Trump Eliminates Top Cybersecurity Post

The White House has decided to get rid of its top cyber policy adviser role, eliminating the policy position that aimed to help streamline the government's overall approach to cybersecurity policy across federal agencies.

“The National Security Council’s cyber office already has two very capable Senior Directors. Moving forward, these Senior Directors will coordinate cyber matters and policy. As they sit six feet apart from one another, they will be able to coordinate in real time," said Robert Palladino, a spokesman for the National Security Council in a statement on Tuesday 15th May.

"Today’s actions continue an effort to empower National Security Council Senior Directors. Streamlining management will improve efficiency, reduce bureaucracy and increase accountability."

“The role of cyber coordinator will end,” Christine Samuelian, an aide to newly appointed national secuity advisor  John Bolton, reportedly said in the email to NSC staffers. Citing a quote from Alexander Hamilton in Federalist No. 70, Samuelian said "eliminating another layer of bureaucracy delivers greater ‘decision, activity, secrecy and dispatch.’”

Rob Joyce, the latest official to hold this position, left recently in early May, joining a handful of other national security officials who have left the White House. Joyce was on detail to the White House from the NSA, where he previously led an elite hacking group known as the Tailored Access Operations Unit. He announced he would return to NSA last month.

"Rob Joyce, a career federal employee detailed to the National Security Council, has conveyed his intent to return to his home agency, the National Security Agency," White House press secretary Sarah Huckabee Sanders said in a statement. Tom Bossert, who served as Trump's top homeland security aide, also resigned earlier this month. He had been the one to announce just last year that Joyce would be joining the counsel as its cybersecurity coordinator.

The departures of both Bossert and Joyce spurred concerns about the road ahead for the White House’s cyber policy-making efforts.

“Certainly, there’s no question that between Bossert’s departure and Rob’s departure that it’s going to slow down policy development work and cause disruption,” Michael Daniel, who served as cybersecurity coordinator under the Obama administration, said last month.

The report that the White House eliminated the cyber role triggered immediate blowback from Democrats on Capitol Hill.
“With cyber threats ever-changing and growing more sophisticated by the day, there is no logical reason to eliminate this senior position and reduce the already degraded level of cyber expertise at the White House,” said a Democrat part spokesman. The White House did not respond to a request for comment. 

The Hill

You Might Also Read: 

US Spy Chiefs Look For UK Guidance On Cybersecurity:

Donald Trump Doesn’t Understand Cyberwar:

 


 

 

« The Swiss Bank Where Robots Replace Employees
Hacking The Vote »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Lares Consulting

Lares Consulting

Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing and coaching.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

Google Cloud

Google Cloud

Accelerate your digital transformation. Whether your business is early in its journey or well on its way to digital transformation, Google Cloud can help solve your toughest challenges.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.

SOCRadar

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI).