CrowdStrike VP to give Congress IT Outage Testimony

Nandini Roy Choudhury, writer

Brief news

  • Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, will be giving testimony before Congress regarding the company’s global IT malfunction in July.
  • The House Homeland Security Committee has scheduled a subcommittee hearing on September 24 for Meyers to provide testimony.
  • The hearing will focus on the measures that CrowdStrike has implemented to prevent a similar occurrence and the potential vulnerabilities in critical infrastructure caused by defective software updates.

Detailed news

CrowdStrike Holdings Inc.’s operations team’s senior member will be giving testimony before Congress regarding the company’s global IT malfunction in July, which caused major interruptions to industries worldwide.

The House Homeland Security Committee has scheduled a subcommittee hearing on September 24 for Adam Meyers, senior vice president of counter adversary operations, to give testimony. The advisory is scheduled to be published on Friday. George Kurtz, CEO of CrowdStrike, was invited by the committee in July. The reason for Kurtz’s absence from the hearing was not immediately apparent.

A request for comment was not promptly addressed by CrowdStrike.

The committee has previously extended an invitation to executives of companies to provide testimony regarding cyber incidents that have had significant repercussions on American businesses.

Air travel, banking systems, and other businesses worldwide were rendered inoperable by the July 19 CrowdStrike disruption, which was precipitated by an inadequate content update.

Rep. Andrew Garbarino, the chairman of the Subcommittee on Cybersecurity and Infrastructure Protection and a New York Republican, stated that the hearing would provide an opportunity to observe the measures that CrowdStrike has implemented to prevent a similar occurrence. The organization has unveiled substantial modifications to its methodology for testing and deploying content updates subsequent to the incident.

“We are aware that our adversaries and opportunistic criminals have been closely monitoring the situation, despite the fact that the outage was not caused by a threat actor,” stated Garbarino in the advisory. “They have acquired an understanding of the cascading effects that a defective software update can have on our critical infrastructure.”

Source : Bloomberg

Leave a Reply

Your email address will not be published. Required fields are marked *