Lawmakers question whether DHS cybersecurity role will be undercut by White House appointment
Department of Homeland Security nominee assures Senate hearing new role will not conflict
Computerworld - Just days after President Obama announced his plan to appoint a new White House cybersecurity coordinator, lawmakers are questioning the impact the move might have on the U.S. Department of Homeland Security's role in cybersecurity.
At a confirmation hearing on Wednesday for Rand Beers, the nominee for the undersecretary for the department's National Protection and Programs Directorate, members of the U.S. Senate Committee on Homeland Security and Governmental Affairs expressed hope the move wouldn't dilute DHS' cybersecurity mission.
Sen. Susan Collins (R-Maine), a ranking member of the Senate Committee, said she had a "lot of reservations about the establishment of a White House cybersecurity czar." Such an appointment would make it far more difficult for members of Congress to provide oversight because it would not be easy to get a presidential adviser to testify before the committee, she said.
Sen. Collins said that the addition of a new White House coordinator further confused the issue of who exactly will be in charge of protecting cyberspace, especially considering the string of new cybersecurity appointments made by the DHS earlier this week.
The chairman of the committee, Sen. Joseph Lieberman (Ind-Conn.), said that there had been a "lot of concerns" that Obama's appointment of a new cybersecurity czar would "undercut the role of the DHS." He added that from what he has seen so far, that doesn't appear to have happened, and hoped that the DHS would continue to be in charge of affairs. "To me it's just not turf. It's a very critical element of homeland security," the Senator said.
In response to such concerns, Beers said he had been assured personally by White House counterterrorism adviser John Brennan that the DHS's operational role in cybersecurity would not be undercut. Beers said he understood that there would be "no realignment of roles and mission for the department" following the appointment of a new White House cybersecurity adviser. President Obama's as yet unnamed appointment will have no operational authority and will serve a purely coordinating function, he said.
Beers noted that to properly fulfill its information security mission, the DHS has to work with several Departments including Treasury, Defense, Commerce and Justice. "To protect the U.S. government from cyber intrusions will require us working with all of those departments and agencies. Sometimes, I'm sorry to say we need help to get people to play in the same sandbox," which is where a White House coordinator can help, he said.
The discussion over the DHS' likely role is just a preview of the challenges the new White House appointee is likely to face. Currently civilian federal agencies, defense communities and the DHS are all working on separate and disparate missions on the cybersecurity front.
Though it is not clear yet what clout exactly the new coordinator will have, many expect the biggest challenge the appointee will face is getting all these stakeholders to agree and work on a common cybersecurity mission.
Obama and tech
- White House set to unleash 100,000 federal data sources via data.gov
- Growing White House ties to Google draw protest
- Experts: Obama cybersecurity plan short on details
- U.S. cyberwarfare command: Better late than never
- Obama outlines cybersecurity plans, cites grave threat to cyberspace
- Obama's new cybersecurity direction wins praise
- Internet warfare: Are we focusing on the wrong things?
- Obama administration said to consider military cybercommand
- Obama taps Melissa Hathaway for federal cybersecurity review
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts