Government Technology

President Obama Signs Executive Order on Cybersecurity



February 13, 2013 By

On Tuesday, Feb. 12, President Obama signed an executive order on cybersecurity -- an order that aims to increase cyber defenses of our nation's critical infrastructure, improve information sharing about cyberthreats between the public and private sectors, and establish a framework of cybersecurity best practices.

There has been talk of such an order since August 2012, following the Cybersecurity Act's failure to pass in Congress. Obama signaled he may invoke his power of executive order to pass similar legislation, and on Sept. 19, 2012, Homeland Security Secretary Janet Napolitano said the executive order on cybersecurity was “close to completion.”  

But it wasn't quite ready back then, and the White House worked on crafting the order for the last several months, The Hill reported

Then, during Obama's State of the Union address the evening of Feb. 12, he referenced the severity of cyberattacks. 

"We know hackers steal people’s identities and infiltrate private email. We know foreign countries and companies swipe our corporate secrets," Obama said during his address. "Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems."


View Full Story

| More

Comments

D reim    |    Commented February 13, 2013

This is absolute Bull***. No wonder congress didn't act on this, it's absolutely useless.

Thai Law Forum    |    Commented February 14, 2013

What’s worse – the President’s blatant disregard for the First Amendment and a free press, his violation of the separation of powers in bypassing Congress and signing the decree into law, or the privacy-attacking cyber security policy itself? Here's what we thought about the general lack of constitutionality in all of this: http://www.thailawforum.com/blog/obama-signs-unconstitutional-exec-order-on-cyber-security

Get Real    |    Commented February 14, 2013

The reason the president came up with this order is because Congress could not agree on a Cyber Security measure. If they could have pulled their heads out and come up with something he would not have to. Is it better to wait on them and get hacked or to have him get the ball rolling with something. Because my guess is, if he would have done nothing and a major department got hacked you would be all over him for doing nothing.

Tim    |    Commented March 27, 2013

Doesn't this fall staight back on Homeland Security, and what they are able to do? Would this just not be another "perk" for HS? I'm sorry who was it that started Homeland Security again? I don't agree with any of it, but if your gonna gripe about this, then gripe about that!!


Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Redefining Citizen Engagement in a Mobile-First World
Today’s consumers are embracing the ease and convenience of anytime, anywhere access to the Internet from their mobile devices. In order for government and public sector organizations to fully engage with their citizens and provide similar service quality as their consumer counterparts, the time is now to shift to mobile citizen engagement. Learn more
McAfee Enterprise Security Manager and Threat Intelligence Exchange
As a part of the Intel® Security product offering, McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight advanced threats. You get the situational awareness, actionable intelligence, and instantaneous speed to immediately identify, respond to, and proactively neutralize threats in just milliseconds.
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
View All

Featured Papers