Obama seen likely to urge Congress to pass cybersecurity laws in State of the Union address
Nonetheless, the President is likely to issue an executive order Wednesday to implement for voluntary cybersecurity standards
Computerworld - President Obama could use tonight's State of the Union address to continue a push for new cybersecurity legislation, even as he's widely expected to issue an executive order Wednesday to impose rules aimed at protecting critical infrastructure targets, security experts say.
The long-expected executive order stems from what the White House has long said is the need for immediate action to protect critical assets against cyber threats because of Congress' continued failure to pass legislation.
The order would create a voluntary program calling for federal agencies and owners of critical infrastructure to adopt a set of minimum security standards and information sharing practices between government and the private sector.
Details of the executive order are expected to be disclosed tomorrow at a press conference hosted by the U.S. Department of Commerce.
The event, touted as announcing an update to the Obama Administration's Priorities for Cybersecurity Policy, will include remarks from several high-ranking officials, such as Rebecca Blank, deputy secretary of the U.S. Department of Commerce, Michael Daniel, special assistant to the President and White House cybersecurity coordinator, and General Keith Alexander, commander of the U.S. Cyber Command.
The timing of the event suggests that Obama will talk about cybersecurity matters in the State of the Union address, said John Pescatore, director of emerging security trends at the SANS Institute in Bethesda, Md.
With a widely reported hack of Federal Reserve systems and recent intrusions into several major U.S. newspapers, cybersecurity "seems like it is worth a timely presidential mention," Pescatore said. "He might say 'here' s what my administration is doing, I urge Congress to act.'"
It wouldn't be the first time Obama has urged action on cybersecurity.
Since the beginning of his first term, Obama, John Brennan, recently nominated by the president to be director of the CIA, and other administration officials have unsuccessfully called on Congress to pass cyber legislation.
Last week, James Langevin (D-RI), a member of the House Intellgence Committee and co founder of the bipartisan Congressional Cybersecurity Caucus, urged the president to use the State of the Union platform to demand immediate action from Congress .
In a letter to Obama, Langevin lamented the inadequacy of existing legislation to secure U.S assets in cyberspace and urged the president to use the address to "galvanize" Congress on the need to establish cybersecurity rules.
"While I trust that you will use every existing avenue of executive power to improve our capabilities in this realm, our current laws simply do not reflect the amazing technological advances (and the accompanying challenges) that have been made since their enactment," Langevin wrote.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- South Korea cyberattacks hold lessons for U.S.
- U.S. military networks not prepared for cyberthreats, report warns
- Return of CISPA: Cybersecurity boon or privacy threat?
- New report says cyberspying group linked to China's army
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts