{"id":6713,"date":"2018-03-26T15:59:47","date_gmt":"2018-03-26T22:59:47","guid":{"rendered":"https:\/\/lapost.us\/?p=6713"},"modified":"2018-03-26T15:59:47","modified_gmt":"2018-03-26T22:59:47","slug":"reps-lieu-and-yoho-introduce-bill-to-strengthen-state-department-cyber-defenses","status":"publish","type":"post","link":"https:\/\/lapost.us\/?p=6713","title":{"rendered":"REPS LIEU AND YOHO INTRODUCE BILL TO STRENGTHEN STATE DEPARTMENT CYBER DEFENSES"},"content":{"rendered":"<div class=\"panel-pane pane-node-created\">\n<div class=\"pane-content\">March 21, 2018\u00a0<b><i>WASHINGTON \u2013\u00a0<\/i><\/b>Today, Congressmen Ted W. Lieu (D-Los Angeles County) and Ted Yoho (R-FL) announce the introduction of the bipartisan Hack Your State Department Act. The bill will strengthen cyber defenses for the State Department by tapping ethical hackers to identify vulnerabilities in State Department\u2019s networks and data systems. Like the \u201cHack the Department of Homeland Security Act\u201d, which Rep. Lieu introduced in 2017, this program will rely on a bug bounty system where authorized hackers can enter a State Department system, identify and disclose weaknesses and receive compensation.\u00a0Additionally, it will establish a Vulnerability Disclosure Program to field vulnerabilities reported by the general public.\u00a0The\u00a0Trump Administration&#8217;s\u00a0<a href=\"https:\/\/itmodernization.cio.gov\/assets\/report\/Report%20to%20the%20President%20on%20IT%20Modernization%20-%20Final.pdf\">2017 Report to the President on Federal IT Modernization<\/a>\u00a0recommended that agencies establish vulnerability disclosure policies and set up private bug bounty programs.<\/div>\n<\/div>\n<div class=\"panel-pane pane-entity-field pane-node-body\">\n<div class=\"pane-content\">\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p class=\"align-center\"><u>Upon introduction of the bill, Mr. Lieu said:<\/u><\/p>\n<p><b>\u201cAs one of only four Computer Science majors in Congress, I recognize we have a lot of work to do to ensure the U.S. Government is on the cutting edge of combating cyber threats. We\u2019re a global leader on so many fronts and that should include cybersecurity. I\u2019m proud\u00a0of this bill because the vulnerability disclosure and bug bounty programs are innovative ways to solve what is one of our government\u2019s most pressing concerns: data security. By capitalizing on the skills of some of the best minds in cybersecurity, as well as the general public, we\u2019ll be able to make sure the State Department is able to safely and securely continue its mission as America\u2019s voice abroad.\u201d<\/b><\/p>\n<p class=\"align-center\"><u>Upon introduction of the bill, Mr. Yoho\u00a0said:<\/u><\/p>\n<p><strong>\u201cYou are only as strong as your weakest link. Vulnerability to cyber-attacks has been and continues to be a serious threat to our national security. It is vital that we do all we can to find the weak links in our government systems and fix them as fast as possible. Hack the State Department enables us to effectively identify our vulnerabilities and use the brightest cybersecurity minds to strengthen our defenses.\u00a0 Cyber threats are constantly evolving, and our cyber defenses must evolve with them.\u201d<\/strong><\/p>\n<p class=\"align-center\"><u>Support for the Hack Your State Department Bill<\/u><\/p>\n<p><strong>Katherine Charlet, Director of Carnegie&#8217;s Technology and International Affairs Program and former Acting Deputy Assistant Secretary of Defense for Cyber Policy\u00a0&#8211;\u00a0<\/strong>&#8220;Executive agency networks are major targets for malicious actors in cyberspace. By using crowdsourcing policies, these agencies can identify and fix critical vulnerabilities. With this bill, Representatives Lieu and Yoho are promoting a cost effective and valuable way to raise the bar for cybersecurity. &#8221;<\/p>\n<p><strong>Ari Schwartz,<\/strong>\u00a0<b>Coordinator of Coalition for Cybersecurity Policy and Law and Former Special Assistant to the President for Cybersecurity at the National Security Council &#8211;<\/b>&#8220;A properly resourced vulnerability disclosure program can be a valuable component to any organization&#8217;s cybersecurity plan. We hope this bill from Reps. Lieu and Yoho will encourage more agencies governmentwide to leverage external expertise to enhance security.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>March 21, 2018\u00a0WASHINGTON \u2013\u00a0Today, Congressmen Ted&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-6713","post","type-post","status-publish","format-standard","hentry","category-u-s-a"],"_links":{"self":[{"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/posts\/6713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lapost.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6713"}],"version-history":[{"count":1,"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/posts\/6713\/revisions"}],"predecessor-version":[{"id":6714,"href":"https:\/\/lapost.us\/index.php?rest_route=\/wp\/v2\/posts\/6713\/revisions\/6714"}],"wp:attachment":[{"href":"https:\/\/lapost.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lapost.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lapost.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}