Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
What's ahead for WH cybersecurity 'czar'
Wednesday - 6/24/2009, 7:04am EDT
In Federal IT circles, one of the most highly-awaited names is that of President Obama's nominee to be White House cybersecurity czar. Three experts with different perspectives on the job talked about it Wednesday at the National Press Club.
One of the most frequently mentioned name for the job of White House cybersecurity coordinator is a familiar name in Northern Virginia Politics.
Former congressman Tom Davis, now the director for Federal Government Affairs for Deloitte, appearing at yesterday's National Press Club discussion about cybersecurity sponsored by the Harris Corporation:
The good news for whoever is named cybersecurity czar is that they won't have to be Senate confirmed. So they don't have to worry about paying their taxes, and they can hit the ground running immediately. The real question is how much authority are they going to have? You have a lot of czars, a lot of competing interest within the government. What is your ability to deal with all the stovepipes that have been set up?
Dale Meyerrose, the former Chief Information Officer for the Intelligence Community, now a vice president of Cyber Programs for Harris Corporation, says the White House cybersecurity czar has three fundamental issues facing him or her:
First is, work on the authorities (i.e., responsibilities, etc.); Second, when you add a new position within the Executive branch, there has to be an accommodation of process. You have to get into the information flow. You have to get into meetings. Third, you need an agenda, something that works for you.
James Bamford, a noted author and journalist who has covered cybersecurity and the intelligence community, has issues with what he considers a vague White House proposal for a weak cybersecurity coordinator subservient to a military/intelligence dominated cybercommander.
What you have is a very powerful player in the cyberdomain, the director of NSA, against the fairly weakened cybersecurity coordinator. It presents quite a dilemma in terms of civil liberties.
While Davis is rumored to be in the running for the job, he tells FederalNewsRadio that after 29 years of service in Fairfax County and in Congress, he's happy to be out of government on what he calls his "hiatus". "You never say 'never' when it comes to service with me," he said, drawing laughter as he added, "I was lucky enough to leave Congress undefeated and unindicted, and sometimes, it's good to leave on top."
He is currently not seeking the job of White House cybersecurity czar.
On the Web:
FederalNewsRadio - Tom Davis: Defense acquisition keys to success
FederalNewsRadio - Administration shows renewed sense of cyber-urgency
Emptywheel blog - Why Tom Davis Shouldn't Be Obama's Cyberczar
(Copyright 2009 by FederalNewsRadio.com. All Rights Reserved.)