Datasets:

Modalities:
Text
Formats:
text
Languages:
English
Libraries:
Datasets
License:
CoCoHD_transcripts / data /CHRG-118 /CHRG-118hhrg51668.txt
erikliu18's picture
Upload folder using huggingface_hub
af5846d verified
raw
history blame
70.3 kB
<html>
<title> - UNPACKING THE WHITE HOUSE NATIONAL CYBERSECURITY STRATEGY</title>
<body><pre>
[House Hearing, 118 Congress]
[From the U.S. Government Publishing Office]
UNPACKING THE WHITE HOUSE
NATIONAL CYBERSECURITY STRATEGY
=======================================================================
HEARING
BEFORE THE
SUBCOMMITTEE ON CYBERSECURITY, INFORMATION
TECHNOLOGY, AND GOVERNMENT INNOVATION
OF THE
COMMITTEE ON OVERSIGHT
AND ACCOUNTABILITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED EIGHTEENTH CONGRESS
FIRST SESSION
__________
MARCH 23, 2023
__________
Serial No. 118-12
__________
Printed for the use of the Committee on Oversight and Accountability
[GRAPHIC NOT AVAILABLE IN TIFF FORMAT]
Available on: govinfo.gov
oversight.house.gov or
docs.house.gov
__________
U.S. GOVERNMENT PUBLISHING OFFICE
51-668 PDF WASHINGTON : 2023
-----------------------------------------------------------------------------------
COMMITTEE ON OVERSIGHT AND ACCOUNTABILITY
JAMES COMER, Kentucky, Chairman
Jim Jordan, Ohio Jamie Raskin, Maryland, Ranking
Mike Turner, Ohio Minority Member
Paul Gosar, Arizona Eleanor Holmes Norton, District of
Virginia Foxx, North Carolina Columbia
Glenn Grothman, Wisconsin Stephen F. Lynch, Massachusetts
Gary Palmer, Alabama Gerald E. Connolly, Virginia
Clay Higgins, Louisiana Raja Krishnamoorthi, Illinois
Pete Sessions, Texas Ro Khanna, California
Andy Biggs, Arizona Kweisi Mfume, Maryland
Nancy Mace, South Carolina Alexandria Ocasio-Cortez, New York
Jake LaTurner, Kansas Katie Porter, California
Pat Fallon, Texas Cori Bush, Missouri
Byron Donalds, Florida Shontel Brown, Ohio
Kelly Armstrong, North Dakota Jimmy Gomez, California
Scott Perry, Pennsylvania Melanie Stansbury, New Mexico
William Timmons, South Carolina Robert Garcia, California
Tim Burchett, Tennessee Maxwell Frost, Florida
Marjorie Taylor Greene, Georgia Becca Balint, Vermont
Lisa McClain, Michigan Summer Lee, Pennsylvania
Lauren Boebert, Colorado Greg Casar, Texas
Russell Fry, South Carolina Jasmine Crockett, Texas
Anna Paulina Luna, Florida Dan Goldman, New York
Chuck Edwards, North Carolina Jared Moskowitz, Florida
Nick Langworthy, New York
Eric Burlison, Missouri
Mark Marin, Staff Director
Jessica Donlon, Deputy Staff Director and General Counsel
Raj Bharwani, Senior Professional Staff Member
Lauren Lombardo, Senior Policy Analyst
Peter Warren, Senior Advisor
Mallory Cogar, Deputy Director of Operations and Chief Clerk
Contact Number: 202-225-5074
Julie Tagen, Minority Staff Director
Contact Number: 202-225-5051
------
Subcommittee on Cybersecurity, Information Technology, and Government
Innovation
Nancy Mace, South Carolina, Chairwoman
William Timmons, South Carolina Gerald E. Connolly, Virginia
Tim Burchett, Tennessee Ranking Minority Member
Marjorie Taylor Greene, Georgia Ro Khanna, California
Anna Paulina Luna, Florida Stephen F. Lynch, Massachusetts
Chuck Edwards, North Carolina Kweisi Mfume, Maryland
Nick Langworthy, New York Jimmy Gomez, California
Eric Burlison, Missouri Jared Moskowitz, Florida
C O N T E N T S
----------
Page
Hearing held on March 23, 2023................................... 1
Witnesses
Ms. Kemba Walden, Acting National Cyber Director, Office of the
National Cyber Director
Oral Statement................................................... 5
Opening statements and the prepared statement for the witness
are available in the U.S. House of Representatives Repository
at: docs.house.gov.
Index of Documents
----------
* Article, Wall Street Journal, ``Wave of Stealthy China
Cyberattacks Hits U.S., Private Networks, Google Says'';
submitted by Rep. Lynch.
* Questions for the Record: to Ms. Walden; submitted by Rep.
Mace.
* Questions for the Record: to Ms. Walden; submitted by Rep.
Langworthy.
* Questions for the Record: to Ms. Walden; submitted by Rep.
Connolly.
Documents are available at: docs.house.gov.
UNPACKING THE WHITE HOUSE
NATIONAL CYBERSECURITY STRATEGY
----------
Thursday, March 23, 2023
House of Representatives
Committee on Oversight and Accountability
and Government Innovation
Washington, D.C.
The Subcomittee met, pursuant to notice, at 3:09 p.m., in
room 2154, Rayburn House Office Building, Hon. Nancy Mace
[Chairwoman of the Subcomittee] presiding.
Present: Representatives Mace, Timmons, Burchett, Edwards,
Langworthy, Connolly, and Lynch.
Ms. Mace. The Subcommittee on Cybersecurity, Information
Technology, and Government Innovation will now come to order.
Welcome everyone, and good afternoon.
Without objection, the Chair may declare a recess at any
time.
I recognize myself for the purpose of making an opening
statement.
Good afternoon, and welcome to this hearing, the
Subcommittee on Cyber, Information Technology, and Government
Innovation. Today, we are going to discuss the White House
National Cybersecurity Strategy, which was issued three weeks
ago today. The strategy in this Administration's proposal for
fighting a battle that, as a Nation, we must win. Key aspects
of our everyday life now rely on the safe flow of data,
computerized systems, and even AI. That includes the delivery
of medical care, the conduct of law enforcement activity, the
operation of utilities, and the smooth flow of ground and air
transportation, and even critical infrastructure.
We must be able to trust the integrity of these systems,
their ability to keep functioning, and to preserve and protect
the data they use. When these systems fall victim to malicious
hackers, the costs are enormous. And I don't have to remind our
witness today, but in December 2020, with SolarWinds, we had 11
Federal agencies hacked by adversaries aligned with China and
Russia. In my home state of South Carolina, a few summers ago,
we saw the Colonial Pipeline hacked, and that is when we saw
gas prices started to go up, and they really have never come
back down since then. And so, this is an issue that is--affects
everybody, whether in the public or the private sector.
Aside for the enormous costs, these breaches also erode
trust in key institutions. So, for instance, the Federal
Government computer systems, holding confidential data of
millions of Americans, has been compromised by malicious actors
too many times. As I cited before, and most recently, D.C.
Health Link, where we have been advised that over 50,000 people
who use D.C. Health Link in the Federal Government work force,
had been affected by that particular hack.
So, this is truly a national security issue. Many of the
most sophisticated attacks come from abroad and target our
critical infrastructure. In recent years, foreign hackers from
China, Russia, and Iran have sought to disrupt our economy and
society by infiltrating U.S. critical infrastructure systems,
including airports, telecommunications networks, along with
Federal and state government systems. I don't think I can open
up my computer today and look at a news story and not hear
about another cyberattack on one of our systems or one of our
government, Federal, or state, or local agencies, that is
everywhere. It is pervasive, and it is every day. We must have
reliable safeguards against criminal and unauthorized use of
data to ensure economic security, our homeland security, and
our national security. This is going to require intelligent,
coordinated action at the Federal level.
To help the executive branch rise to that challenge, two
years ago, Congress created a new White House office to provide
coherent direction and coordination to agency-level
cybersecurity efforts across the Federal Government. That is a
lot. You have a big shoes to fill, including by spearheading a
National Cybersecurity Strategy. Prior administrations have
released similar cybersecurity strategies, but this is really
the first time it is to be issued since the Office of National
Cyber Director was created into law.
We are pleased to have here today the acting head of the
Office of National Cyber, Director, as our witness today. There
are many burning questions that I have about implementation of
the national cybersecurity strategy, so we all look forward to
hearing from you this afternoon about the strategy document
itself. I have it right here and discussing, you know, how and
when the rubber meets the road, on how rhetoric can be
translated into action either now or hopefully soon and in the
future. But before I formally introduce our witness, I will
yield to the Ranking Member Connolly to provide his opening
remarks, and I yield back.
Mr. Connolly. Thank you, Madam Chairwoman. Thank you for
having the hearing, and welcome, Ms. Walden, this afternoon.
Cybersecurity is a defining political, economic, and
national security challenge for our time. From malicious
foreign actors' online destabilization and espionage campaigns
to ransomware incidents that compromise government and private
sector information technology networks, these attacks have cost
the United States billions of dollars and countless critical
strategic disadvantages. In Fiscal Year 2021 alone, U.S.
Federal agencies, which depend on IT systems to carry out
operations and protect the essential information, were the
target of more than 32,500 cybersecurity incidents. In the last
half of 2022, cyberattacks targeting governments jumped 95
percent worldwide and cost an average of $2.07 million per
incident, a 7.25 percent increase from the previous year alone.
Data breaches also affect the private sector, including
educational institutions and healthcare centers. In 2022, the
FBI received almost 801,000 phishing, personal data breach, and
other complaints representing estimated losses of more than
$10.2 billion dollars. According to a 2021 survey by research
firm, AdvisorSmith, 42 percent of small-and medium-sized U.S.
businesses had experienced a recent data breach--42 percent.
The estimated average cost totals almost $9.5 million per
breach, higher than any other country in the world, and 60
percent of organizations have raised prices on consumers to
cover those costs. Experts now predict that the annual cost of
cybercrime will climb to over $10 trillion in the next number
of years.
Cyberattacks will eventually hit close to home for
everybody. For Congress, it was most recently the hack of the
D.C. Health Link, which operates the healthcare system used by
most Members of Congress and our staff. Before that, it was the
2015 OPM data breach that exposed the private information of
nearly 22 million individuals, including my own personal
information. Cyber threats are not new, as information security
has been on the Government Accountability Office's high-risk
list since 1997.
For those who are concerned, you are right to be concerned,
but we cannot just throw up our hands. We must act quickly and
decisively to secure digital infrastructure, protect the
integrity and confidentiality of data, and preserve public
trust in government institutions. I am proud that Democrats in
this Committee did just that and helped to lead the bipartisan
fight to establish the Office of the National Cyber Director,
the ONCD, in FY 2021. The ONCD is required to coordinate the
whole of government effort to elevate American safety in the
digital world, including through the development and
implementation of the National Cybersecurity Strategy. I
applaud this and look forward to hearing more from our witness
today.
Drawing on bipartisan ideas, including those vested in the
recommendations of the Cyberspace Solarium Commission, the
Biden-Harris strategy, as presented, is a bold, comprehensive
plan for government and industry to create a safer digital
ecosystem for all Americans. Recognizing that cyber threats cut
through all industries and ignore geographic borders, the plan
will examine the regulatory landscape to harmonize
cybersecurity standards across different sectors and around the
globe. With so much at stake, it is critical that our
regulatory landscape allow industry to focus on security
outcomes, not duplicative or nonsensical compliance burdens. We
also know that if hackers fail to break into one agency system,
they will seek out vulnerable entry points elsewhere, and they
do.
We must address the current patchwork of cyber regulations
to ensure that cybersecurity protections flow seamlessly and
efficiently across industries and government. The strategy
realigns incentives to ensure that Federal Government's
investments enhance the long-term strength of a cybersecurity
posture. For example, it harnesses the Federal Government's
purchasing power to shape market demand for safe and secure
technologies. Through programs such as the Federal Risk and
Authorization Management Program, FedRAMP, which this committee
passed legislation forward that became law, we can bake into a
product rather than an additional expensive feature.
Additionally, the strategy redistributes the responsibility
so that those best positioned to protect the cybersecurity of
our citizens, schools, hospitals, and small businesses are
required to take reasonable steps to do so. For example, it
embraces liability for software companies that fail to use best
practices or take reasonable precautions to secure their own
products. If we do not hold bad actors or actors more focused
on sales than security accountable, we disadvantage responsible
companies that take time to follow these best practices, and we
increase systematic risk for our constituents.
As the Administration works to implement this strategy,
Congress must provide the funding and clarify the authorities
needed to ensure its success. As former chair of Government
Operations Subcommittee and a current Member of this
Subcomittee, I know it is essential that we invest in
modernizing our legacy ID systems and recruit and maintain a
Federal cyber work force for the future.
The Federal Government must improve its internal practices.
It must reap the benefits of the latest cybersecurity
technologies and increase cooperation with the private sector.
I look forward to understanding how the ONCD will leverage this
plan and collaborate with other congressionally empowered IT
and cyber related leaders to promote the kind of accountability
our critical Federal systems need. With that, I yield back.
Ms. Mace. Thank you, Mr. Connolly. I am pleased today to
introduce our witness for the hearing. Ms. Kemba Walden is the
acting director of the White House Office of National Cyber
Director. Ms. Walden came to the ONCD from Microsoft, where she
was the assistant general counsel in the company's Digital
Crimes Unit. Prior to that experience, Ms. Walden spent a
decade at the Department of Homeland Security, holding several
counsel positions, including the Cyber and Infrastructure
Security Agency. Welcome, Ms. Walden. We are pleased to have
you this afternoon.
Pursuant to Committee Rule 9(g), the witness, if you will
please stand and raise your right hand.
Do you solemnly swear or affirm that the testimony that you
are about to give is the truth, the whole truth, and nothing
but the truth, so help you God?
Ms. Walden. Aye.
Ms. Mace. Let the record show the witness answered in the
affirmative.
We appreciate you being here today and look forward to your
testimony and answering some of our questions. Let me remind
the witness that we have read your written statement, and it
will be here in full in the hearing record. Please limit your
oral statement to five minutes today. As a reminder, press the
button on the microphone in front of you so that it is on, and
all Members up here can hear you. When you begin to speak, the
light in front of you will turn green. After four minutes, the
light will turn yellow. When the red light comes on, your five
minutes has expired, and we would ask that you try to wrap it
up at that juncture.
I recognize Ms. Walden to please begin her opening
statement.
STATEMENT OF KEMBA E. WALDEN, ACTING NATIONAL CYBER DIRECTOR,
THE WHITE HOUSE
Ms. Walden. Thank you. Thank you, Chairwoman Mace, Ranking
Member Connolly, distinguished Members of the Subcomittee.
Thank you for the privilege to appear before you today to
discuss the Biden-Harris Administration's National
Cybersecurity Strategy. I am eager to share with you how the
President's strategy will make our digital ecosystem more
secure and resilient. It builds on two years of the President's
unprecedented attention on cyber issues as well as the
resources and valuable leadership provided by Congress and this
Committee. While my written testimony goes into more detail
discussing each of the five pillars that make up the document,
I would like to highlight the framing of the strategy and the
two fundamental shifts in policy that are woven throughout it.
As you know well, the magnitude of the threat we face in
cyberspace is real, but it is important to remember that we
defend cyberspace not because it is some distant terrain where
we battle our adversaries. We defend cyberspace because it is
intertwined into nearly every aspect of our lives. We live in a
world that is increasingly digitally dependent. Too often we
are layering new technology onto old systems at the expense of
security and resilience, and, unfortunately, today, an attack
on one organization, industry, or state can rapidly spill over
to other sectors and regions.
We all remember how the Colonial Pipeline ransomware
attack, an incident affecting one company, resulted in a gas
shortage impacting the entire East Coast. It is within these
circumstances in mind that we crafted the President's National
Cybersecurity Strategy--strategies or tools. At their most
basic level, they match our goals where we are trying to go
with the vision we need to get there.
In this strategy, our ultimate goal is a digital ecosystem
that is more defensible, resilient, and aligned with our
values. ``Defensible'' means we have tipped the advantage from
attackers to defenders by designing systems where security is
baked in, not bolted on. ``Resilient'' means that when defenses
fail, which they sometimes will, the consequences are not
catastrophic, and recovery is seamless and swift. Cyber
incidents shouldn't have systemic real-world impacts, and in
creating these conditions, we can and must seize the
opportunity to instill America's values.
The strategy calls for two fundamental shifts in how the
United States allocates roles, responsibilities, and resources.
First, we need to rebalance the responsibility for managing
cyber risk. Today, we tend to devolve responsibility for cyber
risk downwards. We ask individuals, small businesses, and local
governments to shoulder a significant burden for defending us
all. We ask our parents and our kids to be vigilant against
clicking suspicious links, and we expect school districts to go
toe-to-toe with transnational criminal organizations, largely
by themselves. This isn't just unfair, it is ineffective.
Instead, the biggest, most capable, and best positioned
actors in our digital ecosystem can and should shoulder a
greater share of the burden for managing cyber risk and keeping
us all safe, and that includes the Federal Government. We must
do a better job of leading by example and defending our own
systems, something I know is a key priority for this
Subcommittee, but we expect similar leadership from industry,
too. Our mantra is every American should be able to benefit
from cyberspace, but every American should not have the same
responsibility to keep it secure. Second, our economy and
society must incentivize investments that make cyberspace more
resilient and defensible over the long term. Doing that
requires creating conditions so an entity is faced with
tradeoffs between easy, but temporary fixes and harder, but
lasting solutions. They are motivated to choose the latter.
We need the free market and public programs, alike,
rewarding security and resilience. That means building a robust
cyber work force that draws from all parts of society and
embracing security and resilience by design. A cybersecurity
job should be in reach for anyone who wants one. These efforts
also require thoughtful research and development, investments
in cybersecurity to prepare for revolutionary changes in our
technology landscape brought by artificial intelligence and
quantum computing, and working with our allies and partners to
promote the collaborative stewardship of our digital ecosystem.
A strategy is only as good as its implementation, and in
implementing this strategy, the Federal Government will take a
data-driven approach and will measure investments made,
progress, and the outcomes and effectiveness of these efforts.
Closely working with Congress, interagency partners, civil
society, and the broader cybersecurity community will be key to
getting this right and ensuring accountability. Work is already
under way putting this strategy into action.
In conclusion, the President's strategy lays out how the
United States will meet these challenges in cyberspace from a
position of strength, leading in lockstep with our allies, and
working with partners everywhere who share our vision for a
brighter digital future. Thank you for the opportunity to
testify, and I look forward to your questions.
Ms. Mace. Thank you, Ms. Walden, and we are asking about
your mics, and I know you have been moving around. We apologize
for that. I will now recognize myself for five minutes.
The National Cybersecurity Strategy, it really reads like a
vision for the Federal Government, but real results, as you
know, in your work in the private and public sector really
depend on implementation of a vision or of a strategy. So, will
you and your office be leading the implementation of the
strategy, and if not, then who would be doing that? Where do we
start with the strategy to do the implementation side of it?
Ms. Walden. Well, thank you, Chairwoman, for that question.
One of the most exciting parts of the strategy for me is the
last page where we articulate precisely that ONCD, in
collaboration with OMB, are going to lead the development of
this implementation plan. In fact, we have already started that
work. ONCD was built to do that work. This is a plan that, as
we articulate in the strategy, will be public, it will be
developed, it is being developed, in full collaboration with
all the departments and agencies who are going to be charged
with certain action items, and with the private sector, and
with civil society, and with Congress to make sure that the
strategy realizes the vision that we have laid out. This
strategy is new and novel in my mind, because we have attempted
to, where appropriate, place departments and agencies
responsible for certain action items, and we will build that
out in the implementation plan.
Ms. Mace. What do you think, the timeline? I mean, this is
a big plan, a big strategy, but how long will it take to
finally get there from point A to point B?
Ms. Walden. So, we have already started the work. We have
created an implementation plan working group that we have
convened other departments and agencies. We have started the
actual implementation. So, for example, we have started
crafting our work force awareness and education strategy. That
is one of the implementation pieces. We have been implementing
Executive Order 14028, which is that cybersecurity executive
order putting actual action into place alongside of that or as
part of that. We have been implementing our Zero Trust
Architecture Strategy for the Federal enterprise to be more
secure, layer by layer, piece-application by application. So,
we have already started the work. We are moving full speed
ahead. This will be an ever-evolving dynamic process because
cybersecurity and cyberspace is ever evolving and dynamic, but
we have already started the work.
Ms. Mace. And then, on the topic of work force, obviously
we all agree here we want to build a robust cyber work force
drawing from all parts of our society. I think everybody up
here would agree with that. I am working on legislation to try
to accelerate the hiring of Federal employees in the
cybersecurity space, and I would look forward to working with
you and your office on some of the ideas that we have from, you
know, education to--in the way that we hire as well. But even
under existing law, the executive branch has tools at its
disposal it is not necessarily fully utilizing.
A report based on the findings of Solarium Commission cited
specific actions the Administration could take now, should take
now, and it calls for the office to help coordinate some of
those actions. Your thoughts on that, and is that possible?
Your thoughts on getting more employees. You know, as we have
discussed before, we have an ageing work force. We have got
four times as many people over the age of 60 in a lot of these
jobs versus under the age of 30, and so at some point those
individuals will retire. So, just sort of your thoughts. Will
your office take the wheel and steer the effort to this more
robust cyber work force?
Ms. Walden. So, yes, and in partnership with OPM. So, yes,
we have similar concerns about access to good-paying cyber jobs
for anybody that wants one, right? We need to be able to
rethink the barriers that we might have imposed for those entry
level jobs. We need to broaden the scope for how we bring in
new employees, and perhaps we don't need people with four-year
college degrees for----
Ms. Mace. Hundred percent, yes.
Ms. Walden. Maybe we look at community colleges. Maybe you
just look at the digital skills. I have friends who are
executives in the outside world there who are great at
researching when they were younger. They have the right digital
skills in order to be able to enter this work force.
In terms of the Federal cyber work force, I share a similar
concern. And so, we are working with OPM to shore up and
harmonize the differing Federal authorities across departments
and agencies for hiring and retaining talent in this space. We
are working with OPM to develop a legislative proposal, so, I
would love the opportunity to work with you on those
initiatives. But the idea is to make sure that we are not
putting up or imposing barriers to recruitment and that we are
also putting in incentives for retention.
Ms. Mace. Thank you, and I wish you the best of luck with
the Director of OPM. We had her here two weeks ago. She was the
worst witness our Committee has ever had in the two-plus years
that I have been here. And so, I have much greater confidence
in you and your leadership and hope like hell that you can pull
that off with--because she really couldn't answer any of our
questions about even workforce issues. So, I really hope and
pray that you will be able to work with her, and she will be
able to work with you, and us, too, to expedite getting Federal
employees into our cyber workforce. So, thank you, and I yield
back.
I will now recognize the Ranking Member Connolly for five
minutes.
Mr. Connolly. Thank you, Madam Chairwoman. Ms. Walden, if I
could pick up a little bit on where Ms. Mace was, OK? We are
looking at tens of thousands of positions in IT in the Federal
Government and cyber as a subset of that, for sure. Given the
age cohort of the Federal Government, right, we are looking at
serious numbers of retirements over the next five years. So,
how proactively--I mean you talked about removing barriers and
working with OPM, but how do we proactively persuade, you know,
the millennial generation `you want to come work for the
Federal Government, and we see a 30-year career in your
future.' How do you do that? Do you go to college campuses, and
how do we make Federal services attractive in the sphere when
the private sector alternative is glaringly seductive in terms
of compensation and benefits and everything else?
Ms. Walden. Well, thank you for that question,
Representative Connolly. I personally do go to college
campuses. I go to high schools. I even teach cybersecurity
badge in my daughter's Girl Scout's troop. The pipeline is a
serious part of our focus in the work force strategy. That is
why we call it the work force and education strategy. We really
need to not only focus on the core cyber and IT jobs and how we
fill that, but the pipeline. So, in my experience, you cannot
imagine yourself in a particular career unless you see yourself
in that career. So, it is important to me, for example, to make
sure that I am out there in front, motivating people to
consider this.
So, a couple of thoughts about this. One, the thing that
draws me in and out of the private sector and into the
government is mission. Private sector cannot compete with the
government on mission, and, quite frankly, the government
cannot compete with the private sector on pay. We can do
better, and that is one of the opportunities we are looking at
in this new legislative proposal, being flexible and how we do
pay. But what we really offer is mission as a sense of moral
enlightenment, in many ways. So, yes, reaching out, reaching to
rural areas of the United States, reaching into parents to have
parents understand the benefits of a career in cyber, and
parents are and should be one of the primary influencers of
their children. That is a constituency that I like to reach.
But it is really the mission that is the secret sauce here.
Mr. Connolly. Well, thank you. I will commend you. We have
seen, for example, the excitement generated in high schools
with robotics competition teams. The excitement is incredible,
and I remember that some of our intelligence agencies actually
sponsored cyber competitions. And so, we may want to think more
about expanding that kind of program to get into high schools
and get in people's heads this might be something you might
want to pursue, including in Federal service.
Let me talk about the National Strategy. I mean, candidly,
the National Strategy took a little while to get together. Now,
granted, we were in a pandemic, and we have lots of other
competing things, but cyber is not a new topic. The OPM breach
occurred two administrations ago, affecting 22 million current
and retired Federal employees, and so, it comes to us a little
bit late. And I guess I am worried about implementation because
we talk about a whole-of-government approach. Knowing the
Federal Government, this Subcomittee and its predecessor have
spent a lot of time looking at Federal agencies, the diversity
of capability, the diversity of expertise, the diversity of
proactive strategies to protect, you know, the jewels in a
given agency is very variable. So, how are you going to have a
whole-of-government approach that guarantees all Federal
agencies, whether you are in intelligence or you are in
education, are protected and that are proactively fending off
and maybe even proactively attacking the bad guys?
Ms. Walden. What I can guarantee is that we are, as a whole
of government, proactive in making sure that our systems are
resilient. I feel the same urgency. I feel that we are moving
like a bullet train in this space. There is a sense of urgency
here. We want to get it right, though, so we have all of the
departments and agencies working with us. We work by, with, and
through them. We need mostly consensus to make sure that this
moves forward in a deliberate, thoughtful, but expedient way,
so I share that. That is why we were designed the way that we
are as ONCD. So, we have been implementing, we have been
working for the last two years on shoring up our cybersecurity
resilience. I see my time is up.
Mr. Connolly. Let me just say, because I know the
Chairwoman shares my concern in this regard, I think you have
got your work cut out for you.
Ms. Walden. I do.
Mr. Connolly. And it is an across-the-board kind of thing.
It is the IT we possess, the legacy systems that need to be
retired. It is the encryption that hasn't happened or hasn't
been updated. It is the personnel as the Chair pointed out, I
mean, that the age gap between us and the private sector is
phenomenal. And so, you know, I just think you have got limited
resources, and your ability to try to have a cohesive strategy
that affects everybody and protects everybody is going to be,
well, I hope not a Sisyphean task. I am sorry, Madam
Chairwoman. Thank you.
Ms. Mace. You are good. And it will be some of the Federal
employees that won't want to go along with the national
strategy that is, as you said, it is preeminent. It is deeply
important. I would now like to recognize Representative Timmons
for five minutes.
Mr. Timmons. Thank you, Madam Chair. The National Cyber
Strategy was expected to be released last fall. Was that delay
a reflection of how difficult it is to get the various
interested parties on the same page, or were there other
challenges?
