b'HHow do emerging technologies, like 5G or cloud at the network edge,impact yoursecurity planning?Steven Hernandez: Theyre big. Almost all of them right now land us in the world of any device, anywhere, any data, anytime. Thats the world we live in. What it means from a security perspective though is that you really cant trust any network that folks are coming in on.As these new technologies come up, especially things like 5G or Cloud at the edge for example, its going to cause more of an emphasis on endpoint security. The issue becomes balancing accessibility and security. My biggest fears are the legacy devices and systems. Thats where agencies and departments need to know where they are and figure out a path forward. Mike Witt: Our team has worked diligently to put the appropriate processes andcommunications in place to ensure that we engage with our customers on day zero. Thats important for us here on our end. Emerging technologies can be a security challenge if the vendor tends to focus on the outcome and doesnt necessarily take into account all of the various security use case scenarios. A lot of times, [vendors] are looking at what it canproduce, but not necessarily what are the side effects of it along the way, and thats where you really need to start building in security at day zero. Davon Tyler: So 5G hasnt quite impacted but cloud at the network edge is an incredibly important move for cybersecurity practitioners. We really need to support moving network security capabilities from [on premises] to the cloud. This offloads work to the cloud provider so we can focus on the important cyber threats that were seeing. Brian Gattoni: The next decade of technological development will play a critical role inbinding the national security posture. Emerging technologies will continue to present new opportunities but will also come with those accompanying risks. So while CISA is workingwith our partners to prioritize urgent digital threats, we also recognize that we need tocollaboratively work with our partners to address long-term digital risks associated with emerging technologies, because were always putting out just todays fire, well never get ahead. We work to build capacity in our partners and drive change in the long term. State Department Official: The reality is that even if you bring me some super cooltechnology today, Im a year away from ever being able to use it, because it has to go through our review process. We have to ask: Who is the company owned by? Is it controlled by aforeign adversary? Did they build a backdoor? Will the company still exist in a year? All of those things have to be checked. Rob Leahy: We [at NASA] are looking to move towards cloud services for our overseascommunications locations where we have sites that we use to communicate to satellites around the world. Were looking to use cloud as that intermediary to run data back to NASA. As we do that, we need to make sure that the appropriate network controls are in place all the way through. But when were in a cloud network, we depend on our suppliers to make sure that everythings safe and secure.We also have to configure what we can within those services to make sure its operating correctly. So we just need to make sure were doing the right things.Government Business Council Securing the Nations Network|Page 7'