Federal Cybersecurity Detection, Response, and Mitigation
- Subject
- Federal Cybersecurity Detection, Response, and Mitigation
- Date
- April 20, 2016
- Time
- 9:30 am
- Place
- 2154 Rayburn House Office Building
PURPOSE:
- To examine federal agencies’ capabilities and procedures to detect and mitigate cybersecurity vulnerabilities.
BACKGROUND:
- The increasing use of common and shared hardware, software, and information infrastructure across the federal government increases the likelihood for cybersecurity vulnerabilities to occur, as well as the resulting level of damage if vulnerabilities persist.
- Recent media reports revealing security vulnerabilities in the Department of State’s Consular Consolidated Database raise new questions about the Department’s cybersecurity posture and information security procedures.
- Additionally, a vulnerability discovered in several generations of the Juniper Networks software may have had the potential to affect a large number of federal agencies.
Witnesses and testimonies:
Mr. Sanjeev Bhagowalia
Related Documents
Deputy Assistant Secretary for Information Systems & Chief Information Officer
Department of Treasury
Document
Chief Information Officer
Department of State
Document
Assistant Secretary for Cybersecurity and Communications
Department of Homeland Security
Document
Chief Intelligence Officer
ThreatConnect, Inc.
Document
Vice President
Mandiant Consulting
Name | Document |
---|---|
Rep. Hurd Opening Statement | Document |