"We are trying to be that center of excellence for cybersecurity, not only for the federal government, but for the nation, as a whole," says Randy Vickers, director of the United States Computer Emergency Readiness Team.
"Our efforts to gain access to information are hampered because the Bureau of Consular Affairs is not considered a law enforcement entity for information sharing purposes," Deputy Assistant Secretary of State Brenda Sprague says.
"Let's be blunt - because the Internet was initially designed for convenience and reliability, instead of with security as a top priority - we are fighting an uphill battle," says Commerce Secretary Gary Locke.
Bobbie Stempfley says her predecessors established a strong foundation to foster cybersecurity collaboration across the government; it's her mission to get it done.
New York CISO William Pelgrin says the cybersecurity and homeland security offices have been actively collaborating for years, contending: "We really can't separate out any longer the physical side from the cyber side of the house."
Navy Chief Information Office Robert Carey will be moving to another senior position within the department by the end of the summer. Navy Undersecretary Robert Work asked him to take on new responsibilities, which have yet to be defined.
Besides sharing best infosec practices, the taskforce proposed in the latest cybersecurity bill would recommend qualifications needed to be a federal government chief information security officer.
FISMA didn't even mention a chief information security officer when enacted eight years ago. Now, a newly passed House bill delineates five specific responsibilities for departmental and agency CISOs.
"The potential for sabotage and destruction is now possible and something we must treat very seriously," says Army Gen. Keith Alexander, military commander and NSA director.
"Operators of critical infrastructure could opt-in to a government-sponsored security regime," Deputy Secretary William Lynn III says. "Individual users who do not want to enroll could stay in the wild wild West of the unprotected Internet."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.