ChinaCyberattacksCybersecurityFeaturedTechnology

Takeaways from “Cracks in the Network: Cybersecurity Failures, SALT Typhoon, and U.S. Cyber Leadership”

In a timely conversation hosted by the Center for the National Interest in partnership with George Mason University’s National Security Institute (NSI) on April 23, policymakers and cybersecurity experts unpacked what may be one of the most consequential digital breaches in U.S. history. The event, titled “Cracks in the Network: Cybersecurity Failures, SALT Typhoon, and U.S. Cyber Leadership,” brought together leading voices from Congress, industry, and academia to explore the growing challenges facing U.S. cyber defenses—both from external adversaries and internal vulnerabilities.

Kicking off the session, Representative Jim Himes (D-CT-4), Ranking Member of the House Permanent Select Committee on Intelligence, provided a frank, bipartisan look at the state of U.S. cybersecurity. He emphasized the need for legislative renewal and a cautious yet determined approach to managing threats like those posed by state-backed actors. Rep. Himes’ remarks served as a sobering reminder that while the U.S. has made strides in cyber readiness, deep institutional challenges remain—particularly when it comes to attracting and retaining top talent within the government and maintaining a functional public-private cyber partnership.

The panel discussion that followed included cybersecurity veterans from Microsoft, TAG Cyber, and the National Security Institute, each offering distinct perspectives on the scope and consequences of the 2024 SALT Typhoon breach—a Chinese cyber-espionage campaign that reportedly infiltrated U.S. telecommunications networks—which raised urgent questions about the resilience of government surveillance systems and critical infrastructure against state-sponsored cyber-espionage.

Panelists discussed how the threat environment has changed—pointing to the increasing role of generative AI, the challenges of attribution, and the sobering fact that many attacks go undetected for months, if not years. Importantly, the conversation did not just dwell on threats. It challenged the audience to think about what real deterrence might look like in the cyber domain, how government can align incentives to improve collaboration, and what role American innovation—or the lack thereof—plays in strengthening cyber resilience. The discussion left the audience questioning, who is ultimately responsible when infrastructure fails: Is it the private sector’s duty to defend itself, or must the federal government step in more forcefully?

This was not a conversation about abstract future threats. It was a candid assessment of where we are today and what needs to happen next. If you’re concerned about U.S. national security, innovation, or the integrity of our critical infrastructure, this is a discussion you won’t want to miss.

👉 Watch the full session to hear the panel’s thoughts on where U.S. cyber leadership stands—and where it must go from here.

Keynote: Congressman Jim Himes (D-CT, 4), Ranking Member, House Permanent Select Committee on Intelligence

Panelists: Jamil Jaffer, Founder and Executive Director, NSI; Edward G. Amoroso, Founder and CEO, TAG Infosphere; Kelli Andrews, Senior Director for Cybersecurity and Lawful Access Policy, Microsoft; Rich Mason, President and Chief Security Officer, Critical Infrastructure, LLC

Moderator: Paul Saunders, President, Center for the National Interest

Image: Shutterstock

Source link

Related Posts

1 of 392