DHS reorganization creates new cybersecurity position
The move could mean more focus on cybersecurity issues
Chertoff, in the results of a review of the DHS structure he started after taking over as secretary in February, elevated the cybersecurity chief at the DHS several levels on the agency's organizational chart by creating a position of assistant secretary for cyber and telecommunications security. Several tech-oriented trade groups, including the Information Technology Association of America (ITAA) and the Cyber Security Industry Alliance, have repeatedly called for an assistant secretary to raise the profile of cybersecurity issues at the DHS.
The DHS did not release information about when it expected to have an assistant secretary in place.
An assistant secretary will have the authority to set policy and pull private industry into collaborations with government, ITAA President Harris Miller said recently. "The proof of the pudding is in the eating," Miller said. "Have we made enough progress yet in those areas? The clear answer is no."
IT groups have also suggested that a higher-level position with more authority would stop high turnover among government cybersecurity chiefs. The last DHS cybersecurity director, Amit Yoran, lasted about a year on the job.
Miller applauded Chertoff's decision to create the new position. Four bills introduced in Congress this year had also called on the DHS to create an assistant secretary of cybersecurity.
The DHS, when it was created in January 2003, didn't "give adequate focus" to cybersecurity, Miller said. He said the assistant secretary should establish lines of communication between government and private industry. In many cases, private industry sees cyberattacks sooner than government agencies do, he said, and there needs to be a "sophisticated, real-time, highly trusted" information-sharing mechanism between government and private companies.
An assistant secretary will be able to tie together several cybersecurity efforts within government, added Jack Danahy, CEO of Ounce Labs Inc., an IT security vendor. "Now there will be one voice telling the industry what government wants to do," said Danahy, who serves on a software security working group at DHS.
But some security experts have questioned the value of an assistant secretary, saying that without greater leadership from the top levels of the Bush administration, a new position may not improve cybersecurity much.
"If you don't have a strategy, does it matter what you call them?" said James Lewis, director of the Technology and Public Policy Program at the Center for Strategic & International Studies, a Washington think tank. "Can you think of an assistant secretary who's an advocate in Washington?"
Lewis suggested "no" is the correct answer to both questions. He acknowledged, in a recent interview, that on a symbolic level, a higher-level position could raise the profile of cybersecurity issues, but in practice, "I don't know if it makes much of a difference."
Chertoff's reorganization includes a number of other changes at the DHS, including the hiring of a chief medical officer to address medical preparedness, and the assignment of chief intelligence officer duties to the DHS assistant secretary for information analysis. Chertoff noted in a speech that the DHS has 10 intelligence-generating offices, and the role of the chief intelligence officer will be to coordinate all DHS intelligence.
This pilot fish works for a municipal utility, and he's responsible for an industrial-control network that manages the utility's many substations. What he's not is an IT guy.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- SIP Migration: Addressing CIOs' Concerns
- Recent data from IDG Research shows that many IT executives are counting on SIP to help them meet employee efficiency and customer experience...
- SBIC: Transforming Information Security
- This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
- InfoTech: Cloud File Sharing
- Organizations are increasingly turning to cloud file sharing solutions to meet end-user's needs for a lightweight and effective collaboration tool. In this report,...
- Rethinking Backup and Recovery
- As enterprises continue to transform their data centers, and virtualization plays an increasing role in their IT infrastructures, the way data is backed... All Government IT White Papers
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed in recent years, and it continues to escalate.
- PST Archiving: What is it and How is it Done? Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10...
- HP DevOps KnowledgeVault This interactive resource focuses on the evolution taking place in the world of software development, specifically the Agile development framework, and the gap...
- Introducing Cloud-Based Disaster Recovery From VMware Cost-effectively protect your business applications in the case of a local disaster or disruptive event. VMware is excited to introduce vCloud Hybrid Service...
- All Government IT Webcasts
Computerworld has launched its annual search for outstanding IT leaders who align technology with business goals. Nominate a top IT executive for the 2015 Premier 100 IT Leaders awards now through July 18.