Ms. Walden. You know, it was a bureaucratic process
intentionally so that we can make sure that everybody, every
department and agency, saw themselves in the strategy and are
ready to implement. So, that was just a necessary step that had
to take place in order to make sure that it is successful.
Mr. Timmons. Sure. So, next question. U.S. businesses, no
matter how hard they try to have the best cybersecurity
possible, can still fall victim to nation-state attacks, and
those attacks can often cost billions of dollars to publicly
traded companies.
Mr. Timmons. Do you think that the Federal Government has a
role in backstopping those businesses? Since, assuming they are
doing everything possible to avoid an attack, it is just not
possible to stand up to nation-state actors. What are your
thoughts on that?
Ms. Walden. So, I will start by saying that the cyberspace
is a global commons. It is a public good. So, the U.S.
Government has a responsibility and a duty to make sure that it
is safe, while the private sector pretty much owns and controls
most of the infrastructure that underlines cyberspace. So, we
have to work together.
So, my response to your specific question about small and
medium businesses, one of the core tenants of the cybersecurity
strategy is to make sure that those small and medium businesses
don't bear the significant brunt of cybersecurity risk all on
their own. So, all of the tools in the strategy are there to
lift and shift that risk, while also making the infrastructure
cyberspace more resilient. You talked about backstopping. That
is indeed one of the tools that we are considering, so cyber
insurance backstop. Think of flood insurance, for example, in
order to make sure that cybersecurity, small and medium
businesses, don't bear the full cost of a cybersecurity breach
while we are also working on making sure that the systems are
resilient.
Mr. Timmons. Sure. Thank you for that. So, let us talk
about ICANN. The original intent was to promote the stability
and security of the internet by creating a transparent multi-
stakeholder governance model for the management of domain name
system. So, in 2016, Department of Commerce, their role in
ICANN expired. Do you have concerns over that, in the U.S.'
leadership in maintaining a secure internet globally?
Ms. Walden. So, I think we need to consider how do we
harmonize standards. Digital ecosystem is--doesn't have
specific borders, so we need to make sure that we harmonize
standards in general, but let me just even take it a step
further back. Cyberspace is composed of three pieces. We have
touched a lot on personnel, people, which is arguably the most
important part of cyberspace, but it is also technology, the
gizmos, the microphone that has an echo, all of that, right?
But it is also governance, it is authorities and
responsibilities. If no one is guarding the gate, then the bad
guy can just walk through. It is that governance layer that you
are getting at.
So, yes, the cybersecurity strategy, generally, is intended
to articulate and find vulnerabilities in that governance
layer, in the roles and responsibilities, figure out who is
guarding the gates, figure out what the vulnerabilities are,
and then close those vulnerabilities. So, that is a symptom of
the challenge that we face.
Mr. Timmons. To that point, what tools does the
Administration plan to use to bolster the security of the
foundation itself?
Ms. Walden. So, there are a couple of tools as articulated
in the strategy. I think it is Pillar 4 we talk about the
technical opportunities in the foundations of the internet,
right, like a faster migration to IPv6 from IPv4. That is one
opportunity in terms of modernizing the backbone of the
internet. But then there are also opportunities for filling
those vulnerabilities, like I described, in the roles and
responsibilities. The implementation plan is going to help us
with that, at least in the departments and agencies. We are
also looking at the idea of harmonizing standards, harmonizing
regulations so that we know exactly what we are certifying to
when we have like IoT device labeling, for example, how that
works across borders, we collaborate with our allies. Pillar 5
talks about that. So, that is that roles and responsibilities
piece that relates to the backbone of the internet.
Mr. Timmons. Sure. Thank you for being here today. Madam
Chair, I yield back.
Mr. Connolly. Madam Chairwoman, I just want to welcome to
the Subcommittee the former Chairman of our full Committee and
my predecessor in this seat in the 11th District, Virginia, the
Honorable Thomas Davis. Welcome, Tom.
Ms. Mace. Thank you for joining us, sir. I would now like
to recognize Representative--I turned my mic off for you--
Burchett for five minutes.
Mr. Burchett. Thank you, Chairlady. You mentioned when we
first started this that she doubted that I could spell AI, but
I can assure you I can now. I have researched it. I Googled it.
Ma'am, Chinese-owned media application, TikTok, has over 150
million active users in the U.S. Do you feel like this is a
national security concern?
Ms. Walden. Yes.
Mr. Burchett. Another question. What countries do you think
are the biggest threats to national cybersecurity?
Ms. Walden. Well, as articulated in the worldwide threats
report that ODNI published, it is China, North Korea, Iran, and
Russia.
Mr. Burchett. All right. 1,600 offshore oil and gas
facilities faces significant risk of cyberattacks. What do you
think the potential impact of a successful cyberattack on these
facilities is, and what steps is your office taking to secure
this infrastructure?
Ms. Walden. Please excuse me, I did not hear the very
beginning of that question.
Mr. Burchett. I said six. OK. Yes, ma'am. I am sorry. I am
from East Tennessee. It is the only place in the country where
people do not speak with an accent.
Mr. Connolly.
[Laugh]
Mr. Burchett. Thank you, Connolly. I appreciate it. 1,600
offshore oil and gas facilities faces significant risk of
cyberattacks. What is the potential impact of a successful
cyberattack on these facilities, and what is your office doing
to secure this valuable infrastructure?
Ms. Walden. Well, let me start with Pillar 1 of our
National Cybersecurity Strategy, which is focused clearly on
critical infrastructure security. There are several tools that
we have identified in that pillar for making sure that we make
our critical infrastructure more defensible, while also making
investments in making sure that it is resilient regardless of
the attacker or the type of attack. One of those opportunities
is raising baseline cybersecurity requirements across all
critical infrastructure sectors. There are many ways to do it,
but as we do that, we need to make sure that no one, particular
sector is overregulated so that we encourage investment in
raising baseline cybersecurity requirements rather than
investing in compliance. Now, with respect to the offshore oil
rig, I would love to give you a reaction to that question, but
I would need to research what the exposure is and----
Mr. Burchett. Please do. It has been recently reported, and
I have been informed that that is a major issue, and I can
assure you that if our enemies can turn that spigot off, they
will.
Ms. Walden. Yes.
Mr. Burchett. And they will not do it in an environmentally
sound manner either. If somebody could get with me from your
office, that would be great.
Ms. Walden. Absolutely.
Mr. Burchett. From the cybersecurity perspective, ma'am,
how can we better secure our global financial institutions from
bad actors? I am always afraid they are going to turn the
switch. In early days of eBay, they always said make sure you
use PayPal. Everybody thought it was a racket, and it is a
racket, but it is their racket, so it is just the deal. But
then they would say, you know, you get wired money, and it was
always some kind of lame deal, and people were always getting
ripped off.
Ms. Walden. So, there are several opportunities. First, I
would like to say about the financial services sector that they
are quite mature in their cybersecurity practices. Of course,
more work can always be done. As cybersecurity threat actors
are always evolving and improving, so can our defenses, and so
can our resilience, so it is an evolution. We work closely with
the financial sector. We work closely with the Department of
Treasury. So, for example, we have recently done exercises with
the Department of Treasury for how do we make sure that our
financial services sector becomes more resilient?
Mr. Burchett. Let me get to one more because I am running
out of time.
Ms. Walden. OK.
Mr. Burchett. This is really important to me. Our senior
citizens, they seem like they are on the radar for a lot of
these dirtbags that prey upon them. And what steps can your
office do to work with us to ensure that these folks are
protected from these hostile foreign actors and groups?
Ms. Walden. My mom might hate me saying this on live C-
SPAN, but I have got a mom who might be classified as a senior
citizen, and it concerns me every time she does online banking.
Mr. Burchett. Mama had a Sunday school class and they
called them ``seasoned.''
Ms. Walden. I like it.
Mr. Burchett. Well, she said, I did not like that, honey.
It makes it sound like a bunch of cannibals, so my mama was a
pretty cool lady. But go ahead, I am sorry.
Ms. Walden. No, but we need to make sure that all of the
technology, all of the devices that we have, need security
built in, right? We need to make that commercial where there is
an easy button. That is what I envision when I am envisioning
security built in for senior citizens. They should be able to
turn on their computer, login is already enabled by default,
multi-factor authentication is already enabled by default. All
the different security options that you can take should be
enabled by default. Security has to be built in.
Mr. Burchett. And I know we are out of time, but a recent
former Director of the FBI got ripped off on one of these
deals. And they went after them and got his money back, and I
was glad they did that. But I was ticked off because I have had
people that the FBI just gives me lip service, and if they
could do it for one, they can do it for all of them, and
dadgummit, they need to start doing it. So, thank you, ma'am.
Ms. Mace. Thank you, Mr. Burchett.
Mr. Burchett. I am sorry. I went out of time.
Ms. Mace. Are you yielding back?
Mr. Burchett. Do what?
Ms. Mace. Are you yielding back?
Mr. Burchett. Yes, ma'am, I yield----
Ms. Mace. Yes, you are. Yes, you are.
Mr. Burchett [continuing]. None of my time back.
Ms. Mace. All right. I would now like to recognize
Representative Langworthy for five minutes.
Mr. Langworthy. Thank you, Madam Chairwoman. Ms. Walden, I
just want to thank you for being here today and providing this
Subcommittee with the invaluable insight on the path forward in
the cybersecurity sector.
So, I would like to start off by looking at cloud service
providers. And the strategy correctly notes that cloud-based
services enable better and more economical cybersecurity
practices at scale, and their security is crucial for critical
infrastructure in government systems. However, the strategy
also is looking to close gaps in regulatory authorities for
cloud services. Now, I am concerned that this categorical
effort to sweep in an all cloud-based services is inconsistent
with a risk-based approach. Can you explain the rationale for
the blanket approach that you plan to pursue?
Ms. Walden. So, cloud service providers provide some
cybersecurity risk protections, particularly for small and
medium businesses, and even for large enterprises, so let us
start there. The cloud service providers operate in a highly
regulated environment as it is. They are a participant in all
of the regulations that their customers bear. Wouldn't it be
fantastic if we had harmonized system regulations so that those
that are highly regulated and that cloud service providers
provide the compliance for, equal--and we reward that
investment and cause others to invest in cybersecurity best
practices by looking at how they are regulated. But cloud
services providers have publicly acknowledged--we have worked
with them directly in developing the strategy, but they have
publicly acknowledged the need for regulatory minimum
cybersecurity requirements baselines to be brought up and for
harmonization to take place.
So, cloud service providers, cloud environments are more
secure than on-prem, but there is some work still to be done.
And we are ready, willing, and able to work directly with cloud
service providers, not necessarily to kowtow to their demands,
but to make sure that we have effective harmonization across
all sectors for these purposes of making cloud services more
secure.
Mr. Langworthy. You spoke in an interview recently saying
that of cloud services, that if they were disrupted, they could
create large and potentially catastrophic disruptions to our
economy and to our government. Can you talk a little bit about
this? You had mentioned how cyber criminals in malign foreign
countries disrupt cloud services.
Ms. Walden. So, cyber criminals will typically spin up
infrastructure using cloud services to do so. I was part of a
team that would find that infrastructure and use all means
appropriate to tear it down. I think that we can do that at
scale. We need to be able to work with cloud service providers
to remove infrastructure, or at least to harden infrastructure,
so that cyber criminals cannot leverage it. Of course, there
are other opportunities for making sure that we reduce or we
increase the cost of cybercrime. We can arrest people. We can
lean into our authorities more. But we also need to work with
private sector, owners and operators of managed service
providers, and cloud service providers to tear down
infrastructure where infrastructure is being used by
cybercriminals.
Mr. Langworthy. OK. Now, the Stafford Act, generally
speaking, is an all-encompassing document for disasters in the
United States. A largescale cyberattack could plausibly be
considered a disaster. However, cyber-related disasters are not
mentioned in the Stafford Act. What would our strategy be in
case of a large-scale attack?
Ms. Walden. This is the reason why we have designed the
strategy the way that we have. We need to make sure that we
have our ducks in a row so that we make it more defensible. But
the focus really needs to be on what investments do we need to
make in order to make sure that cyberattacks are not
catastrophic and do not cause systemic failure or long-term
failure, that we have shorter downtimes. We have a seamless
response. So, that is the reason why we have the Cybersecurity
Strategy. On your specific questions about the Stafford Act, I
would be happy to come back to you with some thoughts about
that, but that is the reason why we have the strategy the way
it is.
Mr. Langworthy. Thank you very much.
Mr. Langworthy. And I yield back, Madam Chair.
Ms. Mace. Thank you. I would now like to recognize
Representative Edwards for your five minutes.
Mr. Edwards. Thank you, Madam Chair. Ms. Walden, thanks for
being with us. As I sit here and read your testimony and listen
to your responses, I cannot think of a less enviable position
than yours. We are certainly appreciative of you taking this
on. I served on a bank board for a number of years, and I knew
the thing that kept us awake most at night was the chance of a
cyber threat, and you have got a whole country to look out for.
Can you see any, at this time, I do not want to talk about the
plan so much, I want to talk about right now. Can you see any
coordinated efforts from foreign governments right now to hack
into systems in the United States, or are the threats out there
from universities or just ne'er-do-wells or that sort of thing?
Ms. Walden. Thank you for that question. What I can say is
that the Worldwide Threats Report that was published by ODNI is
the preeminent description of cyber threats and nation-state
actors. That is not classified. I would refer you to that, and
I agree with everything that is in that report. If you are
asking me about specifics, that might get into classified
nature of a conversation, and I am not prepared to do that
today.
Mr. Edwards. I respect that. Thanks. How do you coordinate
with the private sector? We have all seen examples of how they,
too, are under attack, and your responsibility is vast. How do
you include the private sector?
Ms. Walden. You know, you can always just pick up the phone
and call. So, there are opportunities, right? ONCD, my office,
collaborated with the private sector in a robust way in a
development of the strategy. We are not an operational office.
