Schmidt returns to the White House

Powered by SC Magazine
 

Howard Schmidt becomes cyber security coordinator.

Former White House cyber security advisor and president of the Information Security Forum Howard Schmidt has been chosen by the Obama administration to return to the White House in the new role of cyber security coordinator.

Schmidt, who was cyber security advisor to President Bush, is a well respected figure in the industry and will be a popular appointment. He has previously held roles as chief security officer at Microsoft and chief information security officer at eBay.

In recognition of the key role that information security plays in the modern state, Schmidt will have regular access to Obama and “serve as a key member of his National Security Staff”, according to John Brennan, assistant to the president for homeland security and counterterrorism.

“The very email you are reading underscores our dependence on information technologies in this digital age, which is why it seemed like a fitting way to announce that the President has chosen Howard Schmidt to be the White House Cybersecurity Coordinator,” wrote Brennan in a posting on the White House blog.

“Howard will have the important responsibility of orchestrating the many important cybersecurity activities across the government. He will also work closely with his economic team to ensure that our cybersecurity efforts keep the Nation secure and prosperous.”

Copyright ©v3.co.uk


Schmidt returns to the White House
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 327

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 136

Vote