Sen. Feinstein urges Obama to issue executive order on cybersecurity
Measure needed to protect critical assets against cyber attacks, says top Democrat
Computerworld - A senior Democratic lawmaker is urging President Barack Obama to issue an executive order aimed at protecting the nation's critical infrastructure against cyber threats.
In an open letter to the President on Tuesday, Sen. Dianne Feinstein (D-Calif.) called on Obama to use his authority to get government agencies and critical infrastructure owners to implement better controls for protecting their computer networks.
"While efforts to reach consensus continue, I fear that the Congress will be unable to pass meaningful cybersecurity legislation this year," said Feinstein, who is the chairman of the Senate Intelligence Committee. "Therefore, I believe the time has come for you to use your full authority to protect the U.S. economy and the networks we depend on from future cyber attack."
The letter is unlikely to do much to bridge the growing divide between Republicans and the Democrats on the issue of national cybersecurity legislation.
The White House-backed Cybersecurity Act is currently stalled in the Senate because of opposition from Republican lawmakers who see it as too regulatory.
Earlier this year, a group of Republican lawmakers proposed an alternative bill called SECURE IT. Like the Cybersecurity Act, the Republican bill, too, aims to bolster cybersecurity by making it easier for private industry and government to share critical cyber threat information.
The Republicans have claimed their bill is better suited for the task because it focuses on collaboration and voluntary participation rather than government-enforced regulation. They also noted that their version of the bill offers better liability protection for companies that participate in voluntary sharing of threat information.
The White House has already expressed its frustration over the continued bickering between the two sides and has said it is considering an executive order to address the issue.
Efforts to pass a national cybersecurity bill have been going on for several years. The stalled Democrat-backed legislation has already been heavily revised to accommodate Republican concerns, but still appears to be going nowhere. The same is true with the Republican alternative.
Both sides have blamed each other for the stalemate. Earlier this month, several GOP senators expressed support for a bilateral approach to the issue, while accusing the Democrats of adopting a "take-it-or-leave-it" approach to the legislation.
Feinstein's letter meanwhile blamed Republicans for the impasse. "Despite good faith efforts to reach a compromise and major concessions on our part, those opposed to the legislation were able to defeat progress on the bill," she wrote.
Security analysts are divided on the need for legislation. Some have accused both sides of making cybersecurity a political issue during an election year and have noted that many of the measures being proposed as new have been in place for years.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts