DHS names key cybersecurity staff
No word yet from Obama on White House cybersecurity coordinator
Computerworld - U.S. Homeland Security Secretary Janet Napolitano tapped Philip Reitinger as director of the National Cybersecurity Center (NCSC), replacing Rod Beckstrom, who quit the post earlier this year citing turf battles with other agencies.
Reitinger will be responsible for collecting, analyzing, integrating and sharing cybersecurity information among federal agencies, the DHS said in a statement Monday.
Reitinger, a former Microsoft Corp. cybersecurity executive, will also continue in his current role as deputy undersecretary of the DHS's National Protection and Programs Directorate (NPPD).His appointment was one of three key personnel announcements made by the DHS on the cybersecurity front. Napolitano also picked Greg Schaffer to be assistant secretary for cybersecurity and communications (CS&C), and Bruce McConnell as counselor to the deputy undersecretary at the NPPD.
McConnell will be a senior adviser to Reitinger on "strategic and policy matters" related to the NPPD, the DHS said. The NPPD includes the CS&C, the office of infrastructure protection and the US-VISIT border security program, which provides visa-issuing posts and ports of entry with biometric identification technology. He was also part of the Obama-Biden transition team and was involved in information policy and technology-related matters.
Schaffer, meanwhile, will be in charge of coordinating cybersecurity efforts across the NPPD and will be responsible for ensuring that public and private sector organizations and international partners work together to mitigate threats to U.S. interests in cyberspace. He replaces Gregory Garcia, who was the first to be appointed as assistant secretary of the CS&C by former DHS Secretary Michael Chertoff in 2006. Schaffer was previously a cybersecurity executive at Alltel Communications and PricewaterhouseCoopers.
The DHS appointments come at a time when there are growing questions about what the agency's role on cybersecurity should be. The DHS continues to be the lead agency on cybersecurity matters, but it has been criticized for its inability to live up to that role.
When Beckstrom resigned as director of the NCSC in February, he lifted the lid on an ongoing turf war between the DHS and the National Security Agency over cybersecurity. Listing reasons for his decision to leave, he cited the NSA's growing interference in domestic cybersecurity matters and the DHS's unwillingness to lend the needed financial support and other resources to the NCSC.
Many agree that the DHS needs to be empowered to take an operational role in cybersecurity. But many have also argued that the task of developing and enforcing a comprehensive national cybersecurity strategy belongs in the White House. Over the past few months, several groups have lobbied for the creation of a high-level cybersecurity post within the executive offices of the president.
It was against this backdrop that President Obama last week announced the creation of a White-House-level cybersecurity coordinator to oversee governmentwide information security efforts. Obama has yet to make the appointment, and it remains unknown how the official who fills that position will work with the DHS and other government agencies in pulling together a national cybersecurity strategy.
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts