The Public Eye with Eric Chabrow

Janet Napolitano: The Cyber Czar? Part 2

Janet Napolitano: The Cyber Czar? Part 2

At the time, Napolitano was out front, championing administration cybersecurity policy while the White House remained relatively silent about the continued absence of a cybersecurity coordinator and the departure of Melissa Hathaway, the administration's acting senior director of cyberspace who authored the "60-day" report on federal cybersecurity posture.

Now, here's more fodder that could elevate Napolitano's influence in molding federal cybersecurity policy. Revisions made this summer to the U.S. Information and Communications Enhancement Act - pending legislation before the Senate Homeland Security and Governmental Affairs Committee - shifts much of the responsibility in developing federal government cybersecurity policy to the Department of Homeland Security from the White House Office of Management and Budget. Also, modifications to U.S. ICE - legislation aimed at updating the Federal Information Security Management Act that governs federal IT security - drops a provision to create a National Office of Cyberspace in the White House that appeared in the bill when it was introduced in April.

Are we seeing a pattern here to solidify DHS and not the White House as the preeminent leader in creating federal cybersecurity policy? 

Are we seeing a pattern here to solidify DHS and not the White House as the preeminent leader - at least on the civilian side - in creating federal cybersecurity policy?



About the Author

Eric Chabrow

Eric Chabrow

Host & Producer, ISMG Security Report; Executive Editor, GovInfoSecurity & InfoRiskToday

Chabrow hosts and produces the semi-weekly podcast ISMG Security Report and oversees ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.