[Infowarrior] - Panel employs full-court press for cybersecurity
Richard Forno
rforno at infowarrior.org
Tue Feb 10 23:12:40 UTC 2009
Panel employs full-court press for cybersecurity
• By William Jackson
• Feb 09, 2009
• http://gcn.com/articles/2009/02/09/cyber-commission-full-court-press.aspx
An expert commission plans to continue its effort to see
recommendations for cybersecurity implemented governmentwide
Members of the panel that offered the Obama administration a blueprint
for improving the nation's cybersecurity say they want to have a voice
in shaping the government's information technology policy.
In its December 2008 report, the Commission on Cyber Security for the
44th Presidency concluded that the nation's cyber infrastructure is
too fragile and too critical to be trusted to individual agencies, and
protecting that infrastructure requires a comprehensive strategy
directed by the White House.
In a recent statement, the Center for Strategic and International
Studies (CSIS), which established the commission, said, "The new
administration has cybersecurity high on its agenda, and it is making
a serious effort to take what has already been done and improve our
national cyber posture. But there is much to be done. Building
cybersecurity will be a long-term effort."
Some panel members want to continue the dialog with government
officials through an ongoing series of meetings. Denise Zheng, program
coordinator and research assistant for technology and public policy at
CSIS, said that although the program's details are still being
discussed, the members envision continuing the public format in which
the commission developed its report.
CSIS established the commission in 2007 in response to the growing
challenges to government information systems. Its goal was to produce
concrete recommendations that the new administration could implement
quickly. The commission's co-chairmen were Rep. Jim Langevin (D-R.I.),
then chairman of the House Homeland Security Committee's Emerging
Threats, Cybersecurity, and Science and Technology Subcommittee; Rep.
Michael McCaul (R-Texas), the subcommittee's former ranking member;
retired Air Force Lt. Gen. Harry Raduege, chairman of the Deloitte
Center for Network Innovation at Deloitte and Touche; and Scott
Charney, corporate vice president of Microsoft's Trustworthy Computing
Group. The commission also included 50 other members from government,
industry and academia. James Lewis, director of technology and public
policy at CSIS, served as project director.
The commission held 19 briefings to gather data in the past year. Its
primary findings were that cybersecurity is a major national security
issue, but that in addressing it, the government must respect privacy
and civil liberties concerns.
"Only a comprehensive national security strategy that embraces both
the domestic and international aspects of cybersecurity will improve
the situation," the commission members wrote in their report.
They recommended that the Homeland Security Department and the Office
of Management and Budget, which took the lead on cybersecurity during
the Bush administration, maintain their operational responsibilities.
Meanwhile, a new National Office for Cyberspace and a new
cybersecurity directorate at the National Security Council would take
the overall lead on cybersecurity. The commission also recommended
that the government build on President Bush's Comprehensive National
Cyber Security Initiative.
"While the CNCI is not comprehensive and unnecessary secrecy reduced
its effect, we believe it is a good place to start," the commissioners
wrote in their report.
Among the topics panel members hope to discuss with government
officials:
• Provisions for cybersecurity in the stimulus package Congress is
now considering.
• Executive branch leadership on the issue.
• Legislation that addresses the security of government systems,
including reform of the Federal Information Security Management Act.
• Review of law enforcement and investigative authorities related to
cybersecurity.
• A six-month report card on the government's efforts to secure
cyberspace.
• Federal IT acquisition policies.
• International standards and initiatives.
• Classification of cyber initiatives.
• Building an enduring security framework and public/private
partnerships.
More information about the Infowarrior
mailing list