Obama seen likely to urge Congress to pass cybersecurity laws in State of the Union address
Nonetheless, the President is likely to issue an executive order Wednesday to implement for voluntary cybersecurity standards
Computerworld - President Obama could use tonight's State of the Union address to continue a push for new cybersecurity legislation, even as he's widely expected to issue an executive order Wednesday to impose rules aimed at protecting critical infrastructure targets, security experts say.
The long-expected executive order stems from what the White House has long said is the need for immediate action to protect critical assets against cyber threats because of Congress' continued failure to pass legislation.
The order would create a voluntary program calling for federal agencies and owners of critical infrastructure to adopt a set of minimum security standards and information sharing practices between government and the private sector.
Details of the executive order are expected to be disclosed tomorrow at a press conference hosted by the U.S. Department of Commerce.
The event, touted as announcing an update to the Obama Administration's Priorities for Cybersecurity Policy, will include remarks from several high-ranking officials, such as Rebecca Blank, deputy secretary of the U.S. Department of Commerce, Michael Daniel, special assistant to the President and White House cybersecurity coordinator, and General Keith Alexander, commander of the U.S. Cyber Command.
The timing of the event suggests that Obama will talk about cybersecurity matters in the State of the Union address, said John Pescatore, director of emerging security trends at the SANS Institute in Bethesda, Md.
With a widely reported hack of Federal Reserve systems and recent intrusions into several major U.S. newspapers, cybersecurity "seems like it is worth a timely presidential mention," Pescatore said. "He might say 'here' s what my administration is doing, I urge Congress to act.'"
It wouldn't be the first time Obama has urged action on cybersecurity.
Since the beginning of his first term, Obama, John Brennan, recently nominated by the president to be director of the CIA, and other administration officials have unsuccessfully called on Congress to pass cyber legislation.
Last week, James Langevin (D-RI), a member of the House Intellgence Committee and co founder of the bipartisan Congressional Cybersecurity Caucus, urged the president to use the State of the Union platform to demand immediate action from Congress .
In a letter to Obama, Langevin lamented the inadequacy of existing legislation to secure U.S assets in cyberspace and urged the president to use the address to "galvanize" Congress on the need to establish cybersecurity rules.
"While I trust that you will use every existing avenue of executive power to improve our capabilities in this realm, our current laws simply do not reflect the amazing technological advances (and the accompanying challenges) that have been made since their enactment," Langevin wrote.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- South Korea cyberattacks hold lessons for U.S.
- U.S. military networks not prepared for cyberthreats, report warns
- Return of CISPA: Cybersecurity boon or privacy threat?
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts