Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Government

GOP to Obama: No Executive Order for Cyber-Security

A group of Republican Senators warned President Obama against proceeding with an executive order to establish cyber-security protections for critical infrastructure.

A group of Republican Senators warned President Obama against proceeding with an executive order to establish cyber-security protections for critical infrastructure.

An issue as far-reaching and complicated as cyber-security needs to have stakeholders committed to working together, six Republican Senators wrote in a letter to the president on Oct. 2. The letter was in response to recent statements by White House officials and Democratic legislators about issuing an executive order to protect the country’s critical infrastructure from cyber-attacks.

Senators Dan Coats (R-Ind), Saxby Chambliss (R-Ga), John McCain (R-Ariz), Jon Kyl (R-Ariz), Kay Bailey Hutchison (R-Tex), and Roy Blunt (R-MO), signed the letter to the president.

“Rather than build confidence and unity among key stakeholders, an executive order will solidify the present divide,” the legislators wrote.

Several cyber-security-related bills circulated through the House of Representatives and Senate over the past year. The bills covered a wide range of areas, including data breach notification, online privacy, and piracy. The comprehensive legislation backed by the White House, Cybersecurity Act of 2012, contained provisions of how the federal government would protect the nation’s critical infrastructure such as electric grids and water supply.

Nearly all Republican Senators and a handful of Democrats blocked a vote on the Cybersecurity Act in August, effectively stalling the bill. Coats, Chambliss, McCain, Kyl, Hutchison, and Blunt all had backed the alternative cyber-security bill, SECURE IT Act, which had also failed to gather enough support to reach the Senate floor for a vote. There are many who believe Congress would pick up the cyber-security issue after the November elections.

“Am I disappointed that we’re not there? Sure,” Debora Plunkett, head, of the National Security Agency, told attendees at last month’s cyber-security forum at Polytechnic University of New York University, before adding, “I predict we’re going to have legislation. It will happen.”

One of the key areas of disagreement for the Cybersecurity Act of 2012 among the legislators centered on provisions establishing voluntary IT security standards. The bill originally called for government regulation of critical infrastructure owners, and was later modified the bill to propose a process in which the government would collaborate with the private sector to develop best practices that the infrastructure owners could voluntarily adopt.

Advertisement. Scroll to continue reading.

Most Republicans opposed voluntary standards, claiming it would eventually lead to mandatory regulations.

Several Senators, including the Cybersecurity Act’s sponsors Sen. Joseph Lieberman (I-Conn) and Dianne Feinstein (D-Calif) have recently urged Obama to issue an executive order addressing some of the cyber-security issues. The order would define voluntary standards and establish the information-sharing program between the government and private sector, but would not be able to provide legal protections to encourage that information sharing.

“The gravity of this threat requires a genuine bipartisan effort to advance legislation, not a selective and unilateral executive order, which simply cannot provide the incentives to encourage private sector participation and the requisite information sharing to address evolving threats,” said the letter.

The Republican Senators were committed to the legislative process and urged the president to continue working with Congress to come up with a legislative solution rather than issue an executive order.

“We share the concerns expressed by you and many members of Congress regarding the danger of cyberattacks against the U.S. government and national critical infrastructure,” the letter said.

Despite the difficulty getting any kind of consensus in the Senate, the legislative process was the only way to” create the durable and collaborative public-private partnership” necessary to enhance cyber-security, the senators warned in the letter.

“While the Senate has yet to reach an agreement on the best way to enhance cybersecurity, we firmly agree on the need to maintain congressional prerogative when dealing with broad and challenging issues like cybersecurity,” the letter said.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...