|WASHINGTON – Rep. Mike Rogers (R-Ala.), House Homeland Security Committee ranking member, and Rep. John Katko (R-N.Y.), Cybersecurity, Infrastructure Protection and Innovation Subcommittee ranking member, released the following statements today after the release of the Cyberspace Solarium Commission’s final report.
“I thank Representatives Gallagher and Langevin, and Senators King and Sasse, and all members of the Cyberspace Solarium Commission — including Auburn University’s Director of the McCrary Institute for Cyber and Critical Infrastructure Security Frank Cilluffo — for their hard work and dedication to determining a comprehensive strategy to defend the United States in cyberspace,” Rep. Rogers said. “The report today represents thoughtful and actionable ideas to transform our approach to cyberspace, for the military, the civilian government and the private sector, in order to improve the United States’ cyber deterrence and resilience. As the Ranking Member of the Homeland Security Committee and a senior member of the Armed Services Committee, I am committed to a robust debate on these proposals and working with my colleagues to putting the solutions into action.”
“As Ranking Member of the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation, I applaud the Cyberspace Solarium Commission for the release of their much-anticipated report. I believe that cyberattacks are among the greatest threats our country faces today,” Rep. Katko said. “The Solarium’s recommendations to form and implement a cohesive national strategy towards defending cyberspace is critical to mitigate these cyber threats. I am glad to see that the recommendations include legislation I introduced to expand public-private cooperation in the cybersecurity field and improve stability at the Cybersecurity and Infrastructure Security Agency (CISA).”
Rep. Katko continued, “I will work tirelessly and across the aisle to implement these recommendations and get them to the President’s desk so that America is secure from and resilient to any cyberattacks by our adversaries, criminal organizations, or hackers. The status quo is no longer acceptable, and it needs to change now. These recommendations are a good first step.”