The cybersecurity job no one really wants
Perceived lack of clout robs White House cybersecurity post of luster, some say
Computerworld - When President Obama announced in May that he was establishing a White House office for cybersecurity, the news was widely welcomed as a sign of the administration's willingness to recognize cyberthreats as a national security issue.The need for such a role had been espoused by many in the security industry, including Obama's acting cybersecurity chief, Melissa Hathaway, who announced her resignation this week, and a 40-member commission that had developed cybersecurity recommendations for the Obama administration.
The idea was to create a central role that would be responsible for developing and enforcing a national strategy for defending the country's government and commercial interests in cyberspace.
But eight weeks after the president's announcement, and with no one named to the post yet, some have begun wondering if the delay is because there are few takers for the job. Far from being the game-changing role that some had hoped it would be, the new position is increasingly being seen as one that has been watered down to the point of inconsequence.
Hathaway, who was considered a contender for the role given her past experience as a cybersecurity executive for the Office of the Director of National Intelligence, alluded to such issues in an interview with the Washington Post this week. She suggested to the Post the reason she had quit was because she "wasn't willing to continue to wait any longer because I'm not empowered right now to continue to drive the change." About 30 people have been interviewed for the job so far, the report said.
Among those who turned down the position were former Virginia Sen. Tom Davis, Microsoft's Scott Charney, and Good Harbor Consulting executive Paul Kurtz, who is a former senior director for critical infrastructure protection on the White House's Homeland Security team, Forbes reported last month.
In announcing her resignation, Hathaway told the White House that she did not want to be considered for the cybersecurity role, the Wall Street Journal reported.
Tom Kellerman, vice president of security awareness at Core Security Technologies, said Hathaway's decision leaves a dangerous leadership void on the cybersecurity front and highlights the challenges the White House is facing in attracting the right talent to the job. Kellerman was part of a 40-person team led by the Center for Strategic and International Studies (CSIS) that delivered a set of cybersecurity recommendations to the president in January.
"The position just isn't high enough in the White House food chain to attract the most qualified people," Kellerman said. It is only by elevating the position to the rank of a special adviser that it will have the clout and decision-making capabilities to enforce cybersecurity change across government, he said.
Obama and tech
- China set to surpass U.S. in R&D spending in 10 years
- Outgoing federal CIO warns of 'an IT cartel'
- @whitehouse takes on Twitter Town Hall
- Obama's CIO quits
- Little new in Obama cybersecurity proposal
- Feds update IT plan following Obama's 'horrible' comment
- Obama's online trusted ID plan greeted with caution
- U.S. Census tech makeover includes 'oasis' for innovation
- Obama seeks big boost in cybersecurity spending
- QuickPoll: Is Obama's 98% 4G broadband coverage goal realistic?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!