Page images
PDF
EPUB

September 13, 2005

The Honorable Sherwood Boehlert
Chairman, Science Committee
2320 Rayburn Office Building
Washington, DC 20515

Dear Congressman Boehlert:

Thank you for the invitation to testify before the Committee on Science of the U.S.
House of Representatives on September 15th for the hearing entitled "Cybersecurity:
How Can the Government Help Address Vulnerabilities in Critical Industries?." In
accordance with the Rules Governing Testimony, this letter serves as formal notice of the
federal funding I currently receive related to the hearing topic.

I received no federal funding directly supporting the subject matter on which I
testified, in the current fiscal year or either of the two proceeding fiscal years.

Sincerely,

Gerald S. Freese

Chairman BOEHLERT. Thank you very much.

Mr. Geisse. After that wonderful introduction by Mr. Akin, I want to make sure we hear you.

STATEMENT OF MR. ANDREW M. GEISSE, CHIEF INFORMATION OFFICER, SBC SERVICES, INC.

Mr. GEISSE. It doesn't go against my five minutes, does it?

Okay. Thank you, Chairman Boehlert, Ranking Member Gordon, other Members of the Committee. And I would like to thank Congressmen Akin and Sessions for that unexpected and kind introduction.

I am pleased to represent SBC Communications on this panel focused on cyber security within critical industries.

SBC has a long history of providing reliable communication services. We provide voice and data communication services as a local exchange carrier in 13 states. We also provide services nationally as a long distance provider, data services provider, and Internet services. We have a national wireless presence with BellSouth in

Cingular Wireless, and we recognize the importance of our nation's critical communications infrastructure and the role that it plays for the security of the United States and its citizens. Integrity and reliability of our networks have been cornerstones of the communications industry.

At SBC, we implement both physical and cyber security measures that protect both our customer-serving networks as well as our internal information systems networks. Physical security measures include things like guard services, card key IDs, visible badge policies, video monitoring, and in special cases, biometric type security.

Information security, though, begins with the employee, and it begins as being part of our code of business conduct that every employee has to read and sign off on each year. We segment our internal network connections from our external network connections using various security technologies to ensure the integrity of our networks. We keep our internal core business network separate from the general employee network, and we use virus protection software, of course, on all of our PCs as well as our e-mail servers. Proactive vulnerability scanning is a key part of our strategy, and it is something that we do on a daily basis. SBC maintains close ties to government agencies responsible for national security. We work closely with them on a daily basis to receive and share security-related information. Examples are the National Security Telecommunications Advisory Council, the National Coordinating Center Telecom Telecom Information Sharing and Analysis Center, Infragard, and the National Security Information Exchange.

Continued government focus on security standards and collaborative support organizations is seen positively by SBC; providing research assistance, grants, and funds to focus the information technology industry to work towards security standards and best practices is absolutely necessary. It is important that the government provides to the critical industries that are part of our infrastructure the best practices that they learn from their own cyber security agencies.

Society in the 21st century is rapidly changing with increasing reliance on information technologies. Users expect that they be mobile and that they have access to the Internet and e-mail wherever they are. Providing secure services in the environment becomes increasingly important and challenging. Federal programs could help educate and assist consumers to understand their roles and responsibilities in a connected world.

As recognized by the Department of Homeland Security, the Nation is dependent on the critical infrastructure of communications, banking and finance, power, food, health, information technology, and others. A disruption to any component of those affects the whole infrastructure. Securing against disruptions of any component is a best interest of all of us.

The communication industry is also increasingly dependent on application and information technology vendors to ensure the products they provide are of the highest quality and integrity. Software and hardware that does not meet industry standards or best practices require additional efforts and expense to meet its expected function. Vendors that provide software or hardware with security

vulnerabilities that must be continually monitored, reviewed, patched drain on a company's resources and a liability to companies that must ensure the integrity of their own systems, data, and services.

As a result, cyber security must become a priority in the creation of new information technologies. To date, security components are often an afterthought. I mean, you can look at cellular and Wi-fi when they first came out in the ability to intercept calls, clone phones, and data snooping where they could occur.

Internet protocol-based services wrestle constantly with the need to traverse the same network paths where unscrupulous persons may have the ability to interfere, impede, or intrude on the service itself. IP-based services must find new ways to protect the content of each packet that is carried and delivered in the shared Internet world. SBC is committed to work with the information industry to help build the next generation of Internet-based voice and video and data services securely.

