Cybersecurity and Innovation in the Information Economy – Segment 5

October 8, 2019 posted by

[ Music ]>>So ladies and gentlemen,
thank you for returning from lunch for the
continuation of our program. As we were assembling this
program, we were trying to decide which side of the
[inaudible] was more blessed; the morning when we had the
secretary and the chairman of the Appropriation
Subcommittee or the afternoon where we have Aneesh Chopra,
Howard Schmidt [phonetic], Phil Ridinger [phonetic]
and other dignitaries, and we couldn’t decide so we’ll
leave it to you to decide. But we are definitely
looking forward to stepping up the energy level
this afternoon to keep everybody engaged
and there’s no better person, if you’ve not met him you
will soon find out why, there’s no better person to step
up the post-lunch energy level than the US Government’s
CTO Aneesh Chopra. Aneesh is not only CTO but
he’s Associate Director for Technology in the White
House’s Office of Science, Technology and Policy. He was sworn in to this
position May 22nd, 2009. Prior to his appointment,
he served as Secretary of Technology for our local
friends south of the border, the Commonwealth of Virginia,
and he previously served as managing director with
the Advisory Board Company, a publicly traded
health care think tank. So that’s the official bio. I think what’s more
impressive and more fun to talk about is the unofficial
bio of Aneesh. I was just poking around on the
web the other day and somebody in the press referred to him
as the George Clooney of CTO’s. [Laughter] And I
thought to myself, wow, that is a bizarre mash up. CTO, George Clooney. I think you’ll find out why,
he’s dynamic, he’s creative, telegenic for sure, but on a
more serious note I’ve had the opportunity to engage Aneesh in different tech policy
discussions throughout the administration although
just some. He is ubiquitous. He has got a finger in a lot of
the pots that involve technology and technology policy
for the United States. He is the manifestation
of why many of us who joined the Obama
Administration know in our heart of hearts that this
administration gets it when it comes to tech
because he certainly gets it and he lets you know it. [Laughter] So without
further ado, Aneesh Chopra. [ Applause ]>>Aneesh Chopra: I am thankful
to Mark for the introduction, and I’m even more thankful for
the chance to share a few words in front of Vint
Cerf, how are you man? How are you? [Laughter] How do we do this? This is odd, okay,
listen my job today, Howard and I had lunch yesterday and I was chatting
him up about this. Howard is going to
give you the framework for cyber security policy
in the administration, but I thought what I might do
is provide for you the context for now cyber security fits
into a larger message and frame around our technology
and innovation agenda. So, you’re going to hear
several versions of our focus. Mine will be more on the
frontier land if you will, and Howard will provide
much more of the context for what we’re doing
operationally in the here and the now and so we’ll
juxtapose the messages, and I look forward to your
feedback on how productive that conversation has
been for all of you. So, I want to begin with
in the spirit event one of the Google employees a
young lady named Katy Stanton [phonetic] came to work for the
administration and Katy was part of a broad range of folks that
came into the administration from Silicon Valley or from
entrepreneurial backgrounds and early in Katy’s
tenure she remarked in such an eloquent way
sort of set of messages that I thought were
pertinent to the discussion about the world we’ve come into
and that was the culture gap that we’re seeing
between our private lives and our public sector and her
basic and most astute point was that she had come from a world
where there was a knack for that but when she entered
into Washington, she quickly acknowledged that there was a different
environment here one where there’s a form for that. What you see graphically
is the file cave that has personnel records in
the mountains of Pennsylvania for the Office of
Personnel and Management. Is OPM in the house? Where’s my OPM brothers
and sisters? Okay, maybe not. Well, as you can imagine,
what’s even more troubling about that graphic is that
we have pictures of this in government buildings
around the country. We have reports that fire
marshals have actually come in and said because of the weight of the paper this
building must be evacuated or in some ways improved. It’s astounding. Well, that’s why the President
said on his first full day in office when he
announced the concept of a Chief Technology Officer, his first homework
assignment was in a sense to close this gap,
but in a part to do so by creating a government
that was more open, more transparent,
more collaborative. It’s a vision that the President
had taken further in September of last year when he
announced the strategy for American innovation. Now, I have been talking about
this strategy a great deal, but I want to make sure so that
I don’t get too in the weeds by a show of hands how
many of you are familiar with the President’s strategy
for American innovation? Half of you, okay. Let me see if I can provide the
abridged version in this graphic that you see in front of you. In order to close that gap
that Katy had described, the President said what we need
to do are really three things in the long-term prospects
for the American economy, and I say that proverbially,
but the three key elements of our long-term
economic growth strategy. Element number one, which I’ll
highlight more in detail is that we as a nation are
at our best when we invest in the building blocks
of innovation, and we view the building blocks
under three, in three domains; research and development, advanced information
technology infrastructure, and human capital or
workforce training. The second pillar in the middle of this lovely pyramid
is our commitment to promoting competitive
and open markets with a particular emphasis
on entrepreneurship. Here’s where our open government
philosophy really shines and the flow of data
that’s so critical, which is in part the discussion
that we’re having today on cyber security and
protection of that data. And then last but not least the
President identified a few key national priorities where we
have to catalyze breakthroughs. Chief among them the interface
between information technology in the energy sector
specifically what we refer to as our smart grid
and the interface between information technology in our health care sector
our overall health IT agenda. It’s no surprise to any of you that cyber security is
a critical component in each of these domains. So, let’s get started with
the base of that pyramid, the focus on research
and development as an important enabler of our overall platform
for economic growth. What you see graphically is the
President’s introduced budget in fiscal ’11. That despite our overall freeze for non-security funding the
President re-allocated funds to keep on his commitment to
promote research and development and actually increased
R&D some 6.6% or so. We are on track to
double the core budgets of the National Science
Foundation, the Office of Basic Science
of the Department of Energy, and NIST [phonetic], who
is one of our hosts today. A lot of love for
you, Ceta [phonetic]. So, this trajectory, and you
see that spike in the middle, the purple graphic by the way
reflects the Recovery Act, and I think it’s
important to note that when the President
spoke of the Recovery Act, he spoke of the need to include
in the Recovery Act investments that would affect our
long-term economic prospects. Chief among those long-term
investments obviously were research and development
investments at our science agencies
but also included in that were investments in
health IT and the Smart Grid. I’ll talk about them
momentarily, but the President didn’t
want to stop at budget because budget is only
one way of thinking about our overall strategy. The other is making
sure that we know where the puck is proverbially
heading in the spirit of Wayne Gretzky and so to that
end the President tasked his external advisors, a
group called PCAST, the President’s Council
of Advisors of Science and Technology, that
includes a subcommittee on innovation and technology. In the world of acronyms, the
subcommittee known as PTACT, that convened its first summit
precisely adept to identify where the puck might be heading. In fact, we had identified
the top under 35 researchers around the country in
areas like nanotechnology, information technology,
and biotechnology, and we brought them
into Washington to say over the next ten years
what does the world look like if your research
is successful? And more to the point what
are the critical enabling technologies or infrastructures
that should be present in order to scale what might work
if you are effective? By the way all of that
very gripping meeting is publicly available. If you visit
and you click around PCAST public
meeting archives, you can watch this couple hour,
if you want to be inspired for a couple of hours, sit and
listen to these geniuses talk about the world as they
envision it from the work that they’re doing today. It is obvious when you listen
to their remarks and you think about our overall agenda that cyber security is
increasingly an important if not critical contribution
at the interface of all of these traditional
disciplines. We heard specific
testimony in this session of a cyber security researcher
I believe at Carnegie Melon who spoke of the
concerns as more and more of our health care
devices are implanted with remote connectivity
solutions that are to the good if you have a heart attack
the systems can be trained to send a message to the device that would provide you a
little electric impulse to keep your heart
from stopping, but as this researcher
suggested, the same capabilities under a cyber attack
could actually be used to manipulate whether
such a device should act when it’s not appropriate. So understanding the interface
of cyber security and health, cyber security and energy and
so forth a key theme that came out of our researcher
roundtable. It’s why Howard Schmidt
and I early in our tenure together made
such a priority a deep dive on the research and development
strategy for cyber security in this administration. How many of you by show of
hands have attended or read about the National Cyber
Leap Year Initiative that we had last August? A few of you. Actually maybe 30%
of you, bless you. So much of our cyber
security posture today if I could overly simplify
it is playing this sort of bizarre perimeter fence,
you know, defense, right? We’re going to identify
signatures that are bad, rapidly write patches, rapidly
execute that they can be, you know, put out there
into every PC in the country and that we stand ready so
that any of these bad things that come in will have that
signature and we stopped it and we’ve got this
incredible defense. We know at the pace at which
new attack vectors are created. At some point this strategy is
a difficult one to see scale. So one of the key
insights that came out of the cyber security are
the game changing work was how do we flip the equation? Not so much keeping
the bad guys out, but from containing the
damage that if they get in, they don’t actually
do us any harm. What an interesting and
intriguing area of research. One of three areas that
we believe are critical to identify breakthroughs
or game changers as we look to cyber security. Second in that publication
we focused on the notion of tailored, trustworthy spaces. A safe and secure Internet
within the Internet. I guess I’m overly simplifying,
but again in the spirit and I’ll talk about
specific initiatives that really exemplify what
we’re talking about here, how might we create
a more secure home within the constraints of
the Internet or the openness of the Internet to give
us much more confidence in the work that’s been done? And then last but not least, the
notion of economic incentives. We’ve talked a great
deal about the social and behavioral economics
aspects of cyber security. There isn’t a business today that doesn’t have
physical security outside. You all came into the Washington
Reagan Center and you all went through a security
apparatus physical in nature. There was no line
item appropriation that gave people a plus
up in their budgets for this presumably, but became
the cost of doing business in the physical environment
and one of our key research
questions is why and how might we make our cyber
security protections a key component of our
operational budgets? That is to say how do we embody
the right set of incentives so that we make this part
of a routine investment? We by the way communicated
to the American people in the spirit of openness in our
government, that we have heard from the cyber leap year
community, the 200 plus people who attended, the documents
that are publicly available for input, Howard and
I announced in May that what we wanted to do
was hear directly from others in the ecosystem who may not
have physically been part of these other conversations
to react to this agenda because we do have a commitment
to seeing this agenda not only as a long-term R&D plan
but to demonstrate progress against that plan
in the nearer term, and I’ll give you some
examples of that as I proceed. But the third leg of that
infrastructure was acknowledging that we need a workforce
that’s prepared for the 21st Century economy. That’s why the President
announced in November of last year the Educate
to Innovate Campaign. By the way show of hands
if you were familiar with the Educate to
Innovate Campaign? A number of you. For those of you in
the private sector, we strongly encourage you
to step up and participate in this initiative
entirely organized by and for the private sector. The President said that if we
are to focus on the workforce of the future, it is obvious
that we need much more training in science, technology,
engineering and mathematics not
only if you want to be a cyber security
professional, but also if you want
to be engaged in almost any aspect
of our economy. Any researcher will tell
you if you look at the jobs in our economy that require at least a Bachelorette degree
those numbers continue to go up dramatically in the out
years, and if you think about the importance of
science, technology, engineering and mathematics to the economy, you can see the gap has
grown even larger still. So, over $500 million
of private philanthropy and private corporate investment
has been put towards an advancement of a bottoms
up, grassroots agenda for education focused on
stem, and I’m very pleased that a number of those
initiatives are exposing folks to the challenges of cyber
security to the extent that any of you have ideas on what you
would like to see introduced as part of this initiative,
come forward. My favorite just about three
weeks ago I was in Los Angeles for E3, which is the gaming
convention, and I handed out the prizes, the checks, to
entrepreneurs, young students, the whole gamut who
responded to Sony and Electronic Arts
collaboration with the MacArthur Foundation
to build stem-oriented levels in two games; Sony’s Little
Big Planet and EA’s Spore. And these competitors built
levels into those games that would allow folks
to learn while playing and some of them were amazing. My favorite was if you remember
in science class how to create that volcano, that’s
pretty cool stuff then. These guys created a way
to make that volcano appear in the actual Little Big Planet,
which I thought was pretty fun. So, there could easily be and
we could execute this in weeks and months, not years, an interesting public/private
collaboration on cyber security principles
whether it be in gaming or in some other
domain that would help to educate folks on
the possibilities. So, we talked about
the R&D agenda. I must say a few words
about IT infrastructure, this has been a very
exciting couple of months in the tech team because
of this President’s actions to promote what I
would call the doubling of critical IT infrastructure
over the next ten years. I’m going to highlight one
example that makes it feel real to folks, and I’ll talk
about the policy levers that we’re pulling here. [Inaudible] number
one has been the story of Case Western Reserve
University’s internally funded R&D effort to think about
breakthroughs in connectivity. Case Western is on
Internet 2 like most of our universities are and they’ve internally financed
a project to extend Internet 2 to a 104 homes physically
