Government Technology

Melissa Hathaway to be Named Obama's Top Cyber-Security Official



February 9, 2009 By

President Barack Obama is expected to announce today the appointment of Melissa Hathaway to a position within his administration to spearhead cyber-security and lead a review of the federal government's actions to safeguard networks against malicious infiltration, according to government officials.

Earlier today, The Wall Street Journal reported that Hathaway, a former consultant at Booz Allen Hamilton, a strategy and consulting technology firm, previously assisted the Bush administration in creating the Comprehensive National Cyber Security Initiative.

Melissa Hathaway to Review Bush Policies

The five-year, $30 billion initiative is intended to reduce and consolidate thousands of federal network connections while developing a faster process for detecting suspicious behavior on global networks.

Hathaway will complete a 60-day review of the Bush initiative and recommend where the country should go from there.

In July 2008, Obama promised Americans during his campaign that he would name a national adviser for United States IT security if he became president. "We need to prevent terrorists or spies from hacking into our national security networks. We need to build the capacity to identify, isolate and respond to any cyber-attack. And we need to develop new standards for the cyber-security that protects our most important infrastructure -- from electrical grids to sewage systems; from air traffic control to our markets," he said in a July 16, 2008, speech in Indiana, the text of which is available at www.barackobama.com.

The appointment of Hathaway appears to be his first significant step toward making good on this promise. In the Obama administration, she will be a senior director in the National Security Council.

 

Read Security Expert: Fight Cyber-Crime Through Procurement

Video: Watch Staff Writer Hilton Collins show us how vulnerability is written into code.


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
View All

Featured Papers