Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews below.
Y2K offers lessons for cybersecurity
Monday - 9/20/2010, 12:38pm EDT
One such bill includes a provision to create a special cybersecurity committee, much like the one that tackled the Y2K bug more than a decade ago.
In Depth spoke with John Koskinen, former chairman of the Council on Year 2000 Conversion, to find out how his committee was set up and why it was successful.
While the changeover to the year 2000 presented a specific timeline and specific threats to computer systems, cybersecurity issues are not as well defined and present problems over the long-term, said Koskinen.
"Cybersecurity will be with us forever."
Despite the differences, Koskinen said there are Y2K lessons that can be applied to cybersecurity.
Partnership with private sector
An executive order signed by President Clinton established the Y2K Council in 1998.
The government's first step was to form partnerships with private sector industries from all segments of the economy. The biggest challenge, Koskinen said, was creating working groups in each of these sectors.
These working groups relied on companies to communicate and help each other rather than have the government give directives.
Instead of legislating a response to Y2K, the federal government acted as "a catalyst to organizing the industry response" and to "energize people's own self-interest," Koskinen said.
"We were able to create an image that everyone was in it together, nobody wanted to fail, and everybody had an interest in everybody else's success," Koskinen said.
Keep the public informed
To avoid public panic -- for example, people rushing to the bank to take out all their money -- the Y2K working groups provided updates to the public.
"At the same time we were trying to make sure we didn't have major system failures, we were also trying to make sure we didn't have a major overreaction by the public," Koskinen said.
Even as the Y2K preparation was in its early stages, it was still important to let the public know of the Council's progress, Koskinen said, adding that people ultimately were confident that the Y2K work would be completed in time.
Koskinen is the former deputy director for management at the Office of Management and Budget and former deputy mayor of Washington, D.C.
Jolie Lee is the author of this post. Email her at firstname.lastname@example.org.