Archives page

Posts Tagged ‘cybersecurity’

CYBER 2022 – In Person October 3rd

Join us for CYBER 2022 during National Cyber Security Awareness Month for strategies on zero trust, insider threats, cyber threats, and more

Join us for GTC’s 8th annual CYBER day, taking a close look at the cyber threats facing industry and the government. With new presidential orders and changing procurement requirements, a cyber strategy and framework is no longer an option, it’s a necessity. We invite you to participate in this collaboration between government and industry to learn strategies for zero trust, insider threat, cyber threats and more with the leading experts in the nation.

Register here!

Media Advisory: DHS S&T to Host Industry Day for Start-Ups

Media Advisory: DHS S&T to Host Industry Day for Start-Ups
11/30/2018 09:27 AM EST

MENLO PARK, CALIFORNIA —Technology start-ups will learn about a new opportunity to collaborate with the Department of Homeland Security (DHS) on combating counterfeit and forged documentation. The DHS Science and Technology Directorate (S&T) Silicon Valley Innovation Program (SVIP) will host a DHS Industry Day on December 11th in Menlo Park, California, to describe its operations and new solicitation: Preventing Forgery and Counterfeiting of Certificates and Licenses.

This new solicitation seeks proposals from startups on the use of blockchain and distributed ledger technology to prevent the falsification of records and provides startups with the opportunity to receive up to $800,000 in non-dilutive funding.

Tuesday, December 11, 2018

1:00 p.m.-3:00 p.m. PDT DHS S&T will host an Industry Day to discuss operational needs and partnership opportunities in the area of blockchain
verification of certificates and licenses.

SRI International
333 Ravenswood Avenue
Menlo Park, California 94025

To register for the Industry Day, visit https://www.regonline.com/DHS-SVIP-Dec2018. For more information about current and future opportunities to collaborate with S&T SVIP, visit our website or contact [email protected].

S&T SVIP targets nontraditional performers who can offer solutions to the most pressing threats facing DHS and the homeland security mission. SVIP builds relationships with startups and small businesses around the world to seek innovative solutions for the needs of DHS operators and end-users. With its broad mission and expansive global operations, DHS offers a prime partnership opportunity to fund, test, pilot and apply cutting-edge technological solutions. Participation in S&T SVIP does not mandate or promise procurement contracts with DHS or its components.

###

Credentialed media are welcome to attend the Homeland Security Industry Day, but must register at https://www.regonline.com/DHS-SVIP-Dec2018.

Topics: Cybersecurity, Science and Technology
Keywords: blockchain, R&D, Science and Technology, SVIP

# # #

GTSC Submits Comments on GSA-DOD Cybersecurity & Resilience

GTSC working in collaboration with Brian Finch, of Strategic Partner Dickstein Shapiro and GTSC members Robert V. Jones, CEO of PReSafe Technologies, Larry Grant, CEO, EnProVera and Gary Daemer and Mark Dale, InfusionPoints submitted comments to the Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition.  GTSC’s comments focused on clear and achievable cyber requirements that will not provide a competitive disadvantage for small and mid-sized companies.  Additionally, GTSC highlighted that an “LPTA” environment is not conducive to robust cybersecurity and that procurements that seek best value are more appropriate.  Please email us if you’d like a copy of our comments.

Cyber Security Survey

Last fall, the InfraGard National Capital Region Members Alliance (INCRMA), FBI-Washington Field Office, and the Government Technology & Services Coalition (GTSC) co-hosted a cyber security program at which we announced our intention to develop a survey for companies to share their experience with cyber security “incidents,” hacking, viruses, spear phishing, malware, and other suspicious activity, in addition to asking about what kinds of tools and resources could be most valuable to help industry be more prepared.

gtsc_securityThe survey collects data on the type and frequency of computer security incidents in which a computer was used as the means of committing a crime against the company or as a conduit through which other intrusion and/or criminal activity was perpetrated. It also collects data about the type and size of the company, cyber security practices, and computer infrastructure.

The results will provide the basis for enhancing or initiating efforts to strengthen the information sharing and awareness to inform our public private partnerships and create meaningful programming and tools to combat the cyber threat. 

Initial results will be reviewed at our Cyber Security Awareness Month program on October 23 with Dr. Phyllis Schneck, the new Deputy Under Secretary of Cyber Security at DHS. The full results will be released this fall. The questions have been developed by GTSC from a previously issued DOJ survey, in combination with input from FBI-WFO’s Cyber Branch and the INCRMA’s Cyber Special Interest Group. Please feel free to share the link with others who you believe would be appropriate respondents.

Cyber Security Insurance: Does Your Company Need It?

“Cybersecurity – A Special Report”…with newspaper headlines like this in the The Washington Post, cyber security is THE hot topic.  If your company uses a computer, credit card, checking account, files a tax return, employs smart phones, or uses iPads, your business is a target for losing intellectual property or becoming the vehicle for a cyber attack — with a huge financial loss as the result.

For individuals the theft or misuse of private information occurs daily.  Signals stolen while using public internet, misplaced cell phones, fishing attacks on home computers, and theft of personal computers happen throughout our society and result in long-term financial crisis.

Small Business owners face even greater obstacles from cyber attacks.  A recent National Small Business Association reported 44% of their 800 surveyed members had fallen victim to a digital break-in.  What are the steps we can take to help thwart these information criminals?  Solutions for both companies and individual citizens are very similar.

All business firms using the internet must have a strong risk management plan established and adhere to the rules in order to lessen the impact of cyber theft.  With the growth of cloud computing, use of smart phones and tablets, employees telecommuting, and digital information flowing outside the office, cyber attackers have many more access points.  The Federal Communication Commission (FCC) lays out guidelines to prevent cyber attacks.  Among their suggestions are:

  • Train employees in security principles.  Use strong passwords with expiration dates.
  • Protect information, computers and networks from cyber attacks.  Install fire wall security, the latest security software and web browsers.
  • Create a mobile device action plan.  Password protect devices, encrypt data, and install security apps and how to report lost or stolen equipment.
  • Make copies of all important data.  Store offsite or in the cloud.
  • Passwords and authentication.  Require unique passwords and change every three months.

Many businesses have the additional exposure of outsourcing data.  Many businesses share customer information with third parties who provide billing, payroll, and employee benefits.  Additionally, web hosting, HR services, and information technology services are frequently outsourced.  Despite this outsourcing exposure many businesses do not require third parties to cover costs associated with data breach in their contacts.  When using outside partners, what is the risk-management strategy they use to protect you against financial loss and reputation harm?

Because of the explosion in internet usage many companies are seeking contractual risk transfer and indemnification through insurance.  Starting in the early 1990’s insurance has changed to provide protection for cyber growth.  Today numerous insurance companies either provide stand-alone policies or add the protection with other coverages, such as Directors & Officers policies (D&O), Errors & Omission Policies (E&O), and Fiduciary Liability policies. An E&O policy is a type of professional liability typically issued to companies setting standards for them selves or other clients.  D&O liability coverage is designed to protect companies against their management decisions and covers directors, officers, staff and the organization itself.

Cyber Liability Policies should provide protection for both First Party and Third Party Claims.

First Party coverage includes:

  • Network and Information Security Liability
  • Communication and Media Liability
  • Regulatory Defense Exposure

Third Party coverage includes:

  • Crisis Management Event Exposures
  • Security Breach Remediation and Notification Expenses
  • Computer Program and Electronic Data Restoration Expenses
  • Computer Fraud
  • Funds Transfer Fraud
  • E-Commerce Extortion
  • Business Interruption and Additional Expenses

Cyber Insurance helps before the loss occurs by going through a thorough underwriting process to help highlight the potential risk exposures to be addressed.  Nevertheless, should the loss occur these policies help in determining the data leak, PR crisis, IT crisis, and the financial crisis.

The recommendation to combat today’s cyber threat involves risk management planning, assistance from third party partners, and insurance coverage to assist should a loss occur. For more cyber security tips, visit www.US-CERT.com. Learn about the FCC’s Small Business Cyber Planner here.

Mary Jordan, “CYBERSECURITY – A Special Report,” The Washington Post, Thursday, October 10, 2013

P Allen Haney

P. Allen Haney, President, P. Allen Haney Company

Mr. P. Allen Haney is a Strategic Advisor to the Government Technology & Services Coalition. He is also a trusted advisor to business owners and nonprofit executives, Allen Haney is best known for solving problems. His consul on employee benefits, executive compensation, and retirement planning routinely vitalizes the health and sustainability of closely held businesses and associations.

He is most appreciated for his all-inclusive, uncompromising commitment to expand client capacity by uncovering risks and opportunities hidden in blind spots. Read more about Mr. Haney here.

Oct. 23: Cyber Security: Focus on Public Private Sector Collaboration

Join GTSC and the InfraGard National Capital Region Members Alliance for a cyber program focused on the threats to the public and private sector.  gram.  Since Executive Order 13636 and PPD-21 were issued in February 2013, there has been a renewed focus on the challenges of security the nation’s digital infrastructure. Most admit and understand that our cyber security relies on a strong and vital collaboration between industry and government — whether that be the industry protecting our critical infrastructure or industry that provides the underpinning of our economy.  Legislators on Capitol Hill  are trying to determine how to streamline authorities and responsibilities and law enforcement and other agencies in the Federal government are grappling with preventing and mitigating the impacts of this threat.  This session will discuss DHS’ role in cyber security, how the private sector and Federal partners are communicating, what threats are at the forefront from cyber hackers, hostile nation states etc. and how we see future collaboration improving to fight these threats and protect our economy and infrastructure.

gtsc_securityAGENDA AT A GLANCE
8:00 AM Registration & Breakfast 
8:30 AM Conference Introduction
8:45 AM Keynote: The Challenges of Cyber Security
9:30 AM How do we share information more effectively? 
10:30 AM What are the latest threats? 
11:30 AM Lunch on your own in the National Geographic Society Cafeteria
12:30 PM Keynote: Cyber Security Priorities from the DHS Perspective
1:15 PM Where is the Government Targeting their Resources?
2:00 PM What the Private Sector Do?
2:45 PM Closing Remarks 
Confirmed Speakers:

Keynote: Dr. Phyllis Schneck, Deputy Under Secretary for Cyber Security, NPPD, DHS

Dr. Phyllis Schneck, McAfee’s former CTO and vice president of the global public sector, has been named deputy under secretary of cyber security for the National Protection and Programs Directorate at DHS. Join us to hear her priorities for cyber at NPPD!

Denise Anderson, National Council of Information Sharing and Analysis Centers (ISACs); Vice President, Financial Services-ISAC

Noel Due, Supervisory Special Agent, FBI – HQ, Cyber Division, Operation Clean Slate

Brian Finch, Partner, Global Security, Dickstein Shapiro LLP

John Harmon, Partner, Tactical Network Solutions

John Lainhart, CGEIT, CISA, CISM, CRISC, CIPP/G, CIPP/US Partner, Cybersecurity & Privacy, US Public Sector, IBM Global Business Services

James Mulvenon, Vice President, Defense Group Inc., Center for Intelligence Research and Analysis

Vipul Sharma, Vice President & CTO, Civil Government & Healthcare IT solutions, L-3 STRATIS

Trent Teyema, Assistant Special Agent in Charge, FBI WFO, Criminal Division – Cyber Branch

Glenn Wood, Vice President, Technology, InfraGard Board & Co-Chair, Cyber SIG

 

About the InfraGard National Capital Region Members Alliance

The InfraGard National Capital Region Members Alliance (INCRMA) consists of a growing membership of professionals who are creating a more resilient critical infrastructure in the Washington, DC metro area. These include defense industrial base, information technology, water supply systems, electrical energy, emergency services, law enforcement, health systems, transportation, banking, and telecommunications. Our membership is voluntary yet exclusive and is comprised of individuals from both the public and private sector. The main goal of INCRMA is to promote ongoing communication, education, and community outreach between the public and private sectors and the FBI. In doing so, information is shared, relationships are strengthened, and vital assets are protected.  To learn more, visit us at www.infragard.org.

 

Register now

Spear Phishing: Getting Caught is a Drag

LeapFrog Phishing

I’m a Spear Phisherman. I want to catch the big one and reel it in! But I’m not talking about tuna; I’m talking about landing your personal information. Here’s my secret: I impersonate your friends, your bank and the people you trust to gain access to your computer and your network.

PDN_MalWareI’m pretty good. I know that you can’t always tell the difference from the real messages and the fake ones that I dangle in front of you. It doesn’t take long for me to gather lots of personal information about you — what you like, who you follow, what you purchase online and which websites you visit.

I use the information I find through open sources and develop personalized messages designed to trick you into believing they are from trusted entities. Spear phishermen like me can design emails, tweets, phone texts and even Facebook updates that access your private information after just one click.

Once you open the message, I trick you into giving me your user names, passwords or other office information, which allow me to access your network undetected. Little did you know that you just gave me the ability to take all the company information I would like.

It’s easy to avoid my targeted attacks and protect yourself against “Spear Phishing:”

  • Be stingy with your user name and password. Don’t share personal information with anyone. At all!
  • Don’t surf the Web chasing popular stories, blog posts, videos, etc. I love to hide in these sites, learn about your likes and dislikes and then target you.
  • Think before you click links from social media sites, emails or text messages. That’s the easiest way for me to catch your information.
  • Verify any caller before providing names and email addresses of your coworkers. Be the first line of defense.
  • Delete suspicious emails without opening them or responding to them. If it looks suspicious and you don’t know the sender, it could just be bait. Use caution!

It’s easy to protect your information against my traps and keep your personal and company information safe.

Protect — don’t neglect — your information against Spear Phishermen like Mal Ware. For more information, check out www.us-cert.gov.

Lisa Martin CEO LeapFrog Solutions, Inc.

Lisa Martin
CEO
LeapFrog Solutions, Inc.

LeapFrog Solutions (LFS) is a certified woman owned small business based in Fairfax, Virginia. Founded in 1996, we are a trusted source for commercial businesses and federal agencies seeking full spectrum creative solutions and exceptional program management. This blogpost is brought to you by GTSC in partnership with LeapFrog Solutions. For more information on cyber awareness campaigns contact Anjali Dighe at 703.539.6127 or [email protected].

 

Ten Cyber Issues Board and Chief Legal Officers Need to Know (and Worry) About

Boards of Directors have several fiduciary duties to uphold. Meeting such duties requires addressing cybersecurity and data loss. While this rapidly evolving area has its own unique challenges, boards, as well as the legal officers who advise them, face the same question about how to address cybersecurity, data loss, and data theft as they do any other critical ssue-are they acting prudently, reasonably, and responsibly? More and more boards are now asking themselves, and the legal counsel who advise them, these questions and placing cybersecurity and data theft risks at a higher level of priority than even physical disasters. The factors highlight 10 areas boards and their legal advisors should consider before their companies are faced with a real-world cyber threat.

1. The stakes to share value and the bottom line are high. Cybersecurity and data theft may sound like abstract concepts, but they have impacts-including financial ones-in the real world. It’s been estimated that the global cost of cyberattacks in 2011 was $388 billion in direct financial loss and the cost of recovering from the attacks. Losses can take the form of stolen intellectual property or trade secrets, data destruction, disruption of critical systems, or even damage to physical assets. They also can include the exposure of customer and employee personal information. Any of these scenarios can result in material losses impacting a company’s reputation, bottom line, and share price.

2. The hackers are two steps ahead of you already. While today’s headlines are focused on standard types of data breaches and hacking activity-viruses, malware, physical break-ins, etc.-the next generation of threats, such as heretofore unforeseen attacks (so-called “zero day attacks”), has yet to make it into the public consciousness, but directors and their advisors have to be aware of them. The constantly mutating tactics cyber criminals employ will pose a serious challenge to any company that uses electronic systems. This means boards and their advisors, including GCs, will need to focus their attention on risk mitigation in this area for decades to come.

3. Cyber and data loss threats pose merger risks. Acquiring companies may be subject to significant losses and boards may be exposed to shareholder suits should adequate cybersecurity and other data protection measures not be taken in the context of corporate M&A activity. If a company acquires a target with a malware-infested IT system without appropriate due diligence to avoid that outcome, there is a potential for a wide range of liabilities. Cybersecurity and other data protection methods should be added to the long roster of criteria a board and its legal and business advisors use when evaluating a potential acquisition and acquisition documents should contemplate and provide for appropriate representations, warranties, and indemnities related to cyber thefts and attacks.

4. Lost or stolen intellectual property or customer or employee information can turn a deal from sweet to sour. Imagine your company acquires a target for hundreds of millions of dollars. Then their systems are hacked and the blueprints for the widget that made the company attractive are stolen. Knockoffs flood the market and the company’s value evaporates. Or imagine your company is about to launch a new software program, but it is swiped from your servers days before launch. Similar issues may arise if sensitive customer or employee data is exposed. Among the many questions that will be asked – by many, including investors, business partners and regulators – in the aftermath, is whether or not the board and its legal advisors acted with reasonable care to prevent such incidents.

5. There is a maze of state and federal data protection and data loss notification requirements to navigate.With State Attorneys General and an assortment of federal agencies, including the Federal Trade Commission, having a hand in data protection, breach notification, and disclosure requirements, companies should have plans in place for how to respond in a timely fashion should a breach occur (and, of course, be well-versed on its legal compliance obligations beforehand). The myriad disclosure and notification requirements and cybersecurity obligations will only grow and enforcement activity is likely only to increase, so it is incumbent on companies and their counsel to stay abreast of these developments.

6. The failure to be fully informed of and proactive against cybersecurity and data loss risks could lead to litigation. Companies, directors, and corporate managers could be exposed to litigation risks and potential liability for compromised data, systems, and infrastructure resulting from a cyberattack or data loss. Such claims could include third-party claims for breach of contract, breach of warranty, and/or statutory or common law legal requirements under both state or federal law; claims by state and federal regulators for failure to comply with specific data protection and cybersecurity laws (as well as more general unfair and deceptive trade practice-type laws), shareholder claims for breaches of fiduciary duty in failing to take appropriate steps to protect the company’s assets, and business from cyber theft or other cyberattacks; and for publicly traded companies, investor securities law claims and SEC actions for failing to adequately disclose cyber risks.

7. If the breach doesn’t get you, the litigation will. Even in those instances where a company or its directors are successful in defending a claim following a cyberattack or data loss, such litigation is likely to be expensive and a time-consuming distraction for management and the board. Beyond this, the cyberattack and the resultant attention from related legal proceedings could result in serious reputational harm.

8. There are federal programs available to help mitigate corporate liability through the SAFETY Act. Companies can gain valuable protections offered through an advanced approach to the Support Anti-Terrorism by Fostering Effective Technologies Act of 2002 (known as the SAFETY Act). This law provides tort liability protections for products and services that can be used to detect, defend
against, or respond to cyberattacks. It is essential that boards and their legal advisors be aware of
these programs and assess their applicability to cybersecurity products and services they either
procure or deploy on their own.

9. Insurance coverage is available through traditional or tailored policies. The demand for cybersecurity/data loss-specific coverage is incredibly high, placing pressure on availability, though some forms of traditional-and widely available-coverage such as Commercial General Liability may provide coverage for some types of claims. However, insurers are quickly working exclusions into these kinds of policies. Working with experienced coverage counsel can ensure the right kinds and amounts of coverage are in place.

10. Outside counsel comes with the benefit of attorney-client privilege.While there are armies of consultants at the ready to advise companies should a cyber or data loss incident occur, only legal counsel can offer the shield of attorney-client privilege, thereby ensuring that sensitive information about investigations cannot be used in litigation. Having your cybersecurity/data privacy attorney on speed dial is a good idea.

Is liability inevitable or can steps be taken to mitigate or eliminate it?
Cybersecurity and data loss liability and litigation is in a similar stage as environmental law in the
1970s: there has been a broad awakening that liabilities exist-and that they may be vast.
Companies have no choice but to assess their exposure and plan accordingly. That means in
today’s technology, dependent of business environment, it has become imperative that boards (or
their equivalents) and their business and legal advisors devote appropriate attention to
cybersecurity issues as a matter of good corporate practice and appropriate risk management.

This could mean causing management to (i) undertake a thorough cyber/data loss risk assessment
that includes both company-specific risks and risks to critical third parties that would adversely
impact the company, and (ii) identify and implement best practices relevant to the company’s cyber
and data loss risks.

Most importantly, boards and their senior management, including GCs, have to be aware of the
threats and have management take measures to mitigate them. Failure to do so could easily lead to
losses and liability.

By Divonne Smoyer, Brian E. Finch, & Emanuel Faust

Brian FinchQuestions? Ask GTSC’s Strategic Advisor!

Brian Finch
Partner, Dickstein Shapiro LLP
[email protected]
(202) 420-4823 
 
 
 
DISCLAIMER
The GTSC Legal Limits Brief is made available by GTSC for educational purposes only as well as to provide you with general informaiton and a general understanding of the law and legal changes that may impact your business, not to provide specific legal advice. No attorney client relationship is established with GTSC or our legal strategic partners by reading this brief. This information shold not be used as a substitute for competent legal advice from a licensed professional or attorney. Copyright © 2013. All Rights Reserved.

 

Oct. 10: Cyber Security Acquisition: What is the Government Buying?

Join the Government Technology & Services Coalition (GTSC) during October’s National Cyber Security Awareness Month for an in-depth look at the acquisition landscape for cyber security programs across DoD, DHS, DOS, and DOJ during its Capacity Building Session, Cyber Security Acquisition: What is the Government Buying? GTSC’s Strategic Partner Dickstein Shapiro LLP will track acquisition activity and provide some insights into how the Federal government is making cyber security investments. This is a “must attend” program if you are interested in understanding the Federal cybersecurity space.

Speakers:

Brian FinchBrian E. Finch

Partner

Dickstein Shapiro LLP

Brian Finch, a partner in Dickstein Shapiro’s Washington, DC office, is head of the firm’s Global Security Practice. Named by Washingtonian magazine in 2011 as one of the top 40 federal lobbyists under the age of 40, Mr. Finch is a recognized authority on global security matters who counsels clients on regulatory and government affairs issues involving the Department of Homeland Security, Congress, the Department of Defense, and other federal agencies. His focuses include liability mitigation, protection of critical infrastructure, state and local grant funds, WMD response preparations, chemical security, cyber security, and border and trade security.

Mr. Finch is a Senior Advisor to the Homeland Security and Defense Business Council and also is a member of the American Bar Association’s Homeland Security Executive Committee for the Administrative Law Section. Mr. Finch served as an inaugural Senior Fellow at George Washington University’s Homeland Security Policy Institute. He also was a member of the Heritage Foundation/Center for Strategic and International Studies Task Force for Examining the Roles, Missions, and Organization of the Department of Homeland Security. Mr. Finch is a Professorial Lecturer in Law at The George Washington University Law School, where he co-teaches Homeland Security Law and Policy. He is admitted to practice in the District of Columbia.
Mr. Finch speaks and writes extensively on global security and terrorism matters, as well as other public affairs issues. He has testified on the implementation of the SAFETY Act twice before the U.S. House of Representatives Committee on Homeland Security. He is regularly quoted in publications such as CQ Homeland Security and Washington Technology, and has been profiled by Government Security News Magazine, a leading homeland security journal. Examples of his articles include “Utilizing the SAFETY Act to Assist with CFATS Process,” which appeared in Business & Industry Connection in October 2009; “The SAFETY Act Affords Protections For Smart Grid Players,” which appeared in Renew Grid in October 2009; and “How Sports Owners Can Find Protection in SAFETY,” which appeared in the Sports Business Journal in November 2006. He also has appeared on television news programs such as MSNBC Live as a global security commentator.

Graham (Rusty) MathewsGraham (Rusty) Mathews

Senior Legislative Advisor

Dickstein Shapiro LLP

Rusty Mathews, the senior legislative advisor in the Public Policy & Law Practice of Dickstein Shapiro, joined the firm in 1996. Mr. Mathews’ specialties encompass representation, on a variety of legislative and appropriations issues, of the environmental community, electric utilities, competitive power producers and marketers, healthcare providers, direct marketers, homeland security and related high-tech industries, insurance and reinsurance providers, and clients involved in sports, entertainment, and Internet gaming.
During the years 1995 through 1996, in the office of U.S. Senator Barbara A. Mikulski, Mr. Mathews served as Chief Minority Clerk, Senate Appropriations Subcommittee on Veterans Affairs, Housing and Urban Development, and Independent Agencies. He managed all aspects of Congress’s second largest discretionary appropriations bill ($90 billion). He was also responsible for budget development and policy management for 25 federal departments and agencies, including the Departments of HUD and VA, the Environmental Protection Agency, the National Science Foundation, NASA and Federal Emergency Management Agency, and 15 independent boards, commissions, and offices.
In 1989 through 1994, in the office of U.S. Senator Robert C. Byrd, Mr. Mathews was the Assistant Majority Clerk, Senate Appropriations Subcommittee on the Department of Interior and Related Agencies. He managed all aspects of the Department of Interior appropriations bill relating to annual budget requests and policy development for the Bureau of Land Management, the U.S. Geological Survey, the Bureau of Mines, Office of Surface Mining, Smithsonian Institution, and the fossil energy accounts for the Department of Energy. He also served as principal negotiator for the Midwestern and Eastern coal states during Congressional deliberations on the Clean Air Act Amendments of 1990.
Among Mr. Mathews’ career highlights are membership on the Senate Democratic Policy Committee, serving as Deputy Vice President for External Affairs with the U.S. Synthetic Fuels Corporation, and being Director of Senate Relations with the Department of Energy.

Register now