adjacent to the campus, and if you’ve been to Cleveland, you’ll know that Case
Western happens to be on one for the poorest communities
in the country, and they asked a very bold
question, what does a gigabyte of connectivity do to transform
everyday Americans especially those who might be living at the
bottom of our economic ladder? And in a sense, an inspiring
call to entrepreneurs and innovators to bring
their coolest applications that are not yet ready for
prime time to this ecosystem for the purposes of demonstrating the
game changing effects. They announced by the way
their first initiative in smart metering capabilities. So, a gigabyte of connectivity
opens up possibilities in distance learning,
possibilities in health care chronic
disease management, again on energy management,
and on issues of public safety. It’s exciting to watch how
entrepreneurs are working together on this
infrastructure in a little town, in a little section
of Cleveland. Imagine if this scaled
to 40 or 50 cities from around the country and we
built a test bed, Vint Cerf, of 5,000 homes that could
connect in some creative way to at least a gigabyte
of connectivity. I don’t know what’s possible,
but I can tell you as part of our exciting investments
in BTOP [phonetic], which is the President’s
Broadband Investment Program led by our good friends at
the Commerce Department, we announced just about
a week and a half ago over a $100 million of capital,
three quarters of which financed by the government and a
quarter from the private sector, to essentially double
the capacity of ultra-high speed
broadband networks. You might think of them as
Internet 2 and land [inaudible], but we will have a doubling if
you will of the number of miles of connectivity that can have at
least a gigabyte of connectivity up to 100 gigabytes of connectivity once this
grant is fully implemented. So, we’re going to double
up the capacity of those who can connect to ultra-high
speed broadband networks and if those institutions that
are connected can find their when resources, could
extend this infrastructure and the research environment to
their neighborhoods and allow us to create that test bed. Very exciting prospects. It’s not just the
wired environment, it’s also the wireless
environment and so I highlight for you just a simple example of how we’re leveraging wireless
technology to improve the lives of everyday Americans. We announced in February
the Text for Baby Campaign. What a simple concept. In the midst of a reasonably
vocal public discussion we had on health care, I don’t
know if you were following that particular piece
of legislation, but while we were having
that debate in Washington, we were executing
on simple solutions that would help people
in their daily lives. Oh, and by the way we were
doing so at a zero cost to the taxpayers
and at zero cost to the young family
members who are involved. What do we do? We convened. We often forget about the role
of government as convener. We always, now it’s like
government is budget financer or government as legal
rule maker, but the notion of government is
convener is often missed in these conversations. Government as convener in tech and innovation led
to Text for Baby. A coalition of non-profit
organizations said if a pregnant mom texts 5-1-1,
4-1-1 and the word baby or bebe in Spanish and their
expected due date, they can receive three
personalized text messages a week. Oh, by the way the
convene we had to call on the cell phone companies who said we will waive our
text message fees for two years to participate in
this collaborative. It meant that we had to
make sure the content sent to the moms met some peer
reviewed standard so the Centers for Disease Control engaged
with the healthy mothers, healthy babies coalition
to ensure that the quality of content was sufficient and
it meant we’ve got to find a way to get the word out to folks. Medicaid centers from
around the country stood up, my hometown of Virginia,
in Richmond, Virginia, now the Medicaid Program
for every new mom enrolled in Medicaid and they often do
because of their pregnancy, they receive in their enrollment
package instructions on how to join Text for Baby. No surprise that with
no money for marketing, no money for taxpayers, no
money for anything formal, we’ve already hit 50,000 moms
who are enrolled in the program, and I know it works because
doctors have been calling me to say, Aneesh, I’m seeing
an uptake in people coming in for prenatal care visits because they say I got a
text message I’ve got to come in for a prenatal care visit and folks are starting
to access the system. Hopefully over time this
means we’ll reduce our infant mortality rate or our
pre-term birth rate. What does this mean
for the economy? That’s why the President called for an unprecedented
10-year strategy to double our overall commitment
to mobile broadband to ensuring that over 500 megahertz of
spectrum would be released and commercially auctioned to provide more broadband
connectivity in this country. I’m very excited
about the 10-year plan that the President unveiled. Larry Summers described this
about two, three weeks ago and, again, in the spirit of our infrastructure
acknowledging both wired and wireless are critical
on particularly bullish on our wireless strategy
and we’re starting to take this concept global. By the way Text for Baby
Secretary Clinton announced is now going to move to Russia
next and you’re going to start to see a global movement for
these kinds of simple solutions. It also is a spirit
of open government that we’re using
technology data innovation in so many of our daily lives. It was the First Lady
who’s called on our country to get a little bit smarter
about childhood obesity, but how are we going to get
smarter about childhood obesity? One of her four key principles
in addressing this challenge is to close the information gap. Not all of us know the quality
or the health nutrition value of the foods we’re eating. So, how do we close
the nutrition gap? Well, in the Department of
Agriculture, we have a database of 30,000 foods and you can
access it on Anybody visited Exactly. Well, by
the way I have. I type in bagel with cream
cheese, which is my breakfast, and it tells me I’ve
consumed 68 excess calories. Interesting. But the point of this is that the data sits
at I don’t even know if folks that spell
let alone visit that website. So, what do we do? We release the data and we
found a whopping $60,000 in grant funds that we can
make available as prize money. Whooping, right? But does this mean? This means that Steve Wozniak
says I want to be a judge. It means that Mark
Pincus of the coolest, hottest new Internet company
Zynga, social gaming companies, I want to be a judge, and we
get all these folks who stand up and say I want to
participate in this movement. Over a 160 games were produced
in time for the deadline of which 95 met the first
additional criteria. Visit all of them at And by the way you’re
all allowed to vote because there’s a popularity
contest for the best apps with one of the, you
know, popularity prizes. Deadline is August 15th for
the public voting, but again, I bring this up because you
cannot think of any policy today that doesn’t involve at least
some data connectivity as part of our strategy, which by the
way means we must also have a thoughtful approach on cyber
security as more and more of our lives are
digital and that’s a lot of what you’re going
to hear from Howard. Two final observations
before I wrap up my remarks. It is important as we look at
the catalyzing effect we want to have in those two areas
I cited earlier, Smart Grid and health IT, that we get
these right from the beginning; not as an afterthought. Howard is my blood brother on
the issues of cyber security in the Smart Grid and cyber
security in health IT. Just to give you an example in the Smart Grid literally this
summer there are 3,000 homes in Massachusetts who are
going to have a little box that will allow them to read in six second increments the
meter that’s already outside their home but wasn’t
tuned in a radio frequency that would allow the
public to read it. So we’ve got to figure out,
okay, so we’re going to, so what happens if you get
the data and by the way when they get the data, it’s fed
into a system that has open APIs so that the data could be
basically built on top of, a new apps could be created that
will come up with creative ways of convincing me to be
better about my energy usage. So understanding cyber security
with Smart Grid it’s why on June 8th we announced that
the White House was going to convene a strategic
review of Smart Grid. We’ve had a couple sessions at the Brookings
Institution, one more tomorrow. We’ve had a cyber
security deep dive. We will over the coming months
put together a strategic roadmap for where we are on the
Smart Grid post Recovery Act. Ditto on health care IT. I want to highlight one example,
one project in particular that is I think a
critical example of ensuring you [inaudible]
cyber security principles on the front end. We held public testimony in
the spirit of open government, we wanted to hear from
doctors, not the lobbyists and not the insiders who
can finance people to fly to Washington and sit in
ballrooms and all the rest, we wanted to hear
from people directly. A doctor said to us let me
tell you my health IT problem. It was a Virginia doctor. He says I have a patient
moving to Arizona. The patient would like
an electronic copy of her record sent to the doctor
in Arizona, who by the way is on the same software that I’m on
and after we figured all of this out we said, oh,
great, let’s do it. There’s no button that says
send to my colleague in Arizona. So, as an experiment
with patient permission, the IT department exported
the patient’s record file, attached it to the public
Internet on regular email, sent it to Arizona, where
the doctor opened up the file and imported it and it worked. While the doctor is testifying, the room had a collective
heart attack. [Laughter] We do not want to
be using the public Internet to be emailing back and
forth sensitive patient medical records. So the doctor asked something
very basic in his testimony. I’m sure you all are
developing wonderful things and money will flow and
processes will happen, but will you just make
it safe and secure for me to email the data
to my colleague? And we said, duh, absolutely. So, within months we stood up a voluntary collaborative
project called the Inhin Direct [phonetic]. It was convened in March and
it had a very simple mission; let’s lock up proverbially
the Google’s the Microsofts, the Epics, the ecosystem
of 80 plus folks in the health care
sector, let’s get them to establish a draft
set of technical specs that would meet the
doctor’s call. And frankly what that
would mean is a way to achieve the meaningful
use objectives which is qualifying you
for billions of dollars of reimbursement anyway how
do we get this up and running? In the spirit of rapid turns
because we don’t have patients to think in budget cycles
or government things of congressional involvement,
we wanted to see results now. Within 90 days this
group achieved consensus and developed the protocols for
safe, secure email transport. You’re welcome to view and
read and comment on these at, but it’s
the spirit of achieving a lot of our policy objectives,
embracing the spirit of voluntary consensus
driven standards making, encouraging through
the convening power of the administration to
get folks around the table to solve challenging
problems and ensuring that we [inaudible]
cyber security principles on the front end before we
move our overall health IT agenda forward. Again, I would welcome
your input and reaction to this framework. There are now going to be
prototypes developed this fall where folks are going to be exchanging information
using these protocols and my humble opinion this is
going the be the dominant method of exchange in the Year
2011 when the first year of connectivity requirements
hit under meaningful use, which leads me to my
final observation. My final observation
is that to put all of this together we are now
hitting a moment in time where we’re sort of coming
back to the past and thinking about the future, and I
was really excited to share with you the final conclusions of the DARPA Red
Balloon Challenge. Vint, Vint, Vint. In 40 year celebration, the folks at DARPA said let’s
do something very interesting and by the way a $40,000 project
for DARPA has to be considered in the lowest end of
their investment cycle, but in the spirit of
fast can-do government when they announced our 40th
anniversary celebrations they said that in a couple of months
— this was in the fall — by December 5th I think
it was we’re going to put up the ten balloons in
undisclosed locations around the country and bring
them down that same day. What you know, of course,
is the story I’m sure most of you now have read
about this in the paper is that the MIT team won, but I want to give you three
takeaways of the experience. The MIT team that won decided to play the game 48 hours
before the game started. In other words, a half a dozen
post docs and students sat around the proverbial
conference table and said how do we build a
1.5 million person global army to find 10 balloons? And oh, by the way
we’ll organize this to happen in two days. Number one. Number two, what are
the radical social and behavioral incentive
programs we could introduce into this game to encourage
the formation of that Army? And as you read about
in the papers, they had a very intriguing
system. If Vint was lucky
enough to find a balloon, he would get half the value
of the balloon as a reward. If I invited Vint to join
the network, I would get half of what Vint got and if Danny
invited me who invited Vint, he would get a quarter
and then an eighth. This tiered incentive system
is what convinced everybody to join this ragtag bunch of
geeks presumably, I don’t want to presume who they are, to engage in this really weird
contest and then that leads to the third point, which
is once you turn somebody on to this exciting project,
you can see the spillover effect and it’s the spillover
effect that I want to use as my ending remarks. Spillover effect number one. The lead post doc, Riley Crane
[phonetic], who was involved in this particular endeavor,
was moved and said I’m motivated by a cause greater than myself. He cared about the
cause of global hunger. So he approached the
UN and he’s formed a, and you can see the graphic,
one billion people live in chronic hunger
and I’m mad as hell. A global petition
using the same kind of tiered incentive
strategy where instead of getting cash incentives
you get sort of, you know, reputation points, and has
already led to hundreds of thousands of people
that have signed on to his global petition, but
the second output of this is that a group of folks from
the MIT community have now commercialized this logic
in a mobile commerce venture in Africa where they’ve said
if you want to pay somebody for situational awareness,
maybe it’s to find out if there’s a human
rights abuse or something, we could create a payout
model using mobile commerce that will reward people for
reporting things that are of importance to somebody. So, here you have a weird
research project that has tested out a whole new methodology
of incentives that’s led to an exciting, social endeavor,
what we call e-democracy, and by the way an economic
venture that will hopefully lead to job creation and the like. That’s the spirit of the
President’s commitment to innovation, it’s why we
believe as more and more of our lives become digital the
cyber security question must follow right in step, and
it’s why I’m so pleased that I had the chance to speak
before Howard who is going to inspire you with the
policy they have later today. Thank you for your time. [ Applause ]


4 Replies to “Cybersecurity and Innovation in the Information Economy – Segment 5”

  1. National Institute of Standards and Technology says:

    Thanks for checking out our videos. Please add your comments and let us know what you think. We will be reviewing and then posting comments as long as they are on topic, respectful and do not promote specific products or services

  2. eproxyvid says:


    Interested in Cybersecurity and Innovation in the Information Economy – Segment 6

    Is this available for viewing?

  3. Rudi Tham says:

    with a lot of transaction using internet, it is important to step up the security.

  4. says:

    Great info

Leave a Comment

Your email address will not be published. Required fields are marked *