Speculation, Rumors and Whispers - Who could become the Cyber Tsar
Got to thinking about all of the speculation, rumors and whispers, circulating around Washington DC tonight about who is on the short list with Tsar-like skills.
First, disregard all of the qualifications, in-depth security knowledge etc. that are on the typical everyday run of the mill Tsar Job Postings.
Think about alternative candidates that have additional supplemental income to take the sting out of that capitated $150K pay grade. Perhaps someone retired from the military, perhaps someone who has retained top level security clearance while in the private sector. Perhaps someone with experience dealing with huge software suppliers and with experience in Government Relations and Federal
Programs with companies located in Washington State. And certainly someone with former responsibility for sales, business development, and the capture/proposal process for public sector opportunities. Consider also, someone with experience developing a company's Network Centric Systems, for Military Integration and Transformation. After all of those additional qualifications, perhaps someone currently in the private sector with very close government ties.
Add all of those ingredients together, stir and filter. One name comes to pops to the top of the list. Wonder if Retired U.S. Navy Rear Admiral Robert C. "Willie" Williamson is considering his time with Raytheon might be limited. That is just my personal opinion and random thinking.
Technorati Tags:
2009,
access,
best practices,
bypass,
compliance,
computer,
confidential,
consumer product liability,
control,
Costs,
criminal,
cyber security,
cyber-crime,
cybersecurity,
D and O liability,
Data,
DHS,
due diligence,
Economy,
electronic database,
Finance,
Financial,
Financial Identity,
Financial InfoSec,
governance,
Government,
hackers,
Hathaway 60-Day Report,
Infoduciary,
Infofiduciary,
Information,
Information Fiduciary,
Information-Security-Resources.com,
InfoSec,
infrastructure,
Internet Security Alliance,
Intrusion Detection Engines,
ISR,
Kevin M. Nixon,
Larry Carter,
law,
legal,
liability,
malware,
management,
Melissa Hathaway,
misuse,
national security,
News,
NSC,
Obama,
outsourcing,
press release,
privacy rights,
protocol,
regulations,
regulatory,
risk,
Security,
Security Our Digital Future,
Senate,
software,
System,
systems,
testimony,
third party,
USSS,
v,
valuation,
vendors,
White House,
zero day attack del.icio.us Tags:
2009,
access,
best practices,
bypass,
compliance,
computer,
confidential,
consumer product liability,
control,
Costs,
criminal,
cyber security,
cyber-crime,
cybersecurity,
D and O liability,
Data,
DHS,
due diligence,
Economy,
electronic database,
Finance,
Financial,
Financial Identity,
Financial InfoSec,
governance,
Government,
hackers,
Hathaway 60-Day Report,
Infoduciary,
Infofiduciary,
Information,
Information Fiduciary,
Information-Security-Resources.com,
InfoSec,
infrastructure,
Internet Security Alliance,
Intrusion Detection Engines,
ISR,
Kevin M. Nixon,
Larry Carter,
law,
legal,
liability,
malware,
management,
Melissa Hathaway,
misuse,
national security,
News,
NSC,
Obama,
outsourcing,
press release,
privacy rights,
protocol,
regulations,
regulatory,
risk,
Security,
Security Our Digital Future,
Senate,
software,
System,
systems,
testimony,
third party,
USSS,
v,
valuation,
vendors,
White House,
zero day attack IceRocket Tags:
2009,
access,
best practices,
bypass,
compliance,
computer,
confidential,
consumer product liability,
control,
Costs,
criminal,
cyber security,
cyber-crime,
cybersecurity,
D and O liability,
Data,
DHS,
due diligence,
Economy,
electronic database,
Finance,
Financial,
Financial Identity,
Financial InfoSec,
governance,
Government,
hackers,
Hathaway 60-Day Report,
Infoduciary,
Infofiduciary,
Information,
Information Fiduciary,
Information-Security-Resources.com,
InfoSec,
infrastructure,
Internet Security Alliance,
Intrusion Detection Engines,
ISR,
Kevin M. Nixon,
Larry Carter,
law,
legal,
liability,
malware,
management,
Melissa Hathaway,
misuse,
national security,
News,
NSC,
Obama,
outsourcing,
press release,
privacy rights,
protocol,
regulations,
regulatory,
risk,
Security,
Security Our Digital Future,
Senate,
software,
System,
systems,
testimony,
third party,
USSS,
v,
valuation,
vendors,
White House,
zero day attack BuzzNet Tags:
2009,
access,
best practices,
bypass,
compliance,
computer,
confidential,
consumer product liability,
control,
Costs,
criminal,
cyber security,
cyber-crime,
cybersecurity,
D and O liability,
Data,
DHS,
due diligence,
Economy,
electronic database,
Finance,
Financial,
Financial Identity,
Financial InfoSec,
governance,
Government,
hackers,
Hathaway 60-Day Report,
Infoduciary,
Infofiduciary,
Information,
Information Fiduciary,
Information-Security-Resources.com,
InfoSec,
infrastructure,
Internet Security Alliance,
Intrusion Detection Engines,
ISR,
Kevin M. Nixon,
Larry Carter,
law,
legal,
liability,
malware,
management,
Melissa Hathaway,
misuse,
national security,
News,
NSC,
Obama,
outsourcing,
press release,
privacy rights,
protocol,
regulations,
regulatory,
risk,
Security,
Security Our Digital Future,
Senate,
software,
System,
systems,
testimony,
third party,
USSS,
v,
valuation,
vendors,
White House,
zero day attack
No comments:
Post a Comment