Questions loom about Obama's cybersecurity plans
As opposition mounts to an executive order, question is whether White House will plow ahead or drop idea
Computerworld - With opposition growing to reported plans by President Obama to issue an Executive Order to bolster cybersecurity within the nation's critical infrastructure, the main question now is whether the White House will plow ahead with the idea or drop it quietly in an election year.
Last week, Techdirt published what it said was a leaked draft version of Obama's planned order for critical infrastructure protection. The 19-page document outlines broad security objectives for all government agencies.
Without offering many specifics, the draft order calls for a revised, more secure federal architecture and the development of a nationwide situational awareness capability for cybersecurity. The draft order also calls for the development of an information exchange network to speed up the sharing of threat information between private industry and the government.
The proposed order puts the Department of Homeland Security (DHS) in charge of planning, coordinating and implementing the changes. It requires sector-specific federal agencies to work with critical infrastructure owners and regulatory entities to develop security guidelines and metrics for measuring progress.
The contents of the draft executive order are similar to the provisions of a White House-backed bill called the Cybersecurity Act. The bill is currently stalled in the Senate because of objections from Republicans who see it as being too prescriptive and giving the DHS too much enforcement authority in commercial cybersecurity matters.
The White House has said it is considering an executive order because Congress has been unable to pass meaningful cybersecurity legislation at a time when critical infrastructure assets are under growing threat from foreign adversaries and criminal hackers.
Those who back the plan say White House intervention is necessary because of Congress's inaction. They dismiss the notion that private industry can regulate itself in a responsible way and argue that a mandate is the best way forward.
"The U.S. is on the cusp of major cyber conflict around the world," said Alan Paller, director of research with the SANS Institute. He pointed to a recent attack on Saudi Arabian oil giant Saudi Aramco that disabled 30,000 PCs, as an example of the threats faced by American companies. "Had it been Exxon, you would be writing headlines saying 'cyber warfare' with exclamation points," Paller said.
"Leaving business to its own compliance regimes has put the nation at risk," he added. "This is one of those cases where government involvement is necessary. Any more hands-off behavior will be pure negligence."
That position is shared by James Lewis, director and senior fellow at the Center for Strategic and International Studies in Washington. "I think they need an [executive order]," Lewis said. "Congress is fouled up and the private sector will not provide adequate security."
Lewis is among those who developed a set of cybersecurity recommendations for the Obama Administration four years ago.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Review: Box beats Dropbox - and all the rest - for business Box trumps Dropbox, Engyte, Citrix ShareFile, EMC Syncplicity, and OwnCloud with rich mix of file sync, file sharing, user management, deep reporting and...
- Analyst Report-Mixed All Flash Arrays Delivers Safer Higher Performance What is the impact of an all-flash array with enterprise features and reliability on the mainstream data center? In the mainstream environment, storage...
- Embracing Flash Storage Exec Brief Flash storage can deliver impressive performance, especially for random I/O, by eliminating rotational and seek latencies that are common in all hard disk...
- Embracing Tiered Storage Exec Brief All data is not created equal and thus all data need not be treated the same by the storage system. IT executives must...
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
All Cyberwarfare White Papers |