Government Technology

President Obama Signs Executive Order on Cybersecurity



February 13, 2013 By

On Tuesday, Feb. 12, President Obama signed an executive order on cybersecurity -- an order that aims to increase cyber defenses of our nation's critical infrastructure, improve information sharing about cyberthreats between the public and private sectors, and establish a framework of cybersecurity best practices.

There has been talk of such an order since August 2012, following the Cybersecurity Act's failure to pass in Congress. Obama signaled he may invoke his power of executive order to pass similar legislation, and on Sept. 19, 2012, Homeland Security Secretary Janet Napolitano said the executive order on cybersecurity was “close to completion.”  

But it wasn't quite ready back then, and the White House worked on crafting the order for the last several months, The Hill reported

Then, during Obama's State of the Union address the evening of Feb. 12, he referenced the severity of cyberattacks. 

"We know hackers steal people’s identities and infiltrate private email. We know foreign countries and companies swipe our corporate secrets," Obama said during his address. "Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems."


View Full Story

| More

Comments

D reim    |    Commented February 13, 2013

This is absolute Bull***. No wonder congress didn't act on this, it's absolutely useless.

Thai Law Forum    |    Commented February 14, 2013

What’s worse – the President’s blatant disregard for the First Amendment and a free press, his violation of the separation of powers in bypassing Congress and signing the decree into law, or the privacy-attacking cyber security policy itself? Here's what we thought about the general lack of constitutionality in all of this: http://www.thailawforum.com/blog/obama-signs-unconstitutional-exec-order-on-cyber-security

Get Real    |    Commented February 14, 2013

The reason the president came up with this order is because Congress could not agree on a Cyber Security measure. If they could have pulled their heads out and come up with something he would not have to. Is it better to wait on them and get hacked or to have him get the ball rolling with something. Because my guess is, if he would have done nothing and a major department got hacked you would be all over him for doing nothing.

Tim    |    Commented March 27, 2013

Doesn't this fall staight back on Homeland Security, and what they are able to do? Would this just not be another "perk" for HS? I'm sorry who was it that started Homeland Security again? I don't agree with any of it, but if your gonna gripe about this, then gripe about that!!


Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Meeting Constituents Where They Are With Dynamic, Real-Time Mobile Engagement
Leveraging the proven and open Kofax Mobile Capture Platform, organizations can rapidly integrate powerful mobile engagement solutions across the spectrum of mobile image capture, mobile data capture and complete mobile process integration. Kofax differentiates itself by extending capture to mobility, supporting multiple points of constituent engagement. Kofax solutions dynamically orchestrate the user’s mobile experience from a single platform—reducing time to market, improving process perf
Public Safety 2019
Motorola conducted an industry survey on the latest trends in public safety communications. The results provide an outlook of what technology is in store for your agency in the next five years. Download the results to gain this valuable insight.
Improving Emergency Response with Digital Communications
Saginaw County, Mich., increases interoperability, communication and collaboration with a digital voice and data network, as well as modern computer-aided dispatch.
View All

Featured Papers