to consider extending this logic for interstate data centers to the international level, while recognizing that the owners, operators, and clients of specific facilities and cloud networks must continue to be held accountable for their security, resiliency, and recoverability of customer data, regardless of the servers' geographic location or dispersion. h.r. 174 We share the overall objective of H.R. 174, the Homeland Security Cyber and Physical Infrastructure Protection Act of 2011, and we support many of its specific provisions. Listed below are a few comments and questions that we commend to the committee as it considers this bill and the overall issue of cybersecurity policy. By establishing an Office of Cybersecurity and Communications within DHS, and vesting it with the authority to establish and enforce requirements across sectors, the bill provides for the comprehensive treatment of cybersecurity that we have endorsed above. It offers two options for enlisting sector-specific agencies and primary regulatory authorities in the effort: Delegation of authorities and responsibilities.--The Director of the Office is given the option to delegate authority to the sector-specific agencies and authorities. We think it is appropriate to invest the Director with this option, much as the administration's proposal has invested it in the Secretary of the Department of Homeland Security and the Director of the Office of Management and Budget. However, given the inherent uncertainties in how this option might be exercised, we do not believe this should be the sole mechanism for employing sector-specific expertise and authority. Oversight through sector-specific agencies and authorities.-- Throughout the bill, DHS is instructed to consult with its sector-specific partners, have private entities submit information to them, and operate under their guidance. This approach--with DHS setting ecosystem-level standards and sector partners applying them as intermediaries--will reduce the confusion and fragmentation that otherwise could occur in a dual reporting system. We believe that financial institutions will prefer to have their primary regulators continue to serve as their direct supervisor on these issues, even if the Congress determines that some requirements warrant standardization. We believe that this approach merits consideration, along with the standard-with-exceptions and autonomy-with-aggregation approaches discussed in connection with the administration's proposal. We appreciate the bill's focus on risk-based, performance-based regulations, rather than prescribed measures. As more detail is developed around this approach, at both the legislative and regulatory stages, we believe it may obviate any need for the more prescriptive International Organization for Standardization and the International Electrotechnical Commission standard 15408 (ISO/IEC 15408). We appreciate the bill's commitment to sharing relevant information to the maximum extent possible, and its designation of private-sector submissions as sensitive security information requiring commensurate safeguards. If other Federal Authorities are actively involved in this process--consulting on threats, vulnerabilities, and consequences, or as members of the interagency working group--we ask that the same information-sharing objectives and protections apply. As the central Department in this process, we see DHS as providing a very valuable contribution by aggregating, analyzing, and disseminating this cross- sector information. We encourage the committee, and ultimately DHS, to leverage the ISACs as a key channel for these communications. We also view research and development as a high value-added opportunity, and appreciate the bill's attention to this function and enumeration of a potential research agenda. We think two of the definitions articulated in the bill are particularly important, and therefore warrant close consideration. First, the characterization of Covered Critical Infrastructure as systems and assets diverges from the entity-level approach historically applied in the financial services sector. Whether the systems-and- assets or entity-level approach is selected, we urge the Congress to include in Covered Critical Infrastructure not only the core of the critical infrastructures, but also their mission-critical service providers. In financial services, both the operational reality and the regulatory approach require that oversight and other controls extend well beyond the institution. Second, because the definition of Cyber Incident drives reporting and response protocols, we see it as a key threshold. The current definition, as an occurrence that jeopardizes security, may be interpreted very broadly and, without further detail, may set reporting and response thresholds lower than necessary. conclusion We very much appreciate the committee's interest in the important topic of cybersecurity, and particularly in the role DHS plays in this element of critical infrastructure protection. Because The Financial Services Roundtable is fully committed to enhancing cybersecurity: We will continue to strengthen security with our members and partners, We will help answer this question of integrating DHS' ecosystem-level program and the financial authorities' sector- specific efforts, And we will work to pass and implement the administration's cybersecurity proposal. Thank you very much for your time. I would be happy to answer any questions you might have. Financial Services Cybersecurity Policy Recommendations financial services sector coordinating council--april 15, 2011 Policy Approaches the FSSCC Supports Federal leadership on a National cybersecurity framework, implemented with the active involvement, judgment, and discretion of Treasury and the other sector-specific agencies (SSAs). Commitment to two-way public/private information-sharing, leveraging the Information Sharing and Analysis Centers (ISACs), the US-CERT, safe harbors, clearances, and confidentiality guarantees. This must include sharing of actionable and timely information. Support focused efforts to address critical interdependencies such as our sector's reliance on telecommunications, information technology, energy, and transportation sectors. Continue to leverage and expand on existing mechanisms (e.g., NSTAC, NIAC, PCIS). Involvement of Treasury and other SSAs in cyber emergencies. Federal cybersecurity supply chain management and promotion of cybersecurity as a priority in Federal procurement. Public education and awareness campaigns to promote safe computing practices. Attention to international collaboration and accountability in law enforcement, standards, and regulation/supervision. Increased funding of applied research and collaboration with Government research agencies on authentication, access control, identity management, attribution, social engineering, data-centric solutions, and other cybersecurity issues. Increased funding for law enforcement at the international, National, State, and local levels and enhanced collaboration with financial institutions, service providers, and others that are critical to investigating cyber crimes and creating a better deterrent. Heightened attention to ICANN and other international internet governance bodies to enhance security and privacy protection. Strengthening of Government-issued credentials (e.g. birth certificates, driver's licenses, and passports) that serve as foundation documents for private sector identity management systems. Enhanced supervision of service providers on whom financial institutions depend (e.g. hardware and software providers, carriers, and internet service providers). Recognize the role of Federal financial regulators in issuing regulations and supervisory guidance on security, privacy protection, business continuity, and vendor management for financial institutions and for many of the largest service providers. Policy Approaches the FSSCC Opposes Detailed, static cybersecurity standards defined and maintained by Federal agencies in competition with existing, private, standard- setting organizations. Establishment of vulnerability, breach, and threat clearinghouses, unless security and confidentiality concerns can be definitively addressed. Sweeping new authority for Executive Branch to remove access to the internet and other telecommunications networks without clarifying how, when, and to what extent this would be applied to critical infrastructure. Mr. Lungren. I thank you, Mr. Williams. Now Mr. Clinton. STATEMENT OF LARRY CLINTON, PRESIDENT, INTERNET SECURITY ALLIANCE Mr. Clinton. Thank you, Mr. Chairman, Ms. Clarke, Members of the committee. I appreciate your inviting the Internet Security Alliance to this hearing to examine the administration's legislative proposal. Since ISA represents primarily companies that represent critical infrastructure, I am going to confine my remarks to the regulatory aspects and proposals in the administration's plan. The Internet Security Alliance is a multi-sector trade organization focused exclusively on cybersecurity. We were formed in 2000. That is nearly 2 years before the events of 9/ 11, 4 years before DHS was created, 6 years before DHS created a cyber assistant secretary, 7 years before they filled that position, 9 years before the President appointed a cyber czar, and 11 years before the President sent a legislative proposal on cybersecurity to the Congress. For more than a decade, the private sector has been leading the fight to improve cyberspace. During this time, we have testified several times before Congress, constantly urging, even begging, Congress and the administration to take a more active role in addressing our cyber threat. There may be some in the private sector who think that the Government should take a hands-off role in this regard. ISA is not among them. As the Chairman pointed out, the ISA has proposed its own market-based system for improving our cybersecurity system, the ``Cyber Security Social Contract,'' which was cited early and often in the President's Cyberspace Policy Review. We are not alone. Earlier this year, several of the major organizations that represent industry in this space--BSA, CDT, TechAmerica, Chamber of Commerce, and the ISA--banded together to present a detailed white paper of policy proposals for improving our Nation's cybersecurity. With regard to the administration's position, we find the proposal is both too broad and too Government-centric. Although it has been suggested that the intent of the administration's proposal is to cover core infrastructure, we find a reading of the legislative language rates it as far more extensive. While there are provisions in the proposal calling for collaboration with industry, we don't need an act of Congress for that sort of collaboration, and the collaboration always ends with Government fiat. For example, Section 7 requires CEOs to certify that they are in compliance with plans required under Section 8 and empowers the Secretary to review any entity's plan. If DHS finds the plan wanting for some reason, they are empowered to, ``take any action the Secretary deems appropriate.'' In addition, paragraph 4 empowers the Secretary to evaluate the frameworks created through various discussions with the private sector. However, should DHS decide that the standard frameworks don't meet their own criteria, they are empowered to adopt their own criteria and force the companies to choose those. Government does not have all the answers, and it will not be the best judge of how to manage private systems. Altering our strategy of the public-private partnership to give the Federal Government final say over how private companies manage their systems will be costly, inefficient, and ineffectual. Moreover, creating this regulatory role for DHS will fundamentally alter the nature of the relationship between Government and the private sector by replacing a voluntary relationship built on collaboration with an adversarial relationship based on regulatory mandates, reports, and compliance. As the research I cite in my written testimony shows, a security system based on that reactive model will be less effective and sustainable. Now, there is a lot we can do to improve our cybersecurity. As the Chairman pointed out, we need to alter the economic balance with regard to the incentives dealing with cybersecurity. Our testimony, as well as the multi-trade association paper, points out that there is a great deal Congress could do to provide incentives at no cost to the Government which will lead to the adoption of best practices which a range of studies have indicated can stop between 80 and 94 percent of cyber attacks. There is another area of cyber attack, many of which Melissa mentioned earlier on, known as the APT, ultra- sophisticated sorts of attack, that are going to require an entirely different strategy. But we do have things in place to deal with that also. With regard to the administration's proposal, however, we find that the mandatory reporting that they use will diminish motivation for internal investigators, who may worry about finding out material that will be harmful to their company. It will add to the ultimate cost of detection tools and services, making companies more reluctant to spend money on them. Moreover, we find the evaluation program that is proposed by the administration's proposal to be anti-security. One of the things that everybody agrees on in this space is that we don't have enough cybersecurity professionals. This proposal requires virtually all entities that are covered--and that could be many, many entities--to have annual evaluations. So we are creating an army of insiders roaming throughout the security procedures of our most critical networks on an on- going basis. The value that they would have in terms of providing actual, real security is far offset by the increased risk of having an army of poorly-trained insiders going through our security. We feel it will be far more preferable for Congress to work with DHS and the rest of the administration to create a system where there are market incentives so that organizations will seek to alter the balance with regard to security return on investment--invest appropriately so that they can have improvements in their own security and our Nation's security. Thank you. [The statement of Mr. Clinton follows:] Prepared Statement of Larry Clinton June 24, 2011 i. introduction Good morning Mr. Chairman, and thank you for inviting the Internet Security Alliance to testify before the Cybersecurity, Infrastructure Protection, and Security Technologies Subcommittee. The Internet Security Alliance is a multi-sector trade association that develops best practices and standards, along with technological, economic, and public policy services focused exclusively on cybersecurity. ISA was founded and fully funded by a group of private sector entities in 2000. That's nearly 2 years before the tragic events of 9 ///11, 4 years before Congress created DHS, 6 years before DHS created its first cybersecurity assistant secretary, 7 years before they filled that position, 9 years before the President appointed his first ``cyber czar'' and 11 years before the President presented his first set of legislative proposals on cybersecurity to the Congress. For more than a decade, the private sector has been taking a leadership role in the fight to secure cyber space. That is one reason we were delighted when President Obama addressed this issue from the White House and published the Cyberspace Policy Review shortly after taking office--an enlightened document based on an extensive and wide- ranging study by staff of the National Security Council. ii. the private sector has been aggressively attempting to utilize the public-private partnership to enhance our cybersecurity Over the past decade, ISA has testified approximately a dozen times before various Congressional committees constantly urging, even pleading, for the Government to take more aggressive steps to enhance our Nation's cybersecurity. There may be some in the private sector that have suggested a hands-off role for the Government in this space, but ISA is not one of them. And, we are not alone. When legislation began heating up in the last Congress we heard reports from policymakers that there were so many private-sector entities that were interested in the subject that is was becoming difficult for our Government partners to achieve clarity as to where the private sector stood on the issue. As a result, several of the major associations involved in this debate banded together and worked over a period of 6 months to create a detailed--26-page--white paper specifying our overall approach to cybersecurity and providing detailed policy recommendations. This unique coalition, which included the Internet Security Alliance, the Business Software Alliance, the Center for Democracy and Technology, Tech America and the U.S. Chamber of Commerce is noteworthy for several reasons. First, is the obvious size of the coalition, covering literally tens of thousands of companies. Second, is the breadth of the coalition. In the cybersecurity field, the ``partisan divide'' is generally between the providers of technology and the users of technology. This coalition included both. In addition, the civil liberties community is represented by the most active such organization in this space, CDT. Finally, there is the depth of the coalition. It is not uncommon to see a coalition of this size in the District of Columbia; however, they are usually brought together on a 1- or 2-page letter. In this case, we have produced an extended, and we think a cutting-edge, detailed policy paper that analyzes a wide range of issues in the cybersecurity space and proposes specific policies--not just broad principles. Moreover, we sought, as much as possible to be open with our Government partners. We took as our starting points the official publications produced by our Government partners: the National Infrastructure Protection Plan (NIPP) and the Cyberspace Policy Review released by President Obama in May of 2009. Central to both these documents is the need for the Government to work in partnership with the private sector. This realization has nothing to do with politics. It is based on the fact that in cyber conflicts, it is the private sector that is most likely to be on the front lines and it is the networks owned and operated by the private sector that provide the critical infrastructure--both the regulated and non-regulated ones--upon which any modern nation relies. Government does not have all the answers and often will not be the best judge of how to manage private systems. Altering our strategy to give the Federal Government final say over how private companies manage their systems will be costly, inefficient, and ineffectual. Cybersecurity must be achieved through a true partnership between the public and private sectors. We specifically endorsed this foundation as embraced in these documents: ``The current critical infrastructure protection partnership is sound, the framework is widely accepted, and the construct is one in which both Government and industry are heavily invested. The current partnership model has accomplished a great deal. However, an effective and sustainable system of cybersecurity requires a fuller implementation of the voluntary industry-government partnership originally described in the NIPP. Abandoning the core tenets of the model in favor of a more Government-centric set of mandates would be counterproductive to both our economic and National security. Rather than creating a new mechanism to accommodate the public-private partnership, Government and industry need to continue to develop and enhance the existing one.''\1\ --------------------------------------------------------------------------- \1\ Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, TechAmerica; Improving our Nation's Cybersecurity through the Public-Private Partnership: A White Paper; March 2011. In an attempt to develop our own policy proposals via the established partnership model, we not only notified the White House of our intent to create the industry White Paper, but reached out to them on a regular basis to keep them informed of our progress. We discussed the work at the forums established under the NIPP, such as the IT Sector Coordinating Council meetings, which are regularly attended by DHS staff. When the paper was completed, well prior to release, we sent a full copy to the White House for their review and comment. We requested, and eventually received, a 1-hour meeting at the White House to brief them on our proposals and requested on-going interaction so that we could, as partners, come to a common ground on the way forward. Unfortunately, no subsequent meetings were scheduled and we were never briefed on the White House's own--substantially different--approach until it was released and sent to the Congress. iii. we have the tools to stop basic attacks The committee is aware of numerous and varied cyber attacks. Indeed the internet is under attack all day, every day, and while we successfully deal with the vast majority of the attacks, we also must aggressively improve our cybersecurity. However, not all attacks are the same. Cyber attacks can of course be segmented many ways, but given the shortage of time, we can create two broad categories; one of basic attacks (which can be extremely damaging) and one of very sophisticated attacks. Most cyber attacks fall into the first--the basic--category. Although these attacks can be devastating from many different perspectives, they also are largely preventable. Several different sources including Government, industry, and independent evaluators have concluded that the vast majority of these attacks--between 80% and 90%--could be prevented or successfully mitigated simply by adopting best practices and standards that already exist. Among the sources who have reported this finding we can list the CIA, the NSA, PricewaterhouseCoopers, and CIO Magazine. Most recently, a comprehensive study jointly conducted by the U.S. Secret Service and Verizon included a forensic analysis of hundreds of breaches and literally thousands of data points and concluded that 94% of these, otherwise successful, cyber attacks could have been successful managed simply by employing existing standards and practices. iv. why are we not stopping the basic attacks? Cost. Some have suggested that the market has failed to produce the needed technology to address the cyber threat. That is not the case. President Obama's own Cyberspace Policy Review documents the fact that the private sector has developed many adequate mechanisms to address our cyber insecurity but they are not being deployed: ``many technical and network management solutions that would greatly enhance security already exist in the marketplace but are not always used because of cost and complexity.''\2\ --------------------------------------------------------------------------- \2\ Obama administration, Cyberspace Policy Review--Assuring a Trusted and Resilient Information and Communications Infrastructure at 31. --------------------------------------------------------------------------- This finding is substantiated by multiple independent surveys that also identified cost as the biggest barrier to deploying effective cybersecurity solutions. This research shows that although many enterprises are investing heavily in cybersecurity, many others, largely due to the economic downturn, are reducing their cybersecurity investments.\3\ --------------------------------------------------------------------------- \3\ PricewaterhouseCoopers, The Global State of Information Security, 2008. Center for Strategic & International Studies, In the Crossfire: Critical Infrastructure in the Age of Cyber War, 2010. --------------------------------------------------------------------------- The fact is that many companies don't see an adequate ROI to cyber investments. This real-world problem cannot be permanently wiped away by granting a Government department the power to mandate uneconomic expenditures as President Obama himself pointed out last year at the White House: ``Due to the interconnected nature of the system this lack of uniform implementation of sound security practices both undermines critical infrastructure and makes using traditional regulatory mechanisms difficult to achieve security.''\4\ --------------------------------------------------------------------------- \4\ White House, Remarks by President Obama at White House Meeting on Cyber Security, July, 2010. --------------------------------------------------------------------------- Rather, we need to find ways to work within the partnership to encourage firms to make investments that may go beyond their own commercial risk management requirements for security, but might rise to the level of a broader National interest. This principle was recognized in the creation of the original NIPP: ``The success of the [public-private] partnership depends on articulating the mutual benefits to Government and private sector partners. While articulating the value proposition to the Government typically is clear, it is often more difficult to articulate the direct benefits of participation for the private sector . . . In assessing the value proposition for the private sector, there is a clear National security and homeland security interest in ensuring the collective protection of the Nation's [critical infrastructure and key resources] (CI/KR). Government can encourage industry to go beyond efforts already justified by their corporate business needs to assist in broad-scale CI/KR protection through activities such as: ``Providing owners and operators timely, analytical, accurate, and useful information . . . ``Ensuring industry is engaged as early as possible in the development of initiatives and policies related to [the NIPP]. ``Articulating to corporate leaders . . . both the business and National security benefits of investing in security measures that exceed their business case. ``Creating an environment that encourages and supports incentives for companies to voluntarily adopt widely accepted, sound security practices. ``Providing support for research needed to enhance future CI/KR protection efforts.''\5\ --------------------------------------------------------------------------- \5\ National Infrastructure Protection Plan, 2006 at 9. --------------------------------------------------------------------------- The Obama ``Cyberspace Policy Review'' went even further in suggesting this pathway by suggesting a mix of tailored incentives including liability incentives, procurement incentives, indemnification, and even tax incentives. The multi-trade association White Paper continued this chorus of support for this approach. ``One of the most immediate, pragmatic, and effective steps that the Government could take to improve our Nation's cybersecurity would be to implement the recommendations made in the CSPR to explore incentives, such as liability considerations, indemnification, and tax incentives. For example: ``Tax incentives that encourage establishing additional cybersecurity investments, such as the R&D tax credit; ``Grant funding is used effectively in other homeland security areas such as emergency preparedness and response. Critical infrastructure industries can use grant funds for research and development, to purchase equipment, and to train personnel; ``Streamlining regulatory procedures, which would cut both Government and industry costs; ``Updating the SAFETY Act to better appreciate the cyber threat that has become more evident since its enactment. This Act, which provides a mix of marketing, insurance, and liability benefits for technologies designated or certified by DHS, can be expanded to standards and practices as well as technologies that protect against commercial as well as terrorist threats; ``Liability protections or regulatory obligations (e.g., for utilities) adjusting in numerous ways to provide incentives for enhanced security practices, such as adoption of standards and practices beyond what is required to meet commercial risks, or enhanced information sharing. Liability benefits do not need to be elevated to immunity to be attractive. Categories of liability (e.g., punitive vs. actual damages) or burden of proof levels (preponderance rather than clear and convincing evidence) can be adjusted to motivate pro-security behavior without costing taxpayer dollars; and ``Stimulating the growth of a private cyber insurance industry that can both provide private economic incentives to spur greater cybersecurity efforts while also creating a private market mechanism that fosters adoption and compliance. The Government should give consideration to implementing reinsurance programs to help underwrite the development of cybersecurity insurance programs. Over time, these reinsurance programs could be phased out as insurance markets gain experience with cybersecurity coverage. To accommodate the needs of a wide variety of critical infrastructures with different economic models, the public-private partnership should develop a menu of incentives that can be tied to voluntary adoption of widely-accepted and proven-successful security best practices, standards, and technologies. The R&D tax credit may be the most attractive option for an IT security vendor, while a defense firm may be more interested in procurement options, an electric utility in a streamlined regulatory environment, or an IT-user enterprise in an insurance discount and risk transfer. Many of these incentives are deployed successfully in other areas of the economy, but not yet to cybersecurity.''\6\ --------------------------------------------------------------------------- \6\ Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, TechAmerica; Improving our Nation's Cybersecurity Through the Public-Private Partnership: A White Paper; March 2011 at 10-11. --------------------------------------------------------------------------- v. addressing sophisticated attacks While most cyber attacks are fairly basic and can be stopped or mitigated with the deployment of existing standards, practices, and technologies which could be achieved through the use of a creative incentive system, there are still other much more insidious and sophisticated attacks that are not going to be stopped with best practices. Again, there are many ways to characterize these attacks but one common term that has come to be used somewhat generically in the field is the Advanced Persistent Threat (APT). Without getting into the academic debate over what constitutes the APT, it suffices to say these are sophisticated attacks. These are not ``hacker kids'' or kids in basements. These attacks are formulated by highly sophisticated, well-organized, well-funded, often state- sponsored attackers. These guys are pros. They are very good, and if they target you or your system you can be pretty sure they will succeed in penetrating, or ``breaching'' your system. However, this does not mean we have no defense. Indeed, many companies have been working for several years with some success on mitigating APT attacks although it necessitates altering our defensive posture from one of perimeter defense geared to stopping breaches to internal detection and mitigation. Again, the private sector White Paper identifies some of the current core strategies that the Government, in collaboration with the private sector ought to be deploying to address the APT style (ie. more sophisticated) attacks. However, it is important to note that there is no silver bullet to addressing these advanced threats. The core reason we have attacks, and they will likely continue, is that the economic incentives generally favor the attackers. Many attacks are cheap, easy, and profitable while on the other hand, an infinite perimeter needs defending, it is very hard to catch and prosecute cyber attackers and it is difficult to demonstrate ROI to things that you have prevented such as cyber attacks. So long as our economic equation for cybersecurity remains out of balance, we are going to continue to have attacks. This needs to be understood not as a discrete problem for which there will be a simple and unchanging security technology--like a seat belt or a set of gold standard Government metrics. Rather, this is an on-going and persistent threat that needs continuous deployment of creative strategies that evolve with the dynamic threat. vi. the administration's legislative proposal Unfortunately, after waiting 2 years for the administration to follow up on its CSPR, we received a legislative proposal produced without coordination with the private-sector partnership the administration itself had established for this purpose, and which: Fails to follow up on the promise of earlier work by this and the previous administration; Does not address the core economics issues which drive our lack of cyber insecurity; Would create an extensive new bureaucracy that will not address the persistent cyber threats we face; and Could add significant new threats that are not justified by the dubious benefits of the unbounded intrusions into our most critical infrastructure. Since ISA works primarily with major entities from most for our Nation's critical infrastructure, we will focus our testimony to Section 3 of the President's proposal, which establishes a new and extensive regulatory structure over the private sector. vii. the administration's legislative proposal fundamentally alters the public-private partnership When he released the Cyberspace Policy Review in 2009 President Obama himself said: ``Let me be very clear: My administration will not dictate security standards for private companies. On the contrary we will collaborate with industry to find technology solutions that ensure our security and promote prosperity.''\7\ --------------------------------------------------------------------------- \7\ President Barack Obama, Release of the Cyberspace Policy Review, May 29, 2009. --------------------------------------------------------------------------- Unlike the rigorous and open process the Obama administration conducted in developing the Cyberspace Policy Review, the current legislative proposal was not developed in any way by ``collaboration with industry to find technology solutions.'' ISA participates in numerous bodies set up under the NIPP to facilitate this sort of coordination including the Sector Coordinating Councils, the Cross Sector Cybersecurity Working Group, the Critical Infrastructure Partnership Advisory Council (CIPAC) and the Software Assurance Forum. Despite repeated requests for the administration to engage with these bodies, designated by them for collaboration to develop solutions, there were no discussions at even a conceptual level about this proposal which would, if enacted, fundamentally alter the long-standing relationship. Had the administration used the bodies designated for this sort of interaction, I believe the proposal would be both substantively stronger and politically more practical. Notwithstanding the process, the Centerpiece of the proposal--the establishment of an unbounded regulatory structured for the Department of Homeland Security--is obviously directly at odds with what the President pledged when he released the Cyberspace Policy Review 2 years ago. Obviously it will be the the committee and the Congress' decision whether to follow this new Government-centric approach, but there should be clarity at the very least that by establishing a broad regulatory framework, as this proposal does, it will fundamentally alter the nature of the relationship between the Government and private sector. It's often said that to a hammer, everything looks like a nail. And prisoners and prison guards do not have a partnership. One body is mandated to do what the other entity directs. While there is a fair amount of verbiage in the administration's proposal about working with the private sector, as we will discuss shortly, at the end of the day, this legislative proposal will allow DHS to regulate pretty much any entity it elects to regulate and mandate whatever DHS elects ought to be mandated. Some may argue that such a system of regulatory mandates will finally solve our cybersecurity problem; however, there is no evidence that this will be the case. Indeed, the academic research on motivating investment in information security specifically points in the opposite direction indicating that ``proactive'' investments motivated by market incentives are more effective than reactive (prompted by regulation) are. A new study released from Dartmouth College earlier this month documents this finding, ``Proactive investments are more effective at reducing security failures than reactive investments. When proactive investments are forced by an external requirement, the effect of the proactive investment is diminished . . . our results show that learning by doing through proactive security investments relies on economic incentives whereas unilaterally mandated procedures do not have any economic incentive . . . Government requirements simply focus attention on the problem area rather than discovery and learning by doing . . . external pressure does not have significant social incentives.''\8\ --------------------------------------------------------------------------- \8\ Kwon, Juhee, and Johnson, Eric; An Organizational Learning Perspective on Proactive vs. Reactive Investment in Information Security. Dartmouth College, NH. June 2011 at 18. --------------------------------------------------------------------------- viii. the administration's legislative proposal is not supported by research or precedent Research \9\ has consistently shown that the single biggest barrier to enhancing the cybersecurity of our Nation's critical infrastructure is economic. As previously mentioned, the National Infrastructure Protection Plan (NIPP)\10\ identified the need for Government to create a value proposition for industry to make investments in cybersecurity that are not justified by their business needs, but may be required for overall National security. In fact, the Cyberspace Policy Review specifically advocated the development of proactive market incentives such as procurement, tax, and liability to incentivize additional cybersecurity investments.\11\ --------------------------------------------------------------------------- \9\ PricewaterhouseCoopers, The Global State of Information Security, 2008. Center for Strategic & International Studies, In the Crossfire: Critical Infrastructure in the Age of Cyber War, 2010. \10\ The National Infrastructure Protection Plan (NIPP) is available at http://www.dhs.gov/files/programs/editorial_0827.shtm#0. \11\ Executive Office of the President, Cyberspace Policy Review-- Assuring a Trusted and Resilient Information and Communications Infrastructure, May 2009. --------------------------------------------------------------------------- However, the administration's legislative proposal does not follow through on any of these policy commitments. Instead the administration's current legislative proposal relies primarily on ``disclosure'' as a market incentive, to hoping that reaction to such a public disclosure will generate increased cybersecurity investment. While at one point this may have made sense, it is not likely to be helpful when addressing the current attacks we face. ix. the focus on disclosure of breaches is outdated Most cyber attack disclosure requirements are founded on misconceptions about what it is companies have available to disclose. Most successful modern cyber attacks go undetected. Furthermore, cyber intrusions and malware, as they become more sophisticated and more damaging, become increasingly difficult to detect. The tools and services for detecting them are very expensive, and the evidence for their presence is often very ambiguous. The fact that the proposed legislation and the discussions that surround it are constantly referring to ``breaches'' shows how rapidly policy in this field becomes dated. ``Breaches'' were the big cybersecurity concern of the last few years, but they are not the big cybersecurity concern of the era that began with Stuxnet. What's more, the very term ``breaches'' suggests that the remedy to cyber attacks is perimeter defense--guarding the organization's information border against forces attempting to penetrate, or ``breach'' it. This is a way of thinking about cybersecurity that many of the foremost cybersecurity experts have been arguing is obsolete for half-dozen years now. ISA presented this finding to the Obama administration which cited the study in their Cyberspace Policy Review and published it on the White House website, but did not reference it in their own legislative proposal. In fact, most companies are unable to tell whether they have been the victim of a successful cyber attack unless they make a special effort to investigate, spend additional resources on the effort, and have the necessary skills and tools already on hand. The initial signs that need to be pursued in order to discover a skilled cyber attack are hard to define, constantly changing, and often very subtle and thus unsuitable for the annual evaluation procedure the administration proposes to rely on. Uncovering a highly-skilled cyber attack is currently much more of an art than a science. It can require intuition, creativity, and a very high degree of motivation. x. the administration's proposal creates the wrong incentives Mandatory disclosure punishes companies that are good at detecting intrusions and malware. It creates an incentive not to know, so that there is no obligation to report. It diminishes the motivation of internal investigators, who may worry that finding out exactly what happened may do their company more harm than good. It adds to the ultimate costs of detection tools and services, making companies more reluctant to spend money on them. Requiring companies to disclose their cybersecurity plans and certifications is, if anything, even more likely to have unintended consequences than requiring disclosures of successful cyber attacks. The kinds of language and administrative formulas that would be adopted to comply with such requirements would almost certainly have little to do with real cybersecurity. This is partly because the field is developing so rapidly that by the time cybersecurity plans were recognized as fulfilling administrative expectations, they would already be obsolete. There is also no way to tell at the level of a ``general plan'' whether the cybersecurity measures involved would be doing any good or not. The consequence of disclosing such plans would be another, costly level of administrative bureaucracy and auditors that would probably only be getting it the way of good security. xi. administration's proposed language provides dhs with unfettered and unjustified authority over private systems Although it has been suggested that the intent of this legislation is to cover only the most critical ``core'' infrastructure, a careful reading of the legislative language indicates that it provides essentially unfettered authority to DHS to mandate technical standards for almost any aspect of the private sector. Sec. 3 of the Regulatory Framework for Covered Critical Infrastructure lists a full page of requirements to be met before an entity is subject to these, as yet unspecified, Federal mandates. However, when reading through them, they don't provide any limit on the Secretary's authority to designate any enterprise as a so-called ``covered critical infrastructure'' and thus subject to DHS mandates. It's easiest to analyze the impact of the sections if we review them in reverse order. Subsection D states that being named on the list as a covered critical infrastructure under this section ``shall be considered a final action for purposes of judicial review.'' Subsection C lists a variety of criteria to be placed on a ``risk- based tier,'' but criteria No. 4 is ``such other factors as the Secretary deems appropriate,'' which means the Secretary can place any entity on any tier for any reason he or she wants to. Subsection B, which lists only 2 criteria for inclusion. One criterion is that the entity or system ``is dependent on information infrastructure to operate.'' Since virtually all modern systems that are reliant on some form of information infrastructure to operate, those criteria are all- encompassing. That leaves us only with the criteria listed section B1, which is that incapacity or disruption of the reliable operation of the system would have a ``debilitating effect on National security, National economy, or National public health or safety.'' We regard ``debilitating'' as a fairly loose, and frankly weak, criterion for conferring such broad authority to the Secretary. To ``debilitate'' simply means to weaken--it doesn't necessarily mean to weaken a lot--just weaken. When I catch a cold I'm somewhat debilitated--but I wouldn't want the CDC to have the power to therefore regulate me. According to this legislative language, if the Secretary decides, for any reason, that the incapacity of a system might in some way weaken our economy, security, or safety, he or she has the authority to mandate--as a final action--whatever technical standards over their cyber systems the Secretary desires. For example, the recent SONY Play Station attacks reportedly will cost more than a billion dollars in damage, which one can argue weakens or ``debilitates'' the economy at least somewhat. Would that then make SONY Play Station's ``covered critical infrastructures'' under this definition? When asked that question at a recent Judiciary Committee hearing, an administrative witness replied that that determination would have to be made through rulemaking under the Act. In addition, the language does not state that the debilitating effect referred to in Sec. (b)(1) has to be from a cyber incident. According to this legislative language, the fact that the World Trade Center was attacked with airplanes, which obviously had a debilitating effect on our security and economy, would be justification for DHS to impose mandates on the cyber systems operating in the WTC, even though they had nothing to do with the attack. In addition, one criteria DHS will use in assigning an entity as a covered critical infrastructure is its interconnectedness with other infrastructures. That again allows for a tremendous expansion of potential DHS authority. For example, the supply chain for weapons systems can be thousands of companies long. Obviously, interruption of the operation of these systems for whatever reason--including non-cyber reasons--affect our National security. So under this language, all these thousands of other companies would be potentially subject to DHS regulation due to their interconnection to the main weapons system project. Moreover, under Sec. B1 of this provision, DHS will regulate ``entities'' as opposed to systems or assets. This presumably means that an attack having a debilitating--however minor--effect on security, economy, or health would result in the regulation of the entire entity the system is interconnected with. The bottom line is that this legislative proposal provides almost unbounded discretion for DHS to classify an entity as covered critical infrastructure and subject the entire entity to unspecified regulation. Section 9 states specifically that ``the Secretary shall promulgate regulations . . . to carry out the provisions of the Title.'' Section 2 states clearly that one of the purposes of the Act is to ``establish workable frameworks for implementing cybersecurity minimum standards and practices.'' Some may ask, ``what's wrong with DHS establishing minimum standards for industry through a rulemaking.'' The problem is it won't work and it is substantially counterproductive. Now, ISA is a big fan of standards and practices and we work with many entities, including NIST and other Federal Government agencies as well as private sector entities to create and constantly update them. However, there is a major difference between using the existing consensus process to develop international standards and practices and having a Government entity determine such standards and mandate them on the private sector. The multi-trade association White Paper addresses this argument in an entire section, concluding that: ``[w]e have already seen that attempts to impose Nation-specific requirements under the auspices of security are not embraced by the private sector or the civil liberties and human rights community for both public policy and economic reasons. A Government-controlled system of standards development that resides outside the existing global regime will not be accepted. If imposed, it would quickly become a second-tier system without widespread user or technology community adoption, thereby fracturing the global network of networks and weakening its security.''\12\ --------------------------------------------------------------------------- \12\ Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, TechAmerica; Improving our Nation's Cybersecurity Through the Public-Private Partnership: A White Paper; March 2011 at p. 8. --------------------------------------------------------------------------- Again, although there is a great deal of verbiage discussing how the Government will work with the private sector, the bottom line is that this legislative proposal consistently gives DHS massive new regulatory authority. Section 7 requires CEOs to certify that they are in compliance with the plans required under the Act. Although there is substantial verbiage suggesting that DHS will work with the covered entities in creating these plans, Section 8 empowers the Secretary to review any entity's plan, and if DHS finds the plan wanting for some reason, they are empowered to ``take such action as the Secretary deems appropriate.'' In addition, paragraph 4 empowers the Secretary to evaluate the frameworks created through various discussions with the private sector. However, should DHS determine that the standardized frameworks don't meet their criteria, they are empowered to adopt their own framework to meet their criteria, and, thus, the DHS framework would be what a covered entity would be required to implement and certify. xii. the administration's proposal for evaluation is anti-security Under this proposal, an apparently enormous range of companies would be required to construct plans for cybersecurity and plans and be required to hire Federally-approved ``evaluators'' to review their internal security on an annual basis. There is little if any evidence that regulatory compliance is per se improved security. Indeed, many report that compliance requirements distract personnel from security work to attend to the compliance regime. Moreover, it is acknowledged on all sides that we face a critical shortage of qualified cybersecurity personnel and so the army of evaluators created under this proposal will almost by definition not be adequately trained. The single largest vulnerability of our cyber systems comes not from hackers using technology to break into systems but from ``insiders'' with approved access to the systems. This proposal creates a virtual army of insiders crawling through our most critical infrastructure's security systems on an annual basis. The threat of introducing constant stream of new ``insiders'' into our Nation's most critical infrastructure far outweighs the dubious assumption that they will provide a tangible security benefit. That does not even account for the costs industry will bear to hire these evaluators, the cost of new manpower at DHS to comb through this mountain of data and the potential of an ideal attack vector where all these reports detailing our Nation's security will be stored. xiii. the information generated by these disclosures won't enhance security Ironically, one of the unintended effects of more comprehensive or stringent disclosure laws could be less information about the sort of cyber attacks that really matter. This is because most of the mandated disclosures would simply be noise. There would be a constant stream of reports, based on what lawyers believe would demonstrate compliance, while actually revealing as little as possible. This stream of reports would obscure the attack trends that really matter, while allowing companies to conceal events that might otherwise provoke public outcry and more active Government intervention. As cyber attack disclosures have become more frequent and more routine, this has already been already happening. The information made public by disclosure requirements is usually not very meaningful. Most cyber attacks, even if they are successful, do relatively little harm. They gather information that the attackers are never able to utilize. They provide one component of a larger attack program that never comes to fruition. In many cases, the effects of the disclosure are considerably worse than the effects of the attack itself. The mere fact that a company has suffered a successful attack gives little indication of its actual losses, even if specific numbers are mentioned. This is because there are so many factors that can influence the scale of loss, including the wording of the disclosure itself. Determining how much a successful cyber attack will hurt a company is very difficult even for those who have access to all of the details of the attack, the operations affected, and the company's finances. For the general public, the bare facts of a successful cyber attack are often very misleading. The cumulative data from the cyber attacks that have so far been publicly reported are also very misleading. Many of the biggest reported losses of personal data were due to lost or stolen laptops. This is not because it is the main way personal data is stolen; it is because the loss or theft of a laptop is an unambiguous event that it is hard not to acknowledge. Many of the other reported losses of data have been from major defense contractors. This is not because the major defense contractors are losing more data than other companies or than Government departments; it is because they have the best detection systems in place. Some of the most publicized cyber attacks have involved Google mail. This is not because Google mail has been compromised more than other e-mail systems; it is because Google's business model depends more on trust and on certain types of transparency than the business models of the other companies providing e-mail services. Since most cyber attacks go unrecognized, the mere fact that a cyber attack is being reported means that it is atypical. xiv. using effective models (a) the cdc All of this does not mean that all disclosure laws or bad or even that the existing ones are bad. It merely points out the unintended effects of such laws that legislators need to make an effort to avoid in drafting additional laws. More information about cyber attacks in general and about the degree to which individual systems and companies are at risk is necessary for markets to take adequate account of these things. Disclosure laws could provide some considerable benefits. But they will not provide the intended benefits unless they take into account how systems are monitored for attacks and what additional information might be needed to put the attacks in context. It is possible that the best approach might be to have the reporting go to a special legislatively-created institution, rather than directly to the public. This is the model used with disease control and public health issues. With sufficiently clear instructions as to how this institution would handle the information, its actions could potentially be accepted by all parties. There are other ways disclosure could be handled that would be less crude in its effects. The point here is that any disclosure laws need to be framed with a conscious acknowledgment of the pitfalls. xv. effective model (b) sematech In the 1980s, the United States also faced a technological onslaught. During this decade, the nation of Japan began flooding the U.S. market with computer chips, which threatened to drive U.S. chip manufacturers out of business. Recognizing the economic and security threat that this posed, the U.S. enacted legal measures such as the Federal R&D tax credit and the Cooperative Research Act of 1984, which eventually led to the private sector and U.S. Department of Defense cooperative known as SemaTech. Within 2 years, sub-micron architectures, advanced X-ray lithography and a number of other critical innovations pushed U.S. chip makers back into world leadership, and produced generation jumps in computing capabilities just as the internet was dawning. A similar Cybersecurity Public-Private Cooperative could be composed of the private sector, academia, and the Government in a minority role. This organization could be charged with improving, even reinventing the cyber ecosystem in a more secure manner. Under this Cooperative's umbrella, stakeholders could share information and cybersecurity technology development to create (or fund the creation of) more alternative networking protocols, software languages, and/or hardware architectures that are more secure. It could also act as an incubator for ideas to create better strategies to combat APT's and their equivalent. It could also serve as the equivalent of an underwriters laboratory for cybersecurity by independently assessing best practices and standards along sliding scales. These proven increasing levels of security, if voluntarily adopted, could then be used to qualify enterprises for subscribing to them in return for the incentive programs suggested earlier which will help mitigate costs while enhancing proven security practices. The ISA, its members and partners are aware of the need to combat cyber threats--indeed that is why ISA was created over a decade ago. However this must be done in collaboration with Government, not as mandated by Government. Moreover, the solutions we derive must be both technologically and economically practical if they are to have the sustainable effect we require. Mr. Lungren. Thank you very much, Mr. Clinton. We will now go to a round of questions, 5 minutes for each Member, and I will begin. Ms. Hathaway, you heard Mr. Clinton's forceful testimony there. How do you respond to that? Let me just give a little background. I have said as a general rule what I would like to do is to ensure that we have a cooperative spirit between the private sector and the public sector, No. 1. No. 2, my concern is, if we are not deft enough in the way we have our regulatory schematic, we could--not intended to do this--but we could have the result of stifling creative ways of protecting against cyber attack that might come from the private sector as we impose a Government one- size-fits-all approach. So I would like to see us, I guess, hit the sweet spot in that. You have been there, you have been through these arguments, and helped set up the contours of the debate. How do you respond to Mr. Clinton's observation about the administration's proposal? Ms. Hathaway. Sir, I think that the administration's proposal had the opportunity to engage the private sector to inform the debate and the items within the proposal. But during the course of their review, they did not engage the private sector, which is why it is so important that this committee and other committees do engage the private sector in understanding what are the second- and third-order effects of regulation and other market levers. I think it will be important to take a look at both a regulatory framework and an incentives-based framework for research and development, for incentivizing industry to actually get to a standard of care where we are not actually seeing breaches on a regular basis. Mr. Lungren. One of the concerns that I have had expressed to me by some in the private sector--others have indicated very strong support for the overall proposal--but one of the areas of concern was the auditing aspect contained in the proposal, where some suggested it was overreach. Now, Mr. Clinton, you suggested this sort of a continual presence there might open up the possibility of security breaches that wouldn't otherwise exist. I suppose that is always a balance you have to have. How do you ensure that those that you hope are protecting against cyber attack in the private sector, with consequences to individuals on a more general basis, how do you ensure that that is being done and, at the same time, don't have a heavy hand, which may result in exposures to intrusions that you otherwise would not have? How do you hit that balance? Mr. Clinton. The best way to do it, I believe, Mr. Chairman, is to make the system--to establish the system so that the organizations want to invest in security, so that they see it as in their own self-interest. As I think was pointed out earlier in some of the opening statements, what we currently have and what the National Infrastructure Protection Plan says is that we have not currently recognized the value proposition for industry. In some industries, there may not be an adequate value proposition. But there are a variety of ways that we can alter that so that they want to invest more in cybersecurity, they see a benefit to it. One way---- Mr. Lungren. So they can explain to their shareholders or justify to their shareholders and their board of directors that it is bottom-line-effective. Mr. Clinton. Sure. One of the ways I think you mentioned in your opening statement is through the use of insurance. We have not been done enough to bring the insurance industry into the cybersecurity equation. Insurance is one of the great drivers of pro-social behavior. We use it in health care. We use it in--my daughter drives more carefully because she wants a ``good driver'' discount on her insurances. This affects things. But we have not brought insurance into the cybersecurity arena. If we were able to motivate the greater adoption of insurance, the insurance companies will do the evaluation for us because their money is at risk. We can also use the reductions in premiums to provide a motivation for the adoption of increased best practices, just as we do when people give up smoking to have lower insurance rates, et cetera, et cetera. Insurance, liability reform, better use of procurement, which has already been mentioned, streamlined regulation--these are all things that could be offered to the private sector in return for investing more in cybersecurity that will adhere to their bottom line, making it so they want to do it, not because we are making them do it, and at the same time enhance our own Nation's cybersecurity. Mr. Lungren. Within the administration's proposal is a proposal for a National law on notice of breaches, which would, as I read it, preempt the States from doing that and, therefore, alleviate what some would say is a patchwork of different notice requirements. On the other hand, people say States should have the right to do that. Does anybody on the panel have a disagreement with the administration's approach on that? All right. The gentlelady from New Jersey, the Ranking Member of the subcommittee, is recognized. Ms. Clarke. I am from New York. Mr. Lungren. Excuse me. New York. Ms. Clarke. It is okay. But you know, as a New Yorker, we have to set the record straight. Mr. Lungren. After Mr. Pascrell yesterday indicating that he represented the entire region, I am sorry. Ms. Clarke. There you go. There you go. Let me start with you, Mr. Clinton, and the whole idea of incentivizing and the how-tos. You raised the issue of insurance, and I want to explore that a little bit further. Certainly, incentivizing insurance, on the surface, seems like a proposal that perhaps could work. What would happen if industry didn't bite or part of industry did but the other part didn't? How do we create sort of a uniform incentive? Because, you know, some folks could say they want it, and some folks could say, you know what, thanks but no thanks. Then we are still left vulnerable, because if everyone isn't involved, then vulnerabilities will exist. Can you speak to that? Mr. Clinton. Certainly, Ms. Clarke. Thank you very much. What the ISA proposes and, frankly, what is proposed in the multi-trade association white paper speaks exactly to your point, which is accurate. We have a very diverse private sector. So what we advocate is that we need to develop a menu of incentives. Certain incentives will be very attractive to certain areas. So, for example, if you are in the defense industrial base, procurement incentives are going to be particularly of interest to you. If you are in the public utility space, perhaps streamlining some of the regulation to make it more cost-effective may be appropriate to you. Other sectors are going to be interested, perhaps, in insurance. Still others might be interested in liability reform. You have to have a multitude of incentives, because different things will motivate other people. Were you also asking about how to get the insurance stuff started? Ms. Clarke. Well, I think my question is more to, when you deal with things from a voluntary perspective, entities can opt out. With cybersecurity, any opt-out equates to a vulnerability. Any area of penetration can then have a cascading effect. So, you know, while we want to resist the idea of imposing anything, I am just trying to get at, you know, how do we deal with trying to get as much coverage as we possibly can? I understand the menu that you have discussed. Perhaps it is industry by industry, where we get buy-in through each industry and its leadership, that will then cast the net that we are looking for to close those vulnerabilities. Would anyone else want to address that issue? I am just trying to figure out, without imposing a standard, if you will, how do we get everyone to see the virtue in establishing a standard that we can hold everyone accountable for? Mr. Williams. Representative Clarke, if I might, I absolutely agree with Mr. Clinton, that we should do everything in our power to set a private-sector leadership model in this, as we have in the past, to rely on markets wherever possible. If the insurance and incentive models work where they work, fantastic. Our experience in financial services is that, with a combination of regulatory oversight and our own business motivations, we have done a better and better job of protecting our sector. We have also reached out to other sectors with uneven results. So our service providers and the sectors on which we in a very interconnected way always depend are often receptive to their business partners saying, ``Security is important; we need you to invest in it,'' but not always. That is our concern. That is our motivation for supporting a comprehensive proposal here, is that if some opt out and they don't happen to be in a critical tier, well, that may be perfectly reasonable. But at least for that most critical tier, opt-out and the possibility that at least some business partners will just decide to go their own way and put others at risk we think is problematic. Ms. Clarke. Mr. Williams, let me just ask another question. Why do you think that preemption is important? Do you think there is a role for States in cybersecurity policy? Mr. Williams. One way to think about the State model, as people often describe it, is that it is a laboratory. In breach notification and in many other areas of cybersecurity and consumer protection, it has been a wonderful laboratory. We have seen these breach-notification rules evolve over the last several years with various experiments in the different States. We believe that it is now much more mature and that now we are ready for a National model. Those experiments have yielded the fruit that we would expect, we have some experience now, and we would like to see some uniformity at the National level. The States may still very well have responsibility for, in our case, overseeing State-chartered institutions like banks and insurers. They may still have consumer protection authority. But cybersecurity we think of as a National issue where uniformity, we think, makes the most sense. Ms. Clarke. Thank you very much, Mr. Chairman. I yield back. Mr. Lungren. The gentlelady yields back. The gentleman from Texas, Mr. McCaul, is recognized for 5 minutes. Mr. McCaul. Thank you, Mr. Chairman. I think as you point out, Mr. Williams, I agree with the breach-notification law. It really cries out for National Federal law. There are many things in the administration's proposals that I agree with: The increased penalties for computer hacking; the notification law; the clearer cybersecurity authority for DHS; the FISMA reforms, which I think are necessary. So I would have to say, overall, I think Howard Schmidt, I think, did a pretty good job. But the one area where I find myself in disagreement really relates to the private sector and what role the Government plays in regulating the private sector. I think the first principle that we have, particularly in this area, in Congress is to do no harm. I think we can legislate and have unintended consequences, particularly as it applies to the private sector. We can harden the Federal networks, and I think that is something we are very focused on. You know, the Einstein 3--I mean, there are a lot of things in this proposal that deal with that. But it is really hardening the private sector and the critical infrastructures in the private sector that I think are the greatest challenge for us as policymakers. Ninety percent of the critical infrastructures, up to, are really controlled by the private sector. So my first question is to you, Mr. Clinton. How can we enhance that and incentivize the private sector without having these punitive mandates? The one thing in this proposal I disagree with is the regulating over the private sector. Then if they are out of--I mean, the remedy for a violation is basically what we call ``name and shame.'' You know, we will call out the company and then publicly call out the vulnerability, which I don't think that is very good policy, to be, you know, publicly showing where a company is vulnerable. That just invites more mischief. So give me your thoughts on the regulating part of this provision, and what would you recommend? Mr. Clinton. Well, certainly, I agree with you, Mr. McCaul, about the disclosure aspects here. It creates a target. Not only that, it creates an incentive for companies not to find out things. You know, we need to incentivize people to be doing a better job of reviewing their cyber systems. You know, the modern cyber threat is geared around not allowing you to know that it is there. I mean, you know, a few years ago, cyber threats, you know, were--you had big cutesy names like the ``Love Bug'' and ``Blaster'' and all that kind of thing. Modern cyber threats are stealthy. They get in your system, and the first thing they do is clean out your system, so that when there is detection done, none of these lousy cyber threats let you know that the really bad guy is there. They go in your system and they hide. So it is very difficult to find these guys. So we want to provide incentives for people to go and look at them. If the corporation knows that the harder they look for a problem, the more likely are they are going to be named and shamed for finding it, we have created exactly the wrong incentives. It would be much better if companies were proactively incented in the way that I suggested with Ms. Clarke so that they wanted to go find these things because they were going to lower their liability, they were going to lower their insurance rate, they were going to have a better chance at a Federal contract, et cetera, et cetera. The one point that I think we have to be sure, though, is that we don't assume that there is some sort of minimum National standard that everybody has to get to. That is not true. The problem that we have with cybersecurity is not that the technology is broken and so we have to bring it up to standard; the problem with cybersecurity is that it is being attacked from the outside. So we have to find a way to motivate a continual investigation and innovation of mechanisms, rather than bring people up to some sort of stable standard. Mr. McCaul. Thank you. My time is limited. Ms. Hathaway, I wanted to ask you a quick question. You have a lot of expertise in these public- private partnerships. We have had the ISACs, the information sharing and analysis centers; have never really gotten to the point where we want them to be. You know, when I met with some of these firms in Silicon Valley, they talked about the liability protections. You know, there is a FOIA exemption, or exception, for critical infrastructures in terms of the sharing, but there still isn't any liability protection for them. So they are not incentivized to share information. Can you speak to that? What would be your recommendation as to how we can better enhance these public-private partnerships? Ms. Hathaway. Representative McCaul, I agree that many companies perceive that the FOIA is not strong enough if it were actually leveraged, and, therefore, private-sector entities are not as willing to share information. I think that the question we need to be asking ourselves on the Government side is, how can we share more and better information with the private sector so they can appreciate the threat that they are dealing with and the exposure that they have as multinational corporations? I think the Government does not share actionable information with the private sector and should increase their information-sharing mechanisms that are informed from the law enforcement and the intelligence community. DHS, as the forward-facing entity, needs better information from the law enforcement and intelligence community and should be sharing actionable information and real case studies with the private sector of what is happening in their industry, how certain corporations are being exposed--not necessarily naming them, but saying company X was exposed with the following breach and lost X quantity of confidential information. It is only when we start using real cases and real information that the private sector will be able to better defend itself. Mr. McCaul. Thank you, Ms. Hathaway. Mr. Lungren. The gentleman yields back. The gentleman, Mr. Richmond, is recognized for 5 minutes. Mr. Richmond. I defer to Laura my time. I think she needs to leave. Mr. Lungren. Oh, okay. Well, according to the rules of the committee, it is in order of appearance. So Mr. Keating would be next unless he allows Ms. Richardson---- Ms. Richardson. I think I was here. Mr. Lungren. Okay. The gentlelady from California, Ms. Richardson, is recognized. Ms. Richardson. Thank you. Thank you, gentlemen. That was very kind of you. Ms. Hathaway, in your opinion, which sectors are the most critical that we should be focusing on? We obviously can't do everything. We are not going to have money for everywhere. In our critical infrastructure, what would you say would be most vulnerable? Ms. Hathaway. Ma'am, I think that the most important probably starts with our energy sector. Without the power, you can't run a business and you can't sustain operations. Given the system control vulnerabilities and in the wake of the proliferation of Stuxnet, it is a high priority for the country to address the vulnerabilities that are within the power sector. I think followed by power is telecommunications, because without telecommunications you don't have the internet and you don't have the ability to do e-commerce and e-business. I would start with those two sectors. Ms. Richardson. On a scale of 1 to 5, 5 being best prepared, how would you rate that we would be from an energy perspective? Ms. Hathaway. On a scale of 1 to 5, I think that the energy sector probably was in a better prepared state and it is now going down the scale, as it moves more and more of its infrastructure to an internet-based protocol and as we, the Government, have been offering to the private sector that they need to move more and more of their infrastructure to a smart grid. I don't believe that a smart grid has been approached with the security in mind first and foremost and so, therefore, is making that infrastructure more vulnerable. Ms. Richardson. Thank you. Mr. Clinton, according to the White House proposal, companies would be subject to reporting--and it was a previous question by my colleague--would be subject to reporting significant incidents to DHS. Do you have an objection to that? Mr. Clinton. Well, the problem is, what is a significant incident? As I tried to articulate in my testimony, there is currently an opinion, a common thought in the press, anyway, that when you have been breached, that is a significant incident. We would probably disagree with that. In the modern world, with modern attacks, virtually everybody gets breached. If you are going to have some of these advanced persistent threat guys come after you, you are going to be breached, meaning they are going to get in your system. That means that we have to alter the way we do defense away from perimeter defense, keeping them out, to recognizing them when they are in the system and mitigating the attack there. So even though you may have been breached, that does not mean that it is necessarily a significant incident, because, as I say, these guys are going to get in. If we made that the line, that you had to report the fact that somebody successfully got into your system and then you were subject to some of these ``name and shame'' penalties that we discussed earlier, I think that that would be a mistake. So it really has to do with the definition of what is a significant incident, is where I have my problem. Ms. Richardson. Ms. Hathaway, would you view a significant incident being a breach, as Mr. Clinton described? Ms. Hathaway. I think a significant incident is any time that you lose confidential information and/or put an operation at risk that it can no longer deliver essential services. Ms. Richardson. Have you worked with various private industry to define what a significant incident would be? Ms. Hathaway. No, I have not. Ms. Richardson. Do you have an interest in doing so? Ms. Hathaway. I think that it is important for each sector, whether it is the financial services, defense industrial base, electric power, and the other 17 critical infrastructures, to define what is a significant incident in each one of those sectors and then define the appropriate response and mitigation strategies. Ms. Richardson. Okay. Last question, for Mr. Williams: What amount of risk should the Government be responsible for in the event of a major cybersecurity attack in the private sector, if at all? Mr. Williams. I think the Government is certainly responsible for collaborating with the private sector if there is an incident. I wouldn't say that that is the same as accepting financial responsibility or operational responsibility. I absolutely believe that as much as possible of both of those need to live with those who have direct ownership of systems and connections. I would say that in an incident, as in a steady state, if there is a way that we can set up the kind of voluntarily collaboration that I think many of us support, then Government has an obligation to participate in that process. We believe that for DHS; we believe it for our financial regulators. We believe that they have an opportunity to protect other sectors when incidents like that occur. But that is very different from accepting risk and somehow relieving others of that risk. Ms. Richardson. Thank you. I yield back. Mr. Lungren. The gentlelady yields back. The gentleman, Mr. Long, is recognized for 5 minutes. Mr. Long. Thank you, Mr. Chairman. Ms. Hathaway, you spoke about stiffening the penalties. To what degree? Do you agree with the overall proposal, the penalties that have been proposed in that? What degree do the penalties need to be stiffened to curb some of this activity? Ms. Hathaway. Sir, I think that it is essential that we update the Computer Fraud and Abuse Act. Right now, we do not have enough penalties for the breaches that are happening every day that we read about. I think that the administration's proposal is important. I would take it one step further and remove the connotation of ``protected systems.'' Protected systems are usually defined as Government and financial institutions. I think that any breach, regardless of where it has happened, in the private sector, the Government, and/or in academia, should be deemed a breach, with the same penalties. Mr. Long. Has there been any indication that the penalties that are there now have been effective or the increase that they are going to in years and dollars, do you have any---- Ms. Hathaway. I believe that the stiffened and higher penalties, if they are communicated, will start to act as a deterrent, a domestic deterrent. I believe that, also, law enforcement needs to have additional capacity to be able to investigate these breaches and impose those penalties as they find those who are committing those crimes. Mr. Long. What percent of cyber attacks would you say are domestic and what percent are non-domestic right now? Ms. Hathaway. I think it would be difficult to quantify the number of incidents and/or breaches. They are going up exponentially every day. I think all countries are suffering the same amount of intrusions. Mr. Long. Okay. Thank you. Mr. Williams, I hail from the Seventh District of Missouri, and we had an incident there where a title company, just a small mom-and-pop shop title company, had, I believe, $440,000 taken out of their account, their bank account, over the weekend. This has been within the last 12 months, maybe a little longer, 15 months, or somewhere in that neighborhood, and had $440,000 wiped out of their account through their bank. The Secret Service is the investigative arm that looks into that. They have ascertained, I think, that the money first went to Turkey, then Cyprus, ended up in Pakistan. Apparently the hopes of getting it back are about like the hopes of me collecting the $800 million I have been e-mailed here this morning that is in an account in my name. How can we protect--I mean, this is a mom-and-pop title company. They had the financial resources and backing to be able to go out and qualify for an SBA loan, because, as you know, in a title company, that was not their money they were holding. It was money they were holding for real estate transactions to close. So they at least had the ability to go out and borrow the $440,000, which is not a lot of consolation to them. But how in the world can we in Congress help the financial services industries in this cyber attack situation? Mr. Williams. We certainly can use some help with it. I can tell you some of the things that we are already doing. One of the evolutions in this whole process over the last few years is that much of the work used to happen solely within an institution, but now it really has to include business clients, like the title company, in the process---- Mr. Long. And their bank. Mr. Williams. And their bank. They absolutely need to be cooperating so that the bank builds secure systems, the title company secures its system and its credentials, so that they have this collaborative arrangement where it is not entirely within the bank's systems and the title company is not entirely on its own in this process. If we have more research and development, as most of these proposals I think suggest, we will find better and better ways to authenticate, so that if someone over a weekend has gained the credentials of the title company, it will be harder and harder for them to pose as a business client of the bank without the bank being able to detect it. Mr. Long. I don't know how we can ever get ahead of the curve on this situation, because it seems like we are constantly behind the curve, and the curve is moving at a rapid pace. So if there anything, off-mike or whatever, later, if you can get to me, as far as how Congress can help, for the entire panel, I would appreciate it. Mr. Williams. Yes, sir. Mr. Long. Mr. Clinton, you made reference to the fact of insurance two or three times. Walk me through that a little bit. What type of insurance? What do you incentivize? The insurance companies in this, what type of insurance are you talking about? Mr. Clinton. Well, there are a variety of insurance instruments that are available--protect against breaches, protect your liability of losses, protect your system, loss of data. It is possible to, for example, in the example of your title company, that they could have bought insurance---- Mr. Long. You are talking pretty much liability insurance? Mr. Clinton. Yes, sir. The typical policies don't tend to cover these cyber events. So there are special instruments that are available for that. The way that that would probably be best done--there are two things that we propose to get that started, one of which would be for greater information-sharing in return for some sort of Federal benefit. One of the problems the insurance companies have is that they don't have the actuarial data, because companies keep that private. But we believe that, probably, working with the Government, we could get that sort of actuarial data. That will help to bring the rates down. If we can get the rates brought down, then people will sell more insurance, and we can start kind of a virtuous cycle. The other thing, which is a much bigger idea, would be--we have had this problem of not having enough insurance for an important social good in the past: Crop insurance, flood insurance, et cetera. In those instances, the Federal Government has set up a revolving fund, and that was a better way to manage risk. This is one of the things I would propose that the committee ought to look at, because right now the Federal Government is carrying all the risk of a major cyber event. If the East Coast goes down for 3 weeks, Congress is going to pay for it all. That is bad risk management. You ought to be setting up a revolving fund so that we can get some private coverage there. Mr. Long. Thank you. Mr. Chairman, I have no time to yield back, but if I did, trust me, I would. Mr. Lungren. I was going to say, as a conservator, you are not used to giving back something you don't have. But that is all right. I won't interject that. Mr. Richmond, you are recognized for at least 5 minutes. Mr. Richmond. First of all, Mr. Chairman, let me thank you for having the hearing, and to the Ranking Member who has been very passionate about this issue. The overwhelming concern that I have--and any of the panelists can chime in--is just the country's awareness of this as a real threat. I chaired Judiciary in the State of Louisiana, which under our jurisdiction we had homeland security and all of those things, and this was not an issue that got a lot of attention, if any. So what can we do in the importance of raising awareness of it to help combat the threats that we have out there? Just general public awareness, and then we can go from small businesses to major businesses, and then we can just talk about States, because I don't see Louisiana being prepared or being a leader on this at the State level. So, in any particular order. We could start with you, Ms. Hathaway. Ms. Hathaway. Thank you very much, sir. I think that we do need to have a National conversation about what is happening on our networks, and it needs to begin really at all levels. We need to begin the conversation about cybersecurity and network hygiene in the K-through-12 program. As our children are being asked to bring in thumb drives to carry their homework back and forth between school and our home networks, they are being used as a path to actually infect our homes that infect our enterprises which infects our governments and infects our banks. So we need to begin with the children. If we then move into a university program that extends the Information Assurance Centers of Excellence to all 50 States and beyond 5 percent of our universities, we can start to get to the actual practitioners of and create a stronger workforce. If we start to have a stronger, more informed workforce on the information security that is trained from K through 12 through university, then we start to have a better-informed workforce and enterprises that can contribute to the National conversation. I would ask you, as Members, if you could go back and have a conversation in each of one of your districts and start a conversation in the schools and with the enterprises, because I can guarantee you the schools have been breached or the enterprises in your districts have been breached. You can start a simple conversation of what it means to them and what it means to you and how can we begin that National conversation in every district of America. Mr. Shannon. Yes. Thank you. The challenge here is getting people to realize that it is a community impact, that having one organization, one entity, one individual compromised is really not the issue; it is when it happens en masse. So, from CERT's experience, starting with the Morris worm, you know, there was a realization of everyone involved that this is a community event, it is not just their network that has been compromised, not just their host. So I think part of the challenge, especially when you are looking at insurance issues and regulatory issues, is acknowledging that community aspect. What we find is that organizations, individuals usually are surprised when they realize that the compromise in their system is part of an overall industrialization of the threat and it is affecting the whole community. So, actually, their--putting themselves at risk, as Ms. Hathaway mentioned, that puts everyone at risk, realizing that we are all in this together. I think that is where the conversation needs to lead. It is not just about your own assets, your own data. Your vulnerabilities actually expose everybody else. Mr. Williams. I would have a thought or two at the family or small-business end of the spectrum and at the more corporate end. At the family level, people shouldn't be worried about advanced persistent threats or some vague notion of identity theft. There are some very concrete things that they can be thinking about. They can be more technology literate from the schools at the children's level and the adults in the home. They can be watching that their PCs and their smart phones have antivirus protection on them, that they are well-maintained. They can be watching their financial statements to ensure that transactions don't appear---- Mr. Richmond. Mr. Williams, I know I am going to get cut off in a few minutes. But if you could get me that information or get that to the committee, I think it would be helpful. Because a lot of us send out information to our districts all the time, and that is something that we could put in there, those small things to push people to do. Before you, Mr. Clinton, I would just--you talked a little bit about ``name and shame.'' Part of the question is the balance between the public's right to know--because a lot of times we, as Government, and private sector, we clash, because the private sector would say, ``Nothing bad has happened yet. There is no reason to act until something really, really bad happens.'' Well, we have to take a different approach, and part of that is to try to make sure nothing ever happens. So how do we balance ``name and shame,'' as it is described, with the public's right to know and the fact that information is power, and we can prevent it that way, and not just leaving it up the private sector until something bad happens? I yield back, Mr. Chairman. Mr. Clinton. A couple things. I will try to be really quick. Be happy to chat with you more off-line. First of all, putting in those incentives so that we can get to those best practices and standards that the NSA, CIA, everybody, Secret Service, would solve 90 percent of the problem. That is the first thing we need to do. With regard to disclosure, ISA is very much in favor of disclosure. But the disclosure, as I have detailed in my testimony, the disclosures have been to be purposeful disclosures. The public's right to be secure, I would say, is the higher value here. What we have proposed is, instead of having general broad disclosure, which will go to the press, which will treat it sensationally, will skip over the details as to whether or not this was really harm here or not, we would propose more of a CDC sort of model. That is where the reporting ought to be. It should be going into entities that can understand the real problem and can work on solving the problem so that we don't have the losses that come out. One of the problems here is our definitions. Think of cybersecurity like a football game, okay? If you are the defense in a football game, it is not a--everybody gives up yards, right? So the fact that you have been breached, that is not the problem. The problem is when the offense scores. So you can have breaches that don't lead to scores. We shouldn't be putting out publications, you know, and having news conferences about somebody being--you know, somebody losing just some yardage. We should confine that to experts detailing when there has actually been losses, and then we can deal with, you know, some sort of SEC filings that are appropriate, which the SEC already will do. So we are arguing for a more sophisticated form of disclosure to deal with a more sophisticated sort of attack. We think that that will lead to greater security, which is our goal. Mr. Lungren. Now, the gentleman, Mr. Marino, a great football fan, is recognized for 5 minutes to continue the analogy. Mr. Marino. Thank you, Mr. Chairman. Carrying that ball down the field on the offensive end of things, I want to turn this conversation a little bit. We are talking about the breaching of the systems and increasing the penalties. But I find it ironic that we are here--and, obviously, I am a big supporter of public hearings--but we are here talking about security measures, which--we could have a hacker sitting out in the audience. So where do we draw that line between sharing public information and not sharing it to prevent it from the hackers getting control of it? But, by the same token, the hackers are pretty sharp. No. 2, as far as penalty-wise, what do we do with the 15-year-old genius who gets into the system just for fun and causes havoc? With those two questions, could we start with Ms. Hathaway? My father told me ladies before gentlemen. Ms. Hathaway. Well, let me start with the 15-year-old genius. There are some efforts within the law enforcement community and with the actual school districts to identify those genius hackers. Instead of a sentencing or going to juvenile hall, they actually start working with the law enforcement community or get prepared to work for our intelligence community. So they are the next-generation workforce with the skill set that we need. Mr. Marino. Okay. Let me interrupt just for a moment. Primarily--and the former attorney general from California will agree with me, I think, that the Federal system has very little jurisdiction or, actually, maybe no ability to deal with juveniles. Ms. Hathaway. I understand that the law enforcement community has been working with the high schools to actually help identify and work with using their skill set and turning it to good as opposed to harm. Mr. Marino. I understand that. But how about the penalty aspect of it? What is your position on that? Do you have a suggestion on that? Ms. Hathaway. I think that penalties for kids, we need to look into, the penalty could actually be serving, you know, for the U.S. Government or serving on behalf of the communities to actually go out and prosecute. Mr. Marino. Mr. Shannon. Mr. Shannon. Could you repeat the question? I have lost the track of what you--the first part of the question. Mr. Marino. The two questions were: Keeping it confidential; and how do we deal with the juveniles? Because the Federal system is not that well-equipped to deal with juveniles when it comes to penalties. Mr. Shannon. Yeah, I will deal with the confidentiality issue. One of the great innovations of the internet is the freedom to express yourself, the freedom to create new technical capabilities, to innovate quickly. It is enabled by open disclosure, open sharing of information. Clearly, disclosing vulnerabilities is a challenge, but when you realize that there is a threat and there is a remediation, sharing that quickly and openly is better than what is the alternative, remaining ignorant. Because I can assure you that the hackers do know, and if you try and communicate it in some out of sort of closed or secure manner, once you get to sufficient scale, they will still know. So, you know, there is no hiding it, in that sense. So it is better to put the information out there, let people be informed, and then they can make the appropriate decision, especially when it comes to a mitigation. Mr. Marino. Okay. Mr. Williams. Mr. Williams. I think, quite appropriately, most of this conversation already occurs in confidential spheres and should continue that way. So companies, when they contract with other companies, will talk very explicitly about their security posture. That has a very strong market incentive for people to do the right thing. In our industry, institutions talk with their regulators, but they do that almost exclusively behind closed doors. The kind of sharing that I think the administration proposal contemplates would also be confidential, two-way sharing between DHS and some of the other agencies and the companies. There are, I think, a couple of exceptions to this idea that there should be a cloak of confidentiality generally. One is, if there is information that can help consumers to protect themselves, if an individual consumer has been put at risk, there are and should be rules to ensure that that person knows what they need to know to protect themselves. The same at the SEC level for investors. Mr. Marino. Okay. All right. Thank you. Mr. Clinton, you have 18 seconds. Mr. Clinton. We are dealing with different levels of data, so the sophisticates ought to be meeting amongst themselves and sharing data and then atomizing it and then have it pushed out to the broader community. We have a proposal we actually started with Melissa Hathaway a couple of years ago with DHS to do exactly that. I would be happy to talk with you more off-line. Mr. Marino. Thank you. Touchdown. Thank you very much, Mr. Chairman. Mr. Lungren. Now I will be happy to recognize the gentleman in this Congress who probably was happier than any other Member that Whitey Bulger got nabbed yesterday, Mr. Keating. Mr. Keating. Happy and relieved. You know, interestingly enough--I will just a little share information with you--in terms of getting the word out, I was struck by the fact that there is a group in the Boston area where the 30 top executives, largest firms, they meet usually annually to discuss what their biggest issue is. That could be taxes, it could be anything; it is open-ended. They decided it was cybersecurity. So I do think that people understand the magnitude and the importance of this, and that is out there. What I am struggling with is this, and I don't know if there is an answer. Mr. Clinton started down that track, but I would just like to ask the rest of the panel if they could help in this regard. I am looking for something, an existing model, public-private model, quasi-governmental model, that already is there, may not be a perfect fit, but just to give me an idea of where the Chairman said, the sweet spot is. We are looking for something that is flexible enough so that regulations don't smother the ability and provide deterrence. But I don't agree with, you know, the CDC model approach, that, you know, it is just out there. I think we have to more oversight proactively on that. I don't know where that is. I know that the ``name and shame'' issue can, I think, be mitigated by having, you know, rankings, the way they do in financial institutions. When they do an audit, you can have CAMEL ratings, whatever ratings they might be--1, 2, 3, 4--and you are in categories where, you know, companies will have some responsibility, and insurance companies can look at that as well. But if you could--and I don't anticipate anyone has a perfect fit--can you think of some existing models in other areas? You know, Mr. Clinton has mentioned the CDC. I would like to ask the other panelists. Mr. Shannon. So I think there are a couple of models. There is the automotive and airline industry that, you know, have reporting on accidents and incidents that allows for an appropriate oversight. So it is a more closed--the NTSB, you know, has a closed investigation when an incident happens. I think it is important also to look at the CDC model and think about where it actually is appropriate and where it is not appropriate. I mean, where it is not appropriate maybe is nation-state threats. But certainly in terms of deal with industrial challenges in malware and exploitation, being able to have a better situational awareness based on the preponderance of incidents is what is needed. An individual, just because I got hacked, I don't know if I am the only one in the world or whatever. But if the Government wants to or organizations want to be able to do a broad response, having that sort of situational awareness is imperative. Otherwise, you don't know that there is a challenge. Mr. Keating. Thank you, Dr. Shannon. That is great after something has happened, too, and that is important. What about trying to prevent areas and to rank or to find some kind of oversight that is not too, you know, over- regulatory in nature? Mr. Shannon. I will defer to my colleagues. We deal with things when---- Mr. Keating. That is all right. Thank you. Mr. Williams. If I might, one macro example, one micro example. A macro example I think is environmental protection. There was a time when the best thinking on environmental protection was simple command-and-control regulation. I don't think that is the right model for us here. But over time, environmental protection advocates realized that industry needed to be at the table in determining what the solution was and then also needed to be at the table in executing it. I think that is where we are in cybersecurity. We need to work together to figure out what the right answers are and then to deliver them. The micro example, just the information-sharing and analysis center within our sector I think is a good model of public-private collaboration. It is largely chartered and, in many ways, supported by Government resources. It helps us connect with other sectors. But it is a private-led, voluntary effort that we think has brought us great progress. Mr. Keating. Ms. Hathaway, did you have any thoughts? Ms. Hathaway. I think that there is a lot that could be done by turning to the internet service providers and the telecommunications companies as the first order of warning and defense. Australia has adopted a code of practice or a code of conduct where 90 percent of their telecommunications providers have opted in, without regulation, to provide that service to the core infrastructure. Europe, within the European Union, have adopted Telecommunications Directive 13a, which is regulating all of the internet service providers within all 27 countries to provide that service across their infrastructure. I think that the United States could learn from those different experiments and/or capabilities and understand what the costs are to better clean and keep our infrastructure clean and warn us of the impending threats. Mr. Keating. Great. Thank you very much. Mr. Lungren. I thank my fellow Members of the subcommittee for attending. I thank the witnesses for their valuable testimony. This has been very, very helpful. It is the beginning of the inquiry, in a real sense, rather than the end of it. Members of the committee may have some additional questions for the witnesses, and we would ask you to please respond to those in writing. The hearing record will be held open for 10 days. The subcommittee stands adjourned. [Whereupon, at 11:50 a.m., the subcommittee was adjourned.] A P P E N D I X ---------- Questions From Chairman Daniel E. Lungren for Melissa Hathaway Question 1. From media reports, China is engaged in the most damaging hacking campaign in history. At the same time, its primary telecommunications equipment provider continues to gain U.S. market share, including in the Federal market. What solutions can the Federal Government pursue against foreign espionage? How can the private sector protect against the threat? Answer. The Webster's definition of espionage is, ``the practice of spying or using spies to obtain information about the plans and activities especially of a foreign government or a competing company.''\1\ There is a long history of espionage and in general, it is a globally accepted practice of intelligence collection to better understand Government and company intentions. The National Counter Intelligence Executive (NCIX) tracks these trends and reports to Congress the status of foreign economic collection efforts and industrial espionage.\2\ In its fiscal year 2008 annual report, NCIX reported that ``foreign economic intelligence collection and industrial espionage has continued unabated.''\3\ The newspapers highlight everyday that companies and governments regularly face attempts by others to gain unauthorized access through the internet to the information technology systems by, for example, masquerading as authorized users or through the surreptitious introduction of software. However, this does not negate the need to limit foreign espionage that has become increasingly more pervasive and sophisticated against our public and private sectors. Furthermore, focusing on one opponent may distract our industry and Government from implementing a more complete strategy. --------------------------------------------------------------------------- \1\ http://www.merriam-webster.com/dictionary/espionage. \2\ Industrial espionage, which is the knowing misappropriation of trade secrets related to or included in a product that is produced for or placed in interstate or foreign commerce to the economic benefit of anyone other than the owner, with the knowledge or intent that the offense will injure the owner of that trade secret. Misappropriation includes, but is not limited to stealing, copying, altering, destroying, transmitting, sending, receiving, buying, possessing, or conspiring to misappropriate trade secrets without authorization. Industrial espionage is also criminalized under the Economic Espionage Act. \3\ http://www.ncix.gov/publications/reports/fecie_all/fecie_2008 ///2008_FECIE_Blue.pdf. --------------------------------------------------------------------------- Potential Solutions The Federal Bureau of Investigation (FBI) and the intelligence community need to better inform industry of the threats they are facing and how they are being exploited or penetrated. A training program to educate corporate leadership on how to mitigate the risk of being a high-value target, including providing them with briefings about the threat to their industry using specific case studies, would go a long way to reducing the number of incidents and loss of confidential information. DoD is proposing to amend the Defense Federal Acquisition Regulation Supplement (DFARS) to add a new subpart and associated contract clauses to address requirements for safeguarding unclassified DoD information. This development is essential because emerging, pre-classified military technologies or commercial breakthrough technologies are increasingly becoming the target of espionage. The proposed DFAR changes would require industry to implement basic security measures to increase their defenses from cyber intruders. Engage the United States Department of State's International Telecommunication Advisory Committee (ITAC) \4\ and the Advisory Committee on International Communications and Information Policy (ACICIP)\5\ to better understand predatory trade practices in the United States and elsewhere and develop strategies to respond to these practices in a timely manner. Use these advisory councils and others to gain a better understanding of what trade and economic implications are to U.S.-based corporations if other countries impose a Committee for Foreign Investment in the United States (CFIUS) like regime to protect their respective National and economic security interests. --------------------------------------------------------------------------- \4\ The United States International Telecommunication Advisory Committee (ITAC) advises the Department of State in the preparation of U.S. positions for meetings of international treaty organizations, develops and coordinates proposed contributions to international meetings as U.S. contributions, and advises the Department on other matters to be undertaken by the United States at these international meetings. The international meetings addressed by the ITAC are those of the International Telecommunication Union, the Inter-American Telecommunication Commission (CITEL) of the Organization of American States, the Organisation for Economic Co-operation and Development (OECD) and the Asia-Pacific Economic Cooperation (APEC). Members of the ITAC are drawn from the Government, network operators, service providers, and manufacturers involved in the telecommunications sector. \5\ The Advisory Committee on International Communications and Information Policy (ACICIP) serves the Department of State in an advisory capacity concerning major economic, social, and legal issues and problems in international communications and information policy. These issues and problems involve users and providers of information and communication services, technology research and development, foreign industrial and regulatory policy, the activities of international organizations in communications and information, and developing country interests. --------------------------------------------------------------------------- Congress should consider updating the Economic Espionage \6\ Act of 1996. While the definition of trade secret is consistent with the Uniform Trade Secrets Act, which states that the information is subject to reasonable measures to preserve its secrecy and derives independent economic value from not being generally known to or ascertainable by the public, the threshold for protection is too high. As such, industry is required at the onset of the development to protect any idea as a trade secret. Addressing the broad-based economic industrial espionage that we are observing on our corporate networks requires that the Government lower the threshold for a trade secret or add a threshold around proprietary information. --------------------------------------------------------------------------- \6\ Economic espionage, which is the knowing misappropriation of trade secrets with the knowledge or intent that the offense will benefit a foreign government, foreign instrumentality, or foreign agent. Misappropriation includes, but is not limited to, stealing, copying, altering, destroying, transmitting, sending, receiving, buying, possessing, or conspiring to obtain trade secrets without authorization. Section 101(a) of the Economic Espionage Act (EEA) of 1996 criminalizes economic espionage. --------------------------------------------------------------------------- Question 2. A large issue facing appropriate risk management for Government and critical infrastructure is supply chain risk management since so much of our software and IT equipment is manufactured overseas. What's the best approach for better evaluating the security of our IT supply chain? Answer. The internet and the information communications infrastructure has evolved and has been enhanced by global commercial innovation. While the United States incubated its beginning through the Advanced Research Projects Agency (ARPA) in the late 1960s, and helped it flourish through Palo Alto Research Center and the companies of silicon valley, its evolution and the attendant benefits to society have come from many other countries and global corporations. Our infrastructure is dependent on this global marketplace and our economy is dependent upon this backbone remaining secure and resilient. A broad, holistic approach to risk management is required rather than a wholesale condemnation of off-shore development, foreign products and services, or foreign ownership. The best approach to securing our IT supply chain is one that is transparent, mindful of unintended second order consequences, and aids in decision making. We must recognize that the supply chain consists of many phases: Design, manufacture, integrate, distribute, install and operate, maintain, and retire--and any conversation regarding security of the supply chain must apply to the entire lifecycle. To meet tomorrow's threats, we must develop protection measures across the product lifecycle and reinforce these measures through acquisition processes and effective implementation of agency security practices. For example, the highest risks in the supply chain are ``after build'' (e.g. install and operate and retire phases) because this is where multiple vendors participate in the process (e.g., integrate products with other systems, patch/update, etc.) and there are few measures to monitor and assure integrity throughout the entire process. To understand alternative approaches will require a partnership with industry that assures coordination and buy-in that enables industry to ``do the right thing'' and not be penalized in the process. A dialogue has begun via the Open Group Trusted Technology Forum and it enjoys international participation by governments and industry alike. The Open Trusted Technology Provider Framework sets forth best practices identified by a cross-industry forum which, if used by a technology vendor, may allow a Government or commercial enterprise customer to consider the vendor's products as more secure and trusted. Moreover, the Cyberspace Policy Review called for the need to ``define procurement strategies through the General Services Administration, building on work by the National Security Agency for the Department of Defense, for commercial products and services in order to create market incentives for security to be part of hardware and software product designs, new security technologies, and secure managed services.'' The efforts of the United States General Services Administration (GSA) in working to address this requirement through the SmartBUY blanket purchase agreement awards aimed at providing better cybersecurity protection to Federal, State, local, and Tribal governments should be strongly supported. Under its new Federal-wide Situational Awareness and Incident Response (SAIR) Tier II cybersecurity initiative, GSA will use the procurement process to help protect our IT infrastructure from cybersecurity incidents and other vulnerabilities, while providing maximum value for taxpayer dollars. These two initiatives are good steps toward enhancing the security of the supply chain while at the same time being mindful of market forces. Question 3. Will the administration's proposal of DHS authority over the private sector--which envisions Federal ``framework,'' used to develop cyber plans, and a subsequent evaluation of those plans-- provide the necessary flexibility to optimize private sector security? Answer. Not necessarily. The legislative proposal states, ``the owners or operators of covered critical infrastructure shall develop cybersecurity plans that identify the measures selected by the covered critical infrastructure to address the cybersecurity risks in a manner that complies with the regulations promulgated, and are guided by an applicable framework designated.''\7\ This proposal attempts to establish a minimum standard of care and an audit and certification function that would be similar in kind to the Securities and Exchange Commission (SEC) requirement for attestation of material risk. Inserting DHS into a regulator role runs the risk of diluting its operational and policy responsibilities, which would detract from the Nation's security posture. In May 2011, Senator Rockefeller asked the SEC to look into corporate accountability for risk management through the enforcement of material risk reporting.\8\ And in June 2011, Chairman Schapiro said that the SEC would look into the matter. If Congress believes corporations should meet such a reporting requirement then it should turn to the SEC, which is the Executive Branch Independent Agency responsible for this type of reporting, and not add an additional mission responsibility to DHS. --------------------------------------------------------------------------- \7\ The White House. Cybersecurity Legislative Package: Cybersecurity Regulatory Framework For Covered Critical Infrastructure Act. \8\ Senator Rockefeller letter to SEC Chairman Mary Schapiro. 11 May 2011. --------------------------------------------------------------------------- Question 4. Will the authorizations for DHS to ``work with'' the Federal Acquisitions Regulatory (FAR) Council to improve supply chain security have any practical effect? Answer. It is unclear. Adjusting the way that the Government procures goods and services can be a catalyst for change but may not necessarily make a material difference in the security of the supply chain. The key is to decide what are the measures of performance that are desired and under what conditions? If the level of security assurance increases, but price goes up unacceptably, is that success? Changes to the FAR can certainly result in change to business processes. The changes in business processes may result in increased costs which will be passed onto the Government and other customers. It also is important to realize that any change to the FAR may not apply across the Federal Government. Some agencies are exempt from these rules including: the Central Intelligence Agency, the United States Postal Service, the Tennessee Valley Authority, the Federal Aviation Administration, and the Bonneville Power Administration. In these cases, the agency promulgates its own specific procurement rules. Question 5a. The White House has directed that all Federal Departments and Agencies move a portion of their data processing and storage to the cloud in the coming years. While that strategy is a good one when it comes to making the most of Federal IT spending in these fiscally demanding times, how can the security of the cloud be evaluate and improved to ensure that we're not taking unnecessary risks with mission-critical data? Answer. According to the National Institute of Standards and Technology (NIST), ``Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources [e.g., networks, servers, storage, applications, and services] that can be rapidly provisioned and released with minimal management effort or service provider interaction.'' The key tenet of the cloud is availability. But the other two cornerstones of information security--integrity and availability--are not readily commanded by the cloud environment. The October 2010 report from Forrester on cloud security states that security is the single biggest barrier to broad cloud adoption. In December 2010, the Office of Management and Budget (OMB) issued a report entitled the ``25 Point Plan to Reform Federal Information Technology Management'' and in February 2011 it published another report entitled, the ``Federal Cloud Computing Strategy,'' where it articulated the need for: Consolidation, efficiency, and reduction in IT spend. The second report directed each department and agency to identify three ``must move'' services within 3 months, and move one of those services to the cloud within 12 months and the remaining two within 18 months. Most departments and agencies are looking to move email to the cloud as their first project. The GSA is developing a contract vehicle to service agency needs for cloud computing, entitled Federal Risk and Authorization Management Program (FedRAMP). Many within industry are raising substantive concerns with the proposed controls and specifications as being too difficult and costly, and that they potentially could prevent vendors from being able to move agency computing operations to the cloud by the deadline. Any cloud environment that is to be used to process Government workloads must be able, at a minimum, to demonstrate that it provides the same level of security (as defined in the question) as a traditional system. Currently, this is demonstrated via a Federal Information Security Management Act (FISMA) certification and accreditation (C&A) process, which process has been roundly criticized as a compliance-based framework focused upon a snap-shot in time. While one can argue that a cloud computing environment can be made more secure than a traditional one by leveraging certain aspects and features of virtualization and other enabling cloud technologies, the security ecosystem (technologies, control frameworks, audit procedures, threat models, etc.) must account for the unique attributes and vulnerabilities of cloud computing to be relevant. Having said that, several large-scale efforts are in progress, in both Government and industry, to rigorously measure risk related to cloud computing implementation. Among these are: (1) The ``Proposed Security Assessment & Authorization for U.S. Government Cloud Computing'', drafted and released for comment and public input jointly by National Institute for Standards and Technologies (NIST), GSA, the Federal CIO Council, and some of its subordinate working bodies; (2) the Cloud Security Alliance, an industry association centered on cloud computing, has developed a Cloud Controls Matrix, which cross-connects established security requirements in the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Health Information Technology for Economic and Clinical Health (HITECH) Act, International Standards Organization (ISO), IEEE, NIST publications, FedRAMP, and other sources; and (3) the Defense Science Board has launched a task force to review cybersecurity and reliability in a digital cloud. There is broad agreement among serious information security practitioners that the task of defining security standards for cloud computing is a work in progress, and several organizations have commissioned studies, (e.g., the Intelligence and National Security Alliance (INSA) and the Armed Forces Communications and Electronics Association (AFCEA)) now in progress, to evaluate and report on specific aspects of the subject. In my opinion, one of the best, objective reports that describes the opportunities and vulnerabilities associated with cloud computing, is one that was published in November of 2010 by the European Network and Information Security Agency (ENISA), entitled: Cloud Computing: Benefits, Risks, and Recommendations for Information Security. Question 5b. How can continuous monitoring be implemented in the cloud environment? Do you have any current examples of strong security in the cloud? Answer. It is important to recognize that the term ``cloud computing'' embraces several different technical and process models, which by their nature have highly-differentiated levels of monitoring and control by sponsoring organizations/hosts, and concomitantly, very- different levels of active participation by hosted entities. And when considering these, one must keep in mind that the implementation of the cloud is the most important aspect and no two clouds are implemented exactly the same. How continuous monitoring gets implemented in the cloud very much depends on the type of cloud environment and the willingness and capabilities of the provider to conduct continuous monitoring activities. There are numerous technologies that exist today or that are in development to enable the monitoring of the cloud (e.g., infrastructure, systems, and data). The real question is: What is being monitored and does it actually correspond to the proper threat model? The United States Department of State may be an example to turn to as it has the ``first mover advantage'' for use of a secure cloud environment. It is applying a high degree of rigor in timely scanning and prioritized remediation through continuous monitoring--thereby providing a more secure common baseline for all. As such, there can be no general answer to this question. However, certain ``private clouds'', hosted by highly-competent security organizations and providing infrastructure, platform, and/or software services to members of their own organization only, may be considered highly-secure. Examples would include certain clouds developed and used inside National intelligence agencies, hosted on-site and with access limited to authorized employees of those organizations. In such cases, the economic virtues of efficiency and economy of scale is use of IT resources may accrue, but security of hosted data, participants, infrastructure, and services are all tightly controlled. Questions From Chairman Daniel E. Lungren for Gregory E. Shannon Question 1a. DHS has been developing the National Cyber Incident Response Plan, which it exercises through its bi-annual response plan. What more should the Federal Government be doing to improve response to cyber attacks? Answer. Encourage more frequent agency and interagency cyber exercises that will identify technological and procedural gaps as well as build working relationships and trust both within and across agencies. For any response activity to be effective the organizations that participate in the response need regular, structured, measured practice, weekly or monthly if possible. This practice builds common understanding of the processes and technologies to be used as well as builds trust among the various participants. These exercises need not be immense/expensive; smaller-scale exercises testing various subcomponents of a response plan on a regular basis would be valuable and cost-effective. Support timely access to operational situation and incident data. The Federal Government should study the history of the PCII program and the lessons learned to update it to be more attractive to industry. Encourage making meaningful sets of operational data accessible to researchers so that they can determine what data is best to share and what prevention/response tactics are most effective. Question 1b. Are there priorities for DHS response planning that would be helpful to include in legislation? Answer. Priority: How the Federal Government should engage the private sector in a major incident--what information should agencies provide and when will they provide it? Plans should include: How to engage the private sector in a major incident, which entities does the Government need cooperation from, and how is best to collaborate? This will make the Government more predictable; allowing the private sector to then plan appropriately. Priority: Grant Federal CIOs more authority for protecting their cyber infrastructures before incidents occur. It's difficult, if not impossible, to defend that for which one had no hand in creating. Question 2. When CMU-CERT is engaged in a response to a cyber attack, what is the greatest difficulty of getting information from the private sector? Answer. There are several significant barriers to getting the private sector to share information. The Federal Government is frequently hard-pressed to convince the private sector that there is real value in sharing information with them. The perception continues to be that when industry shares information they receive nothing (or nothing of value) in return from the Government. CERT has been a part of successful models, such as the work done by DC3 in the operation of the DoD-Defense Industrial Base Collaborative Information Sharing Environment (D-CISE), whose example could be built upon in other critical infrastructure sectors. It takes effort to demonstrate to the private sector that the Government can be helpful; e.g. by extracting indicators from sensitive data or by creating the environments and the tools for cleansing data so it cannot be attributed to its source and thereby shared with the private sector. Additionally, the private sector has multiple concerns about the potential adverse effects of sharing information--those barriers, such as fines, litigation, etc. should be identified and eliminated through incentives and safe harbors, where possible. On the other hand, while some entities might not want to share, a large number of companies (particular small- to medium-sized businesses) do not have the capabilities to collect and/or analyze the data that is necessary for their own protection much less useful to the Government. What needs to be shared is actionable information and the capability to successfully implement the actions must still be built. The Government could encourage industry to develop the competency using incentives (e.g. the Government could consider subsidizing these competencies thru CNDSP or MSSP models). How information comes to the Government can also have significant impact on whether or not the Government can disseminate critical data to prevent further impact to other entities. In many cases, the Government knows what is happening, but effective communication of remediation information is often limited. At times, information comes in via reporting with so many restrictions that the Federal Government cannot share the data. Savvy organizations are realizing that they can ``have their cake and eat it too'' by complying with the reporting requirements but while still ensuring that no data, remediation information, or conclusions from their incident is distributed. Lastly, the Government, in its handling of classified information, should examine current practices to find effective ways to separate actionable information from classified or privileged data so that incident data can be used to help others protect themselves. Question 3a. How do we bridge the gap between operations and research to transition technology in a timely and effective manner? Answer. In order to effectively transition research for real-time operations there must be stronger feedback mechanisms between operations and research. We believe CERT is a successful model that brings together researchers and operators and could be an effective paradigm for others. The CERT Program at the SEI, through its customer engagements with security operations centers, network operators, vulnerability and malicious code analysis centers, incident response teams, law enforcement investigators, and intelligence analysts, has a first-hand view into the state of security in our National critical information infrastructures. This view helps us understand the security strengths and weaknesses of fielded technology and systems, the evolving threats and associated attack methods and tools, the effectiveness of current security technologies and practices, and the security needs of system operators. Empirical data from our DoD and other Government customer engagements ensure our research and development agenda is grounded in operational problems and realities, and we are addressing significant problems for which effective solutions do not currently exist. This model also creates an environment where solutions can be rapidly deployed and prototyping with strategic customers helps set realistic transition paths for the broader community. The challenge in transitioning potentially important cybersecurity innovations from small companies and startups is especially profound. Having spent half of my (Dr. Shannon) career in such companies, I know this challenge first-hand; it is difficult, if not impossible, to get timely operational feedback on one's technology when dealing with Government customers. I encourage the subcommittee to support efforts to bring together operationally relevant data and small companies so that: (1) Government entities can determine if there's promise in the technology, and (2) the small company can quickly iterate and adapt to the realities of the operational data. The challenge is to create a continuous capability with steady inflows of technologies, operational knowledge, and Government needs. CERT/SEI/CMU is already doing this successfully but intermittently for specific customers with innovations from academia. Sustaining this activity at CERT and elsewhere and expanding it to small companies would improve the flow of effective cybersecurity and incident response innovations into the Government. Question 3b. And what resources are needed? Answer. The Government would greatly benefit from establishing and maintaining a sustained cybersecurity and response innovation acceleration program focused on transitioning innovations from the private sector to the Government with subsidies for small businesses and universities and incentives for larger businesses. This endeavor could be funded at $4-6 million/year and would bring four essential elements together: Unique operational data sources, private innovations, informed scientific evaluation, and Government needs. The goal, from first contact with a company, would be to operationally deploy their validated innovation(s) in less than a year within some meaningful part of the Government. Question 4. How can we increase our confidence in the various technical and policy solutions proposed at any point will be as effective as promised/implied? Answer. Encourage the use of scientifically validated metrics and measurements in studies about proposed solutions. Too often cybersecurity solutions proposed have been based on limited evidence and/or scientifically unvalidated data and techniques. The ability to measure effectiveness of technology and new policy is an area sorely in need of research and deeply in need of funding. I (Dr. Shannon) am truly humbled at how little that we experts say we ``know'' about cybersecurity and incident response that has actually been scientifically validated. Research sponsors should be encouraged to invest in ``the empirical science of cybersecurity'', including the development of metrics and experimental methods that support measurement of the effectiveness and cost/benefit of proposed security solutions. Question 5a. In your testimony you mention that the Government should focus on three things to improve incident response capability, information sharing, forensic analysis capability and training. Focusing on information sharing, in your opinion does requiring reporting improve the quality of reporting or just the quantity? Answer. Today, such a requirement would only increase the quantity. Per our answers to the other questions above, research into what is the right data to share as well as cost-effective means to collect and analyze the data will enable mandatory reporting requirements to improve the quality of the data. With mandatory reporting requirements should come clear guidance on what data and associated meta-data needs to be shared; under what circumstances; ideally normalized using a common taxonomy represented and exchanged using standardized formats and protocols. Research is needed in these areas; NIST and others are already working on some of these issues. How the data should look (form/format) is the easy part; what data is most useful is much harder. Question 5b. Can too much information actually be a problem or can there never be too little information when it comes to cybersecurity incidents? Answer. Since a cybersecurity incident investigation often starts as an attempt to discover the true scope and scale of what transpired, various data sources need to be synthesized. The issue is not necessarily having more data, but the right data. We frequently see cases where information collected and shared is useless. Without context about the incident, it is difficult to abstractly predict what might be needed in advance. There is inherent cost in extracting and delivering the data. Hence, it is convenient to know what data is available and to be able to request it on demand. Achieving this enhanced situational awareness will require continued research and pilot programs with data owners. Question 6. How can legislation assist in facilitating capable, scalable, and cost-effective cyber incident response for Government and critical infrastructure? Answer. Encourage public/private cooperation and access to data for empirical research. Support training operators in the same context as they work. Support scalable forensics capabilities. Regularly recognize successes in cybersecurity and incident response. Successful response requires close cooperation between the Government and the private sector, so as mentioned in question No. 1, inclusion of the private sector in plans for incident response would greatly improve response effectiveness. Expanding the scope of the current policies to include plans for working with industry would allow for more timely and capable responses. Cooperation should also include access for innovators to incident data, which will result in better, scientifically validated solutions. Additionally, the Government must continue to engage the community at large to maintain perspective on what currently exists, both in terms of technological gaps and solutions. People who respond to cyber incidents must be adequately trained. The Government needs a training solution that is scalable and cost- effective, such as CERT's Virtual Training Environment (VTE) and X-NET. Traditional training and education models still employ brick and mortar classrooms to provide infrequent instruction directed at individual students. These models simply cannot keep up with the pace of change or provide successful and cost-effective mechanisms for organizations to gain and maintain the real-world experience needed to operate effectively in cyberspace. Civilian employees cannot use production agency networks for operational training and ranges or laboratory environments can be costly to develop, operate, and maintain. In addition to training and practice limitations, agencies currently do not have any reliable capability to assess the operational mission readiness of their cyber workforce. The current unit-level cyber assessment mechanisms rely on artificial paper-based simulations and ``cyber-add-ons'' to intra- and interagency exercises. Neither approach provides for reliable mission-readiness evaluation and reporting of workforce effectiveness. CERT's VTE provides rich media instruction and hands-on training labs to remote students over the internet. It enables students to access high-quality training on security, computer forensics, and incident response anywhere in the world, with only a web browser and an internet connection. What's more, VTE is a cost-effective way to train the workforce,\1\ and has no expiration date, allowing students access to all training modules as often as they want and for as long as they want after completing training. Students can continually return to the module to practice and test the network, closing the gap between learning a concept and using that concept. --------------------------------------------------------------------------- \1\ High-Fidelity e-Learning: SEI's Virtual Training Environment (VTE): TECHNICAL REPORT CMU/SEI-2009-TR-005 ESC-TR-2009-005: VTE was used to deliver 38,157 hours of training for DISA during the period from January 1, 2007 through October 31, 2007. The American Society of Training and Development (ASTD) reports that the average cost per learning hour delivered by its members in 2006 was $54.25. According to the ASTD data, the value of VTE-delivered training is therefore $2,070,017 ($54.25 per hour 38,157 hours = $2,070,017.25). The total cost to DISA for the VTE-delivered training was $858,250. This represents a cost savings to the DISA of $1,211,767 as compared to what they could have expected to pay at prevailing industry average costs. The total return on investment for the DISA is 141 percent. (($2,070,017 - $858,250) / $858,250 = 141%). --------------------------------------------------------------------------- CERT's Exercise Network (XNET) provides real-world experience building and readiness evaluation via synchronous, team-based, scenario-driven cyber exercises. Experience through routine practice is known to be the decisive factor in how effectively individuals and organizations respond during incidents and emergency situations. XNET is designed to make this routine practice web-accessible for globally distributed teams and units. The Federal Government needs to address its current backlog of cyber forensics data, as well as, collect forensics data in on-going cases in a timely and cost-effective manner. To help augment the cyber forensic capabilities of law enforcement the CERT program created the Clustered-Computing Analysis Platform (C-CAP). C-CAP is designed to support 200 concurrent computer examinations looking at 200 terabytes of data, allowing for a massive, coordinated effort. Absent catastrophic events, the C-CAP environment can offer underequipped or overwhelmed agencies real-time additional resources. C-CAP is a state- of-the-art forensics analysis environment that provides a complete suite of tools for host-based and network investigations. C-CAP augments scarce resources by allowing multiple users to view the same data, either remotely or locally; while maximizing the application of specialized computing resources to the forensic and incident response missions. Analysts and investigators enjoy flexible, secure access to high-performance systems, increasing productivity and facilitating distributed collaboration. Designed specifically for forensics and incident response analysis, this unique integration and packaging of tools, accelerates the analysis processes, maximizes performance and reduces costs. C-CAP is a flexible solution, allowing agencies to add or remove components that are relevant to their particular needs. Its unique centralized management interface allows organizations to rapidly allocate platform resources to tasks or analysts. Scalable and cost- effective, C-CAP can be customized to suit any organization, regardless of size and mission. Finally, we recommend that the Government recognize and reward good examples of secure systems and practices. In the end, infrastructure components need to be built more securely in the first place and by highlighting those organizations who are doing it right, the Government can incentive others. The Baldrige Program is administered by the National Institute of Standards (NIST) and educates organizations in performance excellence management and administers the Malcolm Baldrige National Quality Award. This public-private partnership is helping organizations achieve best-in-class levels of performance; identifying and recognizing role-model organizations; identifying and sharing best management practices, principles, and strategies. A similar program or award in the area of security and resiliency could yield substantial benefits. Questions From Chairman Daniel E. Lungren for Leigh Williams Question 1a. You describe a large number of items members of the financial services sector undertake with respect to cybersecurity. Can you compare these activities with those of the other sectors? Answer. We are not in a position to compare the quality or quantity of cybersecurity efforts in other sectors to financial services, but we can identify some similarities and differences. As a similarity, we recognize that individual companies in telecommunications and information technology invest heavily in cybersecurity and resiliency. We understand that one difference is that financial institutions may do more collaborative work because they are so technically and commercially interconnected and because regulations tend to promote standardization. Question 1b. Which of these activities are the product of voluntary action by the BITS community and which are the result of Federal or State regulations? Answer. At the institution level, most BITS members' cybersecurity programs are primarily motivated by business and customer interests. Regulations sometimes reinforce these motivations, but also sometimes require slightly different solutions. For example, under Gramm-Leach- Bliley, banks are required to have security programs that incorporate specific elements and that are reviewed by their boards. Without the regulation, the vast majority of banks would still have plans, but perhaps with different mixes of elements, and with review processes specific to their governance strategies. At the industry level--in efforts such as the mobile, cloud, social networking, and malware efforts mentioned in our June 24 testimony--virtually all of the collaboration is purely voluntary. Question 1c. What is the cost of complying with these activities? Answer. We do not have a specific estimate of regulatory compliance costs in cybersecurity. We do believe, however, that elevated compliance costs can crowd out risk management spending and investments in innovation, and can increase costs to customers and reduce institutions' returns. Question 2. Under the administration's proposal what new cybersecurity activities would BITS members undertake that they are not now doing? Answer. Under the administration proposal, there would be at least two ways in which BITS members could more effectively share information with other sectors. First, because other sectors could be prompted to produce more information and DHS would be tasked with aggregating it, there would be more information available to exchange with our colleagues in other sectors. Second, the safe harbor and confidentiality provisions would reduce the risk of actively sharing information with the other critical infrastructures and with DHS. Question 3. You are endorsing the administration's legislative proposal, which does not carve out the financial sector from its reach. With this endorsement is it to safe to assume that the financial industry will not be lobbying for a carve-out or any special treatment if the administration's proposal moves forward? Answer. BITS does not intend to advocate for the financial services sector to be carved out. BITS and its members do believe that the existing financial regulatory frameworks and the proposed approach will have to be reconciled. As we testified, this could be accomplished, for example, by recognizing where substantially similar requirements already exist, by leaving substantial authority within the sector, by requiring DHS to work through the sector-specific agencies and primary regulators, or by DHS delegating authority back to the sector-specific agencies and primary regulators. Question 4a. Your testimony praises the administration's legislative proposal for a variety of things like coordinating with companies and other agencies; however, it was my understanding that most, if not all, these activities are currently going on without this legislation. Which specific provisions of the administration's proposal will cause BITS members to make security improvements beyond their current activities and why is legislation required to get the BITS membership to undertake these activities? Answer. Yes, BITS members are already satisfying many of the requirements of the administration's proposal. The value of the proposal does not arise primarily from BITS members individually improving their security programs. Much of the value arises from companies in multiple industries and Federal agencies with various missions working in closer cooperation on common problems. We think this is happening reasonably well within our sector, but we see room for improvement between sectors. Question 4b. How much will these legislatively-mandated activities by BITS members improve security? Answer. While the mandates in the proposal may improve BITS members' cybersecurity practices, we see much of the potential improvement coming from enabling more voluntary collaboration. For example, as noted above, we would anticipate improved information sharing and consequently better collective security among multiple sectors, including financial services. In closing, we reaffirm our commitment to addressing this critical issue, and thank the committee for its active engagement. Please feel free to contact me with any further questions or concerns. Questions From Chairman Daniel E. Lungren for Larry Clinton Question 1. Playing Devil's advocate, if critical infrastructure must be regulated, what do you think that regulations should look like? What is an appropriate framework for regulations? Answer. Although the ISA generally supports market incentives as opposed to Government regulation as the best way to spur the needed investment in cybersecurity, this is not an absolute. In fact ISA has always advocated a multi-tiered system with appropriate regulation mixed with market incentives. This approach is developed more fully in the ``The Cyber Security Social Contract: Policy Recommendations for the Obama Administration and the 11th Congress'' (2008) and the ``Social Contract 2.0: A 21st Century Program for Effective Cyber Security'' (2009)--both attached. The key consideration is that cybersecurity is not simply an ``IT'' issue but an enterprise-wide risk management issue. If we are considering cybersecurity as a risk management issue we need to assess not only the technical considerations, but also the economic considerations. Research has consistently demonstrated that cost is the single biggest barrier to implementing effective cybersecurity standards, practices (see CSIS and Pricewaterhouse Coopers studies cited in my written testimony) and technologies which other research has demonstrated to work (see NSA testimony, PWC survey, and Verizon ///Secret Service studies cited in my written testimony). Where regulation is an inherent part of the economics of an industry, such as in many critical infrastructures (electricity, water, nuclear power etc. as well as some element of the financial system) than the traditional regulatory structures may be an effective tool for promoting appropriate investment in cybersecurity. Indeed in some industry sectors of great interest to cybersecurity policy makers regulation could be a more effective mechanism than a market incentive if, as in the case of water systems for example, there really is no market. Of course many of these entities are regulated at the State and local, not Federal level. Moreover, as the decision making devolves to lower levels of Government more localized issues may evolve. For example a State PUC may be resistant to approving investments by a power company for fear of the effect this may have on local utility rates which could have political complications for members of the State commission. However the Federal Government has long history in finding ways to provide incentives to the States and localities to adopt policies in the National interest. However even in some of these regulated sectors, market incentives may still be a better mechanism than regulation. The regulatory structure in most instances is too slow to keep up with the pace of cyber attack vectors which change with the speedy evolution of technology. Also regulation tends to push entities to achieve minimal compliance whereas we may need a more aggressive effort on the part of enterprises not just to comply with minimum standards but to affirmatively look for malware and cooperate with broad industry sectors, and possibly beyond in information-sharing activities (see paper on information sharing by Jeff Brown in the attached Social Contract 2.0). For many of these sectors a more effective mechanism may well be the use of streamlined regulation wherein outdated provisions or redundant audit requirements could be offered in return for investment in more aggressive methods of cybersecurity including intensive internal monitoring of unauthorized outbound traffic and participation in creative and more modern models of information sharing than are currently being operated by DHS (see Brown paper cited above). Question 2. We have had a public-private partnership for several years yet the cyber problem continues to grown, doesn't that indicate that the model doesn't work? Answer. To begin with I'd suggest this is a non-sequitur. The reason the cyber problem has grown is not that the partnership has failed but because the current incentive structure massively favors the attackers. Cyber attacks are cheap, easy to acquire, and can generate massive profits. While cyber defense is a generation behind the attackers, it's difficult to justify ROI since metrics for prevented attacks are impossible to generate and cyber criminals are rarely caught. Moreover, both the Cyber Space Policy Review and the most recent Verizon/Secret Service study have demonstrated that the market has already produced adequate mechanisms to prevent or stop most attacks which suggests the market is working (indeed most attacks are currently stopped--just too many still get through). That said, the ISA has said from the first publication of the National Strategy to Secure Cyber Space (2002) that the missing link in the public-private partnership is the lack of incentives. The public- private partnership is the right model but it needs to be evolved to meet the modern threats and more fully implemented--especially by the Government partners. Research cited above as well as in my written testimony has long demonstrated that that only a substantial minority (probably between 30% and 40%) of enterprises have what may be called a natural ROI for security investment. When such as natural confluence occurs then private sector entities will make adequate security investment. However, as illustrated in the pan-association White Paper on cybersecurity (cited in my written testimony and also attached) in most instances the public sector and private sector assess risk differently. In short form, for most of the private sector security is simply an economic consideration. If you own a warehouse and 10% of your inventory is ``walking out the back door'' every month, you will not buy the cameras, hire the guards, etc. to solve your security problem if your study shows that it costs 11% to do so. That is a good risk management decision from a private-sector perspective. The public sector has economic considerations, but also additional non-economic considerations (National security, privacy, politics etc.) and thus may have a lower-risk tolerance than their private partners because they simply assess risk differently. However, as the trade associations who signed onto that paper have attested, we recognize that in an interconnected cyber world the private sector may be required to take on new, non-economic, and traditional public sector responsibilities with respect to cybersecurity. Therefore the public-private partnership which has heretofore ignored the economic aspects of cybersecurity needs to evolve into a fuller and more sustainable model which includes Government finding ways to offset the non-economic investments it would like private industry to make in the interests of broad National security. Additionally, the fact is that the public sector has not been faithful to following through on their responsibilities in the partnership as laid out both in the NIPP and the Cyber Space Policy Review. For example, markets cannot function without information--a central tenant of Wall Street--but it is well-acknowledged that despite millions spent on supposed Government information-sharing programs most such shared information is of little or no use to the private sector. Government still does not share the actionable threat information that would allow among other things for a proper assessment of cyber risk and assist greatly in making the proper investments. Industry is not blameless here also. As illustrated in two additional volumes attached (``50 Questions Every CFO Should Ask About Cyber Security'' and ``The Financial Management of Cyber Risk'') industry, largely due to antiquated corporate structures and misunderstandings about the true nature of the cyber threat tends to misunderstand the true financial implications they are dealing with. These and other issues explain why the partnership has not fully worked are more extensively detailed in the pan-association white paper. Question 3. Mr. Clinton, you advocate for the providing of market incentives to the private sector to improve cybersecurity, given the significant budget issues the Congress faces how can we afford to provide market incentives for cybersecurity to the private sector? Answer. One of the most persistent problems with digital economics is that everyone wants to capture the profits of digital technology but resists reinvesting a small portion of these profits in securing the technology that is generating them. Nearly every company in the world has by now factored into its business plan the wonders of digitalization--web-based marketing, international supply chains, VOIP instead of traditional telecommunications, and remote workers. Yet, as described above we are not getting the investment in cybersecurity that we should. This is true for the Federal Government as well. For example the Obama administration has announced a ``cloud first'' strategy for the Federal electronic systems that they claim will save them between $20- 50 billion a year. Some of that money ought to be being plowed back into system-wide--not just Government--cybersecurity. However, assuming that none of this money will be invested in market incentives there are still many levers the Federal Government can use to generate more private cyber investment which require little or no Government spending. Ironically, many of these incentive structures are widely used in other areas of our economy; we simply have not yet applied them to cybersecurity. The key is to reduce Government-induced costs on industry, rather than provide direct Government subsidies such as with tax incentives. For example many companies may be attracted to making greater cybersecurity investments in return for lower liability. Less stringent liability costs the Government nothing but cold be perceived as an economic benefit to industry. Another example is streamlined regulations, or as appropriate accelerated permitting and approvals. For example many enterprises are buckling under redundant cybersecurity auditing requirements. If the Government could develop a sound baseline audit to simply remove the redundancy this could be offered as a carrot to enterprises that demonstrate investment in proven effective e-cybersecurity techniques such as those identified in the Verizon/Secret Service study cited in my testimony. On a broader scale there are numerous outdated analogue-based laws (see Cyber Space Policy Review Appendix A) which could be modified possible with reduced cost to industry. Government procurement--not just for IT equipment--could also be tied to more stringent cybersecurity on the part of firms that compete for Government contracts, or access existing (not additional) Government spending programs (e.g. small business loans--and all the TARP money should have come with cybersecurity requirements). In these cases we are not talking about Government spending more, we are simply talking about who gets the spending the Government is making--weigh it more heavily in terms of the compelling National interest of cybersecurity. No new spending required. There is also a great deal that can be done to stimulate the cyber insurance market. With a broader insurance market we can off-load much current Government risk to the private sector. Moreover, insurance (discounts) are a major motivator of all sorts of pro-social behavior from smoking reduction to improved driving and building safety. ISA has done a fair amount of work on how to use insurance better ranging from some relatively immediate items such as sharing information leading to lower rates and greater uptake (due to more realistic risk assessments and pricing) to broader programs dealing with National re-insurance. The Social Contract documents (attached) provide some additional examples. Question 4. If as you say we know how to prevent or mitigate most basic cyber attacks by use of current standards and activities why don't we just mandate that companies do these best practices? Answer. We can't just put seatbelts on the internet and think we have solved the problem. As identified in answer No. 2, the problem is that there are massive incentives right now favoring the attackers. Yes we have come up with ways to deal with most current attacks, but the attack methods will continually evolve. ISA is not interested in solutions; it is interested in creating a sustainable system of cybersecurity. To do this we need a much more dynamic motivator than Government regulations, we need to use the market. As described in greater detail in Chapter 1 of each of the Cyber Social Contract documents attached, the Government regulatory model invented to address the hot technology of 2 centuries ago--the railroads--is not going to work for the 21st Century problem of cybersecurity. We need a more active model which will keep up with attacks, can be applied internationally, will not provide a roadmap to the attackers and generate an atmosphere of foe compliance (equivalent to campaign finance laws which everyone complies with and no one thinks actually addresses the ``problem'' they are supposed to solve). Regulations, (outside of those sectors for which the regulations are part of the inherent economy of the sector as described in answer 1) will be too slow, outdated quickly, and too minimalistic to address the modern problem we face. Question 5. If companies are losing so much money due to cyber attacks, why are there not already enough incentives for them to invest to stop the attacks? Answer. Part of this answer was addressed in the answer to question 3, above, where we discussed the fact that industry and the Government assess risk in fundamentally different ways with industry, concerned almost entirely about the economics of the situation, have a greater risk tolerance than the public sector. However there are many other problems. For example, it is very hard to make truly accurate assessments of economic cyber losses for a variety of reasons including the fact that for sophisticated cyber attacks one may not know they have been the victim of the attack until long after it has occurred because as in the case of the loss of corporate IP, (the largest economic loss) the property is not stolen in the physical since--it remains--it's just a copy has been made and maybe being used to create a clone product or service. In still another complication we have the ``interconnection problem''. Due to the inherent interconnectedness of the internet it is possible for a thief to steal your data that happens to be residing on my system (I may not even have a direct relationship with you--I could be a sub-contractor to a subcontractor--with little or no incentive to protect your data which is valuable whereas my own data may not be as valuable so I don't invest in security adequate to your needs. Additionally, we have the problem with poor appreciation of actual financial risk as described above. Finally, there is the fact that in the current economic climate business are being forced to make themselves ever more efficient including cutting costs by adopting less secure technologies. VOIP, international supply chains and cloud computing are all examples of technologies that are increasing our cyber risks but are being widely deployed (including by the U.S. Federal Government) despite their security flaws due to the irresistible economic imperatives we all face. Government's job ought not to be to punish the victims of cyber attacks who are forced to compete in the digital world we now inhabit but to use the mechanisms at its disposal creatively, as described above to assist enterprises in securing our Nation's system in a sustainable and economically sensible way.