![]() The risk introduced to all of us by unsafe technology is frankly much more dangerous and pervasive than the spy balloon, yet we’ve somehow allowed ourselves to accept it. As a result, it’s enormously difficult to understand the collective toll these attacks are taking on our nation or to fully measure their impact in a tangible way. It’s a school district shut down one patient forced to divert to another hospital, a separate patient forced to cancel a surgery a family defrauded of their savings a gas pipeline shutdown a 160-year-old college forced to close its doors because of a ransomware attack.Īnd that’s just the tip of the iceberg, as many-if not most-attacks go unreported. And because the damage caused by these unsafe products is distributed and spread over time, the impact is much more difficult to measure. The cause, simply put, is unsafe technology products. ![]() This is hacking on an enormous scale, but unlike the spy balloon, which was identified and dealt with, these threats more often than not go unidentified and undeterred.Īnd while a focus on adversary nations-like China and Russia-and on cybercriminals is important, I would submit to you that these cyber-intrusions are a symptom, rather than a cause, of the vulnerability we face as a nation. China’s massive and sophisticated hacking program is larger than that of every other major nation – combined. Yet these intrusions can do real damage to our nation-leading to theft of our intellectual property and personal information and even more nefariously: establishing a foothold for disrupting or destroying the cyber and physical infrastructure that Americans rely upon every hour of every day-for our power, our water, our transportation, our communication, our healthcare, and so much more. Our country is subject to cyber intrusions every day from the Chinese government, but these intrusions rarely make it into national news. The response and surrounding attention to the issue, reinforced for me a major challenge we face in the field of cybersecurity-raising national attention to issues much less visible but in many ways far more dangerous. The deliberate action came after a tense public standoff with Beijing and intense media scrutiny about the Chinese “spy balloon.” So, now that you know why I am here, I want to start with a story.Īt 2:39 pm on a chilly but sunny Saturday, just six miles off the coast of South Carolina, an F-22 fighter jet from Langley Air Force Base fired a Sidewinder air-to-air missile to take down a balloon-the size of three school buses-that had drifted across the United States. And of course, a shared passion for our work. Jono Spring, who is on the front lines of our vulnerability management work – both are here with me today.įinally, I wanted to come here because CISA and CMU share a common set of values-collaboration, innovation, inclusion, empathy, impact, and service. The CISA team is full of amazing CMU alumni like Karen Miller who leads our vulnerability evaluation work and Dr. SEI established the first Computer Emergency Response Team, or CERT, in response to the Morris worm-that became the model for CERTs around the globe, and of course was a key partner in the creation of US-CERT in 2003, the precursor to CISA’s Cybersecurity Division.īut the partnership between CMU and CISA goes well beyond technical capability – to what I consider the most important aspect of technology – People.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |