Trump Eliminates Top Cybersecurity Post

The White House has decided to get rid of its top cyber policy adviser role, eliminating the policy position that aimed to help streamline the government's overall approach to cybersecurity policy across federal agencies.

“The National Security Council’s cyber office already has two very capable Senior Directors. Moving forward, these Senior Directors will coordinate cyber matters and policy. As they sit six feet apart from one another, they will be able to coordinate in real time," said Robert Palladino, a spokesman for the National Security Council in a statement on Tuesday 15th May.

"Today’s actions continue an effort to empower National Security Council Senior Directors. Streamlining management will improve efficiency, reduce bureaucracy and increase accountability."

“The role of cyber coordinator will end,” Christine Samuelian, an aide to newly appointed national secuity advisor  John Bolton, reportedly said in the email to NSC staffers. Citing a quote from Alexander Hamilton in Federalist No. 70, Samuelian said "eliminating another layer of bureaucracy delivers greater ‘decision, activity, secrecy and dispatch.’”

Rob Joyce, the latest official to hold this position, left recently in early May, joining a handful of other national security officials who have left the White House. Joyce was on detail to the White House from the NSA, where he previously led an elite hacking group known as the Tailored Access Operations Unit. He announced he would return to NSA last month.

"Rob Joyce, a career federal employee detailed to the National Security Council, has conveyed his intent to return to his home agency, the National Security Agency," White House press secretary Sarah Huckabee Sanders said in a statement. Tom Bossert, who served as Trump's top homeland security aide, also resigned earlier this month. He had been the one to announce just last year that Joyce would be joining the counsel as its cybersecurity coordinator.

The departures of both Bossert and Joyce spurred concerns about the road ahead for the White House’s cyber policy-making efforts.

“Certainly, there’s no question that between Bossert’s departure and Rob’s departure that it’s going to slow down policy development work and cause disruption,” Michael Daniel, who served as cybersecurity coordinator under the Obama administration, said last month.

The report that the White House eliminated the cyber role triggered immediate blowback from Democrats on Capitol Hill.
“With cyber threats ever-changing and growing more sophisticated by the day, there is no logical reason to eliminate this senior position and reduce the already degraded level of cyber expertise at the White House,” said a Democrat part spokesman. The White House did not respond to a request for comment. 

The Hill

You Might Also Read: 

US Spy Chiefs Look For UK Guidance On Cybersecurity:

Donald Trump Doesn’t Understand Cyberwar:

 


 

 

« The Swiss Bank Where Robots Replace Employees
Hacking The Vote »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Code42

Code42

Code42 CrashPlan, is an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

ATIS Systems

ATIS Systems

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

CYRail

CYRail

CYRail project will analyse threats targeting Railway infrastructures and develop innovative attack detection and alerting techniques.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

Vortacity Cyber

Vortacity Cyber

Vortacity is a boutique cybersecurity provider specializing in associations, nonprofits, and mission-based organizations.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.

Straiker

Straiker

Straiker's AI-native security platform is designed to protect enterprise AI applications and autonomous agents from evolving threats through automated assessment and runtime guardrails.