In cybersecurity, everyone’s a critic

After Melissa Hathaway's departure, what's next for the cybersecurity-coordinator position?

Some news stories are like modern art: They spark endless discussion, interpretation and explanation — but very little agreement.

Such was the case last week when Melissa Hathaway, who was believed to be a leading candidate to serve as the Obama administration’s cybersecurity coordinator, announced she was no longer interested in the job.

According to a report by the Washington Post's Ellen Nakashima, Hathaway withdrew her application because she was frustrated by the delay in appointment.

This story generated a lot of coverage, no doubt because President Barack Obama himself had announced plans to create this position and promised to take a role in making the appointment.

But the sources quoted by the various news outlets could not agree on why Hathaway did not get the job and, more important, why the position remains unfilled.

The simplest explanation is politics as usual. According to a source quoted by the Washington Post, Hathaway “had ‘the sense that this was very political, that she has been too closely tied to the Bush administration.’"

But other observers say the political dimension is more nuanced than that.

“The hunt for a cyber czar has been fraught with problems, as the administration seeks someone with the requisite political and technological skills and a reputation strong enough to command respect from Silicon Valley to Capitol Hill,” according to the AP’s Lolita Baldor.

So perhaps Hathaway simply was not enough of a political heavyweight, whatever her technical qualifications.

One former technology policy adviser in the Bush administration described it as an “almost superhuman” position, Baldor writes.

Well, yes and no.

It might take a superhero to win approval from all the various stakeholders, but the job involves little power, as some experts see it.

"The position as set up is designed more for bureaucracy and empire building, not driving change for the better of cybersecurity," John Pescatore, an analyst at Stamford, Conn.-based Gartner, told Computerworld’s Jaikumar Vijayan. "It really does need someone who is more interested in the political and visibility aspects, not the heavy lifting" required for better security.

One problem, several experts agree, is that the cybersecurity coordinator will not report to the president but to both the National Security Council and National Economic Council.

In an interview with Computerworld, Alan Paller, director of research at the SANS Institute, speculated that the councils’ leaders do not plan to vest the cybersecurity coordinator with too much authority.

The national security adviser, on the one hand, does not believe cybersecurity is as important as other threats, such as nuclear technology, while the national economic adviser might fear that overly aggressive cybersecurity policies could hurt economic growth, Paller said.

So what does it all mean?

Forget the nuances: Sen. Susan Collins (R-Maine) sees it all in black and white, according to the New York Times.

Collins, “who has worked closely with the Democratic president on many issues, blasted Hathaway’s departure as a sign of the Obama administration's lack of leadership in cybersecurity,” according to the Times.

The Obama administration, likewise, is not interested in deconstructing last week’s events.

Rather than counter all the speculation and criticism, a White House spokesman painted a simple picture, assuring numerous reporters that cybersecurity remains a major priority for Obama and that a “rigorous selection process is well under way.”

And so the show goes.

About the Author

John Monroe is Senior Events Editor for the 1105 Public Sector Media Group, where he is responsible for overseeing the development of content for print and online content, as well as events. John has more than 20 years of experience covering the information technology field. Most recently he served as Editor-in-Chief of Federal Computer Week. Previously, he served as editor of three sister publications:, which covered the state and local government IT market, Government Health IT, and Defense Systems.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Tue, Aug 11, 2009 John Crestview, FL

Appoint SHON HARRIS...

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group