Pnc Small Business Online Banking



>> william s. cohen: general raduege, icould have listened to you all evening. [laughter] if fact, i thought i wasgoing to listen to you all evening. [laughter] thank you for your very kind words. let me say this. i had the privilege of servingsome 31 years in public office.



Pnc Small Business Online Banking

Pnc Small Business Online Banking, the most exhilarating, the most exhausting,the most rewarding were the years - 4 years - i spent at the pentagon. and that was because i came into contactwith and admired the patriotism, sacrifice, dedication and just humanity ofthe people who walk those halls.


general raduege was one of them. i admired him them. i admire him now today in his current capacitiesand so to be able to walk those corridors with someone like general raduege and -- who's being followed in his footstepsby chad, welcome this evening. admiral mcconnell, generalminihan, general scott, i can say what an honor itis for me to be here tonight. when people talked to me this evening theysaid, "we're honored by your presence." no, it's the other way around.


i am honored to be here because of what you'redoing, what you have done in the past as far as your service to our country and also whatyou're doing today to help defend our country. and so it's my privilege to be here and i consider it a real personalhonor to be with you this evening. i was looking at the video. i'm not sure what i can say beyond what isbeing said about these wonderful students that we're helping to finance to continuetheir education in such an important field. it's -- to me it's just gratifying to see therespect that they have for the institution, for our country, what this means to them.


that they can carry on a full time job andyet have the opportunity to get an education, even at the graduate leveland still continue working. and this integration with thefaculty, the students and the faculty, but alter the business community which makes itso important that they have real life experience and not simply in an academic manner. one of my favorite authors was somersetmaugham and he said that, "during dinner, one should eat wisely but not too well. after dinner, one should speakwell, but not too wisely." i will try to speak well but verybriefly if that's all possible.


and one of the most important booksthat i read as a young man was alvin and heidi toffler's book "future shock." i think it came out in 1970. it was prescient. it peered into the future and saidthat the future time was going to be actually speeded upor accelerated by events. that technology was going to miniaturizethe globe so that it was not much bigger than a small ball spinning on thefinger of science and that we were going to find our culture, our traditionsand our religion all shaken


in this hurricane wind of change. and i think about that book today interms of how prescient it really was. and i think about what life was like wheni first went to the senate back in 1978. we used typewriters instead of laptops. we had payphones instead of smartphones. and by the way, i saw the article inusa today just 2 days ago which pointed out that the first mobile phone wasproduced by motorola called dynatac. it was 10 inches long and 2 and a half pounds. today, the smartphones areroughly 4 to 6 ounces.


but we used carbon paper insteadof scanners and laser printers. we had human bank tellersinstead of automated tellers. we read newspapers and booksinstead of ipads and kindles. we kept our files in cabinetsinstead of the cloud. and millions across the world had a crushon an actress named farah fawcett instead of the digital assistant named siri. so you know, much has changed in thepast 40 years and so much change is going to take place in such a short period of time. i mean we are on the edge of atechnological revolution the likes


of which we haven't even begun to imagine. and with this change comes notonly change in our citizens here, but the structure of global life,global economy and the threats that we're going to faceas this century unfolds. i harken back to tom freedman'sbook this afternoon. i was trying to think of somethingi might say to you and i read -- reread some of tom friedman's book. and he pointed out that back in1492, columbus who then had the view that the world really was round and notflat which was the conventional wisdom,


he set out to find a shorter route to india. he miscalculated the size of the globeeven though he suspected it was round, he ended up in america. but interesting, he called the natives indians. he went back to portugal andgave his findings as such and proving his concept thatthe world really was round. friedman back in 2004 - as i recall- in 2004 friedman set out to go to and [inaudible] set sail for indiaon his boeing -- on a boeing jet. and when he arrived in india,he was in bangalore


and he found out that the world was flat. it's both round and flat. that technology had flattened theglobe to the point that now information or knowledge had been democratized. it had been spread throughout the globe. and so with that comes great promise andwe've seen the kind of promise that comes with information and information leadingto power and the exercise of power. what the flattening of the worldhas meant in a very positive sense and that we've seen thiskind of exponential growth


that has taken place in the use of the internet. we talked about the cofounder or theinventor who was here tonight with us. a decade ago, the internetusers used a desktop or a laptop and there were roughly i think onlya few million people at that point. today there are 114 million people who use theinternet in the united states and 94 of them -- 94 percent are using access tothe internet through smartphones. and this growth in the internet use,it's not confined to the united states. it's spreading everywhere. especially in the africa countries:the emerging countries in africa


and the emerging economies in latin america. they are growing at a rate in africaof 15 percent and -- i'm sorry -- 15 percent in latin america andgrowing 40 percent in africa. starting from a low baseline, but whatyou can see taking place is this growth and this information spread. and what is taking place, you'llhave 500 million new users who are accessing the internetand -- in the near future. according to ray kurzweil - and i recommendhis book called "the singularity is near" - and what kurzweil was saying isthat in a not too distant future,


we're going to see the fusion ofcomputer science, nanotechnology, medical science to the point that we'll -- artificial intelligence willactually exceed human intelligence. we're going to be wearing google glasses. we're going to be wearing apple watches. and i suspect that implantedtechnologies and microchips are destined to get under our skin so to speak. but the future of technology in our livesis going to alter some of our values. and this to me is quite striking that we'reno longer living in the information age


but what is now called the neuro-age. and this phenomenon is altering basic valuesand i saw a statistic which quite striking. they took a recent survey of themillennials: the so called y-generation. fifty-eight percent of those surveyedwould rather give up their sense of smell than to be without their smartphones. the fear of being away from one'sphone is now known as nomophobia. [laughter] seriously. and this is something that's changing values. when you think that you'd give up your senseof smell rather than give up your smartphone,


something is taking place whichis quite dramatic in our lives. and this desire to be connected to everyoneand to anyone, it has great promise for much of the world in terms ofbringing people together. but as we know, you look at commerce today,transactions travel at the speed of light. we deposit checks through our smartphones. we recover sales receipts on emails. we buy books on amazon. we know that revolutions havebegun and organized on facebook. tunisia, egypt, libya, syria,atrocities can be captured


on twitter and videos posted on youtube. governments, corporations, ngos, individuals,everybody can now be held accountable for their actions or for their failure to act. so there is much good that comes about. good governance, respect to humanrights and these are just some of the many positive benefitsgenerated by technology. but for every promise, thereis of course a peril. we're now seeing these electrons race across ourinformation super highways at nanosecond speed. most of -- if you think about it, mostof the military equipment that we have,


it consists of either flying or rollingor floating platforms that are wired into a net sentry concept of warfare. and today our military spendsas much time defending nodes and networks as we do sea lanes and airspace. and there's no respite in sight. and according to cia director john brennan, theseriousness and the diversity of the threats in this country that we face,he said, "in the cyber domain, they're occurring on a daily basis." now most of us are aware of the reportthat was released about the activities


of china in terms of the cyber field. i was recently in china. i spent 10 or 11 days there andthis issue of course to be expected, the chinese denied any association with cyberactivities taking place in the united states. but we have to engage the chinese on this. this is serious. if you think back to the time we weretalking about exchanges of missiles and this debate went on wheni was in the senate. should we have a policy of launch on warning?


remember that debate? and we saw it one time. there were a flight of birds- a flock of birds in flight - and we thought these might be missiles and wewere tempted at least to think about responding in kind before those missiles landed. so we had that as a concept: you know,launch on warning as is dangerous. should we have launch under attack? and that was another conceptthat we wrestled with. or should we simply absorb afirst strike and then respond?


well those issues are back with us. those issues are fundamentalto our survival today. because we now have to know or try to knowwhether or not someone is planning an attack: a cyber-attack that would actually affectand destroy our critical infrastructure. what do we do? is the information reliable? how much warning will we have? should we act preemptively? should we wait until something takesplace that we look like it's going


to shut down our critical industry? these issues are important andwe have to talk to the chinese -- not only the chinese but to the russians andto others of what kind of rules we really have to revise because the standard rules in dealing with international law reallydon't apply as well here. which you have to wait for an attack uponyour country in the sense of a physical attack because we know that we canattack our infrastructure and destroy our capacityfor response rather quickly. and i mentioned this while i as in chinathat we need to have an understanding


of what the thresholds are going to be. how much activity can we acceptfrom any country, friend or foe, because there's a certain level of activity thatwe know there's going to be espionage conducted? it's been you know as old asmankind itself: stealing of secrets. trade secrets, business plans. that activity has gone on, will continue togo on but the concentration of that focus by either a government, state sponsored or byindividuals, criminal gangs or by solo hackers. it can't rise to a level in whichit threatens another country. and those are the issues that we have tobegin a very, very earnest discussion with


and see if we can't establishsome method of discouraging it and stopping it if we possibly can. and i mentioned, it's not just china orrussia or any other country, look at iran. earlier this year, iran launched multiplecyber-attacks against dozens of online banks, severely crippling them:incapacitating the access by consumers. what was really unique about this is thatthey didn't go after individual computers. instead they engineered and went into thenetworks of computers in the data centers in order to debilitate the banks. and i'm thinking here with bank of america,citi group, wells fargo, pnc and others.


and even though the bank accountswere breached, no money was stolen. but this distributed denial of service,attacks they flooded those banks and interrupting the serversfor the consuming public. and so the level of sophisticationis only going to increase. and the power of getting intothose data centers and computing -- compounding that computing powerwas really quite extraordinary. and they've made it clear,they're not going to stop. their website said, "officials ofamerican banks, expect our massive attacks. from now on, none of the u.s.banks are going to be safe."


and so we think about this, what it means. if you attack our financial institutions, that's going to have seriousdomestic and global implications. but the harm to our critical infrastructure --we talk about our power grid, our water supply, oil and gas pipelines, these are thethings that have cyber leaders up at night. when i as at the pentagon, the reportersused to say, "what keeps you awake at night?" and i usually responded, "anuclear attack upon american soil." that kept me awake at night thinking about it. i decided to write about infictional form last year.


but the same issues are involved. what happens if you had a bombthat goes off on american soil? what does a president do? you have to identify who did this,how could they have done this, why would they do it and what do we do about it? same issues now involved in the cyber field. trying to identify who could do this, namely shutting down yourcyber -- your critical systems. who could do this?


why would they do it? how do we identify who has done it? and then what do we do in response? so these are the issues thathave surfaced more recently. digital bandits by the way, they don'tneed to carry a passport or a visa. they can go anywhere -- they can travel,these bandits, anywhere in the world. they can enter our homes. they can rest there, take a nap, consumewhatever food for thought they want, heist the family jewels and disappear with theirloot, not leaving any trace of fingerprints.


think about -- that's what we're talkingabout in terms of cyber-activity today. cyber-bandits enter your home. they rest on your computers. they listen to everything that you are doing. they watch everything thatis being said, etcetera. they're taking whatever informationthey can, taking it back. they can nap there for months or yearswithout us even knowing about it. and then years later, or months later, we can discover what they've beendoing and it's virtually too late.


we saw recently in south korea. there were 3 television newscastersand 3 banks that were -- they suffered a massive cyber-attackand they lost something like 30 thousand computers hadall of their data wiped out. they knocked off the bank websitesoffline, they closed the atms and the south korean authorities, they'restill trying to figure out who did it. at first and i was in chinaat the time this occurred, the south korean government blamed north korea. the next day, they set atrace the address to china.


then they backtracked to, "no,it was something internally. the infection had come from asystem inside one of the companies." and now they've said they'vetraced the ip addresses on affected computers to theunited states and europe. so spreading these viruses through botnetsmakes it all the more difficult for authorities to pinpoint the country of origin. and actually it increases the likelihood that a victimized country mightretaliate against a neutral 3rd party. that was one of the scenariosi wrote about fictionalized.


that we might think that iran wouldsend a nuclear bomb and destroy a city in the united states and so we'regeared up to respond against iran when in fact it might very well be adifferent country because of the information that has been altered to make it looklike another country is involved. so these are serious issues affectingour national security cyber-warfare. when you combine it withcyber-espionage, theft, terrorism, crime. it constitutes one of the gravestthreats that we will ever face. and i think it's been identified as such by thefbi saying that with the not too distant future, cyber threats, cyber space is going to --


activity in cyber space is going to posethe greatest threat to the united states. conventionally, there's nocountry that can match us. there is no peer competitor of the united statesanywhere in the world: unlikely to be any kind of a military competitor 10-20 years from now. but when you're dealing in the cyber world,you don't need to be a peer competitor. you're engaged in asymmetric warfare andwe've seen what happened during 9/11. a couple of aircraft were turned intobasically flying missiles that took out the trade centers and attacked the pentagon. very little amount of money invested:a great deal of damage that was done.


and so think of the same thingtaking place in cyberspace. very little investment on the part of those whoare interested in either stealing information, shutting down systems or launching acritical attack against the united states. so how are we prepared? we've come a pretty long way. i can tell you as secretary of defense, i stoodup to joint task force computer network defense under the leadership of general john campbell who i believe is sittingright out there as we speak. and it was general campbellwho was the first commander.


he led the efforts to protect thepentagon and dod computer networks. and then we had in 2004, there was afoundational piece for the u.s. cyber command that was laid down with the establishment ofthe joint task force global network operation. and who would that first commander bebut general raduege who was responsible for identifying the end resolving, any securityanomalies that affected the grid and our ability to support the chain of commandright down to the war fighter. so at the pentagon, when i was therewe had a mantra and our mission. we said, "deter, defend, defeat." and i'll tell you tonight, this isa special treat for me to be here


because the semifinals - the ncaa - are on. and i've shut off all communication. i don't want to know. and you may not know this, but in my collegeyears, my ambition -- i had 2 ambitions. one ambition was to become a latin professor. the second ambition was to becomea professional basketball player. you can see there's some limitations to myambitions except when i got to the senate, my colleagues used to say, "you know cohen,you achieved your -- both of your dreams. you continue to speak a deadlanguage while dribbling."


but we have another -- we do have a greatathlete in the audience tonight: ken harvey, one of the best defensive playersin the history of redskin football. [ applause ] he's now engaged in protectingcyber security as well. and he's one that you don't wantto meet on a football field. but i will say this to everyonein this room understands this, just playing defense is not good enough. if you're only playing defense,be it in sports, in business or in security, you're going to lose.


if you're always on your heelsbacking up, you will eventually lose. you've got to go on the offense. and that's what has taken placenow with our cyber command -- the establishment of the cyber command in 2010. i think president obama who has some notedskill i guess on the basketball court - i haven't checked it out - buti see that he plays from time to time, but he's recognized this. the fundamental truth that yes youhave to play -- you have to deter. and having good defenses is adeterrent in itself and you have


to defend against anticipated attacks. but at some point and time, you'vegot to be able to go on the attack. you've got to go on the offenseand that's what the announcement of cyber command is really all about. the president laid out 3 things. you've got to defend dodand our computer networks, you have to help defend the criticalinfrastructure of this country. what's the challenge there? all of our critical infrastructure - most ofit's - in the hands of the private sector.


so now we have to formulate rules andregulations and policies which help to integrate the federal government'sefforts with the private sector with all of the issues that are raised by that. of apprehension, of how to protect theinformation, whether or not it's going to result in liability with shareholders if certain thingsaren't done that should be done, etcetera. but recognizing that we are sointertwined from government's service and the private sector have to work together. so protecting that criticalinfrastructure in mission number 2. and the third mission of course was to be ableto go on the attack to be able to retaliate.


and i have to use that word advisedlybecause under international law, a question of whether youretaliate or whether you in fact are defending your nationalsecurity while you're under attack. and so if you don't realize your systemsare under attack but only discover it later and then decide to quote retaliate, areyou in violation of international law? so there are -- there's a lot ofissues that have to be addressed. the president has issued an executiveorder outlining some of the issues, but we have to have congress take action. we have to have a comprehensive effortto identify how we can work together


in our own society and then developthe relationships with our nato allies and with others who also will findthemselves under a similar level of attack. general raduege is a recognizedexpert in the field. he co-chaired a study by csis and issuedthis report a couple of years ago. and basically said, "cyber -it's life in the 5th domain." and what he pointed out iswe have to have 3 things. in the military, everything is done by 3. resilience: we have to make sure that we havea resilient capability so that if they -- any enemy or adversary shuts down one aspectof our society, we don't simply go down.


that we have enough redundancy built in. that we remain resilient. that we have a policy of recognition. we have to find out as bestwe can who is responsible. and then once we do that, be capable ofresponding or retaliating as the word may be. let me close with a proverbthat's remained with me. it's been said that in africaevery morning a gazelle wakes up. and it knows it's got to runfaster than the fastest lion or it's going to be food for that lion.


when the sun comes up, the lionunderstands it has to run faster than the slowest gazelle or it will starve. but whether you're a lion or a gazelle, whenthe sun comes up, you've got to start running. those are pretty good words for us as wethink about this field of the cyber threat. we have to be up and running. we have to have the best minds available. and that's one of the reasons whyumuc is so important to our security. we are training some of our best andbrightest to help protect us against threats that are here today, that will intensifytomorrow, become more complicated tomorrow


and can threaten to alter our way of life and actually pose an existentialthreat to this country. i will always remember what churchillonce said in his "iron curtain" speech. in beautiful language he said, "wemay one day return to the stone age on the gleaming rings of science." and the beauty of the language kind ofoverwhelms what he was talking about. he was talking about a possible exchange ofnuclear weapons between us and the soviet union. but we may find that we can return to thestone age and those gleaming rings of science without a weapon having to be firedbecause it will fired by an electron.


by the push of a button that sends a oneand a zero that can undermine our ability to provide food for our people,water supplies, information, communication, the ability to survive. so this is the mission of umuc to provideeducational opportunities for people who will dedicate and have dedicated their lives to protecting the nationalsecurity interests of this country. so for me to come here tonight is to onceagain say i'm honored by your invitation. i can't say enough about what you're doing. the importance of this gala to raise the fundsnecessary to provide an educational opportunity


for the people who we count upon to defend us. so thank you very much and congratulations.


Subscribe to receive free email updates:

0 Response to "Pnc Small Business Online Banking"

Post a Comment