Report: Hathaway resigns as acting cybersecurity czar
She also drops out of running for White House cybersecurity coordinator, WSJ says
Computerworld - Melissa Hathaway, who was regarded as one of the top contenders for the newly created position of White House cybersecurity coordinator, has withdrawn from consideration and resigned as acting senior director for cyberspace citing personal reasons, the Wall Street Journal reported.
Hathaway's resignation is effective Aug. 24. She had been viewed as a top contender for the post of White House cybersecurity coordinator, which was announced by President Barack Obama in May. According to the Journal, Hathaway asked not to be considered for that post about two weeks ago, citing personal reasons.
Hathaway, a former Bush administration aide, was working as cybercoordination executive for the Office of the Director of National Intelligence (ODNI) when she was appointed to her new role by President Obama in February. She was directed to conduct a 60-day review of governmentwide cybersecurity preparedness.
Hathaway's highly anticipated review was completed in May, and recommended several measures that the government needed to take to bolster cybersecurity. One of her recommendations was to establish a cybersecurity office within the executive offices of the president to oversee and enforce the development and implementation of a national cyber security policy.
As cybercoordination executive for the ODNI during the Bush Administration, Hathaway headed a multiagency group called the National Cyber Study Group that was instrumental in developing the multibillion-dollar, highly classified Comprehensive National Cyber Security Initiative (CNCI) that was approved by former President Bush in early 2008. Since then, right up to the time she was reassigned by Obama, Hathaway had been in charge of coordinating and monitoring the CNCI's implementation.
Hathaway's sudden resignation is likely to raise questions about the delay in naming the new White House cybersecurity coordinator. Though it's been more than eight weeks since Obama announced his plans to appoint a White House cyber czar, there is no indication that he is close to naming anyone to the post.
Some observers say the administration may be having a hard time finding someone to fill the role because it is expected to be a largely consultative position with little real enforcement clout.
Obama and tech
- China set to surpass U.S. in R&D spending in 10 years
- Outgoing federal CIO warns of 'an IT cartel'
- @whitehouse takes on Twitter Town Hall
- Obama's CIO quits
- Little new in Obama cybersecurity proposal
- Feds update IT plan following Obama's 'horrible' comment
- Obama's online trusted ID plan greeted with caution
- U.S. Census tech makeover includes 'oasis' for innovation
- Obama seeks big boost in cybersecurity spending
- QuickPoll: Is Obama's 98% 4G broadband coverage goal realistic?
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts