Obama cyber czar pick looks to secure smartphones, social nets
Calls on social media firms to alert users about various security threats
Network World - In choosing Howard Schmidt as cybersecurity czar, President Obama has someone who has held a similar job in a previous administration, has varied experience at high-level corporate jobs, was a frequent panelist at security conferences and who has even written a book on defending the Internet.
Schmidt served under President George W. Bush for three years, ultimately resigning after producing the "National Strategy to Secure Cyberspace."
Because of his high profile past as CSO of Microsoft and CISO of eBay, during which he spoke often at public forums, there is a broad record of his thoughts on network security, from smartphone threats to equating cyber security to physical security. ( See Ten 2010 IT Security Predictions)
The new cybersecurity coordinator favors government promotion of education, research and prodding vendors to produce more secure products that will work their way into everyday use.
"What is the government doing to make sure universities and companies have dollars to do research that will enhance security?" Schmidt said in a 2008 interview with Computerworld. "There is R&D that needs to be done that may not benefit homeland security but it might create the next generation of the Internet that is more secure."
He thinks Internet security is greatly improved since the mid-1990s when he ranked the impact of a foreign cyberattack in the United States at 5 or 6 on a scale of one to 10, with 10 meaning attacks would have no effect. That has improved to 8 or 9 because the number of attack vectors has been reduced. "We have the ability to turn back attacks. We also could shut down systems that might be under attack and bring them internal," he says.
Getting cybersecurity considered as important as physical security -- such as protecting planes and ports -- was a hurdle that is being overcome. Schmidt says he realizes the country can't have two No. 1 priorities, but it needs to boost the effort put behind cybersecurity. "The government has recognized that work has to be done. We're getting much closer to having them on equal footing," he says.
In past interviews, he has said smartphones and other such mobile devices generate the most concern. "What they've been attacking on the desktop, they'll starting attacking in our mobile devices as they become more like PCs in our pockets. We can't wait five years to do something about it. We have to do something now," he said
He has a subtle view of exactly what terrorists are likely to attack and what they are likely to preserve as potential tools for propaganda. For instance, they might leave cell phone networks and the Internet infrastructure in general intact rather than try to take them down. "Terrorists now can push Bin Laden videos to mobile phones," he says. "They're doing podcasts and Webcasts. To attack the Internet is not in their best interests because they'd suffer like everyone else."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts