Obama issues order aimed at preventing federal data leaks
Computerworld - President Obama has issued an executive order aimed at better securing data stored by federal agencies.
Some industry watchers believe the move is a response to the whistle-blower organization WikiLeaks, which has published information provided by Bradley Manning, a relatively low-level Army intelligence officer who last year downloaded thousands of documents from secure networks and handed them over to WikiLeaks.
Obama's order focuses on creating committees and task forces to oversee access to classified networks and government data.
The order requires the heads of all federal agencies to appoint a senior official to oversee measures for controlling and monitoring access to classified information. The chosen officials will also establish an insider threat detection and prevention program, as well as supervise their respective agencies' compliance with new policies and standards governing access to and use of classified data.
A new Information Sharing and Safeguarding Steering Committee will coordinate new interagency policies and standards for safeguarding classified information. The committee will be co-chaired by an executive from the White House Office of Management and Budget and will include representatives from the State, Justice and Homeland Security departments, as well as officials from the CIA and other agencies.
Eddie Schwartz, chief security officer at RSA, EMC's security division, said that after the WikiLeaks incident, many agencies scrambled to implement safeguards. The result was a hodgepodge of standards and procedures to protect classified data, plus differences in the degrees of diligence devoted to such efforts.
"What the administration is saying is this is a matter for all of us," said Schwartz.
The order also calls for an interagency task force that will create governmentwide policies for detecting and mitigating threats.
This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Gov't Legislation/Regulation White Papers | Webcasts