Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Howard Schmidt
From Capitol Hill, most, but not all, lawmakers have generally good reviews for President Obama's pick to be cybersecurity coordinator.
Van Hitch will retire as the Justice Department's CIO at the end of July. He said cybersecurity, information sharing and social media and mobile computing were among the biggest technology transformations he saw.
July 21, 2011
House lawmakers want to add the requirement for a White House official to oversee cybersecurty policy and budget across civilian agencies. Rep. Langevin said the current set up with DHS in charge of civilian networks isn't good enough. Members also want more attention paid to the security of the supply chain.
Tags: technology , management , Greg Schaffer , Jim Langevin , Jason Chaffetz , Elijah Cummings , DHS , White House , House Oversight and Government Reform Committee , cybersecurity , supply chain security , FISMA , Jason Miller
The White House cybersecurity advisor said many of his office's initiatives are in the operational stages and are making a difference. But some in industry and government say there is a vacuum in leadership from his office and OMB. Howard Schmidt says it's clear what role his office, OMB and DHS play.
White House strategy gives the Commerce Department bureau the ability to bring industry, privacy, security and other experts together to develop policies and standards. The administration made it clear the private sector will lead the effort and the government is only creating a marketplace for these services.
Internet attacks from hackers, spies and terrorist groups deserves serious attention, says Howard Schmidt, but this should not be "to the extent of mass hysteria".
The National Strategy for Trusted Identities in Cyberspace has come under fire due to the possible government overreach and added bureaucracy.
An internet ID for Americans would be different from a national ID card... or would it?