Credit goes to president Obama for his clear effort and the US government's strategy for protecting computer systems and Information assets. The role of the Cyber Czar is most likely to be, making sure that the already existing compliance standards are followed and adhered to, including the FISMA (Federal Information Security Management Act ) for the US federal government Information systems, also the HIPPA (Health Insurance Portability and Accountability Act), that requires a secure security posture for all the US health sector participants among others.
Mr. Howard Schmidt is a great choice for this post, and he has done well as president of the Information Security Forum (ISF), already some of the best practices of ISF are being picked up and incorporated by vendors into their IT security Compliance and Audit solutions. We too in Uganda need to think of what we need to do to put minimum requirements on protection of data and computer systems, the Computer Misuse Bill and the others, for example, I believe are taking long to be debated and acted upon. Thomas Bbosa (CISSP) BitWork Technologies (U) Ltd Plot 135, UMA show Grounds -Lugogo P.O.BOX 851, Kampala, Uganda Tel: +256-414-579099 Mob: +256-782480878 Fax: +256-414-289218 Website: <http://www.bitworktech.com/> http://www.bitworktech.com _____ From: Douglas Onyango [mailto:[email protected]] Sent: 22 December 2009 13:40 To: Linux Users Group Uganda Subject: Re: [LUG] White house CTO This is the cyber-czar, who takes care of only Security issues so think (CSO/ CISO) AFAIK, And herein is the problem that has caused many eligible candidates to turn down appraisal. Regards, Douglas Onyango +256(0712)981329 Life is the educators practical joke in which you spend the first half learning, and the second half learning that everything you learned in the first was wrong. --- On Tue, 12/22/09, Daniel Bwente <[email protected]> wrote: From: Daniel Bwente <[email protected]> Subject: Re: [LUG] White house CTO To: "Linux Users Group Uganda" <[email protected]> Date: Tuesday, December 22, 2009, 1:28 PM He has now been named, ironically his a former Bush Administration official and he formerly worked as chief security officer at Microsoft....Howard A. Schmidt. http://www.washingtonpost.com/wp-dyn/content/article/2009/12/21/AR2009122103 055.html On Tue, Nov 11, 2008 at 3:38 PM, Niles Collins <[email protected]> wrote: I see them as the same posts since most companies the CTO and CIO are the same person, I don't know where you would draw the line. I don't think that Bush every appointed anyone to that post, i am scowering the internet to see if he did. _______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. --------------------------------------- -- Dan +256-071-2-552035 "You won't have eyes tonight. You won't have ears or a tongue. you will wander the underworld blind, deaf and dumb and all the dead will know; This is Hector: the fool who thought he killed Achilles." -----Inline Attachment Follows----- _______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
_______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
