Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.
Rochester design firm expands CNY presence by buying Syracuse firm
SYRACUSE — LaBella Associates has acquired Harmony Architectural Associates, PC, of Syracuse in a deal that expands LaBella’s presence in the region. LaBella Associates on June 25 announced it had completed the acquisition. It is a design firm that is headquartered in Rochester with an existing office in Syracuse. LaBella did not release any financial […]
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SYRACUSE — LaBella Associates has acquired Harmony Architectural Associates, PC, of Syracuse in a deal that expands LaBella’s presence in the region.
LaBella Associates on June 25 announced it had completed the acquisition. It is a design firm that is headquartered in Rochester with an existing office in Syracuse.
LaBella did not release any financial terms of its acquisition agreement with Harmony.
Harmony’s six employees will begin operating under the LaBella name and brand “immediately.” Harmony currently operates at 1860 Erie Boulevard East in Syracuse. The employees will join LaBella’s Syracuse–based staff of nine at its Armory Square office later this summer.
LaBella has operated a Syracuse–based office since 2014. Launched in 1978, LaBella has more than 850 employees across more than 22 offices.
During the firm’s history, Harmony also functioned as a design-build firm.
“In collaborating with LaBella, we found alignment in our approach to both projects and company culture,” Bill Ferraldo, a principal with Harmony Architectural Associates, said in a release. “LaBella’s core values — including an emphasis on creating partnership with employees, clients, and our community — has resulted in a highly respected brand that we are thrilled to join.”
CNY, state jobless rates remain high in May amid pandemic
Syracuse region lost 55,000 jobs compared to year-ago month Unemployment rates in the Syracuse, Utica–Rome, Watertown–Fort Drum, Binghamton, and Elmira regions remained in double-digit figures in May amid layoffs during the COVID-19 pandemic. The Ithaca region was one of only two in the state (along with the Albany–Schenectady–Troy metro area) to register a single-figure jobless
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Syracuse region lost 55,000 jobs compared to year-ago month
Unemployment rates in the Syracuse, Utica–Rome, Watertown–Fort Drum, Binghamton, and Elmira regions remained in double-digit figures in May amid layoffs during the COVID-19 pandemic.
The Ithaca region was one of only two in the state (along with the Albany–Schenectady–Troy metro area) to register a single-figure jobless rate in May.
The figures are part of the latest New York State Department of Labor data released June 23.
On the job-data front, the Syracuse, Utica–Rome, and Binghamton regions lost jobs in five-digit figures between May 2019 and this past May. The Watertown–Fort Drum, Ithaca, and Elmira regions shed jobs in four-digit figures in the same period.
That’s according to the latest monthly employment report that the state Department of Labor issued June 18.
Regional unemployment rates
The jobless rate in the Syracuse area was 11.9 percent in May, up from 3.8 percent in May 2019.
The Utica–Rome region’s unemployment rate jumped to 11.2 percent from 3.9 percent in the same timeframe; the Watertown–Fort Drum area’s rate rose to 12 percent from 4.6 percent; the Binghamton region’s rate hit 10.6 percent, up from 3.9 percent; the Ithaca area’s jobless number was 7.8 percent, up from 3.3 percent; and the Elmira region’s unemployment rate jumped to 12.1 percent from 3.8 percent a year prior.
The local-unemployment data is not seasonally adjusted, meaning the figures do not reflect seasonal influences such as holiday hires.
The unemployment rates are calculated following procedures prescribed by the U.S. Bureau of Labor Statistics, the state Labor Department said.
State unemployment rate
New York state’s seasonally adjusted unemployment rate was 14.5 percent in May, down from 15.3 percent in April, but up from 4 percent in May 2019. New York’s number was higher than the U.S. jobless rate of 13.3 percent in May.
The number of unemployed New York state residents fell by 76,300, while labor-force levels increased by 5,700. The federal government calculates New York’s unemployment rate partly based upon the results of a monthly telephone survey of 3,100 state households that the U.S. Bureau of Labor Statistics conducts.
May jobs data
The Syracuse region lost nearly 55,000 jobs in the past year, a decline of 17 percent.
The Utica–Rome metro area shed more than 20,000 positions, a decrease of about 16 percent; the Watertown–Fort Drum region lost 8,400 jobs, a drop of about 20 percent; the Binghamton area lost nearly 14,000 jobs, a decrease of about 13 percent; the Ithaca region lost 8,400 jobs in the last year, also a drop of 13 percent; and the Elmira area shed nearly 4,000 jobs, a 10-percent drop.
New York state as a whole lost more than 1.7 million jobs, a decrease of 18.1 percent, between May 2019 and this May. However, the state economy gained 98,000 jobs, a 1.2-percent rise, in the last month, the labor department said.
Lockheed Martin to pay Q3 dividend of $2.40 a share
Lockheed Martin Corp. (NYSE: LMT) announced on June 25 that its board of directors has authorized a third-quarter 2020 dividend of $2.40 per share. The dividend is payable on Sept. 25, to holders of record as of the close of business on Sept. 1. It’s the same amount that Lockheed paid in each of the
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Lockheed Martin Corp. (NYSE: LMT) announced on June 25 that its board of directors has authorized a third-quarter 2020 dividend of $2.40 per share.
The dividend is payable on Sept. 25, to holders of record as of the close of business on Sept. 1.
It’s the same amount that Lockheed paid in each of the last three quarters. At Lockheed’s current stock price, the dividend yields more than 2.6 percent on an annual basis.
Lockheed Martin (NYSE: LMT) — a Bethesda, Maryland–based defense contractor — has two plants in Central New York, in Salina and in Owego — as part of the firm’s rotary and mission systems (RMS) business area. The plants employ 4,100 people combined.
The company has about 110,000 workers worldwide.
OCC plans for in-person and remote instruction for the upcoming fall semester
ONONDAGA — The fall semester at Onondaga Community College (OCC) will involve a mix of in-person and remote instruction. Faculty, students, and employees will all be required to wear masks on campus when classes begin Aug. 31. It is part of the plan that the OCC announced June 25. All on-campus instruction will conclude prior
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ONONDAGA — The fall semester at Onondaga Community College (OCC) will involve a mix of in-person and remote instruction.
Faculty, students, and employees will all be required to wear masks on campus when classes begin Aug. 31. It is part of the plan that the OCC announced June 25.
All on-campus instruction will conclude prior to the Thanksgiving break, OCC said, and any activity following Thanksgiving until the end of the semester “will be done remotely” so students do not have to travel and then return to campus.
“Anything that would happen between Thanksgiving and the technical end of the semester would be remote,” OCC President Casey Crabill tells CNYBJ. “Students might have a paper to finish or … attend a Zoom session,” she said.
Classes
Some classes will involve a combination of in-person and remote instruction.
For example, a class with 18 students which meets three days a week may have six students attend in-person Monday, a different six students in the classroom Wednesday, and another six students in-person Friday.
Students not in physical attendance will interact with the class and their professor virtually and in real-time. If a student becomes ill, he or she will be able to keep up with classes and coursework from a distance, OCC said.
Some classes will be conducted entirely remotely — either in real-time or in traditional online formats where students participate on their own schedule.
OCC says it measured all learning spaces to determine “maximum allowable density.”
The school will also stagger schedules for labs which require in-person, hands-on learning for density purposes, allowing all students the chance to receive in-person instruction time from faculty “as they normally would.”
Residence halls
All residence-hall bedrooms will be singles (no doubles or triples), meaning one student per room. Students living in suite-style units will continue to share common spaces in those suites in small, “family-style” groups.
One of the college’s residence halls will remain empty and reserved for quarantine purposes, “if necessary,” OCC said.
Students will move into residence halls during a staggered, four-day period in mid-August. Students will undergo a health screening upon arrival.
All classroom, residence-hall, and campus common areas will be cleaned and disinfected on a daily basis.
Health screenings
Two of the campus’s three entrances will be open and everyone who comes to campus will undergo a brief health screening “every day.”
Students living in residence halls will also be screened daily. Since campus reopened as part of phase two, everyone entering campus has been screened daily, OCC noted. Screenings will continue “as long as recommended by New York State,” it added.
CNY Hackathon helps students prepare for work in cybersecurity
UTICA–ROME — The CNY Hackathon, a regional intercollegiate cybersecurity competition, is typically held twice a year at local institutions and has been a collaborative effort between Mohawk Valley Community College (MVCC), Utica College, and SUNY Polytechnic Institute (SUNY Poly). The spring CNY Hackathon event held April 17 and 18 went to a virtual format amid
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
UTICA–ROME — The CNY Hackathon, a regional intercollegiate cybersecurity competition, is typically held twice a year at local institutions and has been a collaborative effort between Mohawk Valley Community College (MVCC), Utica College, and SUNY Polytechnic Institute (SUNY Poly).
The spring CNY Hackathon event held April 17 and 18 went to a virtual format amid the coronavirus pandemic.
The CNY Hackathon brings college students together from all throughout the region, “encouraging continuous learning,” and connecting students with local industry partners, per a news release about the spring event.
“There are number of attacks that happen to computers and our industry professionals know what those attacks are because they are dealing with them every day in defending computers from attacks all the time. And what they do is they simulate those actual real-world attacks for our students and expect our students to be able to defend against them,” says Jake Mihevc, dean for the School of Science, Technology, Engineering and Mathematics (STEM) at MVCC and CNY Hackathon co-founder. He spoke with CNYBJ on June 30.
The event was started as a partnership between MVCC, SUNY Poly (called the SUNY Institute of Technology at the time), and Utica College, according to Mihevc.
Over the last seven years, the CNY Hackathon has become a major event in the Mohawk Valley, aiming to improve computer science and cybersecurity education while more closely aligning academia with local industry partners.
Event purpose
When the CNY Hackathon started in 2013, a group of faculty members, students, some industry partners, and some captains from the Air Force Research Lab all came together and recognized that cybersecurity is a “very applied field” and students … “need to be able to hit the ground running as soon as they enter the field,” says Mihevc.
The Hackathon was an attempt to give students a “bridge” between the academic world and the workforce for cybersecurity. It puts them in “real-life scenarios” where they’re defending virtual operating systems from simulated attacks from the red team. The red team is made up of local industry professionals from many of the different consulting and cybersecurity industry partners throughout the Utica–Rome area.
“They create virtual operating systems that have flaws in them and students need to race to lock down those flaws before the red team goes in and takes them down,” says Mihevc.
Event sponsors were able to meet with students online and provide guidance, advice and information on how to submit résumés and apply for positions. The support of industry partners allowed the CNY Hackathon community to stay together for the spring event in an online venue.
The event sponsors include: Griffiss Institute, Air Force STEM, Adeptus Cyber Solutions of Rome, Assured Information Security (AIS) of Rome, Quanterion Solutions Incorporated of Utica, National Grid (NYSE: NGG), PAR Government of Rome, NYCM Insurance, North Point Defense of Rome, and Leet Cyber Security of Albany.
AIS has been a long-time supporter of the event, not only as a sponsor, but by providing volunteers to challenge the participants, per the news release. AIS employees volunteer for the event, as many of them learned about AIS through participating in the CNY Hackathon, the firm said.
For example, Brodie Davis is a software engineer whose path to AIS started while in college at SUNY Polytechnic Institute.
He participated in the CNY Hackathon while in school and was approached by two AIS employees at the event about pursuing an internship. He began as an intern at AIS the following summer and was hired full-time before he graduated college.
Davis is still actively involved with community events like the CNY Hackathon, and now represents AIS every year.
“Interacting with the local cyber community taught me the skills I needed to be successful,” said Davis. “It was through this hackathon that I was able to apply my knowledge and advance my skillset into a career.”
Mihevc says the students who participated in the spring virtual event handled it very well, but he admitted the “in-person element” of interactions with students and industry professional was missing. It is something they hope to recapture during the fall event during the first weekend in November.
“We [who] run the event have been working toward running the event virtually over the last few years. We receive funding from the National Security Agency that has helped us further develop the event. We’re very likely to be running the CNY Hackathon in the future in a nationwide capacity for the National Security Agency,” says Mihevc.
About hacking
Hacking is not a “derogatory term,” according to Mihevc.
“When we talk about the bad actors, we refer to them as malicious hackers,” he adds.
The other terms that industry professional use are white-hat and black-hat hackers. White-hat hackers are the good guys and black-hat hackers are the bad guys, he noted.
Mihevc called hacking “very general term,” and defines it as learning how to adapt a program beyond its original scope.
“How to take something that was built to do something one way and people that have hacking skills can take that and make it do something slightly different than it was designed to do and something that maybe people aren’t expecting,” he says.
Malicious hackers, he says, understand how software and hardware work and they go in and exploit the weaknesses. At the same time, hackers with good intentions will see a piece of software that isn’t working as well as it possibly could and they adapt it in a way that “makes it more secure,” says Mihevc.
Georgia tech firm acquires iV4
The information-technology firm iV4, which is based in Rochester and has an office in Syracuse, has a new owner. ProArch — headquartered in Marietta, Georgia — acquired iV4 in May, per a news release on the iV4 website. ProArch is a global cloud consulting and product-engineering company. The two businesses say they “complement each other.”
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
The information-technology firm iV4, which is based in Rochester and has an office in Syracuse, has a new owner.
ProArch — headquartered in Marietta, Georgia — acquired iV4 in May, per a news release on the iV4 website. ProArch is a global cloud consulting and product-engineering company.
The two businesses say they “complement each other.” ProArch focuses on product engineering, data, and cloud services, while iV4 specializes in managed services, networking, cloud architecture, and cybersecurity.
With the sale, iV4 became iV4, a ProArch company.
The acquisition deal resulted in some leadership changes at the combined company. Santosh Kaveti, ProArch’s current CEO, will continue in that position. Michael Spoont, iV4’s CEO, will serve as president of ProArch as well as president and CEO of iV4, a ProArch company.
“This big step is about growth and the next generation of iV4,” Spoont said in the release. “By joining together, iV4 and ProArch will form a powerful force in cloud consulting, cybersecurity, data science and product engineering. The blending of capabilities will complement one another and allow us to compete on a higher, more scalable level moving forward. We will now have a comprehensive solution stack service offering fully enabled to design, execute, and support cloud-first, data-driven business transformation for our clients. While this is a big change for our organization, there will be new individual opportunities for everyone to also grow.”
Besides its headquarters near Atlanta, ProArch has offices in the United Kingdom, India, and Singapore. It has 215 employees and more than 200 clients around the globe.
The acquisition followed ProArch’s 2019 search for a firm to “complement its business strengths, address current gaps and establish a greater U.S. presence.”
“Joining forces with iV4, for us, is all about growth and opportunities,” Kaveti said. “ProArch and iV4 together have a thriving story in the making in the areas of cloud, data, artificial intelligence, product engineering, and security.”
Spoont noted that iV4 started as a small company headquartered in Syracuse with a half-dozen people.
“The 2011 merger with Integrity Networks System took us to the next level. We’ve experienced double-digit growth over the past several years and we’re continuing that journey of growth and evolution now with ProArch,” said Spoont.
How I Would Hack You: Confessions of an Ethical Hacker
“How I would hack you…” is a compelling opening statement to say the least. The global business community has experienced an economy left supported by our web technologies in the midst of a global pandemic, social concerns, and conflict in recent months. Prior to that, even, it would be a challenge to identify a single competitive
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
“How I would hack you…” is a compelling opening statement to say the least. The global business community has experienced an economy left supported by our web technologies in the midst of a global pandemic, social concerns, and conflict in recent months. Prior to that, even, it would be a challenge to identify a single competitive organization that does not rely on web technologies, networks, and applications to support their finances, data, services, and more.
“How I would hack you,” is a chilling statement for any supervisor, manager, or executive to hear — albeit one which should inarguably pique the interest and spark a level of intrigue of any business owner, executive, or manager.
What do you imagine a hacker really is? Does it invoke images of a dark, wet basement isolated in an old warehouse filled with green glowing computer screens and empty bottles of Mountain Dew? Do you think of a hooded figure tapping frantically at his laptop battle-station, actively gathering your passwords, usernames, and credit-card numbers? The reality might surprise you, and you may find it is a bit different than the action-movie persona you have seen.
In a recent webinar titled “How I Would Hack You: Confessions of an Ethical Hacker,” James Carroll, information security engineer at Secure Network Technologies, Inc., gives us a look under the hood of how it’s done by the pros. Carrol has served in his role at Secure Network Technologies for more than 10 years, protecting the data of clients ranging from NFL teams to small credit unions. He starts with an introduction on how he got into hacking by taking down other players’ networks in video games to give him the win and automatically level-up his account at breakneck speeds (a practice now discouraged by him since “denial-of-service” attacks are now considered a felony). Carroll then follows up with his presentation format, which covers: “Current Events; 2 Types of Hacks; How These Hacks Happen; The Anatomy of a Hack – 4 Phases of pwnage; Open-Source Intelligence Gathering; Gaining Network Access; Gaining Admin Access; and Where Does This Data Go?”
Cybersecurity concerns have become magnified during the coronavirus pandemic. As a result, COVID-19 phishing and SPAM-mailing is “absolutely skyrocketing” according to Carroll. Hackers are opportunistic people and are taking full advantage of the new density of offsite work — and the security vulnerabilities that come with it. He demonstrates current hacking trends that use “phishing” emails to elicit passwords and malicious-link clicks by unaware users.
Breaking this down further, Carroll describes that there are two typical types of hacks — “social engineering” and “people hacking.” Social engineering leverages what he calls “the obvious”:
• Phishing — Fake emails made to look like real ones in order to get users to click a link, share info, or download something they otherwise wouldn’t.
• Pretexting — Impersonating someone at your organization.
• Baiting — Leaving something like a thumb drive loaded with malware in parking lots outside congested areas like a workplace where someone might pick it up and stick it into their computer, infecting the whole network.
• Vhishing — “Voice Phishing”, where someone pretends to be an official source such as a government organization, bank, or even your own company.
• Physically Breaking Into Buildings — The good old-fashioned “smash and grab”.
He goes on to describe people hacking as the tendency of hackers to look for the weakest link in your organization’s teams and conventions to find a vulnerability. As an example, Carroll shows a video of a physical intrusion test performed by Secure Network Technologies where he was able to gain access to a corporate building simply by “tailgating.” Carroll, in fully forged corporate uniform wearing an “official” duplicated ID badge, was able to gain access just by following an actual employee who scanned their ID to open the door first. The employee took one glance at Carroll, saw the ID badge, and felt comfortable enough to hold the door open for him. He walked in without a hitch, carrying a box of USB flash drives loaded with test-malware to leave on the break-room table. This is one example of how a real hacker with malicious intent would gain access.
James recommends that employees should not be afraid to ask, “Who are you? Who are you with? Who are you here to see? What are you here for?” to unfamiliar entrants at the door of your organization. Additionally, he says it is a good practice to make everyone entering the building scan their own ID — describing instances where recently-terminated employees have come back in to steal data and compromise something within the business.
So how would James Carrol hack you? The same way an unethical hacker would. He calls this “The Anatomy of a Hack” and it consists of the following four phases:
1) Open Source Intelligence Gathering (OSINT for short). Successful criminals do their homework first. Open-source intelligence is used In the criminal sense to ascertain relationships, contact information, work info and ultimately – when and how you’re most vulnerable. It’s gathered from all the information you publish about your life via social media and more.
2) Gain Network Access. Gaining access to a network will allow a malicious actor to identify devices, servers, and users within your organization, further developing the identification of targets.
3) Gain User Access. Once hackers have identified a user and a system, they work to gain user access on a host system through using their open-source intelligence or other hacking techniques such as phishing, vishing, and pretexting.
4) Gain Admin. Access. Ultimately, gaining user access is the precursor to gaining administrator access — which is commonly attached to a user. Admin access will allow the hacker to install malicious software that can infect the entire network, in addition to gaining access to admin-restricted data and systems.
The goal of all this, in no uncertain terms, is to remain undetected. Just as malicious actors want to remain undetected while successfully stealing your valuable data, this remains an anchor for Secure Network Technologies’ own testing goals — to hack your organization in much the same fashion as a criminal might (without all the damage and fallout that comes with actually getting hacked), and then provide detailed results so your organization and its information-technology personnel know how to fix it (this is the part the bad guys hate). Some immediate recommendations Carrol makes for your organization is to exceed “best practices” for passwords, enable two-factor authentication for every app possible, and to stop putting your entire life on social media where hackers look first for sensitive personal information.
For any fellow nerds and aspiring ethical hackers out there, James shares some technical tools of the trade — software with fittingly cryptic names such as MetaZploit, Empire, Burp, Responder and SilentTrinity, among others. You can check out Secure Network Technologies at www.securenetworkinc.com/cnybj.
Rob Dracker is CEO and creative director of WMC (Weapons of Mass Creation). Contact him at rob@wmcstudios.com or (315) 935-7982. This article is originally sourced from a GoToWebinar run by Ted Hulsy, CEO of Iron Path, on June 4, 2020 featuring James Carroll, of Secure Network Technologies.
Ithaca firm wins $12M software contract from Air Force
ITHACA — GrammaTech Inc. has been awarded a $12.2 million cost-plus-fixed-fee completion contract from the U.S. Air Force to provide Artemis Framework prototype software. This contract provides for research, design, development, demonstration, test, integration and delivery of the Artemis Framework, according to a June 26 U.S. Department of Defense contract announcement. The pact will enable
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ITHACA — GrammaTech Inc. has been awarded a $12.2 million cost-plus-fixed-fee completion contract from the U.S. Air Force to provide Artemis Framework prototype software.
This contract provides for research, design, development, demonstration, test, integration and delivery of the Artemis Framework, according to a June 26 U.S. Department of Defense contract announcement. The pact will enable rapid adaptation of software to changes in requirements, platforms, and computational resources “at a scale and speed appropriate for the complex software ecosystem.”
Work will be performed in Ithaca and is expected to be completed by June 26, 2024. The Defense Department said 20 companies bid for this contract. Nearly $751,000 in fiscal 2019 research, development, test, and evaluation funds are being obligated at the time of award. The Air Force Research Laboratory in Rome is the contracting agency.
GrammaTech says it is a developer of software-assurance tools and advanced cybersecurity solutions. The firm says it helps customers solve the “most challenging software issues of today and tomorrow, safeguarding embedded mission-critical devices from failure and cyberattack.”
The firm’s regional headquarters is in Ithaca and its corporate headquarters is in Bethesda, Maryland.
Other clients of GrammaTech include NASA, the FDA, Daimler, Panasonic, Philips, and Siemens.
Katko backs bills for a national cyber director, advisory committee
A proposal in the U.S. House of Representatives would create the position of national cyber director within the White House. U.S. Representative John Katko (R–Camillus) is among the lawmakers who have introduced the National Cyber Director Act. Katko also previously unveiled a bill that would establish a cybersecurity advisory committee, which now has a companion
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
A proposal in the U.S. House of Representatives would create the position of national cyber director within the White House.
U.S. Representative John Katko (R–Camillus) is among the lawmakers who have introduced the National Cyber Director Act. Katko also previously unveiled a bill that would establish a cybersecurity advisory committee, which now has a companion bill in the U.S. Senate.
National cyber director
The director would serve as the U.S. president’s principal advisor on cybersecurity and “associated emerging technology issues,” and function as the lead national-level coordinator for cyber strategy and policy, Katko’s office said in a news release.
Katko is a ranking member on the cybersecurity, infrastructure protection & innovation subcommittee. He introduced the measure with four other House lawmakers.
The national cyber director would develop and oversee implementation of a national cyber strategy, direct and coordinate federal agency cyber activities, collaborate with private-sector entities, and participate in meetings of the National Security Council and Homeland Security Council.
The president would appoint the position, which would be subject to U.S. Senate confirmation. The individual would lead an office within the Executive Office of the President.
“At the national level, we need a coordinated approach to cybersecurity that ensures individuals, businesses, schools, hospitals, and governments are protected against cyberattacks,” Katko said. “For this reason, I introduced the National Cyber Director Act, bipartisan legislation that would establish the national cyber director position within the White House. This position would be filled by a dedicated cyber expert who would lead a cohesive national cyber strategy that protects our country against cyberthreats. This is a significant step forward for improving our national security.”
The creation of a national cyber director was a “key recommendation” in the cyberspace solarium commission’s inaugural report this year.
The cyberspace solarium commission is a Congressionally-chartered commission tasked with developing and recommending a national strategy for improving American cybersecurity.
The commission reiterated this recommendation in a recently published pandemic white paper which outlined measures to protect against cyberthreats during the COVID-19 pandemic.
Cybersecurity advisory committee
Katko is also applauding U.S. Senators David Perdue (R–Ga.) and Kyrsten Sinema (D–Ariz.) for introduction in the Senate of companion legislation to Katko’s Cybersecurity Advisory Committee Authorization Act.
With “bipartisan support” in both chambers of Congress, Katko on June 23 called for immediate consideration of this measure.
Introduced last year by Katko, the bipartisan Cybersecurity Advisory Committee Authorization Act would establish an advisory committee at the Cybersecurity and Infrastructure Security Agency (CISA) to coordinate and improve U.S. cyber efforts. Made up of cybersecurity professionals from every major business sector, as well as state and local-government officials, the committee will consult with, report to, and make recommendations to the director of CISA.
In March, Katko’s Cybersecurity Advisory Committee Authorization Act was also recommended in the cyberspace solarium commission’s report. The measure was one of two Katko-authored measures included in the commission’s final report.
“I am pleased to see Sens. Perdue and Sinema introduce the Cybersecurity Advisory Committee Authorization Act, in the Senate,” Katko said. “Throughout the past few years, and especially during the COVID-19 pandemic, we have seen an uptick in cyberattacks that have compromised personal data, proprietary information, and in many cases crippled operations for businesses and governments. This bill aims to better secure our nation and protect against evolving cyberthreats by creating a public-private committee at [CISA].”
Schumer bill would boost funding for science research, including cybersecurity
SYRACUSE — U.S. Senate Minority Leader Charles Schumer (D–N.Y.) has introduced a bill called Endless Frontier Act that he says seeks to “solidify U.S. leadership in scientific and technological innovation” through increased investments in the discovery, creation, and commercialization of critical technology fields, such as cybersecurity. It would also establish new regional technology hubs. The
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SYRACUSE — U.S. Senate Minority Leader Charles Schumer (D–N.Y.) has introduced a bill called Endless Frontier Act that he says seeks to “solidify U.S. leadership in scientific and technological innovation” through increased investments in the discovery, creation, and commercialization of critical technology fields, such as cybersecurity.
It would also establish new regional technology hubs.
The Democrat introduced the legislation along with U.S. Senator Todd Young (R–Ind.), U.S. Representative Rohit Khanna (D–Calif.), and U.S. Representative Michael Gallagher (R–Wisc.).
Schumer explained that the Endless Frontier Act is a “necessary investment” into research, education and training, technology transfer and entrepreneurship, manufacturing, and the broader U.S. “innovation ecosystem” across the nation.
The lawmaker says that the Endless Frontier Act proposes an expansion of the National Science Foundation (NSF) — to be renamed the National Science and Technology Foundation (NTSF) — and the establishment of a Technology Directorate within NTSF to advance technology in 10 critical focus areas.
The newly-established Technology Directorate would receive $100 billion over five years to lead investment and research in artificial intelligence and machine learning; high-performance computing; robotics, automation, and advanced manufacturing; quantum computing; cybersecurity; biotechnology; and semiconductors, Schumer said.
An additional $10 billion would be authorized to designate at least 10 regional technology hubs, awarding funds for comprehensive investment initiatives that position regions across the country to be global centers for the research, development, and manufacturing of key technologies.
“From becoming one of the nation’s first interconnected ‘smart cities’ to investments in the regional STEAM School and a ‘Drone Zone’ at the Tech Garden, Syracuse and Onondaga County are planting seeds to be a major growth hub in the future economy. Along with partners in the private sector and world-class institutions like Syracuse University, Central New York is uniquely positioned to take advantage of any federal investment to establish regional technology hubs as the Endless Frontiers Act aims to do,” Schumer said in a release. STEAM is short for science, technology, engineering, arts, and mathematics.
“As we emerge from the economic challenges of COVID-19, cities need to focus on long term economic resilience, not just short-term recovery,” Syracuse Mayor Ben Walsh added in the release. “The Endless Frontier Act rightfully recognizes that our country needs more regional hubs for technology innovation to remain competitive globally. Cities like Syracuse and our surrounding region, with leading research universities and a history of investment in emerging technologies, are primed to become the nation’s next technology hubs with additional leadership and support from the federal government.”
A number of New York–based technological organizations and companies have already expressed “strong support” for the Endless Frontier Act, per Schumer’s office. They include Binghamton University; CenterState CEO; Clarkson University; Cornell University; Corning Incorporated; Launch NY; M&T Bank; Rochester Institute of Technology; SUNY Polytechnic Institute; and Syracuse University.
Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.