WEBVTT

00:00.740 --> 00:02.796
Good afternoon everyone . My name is

00:02.796 --> 00:05.400
john Brennan , I am the assistant to

00:05.400 --> 00:07.622
the President for homeland Security and

00:07.622 --> 00:09.678
Counterterrorism and I want to thank

00:09.678 --> 00:11.870
you all for coming here today and on

00:11.870 --> 00:14.092
behalf of the president . I'm delighted

00:14.092 --> 00:16.259
to welcome you to this special event .

00:16.840 --> 00:19.007
It is wonderful to have members of the

00:19.007 --> 00:20.840
diplomatic corps , partners from

00:20.840 --> 00:23.062
industry and academia , colleagues from

00:23.062 --> 00:25.284
the U . S . Government as well as those

00:25.284 --> 00:26.951
of you who are joining online

00:26.951 --> 00:29.118
participating in today's event . It is

00:29.118 --> 00:31.229
a testament to the growing importance

00:31.229 --> 00:33.451
and growing recognition of cyber issues

00:33.451 --> 00:35.562
that you are here today and this is a

00:35.562 --> 00:37.562
special day for us to . We've never

00:37.562 --> 00:39.784
assembled this many senior leaders from

00:39.784 --> 00:41.729
across the government to discuss a

00:41.729 --> 00:43.784
document about cyberspace . So thank

00:43.784 --> 00:46.007
you everyone for joining us as we start

00:46.007 --> 00:48.118
this new chapter in our international

00:48.118 --> 00:50.830
cyber policy . First , I'd like to

00:50.830 --> 00:52.920
remind all of you that last week we

00:52.920 --> 00:55.087
sent over the first ever cybersecurity

00:55.087 --> 00:56.850
legislative proposal from any

00:56.860 --> 00:58.900
administration in the history to

00:58.900 --> 01:01.610
Congress that proposed legislation is

01:01.610 --> 01:03.777
focused on improving cybersecurity for

01:03.777 --> 01:05.721
the american people , our nation's

01:05.721 --> 01:07.943
critical infrastructure and the federal

01:07.943 --> 01:10.277
government's own networks and computers .

01:10.277 --> 01:12.277
And our proposal strikes a critical

01:12.277 --> 01:14.554
balance between strengthening security ,

01:14.554 --> 01:16.721
preserving privacy and civil liberties

01:16.721 --> 01:18.721
protections and fostering continued

01:18.721 --> 01:20.943
economic growth . The administration is

01:20.943 --> 01:23.110
eager to work with Congress to enact a

01:23.110 --> 01:25.277
cybersecurity bill and we look forward

01:25.277 --> 01:27.499
to the broader discussion that Congress

01:27.499 --> 01:29.277
will hold with industry privacy

01:29.277 --> 01:32.290
advocates and the water community . And

01:32.290 --> 01:34.512
today we're here to mark the release of

01:34.512 --> 01:36.679
the U . S . International strategy for

01:36.679 --> 01:39.030
cyberspace , which is the first major

01:39.030 --> 01:41.150
policy document issued by this

01:41.150 --> 01:43.570
government that articulates us views

01:43.570 --> 01:45.680
and policy pursuits regarding the

01:45.680 --> 01:49.070
international cyberspace domain . It is

01:49.070 --> 01:51.126
important to note that this is first

01:51.126 --> 01:53.410
and foremost a policy document , not a

01:53.410 --> 01:55.820
technical one . And believe me if this

01:55.820 --> 01:57.931
was a technical document , I'd be the

01:57.931 --> 02:00.042
last person introducing this document

02:00.042 --> 02:02.153
to the community . But it is a policy

02:02.153 --> 02:04.264
document and that's part of what sets

02:04.264 --> 02:06.487
the international strategy apart . Lots

02:06.487 --> 02:08.542
of us have been in government longer

02:08.542 --> 02:08.420
than the internet has been around and

02:08.420 --> 02:10.587
this strategy makes a clear case as to

02:10.587 --> 02:12.698
why those of us who are involved with

02:12.698 --> 02:14.698
international national and homeland

02:14.698 --> 02:16.809
security policies as well as with the

02:16.809 --> 02:18.976
future of the global economy and human

02:18.976 --> 02:21.087
rights and freedom must pay attention

02:21.087 --> 02:23.840
to cyber issues and be actively engaged

02:23.850 --> 02:27.350
in cyber policy formulation . This

02:27.350 --> 02:29.380
document also provides a broader

02:29.380 --> 02:32.030
context for cyberspace discussions so

02:32.030 --> 02:34.252
that cyberspace policies and activities

02:34.252 --> 02:36.430
can be understood within a more

02:36.430 --> 02:38.470
comprehensive policy framework .

02:38.540 --> 02:41.360
Something that's often lost . It should

02:41.360 --> 02:43.193
come as no surprise that in this

02:43.193 --> 02:45.360
networked world these policy areas are

02:45.360 --> 02:47.560
very much interconnected . But for a

02:47.560 --> 02:49.893
government to recognize in one document ,

02:49.893 --> 02:52.770
its cyber cyberspace imperatives to

02:52.770 --> 02:54.992
recognize that those needs are grounded

02:54.992 --> 02:57.214
in our changing societies and economies

02:57.214 --> 02:59.270
and that we owe all these changes to

02:59.270 --> 03:01.437
technology and governance regimes that

03:01.437 --> 03:04.220
reward innovation and transparency

03:04.230 --> 03:07.970
that's new and that's important this

03:07.970 --> 03:10.100
document states what our policies are

03:10.110 --> 03:12.770
but just as importantly it demonstrates

03:12.770 --> 03:15.050
how they fit together that's part of

03:15.050 --> 03:17.106
the reason why I'm joined by so many

03:17.106 --> 03:18.883
people on the stage . This is a

03:18.883 --> 03:20.939
strategy that goes beyond any single

03:20.939 --> 03:23.170
department or agency . It is not an

03:23.180 --> 03:25.236
implementation plan for a particular

03:25.236 --> 03:27.013
program or a particular part of

03:27.013 --> 03:29.236
government . It is about the principles

03:29.236 --> 03:31.458
that unite our nation , the vision that

03:31.458 --> 03:33.513
unites our policy and the priorities

03:33.513 --> 03:35.980
that unite our government . So what are

03:35.980 --> 03:38.200
those goals ? They can be boiled down

03:38.200 --> 03:40.370
to the following . We seek a cyber

03:40.370 --> 03:42.592
space that is open to new innovations ,

03:42.870 --> 03:44.620
interoperable , the world over

03:44.690 --> 03:46.912
sufficiently secure to support people's

03:46.912 --> 03:49.420
work and reliable enough to earn their

03:49.420 --> 03:52.510
trust . Those four qualities are at the

03:52.510 --> 03:54.677
core of what makes the internet , what

03:54.677 --> 03:56.677
it is and what it will take to make

03:56.677 --> 04:00.160
sure that it endures much of what is in

04:00.160 --> 04:02.327
this strategy shouldn't surprise you .

04:02.327 --> 04:04.271
That's because so much of this was

04:04.271 --> 04:05.938
developed with you . It's the

04:05.938 --> 04:07.993
culmination of years of conversation

04:07.993 --> 04:10.049
with other nations with industry and

04:10.049 --> 04:11.990
with experts to our international

04:11.990 --> 04:14.101
guests . The President's message here

04:14.101 --> 04:16.350
is clear if you seek an internet that

04:16.350 --> 04:19.110
has all the same benefits of today and

04:19.110 --> 04:21.332
fewer risks . You have a partner in the

04:21.332 --> 04:23.430
United States if you want to see a

04:23.430 --> 04:25.690
world where more countries have access

04:25.690 --> 04:27.857
to these technologies and where people

04:27.857 --> 04:30.079
can use them without compromising their

04:30.079 --> 04:32.246
safety , their privacy or their rights

04:32.246 --> 04:34.468
of free expression . You have a partner

04:34.468 --> 04:36.690
in the United States and if you want to

04:36.690 --> 04:38.634
see a world in which states act as

04:38.634 --> 04:40.912
responsible stakeholders in cyberspace .

04:40.912 --> 04:43.079
To help uphold international peace and

04:43.079 --> 04:45.134
security , you have a partner in the

04:45.134 --> 04:47.830
United States and not just in the

04:47.830 --> 04:49.997
United States , but in scores of other

04:49.997 --> 04:52.163
nations that see a future where we are

04:52.163 --> 04:53.886
better connected more safely ,

04:53.886 --> 04:56.108
connector connected and free or because

04:56.108 --> 04:58.274
of it . These are in american values ,

04:58.300 --> 05:00.411
their values that have come to define

05:00.411 --> 05:02.570
the internet itself . Today , you'll

05:02.570 --> 05:04.459
hear from leaders from across the

05:04.459 --> 05:06.570
executive branch . I'm joined here by

05:06.570 --> 05:08.514
my colleague , Secretary Clinton ,

05:08.514 --> 05:10.514
attorney general holder , Secretary

05:10.514 --> 05:12.626
Locke , Secretary napolitano , Deputy

05:12.626 --> 05:14.348
Secretary Lynn and White House

05:14.348 --> 05:16.570
cybersecurity coordinator Schmidt . You

05:16.570 --> 05:18.514
see how each of these very diverse

05:18.514 --> 05:20.681
agencies took part in the efforts this

05:20.681 --> 05:22.681
strategy recognizes and how they're

05:22.681 --> 05:22.090
beginning to plan for its

05:22.090 --> 05:24.700
implementation . That work is ongoing ,

05:24.720 --> 05:26.670
but within 180 days , our

05:26.670 --> 05:28.781
administration is committed to assess

05:28.781 --> 05:31.270
progress across each relevant agency to

05:31.270 --> 05:33.159
see how well we are realizing the

05:33.159 --> 05:35.370
president's vision . The first step is

05:35.370 --> 05:37.203
the strategy which is what we're

05:37.203 --> 05:39.426
unveiling today . The next steps are up

05:39.426 --> 05:42.000
to all of us . Before I leave , I want

05:42.000 --> 05:43.833
to acknowledge the leadership of

05:43.833 --> 05:45.500
everyone on this stage of the

05:45.500 --> 05:47.667
government of the government officials

05:47.667 --> 05:49.389
in the audience and especially

05:49.389 --> 05:48.940
dedicated members of the national

05:48.940 --> 05:50.996
security staff who saw this document

05:50.996 --> 05:53.107
completion . Many thanks on behalf of

05:53.107 --> 05:55.329
the President , on behalf of a grateful

05:55.329 --> 05:57.384
nation by itself . The Internet will

05:57.384 --> 05:59.607
not usher in a new era of international

05:59.607 --> 06:01.730
cooperation that work is up to us

06:01.790 --> 06:03.734
together . We can work together to

06:03.734 --> 06:05.734
create a future for cyberspace that

06:05.734 --> 06:07.512
builds prosperity , enhance the

06:07.512 --> 06:09.810
security and safeguards openness in our

06:09.810 --> 06:12.070
networked world , this is the future we

06:12.070 --> 06:14.500
seek and we invite all nations and

06:14.500 --> 06:16.830
peoples to join us in that effort and

06:16.830 --> 06:18.941
is now my privilege to turn the party

06:18.941 --> 06:20.774
um over the secretary of state ,

06:20.774 --> 06:22.940
Hillary Rodham Clinton . Yeah ,

06:28.440 --> 06:31.460
Yeah , well , thank you very much . Um

06:32.140 --> 06:35.210
as you can guess from john's

06:35.210 --> 06:37.154
introductory remarks , we are very

06:37.154 --> 06:39.750
pleased this day has come . We are

06:39.750 --> 06:43.380
delighted at the extraordinary work

06:43.380 --> 06:45.047
that has been done across our

06:45.047 --> 06:47.310
government uh with the unveiling of

06:47.310 --> 06:49.210
this international strategy for

06:49.210 --> 06:51.970
cyberspace . And we look forward to

06:51.970 --> 06:55.760
partnering with our private sector um

06:55.770 --> 06:59.050
with other nations and with others who

06:59.050 --> 07:02.070
share the goal that is set forth in

07:02.070 --> 07:05.410
this new document that

07:05.680 --> 07:09.540
really tries to achieve the goal

07:09.540 --> 07:12.040
that is set forth uh in the very

07:12.040 --> 07:14.310
beginning . Uh and that is , the United

07:14.310 --> 07:17.370
States will work internationally to

07:17.370 --> 07:20.860
promote an open interoperable , secure

07:20.870 --> 07:23.830
and reliable information and

07:23.830 --> 07:26.680
communications infrastructure that

07:26.680 --> 07:28.790
supports international trade and

07:28.790 --> 07:31.280
commerce , strengthens international

07:31.280 --> 07:34.870
security and fosters free expression

07:34.870 --> 07:37.800
and innovation . To achieve that goal ,

07:37.810 --> 07:39.750
we will build and sustain an

07:39.750 --> 07:42.290
environment in which norms of

07:42.290 --> 07:45.500
responsible behavior Guide States

07:45.510 --> 07:48.470
actions , sustained partnerships and

07:48.470 --> 07:51.960
support the rule of law in cyberspace .

07:53.040 --> 07:56.970
This is a policy that very

07:56.970 --> 07:59.910
much sums up what the United States

07:59.910 --> 08:03.810
seeks . Uh many of you representing

08:03.820 --> 08:06.130
um the governments of other countries

08:06.130 --> 08:08.310
as well as the private sector or

08:08.310 --> 08:10.940
foundations or civil society groups

08:10.950 --> 08:13.970
share our commitment to ensuring that

08:13.980 --> 08:17.330
the internet remains open , secure and

08:17.330 --> 08:20.430
free , not only for the two billion

08:20.430 --> 08:23.390
people who are now online , but for the

08:23.390 --> 08:26.470
billions more who will be online in the

08:26.470 --> 08:29.620
years ahead , what they are able to do

08:29.620 --> 08:31.660
in cyberspace , whether they can

08:31.660 --> 08:34.810
exchange ideas and opinions openly ,

08:34.820 --> 08:37.570
freely explore the subjects of their

08:37.570 --> 08:40.340
choosing , stay safe from cyber

08:40.340 --> 08:43.040
criminals and engage in professional

08:43.040 --> 08:45.420
and personal activities online ,

08:45.430 --> 08:48.630
confident that doing so will remain

08:48.630 --> 08:51.650
private and secure , depends a great

08:51.650 --> 08:55.520
deal on the policies that we will adopt

08:55.530 --> 08:58.430
together . Now , many of you know that

08:58.440 --> 09:00.551
the State Department has staked out a

09:00.551 --> 09:03.170
position as a leader on internet

09:03.170 --> 09:05.420
freedom and I see alec Ross who has

09:05.420 --> 09:08.850
headed our efforts on that this is one

09:08.850 --> 09:12.360
critical aspect of cyber policy but we

09:12.360 --> 09:14.980
know very well that the numbers of

09:14.980 --> 09:18.240
issues seem to be infinitely expanding

09:18.250 --> 09:20.710
and we need to develop , deploy and

09:20.710 --> 09:22.830
coordinate policies that address the

09:22.830 --> 09:25.980
full array of cyber issues . That is

09:25.980 --> 09:29.040
what the U . S . International strategy

09:29.040 --> 09:31.600
for cyberspace is intended to help us

09:31.600 --> 09:34.550
do because it does as john said , bring

09:34.550 --> 09:36.820
together for the first time under one

09:36.820 --> 09:39.480
framework , all the different policies

09:39.480 --> 09:41.770
that the United States is pursuing into

09:41.770 --> 09:44.050
an integrated whole of government

09:44.050 --> 09:46.850
approach . It also articulates for the

09:46.850 --> 09:49.580
first time , all of the principles that

09:49.580 --> 09:52.310
guide our work , those that infuse our

09:52.310 --> 09:55.280
foreign policy , such as upholding the

09:55.290 --> 09:57.650
fundamental freedoms that we consider

09:57.660 --> 10:00.700
uh internet freedom to be part of uh

10:00.700 --> 10:03.460
and all the other aspects of this

10:03.460 --> 10:05.460
policy that will be addressed by my

10:05.460 --> 10:08.460
colleagues . We try to

10:09.340 --> 10:12.050
really tackle all of the difficult

10:12.060 --> 10:14.890
issues and challenges that cyberspace

10:14.900 --> 10:18.250
presents and we know very well that

10:18.260 --> 10:20.260
everything we've written today , we

10:20.260 --> 10:22.510
will have to keep updating as new

10:22.510 --> 10:25.260
challenges and opportunities arise

10:25.540 --> 10:27.651
because while the internet offers new

10:27.651 --> 10:29.620
ways for people to exercise their

10:29.620 --> 10:32.170
political rights . It also as we have

10:32.170 --> 10:34.790
seen very clearly in the last months ,

10:34.820 --> 10:36.880
gives governments new tools for

10:36.880 --> 10:39.480
clamping down on dissent . And while

10:39.480 --> 10:41.369
the internet creates new economic

10:41.369 --> 10:43.591
opportunities for people at every point

10:43.591 --> 10:46.080
on the development spectrum , it also

10:46.080 --> 10:48.440
gives criminals , new openings to steal

10:48.440 --> 10:50.960
personal data and intellectual property .

10:51.540 --> 10:53.318
And while the Internet makes it

10:53.318 --> 10:55.484
possible for governments and people to

10:55.484 --> 10:57.818
collaborate more closely across borders ,

10:57.818 --> 11:00.540
it presents new terrain for conflict

11:00.550 --> 11:02.650
when states or other actors

11:02.650 --> 11:05.540
deliberately disrupt networks or when

11:05.540 --> 11:08.030
terrorists use the internet to organize

11:08.030 --> 11:11.410
attacks . So we seek to maximize the

11:11.410 --> 11:13.490
internet's tremendous capacity to

11:13.490 --> 11:15.860
accelerate human progress while

11:15.860 --> 11:19.290
sharpening our response and our tools

11:19.300 --> 11:21.360
to deal with the threats and the

11:21.360 --> 11:24.490
problems and the disputes that are part

11:24.500 --> 11:28.230
of cyberspace . Now , as we look at

11:28.230 --> 11:30.230
this strategy , I want to be clear

11:30.240 --> 11:33.540
about what it is not . It is not a

11:33.540 --> 11:35.920
series of prescriptions and that's an

11:35.920 --> 11:38.580
important distinction because as we

11:38.580 --> 11:41.070
work to achieve a cyberspace that is

11:41.080 --> 11:43.920
open , interoperable , secure and

11:43.920 --> 11:47.200
reliable . There is no one size fits

11:47.200 --> 11:49.940
all straightforward route to that goal ,

11:50.120 --> 11:52.620
we have to build a global consensus

11:52.620 --> 11:54.780
around a shared vision for the future

11:54.780 --> 11:57.510
of cyberspace to make sure it serves

11:57.510 --> 11:59.590
rather than impedes the social ,

11:59.600 --> 12:02.490
economic and political aspirations of

12:02.500 --> 12:05.100
people worldwide . And that can only

12:05.100 --> 12:08.070
happen through patient , persistent and

12:08.070 --> 12:10.990
creative diplomacy . So the strategy

12:10.990 --> 12:14.340
identifies seven key policy priorities .

12:14.340 --> 12:16.007
That will be the focus of our

12:16.007 --> 12:18.050
diplomatic outreach going forward .

12:18.060 --> 12:20.320
They are first economic engagement to

12:20.320 --> 12:22.730
encourage innovation and trade while

12:22.730 --> 12:25.670
safeguarding intellectual property . Uh

12:25.680 --> 12:28.020
second cybersecurity to protect our

12:28.020 --> 12:30.340
networks and strengthen international

12:30.340 --> 12:33.000
security . Third law enforcement to

12:33.000 --> 12:35.340
improve our ability to respond to cyber

12:35.340 --> 12:37.540
crime , including by strengthening

12:37.540 --> 12:39.484
international laws and regulations

12:39.484 --> 12:41.990
where appropriate . Next military

12:41.990 --> 12:44.380
cooperation to help our alliances do

12:44.380 --> 12:47.240
more together to confront cyber threats

12:47.240 --> 12:49.184
while ensuring that our military's

12:49.184 --> 12:52.190
networks remain protected . Next multi

12:52.190 --> 12:54.650
stakeholder internet governance so that

12:55.040 --> 12:57.600
networks work the way they should . And

12:57.600 --> 12:59.910
then development to support the rise of

12:59.910 --> 13:01.900
new partners by helping countries

13:01.900 --> 13:04.740
develop their digital infrastructure

13:04.740 --> 13:06.900
and build their capacity to withstand

13:06.900 --> 13:09.450
cyber threats . And finally , but for

13:09.450 --> 13:11.400
us , very importantly , internet

13:11.400 --> 13:14.540
freedom , we want to do more together

13:14.550 --> 13:16.530
to protect privacy and secure

13:16.530 --> 13:18.586
fundamental freedoms of expression ,

13:18.586 --> 13:22.090
assembly and association online as we

13:22.090 --> 13:24.810
do offline together , these seven

13:24.810 --> 13:26.800
priorities comprise a new foreign

13:26.800 --> 13:29.040
policy imperative for which the State

13:29.040 --> 13:31.730
Department has been exercising and will

13:31.730 --> 13:34.590
continue to have a leading role . Now ,

13:34.590 --> 13:37.050
what we are trying to do in furtherance

13:37.060 --> 13:40.660
of those imperatives is to integrate

13:40.660 --> 13:43.490
cyber issues into our programs across

13:43.490 --> 13:45.601
the board , from our cooperation with

13:45.601 --> 13:48.120
other nations to stop Criminal cartels ,

13:48.120 --> 13:50.170
to our economic diplomacy , to our

13:50.170 --> 13:52.710
support for girls and women worldwide .

13:52.800 --> 13:55.000
We've created our 21st century

13:55.000 --> 13:57.330
statecraft agenda to harness new

13:57.330 --> 14:00.000
technologies to achieve our diplomatic

14:00.000 --> 14:02.840
and development goals . And we want to

14:02.840 --> 14:06.380
continue to press forward on this with

14:06.390 --> 14:09.160
the partners that we see here before us .

14:09.440 --> 14:11.770
We are sponsoring capacity building

14:11.770 --> 14:13.881
efforts around the world to help more

14:13.881 --> 14:16.600
countries play a bigger role in uh the

14:16.600 --> 14:19.870
internet . And as our focus on Internet

14:19.870 --> 14:22.790
freedom clearly describes , we are

14:22.790 --> 14:24.990
supporting the efforts of human rights

14:24.990 --> 14:27.750
and democracy activists to ensure that

14:27.750 --> 14:30.380
they have access to an open internet .

14:30.390 --> 14:33.010
We are funding cutting edge programs to

14:33.010 --> 14:35.530
give them the tools and the know how to

14:35.530 --> 14:38.340
communicate effectively and safely to

14:38.340 --> 14:40.007
get their message out even as

14:40.007 --> 14:43.070
governments try to silence them or cut

14:43.080 --> 14:45.320
them off from the internet to

14:45.320 --> 14:47.376
coordinate these and other efforts ,

14:47.376 --> 14:49.376
We've created the new office of the

14:49.376 --> 14:51.470
Coordinator for cyber issues . Chris

14:51.470 --> 14:53.414
Painter , a longtime expert in the

14:53.414 --> 14:55.581
field , is now on the job at the State

14:55.581 --> 14:58.000
Department , having joined us from the

14:58.000 --> 15:00.320
White House and the Nsc where he helped

15:00.330 --> 15:02.386
lead the development of the strategy

15:02.386 --> 15:05.150
we're releasing today . Chris's office

15:05.150 --> 15:06.928
is taking the lead at the State

15:06.928 --> 15:08.761
Department as we work with other

15:08.761 --> 15:10.872
nations and partners to promote these

15:10.872 --> 15:14.580
broad goals . Now we're entering a next

15:14.580 --> 15:17.130
phase in our engagement with cyberspace

15:17.130 --> 15:20.100
based on this strategy . Uh and we're

15:20.100 --> 15:22.660
seeing how countries are adjusting

15:22.660 --> 15:25.810
their own policies and approaches and

15:25.810 --> 15:28.220
we're understanding that we can't have

15:28.220 --> 15:31.980
disparate stovepiped discussions uh

15:31.990 --> 15:34.380
because as many countries have begun to

15:34.380 --> 15:36.547
focus more on internet policies and as

15:36.547 --> 15:39.050
more citizens have gone online too .

15:39.050 --> 15:41.217
Often the international discussions we

15:41.217 --> 15:44.160
have about cyber issues uh deals with

15:44.170 --> 15:46.281
each of these challenges separately ,

15:46.440 --> 15:48.107
our diplomats meet with their

15:48.107 --> 15:51.360
counterparts on cybercrime and then on

15:51.360 --> 15:53.520
another occasion on internet freedom

15:53.520 --> 15:56.320
and then finally on a third on network

15:56.320 --> 15:58.730
security . We are not dealing with

15:58.730 --> 16:01.040
these issues internationally in a

16:01.040 --> 16:04.850
coordinated integrated fashion . And

16:04.850 --> 16:07.750
so now we will based on our strategy

16:08.140 --> 16:10.530
and our hope is that you will actually

16:10.530 --> 16:13.630
read this strategy that you will engage

16:13.630 --> 16:16.800
with us on it that you will look at ,

16:16.810 --> 16:18.699
understand our principles and our

16:18.699 --> 16:21.660
approach and then join us in helping to

16:21.660 --> 16:25.210
put them into practice . We're

16:25.220 --> 16:27.740
seeing cyberspace transform before our

16:27.740 --> 16:30.360
very eyes . Now we have to shape that

16:30.370 --> 16:33.220
transformation . And we are excited

16:33.230 --> 16:35.397
that this strategy is going to give us

16:35.397 --> 16:37.563
the road map that we will follow going

16:37.563 --> 16:39.850
forward . And I look forward to working

16:39.850 --> 16:41.628
with you in the months ahead to

16:41.628 --> 16:44.570
translate this strategy into action .

16:44.840 --> 16:46.951
And it's now my pleasure to introduce

16:46.951 --> 16:49.007
my colleague , Attorney General erIC

16:49.007 --> 16:52.350
holder . Mhm . Mhm .

16:52.840 --> 16:54.850
Yeah . Mhm .

16:56.940 --> 16:58.690
Good afternoon and thank you ,

16:58.690 --> 17:00.801
Secretary Clinton . It is a privilege

17:00.801 --> 17:02.912
to join with you and so many of other

17:02.912 --> 17:04.801
government and business leaders ,

17:04.801 --> 17:06.579
security experts , civil rights

17:06.579 --> 17:08.910
advocates and international allies . As

17:08.910 --> 17:11.520
we announced a new strategy aimed at

17:11.530 --> 17:13.308
engaging our global partners in

17:13.308 --> 17:15.141
maintaining the security and the

17:15.141 --> 17:17.870
vibrancy of cyberspace . I want to join

17:17.870 --> 17:19.981
john Brennan , who I think is doing a

17:19.981 --> 17:21.370
great job in leading the

17:21.370 --> 17:23.481
administration's work on this issue ,

17:23.481 --> 17:25.426
in thanking you all for being here

17:25.426 --> 17:27.648
today and for your support and for your

17:27.648 --> 17:29.426
participation in developing the

17:29.426 --> 17:31.648
historic strategy that we have gathered

17:31.648 --> 17:34.570
here today to discuss now . Although we

17:34.570 --> 17:36.792
may approach the issue of cyber threats

17:36.792 --> 17:38.848
from different perspectives , we are

17:38.848 --> 17:41.210
really united by common goals .

17:41.220 --> 17:44.310
Security opportunity , openness and

17:44.320 --> 17:47.170
prosperity were also bound by our

17:47.180 --> 17:49.500
shared values and by our collective

17:49.510 --> 17:52.840
concerns . The 21st century threats

17:52.840 --> 17:55.470
that we now face to both our national

17:55.480 --> 17:57.770
and economic security really have no

17:57.770 --> 18:00.870
precedent and they know no borders .

18:01.000 --> 18:03.111
And they demand not only our constant

18:03.111 --> 18:05.420
attention , but also a comprehensive

18:05.430 --> 18:07.650
collaborative and well coordinated

18:07.650 --> 18:10.650
response in this new age of seamless

18:10.650 --> 18:12.520
global commerce and instant

18:12.520 --> 18:15.170
communication . We all stand to benefit ,

18:15.640 --> 18:18.350
but only if the information technology

18:18.350 --> 18:20.670
being used to drive social , economic

18:20.670 --> 18:23.360
and political progress is in fact

18:23.370 --> 18:25.910
secure . Unfortunately for every

18:25.920 --> 18:28.430
technological or commercial quantum

18:28.430 --> 18:31.020
leap that we have made criminals and

18:31.060 --> 18:32.838
stuff , an entire international

18:32.838 --> 18:35.170
criminal syndicates have kept paste

18:35.540 --> 18:37.950
threats of thefts of information that

18:37.950 --> 18:40.006
would have been impossible in an ink

18:40.006 --> 18:42.470
and paper world can now be carried out

18:42.480 --> 18:45.460
nearly undetected from almost anywhere

18:46.040 --> 18:48.380
today in communities worldwide cyber

18:48.390 --> 18:50.390
crime threatens the security of our

18:50.390 --> 18:53.120
citizens as well as the integrity of

18:53.120 --> 18:55.450
our markets , discouraging investment

18:55.460 --> 18:58.420
and stifling innovation and also often

18:58.420 --> 19:01.320
devastating businesses and individual

19:01.330 --> 19:04.370
lives . If we are to meet the goals and

19:04.370 --> 19:06.260
responsibilities that we share ,

19:06.940 --> 19:09.300
protecting public safety and personal

19:09.300 --> 19:11.540
privacy , fostering innovation and

19:11.540 --> 19:14.010
creativity and stimulating economic

19:14.020 --> 19:16.740
growth . We need a new cutting edge

19:16.750 --> 19:19.190
framework for preventing and for

19:19.190 --> 19:22.230
combating cybercrime now one that's

19:22.230 --> 19:24.063
nimble enough to fight complex ,

19:24.063 --> 19:26.230
constantly evolving threats , but also

19:26.230 --> 19:28.397
strong enough to ensure that essential

19:28.397 --> 19:30.930
freedoms are upheld . That's precisely

19:30.930 --> 19:33.170
why the new international strategy for

19:33.170 --> 19:36.680
cyberspace is so important today . With

19:36.680 --> 19:38.902
the unveiling of this strategy , we are

19:38.902 --> 19:40.958
signaling that nearly a decade since

19:40.958 --> 19:43.250
the approval of the Budapest Convention

19:43.250 --> 19:46.200
on cybercrime , A new era of global

19:46.200 --> 19:49.120
collaboration engagement and vigilance

19:49.130 --> 19:51.880
has begun just last month . I had the

19:51.880 --> 19:53.980
opportunity to travel to a Budapest

19:53.980 --> 19:56.202
where I spoke at an event Commemorating

19:56.202 --> 19:58.500
the convention 10 years ago . The

19:58.500 --> 20:00.389
United States was among the first

20:00.389 --> 20:02.230
nations to support this landmark

20:02.230 --> 20:04.390
agreement , which provided a path for

20:04.400 --> 20:06.360
allies across the world to address

20:06.370 --> 20:09.000
cyber threats and criminal activities ,

20:09.010 --> 20:11.770
while also safeguarding civil rights .

20:12.140 --> 20:14.196
This agreement and the international

20:14.196 --> 20:16.251
working groups and joint initiatives

20:16.251 --> 20:18.780
that followed it have been effective in

20:18.780 --> 20:21.030
breaking down barriers to transnational

20:21.030 --> 20:24.530
cooperation and communication and today

20:24.540 --> 20:26.596
we're working with our international

20:26.596 --> 20:28.830
partners to advance investigations and

20:28.830 --> 20:31.730
prosecutions like never before . Not

20:31.730 --> 20:33.952
only do we have agents and attorneys in

20:33.952 --> 20:36.119
place around the globe where they work

20:36.119 --> 20:38.230
alongside local law enforcement teams

20:38.230 --> 20:40.850
were also able to respond to potential

20:40.850 --> 20:43.660
threats more quickly and effectively

20:43.670 --> 20:45.900
than ever . And the results of such

20:45.900 --> 20:48.860
collaboration are clear . In recent

20:48.860 --> 20:50.860
months , the Justice Department has

20:50.860 --> 20:52.804
announced takedowns of significant

20:52.804 --> 20:55.082
criminal groups operating from Romania ,

20:55.082 --> 20:56.971
Egypt and elsewhere that had been

20:56.971 --> 20:59.090
victimizing american businesses and

20:59.090 --> 21:01.590
citizens , including Children . We've

21:01.600 --> 21:03.330
also brought multiple criminal

21:03.340 --> 21:05.730
conspirators to justice for their roles

21:05.730 --> 21:07.674
in coordinated cyber crimes that ,

21:07.674 --> 21:10.120
according to court documents , netted

21:10.120 --> 21:13.390
nearly $1.5 million us

21:13.400 --> 21:15.870
victims . And just a few weeks ago we

21:15.870 --> 21:18.320
announced an operation to disable and

21:18.320 --> 21:20.542
international criminal network that had

21:20.542 --> 21:22.370
infected more than two million

21:22.370 --> 21:24.730
computers worldwide with malicious

21:24.740 --> 21:26.930
software until we stepped in with the

21:26.930 --> 21:29.890
help of industry and security experts

21:29.940 --> 21:32.700
as well as key international partners .

21:32.780 --> 21:34.947
This malware was allowing criminals to

21:34.947 --> 21:37.250
capture bank account numbers , user

21:37.250 --> 21:40.410
names and other sensitive financial

21:40.420 --> 21:43.360
information online Now . Well , we can

21:43.360 --> 21:45.750
all be encouraged by these and by other

21:45.750 --> 21:49.170
successes . We cannot become complacent .

21:49.540 --> 21:51.890
As President Obama has repeatedly

21:51.900 --> 21:55.040
indicated we must and we will take our

21:55.050 --> 21:57.790
global fight against cyber threats to

21:57.800 --> 22:00.230
the next level . The strategy that we

22:00.230 --> 22:02.530
are announcing today is an affirmation

22:02.540 --> 22:05.610
of that promise . It reinforces our

22:05.610 --> 22:07.520
nation's support for the Budapest

22:07.520 --> 22:10.390
convention and for efforts to establish

22:10.400 --> 22:13.590
the rule of law in cyberspace . It also

22:13.590 --> 22:15.940
reflects our ongoing commitment to

22:15.940 --> 22:18.220
prevent terrorists and other criminals

22:18.220 --> 22:20.090
from exploiting the internet for

22:20.100 --> 22:22.820
operational planning or financing or

22:22.820 --> 22:26.050
for the execution of attacks , I have

22:26.050 --> 22:28.272
every confidence that this new strategy

22:28.272 --> 22:30.494
will allow us to build on the record of

22:30.494 --> 22:32.439
progress that has been achieved in

22:32.439 --> 22:34.380
recent years in preventing and

22:34.380 --> 22:36.800
combatting cyber crimes and in more

22:36.810 --> 22:39.050
effectively ensuring that the internet

22:39.050 --> 22:41.660
will continue to provide a forum for

22:41.660 --> 22:44.270
open discourse , a marketplace for

22:44.540 --> 22:46.400
commercial innovation and a safe

22:46.400 --> 22:48.178
environment for our Children to

22:48.178 --> 22:51.650
communicate and to learn . But to get

22:51.650 --> 22:53.770
where we need to be , we must bring

22:53.770 --> 22:55.659
even more government and industry

22:55.659 --> 22:58.590
partners into this work . No single

22:58.590 --> 23:01.070
agency , no single company , no single

23:01.070 --> 23:03.530
community or country has access to all

23:03.530 --> 23:06.310
of the facts necessary to fully assess

23:06.310 --> 23:08.900
the nature of the threats that we face

23:08.910 --> 23:11.900
or to adequately address them . Only by

23:11.900 --> 23:13.830
working together . Can we truly

23:13.830 --> 23:15.680
understand current problems and

23:15.690 --> 23:18.160
problems and confronting emerging

23:18.160 --> 23:20.890
challenges and only by joining forces

23:20.890 --> 23:23.840
can we effectively fight back in this

23:23.840 --> 23:26.120
fight ? I'm proud to stand with you .

23:26.130 --> 23:28.710
I'm grateful to count us partners and I

23:28.710 --> 23:30.932
look forward to what we will accomplish

23:30.932 --> 23:33.570
together in the critical days ahead and

23:33.570 --> 23:35.737
now I'm pleased to turn things over to

23:35.737 --> 23:37.459
a key leader in this work . My

23:37.459 --> 23:39.459
colleague and my friend , Secretary

23:39.459 --> 23:38.860
Gary Locke ,

23:39.840 --> 23:46.170
thank

23:46.170 --> 23:48.503
you very much . Attorney General Holder .

23:48.503 --> 23:50.614
It's really great to be here with all

23:50.614 --> 23:53.030
of you . The events of the past year

23:53.070 --> 23:55.300
and especially the last few months in

23:55.300 --> 23:58.130
the Middle East have shown us again how

23:58.140 --> 24:00.500
information technology is transforming

24:00.500 --> 24:03.360
the world the rapidly evolving digital

24:03.360 --> 24:05.890
landscapes , landscape affects us all

24:05.900 --> 24:08.160
individually and in a very , very

24:08.160 --> 24:10.940
personal way , given these dramatic

24:10.940 --> 24:13.000
changes . I'm proud to take part in

24:13.000 --> 24:15.222
this announcement of the nation's first

24:15.222 --> 24:17.690
ever all encompassing international

24:17.690 --> 24:20.840
strategy for cyberspace . This is truly

24:20.840 --> 24:23.570
a monumental effort , a comprehensive

24:23.570 --> 24:25.570
strategy in which the United States

24:25.570 --> 24:27.514
government is integrating into one

24:27.514 --> 24:30.120
single comprehensive statement . Our

24:30.120 --> 24:32.900
vision for the future of cyberspace .

24:34.440 --> 24:36.460
Industry analysts estimate that the

24:36.460 --> 24:38.238
Internet is responsible for $10

24:38.238 --> 24:41.340
trillion dollars in annual online

24:41.340 --> 24:44.270
transactions and growing every day .

24:45.140 --> 24:47.196
Today , nearly every transaction you

24:47.196 --> 24:49.550
can think of is being done online

24:50.140 --> 24:53.030
consumers paying their utility utility

24:53.030 --> 24:55.700
bills from their smartphones , people

24:55.700 --> 24:59.240
downloading movies , music and books .

24:59.250 --> 25:01.620
Online companies from the smallest

25:01.620 --> 25:04.800
local store to a bed and breakfast in

25:04.810 --> 25:07.010
in a remote rural area to the largest

25:07.010 --> 25:09.440
multinational corporation , ordering

25:09.440 --> 25:12.360
goods , paying vendors and selling to

25:12.360 --> 25:15.690
customers via the Internet to continue

25:15.690 --> 25:18.000
to fuel these and future innovations .

25:18.350 --> 25:20.620
We policymakers have a responsibility

25:20.620 --> 25:23.880
to do what we can to promote trust in

25:23.880 --> 25:26.160
this still relatively new medium .

25:27.220 --> 25:29.387
That's what should underpin everything

25:29.387 --> 25:32.460
we do regarding cyberspace trust ,

25:33.440 --> 25:36.140
people need trust that their identity

25:36.140 --> 25:38.307
and their personal information will be

25:38.307 --> 25:41.310
secure . Online businesses want to have

25:41.310 --> 25:43.254
that trust that their intellectual

25:43.254 --> 25:45.960
property won't be stolen and government

25:45.960 --> 25:48.090
agencies and our military need that

25:48.090 --> 25:50.790
trust that our trade , technology and

25:50.790 --> 25:53.550
military secrets are safe from our

25:53.550 --> 25:56.270
adversaries . And let's be candid

25:57.040 --> 25:59.430
because so much of cyberspace was

25:59.430 --> 26:01.440
initially designed for convenience

26:01.450 --> 26:03.840
rather than operational integrity as a

26:03.840 --> 26:06.220
top priority . We often times are

26:06.220 --> 26:09.560
fighting an uphill battle to preserve

26:09.860 --> 26:12.070
and even improve our people's

26:12.070 --> 26:14.320
confidence in cyberspace . We need an

26:14.320 --> 26:16.209
environment that not only rewards

26:16.209 --> 26:18.360
innovation and empowers entrepreneurs

26:19.040 --> 26:21.151
but one that also constantly improves

26:21.151 --> 26:23.318
upon the integrity of the interactions

26:23.318 --> 26:26.700
that take place online . And as the

26:26.700 --> 26:29.990
strategy points out , cyberspace should

26:29.990 --> 26:32.160
safeguard fundamental freedoms and

26:32.160 --> 26:35.740
enhance personal privacy . It should be

26:35.740 --> 26:38.980
open to innovation , be interoperable

26:38.990 --> 26:41.520
the world over and facilitate novel

26:41.520 --> 26:44.820
ways of conducting trade and cyberspace

26:44.820 --> 26:46.598
should be secure enough to earn

26:46.598 --> 26:49.130
people's trust and reliable enough to

26:49.130 --> 26:51.790
support people's work furthermore ,

26:51.790 --> 26:54.440
Deliberations on cyberspace policy must

26:54.440 --> 26:56.840
not be limited to governments but must

26:56.840 --> 26:59.840
include appropriate stakeholders . The

26:59.840 --> 27:02.007
Commerce Department is pleased to play

27:02.007 --> 27:04.500
an important role in making real the

27:04.500 --> 27:06.444
strategy that we're discussing and

27:06.444 --> 27:08.540
announcing today to ensure that

27:08.540 --> 27:10.762
cyberspace continues to serve the needs

27:10.770 --> 27:13.240
of our companies and innovators . The

27:13.240 --> 27:15.351
Department of Commerce will work with

27:15.351 --> 27:17.518
our colleagues to sustain a free trade

27:17.518 --> 27:19.018
environment , to encourage

27:19.018 --> 27:21.490
technological innovation on accessible ,

27:21.500 --> 27:24.150
globally linked networks to protect

27:24.160 --> 27:26.049
intellectual property , including

27:26.049 --> 27:28.760
commercial trade secrets from theft and

27:28.760 --> 27:30.927
to ensure that technical standards are

27:30.927 --> 27:33.410
made robust as determined by technical

27:33.420 --> 27:36.670
experts , not Mercantilist . All of

27:36.670 --> 27:39.930
these efforts , current and ongoing are

27:39.940 --> 27:43.500
aimed at shoring up and improving upon

27:43.500 --> 27:47.250
people's trust in cyberspace . Now , as

27:47.250 --> 27:49.139
you know , I've been nominated by

27:49.139 --> 27:50.917
President Obama to serve as the

27:50.917 --> 27:53.028
nation's next ambassador to china and

27:53.028 --> 27:55.194
this is a very humbling assignment but

27:55.194 --> 27:57.417
also a challenge I'm looking forward to

27:57.417 --> 27:59.750
and should I be confirmed by the Senate ,

27:59.750 --> 27:59.450
I look forward to working with

27:59.450 --> 28:01.172
Secretary Clinton and my other

28:01.172 --> 28:03.480
colleagues to advance these goals and

28:03.480 --> 28:05.810
the broader set of cyberspace issues

28:05.820 --> 28:08.650
with our chinese counterparts . Because

28:08.650 --> 28:10.620
as the strategy makes clear , the

28:10.630 --> 28:12.870
effort to build trust in the cyberspace

28:12.870 --> 28:15.630
realm is one that must be pushed beyond

28:15.640 --> 28:18.270
in capitals all around the world .

28:19.240 --> 28:21.430
Thank you very much . And now it's my

28:21.440 --> 28:23.551
pleasure to turn the podium over to a

28:23.551 --> 28:25.607
longtime friend and dear colleague ,

28:25.610 --> 28:26.888
Secretary napolitano ,

28:27.640 --> 28:35.000
Thank

28:35.000 --> 28:37.270
you Gary . And let me add my words to

28:37.270 --> 28:40.570
those who have come before . Uh and uh

28:40.580 --> 28:44.230
say that this strategy present presents

28:44.230 --> 28:46.330
a blueprint for building an

28:46.330 --> 28:48.274
international framework for making

28:48.274 --> 28:51.950
cyberspace secure and reliable as we

28:51.950 --> 28:54.950
know . Cyberspace is a relatively new

28:54.950 --> 28:57.500
form for human interaction , but it has

28:57.500 --> 29:00.360
quickly become vital to our way of life .

29:01.040 --> 29:03.800
The Department of Homeland Security has

29:03.800 --> 29:05.967
the lead for the federal government in

29:05.967 --> 29:09.810
three major areas . 1 to secure federal

29:09.810 --> 29:13.710
executive branch computer systems to to

29:13.710 --> 29:16.120
work with industry to defend privately

29:16.120 --> 29:17.830
owned and operated critical

29:17.840 --> 29:20.990
infrastructure and three to work with

29:20.990 --> 29:23.240
state , local , tribal and territorial

29:23.240 --> 29:25.620
governments to secure their information

29:25.620 --> 29:29.420
systems without a secure cyberspace .

29:29.430 --> 29:32.030
Critical infrastructure like power and

29:32.030 --> 29:34.610
water stop functioning and basic

29:34.610 --> 29:36.830
necessities don't make it onto store

29:36.830 --> 29:39.050
shelves . Our economies , our health

29:39.050 --> 29:41.450
care systems and our transportation

29:41.450 --> 29:44.560
networks all depend on secure and

29:44.560 --> 29:47.350
resilient cyber networks . That's why

29:47.350 --> 29:51.050
at DHS we see cybersecurity as part and

29:51.050 --> 29:53.350
parcel of a secure and resilient

29:53.350 --> 29:55.560
homeland and something that can't be

29:55.560 --> 29:58.200
treated as separate and distinct from

29:58.200 --> 30:01.090
our other missions . Indeed , it's why

30:01.090 --> 30:03.950
we've identified securing cyberspace as

30:03.950 --> 30:06.230
one of our five core missions and one

30:06.230 --> 30:09.850
of our priority areas of focus . The US

30:09.850 --> 30:12.080
International strategy for cyberspace

30:12.080 --> 30:14.350
will foster deeper , more effective

30:14.350 --> 30:16.239
collaboration among international

30:16.239 --> 30:18.540
partners , government , non government

30:18.550 --> 30:20.780
and private sector entities as well as

30:20.780 --> 30:23.180
individuals , families and communities .

30:23.190 --> 30:25.950
All of these play a role in creating a

30:25.950 --> 30:29.490
more secure cyberspace . Specifically ,

30:29.530 --> 30:31.490
the strategy calls for assisting

30:31.500 --> 30:33.830
international partners with capacity

30:33.830 --> 30:37.030
building . This is an area where DHS

30:37.040 --> 30:39.260
can help , particularly when it comes

30:39.260 --> 30:41.170
to developing computer emergency

30:41.170 --> 30:43.490
response and readiness teams . The so

30:43.490 --> 30:47.080
called certs DHS has a particular

30:47.080 --> 30:49.790
strength and facilitating open , secure

30:49.800 --> 30:52.460
and reliable networks . Were therefore

30:52.460 --> 30:54.293
glad that the strategy calls for

30:54.293 --> 30:56.400
developing and regularly sharing

30:56.430 --> 30:58.550
international cybersecurity best

30:58.550 --> 31:01.110
practices , an area where we all have

31:01.110 --> 31:04.100
significant capabilities . The strategy

31:04.100 --> 31:06.330
also will benefit many of our existing

31:06.330 --> 31:08.660
efforts to promote a reliable and

31:08.660 --> 31:10.780
secure cyberspace through greater

31:10.780 --> 31:12.850
partnerships and collaboration ,

31:12.860 --> 31:15.600
increased awareness and stronger action

31:15.600 --> 31:17.711
among government , the private sector

31:17.711 --> 31:20.460
civil society and individuals alike .

31:21.140 --> 31:23.500
I'd also want to note that the strategy

31:23.500 --> 31:25.389
calls for us to work closely with

31:25.389 --> 31:28.060
infrastructure owners and operators .

31:28.440 --> 31:30.570
The private sector controls a

31:30.570 --> 31:32.640
significant majority of network

31:32.640 --> 31:35.590
functionality and already at DHS we're

31:35.590 --> 31:37.960
working with private sector partners to

31:37.960 --> 31:40.820
build a more secure cyber ecosystem for

31:40.820 --> 31:44.300
all users . Therefore , this strategy

31:44.300 --> 31:47.310
provides us and helps us push forward a

31:47.310 --> 31:50.790
solid basis upon which to build for us .

31:50.800 --> 31:53.580
Cybersecurity like the other security

31:53.580 --> 31:56.510
challenges is a shared responsibility

31:56.520 --> 31:58.631
and the government , private sector ,

31:58.631 --> 32:00.742
the public and other key stakeholders

32:00.742 --> 32:04.050
all have important roles to play . DHS

32:04.050 --> 32:06.161
has been involved . From the outset ,

32:06.161 --> 32:08.272
we feel strongly about our ability to

32:08.272 --> 32:10.650
support its implementation and we look

32:10.650 --> 32:12.594
forward to working with all of our

32:12.594 --> 32:14.761
partners in the weeks and months ahead

32:14.761 --> 32:17.790
to make this vision a reality . We

32:17.790 --> 32:20.210
understand the importance of this work .

32:20.220 --> 32:23.570
A secure and reliable cyberspace is not

32:23.570 --> 32:25.860
only critical to our shared security

32:25.870 --> 32:28.670
but to our shared prosperity as well .

32:29.340 --> 32:31.380
Thank you . And now I would like to

32:31.390 --> 32:33.390
recognize and bring to the podium .

32:33.390 --> 32:36.270
Deputy Secretary Bill in . Yeah ,

32:44.040 --> 32:46.050
thank you . Secretary napolitano

32:47.940 --> 32:50.162
as the President's strategy makes clear

32:50.170 --> 32:52.690
the challenges we face in cyberspace

32:53.140 --> 32:55.450
are not amenable to narrow solutions .

32:56.140 --> 32:58.190
No single agency can tackle the

32:58.190 --> 33:01.550
required issues . No one nation can

33:01.550 --> 33:03.510
devise or enforce a sustainable

33:03.510 --> 33:07.010
solution and the challenges extend even

33:07.010 --> 33:09.010
beyond what governments can achieve

33:09.010 --> 33:11.790
alone . The private sector , both here

33:11.800 --> 33:14.600
and around the world must be part of a

33:14.600 --> 33:17.680
solution . The international cyber

33:17.680 --> 33:20.160
strategy laid out by President Obama

33:20.540 --> 33:23.730
recognizes this complexity in the broad

33:23.730 --> 33:26.490
approach we must pursue to realize the

33:26.490 --> 33:29.090
revolutionary benefits of network

33:29.090 --> 33:32.560
technology . It is hard to overstate

33:32.560 --> 33:34.560
the importance of cyberspace to the

33:34.560 --> 33:37.110
Department of Defense or the need to

33:37.110 --> 33:39.800
engage our allies and partners to keep

33:39.800 --> 33:43.540
it secure along with the advantages of

33:43.810 --> 33:46.630
conferred by cyberspace comes the

33:46.630 --> 33:48.408
threat of potentially crippling

33:48.408 --> 33:51.030
cyberattacks . Department of Defense

33:51.030 --> 33:53.252
networks are probed millions of times a

33:53.252 --> 33:55.150
day and more than 100 foreign

33:55.150 --> 33:57.150
intelligence agencies have tried to

33:57.150 --> 33:59.206
penetrate our networks with those of

33:59.206 --> 34:01.428
our industrial partners . Cyber threats

34:01.428 --> 34:03.480
are growing more serious and more

34:03.480 --> 34:06.540
prevalent . Our military continues to

34:06.540 --> 34:08.707
ensure that we can operate with secure

34:08.707 --> 34:10.960
and reliable networks and maintain the

34:10.960 --> 34:13.020
capability to defend vital national

34:13.020 --> 34:16.740
assets . The military's role in keeping

34:16.740 --> 34:19.180
our network secure will be further

34:19.180 --> 34:21.402
detailed in our departments forthcoming

34:21.402 --> 34:23.630
strategy for operating in cyberspace .

34:24.540 --> 34:26.130
But our role in furthering

34:26.140 --> 34:28.196
international cooperation is already

34:28.196 --> 34:30.880
clear a bedrock principle of this

34:30.880 --> 34:34.170
administration and this president is to

34:34.170 --> 34:36.300
usher in a new era of engagement with

34:36.300 --> 34:39.470
the world based on mutual interests and

34:39.470 --> 34:43.030
mutual respect . The department does

34:43.030 --> 34:44.752
not face cyber threats alone ,

34:45.340 --> 34:47.396
individuals , the private sector and

34:47.396 --> 34:49.450
other nations all face dangers in

34:49.450 --> 34:52.430
cyberspace . And as this strategy makes

34:52.430 --> 34:55.140
clear , we are all better off acting

34:55.140 --> 34:58.600
together to meet these threats . Indeed ,

34:58.600 --> 35:00.711
there is a strong logic to collective

35:00.711 --> 35:03.610
cyber defense sharing malware

35:03.610 --> 35:05.610
signatures and how they are used to

35:05.610 --> 35:08.170
perpetrate intrusions greatly enhances

35:08.170 --> 35:10.392
the effectiveness of network defenses .

35:11.240 --> 35:13.240
Just as our air defenses are linked

35:13.240 --> 35:15.240
with those of our allies to provide

35:15.240 --> 35:17.590
warning of attack . So too , must we

35:17.590 --> 35:19.900
share information to prevent and if

35:19.900 --> 35:22.510
necessary , respond to cyber intrusions .

35:23.700 --> 35:25.756
In the past year , the Department of

35:25.756 --> 35:27.756
Defense has worked with some of our

35:27.756 --> 35:29.922
closest allies , including Australia ,

35:29.922 --> 35:31.978
Canada , the United Kingdom's United

35:31.978 --> 35:34.400
Kingdom and the countries of NATO to

35:34.400 --> 35:36.490
strengthen our cyber partnerships .

35:37.940 --> 35:39.884
While our efforts are increasingly

35:39.884 --> 35:42.218
linked with many international partners ,

35:42.218 --> 35:44.630
far greater levels of cooperation with

35:44.630 --> 35:46.970
more nations are needed if we are to

35:46.970 --> 35:49.910
stay ahead of the cyber threat . The

35:49.910 --> 35:51.910
strategy the president is releasing

35:51.910 --> 35:54.320
today provides a framework for how we

35:54.320 --> 35:56.810
can expand this cooperation and

35:56.810 --> 35:59.160
establishes how network security

35:59.200 --> 36:02.180
relates to other critical areas a

36:02.180 --> 36:04.740
partnership . Ultimately , this

36:04.740 --> 36:06.962
strategy will help us build a coalition

36:06.962 --> 36:09.250
of nations whose mutual interest in

36:09.250 --> 36:11.880
securing cyberspace will ensure the

36:11.880 --> 36:14.800
benefits we derive from it flow

36:14.810 --> 36:18.190
uninterrupted . I'm delighted to carry

36:18.190 --> 36:21.020
forward our cooperation in the cyber

36:21.020 --> 36:23.410
realm and look forward to working

36:23.410 --> 36:25.188
closely in this effort with the

36:25.188 --> 36:27.410
departments of State Justice , Commerce

36:27.410 --> 36:29.340
and Homeland Security under the

36:29.340 --> 36:32.240
leadership of President Obama , it's

36:32.240 --> 36:34.407
now my pleasure to introduce the White

36:34.407 --> 36:36.296
House cybersecurity coordinator .

36:36.296 --> 36:40.160
Howard Schmidt . Okay .

36:40.930 --> 36:44.880
Mhm . Yeah , yeah , thank you very

36:44.880 --> 36:46.936
much . Deputy Secretary Lynn and all

36:46.936 --> 36:49.047
the distinguished colleagues that are

36:49.047 --> 36:51.213
here and it's particularly nice to see

36:51.213 --> 36:53.102
you in environment outside of the

36:53.102 --> 36:53.070
situation , room for a chain . So it's

36:53.070 --> 36:55.690
great to be here . The very fact that

36:55.690 --> 36:57.857
everyone is here on this stage at this

36:57.857 --> 37:00.023
time , really speaks to the importance

37:00.023 --> 37:02.079
of this issue to our government , to

37:02.079 --> 37:04.079
our nation and to the international

37:04.079 --> 37:06.023
community . I've long said for the

37:06.023 --> 37:08.023
internet to continue to thrive . We

37:08.023 --> 37:10.079
have to recognize that our work is a

37:10.079 --> 37:11.870
team , sport . If you want more

37:11.870 --> 37:13.870
evidence of how committed we are to

37:13.870 --> 37:15.926
this . Just take a look at the stage

37:15.926 --> 37:17.814
and see the leadership across the

37:17.814 --> 37:19.981
government that supports this . In the

37:19.981 --> 37:21.926
last half hour , you've heard from

37:21.926 --> 37:23.759
departments of State , Justice ,

37:23.759 --> 37:25.814
Commerce , homeland Security Defense

37:25.814 --> 37:27.926
and the White House all speaking on a

37:27.926 --> 37:30.037
strategy that brings all together all

37:30.037 --> 37:31.870
the international work regarding

37:31.870 --> 37:34.200
cyberspace , but just look around you

37:34.200 --> 37:36.422
in the audience . In this audience . We

37:36.422 --> 37:38.089
have top leaders from foreign

37:38.089 --> 37:40.311
governments for our own departments and

37:40.311 --> 37:42.422
agencies and especially the dedicated

37:42.422 --> 37:44.422
men and women across the colleagues

37:44.422 --> 37:46.533
that we have in the National Security

37:46.533 --> 37:48.533
staff , the executive office of the

37:48.533 --> 37:50.589
President . We also have an industry

37:50.589 --> 37:52.810
civil society as well as academia . We

37:52.810 --> 37:54.977
fully recognize it will take all of us

37:55.430 --> 37:57.430
to realize the future of cyberspace

37:57.430 --> 38:00.530
that is open , inoperable , secure and

38:00.530 --> 38:03.160
reliable . As Secretary Clinton

38:03.160 --> 38:04.771
mentioned this project was a

38:04.771 --> 38:07.010
collaboration more than 18 different

38:07.010 --> 38:09.320
departments and agencies and countless

38:09.320 --> 38:11.542
consultations with partners at home and

38:11.542 --> 38:14.820
abroad are thinking of the way forward

38:14.960 --> 38:17.127
and how we organize has been developed

38:17.127 --> 38:19.238
as we've been working on a strategy ,

38:19.238 --> 38:21.182
We've implemented a lot of changes

38:21.182 --> 38:23.016
through this . Starting with the

38:23.016 --> 38:25.071
President's decision how to organize

38:25.071 --> 38:27.071
the White House to create the cyber

38:27.071 --> 38:29.127
Security Office , which is dual dual

38:29.127 --> 38:31.182
had it between the National Security

38:31.182 --> 38:33.404
staff , the National Economic Council .

38:33.404 --> 38:35.627
But there are some things that have and

38:35.627 --> 38:37.516
will always remain the same . Our

38:37.516 --> 38:39.293
abiding commitment to serve the

38:39.293 --> 38:41.293
President's vision for prosperity ,

38:41.293 --> 38:42.904
Security and openness in our

38:42.904 --> 38:45.180
interconnected world , our entire

38:45.180 --> 38:47.291
governments deep seated commitment to

38:47.291 --> 38:49.458
fundamental freedoms of expression and

38:49.458 --> 38:51.513
association to privacy into the free

38:51.513 --> 38:54.750
flow of information and of course , our

38:54.750 --> 38:56.417
commitment to ensure national

38:56.417 --> 38:58.306
cybersecurity core activities are

38:58.306 --> 39:00.570
coordinated true to our principles and

39:00.570 --> 39:03.100
serving the american people . Now ,

39:03.100 --> 39:05.270
some people may ask , is this a new

39:05.270 --> 39:07.760
strategy ? And yes , but it's not as

39:07.760 --> 39:09.704
often not the same type . We often

39:09.704 --> 39:12.440
think about . We begin this strategy by

39:12.440 --> 39:15.740
recognizing the long term cybersecurity

39:16.120 --> 39:18.300
in cyberspace depends on international

39:18.300 --> 39:21.060
cooperation . It depends on states

39:21.060 --> 39:23.227
recognizing all the good that can come

39:23.227 --> 39:25.227
from these systems and building the

39:25.227 --> 39:27.171
prosperity that secretary locks so

39:27.171 --> 39:29.680
ultimately pointed to . It depends on

39:29.680 --> 39:31.700
building as a series of states and

39:31.700 --> 39:33.867
communities that can see the intrinsic

39:33.867 --> 39:36.500
benefits of cyberspace , where trust

39:36.510 --> 39:39.090
and progress went out over fear and

39:39.090 --> 39:42.000
control . It depends on us doing our

39:42.010 --> 39:44.270
own work here at home as Attorney

39:44.270 --> 39:46.750
General holder and Secretary napolitano

39:46.760 --> 39:48.560
made clear to reduce the

39:48.560 --> 39:50.560
vulnerabilities and to build on the

39:50.560 --> 39:53.020
rule of law and helping one another as

39:53.020 --> 39:55.970
we do so . Because Deputy Secretary lin

39:55.970 --> 39:58.026
mentioned , it depends on us joining

39:58.026 --> 39:59.859
together as we collect , we work

39:59.859 --> 40:01.748
together in a collective security

40:01.748 --> 40:04.110
framework to confront not only new but

40:04.110 --> 40:07.160
existing threats that exist , but to be

40:07.160 --> 40:09.382
clear , this is just the beginning of a

40:09.382 --> 40:12.020
conversation within governments between

40:12.020 --> 40:14.410
governments with the private sector and

40:14.410 --> 40:17.440
beyond . For us on this stage , the

40:17.440 --> 40:20.020
strategy will be a guiding document for

40:20.020 --> 40:22.187
our departments and agencies to better

40:22.187 --> 40:24.076
define and coordinate the role in

40:24.076 --> 40:26.350
international cyberspace policy to

40:26.350 --> 40:28.690
execute a specific way forward and the

40:28.690 --> 40:32.280
plan for future implementation . But

40:32.280 --> 40:34.502
it's also called a private sector civil

40:34.502 --> 40:37.190
society and end users to reinforce

40:37.190 --> 40:39.468
these efforts through the partnerships ,

40:39.468 --> 40:42.880
awareness and specific actions . But

40:42.880 --> 40:45.102
most importantly it's an invitation for

40:45.102 --> 40:47.213
other states and peoples to join us .

40:47.410 --> 40:49.354
We look forward to continuing this

40:49.354 --> 40:51.354
conversation with you both here and

40:51.354 --> 40:54.450
abroad , online and offline and I hope

40:54.450 --> 40:56.450
you all have a chance to review the

40:56.450 --> 40:58.617
strategy and depth and meet with us in

40:58.617 --> 41:00.783
the coming weeks and months to further

41:00.783 --> 41:02.894
discuss it . But we also look forward

41:02.894 --> 41:05.117
to your engagement on some of the other

41:05.117 --> 41:07.283
crucial pieces the administration wide

41:07.283 --> 41:09.172
cybersecurity efforts you've been

41:09.172 --> 41:11.394
hearing about lately last month we lost

41:11.394 --> 41:13.283
our national strategy for trusted

41:13.283 --> 41:15.283
identities in cyberspace or the end

41:15.283 --> 41:17.339
stick and thanks again the secretary

41:17.339 --> 41:19.900
lock for his leadership as Nist has

41:19.900 --> 41:21.900
been a great partner in this effort

41:21.900 --> 41:24.011
moving forward . And just last week ,

41:24.011 --> 41:26.178
as john had mentioned , we release the

41:26.178 --> 41:28.289
administration's legislative proposal

41:28.289 --> 41:30.344
designed to dramatically improve our

41:30.344 --> 41:32.400
domestic cyber security and enhanced

41:32.400 --> 41:34.733
civil liberties and privacy protections .

41:34.733 --> 41:36.956
One more thing that's part of a broader

41:36.956 --> 41:39.122
administration dialogue together under

41:39.122 --> 41:41.178
President Obama's leadership , we've

41:41.178 --> 41:43.233
accomplished three milestones in our

41:43.233 --> 41:45.456
efforts to get the most from cyberspace

41:45.456 --> 41:47.400
nationally and extend its benefits

41:47.400 --> 41:49.400
globally . But this is just the

41:49.400 --> 41:51.240
beginning we look forward to

41:51.240 --> 41:53.351
highlighting even more initiatives we

41:53.351 --> 41:55.129
move forward , like the ongoing

41:55.129 --> 41:57.351
national initiative for cybersecurity ,

41:57.351 --> 41:59.296
education or nice as we know it as

41:59.296 --> 42:01.518
we'll be talking more about that in the

42:01.518 --> 42:03.518
near future . But I've gone on long

42:03.518 --> 42:05.629
enough now , it's time for all of you

42:05.629 --> 42:07.796
to get your opportunity to review this

42:07.796 --> 42:09.962
document for yourselves for all of you

42:09.962 --> 42:12.129
joining us here today , we're happy to

42:12.129 --> 42:13.851
provide you with a copy of the

42:13.851 --> 42:16.018
International Strategy on your way out

42:16.018 --> 42:18.184
and for those of you watching online ,

42:18.184 --> 42:20.351
you can find it at White House dot gov

42:20.351 --> 42:22.351
where the next few minutes our blog

42:22.351 --> 42:24.407
will go live with a link to the full

42:24.407 --> 42:26.240
document I began on the topic of

42:26.240 --> 42:28.351
teamwork and I want to conclude on it

42:28.351 --> 42:30.573
and for that , I want to acknowledge my

42:30.573 --> 42:32.629
team who kept it on trap , including

42:32.629 --> 42:34.796
what I refer to often time as my cyber

42:34.796 --> 42:37.040
uh the chief cyber diplomat within the

42:37.040 --> 42:40.010
Nss . David , Adelman with our team and

42:40.010 --> 42:42.177
working across the White House and the

42:42.177 --> 42:44.288
department of the agencies helped put

42:44.288 --> 42:46.621
this together not only government speed ,

42:46.621 --> 42:48.621
but internet speed . So thank you ,

42:48.621 --> 42:50.510
David and say thank you Secretary

42:50.510 --> 42:52.732
Clinton for loaning him to us , they'll

42:52.732 --> 42:54.843
make this work . So please join me in

42:54.843 --> 42:56.843
thanking everyone who was a part of

42:56.843 --> 42:59.066
this are distinguished speakers today .

42:59.066 --> 43:01.288
Mr Brennan for hosting us all and thank

43:01.288 --> 43:03.343
you very much for coming . Thank you

43:03.400 --> 43:04.230
Yeah . Mhm

