Report: Hathaway resigns as acting cybersecurity czar
She also drops out of running for White House cybersecurity coordinator, WSJ says
Computerworld - Melissa Hathaway, who was regarded as one of the top contenders for the newly created position of White House cybersecurity coordinator, has withdrawn from consideration and resigned as acting senior director for cyberspace citing personal reasons, the Wall Street Journal reported.
Hathaway's resignation is effective Aug. 24. She had been viewed as a top contender for the post of White House cybersecurity coordinator, which was announced by President Barack Obama in May. According to the Journal, Hathaway asked not to be considered for that post about two weeks ago, citing personal reasons.
Hathaway, a former Bush administration aide, was working as cybercoordination executive for the Office of the Director of National Intelligence (ODNI) when she was appointed to her new role by President Obama in February. She was directed to conduct a 60-day review of governmentwide cybersecurity preparedness.
Hathaway's highly anticipated review was completed in May, and recommended several measures that the government needed to take to bolster cybersecurity. One of her recommendations was to establish a cybersecurity office within the executive offices of the president to oversee and enforce the development and implementation of a national cyber security policy.
As cybercoordination executive for the ODNI during the Bush Administration, Hathaway headed a multiagency group called the National Cyber Study Group that was instrumental in developing the multibillion-dollar, highly classified Comprehensive National Cyber Security Initiative (CNCI) that was approved by former President Bush in early 2008. Since then, right up to the time she was reassigned by Obama, Hathaway had been in charge of coordinating and monitoring the CNCI's implementation.
Hathaway's sudden resignation is likely to raise questions about the delay in naming the new White House cybersecurity coordinator. Though it's been more than eight weeks since Obama announced his plans to appoint a White House cyber czar, there is no indication that he is close to naming anyone to the post.
Some observers say the administration may be having a hard time finding someone to fill the role because it is expected to be a largely consultative position with little real enforcement clout.
Obama and tech
- China set to surpass U.S. in R&D spending in 10 years
- Outgoing federal CIO warns of 'an IT cartel'
- @whitehouse takes on Twitter Town Hall
- Obama's CIO quits
- Little new in Obama cybersecurity proposal
- Feds update IT plan following Obama's 'horrible' comment
- Obama's online trusted ID plan greeted with caution
- U.S. Census tech makeover includes 'oasis' for innovation
- Obama seeks big boost in cybersecurity spending
- QuickPoll: Is Obama's 98% 4G broadband coverage goal realistic?
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts