The cybersecurity job no one really wants
Perceived lack of clout robs White House cybersecurity post of luster, some say
Computerworld - When President Obama announced in May that he was establishing a White House office for cybersecurity, the news was widely welcomed as a sign of the administration's willingness to recognize cyberthreats as a national security issue.The need for such a role had been espoused by many in the security industry, including Obama's acting cybersecurity chief, Melissa Hathaway, who announced her resignation this week, and a 40-member commission that had developed cybersecurity recommendations for the Obama administration.
The idea was to create a central role that would be responsible for developing and enforcing a national strategy for defending the country's government and commercial interests in cyberspace.
But eight weeks after the president's announcement, and with no one named to the post yet, some have begun wondering if the delay is because there are few takers for the job. Far from being the game-changing role that some had hoped it would be, the new position is increasingly being seen as one that has been watered down to the point of inconsequence.
Hathaway, who was considered a contender for the role given her past experience as a cybersecurity executive for the Office of the Director of National Intelligence, alluded to such issues in an interview with the Washington Post this week. She suggested to the Post the reason she had quit was because she "wasn't willing to continue to wait any longer because I'm not empowered right now to continue to drive the change." About 30 people have been interviewed for the job so far, the report said.
Among those who turned down the position were former Virginia Sen. Tom Davis, Microsoft's Scott Charney, and Good Harbor Consulting executive Paul Kurtz, who is a former senior director for critical infrastructure protection on the White House's Homeland Security team, Forbes reported last month.
In announcing her resignation, Hathaway told the White House that she did not want to be considered for the cybersecurity role, the Wall Street Journal reported.
Tom Kellerman, vice president of security awareness at Core Security Technologies, said Hathaway's decision leaves a dangerous leadership void on the cybersecurity front and highlights the challenges the White House is facing in attracting the right talent to the job. Kellerman was part of a 40-person team led by the Center for Strategic and International Studies (CSIS) that delivered a set of cybersecurity recommendations to the president in January.
"The position just isn't high enough in the White House food chain to attract the most qualified people," Kellerman said. It is only by elevating the position to the rank of a special adviser that it will have the clout and decision-making capabilities to enforce cybersecurity change across government, he said.
Obama and tech
- China set to surpass U.S. in R&D spending in 10 years
- Outgoing federal CIO warns of 'an IT cartel'
- @whitehouse takes on Twitter Town Hall
- Obama's CIO quits
- Little new in Obama cybersecurity proposal
- Feds update IT plan following Obama's 'horrible' comment
- Obama's online trusted ID plan greeted with caution
- U.S. Census tech makeover includes 'oasis' for innovation
- Obama seeks big boost in cybersecurity spending
- QuickPoll: Is Obama's 98% 4G broadband coverage goal realistic?
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts