[House Hearing, 113 Congress] [From the U.S. Government Publishing Office] CYBER INCIDENT RESPONSE: BRIDGING THE GAP BETWEEN CYBERSECURITY AND EMERGENCY MANAGEMENT ======================================================================= JOINT HEARING before the SUBCOMMITTEE ON EMERGENCY PREPAREDNESS, RESPONSE, AND COMMUNICATIONS and the SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION __________ OCTOBER 30, 2013 __________ Serial No. 113-39 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Available via the World Wide Web: http://www.gpo.gov/fdsys/ __________ U.S. GOVERNMENT PRINTING OFFICE 87-116 PDF WASHINGTON : 2014 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Michael T. McCaul, Texas, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Peter T. King, New York Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Paul C. Broun, Georgia Yvette D. Clarke, New York Candice S. Miller, Michigan, Vice Brian Higgins, New York Chair Cedric L. Richmond, Louisiana Patrick Meehan, Pennsylvania William R. Keating, Massachusetts Jeff Duncan, South Carolina Ron Barber, Arizona Tom Marino, Pennsylvania Dondald M. Payne, Jr., New Jersey Jason Chaffetz, Utah Beto O'Rourke, Texas Steven M. Palazzo, Mississippi Tulsi Gabbard, Hawaii Lou Barletta, Pennsylvania Filemon Vela, Texas Chris Stewart, Utah Steven A. Horsford, Nevada Richard Hudson, North Carolina Eric Swalwell, California Steve Daines, Montana Susan W. Brooks, Indiana Scott Perry, Pennsylvania Mark Sanford, South Carolina Greg Hill, Chief of Staff Michael Geffroy, Deputy Chief of Staff/Chief Counsel Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director ------ SUBCOMMITTEE ON EMERGENCY PREPAREDNESS, RESPONSE, AND COMMUNICATIONS Susan W. Brooks, Indiana, Chairwoman Peter T. King, New York Donald M. Payne, Jr., New Jersey Steven M. Palazzo, Mississippi, Yvette D. Clarke, New York Vice Chair Brian Higgins, New York Scott Perry, Pennsylvania Bennie G. Thompson, Mississippi Mark Sanford, South Carolina (ex officio) Michael T. McCaul, Texas (ex officio) Eric B. Heighberger, Subcommittee Staff Director Deborah Jordan, Subcommittee Clerk ------ SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES Patrick Meehan, Pennsylvania, Chairman Mike Rogers, Alabama Yvette D. Clarke, New York Tom Marino, Pennsylvania William R. Keating, Massachusetts Jason Chaffetz, Utah Filemon Vela, Texas Steve Daines, Montana Steven A. Horsford, Nevada Scott Perry, Pennsylvania, Vice Bennie G. Thompson, Mississippi Chair (ex officio) Michael T. McCaul, Texas (ex officio) Alex Manning, Subcommittee Staff Director Dennis Terry, Subcommittee Clerk C O N T E N T S ---------- Page Statements The Honorable Susan W. Brooks, a Representative in Congress From the State of Indiana, and Chairwoman, Subcommittee on Emergency Preparedness, Response, and Communications..................... 1 The Honorable Donald M. Payne, Jr., a Representative in Congress From the State of New Jersey, and Ranking Member, Subcommittee on Emergency Preparedness, Response, and Communications: Oral Statement................................................. 12 Prepared Statement............................................. 13 The Honorable Yvette D. Clarke, a Representative in Congress From the State of New York, and Ranking Member, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies: Oral Statement................................................. 10 Prepared Statement............................................. 11 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security.............................................. 14 Witnesses Ms. Roberta Stempfley, Acting Assistant Secretary, Office of Cybersecurity and Communications, National Protection and Programs Directorate, U.S. Department of Homeland Security: Oral Statement................................................. 16 Prepared Statement............................................. 18 Mr. Charley English, Director, Georgia Emergency Management Agency, Testifying on Behalf of National Emergency Management Association: Oral Statement................................................. 22 Prepared Statement............................................. 23 Mr. Craig Orgeron, CIO and Executive Director, Department of Information Technology Services, State of Mississippi, Testifying on Behalf of National Association of State Chief Information Officers: Oral Statement................................................. 27 Prepared Statement............................................. 29 Mr. Mike Sena, Director, Northern California Regional Intelligence Center, Testifying on Behalf of National Fusion Center Association: Oral Statement................................................. 32 Prepared Statement............................................. 34 Mr. Paul Molitor, Assistant Vice President, National Electrical Manufacturers Association: Oral Statement................................................. 38 Prepared Statement............................................. 39 For the Record The Honorable Susan W. Brooks, a Representative in Congress From the State of Indiana, and Chairwoman, Subcommittee on Emergency Preparedness, Response, and Communications: Statement of National Governors Association.................... 3 Appendix Questions From Chairwoman Susan W. Brooks for Roberta Stempfley.. 65 Questions From Chairwoman Susan W. Brooks for Charley English.... 67 Questions From Chairwoman Susan W. Brooks for Craig Orgeron...... 68 Questions From Chairwoman Susan W. Brooks for Mike Sena.......... 69 Question From Chairwoman Susan W. Brooks for Paul Molitor........ 70 CYBER INCIDENT RESPONSE: BRIDGING THE GAP BETWEEN CYBERSECURITY AND EMERGENCY MANAGEMENT ---------- Wednesday, October 30, 2013 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Emergency Preparedness, Response, and Communications, and Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Washington, DC. The subcommittees met, pursuant to call, at 10:07 a.m., in Room 311, Cannon House Office Building, Hon. Susan W. Brooks [Chairwoman of the Emergency Preparedness, Response, and Communications subcommittee] presiding. Present from Subcommittee on Emergency Preparedness, Response, and Communications: Representatives Brooks, Palazzo, Payne, and Clarke. Present from Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies: Representatives Meehan, Clarke, and Horsford. Mrs. Brooks. The Subcommittees on Emergency Preparedness, Response, and Communications and Cybersecurity, Infrastructure Protection and Security Technologies will come to order. I would like to welcome our witnesses, everyone in the audience, and those who are watching this webcast to our joint hearing today on Cyber Incident Response. I would like to start out by thanking Chairman Meehan and Ranking Member Clarke for working with me and Ranking Member Payne, who we anticipate both of those Members will be here shortly, on this important issue. I would like to thank our witnesses for their patience as we have worked to reschedule this hearing, in addition in the slight delay this morning. I would also like to thank the staffs who have worked together in preparing us for this very important hearing this morning. October is Cybersecurity Awareness Month, and I think it is so very important that we observe this month in part of our awareness because it must be our ability to not only protect our networks and our critical infrastructure from intrusions, but also, what is our ability to respond should an intrusion become successful? After all, we do know that the threat of a cyber attack is real and in a speech just prior to her resignation former Secretary of Homeland Security Janet Napolitano discussed that threat. She forecasted that our country will face a major cyber event that will have a serious effect on our lives, our economy, and the everyday functioning of our society. Now, earlier this past week National Geographic Channel aired a program entitled ``American Blackout''--a program which I watched with some interest on Sunday evening. It explored the cascading effects of a Nation-wide 10-day power outage caused by a cyber attack. For the Members of the committee, if you have not seen that I strongly recommend that you watch this show. The movie was eye-opening and quite scary and happened to be on a topic that I had discussed just recently with Hoosier Power Companies in my district just last month. The effects of the blackout depicted in this movie caused serious public health and public safety issues, including severely impacting the food and water supply; the availability of fuel, which we also saw during Hurricane Sandy, which just 1 year ago yesterday when that horrific hurricane came upon our shores; the ability of hospitals to function; the ability to access money from ATM machines or to use credit cards; and most importantly, the ability to enforce the law and maintain civil society. Now, I agree with the former Secretary when she noted that we have made some great strides in addressing cyber threat, but clearly more work must be done and must be done quickly. This assessment that work remains was echoed at a hearing we held in the Emergency Preparedness Subcommittee last month. The 2013 National Preparedness Report released by FEMA earlier this year again highlighted States' concerns about their own cybersecurity capabilities. The 2013 report noted gains in cybersecurity at the State level but that the States continue to report that cybersecurity is among the lowest of their capabilities. Let me repeat that: It is among the lowest of the States' capabilities. At that hearing California's homeland security advisor, Mark Ghilarducci, noted that cybersecurity is an emerging and evolving threat that everybody is still grappling to get their arms around. He noted that the Federal Government's ability to provide guidance to States has been rather limited. I agree this is not an easy task, but information sharing about the threat and actions to take before, during, and after a cyber attack is critical. I hope that Ms. Stempfley will tell us about the Department's efforts to share information with State and local authorities including emergency managers, fusion centers, and the private sector to help them work to address and elevate the importance of this evolving threat; and that I hope that our State and local witnesses will also discuss how they share information and coordinate with relevant officials in their States and localities and with the private sector, which, I must note, controls at least 85 percent of our Nation's critical infrastructure. We must ensure that this coordination is taking place now so we are prepared to respond to a cyber incident that will have physical consequences. I am also interested in learning today how DHS, working with other Federal agencies and departments and exercise participants, is working to address the lessons that were learned in the National-level exercise exercised in 2012, which simulated a large-scale cyber attack. Just as I have noted the challenges we face in addressing the cyber threat, we must also discuss the progress that is being made. In my own district I am proud to say that the Indianapolis division of Homeland Security has established a cyber defense force to improve the overall cybersecurity preparedness of the Indianapolis metropolitan area, and the State of Indiana has included cybersecurity in its threat and hazard identification and risk assessment, or in its own THIRA. The National Emergency Management Association is working also with Texas A&M to develop cybersecurity awareness training programs for emergency managers. Fusion centers are also becoming much more engaged in cybersecurity. States are also taking innovative steps to address the threat. For example, Michigan has established the role of a chief security officer, which has oversight of both cybersecurity and physical security. The National Guard is becoming much more engaged in cybersecurity as well. In Maryland the Air National Guard's 175th Network Warfare Squadron is assisting with the development of State cybersecurity assessments and has worked with Maryland Emergency Management on cybersecurity exercises. Next month the North American Electric Reliability Corporation, or NERC, will hold GridEx 2013, an exercise that will test the electricity subsector's readiness to respond to a cyber incident including physical consequences. These are all critically important steps, but as I noted earlier, much work remains to ensure we are prepared to respond to a cyber attack. Chairman McCaul and Chairman Meehan have been working to develop thoughtful, effective cybersecurity legislation this Congress. I am pleased the draft bill that that committee has worked on includes provisions addressing cyber incident response and it is my hope that today's hearing will help to further inform that committee's work. Before I conclude, I would like to ask unanimous consent to include in the record a statement from the National Governors Association, which provides greater details on steps States are taking to enhance their cybersecurity posture. [The information follows:] Statement of National Governors Association October 30, 2013 On behalf of the Nation's governors, thank you for the opportunity to comment on bridging the gap between cybersecurity and emergency management. Protecting the Nation from cyber threats and their potential consequences requires strong partnerships among all levels of government, law enforcement, the military, and the private sector. Over the past several years, Governors have been working to improve the cybersecurity posture of their States and to improve State-Federal coordination. Based on these efforts and States' interaction with the Federal Government, we are pleased to offer the recommendations below. state efforts to address cybersecurity Since the terrorist attacks of September 11, 2001, and Hurricane Katrina in 2005, National preparedness and response activities have emphasized a ``whole community'' approach. Despite this progress, State-Federal coordination efforts for cybersecurity are still in their early stages. In the absence of unified Federal guidance, States are moving forward to develop methods, strategies, and partnerships to improve their cyber resiliency and strengthen capabilities to prepare for, respond to, and recover from potential cyber attacks. Governors are leading efforts to expand collaboration and drive change at both the State and Federal level. This is taking place through initiatives such as the National Governors Association (NGA) Resource Center for State Cybersecurity and the Council of Governors. Through these collaborative forums, Governors have identified a number of areas where enhanced Federal support and engagement could further assist States in this National effort. For instance, the Federal Government should:Enhance Federal coordination and consultation with States and recognize that Governors have emergency powers and authorities that can benefit the Federal Government. Leverage all available resources, such as the National Guard, to support both Federal and State cybersecurity missions. Provide flexibility for State investments in cybersecurity through reform of Federal grant programs and support for innovative State solutions that leverage existing resources such as fusion centers. Clarify Federal statutes, roles, and authorities to address cyber incident response, taking into consideration the role of States and the impact on current State laws and regulations. Improve information sharing and State access to Federal cybersecurity resources, such as those for technical support, education, training, and exercises. encouraging action and promoting best practices Governors' efforts are focused on the need to improve not just States' cybersecurity, but that of the Nation. To help Governors address this challenge, NGA formed the Resource Center for State Cybersecurity in 2012. The Resource Center, co-chaired by Maryland Governor Martin O'Malley and Michigan Governor Rick Snyder, brings together experts from key State and Federal agencies and the private sector to provide strategic and actionable recommendations Governors can use to develop and implement effective State cybersecurity policies and practices. On September 26, 2013, the NGA released Act and Adjust: A Call to Action for Governors for Cybersecurity, a paper that provides strategic recommendations Governors can immediately adopt to improve their State's cybersecurity posture (attached). NGA also released an electronic dashboard designed to provide Governors with an overview of their State's cybersecurity environment and assist them in monitoring implementation of the paper's recommendations. The dashboard is currently being pilot tested in Maryland and Michigan in conjunction with the Multi-State Information Sharing & Analysis Center (MS-ISAC). Through the Resource Center, Governors are exploring other vital areas as well, including: The role of fusion centers in collecting and disseminating real-time information on cyber threats to State agencies and law enforcement; Enhancing the cybersecurity of energy systems and the electrical grid in coordination with utility commissions, owners, and operators at the State level; and Developing a trained and enduring cyber workforce within State government. leveraging resources government-wide Identifying innovative solutions to address cybersecurity and secure the Nation against the growing cyber threat requires engagement by senior leaders at all levels of government. In addition to their work within their respective States, Governors also have engaged directly with the Federal Government through the Council of Governors (Council). Currently co-chaired by Governor O'Malley and Iowa Governor Terry Branstad, the Council brings together 10 Governors and the Secretaries of Defense and Homeland Security to address issues regarding the National Guard and homeland defense. Since it was formally established in 2010, the Council has served as a valuable forum to facilitate coordination between State and Federal military activities, such as a 2010 agreement establishing dual-status command authority during major disasters. This authority was employed during recent events such as Hurricane Sandy and the Colorado floods. The Council is now working to turn this commitment to collaboration into similar actions to address State-Federal coordination on cybersecurity and the development of National Guard cyber capabilities. Governors firmly believe the Guard's unique status serving both Governors and the President and its access to civilian-acquired skillsets makes it an ideal and cost-effective resource to address our Nation's growing cyber vulnerabilities. With the flexibility to support both Federal and State-related cyber missions, the Guard can be a force multiplier in support of the Department of Defense, the Department of Homeland Security (DHS), the Federal Bureau of Investigation and States. While the National Guard's role in cybersecurity is still being deliberated, Guard cyber units across the country are already demonstrating their unique capabilities including: Serving as a key coordinating hub between various stakeholder groups.--Several National Guard cyber units are actively engaged with their Governor's office, State emergency management agencies, State Chief Information Officers and other State, local, and Federal officials in the development of State cyber incident response plans. Several States have also integrated Guard units within their fusion center. Providing key support services in planning, testing, training, and exercises.--Guard unit participation is continuing to grow in State and National-level cyber exercises such as Cyber Guard, Cyber Storm, and Cyber Shield. Several State Guard units also are providing risk assessment and vulnerability testing support to State agencies and local critical infrastructure owners and operators. Providing a readily available and highly-trained workforce.--National Guard cyber units include personnel from a significant number the Nation's top cybersecurity and information technology companies such as Microsoft, Cisco, Siemens, Intel, GE, Boeing, IBM, and Google. This access provides a unique opportunity to leverage and sustain ``leading edge'' civilian-acquired cyber skillsets not readily available or easily built from within the Federal Government. Earlier this year, Governors secured the commitment of former U.S. Department of Homeland Security Secretary Janet Napolitano and departing U.S. Department of Defense Deputy Secretary Ash Carter to work with them to identify new opportunities to strengthen the State- Federal partnership on cybersecurity and to better leverage existing resources such as the National Guard. This work is on-going, and we look forward to providing the committee an update on our progress early next year. opportunities for state-federal engagement As the development of Federal legislation to address cybersecurity continues, Governors urge Congress to consider the following recommendations: Ensure coordination and consultation with States.--Like all disasters, response and recovery begins at the State and local level. Federal cyber incident response guidance such as the National Cyber Incident Response Plan (NCIRP) must not be developed using a Federal-centric approach, but must integrate key State officials and consider Governors' authorities throughout the process. Promote the role of the National Guard to support both Federal and State cybersecurity missions.--This includes ensuring that the National Guard is considered concurrently with active duty forces in any new cyber force structure developed by U.S. Cyber Command and the military services. Support State investments in cybersecurity through reform of homeland security preparedness grants.--In recent years, decreased funding levels across preparedness grant programs combined with their current rigid requirements has limited States' ability to address emerging threats, such as cybersecurity, or provide adequate support to fusion centers. Address ambiguities with cyber incident response.--This includes clarifying current statutory authorities governing disaster management, such as the Stafford Act and the Economy Act. Roles and responsibilities of the various Federal agencies with cybersecurity coordination and operational authority during an incident should be better-defined and corresponding guidance to State and local authorities (such as the NCIRP) should be updated accordingly. Improve information sharing with States to provide real-time intelligence on threats.--Improving existing information- sharing capabilities such as the MS-ISAC and State and local fusion centers can further support this effort. DHS also can provide more structured and coordinated access to Federal cybersecurity initiatives such as workforce and training programs, Federal cybersecurity exercises, and forums for public-private partnerships. cybersecurity is a shared responsibility Governors recognize the critical need to improve our Nation's cybersecurity posture. This is an immense challenge that requires an unprecedented level of coordination among all levels of government and the private sector. Governors are committed to addressing this challenge within their States and are actively seeking to partner with their Federal counterparts. As the committee continues to consider the legislative path forward for cybersecurity, NGA stands as a ready resource for innovative policy solutions that will both support Governors' efforts and enhance the State-Federal partnership to address our Nation's most pressing cybersecurity challenges. Attachment.--NGA Paper act and adjust: a call to action for governors for cybersecurity September 2013, Thomas MacLellan, Division Director, Homeland Security & Public Safety Division, NGA Center for Best Practices Cybersecurity remains one of the most significant challenges facing the Nation. Although implementing policies and practices that will make State systems and data more secure will be an iterative and lengthy process, Governors can take a number of actions immediately that will help detect and defend against cyber attacks occurring today and help deter future attacks. Those actions include: Establishing a governance and authority structure for cybersecurity; Conducting risk assessments and allocating resources accordingly; Implementing continuous vulnerability assessments and threat mitigation practices; Ensuring that the State complies with current security methodologies and business disciplines in cybersecurity; and Creating a culture of risk awareness. By implementing those recommendations immediately, Governors can greatly enhance States' cybersecurity posture. Guiding Principles This Call to Action, as well as the work of the NGA Resource Center for State Cybersecurity (Resource Center), is guided by a set of core principles: Support Governors.--The work of the Resource Center is singular in its focus on supporting Governors' efforts to improve cybersecurity. The Resource Center marks the first large-scale effort exclusively focused on the role of Governors in improving cybersecurity. Be Actionable.--The goal of the Resource Center is to provide to Governors recommendations and resources that promote actions that reduce risk. Reduce Complexity.--Cybersecurity policy is designed and implemented in a complex environment. The Resource Center aims to reduce that complexity by looking for common principles and practices that are effective in that environment. Protect Privacy.--The recommendations made through the Resource Center aim to both improve cybersecurity and protect the privacy, civil rights, and civil liberties of citizens. Employ Technologically Neutral Solutions.--The recommendations made through the Resource Center emphasize nonproprietary, open standards. Focus on the State as Enterprise.--The work of the Resource Center aims to improve Governors' understanding of the State as an enterprise including the interdependencies among State agencies; between the public and private sector; and regionally across State boundaries. Promote Flexible Federalism.--To the extent possible, the Resource Center emphasizes the benefits of and opportunities for flexibility within Federal programs to allow for tailored State solutions. Rely on Evidence-Based Practices.--The Resource Center makes recommendations that build on evidence-based practices. Use and Generate Metrics.--The Resource Center promotes recommendations that use dynamic performance metrics to manage and improve State processes and practices. Promote the Use of Incentives.--The Resource Center makes recommendations that promote the use of incentives to improve cybersecurity practices in a State. Immediate Actions to Protect States Domestic and international actors are launching a significant number of cyber attacks against States. Although many of the actions necessary to reduce the Nation's vulnerabilities to cyber attacks require long-term structural improvements and business redesign, Governors can take actions now that can immediately improve their State's cybersecurity posture. Implementation of the actions described below will help to ensure strong governance and oversight, a baseline of cybersecurity capabilities, and quicker identification of attacks and threats; it also will help to improve basic cybersecurity practices. Establish a governance structure for cybersecurity.--Because State systems and networks are interconnected, developing a robust cybersecurity posture will require an enterprise-wide approach. To that end, Governors need to ensure that they have a strong State-wide governance structure with some degree of central authority that provides a framework to prepare for, respond to, and prevent cyber attacks. Several recent attacks reveal that States which fail to put in place a strong governance structure are at a distinct disadvantage. For many States, chief information security officers (CISOs), who are responsible for developing and carrying out information technology (IT) security policies, have only limited responsibility and authority over State-wide cyber networks. CISOs can operate in federated or decentralized environments where technology and security resources are dispersed across various agencies and departments. In addition, the sharing of cyber threat information with the private sector and local governments is handled by State homeland security agencies, further complicating the overall cybersecurity governance structure. According to a survey conducted by Deloitte for the National Association of State Chief Information Officers (NASCIO), 56 percent of State CISOs indicate that they have authority over only their executive branch agencies, departments, and offices.\1\ Although most States have a CISO, if they do not have a visible agency-level security posture, they can encounter obstacles to implementing an effective cybersecurity program. Among the elements of an effective program are enforcement mechanisms to ensure compliance with security policies and audit findings. States without governance structures to build and operate effective programs will be limited in their ability to identify an on- going cyber attacks and respond in a coordinated way. --------------------------------------------------------------------------- \1\ ``State Governments at Risk: A Call for Collaboration and Compliance,'' Deloitte and the National Association of State Chief Information Officers, October 26, 2012, accessed March 10, 2013, http:/ /www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/Documents/ AERS/us_aers_nascio% 20Cybersecurity%20Study_10192012.pdf, 10. --------------------------------------------------------------------------- Governors can grant their chief information officers (CIOs) or CISOs the authority to develop and steer a coordinated governance structure (for example, a task force, commission, or advisory body) that can greatly improve coordination and awareness across agencies that operate State-wide cyber networks. Such an approach also helps enable the CIO or CISO to take actions to prevent or mitigate damage in the event of a cyber breach. Michigan has created a centralized security department run by a chief security officer (CSO) that brings together both physical security and cybersecurity. Directors, managers, and employees within each agency coordinate through the centralized governance structure to focus on each agency's need for both physical security and cybersecurity. Governance of that type is especially important during an incident or a disaster. The approach allows the CSO and CIO to work closely to manage the State's cyber networks and infrastructure and to ensure that effective governance practices are in place. Although a central authority is essential, it does not obviate the importance of collaboration among local governments, nongovernmental organizations, and the private sector. Those relationships are essential to understanding the culture, operations, and business practices of various agencies and organizations with cyber assets within the State. In Michigan, for example, in addition to dedicated and full-time State employees in the Office of Cybersecurity, a risk management team leverages many resources around the State to gather information and resolve an incident efficiently and effectively. Minnesota is another example of a State that adopted a governance framework that stresses teamwork and communication between a centralized information technology organization and stakeholders. The State CIO works collaboratively with the Governor, the Technology Advisory Committee, and other agency leaders. Minnesota also has several governing bodies that have an agency CIO, providing a direct link to the State CIO and operational decisions made at the different agency team levels.\2\ --------------------------------------------------------------------------- \2\ ``State of Minnesota IT Governance Framework,'' http://mn.gov/ oet/images/StateofMinnesotaITGovernanceFramework.pdf (June 2012). --------------------------------------------------------------------------- Recognizing the need to foster collaboration at all levels of government and with the private sector, California recently created the California Cybersecurity Task Force. The task force focuses on sharing information to improve the security of Government and private-sector IT assets.\3\ --------------------------------------------------------------------------- \3\ ``California Launches Cybersecurity Task Force,'' http:// www.govtech.com/security/California-Launches-Cybersecurity-Task- Force.html (May 17, 2013). --------------------------------------------------------------------------- Conduct risk assessments and allocate resources accordingly.-- Governors and other key State actors need a comprehensive understanding of the risk and threat landscape to make accurate and timely decisions when allocating scarce resources. Without a comprehensive understanding of the risks, including the interdependencies among critical assets, States are vulnerable to interruptions in business operations as well as financial and data losses. To gain this awareness, States must develop security strategies and business practices by conducting risk assessments that identify information assets, model different threats to those assets, and allow for planning to protect against those threats.\4\ --------------------------------------------------------------------------- \4\ ``5 Steps to Cybersecurity Risk Assessment'' http:// www.govtech.com/security/5-Steps-to-Cyber-Security.html?page=1 (June 24, 2010). --------------------------------------------------------------------------- In addition to establishing sound business practices and using existing resources, States also must conduct hands-on activities and exercises as a part of their assessments. Those practices include regular penetration testing and vulnerability scanning and should be referenced in security policies. States can take advantage of resources from Federal and private entities to conduct those activities. Once an independent State-wide assessment has been conducted, Governors can make necessary decisions on where scarce resources should be allocated to prevent the loss of essential information and resources and to protect critical infrastructure and assets. The initial assessment also will help determine the frequency of such assessments in the future, based on the risk profile of agencies. As an example, agencies with sensitive citizen data might require annual assessments and quarterly follow-up in their corrective action plan. Additionally, Governors and their senior staff who have appropriate security clearances should receive regular classified cybersecurity threat briefings. The Department of Homeland Security (DHS) can assist States in planning these briefings. Implement continuous vulnerability assessments and threat mitigation practices.--Consistently monitoring threats and vulnerabilities will help Governors proactively defend cyber networks. Every day, States are exposed to phishing scams, malware, denial-of- service attacks, and other common tactics employed by cyber attackers. Governors must ensure that mission-critical systems are equipped with technologies and have implemented business practices that will identify potential threats, track all stages of cyber attacks in real time, and offer mitigation techniques and options for any resulting loss or damage. Maryland leverages the cybersecurity capabilities of the Maryland Air National Guard 175th Network Warfare Squadron to support its cybersecurity assessments. State agencies participate in collaborative web penetration training exercises with the Maryland Air Guard Squadron. The exercises that feature simulated attacks from malicious outsiders or insidious insiders are useful in evaluating the security of selected State websites and portals. Security issues uncovered through the penetration tests lead to technical and procedural countermeasures to reduce risks. The Guard also provides network vulnerability assessment services to various State agencies while, in return, it receives beneficial training for the squadron's members. A number of other States have similar practices in place. The Multi-State Information Sharing and Analysis Center (MS-ISAC) has been designated by DHS as a key resource for cyber threat prevention, protection, response, and recovery for the Nation's State, local, territorial, and Tribal governments. Through its state-of-the- art Security Operations Center, available 24 hours a day, 7 days a week, the MS-ISAC serves as a central resource for situational awareness and incident response. The MS-ISAC also provides State, local, Tribal, and territorial governments with managed security services, which are outsourced security operations that include on- going monitoring of networks and firewalls for intrusions. Another related resource available to State and local governments is DHS's newly-launched Continuous Diagnostics and Mitigation (CDM) program. The CDM program at the Federal level works by expanding deployment of automated network sensors that feed data about an agency's cybersecurity vulnerabilities into a continuously updated dashboard. To support States in improving their capabilities to prevent and detect intrusions, the CDM has a blanket purchasing agreement that reduces the cost to States of purchasing tools and services that enhance their cybersecurity. It is important to note that such purchases are most effective when coordinated with MS-ISAC's managed security services so as to maintain collective situational awareness across State and local governments. Ensure that your State complies with current security methodologies and business disciplines in cybersecurity.--States can turn to two industry standards for a baseline of effective cybersecurity practices. First, the Council on CyberSecurity's Critical Controls for Effective Cyber Defense is an industry standard that provides States with a security framework that can strengthen their cyber defenses and ultimately protect information, infrastructure, and critical assets. Compliance with that standard will provide a baseline of defense, deter a significant number of attacks, and help minimize compromises, recovery, and costs. The controls are based upon five guiding principles: Using evidence-based practices to build effective defenses, assigning priorities risk reduction and protection actions, establishing a common language that measures the effectiveness of security, continuous monitoring, and automating defenses.\5\ The controls also identify key network components and how to secure them. --------------------------------------------------------------------------- \5\ ``CSIS: 20 Critical Security Controls,'' http://www.sans.org/ critical-security-controls/guidelines.php. --------------------------------------------------------------------------- The second standard is the Information Technology Infrastructure Library (ITIL). An ITIL is a set of practices for information technology service management (ITSM) that are designed to align information technology (IT) with core business requirements. The latest editions of ITIL, which were published in July 2011, form the core guidance of best management practices and can greatly strengthen States' IT practices. The ITIL has been adopted by companies in many private-sector industries, including banking, retail services, technology, and entertainment. For States, an ITIL will help ensure that States' IT assets correlate with their critical assets.\6\ --------------------------------------------------------------------------- \6\ ``ITIL: The Basics,'' http://www.best-management-practice.com/ gempdf/ITIL_The_Ba- sics.pdf. --------------------------------------------------------------------------- Create a culture of risk awareness.--The best firewalls and most advanced antivirus software cannot deter a cyber attack if the individuals using a network are either careless or inattentive to basic security practices. The strongest door and most secure lock will not keep a burglar out if the door is left open or unlocked. Governors have the opportunity to promote a culture of cybersecurity awareness that will help to minimize the likelihood of a successful cyber attack. Building a strong cybersecurity culture means making individuals aware of the many risks and on-going threats facing their networks. Those individuals must understand the potential negative implications of their activities or inattentiveness. To develop a strong cybersecurity culture, focus should be put on increasing awareness, setting appropriate expectations, and influencing day-to-day security practices of end-users. Awareness can be created by including relevant training and content in the orientation process of new staff as well as annual review of current staff. Expectations about users' behaviors can also be set by adding cybersecurity components to job responsibilities. However, creating a culture of awareness will be an on-going process that will require constant attention and on-going training. Governors have the opportunity to use the bully pulpit to make cybersecurity the responsibility of all, including ordinary citizens. In Delaware, State employees conduct cybersecurity presentations for elementary school students to reinforce the importance of internet safety practices. The State also hosts video and poster contests that encourage the public to create materials that promote cybersecurity awareness.\7\ --------------------------------------------------------------------------- \7\ See http://www.dti.delaware.gov/information/ cybersecurity.shtml. --------------------------------------------------------------------------- Effective awareness training and education for end-users is recognized as the single most effective factor in preventing security breaches and data losses. States such as Michigan have launched security awareness training for all State employees and have posted on- line guides that are available to the public with the goal of reducing risk.\8\ More than 50,000 users and partners are currently enrolled in Michigan's training program, an on-line interactive program consisting of a dozen 10-minute lessons. Other organizations, such as the MS-ISAC, also offer training resources that are readily available on-line. --------------------------------------------------------------------------- \8\ See State of Michigan Security Office website. --------------------------------------------------------------------------- Michigan also has recently launched a research, test, training, and evaluation facility for cybersecurity and cyberdefense. In partnership with State universities, the private sector, and State and local governments, Merit Network Inc., a 501(c)(3) nonprofit organization, built and developed the state-of-the-art center to further advance cybersecurity training in Michigan. A wide variety of course offerings includes certifications in incident handling, disaster recovery, forensics, and wireless security. Dozens of technical staff have already completed training and received certifications. In addition to offering training, States like Maryland conduct table-top exercises to raise the awareness and response capabilities of key State actors. Maryland, through the State's Emergency Management Administration (MEMA), facilitated an initial cabinet-level table-top exercise in which cybersecurity and continuity of operations awareness and readiness were assessed. In addition to MEMA, DHS and the National Security Agency Cyber Command assisted in hosting this exercise. The Path Forward The actions described above are a first step for Governors to improve cybersecurity for State-owned and -operated systems. However, a secure cybersecurity fabric will require an enterprise-wide approach that includes coordination and partnerships with critical infrastructure owners and operators, private industry, and the public. Over the course of the next year, the NGA Resource Center for State Cybersecurity will issue a series of reports focusing on critical areas for mid- to long-term actions Governors can take to strengthen their States' cyber posture. Those areas include improving coordination between State and Federal governments, leveraging State fusion centers to respond to cyber threats, enhancing the cybersecurity of critical energy systems and infrastructure, and developing a skilled cybersecurity workforce. In addition to the work of the Resource Center, NGA also is leading efforts through the Council of Governors to collaborate with the Departments of Defense and Homeland Security on how the National Guard could be used to better protect both State and Federal networks. The National Guard's unique role serving Governors and the President, combined with its ability to attract and retain individuals who have full-time employment in IT and related fields, make it an ideal solution to help address the shortage of highly-skilled personnel necessary to protect critical networks and systems. Across the country, several States have established National Guard cyber capabilities that are closely aligned with civilian agencies and coordinate regularly with public utility commissions, owners and operators of critical infrastructure, and other public and private- sector partners. The NGA Resource Center for State Cybersecurity is made possible through the generous support from our grant makers, including the American Gas Association, Citi, Deloitte, Edison Electric Institute, Good Technology, Hewlett-Packard, IBM, Northrop Grumman, Nuclear Energy Institute, Symantec, and VMware. Mrs. Brooks. With that, I look forward to hearing from our distinguished panel of witnesses. The Chairwoman now will recognize the gentlelady from New York, Ms. Clarke, for any opening statement she may have. Ms. Clarke. I thank Chairwoman Brooks and Ranking Member Payne as well as Chairman Meehan for holding today's joint subcommittee hearing. We all know that cybersecurity is a matter of National, economic, and societal importance. Present-day attacks on the Nation's computer systems do not simply damage an isolated machine or disrupt a single enterprise system, but current attacks target infrastructure that is integral to the economy, National defense, and daily life. Computer networks have joined food, water, transportation, and energy as critical resources for the functioning of the National economy. When one of these key cyber infrastructure systems is attacked, the same consequences exist for a natural disaster or terrorist attack. National or local resources must be deployed. Decisions are made to determine where to deploy resources. The question is: Who makes these decisions? The data required to make and monitor the decisions and the location of available knowledge to drive them may sometimes be unknown, unavailable, or both. Indeed, computer networks are the central nervous system of our National infrastructure and the backbone of emergency management is a robust cyber infrastructure. These systems enable emergency management agencies to implement comprehensive approaches to natural disasters, terrorist attacks, and law enforcement issues. Mr. Payne has introduced a bill, the SMART Grid Study Act, that will give a fuller picture of the smart grid's role and our reliance on it, especially during an event where emergency management response is key to our resilience. I am glad to see the strong support that the National Electrical Manufacturers have given this bill and I especially look forward to their testimony today. There is a general lack of understanding about how to describe and assess the complex and dynamic nature of emergency management tasks in relation to cybersecurity concerns. There are many issues involving knowledge integration and how to help managers improve emergency management task performance. Ever since the first computer virus hit the internet it has been apparent that attacks can spread rapidly. Just as society has benefited from the nearly infinite connections of devices and people through the U.S. cyber infrastructure, so has malicious parties with the intent of taking advantage of this connectivity to launch destructive attacks. We must find a way to develop tools that we can use to improve emergency management successes through effective handling, cyber complexity, cyber knowledge, and cyber integration at the ground level of our first responders. Madam Chairwoman, I look forward to today's testimony and I yield back. [The statement of Ranking Member Clarke follows:] Statement of Ranking Member Yvette D. Clarke We all know that cybersecurity is a matter of National, economic, and societal importance. Present-day attacks on the Nation's computer systems do not simply damage an isolated machine or disrupt a single enterprise system, but current attacks target infrastructure that is integral to the economy, National defense, and daily life. Computer networks have joined food, water, transportation, and energy as critical resources for the functioning of the National economy. When one of these key cyber infrastructure systems is attacked, the same consequences exist for a natural disaster or terrorist attack. National or local resources must be deployed. Decisions are made to determine where to deploy resources. The question is: Who makes these decisions? The data required to make and monitor the decisions, and the location of available knowledge to drive them may sometimes be unknown, unavailable, or both. Indeed, computer networks are the ``central nervous system'' of our National infrastructure, and the backbone of emergency management is a robust cyber infrastructure. These systems enable emergency management agencies to implement comprehensive approaches to natural disasters, terrorist attacks, and law enforcement issues. Mr. Payne has introduced a bill, the Smart Grid Study Act, that will give a fuller picture of the smart grid's role and our reliance on it, especially during an event where emergency management response is the key to our resilience. I'm glad to see the strong support that the National Electrical Manufacturers have given this bill, and I especially look forward to their testimony today. There is a general lack of understanding about how to describe and assess the complex and dynamic nature of emergency management tasks in relation to cybersecurity concerns. And there are many issues involving knowledge integration and how it helps managers improve emergency management task performance. Ever since the first computer virus hit the internet, it has been apparent that attacks can spread rapidly. Just as society has benefited from the nearly infinite connections of devices and people through the U.S. cyber infrastructure, so have malicious parties with the intent of taking advantage of this connectivity to launch destructive attacks. We must find a way to develop tools that we can use to improve Emergency Management successes through effectively handling cyber complexity, cyber knowledge, and cyber integration at the ground level for our first responders. Mrs. Brooks. Thank you. I thank the Ranking Member of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies and I now turn to the Ranking Member for the Emergency Preparedness, Response, and Communications, the gentleman from New Jersey, Mr. Payne, for any opening statements. Mr. Payne. Thank you, Madam Chairwoman. Let me apologize for my tardiness, but Amtrak didn't cooperate this morning, so I apologize for that. I would like to thank Chairwoman Brooks and Chairman Meehan for calling this hearing today. Yesterday marked the 1-year anniversary of Super Storm Sandy, which devastated communities all along the Eastern Coast, especially in my home State of New Jersey. Although the people of New Jersey, with a lot of help from the Federal Government, have begun the long effort to rebuild what was lost, much work remains. I know that I am not alone when I say that the people affected by Hurricane Sandy can be sure that members of this panel will continue to work to make sure that the communities are rebuilt and the lessons learned are incorporated into future disaster plans. With that, I will turn to the topic of today's hearing, responding to cyber attack. Last month the Subcommittee on Emergency Preparedness, Response, and Communications held a hearing reviewing the findings of the Federal Emergency Management Agency's 2013 National Preparedness Report. For the second year in a row, States indicated that of the 31 core capabilities, cybersecurity is one of the capabilities about which they are least confident. The threats posed by a cyber attack are not new, but the impact of a cyber attack becomes more grave as every aspect of Government and the private sector become more reliant on cyber technologies. For example, communications essential to an effective emergency response, from the emergency alert system to E-911 and eventually FirstNet, all are vulnerable to cyber attack. The data networks and computer systems used to coordinate an efficient response to ensure that adequate resources are deployed to the appropriate locations are similarly vulnerable to a cyber breach. A cyber attack on any of these systems could severely undercut Federal, State, and local abilities to respond to disasters effectively. Moreover, we have seen a significant increase in cyber threats to our critical infrastructure. We know that disasters like Super Storm Sandy can wreak havoc on our power systems but rarely consider the harm that a malicious cyber attack could do to our electrical grid. Accordingly, I have introduced the SMART Grid Study Act, which will provide a comprehensive assessment of actions necessary to expand and strengthen the capabilities of our electrical power systems to prepare for and respond to, mitigate, and recover from a natural disaster or cyber attack to the electric grid. My legislation will go a long way to provide sector-specific awareness of cyber vulnerabilities and how to address them. We must help State governments undertake similar efforts to understand the cyber threats posed to their networks and how to address them. It is no secret that a lack of funding has contributed to the lack of confidence States have in their cybersecurity capabilities. I would be interested in learning how cuts to homeland security grant funding since 2011 has affected States' cybersecurity efforts. I have also heard that States have struggled to implement governing structure for cybersecurity and that finding a workforce with the appropriate training has proven difficult. So I would be interested to learn how the Department of Homeland Security is helping States identify best practices for an effective cybersecurity governance structure and improve training for State cybersecurity workforces. I look forward to learning more about how State emergency managers are working with State chief information officers to understand the role each play in responding to a cyber incident. I want to thank the witnesses for being here today and I look forward to their testimony. Madam Chairwoman, I yield back the balance of my time. [The statement of Ranking Member Payne follows:] Statement of Ranking Member Donald M. Payne, Jr. October 30, 2013 Yesterday marked the 1-year anniversary of Super Storm Sandy, which devastated communities all along the East Coast, and especially in my home State of New Jersey. Although the people of New Jersey--with a lot of help from the Federal Government--have begun the long effort to rebuild what was lost, much work remains. I know I am not alone when I say that the people affected by Hurricane Sandy can be sure that members of this panel will continue to work to make sure that the communities are rebuilt and the lessons learned are incorporated into future disaster plans. With that, I will turn to the topic of today's hearing: Responding to a cyber attack. Last month, the Subcommittee on Emergency Preparedness, Response, and Communications held a hearing reviewing the findings of the Federal Emergency Management Agency's 2013 National Preparedness Report. For the second year in a row, States indicated that--of the 31 core capabilities--cybersecurity is one of the capabilities about which they are least confident. The threats posed by a cyber attack are not new. But the impact of a cyber attack becomes more grave as every aspect of Government and the private sector become more reliant on cyber technologies. For example, communications essential to an effective emergency response, from the Emergency Alert System, to E9-1-1, and eventually FirstNet, are all vulnerable to a cyber attack. The data networks and computer systems used to coordinate an efficient response and ensure that adequate resources are deployed to the appropriate location are similarly vulnerable to a cyber breach. A cyber attack on any of these systems could severely undercut Federal, State, and local abilities to respond to disasters effectively. Moreover, we have seen a significant increase in cyber threats to our critical infrastructure. We know that disasters like Super Storm Sandy can wreak havoc on our power systems but we rarely consider the harm that a malicious cyber attack could do to our electric grid. Accordingly, I have introduced the SMART Grid Act, which would provide for a comprehensive assessment of actions necessary to expand and strengthen the capabilities of the electrical power system to prepare for, respond to, mitigate, and recover from a natural disaster or cyber attack to the electric grid. My legislation will go a long way to provide sector-specific awareness of cyber vulnerabilities and how to address them. We must help State governments undertake similar efforts to understand the cyber threats posed to their networks and how to address them. It is no secret that a lack of funding has contributed to the lack of confidence States have in their cybersecurity capabilities. I will be interested in learning how cuts to Homeland Security Grant funding since 2011 have affected State cybersecurity efforts. I have also heard that States have struggled to implement a governance structure for cybersecurity and that finding a workforce with the appropriate training has proven difficult. So I will be interested to learn how the Department of Homeland Security is helping States identify best practices for an effective cybersecurity governance structure and improve training for State cybersecurity workforces. I look forward to learning more about how State Emergency Managers are working with State Chief Information Officers to understand the role each play in responding to a cyber incident. Mrs. Brooks. Thank you. Other Members of the subcommittee are reminded that opening statements may be submitted for the record. [The statement of Ranking Member Thompson follows:] Statement of Ranking Member Bennie G. Thompson October 30, 2013 In 2010, former White House Counterterrorism Advisor Richard Clarke stated that this country's lack of preparation for a cyber attack could lead to a breakdown in our critical infrastructure system that would be like an ``electronic Pearl Harbor.'' While some may consider his assessment a bit exaggerated, I think we would do well to remember it as we begin today's hearing. We should also recall that in the 112th Congress, this committee marked up cybersecurity legislation. Unfortunately, the Republican leadership of the House did not allow that legislation to come to the floor of the House. In January, the President issued an Executive Order requiring certain basic steps that will improve this Nation's ability to protect and defend against cyber attacks. While I applaud the President's efforts, I must point out that an Executive Order cannot expand existing legal authorities. In May of this year, the Department of Homeland Security testified before this committee that the ``United States confronts a dangerous combination of known and unknown vulnerabilities in cyberspace.'' DHS also told us the Department processed approximately 190,000 cyber incidents involving Federal agencies, critical infrastructure, and the Department's industry partners--a 68 percent increase from 2011. Mr. Chairman, I think that we should all have concern about cyber attacks on critical infrastructure--especially attacks that could disable the electric grid. For most of us, spending a day or two without electricity is an inconvenience. For others, it can be a matter of life or death. That is why I am pleased that Rep. Payne, Jr. introduced H.R. 2962, the SMART Grid Study Act. If enacted, the bill will require a comprehensive study to examine the construction, job creation, energy savings, and environmental protections associated with fully upgrading to a SMART Grid System. The information gathered in the study may help us reduce the frequency and severity of outages during disaster events. I urge my colleagues to support this bill. Still, there is more to be done. We cannot begin to address the current threats or anticipate future vulnerabilities if we have not invested in the kind of education and training necessary to develop the next generation of cyber professionals. Federal, State, and local governments and the private sector are each vulnerable to cyber attacks. While the threats from and sophistication of hackers continues to grow, initiatives to address this mutual vulnerability must be comprehensive and coordinated. This country's history has repeatedly shown that a shared commitment to a common goal is necessary to achieve progress--from bringing electricity to the Nation to walking on the moon. Today, the same kind of commitment and collaboration is necessary to address the cyber threat. Like every previous movement that resulted in progress, this first step must be education. That is why I am pleased that yesterday, this committee marked up Rep. Clarke's bill, H.R. 3107, the Homeland Security Cybersecurity Boots-on-the-Ground Act. This bill will help foster the development of a National security workforce capable of meeting current and future cybersecurity challenges, and it will outline how DHS can improve its recruitment and retention of cybersecurity professionals. Mr. Chairman, I urge this committee to continue to put forward the kind of legislation that will help this Nation resolve our known vulnerabilities. More than any other committee, we must be on the forefront of proposing innovations and pushing forward common-sense solutions. Mrs. Brooks. We are pleased to have a very distinguished panel before us today on this important topic. So with that, I will begin the introductions of our panelists. Ms. Bobbie Stempfley is the acting assistant secretary of the Office of Cybersecurity and Communications, where she plays a leading role in developing the strategic direction for CS&C and its five divisions. Ms. Stempfley previously served as the deputy assistant secretary for CS&C and as director of the National Cybersecurity Division, a legacy CS&C division. Prior to her work at CS&S, Ms. Stempfley served as the chief information officer for the Defense Information Systems Agency. Next on our panel is Mr. Charley English, who was appointed director of the Georgia Emergency Management Agency/Homeland Security in February of 2006. He has served in the agency since 1996. He began his career in public service as a local police officer in 1980. Other current responsibilities include serving as the president of the national Emergency Management Association, chair of the Governor's Commission on 9-1-1 Modernization, and State point of contact for the Nation-wide Public Safety Broadband Network. He earned a master's degree in homeland defense and security from the Naval Postgraduate School in 2004. I now will yield to the gentleman from Mississippi, Ranking Member of our subcommittee, or I am sorry, vice chair of our subcommittee, Mr. Palazzo, to introduce our next witness. Mr. Palazzo. Thank you, Madam Chairwoman. It is my pleasure to introduce Dr. Craig Orgeron. Dr. Orgeron is the chief information officer and executive director of the State of Mississippi's Department of Information Technology Services. He also has the honor of serving as the president of the National Association of State Chief Information Officers. Dr. Orgeron has over 24 years of information technology experience in both the private sector and the Federal and State level of the public sector. He began his career as a communications computer systems officer in the United States Air Force, serving from 1988 to 1992. Dr. Orgeron holds a bachelor's degree in management information systems, a master's degree and a doctorate in public policy and administration from Mississippi State University. Dr. Orgeron is a certified public manager and a graduate of the John C. Stennis State Executive Development Institute as well as the Institute of International Digital Government Research and the Harvard University John F. Kennedy School of Government executive education series ``Leadership for a Networked World.'' Thank you, Dr. Orgeron, for being here today, and I look forward to hearing your testimony. I yield back. Mrs. Brooks. Thank you. Next up is Mr. Mike Sena, who is the director of the Northern California Regional Intelligence Center and serves as president of the National Fusion Center Association. He has served in law enforcement for nearly 20 years, including the California Bureau of Investigation Intelligence, the California Bureau of Narcotics Enforcement, and the California Department of Alcoholic Beverage Control. Mr. Sena received his bachelor of arts degree in criminal justice from California State University, San Bernardino. I now recognize the gentleman from New Jersey, Ranking Member Payne, to introduce our next witness. Mr. Payne. Thank you, Madam Chairwoman. Paul Molitor serves as the assistant vice president of smart grid and special projects for the National Electrical Manufacturers Association. For 450 member companies of NEMA, he is responsible for monitoring the National smart grid effort and interfacing with electrical utilities, manufacturers, Federal agencies, and the U.S. Congress. Paul was the first plenary secretary of the NIST Smart Grid Interoperability Panel, is active in the SGIP cybersecurity and internet protocol working groups and the International Electronical Commission Strategy Group 3 on the smart grid. Welcome, sir. Say that fast three times. Mrs. Brooks. The witnesses' full written statements--I want to thank you all for your written statements--they will appear in the record. Just as a reminder with the lighting system, you each will have 5 minutes and when you get to 1 minute you will see the yellow light and then the red light when your time is up. So I will now recognize Ms. Stempfley for her 5 minutes. STATEMENT OF ROBERTA STEMPFLEY, ACTING ASSISTANT SECRETARY, OFFICE OF CYBERSECURITY AND COMMUNICATIONS, NATIONAL PROTECTION AND PROGRAMS DIRECTORATE, U.S. DEPARTMENT OF HOMELAND SECURITY Ms. Stempfley. Thank you very much, Chairwoman Brooks, Chairman Meehan, Ranking Members Payne and Clarke, and distinguished Members of the committee. It certainly is a privilege to appear before you today to discuss the Department of Homeland Security's coordination with State, local, Tribal, and territorial emergency managers on cybersecurity issues. As the Chairwoman pointed out, it is National Cybersecurity Awareness Month. In fact, it is the 10th anniversary of the beginning of National Cybersecurity Awareness Month. This week is an important week for us because we also transition in November to National Critical Infrastructure Security and Resilience Month, further demonstrating the alliance--the integration and necessary responsibility for looking at cyber and physical issues in a cohesive and coherent manner. This month of October is the month where we get to further engage in public and private-sector stakeholder conversations about how to create safe, secure, and resilient cyber environment. Everyone has a role to play in cybersecurity and I am pleased to discuss the Department's efforts to engage State and local emergency managers as they build cybersecurity resilience into the networks and systems which they depend on in a daily basis. America's cybersecurity is inextricably linked to our National economic viability. IT systems are interdependent, interconnected, and critical to our daily lives, from communications, travel, powering our homes, running our economy, and obtaining Government services. DHS serves as the lead civilian Department responsible for coordinating National protection, prevention, mitigation, and recovery from cyber incidents, and we work regularly with business owners and operators to take steps to strengthen facilities and communities including the Nation's physical and cyber infrastructure. We are also committed to ensuring cyber space is supported by a secure and resilient infrastructure, enabling open communications, innovation, and prosperity while protecting privacy, confidentiality, and civil rights and civil liberties by design. Protecting this infrastructure against growing and evolving cyber threats requires a layered approach. The Government's role in this effort is to share information and encourage enhanced security and resilience while identifying and addressing gaps not filled by the marketplace. Providing effective cybersecurity services requires fostering relationships with those who own and operate communications infrastructure, members in the emergency responder community, and Federal, State, local, Tribal, and territorial partners. Indeed, as many of the communication technologies currently used by public safety and emergency services organizations are moving to internet-based--protocol- based environments there is an increasing awareness of the cyber limitations and vulnerabilities that our emergency service providers will face in conduct of their mission. It is important, therefore, for the Department to engage not just with chief information officers or chief information security officers at the State and local level, but also the emergency management and other officials for whom a cyber environment is equally important to accomplishing their mission. The Department has initiated several activities focusing on ensuring State, local, Tribal, and territorial emergency managers are able to build cybersecurity resilience into those information and technology networks and systems upon which they depend. Several of these efforts include production and delivery of a cyber infrastructure risk assessment for both the Nation-wide Public Safety Broadband Network and the emergency services sector; local pilot projects with emergency managers and critical infrastructure partners to better understand interconnections between those cyber and physical infrastructures and potential risks presented to the Nation; updating the National Emergency Communications Plan in coordination with the public safety community, which will discuss how cybersecurity has become a key consideration for public safety officials in these new IP-enabled technologies as that is more readily integrated into their operations; and the deployment of regionally-based advisors to promote cybersecurity awareness, program and policy coordination, information sharing, and risk analysis to their partners. These cybersecurity advisors directly engage with State and local emergency centers; and partnerships with non-Federal public-sector stakeholders to protect critical network--for example, the Multi-State Information-Sharing and Analysis Center, which opened its Cybersecurity Operations Center in November 2010 and has enhanced the Department's situational awareness at the State and local level and allows the Department to provide cyber risk, vulnerability, and mitigation data quickly to State and local governments. Specifically, since 2009 the National Cybersecurity and Communications Integration Center has responded to nearly half a million incident reports and has released more than 26,000 actionable cybersecurity alerts to public and private-sector partners. Of that, 7,270 were released in fiscal year 2013 alone. That is more than 20 a day. DHS's servicing capabilities are designed to support emergency managers at all levels of engagement across education, planning, cyber incident response, and recovery activities. They are integral parts of reducing risk and building capabilities of our partners. As necessary, these relationships have to be leveraged in operational response efforts in order to meet those immediate and critical needs. I thank you for the opportunity to testify with you today and I look forward to answering your questions. [The prepared statement of Ms. Stempfley follows:] Prepared Statement of Roberta Stempfley October 30, 2013 Chairwoman Brooks and Chairman Meehan, Ranking Members Payne and Clarke, and distinguished Members of the committee, it is a pleasure to appear before you today to discuss the Department of Homeland Security's (DHS) coordination with State, local, Tribal, and territorial (SLTT) emergency managers on cybersecurity issues. This October marks the 10th anniversary of National Cyber Security Awareness Month, which is an opportunity to further engage public and private- sector stakeholders to create a safe, secure, and resilient cyber environment. Everyone has a role to play in cybersecurity and I am pleased to discuss the Department's efforts to engage SLTT emergency managers as they build cybersecurity resilience into those networks and systems upon which they depend on a daily basis. America's cybersecurity is inextricably linked to our Nation's economic vitality--IT systems are interdependent, interconnected, and critical to our daily lives--from communication, travel, and powering our homes, to running our economy, and obtaining Government services. DHS is the lead Federal civilian department responsible for coordinating the National protection, prevention, mitigation, and recovery from cyber incidents and works regularly with business owners and operators to take steps to strengthen their facilities and communities, which include the Nation's physical and cyber infrastructure. We are also committed to ensuring cyberspace is supported by a secure and resilient infrastructure that enables open communication, innovation, and prosperity while protecting privacy, confidentiality, and civil rights and civil liberties by design. cybersecurity support to sltt emergency managers Protecting this infrastructure against growing and evolving cyber threats requires a layered approach. The Government's role in this effort is to share information and encourage enhanced security and resilience, while identifying and addressing gaps not filled by the marketplace. Providing effective cybersecurity services requires fostering relationships with those who own and operate the communications infrastructure, members of the emergency responder community, and Federal, State, local, Tribal, and territorial partners. Indeed, as many of the communications technologies currently used by public safety and emergency services organizations move to an Internet Protocol (IP)-based environment, there is an increase in the cyber vulnerabilities of our emergency services providers in the conduct of their mission. It is important, therefore, for the Department to engage not just Chief Information Officers (CIO) or Chief Information Security Officers (CISO) at the SLTT level, but also the emergency managers and other officials for whom a secure cyber environment is equally as important to accomplishing their mission. The Department has initiated several activities focused on ensuring SLTT emergency managers are able to build cybersecurity resilience into those information and technology networks and systems upon which they depend. Cyber dependencies and interdependencies require interactions between several different DHS organizations and SLTT partners in order to address this complex need. DHS has been forward-thinking as the reliance upon cyber systems has grown and our engagements have been on- going. previous efforts Regionally-Based Cybersecurity Advisors.--The Cybersecurity Advisors (CSA) program was created and implemented by CS&C in 2010. The regionally-deployed personnel promote cybersecurity awareness, program and policy coordination, information sharing, and risk analysis to their partners, including emergency managers. Over the last year, CSAs have had direct engagement with 13 State or local emergency centers. In addition, the Department has conducted Cyber Resilience Reviews and assessments and provided support to numerous National Security Special Events, including planning for events such as the Super Bowl, and the G8 with the City of Chicago's Office of Emergency Management & Communications. Emergency Services Sector Cyber Risk Assessment.-- Encompassing a wide range of emergency response functions carried out by five disciplines,\1\ in 2012 the Emergency Services Sector completed a Cyber Risk Assessment, which provides a risk profile to enhance the security and resilience of the Emergency Services Sector disciplines. It is an effort to establish a baseline of cyber risks across the sector, to ensure Federal resources are applied where they offer the most benefit for mitigating risk, and to encourage a similar risk- based allocation of resources within State and local entities and the private sector. Emergency managers from local, State, and Federal government actively participated in the development process to ensure the assessment provided practical guidance for the public safety community. The Department continues to meet with officials from stakeholder associations such as the National Emergency Management Association to discuss next steps, including developing a workforce training program for emergency managers in order to increase cybersecurity capabilities within the emergency management community. --------------------------------------------------------------------------- \1\ Law Enforcement; Fire and Emergency Services; Emergency Management; Emergency Medical Services; and Public Works. --------------------------------------------------------------------------- Local Pilot Projects with Emergency Managers and Critical Infrastructure Partners.--DHS is conducting three pilots to better understand the interconnections between cyber and physical infrastructure and the potential risks to the Nation. The first pilot, initiated in 2012, worked closely with Charlotte, NC emergency planners and neighboring communities to examine how a potential cyber attack could disrupt communications or other infrastructure operations. The work provided additional ways for planners to mitigate potential cyber impacts and, as a result of the pilot, commercial facilities adopted additional security practices to shore up potential weaknesses. The second pilot is underway with the State of New Jersey examining the interrelationship between IT, communications, and physical security. The pilot involves five water and wastewater facilities and has received praise from the State Office of Homeland Security and our water sector partners. As a result of initial findings, water facilities have taken immediate action to mitigate previously unknown vulnerabilities. The third pilot is a joint cyber-physical assessment of a Federal facility in Washington, DC to develop a common approach for identifying cybersecurity vulnerabilities affecting security systems of Federally-protected facilities, including electrical, HVAC, water, telecommunications, and security control systems. The lessons from these pilots have been incorporated into our integrated physical and cyber Regional Resiliency Assessment Program (RRAP). This is helping strengthen the partnership we already have; build new relationships between SLTT CIOs, first responders, and critical infrastructure owners and operators; and lay the foundation increased collaboration to increase cybersecurity resilience. Nation-wide Public Safety Broadband Network (NPSBN) Cyber Infrastructure Risk Assessment.--The development and deployment of an IP-based network for public safety will represent a leap forward in communications capabilities for first responders, law enforcement, and other users of the NPSBN. However, the move to such a network presents a challenge for the emergency management community to identify threats to and vulnerabilities of cyber infrastructure in the NPSBN that could affect the network's reliability and security. DHS is working with the First Responder Network Authority (FirstNet) and the public safety community to identify cyber risks and develop potential responses to those risks. In 2013, OEC developed the NPSBN Cyber Infrastructure Risk Assessment to provide FirstNet with a how-to guide to address the top cyber risks that the network may face, and is now working with FirstNet to ensure a more resilient network design that will integrate security and resilience into the overall physical and cyber aspects of the NPSBN. Cyber Threat Information Sharing.--In June 2013, DHS established ``sharelines'' in compliance with Executive Order (EO) 13636 and Presidential Policy Directive (PPD)-21 to help increase the volume, timeliness, and quality of cyber threat information shared with U.S. private-sector entities, to include SLTT owners and operators, so that these entities may better protect and defend themselves against cyber threats. Sharelines ``facilitate the creation and dissemination of unclassified cyber threat reports to targeted private-sector entities owned or operating within the United States, as well as Federal, State, local, Tribal, and territorial partners'' in a timely manner. on-going efforts DHS continues to build upon the relationships we have established throughout the Emergency Services Sector through strategic and operational efforts to provide solutions to our SLTT partners. On-going efforts within DHS consist of: Update to the National Emergency Communications Plan.--DHS is updating the National Emergency Communications Plan (NECP) in coordination with the public safety community to enhance planning, preparation, and security of broadband technologies used during response operations. The Plan will discuss how cybersecurity has become a key consideration for public safety officials as new IP-enabled technology is increasingly integrated into operations. The NECP will endorse a multi- faceted approach to ensure the confidentiality, integrity, and availability of sensitive data. For example, comprehensive cyber training and education on the proper use and security of devices and applications, phishing, malware, other potential threats, and how to stay on guard against attacks will be recommended. 9-1-1 Centers: Next Generation 9-1-1 and Telephonic Denial of Service.--Updated 9-1-1 infrastructure utilizes public voice, data, and video capabilities, which introduce new vulnerabilities into 9-1-1 systems. Separately, 9-1-1 centers have been targeted by telephonic denial of service (TDOS) attacks that overwhelm Public Safety Answering Points' administrative lines. These attacks inundate a 9-1-1 call center with a high volume of calls, overwhelming the system's ability to process calls and tying up the system from receiving legitimate calls. DHS, through the NCCIC, has worked on the development and dissemination of techniques for mitigating and managing these TDOS attacks in order to allow emergency management agencies to continue to provide these critical services to the public. Protective Security Advisors (PSAs).--Within the Office of Infrastructure Protection, PSAs serve as the nexus of our infrastructure security and coordination efforts at the Federal, State, local, Tribal, and territorial levels and serve as DHS's on-site critical infrastructure and vulnerability assessment specialists. PSAs have also been working with CS&C to better coordinate assessments and as a result approximately half of cybersecurity site assessments administered by CS&C were conducted in tandem with PSAs--an example of how we are working to better and more effectively integrate our physical and cybersecurity efforts across NPPD and the Department. Multi-State Information Sharing and Analysis Center (MS- ISAC).--DHS builds partnerships with non-Federal public-sector stakeholders to protect critical network systems. For example, the Multi-State Information Sharing and Analysis Center (MS- ISAC) opened its Cyber Security Operations Center in November 2010, which has enhanced the National Cybersecurity & Communications Integration Center (NCCIC) situational awareness at the State and local government level and allows the Federal Government to quickly and efficiently provide critical cyber risk, vulnerability, and mitigation data to State and local governments. Since 2009, the NCCIC has responded to nearly a half a million incident reports and released more than 26,000 actionable cybersecurity alerts to our public and private- sector partners. Membership in the MS-ISAC consists of State and local CISOs and other leadership from all 50 State governments, the District of Columbia, 373 local governments, three territories, five Tribes, and 24 educational institutions. It provides valuable information and lessons learned on cyber threats, exploitations, vulnerabilities, consequences, incidents, and direct assistance with responding to and recovering from cyber attacks and compromises. The MS-ISAC runs a 24-hour watch and warning security operations center that provides real-time network monitoring, dissemination of early cyber threat warnings, vulnerability identification and mitigation, along with education and outreach aimed to reduce risk to the Nation's SLTT government cyber domain. This year the MS-ISAC developed a plan to increase engagement with emergency managers and fusion centers. operational efforts Assuring the security and reliability of critical information networks is vital across all critical infrastructure sectors, including the Emergency Services Sector, which is charged with saving lives, protecting property and the environment, assisting communities impacted by disasters, and aiding recovery from emergencies. DHS is uniquely positioned to improve the cybersecurity posture of our stakeholders. national protection and programs directorate The Offices of the National Protection Programs Directorate interact daily with State and local officials and emergency managers on communications and cybersecurity issues to strengthen infrastructure, educate citizens, and respond to and recover from on-line threats and attacks. Cybersecurity and Communications.--CS&C maintains an overall focus on reducing risk to the communications and information technology infrastructures and the sectors that depend upon them, as well as providing threat and vulnerability information and enabling timely response and recovery of these infrastructures under all circumstances. We execute our mission by supporting 247 information sharing, analysis, and incident response through the National Cybersecurity Communications Integration Center (NCCIC); facilitating interoperable emergency communications through our Office of Emergency Communications (OEC); advancing technology solutions for private and public-sector partners; providing tools and capabilities to ensure the security of Federal civilian Executive branch networks; and engaging in strategic level coordination for the Department with stakeholders on cybersecurity and communications issues. Additionally OEC has strong ties to emergency managers through its outreach to State-Wide Interoperability Coordinators (SWIC) who State officials who are the primary points of contact for communications interoperability issues. These produce State- Wide Interoperability Plans which establish governance, processes, and procedures to support first-responder communication. These strong relationships also help SLTT leverage other resources such as fusion centers. Office of Infrastructure Protection.--The Office of Infrastructure Protection within NPPD leads and coordinates National programs and policies on critical infrastructure, including through implementation of the National Infrastructure Protection Plan (NIPP). The NIPP establishes the framework for integrating the Nation's various critical infrastructure protection and resilience initiatives into a coordinated effort, and provides the structure through which DHS, in partnership with Government and industry, implements programs and activities to protect critical infrastructure, promote National preparedness, and enhance incident response. As the NIPP is updated based on the requirements of Presidential Policy Directive 21, Critical Infrastructure Security and Resilience, NPPD will work with critical infrastructure stakeholders to focus the revision on enhanced integration of cyber and physical risk management, requirements for increased resilience, and recognition for the need for enhanced information-sharing and situational awareness. As we work to update the NIPP we will support the Emergency Services Sector to ensure that we inform first responders in their preparation for cyber incidents. coordinated cyber/physical response While the National Cybersecurity Communications Integration Center (NCCIC) processes incident reports, issues actionable cybersecurity alerts, and deploys on-site incident response fly-away teams to critical infrastructure organizations to assist with analysis and recovery efforts of a cyber incident, the National Infrastructure Coordinating Center (NICC) provides situational awareness of threats to physical critical infrastructure, incident response support, and business reconstitution assistance. In addition to this coordination, as incidents or threats occur, PSAs living in communities across the country provide the Department with a 24/7 capability to assist in developing a common operational picture for critical infrastructure. NPPD efforts to integrate physical and cybersecurity have provided benefits during incidents including: Hurricane Sandy.--NPPD operational efforts were able to facilitate much-needed fuel deliveries to critical telecommunication sites in lower Manhattan in order to fuel generators and keep the facilities operational in recent events like Hurricane Sandy. After PSAs were notified of the fuel supply shortage, NPPD provided analysis on the wide-spread impact if the telecommunications facility lost power, while the NCCIC worked with its public and private-sector partners to identify a fuel supply and coordinate its delivery to the critical site. Boston Marathon Bombing.--OEC worked closely with public safety agencies in the Metro Boston Homeland Security Region and with the Commonwealth of Massachusetts on several key emergency communications initiatives prior to the 2013 marathon including observing public safety communications during previous marathons and events and offering suggestions to help strengthen the region's capabilities and improve coordination. Three years later, DHS saw many of the recommendations from this assessment in action in response to the bombings, including the region's use of a detailed communications plan (ICS Form 205) for the event that assigned radio channels to various agencies and functions. conclusion DHS provides a variety of services and capabilities designed to support emergency managers at all levels of engagement, across education, planning, cyber-incident response, and recovery activities. The services and capabilities are all integral parts of reducing risk and building capacity of our SLTT partners. As necessary, those relationships are leveraged in operational response efforts in order to meet immediate, critical needs. As technologies continue to advance and the dependencies and interdependencies between the sectors and systems continue to advance along with them, DHS will continue to work with emergency managers in a holistic fashion to plan, prepare, mitigate, and build resilience into those information and technology networks and systems upon which they depend on a daily basis. Thank you for this opportunity to testify, and I look forward to answering any questions you may have. Mrs. Brooks. Thank you, Ms. Stempfley. The Chairwoman now recognizes Mr. English for 5 minutes. STATEMENT OF CHARLEY ENGLISH, DIRECTOR, GEORGIA EMERGENCY MANAGEMENT AGENCY, TESTIFYING ON BEHALF OF NATIONAL EMERGENCY MANAGEMENT ASSOCIATION Mr. English. Thank you, Chairman Brooks, Chairman Meehan, and Ranking Members Payne and Clarke, for your foresight in having this hearing on bridging the gap between emergency management and the cybersecurity profession. You know, in my profession we all have come to believe that the cyber threat is a very real threat but what we disagree on sometimes is what the extent of the consequences of that particular threat could be, whether or not it is just a matter of espionage or hackers trying to steal intellectual property or nation-states trying to uncover some type of technology that we have, or whether it is more of a theft of credit card and bank accounts and things of that nature, or whether or not, as Mr. Payne mentioned, the 9-1-1 system might be compromised in the middle of an event. So we still have a differing opinion on that but the one thing that we don't have a difference of opinion on, and that is we can never again underestimate the creativity of those who want to harm us. Because if there is that will they will find a way, whether it is the lone hacker behind the computer screen, whether it is a group of terrorists that want to compromise one of our water treatment plants or dams, or if it is a nation- state trying to threaten us, we know that it would be a big mistake to underestimate that creativity and to underestimate the organizational skills of our enemies. Of course in emergency management we are all about the business of warnings and managing the consequences of an event. As I was thinking about our friends in the cybersecurity business I thought, you know, it would be great if we could develop a relationship that exists between the CIOs in the State and emergency managers and across the country that is similar to that of the meteorologists. You know, that relationship is on autopilot. They are monitoring the weather. The conversation exists on a daily basis. I thought about, well, you know, we have forged a new relationship in this country in the past 12 or 14 years with the law enforcement and the intel community and the emergency management profession. Early on that was a tough relationship to forge because of the security clearances and the lack of reciprocity and the whole information sharing and we were putting together a clash of cultures, if you will, because the emergency manager wants every agency and every person available to help alleviate the pain and suffering after an event and to help keep people out of harm's way. Naturally there are secrets that need to be kept, and so sometimes there was a little clash of cultures. But we have made tremendous progress in the past 12 or 13 years in that regard and I think the same is true with the cybersecurity professionals and the emergency management community. This is a relationship that will mature and it is not a matter of that no one really wanted to--or didn't want to work together. I think everybody wanted to work together; we just weren't sure how we were supposed to work together. So I think the challenge moving forward is not necessarily to create a new agency or start a new grant program, but maybe it is on us to teach one another about our professions and foster that relationship for the betterment of our country. With that, I will yield the rest of my time. Thank you. [The prepared statement of Mr. English follows:] Prepared Statement of Charley English October 30, 2013 introduction Chairman Brooks, Chairman Meehan, Ranking Members Payne and Clarke, and distinguished members of this panel--thank you for holding this hearing today on one of the most critical issues currently facing our Nation. Cybersecurity and the resultant vulnerabilities and consequences could easily match the impact of any significant natural disaster, so we must analyze these threats carefully and plan to manage them accordingly. The establishment of this committee came about more than a decade ago in the wake of an attack which came from an under-appreciated threat. This morning, we stand at the precipice of another such attack--one from a potentially nameless, faceless, and equally under- appreciated adversary. The threat of a cyber attack not only surrounds us, but also poses the additional threat of compromising the response and recovery efforts to the consequences of such an attack. Last summer, the Chairman of the House Intelligence Committee said he expects what he called ``a catastrophic cyber attack in the next 12 to 24 months.'' Earlier this year, former Secretary Napolitano said an incident on the scale of September 11 could happen ``imminently.'' The Defense Science Board went even further saying ``coming cyber attacks could present an existential threat to the country.'' As emergency managers, we operate in a world of consequence management. Accordingly, we must understand threats, protect vulnerabilities, and know how to manage consequences. As we examine the cyber threats facing this Nation, we cannot fall into a September 10, 2001, mindset. Our actions must be pro-active and consider all potential outcomes. We must never say, ``it cannot happen here'' nor shall we fear being labeled an ``alarmist'' by merely acknowledging the potential devastating consequences of this already validated threat. the threat Plenty of experts remain ready and willing to provide thoughts and hypotheses regarding the current cybersecurity threat. The vulnerabilities and resulting consequences we face in these threats represent the ``bottom-line'' for the emergency management community. Vulnerabilities are points of attack and weaknesses to be exploited. The emergency management community must address the consequences of vulnerabilities being exploited, not just the existence of vulnerabilities themselves. In his report to Congress of March 12, 2013, Director of National Intelligence James Clapper outlined how ``we are in a major transformation because our critical infrastructures, economy, personal lives, and even basic understanding of--and interaction with--the world are becoming more intertwined with digital technologies and the internet.'' Such analyses are especially concerning as we continue witnessing a metamorphosis of the cyber threat. Once a means by which to conduct espionage and steal information, the realm of cybersecurity must now include an analysis on the security and viability of our critical infrastructure. At the RSA Cybersecurity Conference on March 1, 2012, former FBI Director Robert Mueller stated ``to date, terrorists have not used the internet to launch a full-scale cyber attack. But we cannot underestimate their intent. In one hacker recruiting video, a terrorist proclaims that cyber warfare will be the warfare of the future.'' Only through good fortune have organized terrorist groups not yet taken a greater interest in cyber attacks. But such a day is certainly coming. Earlier this year, Anonymous petitioned the White House to recognize hacking attacks as a legitimate form of protest. Their solicitation argued hacking is no different than marching in an Occupy Wall Street protect. We must consider how such an approach can be combatted through our current systems and processes. Even though some experts believe Anonymous represents no true threat, others believe such an organization could bring down part of the U.S. electric power grid. Most recently, the homeland security community has been concerned with and has devoted significant resources to combatting Homegrown Violent Extremists (HVE). It is reasonable to conclude that these individuals, acting alone or in small groups, certainly have the motivation and expertise to conduct a cyber attack. Unfortunately, cyber threats represent risks far more diverse than most any other we face. While nation-states like Iran present a significant cyber threat, the greatest cyber threat from a nation likely comes from China where hacking stands as an official policy. Just recently, the Chief of Staff of the People's Liberation Army put the cyber threat into perspective when he suggested such an attack could be as serious as a nuclear bomb. Even though in his report to Congress Director Clapper said ``advanced cyber actors--such as Russia and China--are unlikely to launch such a devastating attack against the United States outside of a military conflict or crisis that they believe threatens their vital interest,'' the threat alone should be enough to garner the attention of the homeland security and emergency management community. addressing vulnerabilities & consequences Emergency managers stand increasingly concerned regarding the inter-connectedness of the threat and everyday life in America. Citizens can evacuate in anticipation of a hurricane. Strong building codes and safe rooms can protect lives in anticipation of earthquakes or tornadoes. But as we consider the breadth and depth of our reliance on the cyber infrastructure, the emergency response efforts regarding consequence management could easily overwhelm local, State, and Federal assets due to the interdependencies of critical infrastructure and key resource protection as well as the ease of vulnerability exploitation from a cyber attack. Consider this short list of potential hazards and vulnerabilities: Computer-controlled dams protecting a low-lying community, National power grids and nuclear power plants, Emergency Alert Systems (EAS) and 9-1-1 systems, Traffic systems utilized to evacuate a population, Banking systems ranging from Wall Street to basic on-line transfers and ATM withdrawals, The National airline and air traffic control network, Complex and simple communications systems from Emergency Operations Centers to the basic smartphone, and Water supply networks and waste management systems. Even many of today's commonly-used Global Positioning System (GPS), which relies heavily on a cyber structure, represents a potential target vulnerable to attack. Taken by themselves, each of these threats could have devastating effects. But emergency managers must consider a potential event impacting any number of combinations of these systems. The connectivity of systems today makes the consequences of a cyber attack more significant at all levels of government and throughout the private sector. Admittedly, emergency managers often defer cybersecurity issues to information technology (IT) officials; yet State IT professionals and other leaders will rely on emergency managers to respond to the consequences of an attack. The emergency management and IT communities must establish relationships and engage in coordinated planning and information sharing long before an event occurs. States such as Michigan continue taking a keen interest in how to manage the cybersecurity threat. Through robust coordination and planning at the State level, Michigan approaches cybersecurity with the same concepts as those employed when preparing for and responding to natural or terrorist threats. The Michigan Cyber Initiative brings together many State agencies including the Michigan National Guard, State Police, and Department of Technology, Management, and Budget in a coordinated effort to enhance detection of cyber attacks and integrate response systems. The Michigan Cyber Initiative integrates the Michigan Cyber Command Center, Michigan Cyber Defense Response Team, and Michigan Intelligence Operations Center to enhance prevention, early detection and rapid response, and control, management, and restoration. The Michigan Online Cyber Toolkit raises awareness and preparedness for all the components of the cyber ecosystem. The toolkit provides best practices and easy steps for safeguarding a vulnerable environment. It also offers the chance for users to quiz themselves, download posters and calendars, and obtain tip sheets on how to solve on-line problems. The toolkit is broken down by sectors including homes, businesses, Government, and schools. Michigan is clearly working hand-in-hand with various components in ensuring the addressing of cybersecurity across all disciplines. Even as these relationships continue developing in other States, however, we must examine how the consequences of a cyber attack will be addressed. Furthermore, we must complete an honest assessment of necessary authorities and whether they represent adequate resources to respond to such an attack. current authorities As NEMA received briefings on the Quadrennial Homeland Security Review (QHSR ) of the Department of Homeland Security (DHS), we inquired as to whether the Department would examine physical impacts of cybersecurity. They informed us that while the QHSR would include some examination of the consequences of a cyber attack, the Department's analysis of past cyber attacks reveal very few physical impacts constituting a significant threat to safety and life. We want to ensure that all potential consequences of a cyber attack are thoroughly considered. We feel like anything less is short-sighted and underestimates the ability and creativity of the enemy whether the enemy is foreign or domestic. Our country has on several occasions witnessed the creativity of those who are intent on harming us. There have been shoes, printer cartridges, underwear, and pressure cookers used as bombs and, of course, airplanes used as missiles. But even States struggle in addressing this threat. In a survey completed in February of this year, NEMA learned: 79.1 percent of States interpret the consequences of a cyber attack under statutes as ``All Hazards'' versus 20.9 percent which list it as a specific hazard. 62.8 percent of States do not maintain a law enforcement- specific component to any of the State statutes relating to cyber-response. No clear best practice exists in assigning responsibility of coordination of resources to prepare for, respond to, or recover from a cyber attack with only 41.9 percent of States citing such a directive. Of the 41.9 percent responsibility ranges from the emergency management to IT, homeland security, and the fusion center. With States remaining somewhat unclear on the appropriate course of action, the current lack of a cohesive National strategy at the Federal level is not surprising. We hope that the response strategy matures the Federal Government will not over-bureaucratize the process and bury State and local governments in a sea of reports, guidance documents, and processes. We think it is prudent to continue the insistence of metrics and return on investment calculations on the millions of dollars in initiatives funded at DHS. Some organizations, however, such as the Office of Cybersecurity and Communication (CS&C) within DHS continue admirable work in their outreach to State and local officials. The effort must be comprehensive and coordinated in order to ensure all the nuances of the threat receive appropriate attention. Federal efforts must be structured in concert with States and locals rather than adopting a top-down approach. But underlying statutory authorities are equally unclear. During the NEMA Annual Emergency Management Policy & Leadership Forum in Seattle, Washington last year, a panel of experts addressed the statutory issue. According to the panelists including a former Adjutant General, a DHS Deputy Assistant Secretary, and several State Homeland Security Advisors, the Civil Defense Act of 1950 (81-950) represents the only law potentially applicable to a potential cyber attack. Since the original intent of this Act provided for the response to a nuclear attack from the Soviet Union, the time to explore the efficacy of our current statutory authorities is now. Current statutory authorities are lacking regarding cyber attacks and are currently under revision; however, the recent remark by President Obama that a cyber attack can now be classified as an ``act of war'' significantly changes the ``environment.'' This recent change should be taken into consideration when speaking of statutory authorities and can be used to further illustrate the fluid and uncertain nature of the issue. Most emergency managers will turn to the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Pub. L. 92-288). Unless the consequences of a cyber attack truly have catastrophic and physical consequences, however, the Stafford Act will be limited. Unfortunately, too many of the legislative fixes currently under consideration in Congress only address the prevention and preparedness side of cybersecurity. While the pre-event aspects of cybersecurity maintain a high level of importance, so too will the post-event considerations. moving forward The purpose of this hearing is to ensure consequence management resulting from a cyber attack is recognized as a priority with emphasis equal to preparedness measures. As Congress considers legislative options, the needs of the State and locals ultimately responsible for the consequences of a cyber attack must be first and foremost. In May of last year, NEMA joined with the American Public Works Association, Council of State Governments, International City/County Management Association, National Association of Counties, National Association of State Chief Information Officers, National Association of Telecommunications Officers and Advisors, National Conference of State Legislatures, the National League of Cities, and the International Association of Emergency Managers to ask Congress for your consideration of key principles and values when considering cybersecurity legislation. The outlined principles and values include: 1. State and local governments must be viewed as critical stakeholders in National cybersecurity efforts.--Both execute programs overseen and funded by Federal agencies, and frequently are custodians of Federal data. They also operate and manage critical infrastructure including data centers and networks which are necessary for basic homeland security and emergency management functions. Therefore, the Federal Government must work with State and local government to share threat information and to provide technical support to protect computer networks and other related critical infrastructure. 2. The Federal Government must avoid unfunded mandates on State and local partners.--Public budgets are still strained at all levels of government, and while State and local stakeholders wish to contribute to the overall cybersecurity effort, the ability to independently fund initiatives at this time is unlikely. Likewise, Federal program requirements and directives have traditionally hindered State and local governments from potentially achieving economies of scale. 3. Federal, State, and local governments should collaborate to invest in cybersecurity awareness, education, and training for public-sector employees, contractors, and private citizens. 4. The civil liberties and privacy of all citizens must be maintained while also establishing the safety and stability of the internet and electronic communications.--This is especially critical as governments continue to expand on-line and electronic services. Safeguarding public-sector data that includes personal information of citizens will require cooperation and collaboration on data standards and cybersecurity methodology at all levels of government. 5. Many Federal initiatives fund internet and information security programs.--However, without cross-cutting communication and coordinated assets, the efforts will not realize maximum efficiency and impact. If there are privacy and security requirements that are pre-conditions of Federal programs and funding they must be uniformly interpreted and implemented across all agencies and levels. Earlier this year, NEMA attempted an effort to address cybersecurity consequences simply from the emergency management standpoint. A workgroup comprised of many NEMA members has worked since March in developing a doctrine for emergency management directors to consider. Unfortunately, even this effort proved more difficult than originally anticipated, and instead of continuing alone, NEMA has since joined forces with the National Governors Association (NGA) in their cybersecurity efforts. NGA recently released a ``Call to Action for Governors for Cybersecurity.'' The document outlines guiding principles, immediate actions to protect States, provides multiple examples from various States, and discusses a path forward. The guiding principles include supporting Governors, remaining actionable, reducing complexity, protecting privacy, employing technologically-neutral solutions, promoting flexible federalism, generating metrics, and promoting the use of incentives. NEMA looks forward to continuing our work with NGA as this complex issue gains increased attention. The combined capacity of Federal, State, and local governments to adequately safeguard the Nation's critical infrastructure systems remains essential to ensuring effective operations across the full spectrum of the threats we face. Furthermore, in order for communities to effectively manage emergency situations, cyber systems must be resilient to acts of terrorism, attacks, and natural disasters. conclusion Cybersecurity represents the most complex threat and advanced vulnerabilities we as a Nation face. We must ensure consequence management resulting from a cyber attack is recognized as a priority with emphasis equal to preparedness measures. The challenge for all of us will be to examine it through a new prism, for we will fail if we respond the same way as always. This is not a traditional threat and reaches across sectors of our society which may have never before worked together. Cyber threats can only be addressed through collaboration, planning, and a deep understanding of the potential consequences. For if we fail either through prevention or response, the impacts truly could be disastrous. Thank you. Mrs. Brooks. Thank you, Mr. English. The Chairwoman now recognizes Dr. Orgeron for 5 minutes. STATEMENT OF CRAIG ORGERON, CIO AND EXECUTIVE DIRECTOR, DEPARTMENT OF INFORMATION TECHNOLOGY SERVICES, STATE OF MISSISSIPPI, TESTIFYING ON BEHALF OF NATIONAL ASSOCIATION OF STATE CHIEF INFORMATION OFFICERS Mr. Orgeron. Thank you Chairs Brooks and Meehan, Ranking Members Payne and Clarke, and Members of the committee, for inviting me to speak today. I am truly honored by the invitation. As the executive director of the Mississippi Department of ITS, Information Technology Services, as well as president of the National Association of State Chief Information Officers, better known as NASCIO, I can report that each year States are facing greater numbers of evolving and sophisticated cyber threats. The State of Mississippi's IT systems, like systems from all States, face cyber attacks ranging from a few thousand attempts to as many as 10 million a day--some domestic, many international. To win this on-going battle, State IT experts have to be right every time while hackers need to be only right once. As these attacks continue to grow more sophisticated, both public and private-sector entities will need to develop better tools and increase collaboration to both deter attacks and plan a coordinated response to contain the damage from successful attacks. This ultimately requires a multi-sector approach with all levels of Government and private industry working together. State CIOs are, indeed, at the table in securing State systems. Each year NASCIO surveys its membership. Our 2013 survey, which I have attached to my written testimony, shows how State CIOs are taking important steps toward building a more secure State IT environment. However, there are still known gaps. According to our survey data, the State CIO role in disaster recovery appears to be increasing yearly. State CIOs generally coordinate with other State officials in restoring and maintaining infrastructure and communication services to help their State respond to and recover from natural and man- made disasters. When asked about their concerns, State CIOs put increasingly sophisticated threats to their systems followed closely by a lack of funding and inadequate availability of security professionals at the top of their list. As the Federal Government and private sector ramp up their defenses against sophisticated hackers, State governments are becoming prime targets of foreign state-sponsored entities and international crime syndicates. These hackers can remain in State systems monitoring data and waiting to unleash significant harm. In worst-case scenarios, a sophisticated hack on public safety systems or critical infrastructure could coincide with a physical attack or a natural disaster to impede the ability of authorities to respond to one or both events. It is well-known that when compared with the private sector and the Federal Government, States do not have comparable resources and tools to provide similar levels of protection to their systems despite the fact that they often maintain the same sensitive information and key critical infrastructure. This is only partly a financial issue; it is also a policy and a skilled personnel issue. On the latter two fronts, there is a great deal the Federal Government can do to help State governments improve preparedness and respond to cyber attacks. I have included many of NASCIO's policy recommendations in my testimony but here are five areas: First, flexibility at the State level. Federal resources in support to States must respect and bolster the State organizations. Public-sector cybersecurity is in its infancy. Best practices must be shared but diverse approaches, particularly when it comes to governance, information sharing, and methodology, should be nurtured. Second, increasing the workforce: Expanding Federal scholarships to study cybersecurity in exchange for working several years in the Federal Government or for State or local governments has a two-fold benefit of both better protecting our citizens and expanding available talent pools of cybersecurity experts. Third, modernizing Federal regulations: Congress should consider working with NASCIO and the States to update the Federal Information Security Management Act, or FISMA, with cybersecurity rules that better conform to universal, outcome- based standards that would provide both Federal agencies and States with better security as well as greater efficiencies. Updating homeland security funding: Efforts to utilize existing Federal programs to better State governments in protecting the Nation against cyber attacks should also be explored. More than 10 years out from September 11, 2001, homeland security grants should be reformed to reflect the current threats faced by our States and localities. Last, applying what we know: NASCIO believes the National Cybersecurity Review, or NCSR, is an excellent opportunity to review our National preparedness and provide resources and technical assistance to fill the gaps in our defenses. Holding hearings such as this one and finding ways to share information and resources will be crucial moving forward. We ask that Congress continue to work with the States in identifying ways to protect our Nation's digital assets. Thank you for the opportunity to testify and your time today. [The prepared statement of Mr. Orgeron follows:] Prepared Statement of Craig Orgeron October 30, 2013 Thank you Chairs Brooks and Meehan, Ranking Members Payne and Clarke, and Members of the committee, for inviting me to speak to you today. I am honored by the invitation. As we wrap up Cybersecurity Awareness Month it is timely that we are having this hearing on one of our Nation's most significant vulnerabilities. As executive director of the Mississippi Department of Information Technology Services (ITS), as well as president of the National Association of State Chief Information Officers, better known as NASCIO, I can report that each year States are facing greater numbers of evolving and sophisticated cyber attacks. In addition to States serving as a repository of sensitive data about our citizens and homeland, States increasingly utilize the on-line environment to deliver vital services, maintain critical infrastructure such as public utilities, and ensure our first responders receive the data they need in crisis situations. State government IT systems are a vital component of the Nation's critical infrastructure. Today, with this testimony, I want to provide the committee information on the readiness of our State governments to defend against and respond to major cyber attacks, as well as opportunities to collaborate to minimize the risk to our Nation. I hope to give you a sense of the threat landscape and how States and the Federal Government, along with the private sector, can work together to better secure our homeland. State governments are at risk from a host of new and aggressive security threats that require a formal strategy, adequate resources, and constant vigilance. Cybersecurity continues to be one of the major ``hot button'' issues for State CIOs and one that receives increasing attention from Governors and other elected officials. State CIOs are taking the lead in securing State systems. According to NASCIO's 2013 survey of State CIOs conducted by in collaboration with TechAmerica and Grant Thornton LLP, significant improvements have been made in the last few years. Over three-quarters of States have adopted a cybersecurity framework, implemented continuous vulnerability monitoring capabilities, and developed security awareness training for employees and third-party contractors. These are key steps toward building a more secure State cyber environment. Unfortunately, less than half of States are documenting the effectiveness of the cybersecurity program they have in place, and even fewer have developed a cybersecurity disruption response plan. In the same survey, CIOs were asked about the major barriers they faced in addressing cybersecurity. The increasing sophistication of threats, followed closely by a lack of funding and inadequate availability of security professionals, topped the list. Additionally, the survey data reveals that only 8 percent of States have implemented identity and access management of State data systems across the enterprise, although 42 percent of respondents noted an in-process implementation. The State CIO role in disaster recovery appears to be increasing each year. According to the NASCIO 2013 survey almost two-thirds of States pursue a federated strategy to disaster recovery, with responsibilities split between the CIO and State departments and agencies. The survey also queried State CIOs regarding their role in helping their State respond to and recover from a natural or man-made disaster. The survey results show almost all CIOs see their role as one of coordinating with other State officials and restoring and maintaining infrastructure and communications services. I have attached the full results of this survey to my testimony today, along with the 2012 Deloitte-NASCIO Cybersecurity Study entitled ``State governments at Risk,'' for your further review.* --------------------------------------------------------------------------- * The information has been retained in committee files. --------------------------------------------------------------------------- The State of Mississippi's IT systems, like systems from all States, face cyber attacks every day, ranging from a few thousand attempts to as many as 10 million per day--some domestic, many international. To win this on-going battle, State IT experts have to be right every time, while hackers need to only be right once. As these attacks continue to grow more sophisticated, both public and private- sector entities will need to develop better tools and increase collaboration to both deter attacks and plan a coordinated response to contain the damage from successful attacks. This ultimately requires a multi-sector approach, with all levels of government and private industry working together. Securing systems in cyberspace, and responding to successful hacking attempts, has little in common with traditional emergency management after a disaster. Advanced cyber threats are much more akin to an aggressive, new strain of virus: The threat is diffuse, and almost impossible to prevent before it comes into being. In addition, just like a new viral strain, it takes time to properly identify and contain the virus, educate the populous about how to avoid contracting it, and treat those infected. As the Federal Government and private sector ramp up their defenses against sophisticated hackers, State governments are becoming a prime target of foreign, state-sponsored entities, and international crime syndicates. Sophisticated hackers may hide in IT systems for years-- creating what is referred to as an ``advanced persistent threat.'' These hackers can remain in State systems monitoring data and waiting to unleash significant harm to our Nation's financial systems, transportation systems, supply chain, and key utilities such as the electrical grid, and pipelines, to name a few. In worst-case scenarios, a sophisticated hack on public safety communication systems or critical infrastructure could coincide with a physical attack or natural disaster to impede the ability of authorities to respond to one or both events. Elected leaders at all levels have come to understand that cybersecurity is a significant issue that requires their attention. The National Governors Association (NGA) is working with the National Emergency Management Association (NEMA), NASCIO, and members of the private sector, to build upon this greater understanding. Based on this collaboration, NGA released ``A Call to Action for Governors for Cybersecurity,'' which provides strategic recommendations Governors can immediately adopt to improve their State's cybersecurity posture. By gaining support from the Governor's office, a State can tackle key issues of governance and create an authority structure that builds comprehensive cybersecurity across the State enterprise. It is well- known that when compared with the private sector and the Federal Government, States do not have comparable resources and tools to provide similar levels of protection to their systems, despite the fact that they often maintain the same sensitive information and key critical infrastructure. This is only partially a financial issue--it is also a policy and skilled personnel issue. On the latter two fronts, there is a great deal the Federal Government can do to help State governments improve preparedness and response to cyber attacks. On policy, perhaps the single key to ensuring a substantial attack does not blindside us is the Federal Government facilitating greater information sharing between Federal agencies, the private sector, and State and local partners. NASCIO believes the implementation of Executive Order 13636 and Presidential Policy Directive 21 will be a first step to achieving these goals. As each State's cybersecurity level of maturity and governance is different, NASCIO would be concerned about any effort by the Federal Government to designate a single State entity as the responsible point for sharing and disseminating information between State and Federal entities. Such decisions should ultimately be left to each State's Governor to fit their model of cyber governance. Just as each State has different geography and vulnerabilities to extreme weather or man-made disasters, State Information Technology systems and the governance of those IT systems are very different. Federal resources and support to States must respect and bolster the State organizations. States rely on multiple external resources for threat information, such as the Multi-State Information Sharing and Analysis Center (MS- ISAC), United States Computer Emergency Readiness Team (US-CERT), and FBI's InfraGuard. States then act on this information through various channels: Some States have built a sophisticated cyber capacity at their State fusion center, others have bolstered the authority of their Office of Information Technology, and some coordinate with a cyber division of their State National Guard. The Federal Government should support all these approaches. Public sector cybersecurity is in its infancy; best practices must be shared, but diverse approaches-- particularly when it comes to governance and methodology--should be nurtured. Due to the diverse landscape at the State level, the Federal Government must be as inclusive as possible in disseminating threat information, and work outside the public safety and intelligence sector's traditional one-to-many comfort zone. Cybersecurity works best when more people have an understanding of the threats. Therefore, NASCIO and its members applaud the on-going effort to provide greater declassification of cyber threat information. We hope this will be followed by collaborative effort to standardize information exchange models for sharing threat data. Classified threats will always exist, though, and therefore, greater access to classified information is needed at the top echelons of State government. As of now, the U.S. Department of Homeland Security (DHS) will only provide State governments with two Top Secret clearances. Typically, these go to the Governor and their homeland security advisor or director of public safety. This means in many States, chief information officers or their chief information security officers are not cleared to the appropriate level to receive vital information from the intelligence community on the most advanced international threats against our networks. This should be remedied. Additionally, while opportunities for limited Federal assistance for cyber threats have been included in the National Preparedness Grant Program (NPGP), the formulaic structure of the program means States do not have enough funding to do much more than maintain legacy homeland security investments and administer grants to local governments. For NPGP to meet the current threats faced by our States and localities, changes will need to be made by Congress and the administration. Besides fixing funding models to meet the current threat, there are other policy efforts that can be undertaken to maximize the impact of existing cybersecurity resources. NASCIO believes the National Cyber Security Review, or NCSR, is an excellent opportunity to review our National preparedness and provide resources and technical assistance to fill gaps in our defenses. The NCSR is a voluntary self-assessment survey designed to evaluate cybersecurity management within State, local, Tribal, and territorial governments. At the request of Congress, DHS has partnered with MS- ISAC, NASCIO, and the National Association of Counties (NACo) to develop and conduct the NCSR. The survey is now in the field and we expect final results to be provided in the first quarter of next year. Much like the Threat and Hazard Identification and Risk Assessment (THIRA) provides a guide for investment in traditional homeland security gaps, the NCSR could be followed up with the promise of Federal technical assistance to State and local participants who lag behind in vital areas. This will have the dual benefit of safeguarding citizen data and encouraging greater participation in National-level vulnerability assessments. NASCIO also supports efforts to include State governments as a participant in programs that build the public sector cybersecurity workforce. One of the greatest difficulties States face is attracting and retaining talent in this information security sector. States cannot compete with the salaries provided by the private sector, or the allure of positions in the U.S. Federal intelligence services. Federal scholarships to study cybersecurity in exchange for working several years in the Federal Government, or for State or local governments, has the two-fold benefit of better protecting our citizens and expanding the available talent pool of cybersecurity experts. Scholarships should be expanded to ensure those who take advantage of them can work at any level of government protecting IT systems. As many successful cyber attacks could be prevented by good cyber hygiene and security practices, Federal collaboration with State and local governments to create a culture of awareness and preparedness would also be a significant step forward. Just like ``see something, say something,'' clicking one's seat belt before driving, or even covering your mouth when you sneeze, public awareness and habit is one simple way to significantly reduce the threat. The Federal Government can also take steps to reduce burdens on State and local governments by harmonizing cybersecurity standards and requirements across Federal programs so State governments can provide more efficient and effective security of programs at a lower cost to taxpayers. Under the Federal Information Security Management Act, better known as FISMA, States are required to check certain boxes regarding security when taking Federal grant dollars. However, Federal agencies interpret these rules differently, and require different security standards. This often means that States must spend money on redundant systems to comply with a patchwork of Federal rules. It also means a lack of compatibility between various systems that States manage, which could otherwise be consolidated and more secure. Congress should work with NASCIO and the States to replace FISMA with cybersecurity rules that better conform to universal, outcome-based standards that would provide both Federal agencies and States with better security as well as greater efficiency. Cybersecurity is a complex issue, and we have a long road ahead of us to making our Nation's systems more secure. There is no single solution here--or in tech speak, there isn't a ``killer app.'' With the diffuse threat and diverse actors, cybersecurity requires a many-to- many approach. Most public safety response efforts are command-and- control, line-of-command efforts. Such efforts will not work when it comes to cybersecurity and response. With cyber attacks and the resultant impact, there is rarely a front line and the ``path of the storm'' is usually not obvious. Holding hearings such as this one and finding ways to share information and resources will be crucial moving forward. We ask that Congress continue to work with the States in identifying ways to protect our Nation's digital assets, including rapidly maturing threat information-sharing entities and developing a common framework that can serve as a roadmap and provide funding justification for State cybersecurity. Thank you for the opportunity to testify and your time today. Mrs. Brooks. Thank you, Dr. Orgeron. The Chairwoman now recognizes Mr. Sena for 5 minutes. STATEMENT OF MIKE SENA, DIRECTOR, NORTHERN CALIFORNIA REGIONAL INTELLIGENCE CENTER, TESTIFYING ON BEHALF OF NATIONAL FUSION CENTER ASSOCIATION Mr. Sena. Thank you, Chairman Brooks and Chairman Meehan and Members of the subcommittees. On behalf of the National Fusion Center Association I would like to thank you for the opportunity to share our perspective on this increasingly important issue. Back in July the Majority staff of this committee released a report on the National Network of Fusion Centers after visiting more than 30 of them. The report noted that nearly 200 JTTF investigations have been created as a result of the information provided by fusion centers and nearly 300 terrorist watch list encounters reported through fusion centers enhanced existing terrorism cases. Those successes were enabled because the National Network has developed into a mechanism for regular exchange of criminal intelligence and terrorism threat information across jurisdictions. This mechanism is ready made for information sharing on cyber threats as well, but we have a long way to go. We need to recognize a couple of realities. First, a streamlined system of reporting, analyzing, and sharing threats and incidents requires leadership at the State and local level and the clear acceptance of what roles different partners can and should play. While the systems of interaction will vary from State to State, we need to structure relationships so that our personnel know where information should be flowing from and disseminated to. Second, our human resource base at the State and local levels has not adapted quickly enough to address the increased cyber threats. State and local law enforcement, homeland security, and emergency management functions, including fusion centers, must have personnel who are adequately trained to respond quickly and share information rapidly so that additional crimes can be prevented. The NFCA has been working over the past year with the International Association of Chiefs of Police, the program manager for the information-sharing environment, the Department of Homeland Security Office of Intelligence and Analysis, private-sector partners, and other associations to develop a pilot program. The pilot will be funded by the PM-ISE through DHS to the Center for Internet Securities, MS-ISAC. The pilot will address needs identified by a wide range of stakeholders including the need for increased time lines, volume, and quality of information the Federal Government shares with State, local, and private-sector partners; the need for standardization of information-sharing processes among various levels of government; and the development of cyber response best practices; leveraging current counterterrorism tools and processes for cyber incident handling and intelligence sharing; and promoting private-sector cooperation and information sharing. We expect the pilot to get underway soon and we look forward to updating the committee on our progress. I want to raise four issues that we think this committee should be aware of and help us think through. First, enhanced cooperation by Federal partners through more information sharing and Unclassified levels would help connect dots and lead to faster action. Our Federal partners tend to operate on the high side, but since threat information is coming into fusion centers from State, local, and private- sector customers who expect timely responses, operating in a classified environment can slow down information flow. When the Classified document is created, an Unclassified version must also exist for dissemination. We need to get classification issue right so that we can be responsive to our communities while safeguarding critical infrastructure and key resources and information assets from exploitation. Second, building training and maintaining a strong cyber analyst cadre within fusion centers and law enforcement should be a priority. We have great partners like the United States Secret Service, whose Hoover, Alabama facility provides cyber training for fusion centers and other analysts. That program should be a priority for new investment in the immediate future so that the training can reach a greatly expanded audience. Third, the Terrorism Liaison Officer program is a successful partnership between fusion center and State and local law enforcement, fire service, first responder, public health, and private-sector communities within their areas of responsibility. This system maximizes situational awareness and provides a clear mechanism for ground-level suspicious and criminal activity to quickly funnel leads to investigative agencies. The success of the TLO program in the physical domain should be extended to the cyber domain in the form of a cyber TLO program. Trained TLOs know what to do in the world of physical threats; the same should happen with cyber threats. City, county, and State governments, as well as CIKR owners and operators should be part of the cyber liaison program. This mechanism would ensure that investigative leads filter up to the appropriate agencies while regular reporting on the latest cyber threats can be pushed down through the network. Finally, every fusion center should have the ability to triage threat reports and develop products to help partners mitigate threats. Ideally, we need a constantly-updated automatic system that provides partners with the threat information--both machine- and human-readable--in real time, action to identify the attack, identify the associated indicators of compromise, and disseminate those indicators of compromise to partners in a timely manner. That is essential. Thank you again for this opportunity to share our thoughts. I encourage you to continue to reach out to your fusion center in your State or region and find out about their challenges and best practices. Thank you. [The prepared statement of Mr. Sena follows:] Prepared Statement of Mike Sena October 30, 2013 Chairman Brooks, Chairman Meehan, Members of the subcommittees, my name is Mike Sena and I am the director of the Northern California Regional Intelligence Center (NCRIC), which is the fusion center for the San Francisco Bay and Silicon Valley region. I currently serve as president of the National Fusion Center Association (NFCA). On behalf of the NFCA and our executive board, thank you for the opportunity to share our perspective on the analysis and sharing of information on threats from the cyber domain that we are seeing at a rapidly increasing pace. The National Network of Fusion Centers (National Network) includes 78 designated State and major urban area fusion centers. Every center is owned and operated by a State or local government entity. The majority of operational funding for fusion centers comes from State or local sources, while Federal grants--primarily through the Homeland Security Grant Program at FEMA--are a major source of additional support. Our centers are focal points in the State, local, Tribal, and territorial (SLTT) environment for the receipt, analysis, gathering, and dissemination of threat-related information between the Federal Government, SLTT, and private-sector partners. As the report on fusion centers that was released in July of this year by the Majority staff of the full House Homeland Security Committee noted, nearly 200 FBI Joint Terrorism Task Force investigations have been created as a result of information provided to the FBI through fusion centers in recent years, and nearly 300 Terrorist Watchlist encounters reported through fusion centers enhanced existing FBI terrorism cases. Most fusion centers are ``all-crimes'' centers, meaning that they do not focus on just terrorism-related threats. Most centers are supporting law enforcement and homeland security agencies in their States and regions through analysis and sharing of criminal intelligence to address organized criminal threats and to support intelligence-led policing. Because the National Network of Fusion Centers has developed into a mechanism for regular exchange of criminal intelligence and threat information across jurisdictions, we are increasingly involved in addressing cyber threats. My center--the NCRIC--is actively involved in cyber threat analysis and information sharing with our Federal partners, other fusion centers, State and local governments in our region, and private-sector partners. As with any other successful law enforcement or intelligence effort, good relationships are at the heart of the matter. We must develop strong and trusting relationships with our customer agencies as well as with the private sector to ensure timely information flow. As an example of partnership development, the NCRIC is working with a major utilities service provider--that faces significant persistent cyber attacks--to assign personnel inside the fusion center. Once in place, this partnership will result in the development of capabilities to improve internal security for the company, but also new threat analysis and prevention capabilities for other critical infrastructure partners across the sector. The NCRIC hosts a working group including private-sector CIKR owners that meets regularly to discuss threats and share information. But my center is not the norm across the National Network. Today, less than half of the fusion centers have a dedicated cyber program. We expect that number to grow as the threats grow, but we must have additional resources to support the specialized training and personnel to further that mission. We cannot take away from our established missions to tackle new ones. We also must coordinate closely with other entities that play roles in cyber threat awareness, analysis, and information sharing--including the organizations my fellow panelists here today represent. The reality is that we are dealing with a growing category of criminal activity featuring different impacts as compared to traditional crime. Because the impacts are ``quieter'' and--to date-- most often bloodless, it is more difficult to make a clear case for investments in systematic improvements in law enforcement and criminal intelligence capacity to deal with these threats. But as we all know, the threats and their consequences are very real. And the threats are growing--from small, targeted operations that impact a family's finances to large operations that threaten an electric grid. Large critical infrastructure owners know who to call when something happens--they are likely to have existing partnerships with Federal law enforcement and investigative bodies. But who does a family call when they notice they have been violated? What about a small business or, even more concerning, a smaller vendor that may be part of an important supply chain? State and local law enforcement across the country are reporting increased calls related to cyber crime. Questions related to jurisdiction and investigative capacity are difficult to answer in many of these cases. But the analysis and sharing of threat information is essential to prevent more victimization. As the NFCA has worked with our partners in State and local law enforcement on this issue over the past year, it has become clear that we have significant needs for capability and capacity enhancements. As I wrote in a blog post for the Program Manager for the Information Sharing Environment (PM-ISE) last week, the NFCA is working with the International Association of Chiefs of Police (IACP), the PM-ISE, private-sector partners, and other professional associations to assess needs across the country. I want to specifically acknowledge the office of the Program Manager for the Information Sharing Environment, DHS Intelligence & Analysis, and FEMA for their recognition of the importance of this effort, and for moving the ball downfield. These are outstanding partners in our efforts and we rely on them daily. In August 2012, the NCRIC hosted a roundtable for cybersecurity stakeholders that included representatives from the financial and IT sectors, as well as Federal, State, and local officials. These participants identified two types of information sharing: (1) Fusion centers engaged in sharing tactical information on company or sector- specific situational awareness; and (2) fusion centers sharing strategic information on threats, risks, and trends through strategic forums that involve both the public and private sectors. IACP partnered with the Department of Homeland Security to facilitate a December 2012 roundtable to further clarify requirements for cybersecurity information sharing. Building on the momentum of the August and December events, the NCRIC and the IACP held the Cybersecurity Evaluation Environment Pilot Kick-off Event in February 2013. The first day of this 2-day event focused on soliciting cybersecurity information-sharing requirements from industry partners and developing potential Federal, State, and local government processes for cybersecurity information sharing with the private sector. Participants also discussed Government requirements for cybersecurity information sharing. On the second day, the Government participants worked to design a ``cybersecurity pilot'' that would advance fusion center cybersecurity information-sharing capabilities. The pilot will be funded by DHS through the Multi-State Information Sharing and Analysis Center (MS-ISAC) and executed in coordination with all appropriate stakeholders. It will focus on addressing needs identified by stakeholders including: the need for increasing the timeliness, volume, and the quality of the information the Federal Government shares with State/local/Tribal government and private-sector partners; the need for standardization of information-sharing processes between the Federal and State/local/Tribal governments and the development of cyber response best practices; leveraging current counterterrorism-developed tools and processes for cyber incident handling and intelligence sharing; enhancing the protection of State/local/Tribal networks; supporting cyber crime investigations; and promoting private-sector cooperation and information sharing. We expect the pilot to get underway soon and we look forward to keeping the committee apprised of our actions. We believe it is important to recognize a couple of realities. First, a streamlined system for reporting, analyzing, and sharing threats and incidents requires leadership at the State level in each of our States and a clear acceptance of what roles fusion centers can and should play. Roles, responsibilities, and capabilities should be clearly understood--including by private-sector partners--and we have to acknowledge that we are not where we need to be. That is why efforts like the pilot project we are about to engage in with the leadership of PM-ISE and IACP are so important. While the systems of interaction may vary from State to State, we need structured relationships so that our personnel know where information should be flowing from and disseminated to. Second, our human resource base in investigative and intelligence settings at the State and local levels has not adapted quickly enough to address the increased cyber threat. Again, citizens report crimes to law enforcement no matter the type. Federal agencies cannot possibly investigate all of those crimes, even as they have a need to be aware of them in case they relate to other incidents in other locations. State and local law enforcement, homeland security, and emergency management functions--including fusion centers--must be resourced to respond to those crimes quickly and share information rapidly so that additional crimes can be prevented. As the July, 2013 committee staff report on fusion centers noted, ``Ultimately, it is the FBI's responsibility to conduct counterterrorism investigations. However, no single government entity has the mission and capacity to coordinate, gather, and look comprehensively across the massive volume of State and locally-owned crime data and SARs and connect those `dots', particularly those related to local crime and, potentially, the nexus between those criminal activities and terrorist activity. This is the principal value proposition for the National Network.'' This reality extends to the cyber threat domain. Next week the National Fusion Center Association will host a major event across the river in Alexandria, Virginia. The NFCA Annual Training Event will bring together fusion center directors and analysts from nearly all 78 centers, as well as Federal partners including DHS, partner associations from State and local law enforcement and emergency response, fire service representatives, and industry to receive training and share best practices. Among the training sessions are two separate sessions on cyber threat analysis and information sharing. Representatives from the Kanas City Terrorism Early Warning Group, the Orange County (CA) Intelligence Assessment Center, the Louisiana State Analytical and Fusion Exchange (LA-SAFE), the San Diego Law Enforcement Coordination Center, and my center--the NCRIC--will present to other fusion centers on effective practices and partnerships they are implementing in their centers. This indicates the level of interest across the National Network in advancing our capabilities to address cyber threats. The State of Louisiana's fusion center--LA-SAFE--has taken an active role in cyber threat analysis and information sharing. State, local, and private entities reach out to LA-SAFE when a cyber event occurs in their AOR. The fusion center's lead cyber analyst disseminates block-list information to those partners to quickly help strengthen their protections. LA-SAFE conducts analysis of cyber threats and develops intelligence reports for dissemination to relevant partners. To date, the LA-SAFE Cyber Unit has developed more than 40 reports that have been shared with Federal, State, and local partners. Feedback to LA-SAFE--including from our Federal partners--clearly indicates that the information coming out of the fusion center is of high value. In one example from earlier this year, the Louisiana State legislature was receiving numerous phone calls from a foreign individual asking for the payment of a supposed debt. The numerous malicious calls clogged the phone lines, preventing legitimate calls from going in or out. The ``telephone denial-of-service attack'' disrupted the legislature's communications. LA-SAFE determined that this TDOS attack was similar to others that had occurred across the United States and produced and disseminated an advisory to its partners. Immediately afterwards LA-SAFE received numerous phone calls and emails from public safety answering points (PSAPs) across the country that had suffered similar attacks. LA-SAFE was contacted by the deputy manager of the National Coordinating Center for Communications (NCC). The NCC had received the LA-SAFE advisory from the NCCIC and expressed serious concern. The NCC then initiated a conference call with LA-SAFE, the NCRIC, NCC, NCCIC, Association of Public-Safety Communications Officials (APCO), National Emergency Number Association (NENA), FBI, and other industry representatives to coordinate a response. As a result of the coordination, multiple advisories were distributed from participating organizations to their customer bases. It has since been determined that over 200 of these attacks have been identified Nation-wide. These attacks have targeted various businesses and public entities, including the financial sector and other public emergency operations interests, such as air ambulance, ambulance, and hospital communications. This example of cyber threat analysis and information sharing is occurring on a more frequent basis across the National Network of Fusion Centers. Some fusion centers are collecting and analyzing instances of cyber attacks in their AOR, and developing products that are sent to other fusion centers, which enables a much larger set of stakeholders to prevent damaging attacks. LA-SAFE's recent experiences demonstrate both the opportunity and the need for additional focus and capacity within the network. Like other fusion centers that provide cyber threat analysis and sharing services, LA-SAFE needs more cyber analyst positions. The increasing threat level has already translated into increased demand for investigative and analytical services from fusion centers, and there is no sign of any slowing-down in that demand. A significant challenge for LA-SAFE and other centers is that cyber analysts are typically more expensive than traditional analysts. While physical terror threats and criminal activity are the primary focus of most fusion centers, the growing category of cyber crime means that cyber threat analysis resources must be strengthened at all levels of government. In addition, LA-SAFE and other centers believe that the system for interacting with Federal partners on cyber threats needs to be improved. Enhanced cooperation by Federal partners through more information sharing at the Unclassified or Sensitive-But-Unclassified levels would help connect dots and lead to faster information sharing to prevent attacks. Our Federal partners tend to operate on the ``high side,'' but since threat information is coming to fusion centers from State, local, and private-sector customers who expect timely responses, operating in a classified environment can slow down information flow. Speed is important in all investigations and prevention activities-- especially in the cyber domain. We must work with our partners to identify the right path forward on classification so that we can be appropriately responsive to our communities while safeguarding CIKR and information assets from inappropriate exploitation. Building, training, and maintaining a strong cyber analyst cadre within fusion centers and law-enforcement entities should be a priority. We have great partners like the United States Secret Service whose Hoover, Alabama training facility provides beginning and intermediate training for fusion center and other analysts. That program should be prioritized for new investment in the immediate future so that its training can reach a greatly expanded audience. The Multi-State Information Sharing and Analysis Center (MS-ISAC) provides training to State and local law enforcement to enhance cyber awareness and analytical capabilities. We need more of this type of training to ensure our analysts have the skills required to act quickly so that accurate, timely information can be shared broadly. The Terrorism Liaison Officer (TLO) program is a successful partnership between fusion centers and the State and local law enforcement, first responder, public health, and private-sector communities within their AORs. TLO programs train thousands of individuals on indicators of possible terrorist activity and reinforce a system of reporting of suspicious activity through the fusion centers and the Nation-wide Suspicious Activity Reporting (SAR) Initiative. This system maximizes situational awareness and provides a clear mechanism for ground-level suspicious activity to quickly funnel up to lead investigative agencies. The success of the TLO program in the physical terrorism domain should be extended to the cyber domain in the form of a ``cyber TLO'' program. Trained TLOs know what to do in the world of physical threats. The same should happen with cyber threats. City governments, county governments, State governments, and CIKR owners and operators should be part of this network. Again, maximizing situational and threat awareness through a systematized reporting mechanism will ensure that investigative leads filter up to lead investigative agencies, while regular reporting on the latest cyber threats by fusion centers and other partners can be pushed down through that network. Every fusion center should have the ability to triage threat reports and develop products to help State, local, and private-sector entities to mitigate the threats. Ideally, we need a constantly updated automated system that provides partners information--machine and human- readable--in real time as events are happening. Investigation into the source of cyber attacks will occur after the fact, but action to identify the attack, identify the associated indicators of compromise, and disseminate those indicators of compromise to partners in a timely manner is essential. It will take time and money for that vision to be realized--and we have too little of both in the near term. In the mean time, the partners at this table and around the country must work together through the pilot project and other settings to develop policies, protocols, and requirements that will result in the kind of information sharing and threat analysis our citizens expect. In addition, a concept called analytical centers of excellence is being built out across the National Network. If a particular fusion center does not have dedicated cyber capabilities, then that center's personnel should know exactly where to go for support. Relationships should be developed and formalized so that centers with cyber capacity can be tapped when needed by other members of the National Network. This same concept is being applied to traditional criminal intelligence information by fusion centers today. On behalf of the National Fusion Center Association, thank you again for the opportunity to testify today. The members of the NFCA executive board and I are happy to provide you with on-going input and answer any questions you have. I also encourage you to reach out to the fusion center in your State or region and find out about their particular challenges and best practices related to cyber and other threats. We look forward to working with you on this issue. Mrs. Brooks. Thank you, Mr. Sena. The Chairwoman now recognizes Mr. Molitor for 5 minutes. STATEMENT OF PAUL MOLITOR, ASSISTANT VICE PRESIDENT, NATIONAL ELECTRICAL MANUFACTURERS ASSOCIATION Mr. Molitor. Thank you, Madam Chairwoman, Mr. Chairman, and the Ranking Members and all of the committee Members and staff who have joined us today. We would like to acknowledge the subcommittee for holding this important hearing on a very timely topic, which is cybersecurity and emergency management. NEMA sees safe and reliable electric power as an enabler for first responders and supporting life-sustaining services like communications, food, fuel, and water in the event of a cyber attack. As we discuss the impacts of the cyber attack, direct parallels can be drawn to grid outages caused by natural disasters. Nothing shapes the discussion more than the lessons learned through the 2003 Northeastern blackout, the recent tsunami in Japan, the recent earthquake in Haiti, and the two events which affected the Congressional districts of many of the Members here today, Hurricanes Sandy and Katrina. Large-scale outages are extremely disruptive to the health and well being of the affected population regardless of the cause. The question becomes: What are the most effective steps we can take to prepare for and mitigate this impact? In much the same way as new information in communications technologies are reshaping how we work, learn, and stay in touch with one another, these same technologies are being applied to the electric grid, giving utilities new ways to manage the flow of power. Many people refer to this as the smart grid. This allows us to minimize the footprint of an outage, maintain power to critical facilities, identify those affected, shunt around downed power lines to increase public safety, and enable faster restoration of services. Many of these technologies are detailed in a storm reconstruction guide that we produced in the wake of Hurricane Sandy a year ago, and we had a seminar on Capitol Hill earlier this year where we went through this in a fair amount of detail. When the U.S. Department of Energy established their seven characteristics for smart grid in 2008 it included: Optimize asset utilization and operate efficiently; anticipate and respond to system disturbances--essentially, be self-healing; and also, operate resiliently against attack and natural disaster. The key to this kind of performance is rooted in consensus-based industry standards. Standards define the interaction between entities to create both interoperability and cybersecurity. They allow electrical manufacturers to build security into the grid, which is preferable to installing free and open devices that are secured after installation. We want security built into the objects and not bolted on afterwards. Moreover, the standards-based monitoring features of the smart grid will facilitate communications between grid operators, emergency crews, and first responders. The bill introduced by a Member of this committee, the SMART Grid Study Act, by Congressman Payne, would go a long way to evaluating the breadth and effectiveness of the solutions that have been deployed to date. Since 2009 we have invested billions of dollars in the smart grid, and if you want to improve something you need the measurement. We have been building; it is time to measure. Additional considerations for the cyber future of the grid are contained in Executive Order 13636 and the National planning scenarios developed by the various sector-specific agencies of the Federal Government in conjunction with the Department of Homeland Security. Scenario 15 is entitled ``Cyber Attack'' and it provides a doomsday scenario for a pervasive attack on major elements of the Nation's communications infrastructure, weighing this scenario against the cybersecurity framework being developed by NIST under Executive Order 13636, the implementation of which is being supervised by DHS. This will give our industry an appropriate platform to ensure that we are as prepared as possible for an attack. Finally, as a 20-year veteran of the U.S. Army and a former company commander and battalion operations officer I can say that it is one thing to have a plan but another thing to execute it. We should regularly conduct large-scale virtual exercises, like the National-level exercises in 2012, to test our response capabilities under the cyber attack scenario or the natural disaster planning scenario or a combination of the two. The greatest fear of our industry is that someone would launch a cyber attack in conjunction with a natural disaster, which would increase its impact. The military performs these kind of exercises with great frequency and great success. It would be a good idea for us to figure out how we can structure regional, more detailed exercises under DHS for the civilian agencies and companies associated with the critical infrastructure, like the upcoming NERC event you mentioned earlier. I want to thank the subcommittees for allowing us to testify today and I look forward to your questions and comments. [The prepared statement of Mr. Molitor follows:] Prepared Statement of Paul Molitor October 30, 2013 Chairmen Brooks and Meehan and Ranking Members Payne and Clarke, I thank you and the Members of the subcommittees for inviting me to testify today on cybersecurity and emergency management. I am Paul Molitor, assistant vice president at the National Electrical Manufacturers Association (NEMA). NEMA is the association of electrical equipment and medical imaging manufacturers, founded in 1926 and headquartered in Arlington, Virginia. Its 400-plus member companies manufacture a diverse set of products including power transmission and distribution equipment, lighting systems, factory automation and control systems, and medical diagnostic imaging systems. The U.S. electroindustry accounts for more than 7,000 manufacturing facilities, nearly 400,000 workers, and over $100 billion in total U.S. shipments. On behalf of the 400-plus member companies of NEMA, I am responsible for all internal and external communications relating to NEMA's Smart Grid strategic initiative including interfacing with electrical utilities, manufacturers, State and Federal agencies, and the U.S. Congress. Prior to coming to NEMA, I had an established career in the communications industry building data networks in Top Secret environments and large, commercial public networks for the internet divisions of both BellSouth in the southeastern U.S. and globally for WorldCom. More recently, I spent time working with artificial intelligence systems in several Federal programs dealing with systems of systems, intelligence analysis, and National defense. Having this background has been a good fit for Smart Grid as we seek to bring additional communications and intelligence to the electric grid. I was the first plenary secretary of the NIST Smart Grid Interoperability Panel (SGIP), founded the SGIP's International Task Force, participated in the cybersecurity committee, and served as the founding director for SGIP's industry-operated successor SGIP 2.0, Inc. I've also served as secretary of the U.S. Technical Advisory Groups for the International Electrotechnical Commission (IEC TAGs) for the Smart Grid strategy group (SG3) and the Smart Grid user interface committee (PC 118). I was named to the Canadian Task Force on Smart Grid Technologies and Standards (TF-SGTS) and serve on the Carnegie Mellon University Software Engineering Institute's Smart Grid Maturity Model (SGMM) stakeholder panel. NEMA believes this hearing is incredibly important. Our Nation faces unprecedented cybersecurity threats that endanger not only our way of life, but our very health and safety as well. One year ago Superstorm Sandy struck the eastern seaboard and had a devastating impact on so many lives and the economies of a wide swath of States. Sandy brought out the best in our first responders, emergency managers, Government officials, and everyday Americans. The electric grid is essential to public health and welfare. So when Sandy knocked out power for millions of Americans, first responders, utility operators, and emergency managers sprung into action. Restoring power is part and parcel of emergency management. Of course, it is not difficult to imagine a scenario in which the electric grid is shut down not by a natural disaster but instead, through a cyber attack. Whatever the cause, resilient and reliable power is critical for first responders, communications, health care, transportation, financial systems, water and wastewater treatment, emergency food and shelter, and other vital services. Much of our electric grid was built in the 20th Century but is facing 21st Century threats. New technologies are being manufactured and implemented today to transform the grid. When smart technologies are in place, power outages are avoided or minimized and lives, homes, and businesses are better protected. the smart grid's role In much the same way as new information and communications technologies are reshaping how we work, learn, and stay in touch with one another, these same technologies are being applied to the electrical grid, giving utilities new ways to manage the flow of power. A Smart Grid is an electrical transmission and distribution system that uses technologies like digital computing and communications to improve the performance of a grid, while enabling the features and applications that directly benefit the consumer. A Smart Grid is not an all-or-nothing proposition; there are gradations of ``smartness.'' As the electrical grid is modernized with advanced technologies, it becomes smarter. Given the diversity in electrical systems and the wide range of available Smart Grid technologies, there is no one method to measure the smartness of an electrical system. What matters is performance. The basic operation of Smart Grid technologies is designed to give the utility company and the consumer (residential, commercial, and industrial) more control over the electricity supply. On the consumer side, this means more information about--and thus greater control over--the charges that appear on individuals' electric bills. For utility companies and other grid operators, this means acquiring better situational awareness to know what is happening on the grid and to better manage it. By applying information and communications technologies and basic computing power to the electrical grid, utilities can not only minimize the footprint of an outage, but also identify those affected, shunt around downed power lines to increase public safety, and enable faster restoration of services. For example, when disturbances are detected in the power flow, modern circuit breakers can automatically open or close to help isolate a fault. Much like a motorist using his GPS to find an alternate route around an accident, this equipment can automatically route power around the problem area allowing electricity to continue to flow to the customer. Circuit breakers and other electrical devices in the field have the ability to communicate their status to help utilities identify potential problem areas, including outages or conditions that might result in an outage. Coupling this kind of automated activity with feedback from advanced electric meters would help restore service to the greatest number of customers even before the first truck rolls out of the utility service shop. The Cyber Threat and the Electric Power Industry's Response Like any infrastructure that is connected to a network, the electric grid faces cybersecurity threats which are increasing as each day goes by. Protecting the Nation's electric grid and ensuring a reliable, affordable supply of power are the electric power industry's top priorities. Cybersecurity incidents have the potential to disrupt the flow of power to customers or reduce the reliability of the electric system. Key to the success of this effort is the ability to protect the grid's digital overlay against interruption, exploitation, compromise, or outright attack of cyber assets, whether through physical or cyber means, or a combination of the two. The electric power industry takes cybersecurity threats very seriously. While new digital automation and technological advancements can introduce new vulnerabilities, these technologies also provide better situational awareness and help detect threats before an attack. As such, protecting the grid requires a collaborative effort among electric utility companies, the Federal Government, and the suppliers of critical electric grid systems and components--both hardware and software. Utilities are required to deliver affordable, reliable, and secure electricity, while manufacturers have an obligation to ensure that the same qualities are present in their equipment. An infrastructure as massive as the electric grid which has been referred to as the world's largest machine cannot be simply taken out and replaced with the ultimate in cybersecurity. In other words, we cannot ``gold plate'' the entire electric grid, implementing the highest levels of security at every point along the distribution network. But a few techniques that have proven to be effective in sensitive operating environments in the Nation's Information Technology (IT) infrastructure will help ensure greater resiliency. The first is segmentation. In order to control the cost of deployment, regulators need to consider the overall security architecture in their rulemaking decisions. As with the electric grid itself, the ability to isolate security issues and insulate core grid functionality from their effects is equally important as the strength of the security measure. A second is layering. As with segmentation, the aspect of security layering needs to be considered during rulemaking. Individual security measures should not be considered in a vacuum, but rather in the context of how they contribute to the overall security architecture of the system. It would be important to define rules and guidelines for the levels of layered security required as a function of the criticality of a device, its functions, the impact on the surrounding segments of the grid, etc. A third is decentralization. When we think about the computing environment of the 1960's, 70's, and 80's, it was dominated by mainframe systems and centralized control of information and processing. With the advent of the personal computer, this migrated to a much more decentralized model in the 1990's and beyond making access to computing resources much easier and more reliable for everyone. The same hold true with electricity as distributed generation, energy storage, microgrids, and net-zero energy designs and technologies become more available. When an outage strikes, the effects often stretch far beyond the initial impact zone. Regional outages inhibit the ability to protect those in danger and provide basic needs such as food, sanitation, and shelter. We could recover more quickly if islands within each area could maintain power and serve as centers for critical services and recovery. A microgrid can isolate itself via a utility branch circuit and coordinate generators in the area, rather than having each building operating independently of grid and using backup generators. Using only the generators necessary to support the loads at any given time ensures optimum use of all the fuel in the microgrid area. Importance of Codes for Grid Resiliency Of course, electric infrastructure isn't only transmission lines, substations, and transformers. It doesn't stop at the electric meter outside the building. Indeed, you could argue the grid extends to any end-use device you have plugged into an electrical outlet. Buildings consume some 70% of all energy produced and are the place where so much of modern life exists. Emergency managers should recognize the importance of adopting the latest electrical code. The National Electrical Code (NEC) ensures that new construction and major renovations are built with the latest technology; which will make a facility as safe as possible for either those who become trapped in it during the emergency as well as the first responders who may have to breach the building envelope in order to stage a rescue operation. A robust emergency plan involves ensuring that updated codes are in place today to improve the outcome should disaster strike. A corollary here is the energy efficiency of a building; energy codes establish baseline levels of efficiency. In the event of cyber attack, the best-prepared buildings will have a degree of back-up generation or may be part of a microgrid which is connected to some back-up generation. It stands to reason that a given amount of generation during the wider grid outage will be able to power more critical electrical loads or a given number of electrical loads for a longer period of time, as those loads' levels of energy efficiency are improved. In other words, energy efficiency allows us to do more with less during a grid outage. NEMA is encouraging States and localities to stay current on code adoption. Recent Congressional Activity Some recent Congressional activity is worth noting. Speaking of energy efficiency, Sen. Gillibrand has legislation which amends the Stafford Act to allow a recipient of assistance relating to a major disaster or emergency to use the assistance to replace or repair a damaged product or structure with an energy- efficient product or energy-efficient structure. When disaster strikes we should take the opportunity to prepare for future disasters by rebuilding the smart way, and energy efficiency is part of this, as described earlier. Emergency managers and State and local officials are on the front lines for weeks after a major disaster. Often they are supported by the Federal Government in terms of resources, coordination, and manpower, but also in terms of funding to rebuild. In the wake of Superstorm Sandy, NEMA encouraged Congress to allow Federal rebuilding funds to be used not only to replace damaged electrical equipment but to replace it with advanced technologies that allow the grid to become more resilient going forward. The Senate version (H.R. 1, 112th Congress) of the Sandy Supplemental appropriations bill included the following language. ``SEC. 1105. Recipients of Federal funds dedicated to reconstruction efforts under this Act shall, to the greatest extent practicable, ensure that such reconstruction efforts maximize the utilization of technologies designed to mitigate future power outages, continue delivery of vital services and maintain the flow of power to facilities critical to public health, safety and welfare.'' Unfortunately the bill that passed the House and was signed into law did not include such language. This approach should be considered in the any future disaster bill as a way to boost the resiliency of the electric system and ultimately lessen the impact of cybersecurity and other grid-impacting events. Finally, on a much broader level, NEMA believes that Congressman Donald Payne's SMART Grid Study Act (H.R. 2962), which authorizes a study of the costs and benefits of developing a Smart Grid, would go a long way in proving the case--to those who remain unconvinced--that the Smart Grid is an investment worth making to make the electric grid stronger, safer, and more resilient. Investment in the Smart Grid is happening today across the country and around the world. Yet policy barriers remain to its full implementation. A comprehensive study such as this, to be conducted by the National Research Council with input from the Department of Homeland Security and other relevant agencies, includes an in-depth review of the vulnerabilities of the electric grid to cyber attack. the importance of industry-led standards In addition to the obvious human toll a breach in cybersecurity could bring, from a manufacturers perspective it could involve countless hours of research and development staff time, contractors, and consultants, which would be a considerable financial burden on the utilities and manufacturers alike. The implementation of those patches would involve potential changes to the manufacturing process, deployment of patches to the installed base, product recalls, rebates and many other expensive options, not to mention the potential for lawsuits, both valid and frivolous, based on the potential outages described above. An additional interest of the manufacturers is standardizing on common approaches to cybersecurity across utility areas of control as well as State boundaries. It is critical to invest the time and resources upfront to select the optimal architecture, minimize risks, and attain a reasonable balance between costs and security. Additionally, there exists a need for States to work together in order to provide utilities with a uniform security implementation approach. If public utility commissions do not lead with a common approach, then it will be very difficult for utility companies, manufacturers, the National Institute of Standards and Technology (NIST), and Standards Development Organizations (SDOs) to coordinate their security standards development efforts increasing the level of difficulty for manufacturers to provide interoperable solutions. The corresponding drop in interoperability could also lead to a lower quality of service to electricity customers. The key to achieving the kinds of success described in this testimony is to rely on proven, industry-based standards. NEMA, along with a number of our NGO peers retains accreditation through the American National Standards Institute as a standards developing organization (SDO). Products made from consensus-based industry standards are the first step in achieving interoperability. Smart Grid Interoperability Panel: Private-sector-led Voluntary Standards Processes for Cybersecurity Because we live in an increasingly-connected world, interoperability has become a bedrock concept. The NIST effort through their Smart Grid Interoperability Panel (SGIP) focused on industry standards and their role in delivering the features and functionality for Smart Grid. Consensus-based standards ensure that devices achieve a minimum level of performance, whether that is in terms of safety or electricity delivery, with consistency and reliability. They also provide a uniform management information base (MIB) that allows operators to seamless trade management data to achieve successful operations in the segmented, layered, and distributed environment described above. Industry-based security standards further ensure that security measures can be properly vetted by the global security community. The practice of ``security by obscurity'', where security measures were individually developed and implemented without review, is not nearly as reliable as a publicly-tested and fully-vetted security scheme. Identifying cybersecurity standards through a body like NIST allows manufacturers to make sure that cybersecurity is built into the productions and solutions they offer rather than being bolted-on by the grid operator at installation. NIST Cybersecurity Framework The recently-released Executive Order for cybersecurity in the critical infrastructure (EO 13636) provides a template for the relationship between industry and Government. EO 13636, along with its predecessor legislation the National Technology Transfer and Advancement Act (NTTAA, Pub. L. 104-113) and its implementation through OMB Circular A-119 describe the role of Federal agencies for securely implementing information technologies in the Federal Government. Essentially these laws stipulate that the Government shall use industry standards to the greatest extent possible, vetted through NIST, and installed under the practices identified by the sector-specific Federal agency. The NIST framework developed under the guidance of EO 13636 adheres to this convention establishing an effective public-private partnership for the implementation of cybersecurity measures in critical infrastructure. Incentives for Voluntary Participation in NIST Framework and/or Information Sharing As we've seen in the information technology industry, information sharing about persistent electronic threats is a key component of security performance. When an electronic attack is in process, companies like Internet Security Systems and Dell SecureWorks detect and analyze those threats and provide that threat information to their customer base. The only way they can be successful in this is if their customers openly and willingly provide threat and attack information to them. In order for threat analysis of critical infrastructure to be successful, electric utilities and others involved in the electricity supply chain need to be similarly forthcoming. This may mean that some form of inducement may be necessary in order to secure maximum participation. These don't necessarily need to come in the form of tax policy or direct financial incentives from the Federal Government, but something as simple as liability limitations for manufacturers and grid operators who have access to threat information that share it willingly with DHS or the appropriate sector-specific agency. Privacy NEMA member companies are dedicated to the protection of electricity subscriber privacy and personally identifiable information (PII). This is another area where consensus-based industry standards will play a role. Effective legislation or regulation regarding subscriber privacy needs to be based on common terminology and privacy concepts. This has previously been applied to other areas such as patient information in the administration simplification section of the Health Insurance Portability and Accountability Act (HIPAA, Pub. L. 104-191). Adaptations of these principles should apply to the electrical subscribers. responding to a cyber event A front-line resource from the manufacturers of electrical equipment during any emergency is the NEMA Field Representative Program. NEMA field reps are building code and electricity subject matter experts. As experience masters in electrical systems, they have the kind of jack-of-all-trades knowledge necessary to deal with emergency situations. The NEMA field reps serve as a gateway to all 400-plus members of the association and can provide company- and product-specific advice as well as contacts within member companies who can help respond. The member company technical resources can then work with their utility company customers to safely restore power and ultimately repair the damage. National Planning Scenarios Must Focus on Interoperability DHS's work on the National Planning Scenarios gives them an appropriate entry point into the cybersecurity policy discussion. Scenario 15 of the National Planning Scenarios is titled ``Cyber Attack'' and includes the following General Description: ``This scenario illustrates that an organized attack by the Universal Adversary (UA) can disrupt a wide variety of internet-related services and undermine the Nation's confidence in the internet, leading to economic harm for the United States. In this scenario, the UA conducts cyber attacks against critical infrastructures reliant upon the internet by using a sophisticated C2 network built over a long period of time.'' This, coupled with their role as defined in EO 13636 makes DHS the ideal place to host the analysis and evaluation of emergency preparedness testing for all elements of the critical infrastructure based on the current global threat profile. NEMA has worked with DHS in this capacity in the past including a contract for the Digital Imaging for Communications in Security (DICOS) protocol associated with TSA electronic screening systems for airport operations. Two important features of DICOS are that it contains the appropriate protections for information privacy (being based on a corresponding medical imaging protocol named DICOM), and that an integrated threat model was part of the design consideration. Essentially all of the tools and roles for DHS exist in other contexts, so the challenge will be to bring them together for the participation in cybersecurity event management. A future consideration should be a large-scale virtual exercise to test our response capabilities under the cyber-attack or natural disaster planning scenarios, or a combination of the two. The military performs this kind of exercise frequently with great success. It would be a good idea for us to figure out how we can structure a counterpart under DHS for the civilian agencies and companies associated with the critical infrastructure. Performed in real time, DHS can inject cyber events into the scenario exercise that would stress the communications and management capabilities of infrastructure service providers as well as Federal, State, and local agencies. The participants would then be compelled to respond to make sure they had the appropriate protections and contingency plans in place. In closing, let me restate NEMA's commitment to improving the resiliency of the electric grid. We are willing partners with Government and industry in the effort to protect Americans from the threat of cyber attack and to help our country respond when disasters strike. Mrs. Brooks. Thank you, Mr. Molitor. I now will recognize myself for 5 minutes of questions. Like to start out with Ms. Stempfley. The After-Action Report for the National Level Exercise 2012 was released this summer. Can you please give us an update on the Office of Cybersecurity and Communications' efforts to work with other Federal agencies--specifically FEMA--as well as the State, local, and private-sector stakeholders to address the issues that were identified after this cyber exercise? Ms. Stempfley. Thank you, ma'am. Yes. Absolutely. The National-Level Exercise was the first exercise where we had a cyber and physical scenario performed at this level. It was the attempt to bring together all of our stakeholders and look at how clear we had put roles, responsibilities, and execution and resources towards the specific problem. We were pleased to learn a number of lessons from that exercise, to include how to partner and the role the private sector must play in this very important mission area. We have been undergoing a series of after-action activities, which range from the development of specific, more- focused exercises and action plans so that when a particular event might occur either in a sector or at a location we have playbooks available for that. These are being developed as a community, so not just DHS with FEMA but DHS with our stakeholder partners in the private sector, as well, with State and locals and other activities. As a matter of fact, we worked with the energy sector to execute what we called the Poison Apple exercise not too long ago, which was one of these exercises testing a playbook of a particular scenario in the electric sector. Mrs. Brooks. Specifically, I am glad you bring up the electric sector, because as I mentioned, I just met with representatives from our energy sector just this last month and an issue that they brought up, which actually came up in a mark-up of bills yesterday, involved security clearances and the difficulty and the backlog in the issuance of security clearances for the private sector. Can you please discuss that issue a bit and whether or not you are aware of the clearance backlog on the issuance process and are there anything that we can do to help you address-- because it was my understanding from--and I had a number of private-sector companies that expressed that frustration, and it seems to me that if we are truly going to have this partnership, particularly with respect to a response, can you address this issue of security clearances? Ms. Stempfley. So one of the things that we all know and my colleague pointed out is we are not going to clear ourselves into solving these problems. So we are actively working on share lines and reducing information to FOUO and Unclassified activities. That is not to say that there are not times when clearances are required nor are we walking away or any of that from the security clearance issue. My colleague, the assistant secretary for infrastructure protection, is very focused on this. Respectfully, I would like to take the question for the record and have her help---- Mrs. Brooks. Who would that be? Ms. Stempfley. Caitlin Durkovich. Mrs. Brooks. Okay. Thank you. We would be very interested because it appears to be an issue that is causing a lot of concern in the private sector and we certainly respect the importance of security clearances but we must find a way to communicate and work together. Ms. Stempfley. Yes, ma'am. Mrs. Brooks. Thank you. Like to ask Mr. Sena: When you talked about the fusion centers--and I have visited my fusion center and also would encourage others on the committees to visit their fusion center--yours is one of the small number of fusion centers in the National Network proactively incorporating cybersecurity into its mission, and I applaud you for that. What Federal, State, and local partnerships have you developed to help the NCRIC contribute to this important mission? Mr. Sena. Thank you, Madam Chairwoman. As far as the development of our fusion center capability-- sorry. Thank you. As far as our--still getting a little feedback here, but-- the development of our center, we have been able to work closely with actually centers across the country to develop a cyber information network for exchanging information and then developing partners from the private sector to collaborate and actually provide them with timely information as well as working with our Federal partners from the FBI, from our partners in the Secret Services who are working the criminal angles of cyber threats, to be able to develop a network. We are actually in the process right now of bringing in private-sector personnel to support that effort so that they are in an environment where we can share that information with them and develop products that they need. We have been working on that over the past year-and-a-half to develop a program and we are working right now to that National pilot to involve other centers and really develop centers of analytical excellence in the field of cybersecurity. Mrs. Brooks. Well, we look forward to you sharing that work with other fusion centers around the country. I see that my time is expired and I am now going to recognize the gentleman from New Jersey, Mr. Payne, for any questions he might have. Thank you. Mr. Payne. Thank you, Chairwoman Brooks. First I would like to thank Ms. Stempfley for discussing the New Jersey pilot project with critical infrastructure and emergency managers. I am very interested in learning, you know, about the pilot and hope that you can come back and discuss that with me at a later date. Let's see. This question is for you, as well. Each witness here has discussed the urgent threat a cyber attack poses and that it is critical that the Government and the private sector take immediate action to beef up its cybersecurity efforts. Earlier this month the Government was shut down for 16 days and I am interested in learning how that affected our cyber activities. Can you discuss how the Government shut-down affected cybersecurity efforts and which programs were furloughed and what projects were delayed as a result of that? Ms. Stempfley. Certainly the Government shut-down was a traumatic event for the staff in the Office of Cybersecurity and Communications. Important functions that were considered exempt associated with immediate loss of life or property were sustained during that period, including functions in the National Cybersecurity and Communications Integration Center, so our important information-sharing activities on threats that were on-going in that moment continued during this time frame. Unfortunately, we had to suspend efforts in some other important activities, including workforce development, including outreach and awareness, and including engagement with many of our partnership and stakeholder engagement efforts. So all of our sector-coordinating council activities and planning activities were suspended during this time period. Mr. Payne. Okay. So those are the programs that were furloughed? Ms. Stempfley. Yes, sir. Mr. Payne. Okay. So how did it affect us in terms of our ability to thwart off these attacks? Ms. Stempfley. We focused during the furlough period on those efforts that were instantaneous or immediate--those monitoring of Government networks against threats and protection and defense measures about activities that were currently on-going. No progress was made during that period on programmatic activities and so future efforts nor planning activities occurred. So during this period we were required to focus exclusively on the near-term and real-time efforts of the Department. Mr. Payne. So we could only focus on what was right before us at that time. Ms. Stempfley. Yes, sir. The requirement was we had to consider as exempt activities only things were about the immediate loss of life or property. Mr. Payne. Would you consider us being more vulnerable at that time? Ms. Stempfley. It certainly was a time where there were not as many eyes on the Federal networks and it was a period where the vulnerability and the threat environment are something we are concerned about. Mr. Payne. At our full capability do you feel there are enough eyes on it when we are at full deployment? Ms. Stempfley. I don't believe you will hear anyone from the Office of Cybersecurity and Communications acknowledge that the resources in this particular mission area are commiserate with the threat that we undergo, and so there certainly is more work to be done in that area. We have important programs, including continuous diagnostics and mitigation and the Einstein programs, which are a part of helping put automation into the Federal networks, and the Enhanced Cybersecurity Service, which is about helping to share information for protection with critical infrastructure. Mr. Payne. Okay. Thank you. Mr. Molitor, as you know, I have been a strong proponent of smart grid technology. Can you talk about how smart grid technology will improve resiliency in the event of a cyber incident? Mr. Molitor. Yes, sir. Thank you. The nature of a smart grid--and it comes from those performance objectives that were laid out by D.E., the whole idea that the grid should be able to react to disturbances and be somewhat self-healing. So the idea that if a cyber attack happens when the more intelligent grid than what we have today will be able to do is to be able to shunt around the areas that are affected. It doesn't matter whether that is an effect that is caused by a natural disaster, a man-made disaster, or a cyber attack. So ideally what we want to do is contain the damage, and Madam Chairwoman this morning cited the television program this weekend, and that is an example of a cascading event, and what we really want to do is avoid that and that is what the technologies through the smart grid will enable. Mr. Payne. Right. So in layman's terms, I, you know, was interested, you know, when you say you have a blackout at your home, you contact the utility, utility has to contact workers to go out to your home and start from that point and work their way back. Mr. Molitor. Right. Mr. Payne. What the smart grid technology would allow is almost for that affected area to contact the utility to say, ``There is a problem in this area,'' which alleviates that working back and finding the issue and then figuring out what was wrong and then correcting it and getting it--so the smart grid technology would allow us to be proactive in protecting the grid and almost alerting us prior to the issue being created. Mr. Molitor. Yes. Absolutely. The analogy that we have used in the past is like the dashboard on your car. You know, you have got the regular speedometer, tachometer, all of the things that tell you how the grid is functioning at the time. But what we are really adding with the smart grid are the idiot lights--the things that come on when your oil pressure gets dangerously low and those kind of things. So yes, those are the automated notifications that can come off the grid and it can actually tell the emergency response crews in the utility companies where to go in order to fix and restore power to the greatest number of people. There is a great example from Vermont Electric Cooperative, who was hit by Hurricane Irene in 2011 and then again by Hurricane Sandy in 2012. They had rebuilt smart in the interim period, and so they had a much easier time restoring service and they had much fewer consumers who were affected as a result of Hurricane Sandy than they were during Hurricane Irene. So we know that it works just exactly the way you described. Mr. Payne. All right. Thank you. Mrs. Chairman, I yield back. Mr. Meehan [presiding]. I thank the gentleman from New Jersey and I want to thank each of the panelists for being here. I am pleased to share the podium today with my colleagues from both sides of the aisle but particularly Mrs. Brooks. She and I served together as United States attorneys prior to our service in Congress, and as a result of that had the opportunity to work with a number of the fusion centers and others in the beginning of the process of creating what we hoped would be a robust capacity to respond to threats of terrorism both on the National as well as the local level. One of the things that is eye-opening has been the tremendous success that has been realized in this country by virtue of, since September 11, we have been relatively free of the same kind of scope of a threat actually carrying itself out. But we have seen so many of the natures of the threats change, and I think this area of cyber is the one that probably creates, in my mind, the greatest concern. So there is a lot of effort that is going on and I am interested in hearing a little bit about your perspectives. Let me start with you, Mr. Molitor, first. Just, you know, we have spent a great deal of time working here on cyber legislation, the purpose of which is to ease the ability for the private sector to communicate in a meaningful, two-way communication through the National--what we call the NCIC, the Cyber Information Center, with real-time information, and also the ability for you to be able to work it through in a way in which there are protections for sharing information and otherwise. Have you had a chance to look at some of the proposed legislation and do you have any sense as to whether it would be beneficial to member companies like your companies within your organization and others similar across the country? Mr. Molitor. Yes, absolutely. We are at the tip of the spear--the electrical manufacturers--in terms of cyber attacks. So when the attack comes in they are going after our members' gear as it sits in the electric grid. We need to be able to capture that information and then forward it, so that the folks at the fusion centers and the other panelists at this table can respond and react to it. So it would be extremely helpful, just in terms of clearing the communications. During my opening testimony I mentioned something about how industry-based standards are the best way to do that. So we have to be able to communicate across multiple entities, between the electric utilities, between the Government agencies. So yes, absolutely. It would be most helpful so that we know how to communicate with each other so we can standardize the messages and respond to the threat. Mr. Meehan. Well, we are already dealing with it in real time, and I appreciate that. I think one of the realities is there is almost a triage, as you often do when you are dealing with an issue, and because of the threats that took place against the banking system and the, you know, in New York and other kinds of sort of major threats, the concern has been how we alleviate the potential for the drastic attack. But there is a lot of things that are going on that are impacting, as I think was well-articulated, State and local authorities who have a great deal of information, have a great deal of assets, are equally being probed, and otherwise. So how are things working today with regard to the sharing of information? You have expressed some frustrations and some hopes, and I would like you to spend a little bit more time saying, well, suppose something happens right now. Mr. English, Mr. Orgeron, and Mr. Sena, you are already, in various capacities, your fusion centers are working with some of the State and local organizations. Let us say you have an enterprise from another country--a criminal enterprise that is probing your data systems. How are you communicating today and what is it that allows you to work effectively together, or not? Mr. Orgeron. Mr. Chairman, from a CIO perspective, I think that we are communicating with our fusion center. But one of the things that we have advocated is governance structures that are more clearly defined in terms of paths of communication. The cyber component is, for all intents and purposes, is sort of the newer thing that we are adding into these threats, building into the processes that exist. So if there is an emergency management plan there should be a cyber annex to it in terms of key actors and what the roles those actors have---- Mr. Meehan. Are you telling me now that that is what your concern is, that that is not clearly identified right now? Mr. Orgeron. I don't think that the governance is clearly identified across the States from a CIO perspective. That is certainly something, when we worked with NEMA and the National Governors Association in the cybersecurity call to action, that we certainly advocate. Governance was the top of the list in terms of paying close attention to authority and responsibility. To your point about that, you know, what is happening at the State level, how those flows of communications are happening is something that we still think needs effort. Mr. Meehan. What is your idea of a way to make it work? Mr. Orgeron. I think you have to have a framework, and I think the framework has to be something that can be easily communicated in---- Mr. Meehan. What would it spell out? Mr. Orgeron. Well, as an example, one of the things from a technology perspective is the NIST framework. Mr. Meehan. Yes. Mr. Orgeron. You know, a more common framework with which you can have a very effective conversation---- Mr. Meehan. Have you been following the meetings that have been taking place in California and other places and you are satisfied that they are working towards that direction? Mr. Orgeron. It certainly seems so from the CIO perspective. Mr. Meehan. Good. Good. Mr. Sena. Mr. Sena. Yes, sir. Mr. Chairman, we do have an issue. You know, it took us a long time to get suspicious activity reporting worked out with a unified message, and there is currently a unified message task team working on the issue of cyber. But at the National level we have six different cyber centers and people are all saying, ``Well, who do you call?'' Right now the message that is being developed, ``Call any of them.'' Mr. Meehan. Is this among your fusion centers--six of them are cyber centers, as well? Mr. Sena. This is Nationally, at the Federal level--those different cyber centers that--and trying to work on who do you call? Mr. Meehan. Who do you include as the National cyber centers? Because one of the parts of the legislation--and Ms. Stempfley's working very, very hard on this with DHS--is to create the NCIC as that central point, which everybody knows they go to one place. Mr. Sena. Well, we have the NCIC and then there are investigative--National cyber investigative joint task force that is out there along with some of the other organizations that we have that have investigative responsibilities and agency responsibilities within their organizations. Mr. Meehan. Who would you consider to be among them? Mr. Sena. Within DHS, within FBI, within Secret Service---- Mr. Meehan. You are not trying to say there is any kind of jurisdictional issues going on among the Federal agencies---- Mr. Sena. Not at all. They are working very diligently together but it still causes confusion. At the local level when you ask folks--when you go to an organization the companies that we have brought in said, ``Who do you call?'' and they go, ``We have a rolodex of 100 people.'' Mr. Meehan. Well, that is just counter to any kind of effective capacity to do things, isn't it? Mr. Sena. Absolutely, sir. That is what we have been striving to do is to say, all right, let's create a unified message on where this information should go--and not just the telephone calls, but also the machine-readable information. This information moves quickly. The threat moves quickly. We have to respond to that as quickly. Mr. Meehan. In fact, and I am--my time is up--but that is actually, in real time we do not have the ability, if we are responding to a threat which is happening in the cyber world, to rely on telephone calls to do it. It needs to be, in many ways, as they say in the old days, machine-to-machine to be able to mitigate these things, and oftentimes just identifying the nature of the threat, where it is emanating from and how we alleviate it in and of itself requires that kind of tremendous engagement. Mr. Sena. Absolutely, sir. Mr. Meehan. Well, I am grateful. That is a very, very good point. We are appreciative of your testimony today because this is exactly the kinds of things that we need to be able to look at to create that connection that works effectively, and that is something that we will work towards. I am going to, appropriately, if you know anything about-- Mrs. Brooks is going to take over the chairmanship of this hearing again. I am going to get back in my rightful place to her right. So at this point in time I will return the chairmanship of the hearing to Mrs. Brooks and I thank you for your testimony. Mrs. Brooks [presiding]. Thank you, Chairman Meehan, for sitting for me while I quickly went to another hearing. This happens to us occasionally here as Members of Congress. We are called to other hearings that are also important and I actually may be called back because they were not ready for me. So we may be doing this musical chairs once again. I now will, I believe, recognize the gentleman from Mississippi, Mr. Palazzo, for 5 minutes of questions. Thank you. Mr. Palazzo. Thank you, Madam Chairwoman. Again, I want to thank the chairs for holding this joint hearing. I believe that cyber attacks could be as devastating as 9/11 and more widespread. Just look at what happened a few weeks ago in Louisiana when the EBT card system went down for just a few hours. Widespread panic and confusion ensued. Just imagine what a cyber attack on our power grids or utilities would do to the stability of this Nation. It is vital to America's interests to address our cybersecurity risks sooner rather than later. I think we must utilize all of our resources in preparing and responding to a cyber attack. It is not a matter of ``if''; it is a matter of ``when'' that will happen. I believe a good resource we could use is our Nation's National Guard. I am a proud original cosponsor of H.R. 1640, the Cyber Warrior Act. This bill establishes a cyber and computer network incident response team within the National Guard of every State and the District of Columbia, allowing the National Guard to assist in responding to cyber attacks. It would also allow the Governor of the State to activate the incident response team to help train State and local law enforcement and other responders in cybersecurity and help them develop best practices. I am going to ask all the questions to weigh in on what they think of that bill and the utilization of the National Guard. But before I do that I would like to ask Dr. Orgeron, could you speak to what Mississippi has done to prepare for a cyber attack? Mr. Orgeron. Thank you, Congressman. Be happy to. One of the things that we advocate at NASCIO and that we have done in Mississippi is risk assessment. So with the help of the Department of Homeland Security, in August of this year we had a tabletop exercise in our State. That tabletop brought in multiple agencies, our fusion center, and others to kind-of run through a scenario--multiple scenarios over about 2\1/2\ days. It is in our document--in our call to action document that NASCIO worked with with NEMA and NGA. One of the things that is advocated is looking at what that risk portfolio looks like. I will tell you that the outcome of that table-top really proved out some of the things that we have talked about here today--the fuzziness in some instances of understanding who needs to communicate with who, where those lines of authority and responsibility start and stop. We were very appreciative to the Department of Homeland Security for coming down to our great State and working with us and facilitating that process. We found it of great value. It is one of the things that made its way into the call to action of States doing those kinds of exercises, so I certainly would advocate for that. I think the great State of Mississippi has benefited from it. Mr. Meehan. Will the gentleman yield for 1 second on this? Mr. Orgeron-- Mr. Palazzo. Can you give me extra time towards--fantastic. I yield to the Chairwoman. Mr. Meehan. I just cleared that with the Chair. Did you do an After-Action Report after you---- Mr. Orgeron. I believe my chief security officer did, yes, sir. Mr. Meehan. Would you make that available to us, please? Mr. Orgeron. Of course. Mr. Meehan. I would like that. Thank you. Mr. Palazzo. Dr. Orgeron, did the State CIOs typically have access to Top Secret security clearances to help protect their State from cyber attacks? Mr. Orgeron. No, sir, typically not. It is my understanding that there are, I believe, two designated in each State--of course the Governor, many times it is the director of homeland security or potentially public safety. NASCIO certainly advocates that, given the rise of the impact of cyber that the State CIO be considered if more clearances were going to be allocated. Mr. Palazzo. So you say States get two clearances? Mr. Orgeron. That is my understanding, Congressman. Mr. Palazzo. Ms. Stempfley, would you like to add to that, and why they only receive two security clearances? Ms. Stempfley. Sir, I am not familiar with the limitation in that situation. I know we have actively worked to get clearances at the Secret level for State CIOs so that we can share the threat information, and generally that includes fulsome content for protection measures. So we have been actively working with NASCIO and others to get State CIOs cleared at that Secret level. Mr. Palazzo. Well, I have been to the TS/SCI process and I know it is lengthy, but you don't want to cut corners because you do want to make sure we have the proper people accessing that information. So, of course, if we could lift any undue restrictions that would be nice so the States can be well prepared to access these threats. If I may sneak in a question, you know, begin the utilization of the National Guard, the Cyber Warrior Act, if--I would just like if you all would want to share your thoughts? I will start with Mr. Molitor on the end, a fellow soldier. Mr. Molitor. Yes, absolutely. I spent some time in the Wisconsin National Guard so I appreciate that. That is an ideal place. When I heard it earlier during the testimony I thought that is an ideal place to house that kind of capability because that State Governor can call on the National Guard for the response locally. That is where you bring together the civilian assets, the intelligence assets, and also the military assets to address natural disasters. I was actually called out one time after a tornado in Wisconsin for recovery efforts, so it is the same kind of thing in my previous testimony, where the parallels between natural disasters and cyber attacks are--it is the same impact on the citizenry, and that would be a great place, I think, to house that kind of capability on each State. Mr. Palazzo. I definitely agree with you. I guess we will keep going down anybody that wants to volunteer until the Chairwoman takes away my time. Mrs. Brooks. Important topic, so---- Mr. Sena. From the fusion center perspective, and also being a high-intensity drug trafficking area director in my center, we have had great support from the National Guard. They have been very good. That is the one thing that we are lacking--those folks that can go out there and help support, either through assessments or actually in reacting and responding to the threat issues. Every day we are bleeding a million cuts from the cyber attacks. They are doing telephone denial of services combined with cyber attack on institutions and really cutting us to the core. They move much quicker than we can. But having the Guard, having additional resources to deal with those threats is tremendous, so I appreciate that. Thank you, sir. Mr. Orgeron. Same sentiment, Congressman. I know Chairwoman Brooks mentioned in the beginning, Maryland. Maryland is one of the States highlighted in document that has a relationship with our National Guard. My own personal experience post-Hurricane Katrina was the formation of a wireless commission in our State, of which the National Guard had a seat at the table. We have built 144 towers across the State to communicate in the event of another disaster. That partnership has been wonderful for the States. I would certainly expect that this one would be equally as good. Mr. English. Congressman, we certainly support that in Georgia and our troops are readying for that mission as we speak. I would say, though, that we need to give consideration to it being a symbol, similar to the civil support teams and the homeland security response forces that are now known as a full-time effort on a daily basis that we can work with all the time versus a weekend-type assignment. Mr. Palazzo. That is a good point. Ms. Stempfley. We have heard this morning about the need for competent, skilled resources in the cyber environment. I know in the National Initiative for Cybersecurity Education we have really been focused on understanding the State and local needs in cybersecurity, as well. I understand the Defense Department and DHS and others are studying how to best apply these particular resources and these patriots to this problem. Mr. Palazzo. I want to thank our witnesses. Madam Chairwoman, I yield back. Mrs. Brooks. Thank you. A very important point with respect to the National Guard and the critical role they could play and that they do play in many States. I am going to start on our second round of questioning, and if I--and this is to Mr. English. As I mentioned in my opening statement, you know, I did watch that movie that aired--not certain if others did--the ``American Blackout,'' this past weekend, and it really did portray the physical consequences of a cyber attack on the electrical grid. One of the issues that was highlighted in that movie and that I actually had a discussion with folks in my district last week was the impact on hospitals. As a leader in emergency management, I recently visited with representatives from a hospital, and as I was getting a tour of this hospital, and particularly in the emergency department, we began talking about if there were to be an incident of a cyber attack and its effect on a hospital system. While the physicians talked about the fact that, you know, they have operated, you know, until most recently without electronic medical records and could certainly perform their duties, what they would have the most difficulty with were their diagnostic equipment--the imaging technology and all of the ability to get all of the diagnostics that they now are so accustomed to receiving in real time, very, very fast turnaround, whether it is test results or lab results. So I am curious from the emergency manager's perspective and the cybersecurity professionals, how do you coordinate with hospital systems and has there been a focus on that beyond making sure they have back-up generators and the fuel? What kind of coordination are we really doing with our hospitals? Because I have to tell you, this emergency department, while it has been discussed, I think they acknowledged and recognized that most have not really prepared for that possibility. Any discussion on that, Mr. English? Mr. English. Yes, ma'am. Whereas we can always do a lot more work--that is for sure--the NEMA, the association I represent, and the State public health directors have been, for the past 18 months, involved in a relationship where we meet at least twice a year with the leadership and discuss issues. Most recently, one of the issues that we are talking about are--is mission-ready packaging for hospitals so that in a disaster they have already quantified the type of assets that they need through our mutual aid compact that can go from one State to the next, or from a impacted area to a--or a non-impacted area to an impacted area. So I feel like the relationship is good. I am thankful that throughout the past 10 years that States have been able to get more capability with the grant programs that have been available, and certainly a lot of those have gone toward hospitals and readiness and communication. Now, the issue of the imaging and that type of thing, I am not familiar with that. But I do know that the dialogue exists. Mrs. Brooks. Well, and I--the hospitals certainly said they have done a tremendous amount of exercising on triaging and mass casualty events and so forth, but I think the possibility of truly a power--a significant and/or long-term power outage, I am just curious whether or not anyone else has discussed with their hospital systems this very potential possibility. Anyone else have any discussions with their hospitals or with their public health officials about that possibility? Mr. Molitor. Mr. Molitor. Well, I haven't had those specific discussions but there was an article in a magazine about 2 years ago focusing on a hospital in Japan in the wake of the tsunami there, and they had a micro-grid in place, and so this goes to Mr. Payne's point about the smart grid. A micro-grid is a self- sustaining--it includes electricity generation and also management for the load so that you can fuel critical loads like imaging diagnostics during an outage. So this whole idea of a micro-grid, a self-contained, powered administration unit within the hospital is a very real prospect. It exists today and there are hospitals, even in the wake of Hurricane Sandy, that were able to continuously operate in the middle of the rest of the area where the power was down because they had those kind of micro-grids, that smart grid technology in place. Mrs. Brooks. Do you have any idea roughly how many hospitals in our country might actually employ micro-grids? Mr. Molitor. I do not, but we have a medical imaging division within my NEMA--you have got two NEMAs up here; get a little confusing. Mrs. Brooks. Sure. Mr. Molitor. But we have a medical imaging division and I can certainly check with them to see if they have any data and report back. Mrs. Brooks. Okay. Thank you very much. At this time I will ask Ranking Member Mr. Payne if he might have any further questions. Mr. Payne. Thank you. Let's see. Mr. English and Mr. Orgeron--I am sorry. Mr. Orgeron. Orgeron. Mr. Payne. Orgeron. I apologize. Mr. Orgeron. That is okay. Mr. Payne. In 2013, the National Preparedness Report, States reported to FEMA that the lack of funding to develop robust cybersecurity capabilities significantly contributed to the lack of confidence in State cybersecurity capabilities. Can you talk about the role of Homeland Security--the homeland security grant money in developing State cybersecurity programs and how reduced funding levels have affected the States' efforts to develop those cybersecurity capabilities? Mr. English. The lack of funding I don't think--or the cutback in funding hasn't impacted that situation, in my opinion. I think Mr. Orgeron mentioned earlier that maybe if the grant guidance was a little broader and could entertain a more robust effort in the cybersecurity realm would be what we would like to see. Not necessarily more money, but maybe flexibility within the money that we get to be able to build out the cybersecurity assets. Currently in my State we do use grant money to provide cybersecurity analysts to our fusion center, but that is really a drop in the bucket on the financial side. Mr. Orgeron. Mr. Payne, we would agree. I mean, I think our basic position is that the formulaic nature with the way the grants work, it may not be as appropriate in terms of the cyber threat, and we think some alterations there, much to Mr. English's point, would benefit programmatically as a whole cyber initiatives in States. I should mention, too--it may be a good point to mention, too, that, I mean, the States are struggling with workforce issues as well. Not exactly related, but, you know, it is very difficult to recruit credentialed and excellent people. There is, I have been told, in essence nearly zero unemployment in this sector. So, you know, we have a very difficult time in recruitment, as well, which can impact mission. Mr. Payne. Okay. For you gentlemen, as well, with respect to the activities aimed at helping States prepare for, prevent, respond to, and mitigate the effect of cyber attack, what is the Federal Government doing well and what needs to be improved? Mr. English. I have got to sing the MS-ISAC praises. I think they are doing very well, and without great detail, had up-close and personal experience with their deployment to our State, along with our chief CIO--our CIO and the FBI and DHS and others. So I am more aware that that really worked well. Mr. Orgeron. I agree. We have a great relationship with MS- ISAC. Two other quick points: I mentioned our table-top cyber exercise that the Department--we got funding for, I think is a great, great tool at the State level to bring parties together to kind-of walk through, you know, exercises of various sorts. I think it is exceedingly beneficial to us. Mr. Payne. The other end, what needs to be improved? Speak now. [Laughter.] Mr. English. I really don't have a lot of heartburn with what is going on in the coordination effort. I think we always want to make sure that States and local governments are included in the plans before they are made so that we can have input and that we are at the table. As I mentioned earlier, creating those reasons to collaborate I think go a long way. Mr. Payne. So you say we are doing everything right? Mr. English. Out of ignorance, I would say yes. Mr. Payne. Okay. Mr. Orgeron. Well, you know, being the IT guy at the table, I think we want to be at the table when those conversations happen. I think it does vary from State to State on how those dialogues occur, but I think whether it is talking about the clearance issue or formulaic changes in grant programs, I think CIOs, or maybe even the chief security officers if not the CIO, certainly we would want them to be at the table during some of those dialogues, given the threats that we face. Mr. Payne. Thank you. Thank you, Mrs. Chairman. I yield back. Mr. Meehan [presiding]. Thank you. I appreciate the gentleman from New Jersey exploring those areas. Let me ask about the relationship that exists with the private sector, because one of the realities is 85 to 90 percent of the resources are really tied up in the private sector. We have heard numerous concerns about resources that are available, both with trained personnel and otherwise. Yet oftentimes--Mr. Molitor may be able to speak to--there are a lot of members of industries and others who have already made significant investment in individuals with skills who are there to--if we can share information appropriately--it also includes expertise. What is your experience in terms of--Mr. Molitor, you can jump into this question but I am interested in those who are representing State or fusion centers--what is your experience in terms of working with the private sector and how you are taking advantage of any of their assets or information sharing in your local regions? Mr. Sena. From my perspective I am probably the most blessed because my fusion center is in Silicon Valley area, so we have got some of the best technology companies in the world there. So we have got lots of resources and oftentimes they know better and more ways about dealing with a threat than we do in the Government or could ever think of. So trying to, you know, bring them on-board to make them partners with what we are doing in the fusion center, so that way when they ask us a question we can provide them with an answer. If they have the answer we can share that answer with others. They have, you know, bonded together over the last few decades in building Silicon Valley and the resources there, but the networks go well beyond there; they go across our country and across the world where they have, you know, resources. So trying to work closely with them, trying to give them those resources. The question always comes up about the clearances, and even within the fusion center ourselves, it takes us a long time to get our own people clearances, so but also trying to get them up to speed and actually physically bringing them in so we can give them briefings and actually help them solve these problems together. That is my goal. Mr. Meehan. So are there parts of your fusion center which include a regular seat from private industry as a member? Mr. Sena. We have. In fact, one of our first folks that we brought in was from the health care industry. So right now we are working with some of our power partners and utility partners to bring them into the center to get them the backgrounds, to get them the resources they need. Oftentimes some of these people already had worked in Government for one of the other, you know, organizations that dealt with cyber and now they are working for the private sector. So we are trying to use those resources they have to help us in our center. Mr. Meehan. Mr. Orgeron, are you working at all with the individuals in the private sector in your capacity? Mr. Orgeron. We do, Mr. Chairman. You know, States rely on telecom providers, big system integrators daily to get the work done in the States, so that reliance is absolutely there. I would expect not only in my State but in many of the States the need for dialogue and inclusion is imperative. Mr. Meehan. Have you worked with CERT teams at all? Mr. Orgeron. We have. Mr. Meehan. Have they been helpful? Mr. Orgeron. They have. Mr. Meehan. Ms. Stempfley, Secretary, you have been a stalwart supporter of efforts to do some of these things, but one of the council recommendations from your own advisory council was taking advantage of some of the skilled alumni in DHS, among other things, and there was an idea of trying to do outreach to make some of them available. Has there been any progress made in the idea of looking for those who have been in service at DHS and are no longer there but are still able to lend a hand at times of crises? Ms. Stempfley. I regret, sir, I am not familiar with the recommendation that you speak of. But one of the things we work very closely with is keeping in touch with both former DHS colleagues and those individuals in the private sector who are a part of the owners and operator community of critical infrastructure, particularly those in the IT, communications, energy, electric, and other sectors. I know you have been to our National Cybersecurity and Communications Integration Center, where we are very focused on integrating our private-sector partners into our operations activities and we work very closely with our private-sector partners in not just protection and planning efforts but in the response efforts, as well. Mr. Meehan. Yes. This was a recommendation that was called the Cyber Reserve Program that was run through DHS, and it may or may not be implemented. I know what happens. There are a lot of good ideas that sound--they get laid on your plate in the midst of all of these, and I just wondered if you had any insight on that program. Ms. Stempfley. Thank you for making that connection in my brain. We actually post that set of recommendations. The then- deputy secretary established a task force to look at all of the recommendations from that Homeland Security Advisory Council-- set of recommendations on workforce activities. We have moved forward on many of them. The cyber reserve efforts and the potential utilization of current and former DHS colleagues in execution of this mission is one that planning activity has been underway. Mr. Meehan. All right. Well I thank you for that clarification. My time is expired and I will turn to the gentleman from Nevada, Mr. Horsford. Mr. Horsford. Thank you very much, Mr. Chairman, to you, to Chairwoman Brooks, to the Ranking Member Mr. Payne and Ranking Member Clarke, for holding this important and crucial hearing. I want to commend my colleague, Mr. Payne, for his legislation on the study for the smart grid. I know in my State and in regions throughout the country we have heard time and time again about the need to protect critical infrastructure, including, you know, our electric grid and water systems and other things that play into the grid. So I look forward to working with you on that legislation and commend you and your leadership for bringing it forward. After hearing the opening remarks I wanted to delve into a couple of questions that aren't on my prepared questions. Mr. Sena, right? Mr. Sena. Sena, sir. Mr. Horsford. So I have been in my fusion center. I am from Las Vegas--40 million visitors a year, 2 million residents in Clark County, and sheriff took me on a tour, met with all of our emergency management, first responders--local, State, Federal, and private-sector participants at that fusion center. What is troubling to me is you say all the right things operationally for what is needed--the integration, the sharing of information--but then we have policy that doesn't support that approach. For example, the UASI money. In my State, Las Vegas was eliminated from the top-tier funding communities for our fusion center and lost several million dollars. My hope is we will get that back and I am working with the Department and FEMA and other agencies to make the case, but the policy doesn't support the practice that you envision. So I would like for you to touch on how funding like UASI is critical in supporting your needs, particularly with the cybersecurity focus, which, as far as I reviewed in the primary factors of the UASI money allocation, I didn't hear cybersecurity come up enough even though it is the most emerging threat to our critical infrastructure. So can you speak to that, please? Mr. Sena. Absolutely, sir. Congressman, just to let--as you know, with the reductions in UASIs and the inconsistencies and how the funding goes for those grant projects to support fusion centers, fusion centers are owned and operated by State and local agencies. I myself work for the San Mateo County sheriff's office. But it is up to those regions how they develop those programs and some are highly dependent on Federal funding. We have some fusion centers that totally support their operations based on their own State budgets, local budgets. But when we are trying to develop programs that have a National importance, that have--meet those National priorities, those National missions, we have to develop the funding stream to support those programs. Basing it on--and UASIs have been great across the country, but if you have no money they have got no way to give anything to the fusion center, and therefore the fusion center cannot support their programs. That is where we are at right now. The other issue we have is the grant time line cycle of 2 years now, which basically means that once you get through with all the management issues of trying to move funding you have about 8 months to spend your money. Well, most people's salaries go for 12 months. That creates a little bit of a problem. But we have those huge issues between how the money gets to the fusion centers and how it gets devoted to those programs. Right now there is no consistency across the country in how that money is delved through. Not just in the case of the Las Vegas fusion center, but other fusion centers across the country that lost their UASI funding--to the point of some, 30 percent. How do you run an operation when you have lost 30 percent of your money or 100 percent? Mr. Horsford. Right. Mr. Sena. It is difficult. Mr. Horsford. Well, it is difficult when you have these emerging threats, which are ever changing. Everything you all talked about today is, you know, the people we are trying to prevent from attacking us are more creative, more resourceful, are working around the clock, and yet we are not putting in the resources to combat that. I think the UASI funding, Mr. Chairman, is one area that needs to still be reviewed and, you know, I am committed to doing my part in bringing forward solutions for how it needs to be reviewed. But I think the cybersecurity factor in how communities rank should be reevaluated. So I will put that on the table. Mr. Chairman, can I have just 1 more minute? Mr. Meehan. Yes. The Chairman will recognize the gentleman for a follow-up question. Mr. Horsford. I just want to ask about this interrelation between State and Federal entities. Given the inherently interconnected nature of the cyber landscape, why is it that harmonizing standards for the Federal Government is beneficial but requiring the same of State governments which may interface with Federal systems is not? I wanted Mr. Orgeron to answer that question. Mr. Orgeron. Sure. We talked about NIST earlier, and I think from a framework perspective we certainly think that having a common framework would be most beneficial, whether it is at the State level or the Federal level. Certainly a framework that would help the two entities communicate, you know, I think we believe would be a good thing. Mr. Horsford. Thank you. Mr. Meehan. I thank the gentleman. The Ranking Member has a follow-up question and so I recognize the Ranking Member for---- Mr. Payne. Thank you, Mr. Chairman. This was a question that Congresswoman Clarke had: Cybersecurity technologies have made a major advancement over the last decade, just as the IT industry has. But the electrical grid has been built over the course of 100 years. So, Mr. Molitor, in terms of cybersecurity, how do we deal with the legacy equipment that was installed before anyone was thinking about cyber threats and what was to come and is here now? Mr. Molitor. Yes. That is a great question. Fortunately, a lot of the legacy gear doesn't have the kind of communications capabilities that makes it hackable to begin with. But if you have got a dead zone in the middle where you don't have cybersecurity capabilities built in you have to build your cyber perimeter around it. So the objective is--and especially through these smart grid technologies--is that you have the communications ability and the sensing ability on the adjacent devices so that you can identify when that device in the middle starts to underperform. So that would be the best indication that you have. The challenge that we have is that a lot of these assets that were installed in the electric grid have a 20-, 30-, or 40-year life span before they can be replaced by the utility companies. So, you know, part of the cure to this is being able to fix the accounting rules and the other financial rules so that they can depreciate those assets, get them out of the grid, and replace them with the ones that can respond properly to a cyber attack. Mr. Payne. So in your opinion--and I will close with this and I will ask each of the witnesses--you know, the legislation I have introduced, the SMART Grid Study Act, do you think that is the direction we should go so we can understand what we need to do to ensure the critical infrastructure is cyber safe? Mr. Molitor. Absolutely. I am a firm believer that if you want to improve something you need to measure it. You provide the mechanism to obtain that measurement. Mr. Payne. Mr. Sena? Same question. Mr. Sena. We definitely--I mean, for years we have been building a great castle with physical--sorry, sir--building a great castle with physical security issues, but we have got this moat around us that has a stream that goes right into our critical infrastructure and we are so vulnerable, but the resources are not going there. We do have to have that capability. We do have to have better electronic resources to deal with threat in real time but we also need analysts and people that can accept the information and know what we are looking for. Right now that is our big problem, from the high-end technical side to the people who are operating the computers within the locations, whether it is Government, whether it is critical infrastructure, you know, spear fishing, opening up the wrong e-mail can open up your network to huge issues. When it is considered to be the electrical grid or any of our other critical infrastructure, that can be our fall down. My goal is to prevent that as best we can, so thank you. Mr. Payne. Mr. Orgeron. Mr. Orgeron. I agree. I mean, State government, especially from a technology perspective, whether it is consolidated data centers or networks, are highly reliable on the grid, so absolutely. Mr. Payne. Mr. English. Mr. English. Absolutely. We have to have the power to make things work, and thank you for doing that. Mr. Payne. Okay. Ms. Stempfley. Ms. Stempfley. So we certainly have talked about the linkages between the cyber and physical environment, and one of the things that we are focused on at DHS is helping as infrastructures are upgraded--as our aging infrastructure is upgraded and takes advantage of the technology that exists today, helping them understand how to be more resilient in this cyber environment. So I think that is an important focus area. Mr. Payne. Well, I thank all of you witnesses. Just for the record, this study would not cost any more money. The money is already in place and we have offsets that would take care of the cost of the study. I yield back. Mr. Meehan. I thank the gentleman. I am just about prepared to gavel the hearing down but I have one question that I want to ask for those who are involved in the State side, because I know that there has been some discussion about the need we have for people who are capable of working with you in both understanding and then addressing these kinds of concerns, and then simultaneously we have got, year after year, students that are graduating from colleges and universities, junior colleges all throughout our country and they are looking for a job. It stuns me that we have educational institutions on the one side that are already--not looking for grant programs; they are already taking tuition. Some of these kids are going into debt to do this, and then they come out and they are saying, ``Where do I get my first job?'' Then here you are running organizations which are saying, ``Boy, we need people in here.'' What are you doing even with your own State university systems to implement some kind of connection between the training that could take place and the availability of a workforce? Mr. Sena. Sir, I have to mention--and thanks in great part to our partners in the Department of Homeland Security, MS- ISAC, and our other State organizations--we actually had a pilot, you know, internship program this summer--brought some of the most brilliant people into my center. Great employees, great interns. Did some tremendous work for us. So we brought them in but, of course, we have no funding to pay for interns. We have no money to pay for, you know, those analysts. You know, eventually we are getting some money from our UASI to bring on some analytical staff, but, you know, we brought in eight interns who did great work and those interns across the country were also deployed--recruited by DHS, recruited through, you know, cyber exercises that they would do on the weekends to see who could, you know, do the best infiltration of systems. So we had the best minds out there but we have no money to hire these people and that is--you know, that is the tragedy of it. You know, great interns and, you know, free labor force for us, but we need them long-term and there is just no sustainment for that right now. Mr. Meehan. Do they get directed to private-sector opportunities? Mr. Sena. We do. We give them, you know, pass their information along to the private sector. But as was said previously, you find very few open jobs in that sector. But right now it would be great if we had that ability even to pay the interns for the time they spend with us, but also to bring them into Government work. They are just--you know, from the State perspective, you know, money has always been tight, and especially nowadays it has been tight, so trying to have funding to bring in those brilliant minds is difficult. Mrs. Brooks. Would the Chairman yield one moment? Mr. Meehan. Sure. Absolutely. Mrs. Brooks. I am curious, before others might respond, whether or not you are educating your governors, your mayors, your councils who appropriate the funds for your departments to understand what the cyber threat might be? Because obviously, you know, there is always a push for more police officers on the street, more fire fighters, but yet there needs to be--and when we may be calling them analysts is part of the problem in that they appear to be support staff when, in fact, they are a cyber force and can be like a street officer. How are you educating the executives and those, you know, with the appropriations authority to, you know, make sure that they understand what the needs are, just out of curiosity? Mr. Sena. I can tell you that after we made a presentation to our UASI on what the threat was, it immediately voted to give us $400,000 right off the bat. So they see the threat. But that is only if they have the funding available to allocate, and in this case they had the funding. That funding may not be there next year, but that is the problem we have. There has to be a funding source and currently most States don't have the funding source other than potentially through those Federal grants. Those, the allocation varies between those centers, like in Las Vegas, that they just don't have any money for it. Mr. Orgeron. We certainly do advocate with the Governor, elected officials, the legislature, the importance of a topic like this and potentially the disconnect between really doing great Government and needing great people to do great Government that have the right skills, and this is a marked gap to the point. To the other question, all the things Mr. Sena said-- working with universities on co-op programs to get students in, internship programs. It is really at the local level--at the local-State level--I think more, you know, just that you can get them interested. I mean, States are doing phenomenal things across all kinds of projects, especially in our State with a new data center. It tends to be keeping them is the thing. They are great kids, and so we do. We go to the universities regularly, go to recruiting fairs regularly, and so--and we will continue both of those things. Mr. Meehan. Well, I want to say, I think on behalf of all of my colleagues here, we appreciate your service. In many ways you, as was articulated by one bit of testimony, are out of there on the tip of the spear, and the experiences that you have, as well, not only in what you are doing each day but by virtue of analyzing the nature of the threat and the challenges that we have, and then by taking the time to both prepare your testimony and be responsive to our questions helps us educate-- helps you educate us to be your partners in working for better, more efficient, more effective ways to deal with what we all agree, I believe, is one of the great challenges that we face here and an emerging and ever-changing nature of the threat, different from, in many ways, from those which we have been addressing over the course of the recent decade. So I thank the witnesses for your valuable testimony and the Members for their questions. The Members may have--from the subcommittee may have additional questions for the witnesses, and if they do we ask that you would take the time to respond in writing. We are certainly free for any further follow-up information you would like to forward to us for the record. We will keep the record open for 10 days for that purpose. So without objection, the subcommittees stand adjourned. Thank you for your testimony. [Whereupon, at 11:52 a.m., the subcommittees were adjourned.] A P P E N D I X ---------- Questions From Chairwoman Susan W. Brooks for Roberta Stempfley Question 1a. FEMA has a number of incident annexes to the National Response Framework, including a Cyber Incident Annex. The current Cyber Incident Annex was developed in 2004, nearly 10 years ago, when technology and the cyber threat were very different. The draft NCIRP states that it was developed in conjunction with the update of the Cyber Incident Annex. However, according to FEMA, the Annex has not yet been updated and will be not updated until later this fiscal year, with an anticipated completion in fiscal year 2015. Will CS&C be involved in this update? Answer. The Office of Cybersecurity and Communications (CS&C), working with a broad set of partners, to include the Federal Emergency Management Agency, will continue to advance the dialogue around coordinated planning through development of operational playbooks and other planning frameworks. We anticipate that CS&C would be deeply involved in any updates to the National Response Framework's Cyber Incident Annex. Question 1b. In a broader sense, how do you work to coordinate cyber doctrine within the Department to ensure that the plans and procedures in place are up-to-date and applicable to the current threats we are facing? Answer. CS&C works with the Department of Homeland Security (DHS) Headquarters and other DHS components on a continuous and on-going basis to coordinate cyber issues. Many of these interactions take place at the working level in order to keep pace with the dynamic cyber threat environment. There are weekly leadership meetings consisting of both internal DHS organizations as well as our interagency partners specifically to coordinate on cyber issues. In November 2011, DHS completed the Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise (Blueprint). The Blueprint provides a process to create a safe, secure, and resilient cyber environment for the homeland. The Blueprint identified capabilities necessary to achieve DHS's cybersecurity goals. The development of the Blueprint was truly a cross-organizational, integrated process that brought together elements of the following components and sub-components of DHS: DHS/NPPD Office of Strategy and Policy (S&P); DHS/PLCY Office of Strategy, Policy, Analysis, and Risk (SPAR); DHS/CFO Office of Program Analysis and Evaluation (PA&E); DHS/Office of Intelligence and Analysis; DHS/Office for Civil Rights and Civil Liberties (CRCL); DHS/Office of Operations Coordination and Planning (OPS); DHS/NPPD Office of Budget, Finance, and Acquisition; DHS/NPPD Office of Cybersecurity and Communications (CS&C); DHS/NPPD Office of Infrastructure Protection (IP); DHS/Science and Technology Directorate (S&T). Accompanying the Blueprint is a Mission Management Plan that prioritizes the Blueprint capabilities that DHS will mature over the next several years. The Mission Management Plan serves as a baseline for coordination and assignment of tasks based upon the capabilities and responsibilities across the Department. An example of this would be leveraging the skills and resources of the U.S. Secret Service along with Immigrations and Customs Enforcement to investigate cyber criminals. The results of these efforts are used internally within DHS as well as a baseline for discussions with our partners across the interagency, State, local, Tribal, and territorial governments and the private sector. Question 2a. In reviewing the National Cyber Incident Response Plan (NCIRP), I am a little unclear of the link and cooperation between the NCCIC and FEMA and have a couple questions regarding that link and cooperation. Does FEMA currently have personnel that are stationed full-time at the NCCIC? Answer. The Federal Emergency Management Agency (FEMA) does not currently have personnel who are stationed full-time at the National Cybersecurity and Communications Integration Center (NCCIC). The DHS Office of Operations Coordination and Planning has a full- time employee stationed at the NCCIC and another full-time employee stationed at the FEMA National Response Coordination Center (NRCC). The National Operations Center (NOC) is also staffed by a full-time desk officer from the NCCIC and another full-time desk officer from the FEMA NRCC. This exchange of personnel facilitates real-time coordination and collaboration in the event of a cyber-related incident. The NOC, NCCIC, and NRCC continuously share information and have access to the DHS Common Operating Picture (COP) for situational awareness. Additionally, the NOC receives and integrates daily reporting from the NCCIC and the NRCC. Also, the three operations centers conduct coordination calls at least three times daily via the NOC's Operations Centers conference calls (NOC Blast Calls). Question 2b. If ``YES'': Who is this person--from what office within FEMA? If ``NO'': Do you think it would be a good idea to have a FEMA representative at the NCCIC? Answer. Recognizing the potential significance of a cyber-physical event and the value of close FEMA-NCCIC synchronization, staffs from the two organizations meet often to discuss planning and exercise activities and to maintain watch center-to-watch center communications. In response to Emergency Support Function-2 activations, NCCIC regularly deploys staff to FEMA operations centers. In the event of a significant cyber incident, FEMA would deploy appropriate staff to the NCCIC. Question 2c. How does the NCCIC communicate with FEMA on the potential threats the NCCIC is seeing and their possible consequences that may require FEMA to respond? Answer. NCCIC and FEMA communicate via watch center-to-watch center communications. FEMA receives NCCIC situational reports and awareness products, which highlight more significant cyber and communications incidents and the NCCIC receives FEMA situation reports on a recurring and routine basis. The DHS NOC, NCCIC, and NRCC all have access to the DHS Common Operating Picture (COP) and Homeland Security Information Network (HSIN). The COP and HSIN are the primary systems used for sharing and viewing Unclassified information along with other situational awareness products. Also, all three operation centers participate in coordination calls at least three times daily via the NOC's Operation Centers conference calls (NOC Blast Calls). Question 3. The draft National Cyber Incident Response Plan (NCIRP) states that it ``was developed in close coordination with Federal, State, local, territorial, and private-sector partners.'' I am interested in hearing more about the Department's outreach process during the development of the NCIRP because we have heard from stakeholders that there wasn't sufficient outreach and that this is more of a ``Federal plan'' than a ``National plan.'' Answer. The Department of Homeland Security (DHS) developed the National Cyber Incident Response Plan (NCIRP) in close coordination with public and private-sector stakeholders. During the early stages of development, DHS asked for volunteers through the Cross-Sector Cyber Security Working Group (CSCSWG), which includes Federal and private- sector representatives from each of the critical infrastructure sectors and convenes under the auspices of the Critical Infrastructure Partnership Advisory Council. The Department also sought collaboration through intergovernmental partners, the information sharing and analysis organization community and among Federal interagency partners. DHS drafted the document by sending out discussion papers--generally draft sections of the NCIRP starting with scope and purpose--and captured notes from subsequent discussions with public and private- sector participants. In addition to incorporating review comments into iterative drafts of the NCIRP, DHS also held table-top exercises and the Cyber Storm III National Exercise to further inform versions of the draft plan. Among the participants in the table-top exercises were the Information Technology Information Sharing and Analysis Center (ISAC), the Communications ISAC, the Financial Services ISAC, and the Multi- State ISAC (MS-ISAC). The MS-ISAC includes among its membership the chief information security officers from each of the 50 States as well as several U.S. territories and local Government representatives. Cyber Storm III included participation from eight Cabinet-level departments, 13 States, 12 international partners, and 60 private-sector companies and coordination bodies. Together, these entities participated in the design, execution, and post-exercise analysis of the cyber exercise. Participation focused on the information technology, communications, energy (electric), chemical, and transportation critical infrastructure sectors and incorporated various levels of play from other critical infrastructure sectors. In addition, Cyber Storm III included the participation of States, localities, and coordination bodies, such as ISACs, and international governments to examine and strengthen collective cyber preparedness and response capabilities. During the exercise, the participant set included 1,725 Cyber Storm III-specific system users. Questions From Chairwoman Susan W. Brooks for Charley English Question 1a. How are State officials responsible for cybersecurity and emergency management coordinating to ensure awareness of the cyber threats you face? Answer. The type and scope of coordination occurring between State officials responsible for cybersecurity and emergency management officials vary widely by State. In a survey NEMA conducted in February 2013, we learned no clear best practice exists in assigning responsibility of coordination of resources to prepare for, respond to, or recovery from a cyber attack. Only 41.9 percent of States cited a specific director. Of the 41.9 percent, responsibility ranges from the emergency management officials to IT, homeland security, and the fusion center. Where those responsibilities diverge, coordination occurs much in the same way as it would with any other all-hazards risk. Question 1b. What support are you getting from DHS in that regard? Answer. Programmatic offices such as the Office of Cybersecurity and Communications (CS&C) within DHS continue admirable work in their outreach to State and local officials. The larger challenge however is that the overall DHS effort, to include agencies such as FEMA, must be comprehensive and coordinated in order to ensure all the nuances of the threat and impact of consequences receive appropriate attention. In recent years, as the issue of cybersecurity grows, agencies have a tendency to create niches within the Department instead of adopting a comprehensive approach. Without a cohesive strategy from the National level addressing the consequences of a cyber attack, we run the risk of being unprepared should an event occur. Question 1c. What more could they be doing? Answer. DHS must recognize the impacts of a cyber attack extend beyond public-private relationships or simply securing networks. To date, the Department offers little guidance on the potential depth and breadth of cyber consequences. A deeper analysis must be accomplished on current disaster-related statutes such as the Stafford Act to consider whether such attacks would be eligible for Federal assistance. If so, guidance must be provided to the States. If not, an on-going dialogue must occur so all interested parties understand the current limitations of State and local governments in these economically- constrained times. Question 1d. Is there anything Congress can do to help? Answer. As Congress considers legislative options, the needs of the State and locals ultimately responsible for the consequences of a cyber attack must be first and foremost. In May of last year, NEMA joined with nine other associations to ask Congress for your consideration of key principles and values when considering cybersecurity legislation. In addition to consideration of the principles and values, Congress must work with DHS ensuring all potential consequences of a cyber attack are thoroughly considered in appropriate authorities such as the Stafford Act. Question 2. A movie titled ``American Blackout'' that aired in October portrayed the physical consequences of a cyber attack on the electrical grid. One of the major issues highlighted was the impact on hospitals. I recently visited with representatives from a hospital in my district and we discussed cybersecurity. The doctors, particularly those from the emergency department, are extremely concerned with their ability to function in the event of a cyber attack that impacts their power supply. This goes beyond medical records. They are very concerned about access to imaging technology that saves lives. In the event of a cyber incident that impacts the electric grid, how would emergency managers and cybersecurity professionals coordinate with each other and the private sector to determine how soon the problem could be fixed and in turn properly identify necessary resources to assist hospitals beyond the generators and fuel they regularly keep on hand? Answer. We would typically treat this type of incident just as any other. Emergency managers operate in an all-hazard environment and would coordinate with the cybersecurity professionals as we would any other Emergency Support Function (ESF). The resources would be done the same way. There are many disasters that affect our power grid, from ice storms to major storm fronts. It takes a Federal-State coordinated approach to create and improve a threat-specific annex to State Emergency Operation Plans. Emergency management plans are intended to address impacts of all hazards, regardless of cause. Question 3. States have repeatedly identified cybersecurity as the lowest core capability in their State preparedness reports. To your knowledge, when developing this assessment, were State chief information officers or chief information security officers involved in the process? Answer. While the exact number is not known, the collaboration and inclusion between chief information officers and emergency management officials is increasing due to the threat and the increasing awareness of the issue. For example, in the State of Ohio, the State Security Information Officer was involved in the responses to cybersecurity in the State preparedness report. In Arkansas, the Chief Information Officers as well as the Chief Information Security Officers are involved in the process of identifying core capabilities. Questions From Chairwoman Susan W. Brooks for Craig Orgeron Question 1a. How are State officials responsible for cybersecurity and emergency management coordinating to ensure awareness of the cyber threats you face? Answer. Coordination on cybersecurity varies drastically from State to State. This has to do with different models of State governance and centers of authority for cybersecurity response and emergency management. This is not only reflective of the different maturities regarding readiness to respond to cyber threats in the States, but also the diverse topography of State governments. There is increasingly coordination between State CIOs with emergency managers and other agency officials regarding disaster continuity, recovery, and emergency management. As referred to in my testimony, NASCIO's 2013 State CIO Survey states: ``Not surprisingly, disaster recovery and business continuity are issues that continue to receive increased attention in the State CIO community . . . We asked CIOs how they approached these initiatives within their State. As Figure 13 shows, almost two-thirds of States pursue a federated strategy with responsibilities split between the CIO and State departments and agencies.'' [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] While our research shows increasing collaboration between State emergency managers and State CIOs, it is difficult to describe how a State would react to a cyber incident impacting a hospital as described in the question. The primary reason: With public-sector cybersecurity being such a nascent area, States have divergent governance and procedures in place to deal with significant attacks on critical infrastructure. Virtually every State has some means to provide support, whether through State police, its fusion center, or another State agency. Further complicating matters, data does not exist to make extensive claims to best practices when it comes to governance. While several States have held cybersecurity exercises and learned from the experiences, the effectiveness of one governance model over another has not been thoroughly and publicly tested by real-world events. Beyond this uncertainty, there are significant legal questions to be considered. For instance, a private hospital may not be able to take advantage of certain public resources. It is unclear a private entity could receive support from the National Guard without the declaration of a state of emergency by a Governor. Other questions come into play, as well: Legal liabilities, cyber forensics of a virtual crime scene, and more. The area simply has not been defined. The legal implications is an area that is ripe for Congress to explore. Question 1b. What support are you getting from DHS in that regard? Answer. There are several venues and tools from DHS or funded by DHS that provide State governments with additional awareness of and support in thwarting cyber threats. Perhaps the most prominent of these are the National Cybersecurity and Communications Integration Center (NCICC), United States Computer Emergency Readiness Team (US-CERT), and Multi-State Information Sharing and Analysis Center (MS-ISAC). Complementing and supporting State fusion centers and similar technical support is also of significant value as long as DHS ensures it is supporting the State's cybersecurity governance model. Broader efforts such as the National Initiative for Cybersecurity Education (NICE) are also vital for States to receive the type of talent they need to secure their systems, and should be expanded. Question 1c. What more could they be doing? Answer. In many States, neither Chief Information Officers nor their Chief Information Security Officers are cleared to the Top Secret level--only the Secret level. Therefore, they cannot receive vital information from the intelligence community on the most advanced international threats against our networks without explicit intention and additional pre-clearance. While DHS certainly would include a State CIO or his CISO in such a conversation, it is not so certain the rest of the intelligence community would know to reach out to the State CIO and clear them for such a briefing. This should be remedied. NASCIO hopes that greater information sharing and better tools to disseminate this information will be released as part of the implementation of Executive Order 13636 and Presidential Policy Directive 21. NASCIO and its members are pleased with the on-going effort to provide greater declassification of cyber threat information as part of the EO, and look forward to seeing greater results. In addition, we believe the National Cyber Security Review could be followed up with the promise of Federal technical assistance to State and local participants who lag behind in vital areas. This will have the dual benefit of safeguarding citizen data and encouraging greater participation in National level vulnerability assessments. Efforts to provide support for cyber education among public employees in the States and broader social awareness of on-line threats, similar to public awareness campaigns in the vein of ``see something, say something,'' are also valuable. Question 1d. Is there anything Congress can do to help? Answer. While opportunities for limited Federal assistance for cyber threats have been included in the National Preparedness Grant Program (NPGP), its shrinking pool of resources coupled with a formulaic structure that favors hardening targets against attacks at the jurisdictional level means States typically only have enough funding to maintain legacy homeland security investments and administer grants to local governments. For NPGP to meet the current threats faced by our States and localities, changes will need to be made to this program by Congress. Greater resources for technical programs that support information sharing, technical assistance, and cyber threat exercises would be valuable, as well. Efforts to increase the public sector cyber workforce, ranging from targeted initiatives such as the DHS National Initiative for Cybersecurity Education to supporting computer science education in schools at every level, are extremely valuable. Such programs should be expanded and supported--both for the sake of our Nation's homeland security and our economic security. Larger public service campaigns to increase knowledge of the risks on-line, in the model of ``see something, say something'' or ``click-it or ticket'' would help reduce risk to both public and private-sector networks. Question 2. As you may know, as a condition of receiving State Homeland Security Grant Program funding, the State Administrative Agency (SAA), which is usually either the State Homeland Security Advisor or Emergency Manager, must complete a Threat and Hazard Identification and Risk Assessment, which, as the name suggests, details threats and hazards facing each State. Some States, including my home State of Indiana, have included cybersecurity in their THIRAs. To your knowledge, have your colleagues been included in this process to ensure the SAAs have the best picture of the cyber threats they face? Answer. Unfortunately, NASCIO has no data on how many States include cybersecurity in their THIRAs, and whether SAAs have included their State CIOs in the THIRA process. NASCIO will to review this question with its membership and attempt to provide the committee with a well-researched answer in the near future. Questions From Chairwoman Susan W. Brooks for Mike Sena Question 1a. Your fusion center is one of a small number of fusion centers in the National Network proactively incorporating cybersecurity into its mission. I applaud you and your fusion center's efforts in this challenging environment. What Federal, State, and local partnerships have you developed to help the NCRIC contribute to this important mission? Answer. Response was not received at the time of publication. Question 1b. What analytical products and situational awareness reports has the NCRIC produced? Do you have a sense as to how have these products been perceived by your partners? Answer. Response was not received at the time of publication. Question 1c. How is the National Fusion Center Association working to advance cybersecurity efforts across the National Network? Answer. Response was not received at the time of publication. Question From Chairwoman Susan W. Brooks for Paul Molitor Question. Mr. Molitor, in your testimony you mention the NEMA Field Representative Program. Would you please tell us more about this program and how, if at all, these experts are available as a resource to emergency management officials during an emergency? Answer. NEMA is the association of electrical equipment and medical imaging manufacturers, founded in 1926 and headquartered in Rosslyn, Virginia. Its 400-plus member companies manufacture a diverse set of products including power transmission and distribution equipment, lighting systems, factory automation and control systems, and medical diagnostic imaging systems. The U.S. electroindustry accounts for more than 7,000 manufacturing facilities, nearly 400,000 workers, and over $100 billion in total U.S. shipments. The NEMA Field Representative Program is geared toward providing information and training to government officials (including building code officials, electrical inspectors, and emergency managers), maintaining the lines of communications between these individuals and the manufacturing community, and assisting in the wake of disasters. The relationships forged in advance of the disaster are invaluable in the ensuing confusion and turmoil. As advocates of safe electrical systems and installations, NEMA Field Representatives make a valuable contribution to public safety. NEMA has four Field Representatives located in regional offices around the country. Their regions of coverage are aligned with the International Association of Electrical Inspectors (IAEI) Section Regions. The representatives are: [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] (1) Mike Stone.--Region: AK, AZ, CA, HI, ID, MT, NV, NM, OR, UT, WA. (2) Donald Iverson.--Region: WY, CO, ND, SD, NE, KS, MN, IA, MO, AR, WI, IL, MI, IN, KY, OH, WV. (3) Paul Abernathy.--Region: TX, OK, LA, MS, TN, AL, FL, GA, SC, NC, VA. (4) Jack Lyons.--Region: ME, NH, VT, NY, MA, RI, CT, NJ, PA, MD, DE, DC. preparing for emergencies One of the most important functions of the field representatives is to support a 3-year adoption cycle by States and local jurisdictions for National model building codes--including electrical, life safety, and energy--to coincide with the 3-year National revision cycles. These codes are: NFPA 70 National Electrical Code; NFPA 101 Life Safety Code; NFPA 99 Health Care Facilities Code; NFPA 72 National Fire Alarm and Signaling Code; NFPA 720 Carbon Monoxide Detection Code; International Building Code (IBC); International Residential Code (IRC); International Energy Conservation Code (IECC); International Green Construction Code (IgCC); International Fire Code (IFC). National model building codes provide the blueprint for constructing residential, commercial, and institutional buildings and other structures. They prescribe the minimum safety and performance standards which allow occupants to live and operate in a safe and optimally-performing building. Model building codes also prescribe the latest advancements in energy efficiency, resiliency in building structure, and life safety through the use of hazardous elements detection. The codes are revised through an open and transparent stakeholder process led by the International Code Council (ICC) and National Fire Protection Association (NFPA) every 3 years to incorporate advances in safety and technology in homes and buildings. Therefore, timely adoption in accordance with the National model revision schedule is vitally important. Direct adoption and enforcement of the latest building codes every 3 years provides: enhanced safety to homeowners and building occupants through the use of the latest technology and knowledge in life safety (i.e., emergency lighting; fire, smoke, and carbon monoxide detection) and electrical hazard protection (i.e., arc fault circuit interrupters, ground fault circuit interrupters); utilization of the latest advancements in technology, enabling the use of on-site energy generation for back-up power and for ensuring the structural integrity of buildings. Proper installation of electrical equipment is key to safety and resiliency. The NEMA Field Representative Program provides training to State and local code officials, inspectors, and installers on the latest codes and on the proper installation and use of NEMA member products. recovering from disasters While preparation is essential, loss of life and damage to property will inevitably occur. One responsibility of a NEMA Field Representative is to make himself available to Government officials after a natural disaster. Because safety is of paramount importance to our member companies, all time, travel, and materials associated with the Field Representative Program is paid for by NEMA members. In years past, NEMA Field Representatives have visited areas destroyed by Hurricanes Irene, Katrina, and Sandy. They've also responded to both flood and snow emergencies in the Midwest, as well as the Colorado flood earlier this year. In January of 2010, NEMA offered its Field Representatives to assist in Haiti after its devastating earthquake. When disaster strikes, NEMA promotes a number of resources for public officials addressing major infrastructure damage. NEMA's user- friendly Evaluating Water-Damaged Electrical Equipment \1\ and Evaluating Fire- and Heat-Damaged Electrical Equipment guides are critical resources for protecting life and property after a disaster. Additionally, Storm Reconstruction: Rebuild Smart offers strategies for reconstructing electrical infrastructure in such a way that mitigates future disasters. All of these resources are available on NEMA's website, www.nema.org. --------------------------------------------------------------------------- \1\ http://www.nema.org/Standards/Pages/Evaluating-Water-Damaged- Electrical-Equipment.- aspx#download. --------------------------------------------------------------------------- As rebuilding commences, NEMA Field Representatives assist in solving problems involving the installation of NEMA member products by serving as intermediaries between Government officials and NEMA member companies. Decision makers should involve NEMA in the wake of disasters and a recent example highlights this. In the wake of Superstorm Sandy, the New Jersey Department of Consumer Affairs (DCA) issued a directive for installers. The DCA stated that for wiring that had been submerged under water, ``If undamaged, no replacement is necessary.''\2\ This directive is at best unclear and the DCA implied on its web page the continued use of previously submerged wire is fine by stating that equipment was safe to use for 90 days. --------------------------------------------------------------------------- \2\ http://www.nj.gov/dca/divisions/codes/alerts/pdfs/ hurricane_sandy_guidance_11_- 2012.pdf. --------------------------------------------------------------------------- This position does not comport with the NEMA recommendations in Evaluating Water-Damaged Electrical Equipment. The guide states: ``Electrical equipment exposed to water can be extremely hazardous if reenergized without performing a proper evaluation and taking necessary actions. Reductions in integrity of electrical equipment due to moisture can affect the ability of the equipment to perform its intended function. Damage to electrical equipment can also result from flood waters contaminated with chemicals, sewage, oil, and other debris, which will affect the integrity and performance of the equipment. Ocean water and salt spray can be particularly damaging due to the corrosive and conductive nature of the salt water residue. `` . . . ``4.6 Wire, Cable and Flexible Cords When any wire or cable product is exposed to water, any metallic component (such as the conductor, metallic shield, or armor) is subject to corrosion that can damage the component itself and/or cause termination failures. If water remains in medium voltage cable, it could accelerate insulation deterioration, causing premature failure. Wire and cable listed for only dry locations may become a shock hazard when energized after being exposed to water. ``Any recommendations for reconditioning wire and cable in Section 1.0 are based on the assumption that the water contains no high concentrations of chemicals, oils, etc. If it is suspected that the water has unusual contaminants, such as may be found in some floodwater, the manufacturer should be consulted before any decision is made to continue using any wire or cable products.'' NEMA Field Representatives expressed their objection to the DCA directive after it was issued, but NEMA's concerns were not addressed, and have yet to be. Subsequent to issuance of the directive, tragedy struck Seaside Park and Seaside Heights, New Jersey, when more than 50 businesses on the boardwalk were destroyed by fire. Investigators have ruled the fire accidental and believe electrical wiring that had been submerged by seawater during Superstorm Sandy is the culprit. NEMA continues to advocate for electrical safety in New Jersey and across the country.