Questions loom about Obama's cybersecurity plans
As opposition mounts to an executive order, question is whether White House will plow ahead or drop idea
Computerworld - With opposition growing to reported plans by President Obama to issue an Executive Order to bolster cybersecurity within the nation's critical infrastructure, the main question now is whether the White House will plow ahead with the idea or drop it quietly in an election year.
Last week, Techdirt published what it said was a leaked draft version of Obama's planned order for critical infrastructure protection. The 19-page document outlines broad security objectives for all government agencies.
Without offering many specifics, the draft order calls for a revised, more secure federal architecture and the development of a nationwide situational awareness capability for cybersecurity. The draft order also calls for the development of an information exchange network to speed up the sharing of threat information between private industry and the government.
The proposed order puts the Department of Homeland Security (DHS) in charge of planning, coordinating and implementing the changes. It requires sector-specific federal agencies to work with critical infrastructure owners and regulatory entities to develop security guidelines and metrics for measuring progress.
The contents of the draft executive order are similar to the provisions of a White House-backed bill called the Cybersecurity Act. The bill is currently stalled in the Senate because of objections from Republicans who see it as being too prescriptive and giving the DHS too much enforcement authority in commercial cybersecurity matters.
The White House has said it is considering an executive order because Congress has been unable to pass meaningful cybersecurity legislation at a time when critical infrastructure assets are under growing threat from foreign adversaries and criminal hackers.
Those who back the plan say White House intervention is necessary because of Congress's inaction. They dismiss the notion that private industry can regulate itself in a responsible way and argue that a mandate is the best way forward.
"The U.S. is on the cusp of major cyber conflict around the world," said Alan Paller, director of research with the SANS Institute. He pointed to a recent attack on Saudi Arabian oil giant Saudi Aramco that disabled 30,000 PCs, as an example of the threats faced by American companies. "Had it been Exxon, you would be writing headlines saying 'cyber warfare' with exclamation points," Paller said.
"Leaving business to its own compliance regimes has put the nation at risk," he added. "This is one of those cases where government involvement is necessary. Any more hands-off behavior will be pure negligence."
That position is shared by James Lewis, director and senior fellow at the Center for Strategic and International Studies in Washington. "I think they need an [executive order]," Lewis said. "Congress is fouled up and the private sector will not provide adequate security."
Lewis is among those who developed a set of cybersecurity recommendations for the Obama Administration four years ago.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cyberwarfare White Papers | Webcasts