Newsletters
Technology, Discovery & Innovation NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Computing Digital Life Discovery Space More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Computing
Average Rating:
Rate this article:  
Obama May Sign Cyber Security Executive Order
Obama May Sign Cyber Security Executive Order

By Jennifer LeClaire
November 16, 2012 10:43AM

Bookmark and Share
"Ideally, Congress would recognize and act on the threat we face as a nation when it comes to defending ourselves against cyberwar and cyberterrorism," said security expert Chris Petersen. "If signing an executive order does nothing other than help move cyber security spending up the stack of 2013 IT budgets, it will be a win for us all."
 


Cyber security reform died in the Senate once again. But President Obama may sign an executive order to push many of the changes through.

Senate Republicans, along with a few Democrats, killed the Cybersecurity Act of 2012 by blocking its introduction to the floor, despite national security officials urging passage of the bill. Senate Majority Leader Harry Reid said the bill is "dead for this Congress."

"A bill that was and is most important to national security was just killed, and that's cyber security," Reid said. "I hope President Obama uses all the authority of the executive branch at his disposal to fully protect our nation from the cyber security threat."

Opponents expressed concern about whether the government should impose cyber security mandates on private-sector infrastructure operators and whether the military or Department of Homeland Security should take the lead in civilian cyber security.

The Obama administration had previously drafted an executive order implementing many of the chaqnges, and the president seems poised to sign it.

"Congressional inaction in light of the risks to our nation may require the administration to issue an executive order as a precursor to the updated laws we need," said White House Cybersecurity Coordinator Michael Daniel. "We think the risk is too great for the administration not to act."

Cyber Threats Increasing

Chris Petersen, CTO of security analytics firm LogRhythm, told us it's unfortunate that the president needs to consider signing an executive order on cyber security.

"Ideally, Congress would recognize and act on the threat we face as a nation when it comes to defending ourselves against cyberwar and cyberterrorism," Petersen said. "These threats are real and will only increase in the years to come -- drastically and swiftly. If signing an executive order does nothing other than help move cyber security spending up the stack of 2013 IT budgets, it will be a win for us all."

There are real and valid concerns when it comes to cyber security legislation, Petersen said. One of the main concerns is additional compliance burdens on U.S. companies. While concerns are understandable, he said, the reality is that without a measuring stick companies won't know if they have gone far enough in protecting themselves.

Finding a Compromise

"Without enforcement, some companies will just kick the can down the road and hope for the best," Petersen said. "Hopefully the Chamber of Commerce and other opponents of legislation will find a compromise solution where requirements can be implemented that mandate the necessary cyber security improvements at a manageable cost."

Petersen noted that utilities and critical infrastructure industries in the United States are under constant cyber attack from nation states and other groups. It is no longer a matter of if power grids, telecommunications networks, chemical plants, water supplies and other critical infrastructure will be attacked, he said, but when will the next attack occur.

Petersen concluded: "Bolstering their IT security hardware, policies and procedures should be mandated because the stakes are too high and the damaging blow it could land to the citizens of this country and our economy is far too great to overlook any longer."
 

Tell Us What You Think
Comment:

Name:

beebop:

Posted: 2012-11-30 @ 1:16pm PT
does anyone not see the that the government is looking to invade even more of your space ? what a bunch of peepers. maybe i should be able to come to your house and peep around. you got nothing to hide right? thats the lame argument under the guise of national security.

Ed:

Posted: 2012-11-21 @ 1:31pm PT
I wish the article included the expected requirements.

michael mellin:

Posted: 2012-11-21 @ 12:20pm PT
God Bless Obama and his staff for being ready with long overdue remedies, no matter if not complete or fully timely. Congress is pathetic.

Mark:

Posted: 2012-11-21 @ 10:04am PT
Senate Republicans didn't kill this legislation - a bi-partisan group of Senators killed it. Don't blame the GOP.



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Computing
1.   FCC Defends Internet Traffic Proposal
2.   Fund Seeks To Head Off Heartbleeds
3.   Lessons from Verizon's Threat Report
4.   Net Gets Faster, But Easier to Attack
5.   Hortonworks, Concurrent To Partner


advertisement
Microsoft, BMC Targeting VMware
Deal simplifies cloud management.
Average Rating:
How Are Web Sites Post-Heartbleed?
Questions on open source, security.
Average Rating:
Heartbleed Exploit Could Cost Millions
But it could have been prevented.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tech Giants Fund Initiative To Prevent Future Heartbleeds
Can more funding prevent Heartbleed vulnerabilities in future open-source software? A new Core Infrastructure Initiative at the Linux Foundation is attempting to find out.
 
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 

Navigation
Sci-Tech Today
Home/Top News | Computing | Digital Life | Discovery | Space | Innovation | Health | Science News
Environment
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.