A misnomer among some is that the federal Chief Information Officer Council is headed by the federal CIO.
According to the E-Government Act of 2002, the CIO technically the administrator of e-government and information technology serves as director of the CIO Council. But the top slot, chairman, goes to the deputy...
Information Security is among the top priorities for departmental and agency chief information officers, and no one knows that better than Navy CIO Robert Carey, who carries the double duty of co-chairing the federal CIO Council's Committee on Information Security and Identity Management.
In this first of two parts...
Navy CIO Robert Carey was among the first federal CIOs to embrace blogging as a way to keep in touch with his various constituencies, including officers and sailors. Carey believes steps can be taken to embrace new technologies while maintaining security.
In this second of two parts of an exclusive interview,...
Vivek Kundra hasn't been seen much in public since President Obama named him as the nation's first chief information officer in early March, but he's been busy working behind the scenes guiding the administration's IT agenda with agency and departmental CIOs and other government officials, says Navy CIO Robert Carey.
The Obama administration is getting set to sell its forthcoming cybersecurity initiative to the American public even before it's formalized.
The White House revealed Tuesday that Melissa Hathaway, acting senior director for cyberspace at the National Security and Homeland Security Councils, will speak before the...
A bill to establish a cabinet-level chief technology officer in the White House has been introduced by a northern Virginia congressman.
In a letter to colleagues seeking cosponsors for the measure, Rep. Gerald Connolly, D.-Va., says the legislation follows through on a campaign pledge by President Obama to...
With the launch of GovInfoSecurity.com comes the launch of my blog, The Public Eye.
First, a brief biography. I've been a journalist for too long. In my first job I used a manual typewriter and had a pair of sharp scissors and a paste pot on my desk.
Future federal cybersecurity policy will originate in the White House, but the Obama administration has yet to decide whether the so-called cybersecurity czar will report directly to the President or to his national security advisor, according to two lawmakers briefed Thursday by Melissa Hathaway, the top...
Responding, in part, to federal IT security requirements, the National Association of State CIOs on Thursday issued a brief entitled Desperately Seeking Security Frameworks A Roadmap for State CIOs .
The time is ripe to create a fourth branch of the military a cyber-warfare branch.
So conclude two Army officers. The existing cultures of the Army, Navy and Air Force are fundamentally incompatible to adequately defend against cyber attacks, argue Lt. Col. Gregory Conti and Col. John "Buck" Surdu, in an article...
The commission that produced the report Cybersecurity for the 44th Presidency may not disband, but instead continue to provide advice to the Obama administration and others willing to listen.
Citing the popular response the 96-page report has received since its release in December, commission co-chairman Harry...
The Influencers is a continuing series of profiles of the people who shape federal government information security and privacy policy.
Robert Carey
Chief Information Office, Department of Navy
Why He's an Influencer
Carey co-chairs the Federal CIO Council's Committee...
A Senate bill to establish an office of cybersecurity in the White House is in the works.
The legislation, sponsored by Sens. Jay Rockefeller of West Virginia and Olympia Snowe of Maine, would establish a permanent cybersecurity official who would report directly to the President.
A single undercover investigator used fraudulent documents to obtain four valid passports from the State Department last year, the Government Accountability Office revealed Monday.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.