The cybersecurity job no one really wants
Perceived lack of clout robs White House cybersecurity post of luster, some say
Computerworld - When President Obama announced in May that he was establishing a White House office for cybersecurity, the news was widely welcomed as a sign of the administration's willingness to recognize cyberthreats as a national security issue.The need for such a role had been espoused by many in the security industry, including Obama's acting cybersecurity chief, Melissa Hathaway, who announced her resignation this week, and a 40-member commission that had developed cybersecurity recommendations for the Obama administration.
The idea was to create a central role that would be responsible for developing and enforcing a national strategy for defending the country's government and commercial interests in cyberspace.
But eight weeks after the president's announcement, and with no one named to the post yet, some have begun wondering if the delay is because there are few takers for the job. Far from being the game-changing role that some had hoped it would be, the new position is increasingly being seen as one that has been watered down to the point of inconsequence.
Hathaway, who was considered a contender for the role given her past experience as a cybersecurity executive for the Office of the Director of National Intelligence, alluded to such issues in an interview with the Washington Post this week. She suggested to the Post the reason she had quit was because she "wasn't willing to continue to wait any longer because I'm not empowered right now to continue to drive the change." About 30 people have been interviewed for the job so far, the report said.
Among those who turned down the position were former Virginia Sen. Tom Davis, Microsoft's Scott Charney, and Good Harbor Consulting executive Paul Kurtz, who is a former senior director for critical infrastructure protection on the White House's Homeland Security team, Forbes reported last month.
In announcing her resignation, Hathaway told the White House that she did not want to be considered for the cybersecurity role, the Wall Street Journal reported.
Tom Kellerman, vice president of security awareness at Core Security Technologies, said Hathaway's decision leaves a dangerous leadership void on the cybersecurity front and highlights the challenges the White House is facing in attracting the right talent to the job. Kellerman was part of a 40-person team led by the Center for Strategic and International Studies (CSIS) that delivered a set of cybersecurity recommendations to the president in January.
"The position just isn't high enough in the White House food chain to attract the most qualified people," Kellerman said. It is only by elevating the position to the rank of a special adviser that it will have the clout and decision-making capabilities to enforce cybersecurity change across government, he said.
Obama and tech
- China set to surpass U.S. in R&D spending in 10 years
- Outgoing federal CIO warns of 'an IT cartel'
- @whitehouse takes on Twitter Town Hall
- Obama's CIO quits
- Little new in Obama cybersecurity proposal
- Feds update IT plan following Obama's 'horrible' comment
- Obama's online trusted ID plan greeted with caution
- U.S. Census tech makeover includes 'oasis' for innovation
- Obama seeks big boost in cybersecurity spending
- QuickPoll: Is Obama's 98% 4G broadband coverage goal realistic?
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts