Obama outlines cybersecurity plans, cites grave threat to cyberspace
He pledged the government would protect critical infrastructures from cyberattack
Computerworld - The nation's digital infrastructure is under grave threat from a range of adversaries and needs to be protected as a strategic national security asset, President Barack Obama said this morning at a news conference outlining his administration's proposals to secure cyberspace.
Speaking to reporters at the White House, the President also announced the creation of a cybersecurity coordinator role at the White House who will be responsible for overseeing a national strategy for securing American interests in cyberspace.
The as-yet-unnamed coordinator will be responsible for "orchestrating and integrating" all cybersecurity policies for the government and will be personally selected by the president, Obama said .
He described the move as an attempt to give cybersecurity the "high-level focus and attention" it deserves at a time when critical government, military and private sector targets are coming under increasing attacks by adversaries, he said.
"We're not as prepared as we should be," Obama said, noting that no single person is currently responsible for overseeing the U.S. government's cybersecurity efforts. "This status quo is no longer acceptable."
That, he said, is what led him to call for a "top-to-bottom" review of government efforts to protect critical infrastructures from cyberattacks. "This new approach starts from the top...."
Pointing to national security needs, Obama noted that defense agencies are under frequent attack. He pointed to malware that infected Defense Department computers last year, saying the attack had forced the military to require soldiers to stop using thumb drives to prevent the malware from spreading.
He also said that his own campaign operation had been hacked last year.
Obama's plans are based on a review of government-wide cybersecurity undertaken by Melissa Hathaway, a former Bush administration aide who he appointed as acting senior director for cyberspace.
Based on the findings of the report, the government will pursue actions in five key areas, Obama said.
First, Obama wants those involved in security issues at government agencies and in the private sector to devise a comprehensive strategy for improving cybersecurity, with a focus on goals, management priorities and accountability. Second, he wants the nation to be able to respond to cyber events in a more organized and unified way.
"Ad hoc responses will not do," Obama said. "Just as we do for natural disaster, we need to have plans in place."
The President also wants a focus on building stronger public and private partnerships around cybersecurity; on pushing new security research and development; and on launching a national campaign to spread cybersecurity awareness.
The new coordinator will be a member of the National Security Council and would report both to the national security adviser and the senior White House economic adviser. The goal is to have someone with direct access to the President on cybersecurity matters who has the clout to force changes across government agencies if needed.
Obama and tech
- China set to surpass U.S. in R&D spending in 10 years
- Outgoing federal CIO warns of 'an IT cartel'
- @whitehouse takes on Twitter Town Hall
- Obama's CIO quits
- Little new in Obama cybersecurity proposal
- Feds update IT plan following Obama's 'horrible' comment
- Obama's online trusted ID plan greeted with caution
- U.S. Census tech makeover includes 'oasis' for innovation
- Obama seeks big boost in cybersecurity spending
- QuickPoll: Is Obama's 98% 4G broadband coverage goal realistic?
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cybercrime and Hacking White Papers | Webcasts