We are, by design, a strategic policymaking office, but
operationally, there are several different models. We need to
meet the private sector where they are. We have recognized that
we need proactive operational collaboration, and this is
different than information sharing when I left government the
last time. So, it is exciting for me to see how we are doing it
now.
So, for example, CISA runs the Joint Cyber Defense
Collaborative, known as the JCDC. It is a model where different
private sector entities are able to come together, exchange
ideas, exchange information with CISA, with each other. And
there are other models like the National Security Agency's
Cyber Collaboration Center, the CCC, which does cyber
information sharing with their defense industrial base, maybe
one-on-one, in a classified nature, however it is. But we need
to meet the private sector where they are. We need to find
opportunities to identify problems together, come up with
solutions and operational plans for mitigating that problem
together, and then executing and deploying that solution
together.
Good example, one that makes me really excited and I think
is a pivotal moment that really did inform the strategy, was
that on the eve of, or the weeks leading up to the Russian
invasion of Ukraine, we collectively, we the government,
collectively figured out that we had intelligence that the
private sector may not have. Understanding, particularly in the
financial sector, that if we sanction Russia, that there might
be some retaliatory effects on the financial sector here at
home, that there is more that could be done with the
intelligence that we had by those that actually operate and
control the infrastructure in the financial services sector. We
delivered that intelligence so that they can take action. We
worked the intelligence. We worked the action together. And I
would like to think that that is a success story. We did not
see any retaliatory effect on the financial services sector.
Mr. Edwards. I am running out of time, but a question that
has been burning on my mind for years, we have heard of this
threat that maybe computers, PCs that we buy through foreign
entities that may come from China, Korea, the chips may contain
in their bias, some sort of code that is sniffing out activity
here in the U.S. and just ready to be called whenever the
foreign entity decides. Are you aware of that? Is that actually
happening? Has it happened?
Ms. Walden. Well, I would like to point you to the
strategy, and perhaps you might understand why the strategy
talks about understanding the supply chain implications of
chips manufacturing. That is partly what the CHIPS and Science
Act is intended to mitigate, any opportunity like that,
hypothetically, could happen like that. Wouldn't it be nice if
we understood what was in our software, right, what code
libraries were in our software and how they were assembled?
Wouldn't it be nice if we could make sure that the final
assemblers, for example, of software, were held liable for what
is in it so that it is not buggy, or, and it does not have some
nefarious code written into it.
That is one of the most intriguing parts of the National
Cybersecurity Strategy, from my perspective, is how do we make
sure that software is built with security in mind. How do we
make sure that market focuses on securing the market rather
than first to market? What are the incentives that we need to
shift in order to make sure that that hypothetical situation
does not happen?
Mr. Edwards. Thank you. Madam Chair, I yield.
Ms. Mace. Thank you. I am going to do one more quick round
of questions. I may be the only one with questions, and then we
are going to close it out, if that would be OK to the Ranking
Member. I am going to recognize myself for five minutes and
hopefully less than that.
One of my burning questions is on legacy systems. So, Y2K,
I was learning COBOL, C++, we called it. COBOL was legacy back
then in the late 1990's and early 2000's, and it is sort of
shocking to me to see how many systems that we have that are
still legacy today. So, for example, there is a 46-year-old
Department of Education System handling 20 million student
financial aid applications annually, running on COBOL. There is
a 50-year-old HHS system supporting clinical and patient admin
activities coded in C++. I mean, so the list goes on and on of
all of these examples of these legacy systems. So you know,
your thoughts on--the Government Accountability Office has
pointed this out repeatedly--we need these upgrades. We have
needed it for decades. How does the strategy play into getting
this done across the board?
Ms. Walden. You know, IT modernization is part of the story
here. It has to happen. We cannot have 50-year-old systems.
Ms. Mace. It has to happen.
Ms. Walden. It has to happen.
Ms. Mace. I mean, there is--yes.
Ms. Walden. But it has to happen in a way that is smart and
thoughtful, but it has to happen. There is some urgency behind
it. We have already started working on that process.
Ms. Mace. What about the agencies and Federal employees
that are dragging their feet on some of this? I mean, we have
seen, like, at the VA right now, EHR, I mean, just taking over
a decade to do something that really should not take as long as
it is. How do we get them to come along with this?
Ms. Walden. Well, I would love to take that particular
question back about the VA and give you a detailed answer.
Ms. Mace. Yes.
Ms. Walden. But I share your urgency. I am 51.
Ms. Mace. And a lot of examples.
Ms. Walden. Yes.
Ms. Mace. I will not go into all of it. But the other quick
thing I wanted to ask about, and you have talked about this,
too. Our first hearing was on AI in this committee, and there
are things that we cannot even imagine how AI will be used. I
read a story the other day about ChatGPT getting through
CAPTCHA, like, with a TaskRabbit employee, and told them that
they were visually impaired, to break into that. We cannot even
imagine how it might be used for good and then also for bad,
which is one of my concerns. How are we going to use some of
these tools to ensure that we defend ourselves against breaches
that we cannot even be aware of right now? Where is AI? I know
it is mentioned in the plan, but where do you see AI in the
overall strategy?
Ms. Walden. So, it is mentioned in the strategy, but I
think our first conversation was around AI at some point, and
so, I have been giving this some thought. I think of AI and the
cybersecurity pieces of it in three buckets, right? Data that
fuels AI, the compute power for AI, and the algorithms. There
are cybersecurity components of each piece of that, that we can
use to not only shore it up so that it is not used for
nefarious purposes, or at least we reduce the chances of it
being used for nefarious purposes, but we can also use it for
the benefit of security, right?
So, I am thinking in terms of data. I am thinking through
data security measures, thinking through cryptography. How do
we do data analytics without decrypting? Thinking about compute
power and the work we are doing right now, as articulated in
the strategy, on quantum is all about compute power. The work
that we are doing on chip supply chain the gentleman here
raised, it is all about compute power. And then the algorithms,
how do we think about that? So, we are purposefully thinking
through how to make sure that AI, the cybersecurity elements of
AI, are used for good purposes, and that we are reducing the
likelihood of----
Ms. Mace. We do not want China to eat our lunch or Russia,
or Iran, or any of that.
Ms. Walden. Absolutely.
Ms. Mace. My last question is part of the strategy
contemplates more regulation, but from your lips, God's lips to
my ears, you said you did not want to overregulate. So, thank
you for making that statement, much appreciated because I think
that we could stifle innovation by overregulating. But in terms
of regulation, that framework, who is going to coordinate the
cybersecurity regulatory regime and then also de-conflict when
that is necessary?
Ms. Walden. Well, we do have language, and not in this
strategy, offering that ONCD in collaboration with OMB will
lead a regulatory harmonization taskforce, for example, where
we will think through precisely what are the gaps, what are the
regulations, what are the authorities that exists now that we
are underutilizing for regulatory purposes of cybersecurity.
How do we fill any gaps that might exist? But most importantly,
you and I agree, that we need to harmonize so that we make sure
that we incentivize investment in cybersecurity requirements
and not compliance, which some sectors are doing right now.
