The cybersecurity job no one really wants
Perceived lack of clout robs White House cybersecurity post of luster, some say
Computerworld - When President Obama announced in May that he was establishing a White House office for cybersecurity, the news was widely welcomed as a sign of the administration's willingness to recognize cyberthreats as a national security issue.The need for such a role had been espoused by many in the security industry, including Obama's acting cybersecurity chief, Melissa Hathaway, who announced her resignation this week, and a 40-member commission that had developed cybersecurity recommendations for the Obama administration.
The idea was to create a central role that would be responsible for developing and enforcing a national strategy for defending the country's government and commercial interests in cyberspace.
But eight weeks after the president's announcement, and with no one named to the post yet, some have begun wondering if the delay is because there are few takers for the job. Far from being the game-changing role that some had hoped it would be, the new position is increasingly being seen as one that has been watered down to the point of inconsequence.
Hathaway, who was considered a contender for the role given her past experience as a cybersecurity executive for the Office of the Director of National Intelligence, alluded to such issues in an interview with the Washington Post this week. She suggested to the Post the reason she had quit was because she "wasn't willing to continue to wait any longer because I'm not empowered right now to continue to drive the change." About 30 people have been interviewed for the job so far, the report said.
Among those who turned down the position were former Virginia Sen. Tom Davis, Microsoft's Scott Charney, and Good Harbor Consulting executive Paul Kurtz, who is a former senior director for critical infrastructure protection on the White House's Homeland Security team, Forbes reported last month.
In announcing her resignation, Hathaway told the White House that she did not want to be considered for the cybersecurity role, the Wall Street Journal reported.
Tom Kellerman, vice president of security awareness at Core Security Technologies, said Hathaway's decision leaves a dangerous leadership void on the cybersecurity front and highlights the challenges the White House is facing in attracting the right talent to the job. Kellerman was part of a 40-person team led by the Center for Strategic and International Studies (CSIS) that delivered a set of cybersecurity recommendations to the president in January.
"The position just isn't high enough in the White House food chain to attract the most qualified people," Kellerman said. It is only by elevating the position to the rank of a special adviser that it will have the clout and decision-making capabilities to enforce cybersecurity change across government, he said.
Obama and tech
- China set to surpass U.S. in R&D spending in 10 years
- Outgoing federal CIO warns of 'an IT cartel'
- @whitehouse takes on Twitter Town Hall
- Obama's CIO quits
- Little new in Obama cybersecurity proposal
- Feds update IT plan following Obama's 'horrible' comment
- Obama's online trusted ID plan greeted with caution
- U.S. Census tech makeover includes 'oasis' for innovation
- Obama seeks big boost in cybersecurity spending
- QuickPoll: Is Obama's 98% 4G broadband coverage goal realistic?
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts