In an article written by David Jackson and posted on the USA TODAY website, you can see more details of the White House proposed cybersecurity plan which the Obama team claims will protect personal privacy along with the nation’s computer infrastructure.

A referenced statement released by the White House stated, “The cybersecurity vulnerabilities in our government and critical infrastructure are a risk to national security, public safety and economic prosperity. The administration has responded to Congress’ call for input on the cybersecurity legislation that our nation needs, and we look forward to engaging with Congress as they move forward on this issue.”

Click here to see some of the details of this U.S. National Cybersecurity Plan that Mr. Jackson outlines in his article.

From another perspective, written in an article by Gautham Nagesh, and posted on The Hill’s Technology Blog website, this announcement is significant in two ways: (1) the report omitted any talk of a “kill switch” for the Internet, and (2) no previous administration had ever released legislative guidance on cybersecurity, which has become a pressing issue now that computer networks have become an essential part of most industries, including transportation and communication.

Click here to read more about Mr. Nagesh’s perspective on this announcement.

In yet another perspective on this announcement, in an article posted on the InfoSecurity website, you can read more about the provision in this proposal that shifts FISMA implementation responsibility away from the Office of Management and Budget (OMB) and the National Institute for Standards and Technology (NIST) to the Department of Homeland Security (DHS).

Given the integration of need and importance of dealing with this critical issue of cyber security on a national basis, along with the impact such a national plan would have on so many organizations and individuals, this report and ongoing developments of this process of working through final approval is great resource material for those information security and risk management teams in your organization.

Photo courtesy of

Pin It on Pinterest