And so, that is an all-of-department and--agency effort. We
would love to have a task force that does that work. We are
already working on that. We work on that through the CIRC, the
Cyber Incident Response Council, and CIRCIA. We are working on
that with independent agencies in terms of thinking through how
do we harmonize the regulations that independent agencies are
imposing, but there is more work to be done.
Ms. Mace. Thank you. And I would now like to recognize
Representative Lynch for five minutes.
Mr. Lynch. Thank you, Madam Chair, and I thank the Ranking
Member for holding this hearing, and I want to welcome Ms.
Walden for giving her testimony and helping the committee with
this work.
Ms. Walden, the Administration's National Cybersecurity
Strategy represents, I think, an important step in our response
as a Nation in dealing with the cyber threat landscape. We know
that autocratic and oppressive governments like Russia and
China are not only operating full spectrum surveillance of
their own citizens, but we also know that they are taking
advantage of the freedoms that we have in our country by
surveilling our personnel, our citizens as well. And they are
leveraging espionage, influence campaigns, ransomware, critical
infrastructure attacks, and emerging technologies to pursue all
those goals.
Your strategy, as I read it, mentions ``the dark vision for
the future of the internet that the People's Republic of China
and other autocratic governments,'' I presume, Russia, what
``those regimes promote.'' Can you sort of flesh that out a
little bit and talk about what does that look like, the dark
vision that Russia and China present in terms of our future on
the internet?
Ms. Walden. So, the way I think about the internet, is that
it carries our values. It carries the values of those that
design and build it. We have democratic values here. We need to
lead and lean into that as we think about the future resilience
of internet. We cannot allow autocratic societies like China,
like Russia, to set our agenda to have internet, to have a
cyberspace that we envision in the document that we presented
here today. That is the idea. That is the big idea in this
strategy is that we need to set what we think the future of
cyberspace is. We need to invest in that future of cyberspace,
and that is the resilience piece of it, rebalancing the risk
piece of it. But we cannot let China, Russia, et cetera, et
cetera, set our agenda. We are getting really great at
defending against, but wouldn't it be great if we got in front
of? That is a better opportunity from my perspective.
Mr. Lynch. Absolutely.
Ms. Walden. That is what we mean.
Mr. Lynch. OK. In some ways, and in frightening ways, this
dark future that you identify in your National Cybersecurity
Strategy, that dark future seems more immediate, to be honest
with you. For example, The Wall Street Journal reported last
week, and I have an article here that I will ask for unanimous
consent. It talks about China's use of state-sponsored hackers,
teams of hackers, to employ novel hacking techniques.
Madam Chair, I ask unanimous consent to submit this Wall
Street Journal article entitled, ``Wave of Stealthy China
Cyberattacks Hits U.S. and Private Networks, Google Says.''
Ms. Mace. Without objection.
Mr. Lynch. Thank you, Madam Chair. These techniques have
allowed China to spy on governments and businesses for years
without detection. These activities are so stealthy that, ``The
scope of Chinese intrusion into U.S. and Western targets is
likely far broader than currently known.'' Ms. Walden, what
solutions do we have in terms of--does the strategy include
solutions to root out and combat these type of aggressive
attacks by autocratic state actors, and how successful have we
been thus far?
Ms. Walden. So, Pillar 2 of the strategy, in my mind, is
quite aggressive and forward leaning. It really projects the
concept that defense is the new offense in this space. But we
need to lean further into the authorities that we do have to
dismantle and disrupt while shoring up opportunities with the
private sector to remove infrastructure that we know that these
hackers are leveraging. So, there are opportunities for that,
but really, what is going to happen here is we are going to
have a cyberspace that is more resilient. There are going to
always be some sort of holding our infrastructure at risk. We
need to get in front of that. We cannot just keep playing
whack-a-mole, essentially. That is the general idea. But I
would direct your attention to Pillar 2 about our opportunities
to disrupt and dismantle.
Mr. Lynch. Thank you, Madam Chair. My time has expired, and
I yield back. Thank you.
Ms. Mace. And I will recognize the Ranking Member Connolly
for five minutes.
Mr. Connolly. I thank the Chair, and I will not take five
minutes. I do want to thank the Chair for holding this hearing,
which is one of a series of hearings planned on cybersecurity,
AI, IT management in general. And I just want to say thank you
to Ms. Walden, but I also want to urge, and I know you share
this view, Madam Chairwoman, we will have you back, and we are
going to talk about implementation of the strategy because we
are eager to see that happen.
And I do believe the task in front of you is herculean. A
whole-of-government approach to this subject, noble, worthy,
but very challenging, and we have been working a lot on those
issues for a long time on this Subcommittee as predecessors.
So, we certainly want to help, and we want to give you the
opportunity to share successes and frustrations as we move
forward.
I, also, Madam Chair, and then I will yield back. We talked
earlier about hiring, and I just wanted to commend the three
bills we are working on. One I have introduced, called the OPM
Reform Bill to improve our hiring practices. The second I am
working with Virginia Foxx, Congresswoman Foxx of North
Carolina, called the Chance to Compete Act, which addresses
what you were talking about earlier to Madam Chairwoman, to
increase hiring of people with non-traditional credentials. And
the third is the NextGen Fed Employee Act, a bill I have
introduced, which is to try to systematize and professionalize
the use of internships in the Federal Government. We are so far
behind the private sector in the use of internships to recruit
the talent we need for the future, and I am working with
Chairman Comer on that bill as well.
So anyway, we are working on trying to bolster how we hire,
who we hire, and not only recruit but retain that work force of
the future, and it is particularly acute and important in U.S.
sphere. With that I yield back, and I thank the Chair.
Ms. Mace. Thank you, and in closing, and I agree with the
Ranker, that this is a herculean effort, the tasks before you,
but know that we are here to assist and help you. We will have
you back. We are going to want to hear about implementation and
how that is progressing along as well. The importance, as
Representative Lynch said earlier, it seems like it is needed
faster and faster. In particular, I am going back to AI,
everything that I come back to, because it is advancing so
quickly.
We just do not know what we do not know, and we do not know
how it will impact us, the vulnerabilities that we have. And I
have great concern, but not just the public sector, but the
private sector, as well, on this issue, and so we want to offer
as much support as we can. We will be putting out a portfolio
of legislation to be helpful, and so in any way that any of us,
you need us, you call us, and we will be there to assist here.
So, in closing, I want to thank Ms. Walden for her
presence. Your testimony today was clearly knowledgeable. It
was fantastic, and we really appreciate it. We are very
interested to learn about how the Administration, as
Congressman Connolly said, will implement this strategy, and we
are going to want more details on that in our next
conversation, and we will invite you back.
So, with that and without objection, all Members will have
five legislative days within which to submit materials and to
submit additional written questions for the witness, which will
be forwarded to the witness for her response.
Ms. Mace. If there is no further business, and without
objection, the Subcomittee stands adjourned.
[Whereupon, at 4:15 p.m., the Subcomittee was adjourned.]
[all]
</pre></body></html>