Mr. Chairman and Members of the Committee, your assistance to focus industry attention on cyber security is greatly appreciated. We encourage the Department of Homeland Security to continue to support research grants and assistance that focus on national cyber security, to support industry organizations and government agencies that create security standards and best practices, to continue to provide early warnings of security events through various government agencies, and to make sure that the government-identified security best practices are shared with our private, critical infrastructure industries.

I would like to add that you make sure that our laws carry serious penalties for cyber security issues and that the instigators are prosecuted to the full extent of the law. It must become a major crime. It is no longer just kids playing with computers. It is a real threat and the attacks are serious.

Thank you for the opportunity to appear here today. The work you are doing is critical to our future as a nation. Cyber terrorism is a real threat, and we must stay diligent.

Thank you, Mr. Chairman.

[The prepared statement of Mr. Geisse follows:]

PREPARED STATEMENT OF ANDREW M. GEISSE

Thank you, Chairman Boehlert, Ranking Member Gordon and Members of the Committee.

I am pleased to represent SBC Communications on this panel focused on cyber security within our nation's critical industries.

SBC has a long history of providing reliable communication services. SBC provides voice and data communications services as a local exchange carrier within thirteen states and nationally with long distance, data and Internet services. We also have a national wireless presence in Cingular Wireless in a partnership with BellSouth. We recognize the importance of our nation's critical communication infrastructure and the role it plays for the protection of the United States and its citizens. Integrity and reliability of our networks have been historic cornerstones of the communications industry.

As society becomes more and more dependent on information technology, cyber security must be a priority to protect the services provided by those same resources. How does the communications sector depend on public and private information systems?

SBC well understands the strong connection between communications security and information technology, or what is commonly referred to as cyber security.

Behind the networks that move voice and data, are many applications, private networks, and computing resources. These resources support the operations, administration, maintenance, and provisioning services of our telecommunications infrastructure. These information systems and networks provide SBC and other carriers the ability to manage this complex industry supporting the dial tone and Internet connections that we have all come to expect as a part of our daily lives. Securing these cyber resources to ensure the integrity and availability of communications networks is a role that SBC takes seriously, as part of its corporate culture.

SBC uses many vendor products within its information technology infrastructure. In that regard, SBC is dependent on vendor product development in the private sector and delivery of private sector services and materials to support the information technology services of the infrastructure. In this manner, SBC relies on vendors to incorporate cyber security best practices, standard interfaces, and administrative tools within their products. SBC is also reliant on vendors to ensure their software products can be patched easily to prevent existence of long-term vulnerabilities.

In support of the private sector, SBC provides managed security services as a product offering. These types of services include: risk reviews and analysis, firewall installation and monitoring, and firewall and intrusion prevention/detection reseller for other vendor products.

For the consumer space, SBC's Internet Services organization through our relationship with Yahoo! provides security tools to our Internet Services customers as part of their Internet experience. In this manner, SBC supports cyber security to the consumer so they can better protect their home information technologies, which in turn provides less problems to the shared Internet space.

Other areas where SBC has focused on consumer cyber security is as a founding member of the Internet NOC Hotline, which connects key U.S. and International ISPs. SBC is also a founding member of the Global Infrastructure Alliance for Internet Security.

An area where SBC would recommend government focus is on the education of the consumers regarding cyber security matters. End users must recognize they are part of the interconnected world. When end-users do not understand how virus and worm propagation can impact their home PCs, the result is a negative effect at the Internet level. This impact is caused through a variety of malicious activities, including, SPAM e-mails and bot-networks. Educational awareness programs should advise users on anti-virus protection and identity theft protection.

What steps is SBC taking to secure its systems?

At SBC, we implement physical and cyber security measures that protect both our customer-serving network facilities and our internal information services. Physical security measures include guard services, card key technologies, visible badge policies, video monitoring, and, in special cases, bio-metric technologies.

Information security begins with a cyber security policy that is part of our Corporate Code of Business Conduct. We segment our internal network connections from external networks using various security technologies to ensure the integrity of our network. We keep our internal core business networks separate from the general employee network. Virus protection software is deployed as standard on desktops and e-mail servers. Pro-active vulnerability scanning is performed constantly to identify potential areas of risk.

SBC maintains close ties to government agencies responsible for national security. We work closely with them on a daily basis to receive and share security related information. Examples are the National Security Telecommunications Advisory Council (NSTAC), National Coordinating Center Telecom Information Sharing and Analysis Center (NCC Telecom ISAC), Infragard, and the National Security Information Exchange (NSIE).

Internally, SBC has several organizations dedicated to the security of our assets. Organizations such as our National Security/Emergency Preparedness organization, our Asset Protection organization, and our Corporate Information Security organization, work to protect our customers information and services, our employees, and our internal networks and data on a daily basis.

Our SBC Labs business unit works closely with technology vendors, academic communities, and government standards organizations, to partner and share information on new technologies. Cyber security standards are always a priority in future service and technology development and a focus of our internal auditing organization as well as external security audits.

Continued Government focus on security standards and collaborative support organizations is seen positively by SBC. Providing research assistance, grants, and funds to focus the information technology industry to work towards security standards and best practices is necessary. It is important that the Government provides

to the critical infrastructure industries the learnings and best practices that its cyber security agencies learn.

Legislation should not always be necessary to bring industry attention to technical priorities. However, providing research assistance, grants, and funds to focus the information technology industry to work towards security standards and best practices is necessary.

What are the possible consequences for the communication sector of disruption or attack on information systems?

Society in the 21st century is rapidly changing with increasing reliance on information technologies. Users' expectations are that they be mobile and have instant access to the Internet and their e-mail. Providing secure services in this environment becomes increasingly important and challenging. Federal programs could help educate and assist consumers to understand their roles and responsibilities in a connected world.

To illustrate: Consider how often people stop for gas and use a payment card at the pumps for convenience. The payment card transactions must be carried efficiently, reliably, and securely across communications networks. This is to ensure the gas vendor, the payment card vendor, and the customer are all satisfied that the transaction occurred to everyone's expectation.

The networks, the applications, and the information systems that are necessary to complete transactions of this nature are part of our society on a daily basis. Cyber security is necessary to ensure the integrity of those transactions. Disruptions within the communications sector can impact these, and other, daily activities.

Consider the impact of disrupted or unreliable communications to everyday needs, including how patients obtain collaborative health care between multiple providers and locations. Communications plays ever increasing importance to health industries, emergency first responders, 911 services, law enforcement, banking, power, and other parts of our society that serve critical functions.

With the growing use of wireless technologies, we must recognize that those wireless systems still rely on an underlying physical transport, use of back-end systems and applications that may interconnect with other carriers. As we have recently witnessed in New Orleans and the Gulf Coast, if the supporting infrastructure is disrupted, communication fails. A cyber disruption could cause similar impacts as a physical disruption.

While we recognize that other critical infrastructure industries are reliant on the communications industry to provide the network and communication services, we also recognize that we, as an industry, are reliant on those other industries. We require industries such as electricity and gas, banking and finance, health, and government, to also function securely and without disruption to ensure the integrity of our communications infrastructure.

As recognized by the Department of Homeland Security, the Nation is dependent on the critical infrastructure of communications, banking and finance, power, food, health, information technology and others. A disruption to any component affects the whole infrastructure. Securing against disruptions to any component is in the best interest of all.

In what areas are current cyber security technical solutions for the communications sector inadequate? Where is further research needed to mitigate existing and emerging threats and vulnerabilities?

The communications industry is also increasingly dependent on application and information technology vendors to ensure the products they provide are of the highest quality and integrity. Software and hardware that does not meet industry security best practices and standards require additional efforts and expense to meet its expected function. Vendors that provide software or hardware with security vulnerabilities that must constantly be monitored, reviewed, and patched, are a drain on a company's resources and a liability to companies that must ensure the integrity of their systems, data, and services.

SBC works diligently with software vendors that provide the foundation of the information technology infrastructure to ensure necessary software security patches are installed to protect our complex environment. Continued focus from the Federal Government on industry standards for secure information technology products is appreciated and desired. This will help to ensure that better security and quality is an objective of the software, network and computer hardware industries.

NIST (National Institute of Standards and Technology) is one example of a collaborative organization that has been helpful in promoting information security requirements through its various research and standards efforts. We, as a business,

« PreviousContinue »