Obama outlines cybersecurity plans, cites grave threat to cyberspace
He pledged the government would protect critical infrastructures from cyberattack
Computerworld - The nation's digital infrastructure is under grave threat from a range of adversaries and needs to be protected as a strategic national security asset, President Barack Obama said this morning at a news conference outlining his administration's proposals to secure cyberspace.
Speaking to reporters at the White House, the President also announced the creation of a cybersecurity coordinator role at the White House who will be responsible for overseeing a national strategy for securing American interests in cyberspace.
The as-yet-unnamed coordinator will be responsible for "orchestrating and integrating" all cybersecurity policies for the government and will be personally selected by the president, Obama said .
He described the move as an attempt to give cybersecurity the "high-level focus and attention" it deserves at a time when critical government, military and private sector targets are coming under increasing attacks by adversaries, he said.
"We're not as prepared as we should be," Obama said, noting that no single person is currently responsible for overseeing the U.S. government's cybersecurity efforts. "This status quo is no longer acceptable."
That, he said, is what led him to call for a "top-to-bottom" review of government efforts to protect critical infrastructures from cyberattacks. "This new approach starts from the top...."
Pointing to national security needs, Obama noted that defense agencies are under frequent attack. He pointed to malware that infected Defense Department computers last year, saying the attack had forced the military to require soldiers to stop using thumb drives to prevent the malware from spreading.
He also said that his own campaign operation had been hacked last year.
Obama's plans are based on a review of government-wide cybersecurity undertaken by Melissa Hathaway, a former Bush administration aide who he appointed as acting senior director for cyberspace.
Based on the findings of the report, the government will pursue actions in five key areas, Obama said.
First, Obama wants those involved in security issues at government agencies and in the private sector to devise a comprehensive strategy for improving cybersecurity, with a focus on goals, management priorities and accountability. Second, he wants the nation to be able to respond to cyber events in a more organized and unified way.
"Ad hoc responses will not do," Obama said. "Just as we do for natural disaster, we need to have plans in place."
The President also wants a focus on building stronger public and private partnerships around cybersecurity; on pushing new security research and development; and on launching a national campaign to spread cybersecurity awareness.
The new coordinator will be a member of the National Security Council and would report both to the national security adviser and the senior White House economic adviser. The goal is to have someone with direct access to the President on cybersecurity matters who has the clout to force changes across government agencies if needed.
Obama and tech
- China set to surpass U.S. in R&D spending in 10 years
- Outgoing federal CIO warns of 'an IT cartel'
- @whitehouse takes on Twitter Town Hall
- Obama's CIO quits
- Little new in Obama cybersecurity proposal
- Feds update IT plan following Obama's 'horrible' comment
- Obama's online trusted ID plan greeted with caution
- U.S. Census tech makeover includes 'oasis' for innovation
- Obama seeks big boost in cybersecurity spending
- QuickPoll: Is Obama's 98% 4G broadband coverage goal realistic?
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts