{"id":183372,"date":"2017-03-17T06:57:04","date_gmt":"2017-03-17T10:57:04","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-vet-rob-joyce-to-lead-cyber-at-white-house-fcw-com\/"},"modified":"2017-03-17T06:57:04","modified_gmt":"2017-03-17T10:57:04","slug":"nsa-vet-rob-joyce-to-lead-cyber-at-white-house-fcw-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-vet-rob-joyce-to-lead-cyber-at-white-house-fcw-com\/","title":{"rendered":"NSA vet Rob Joyce to lead cyber at White House &#8211; FCW.com"},"content":{"rendered":"<p><p>    White House  <\/p>\n<p>      The NSA's onetime top hacker is going to work in the White      House.    <\/p>\n<p>    Rob Joyce, who once ran the National Security Agency's office    of Tailored Access Operations -- the hacking division -- is    taking on the role of White House cybersecurity coordinator.  <\/p>\n<p>    Tom Bossert, President Trump's homeland security advisor, told    the audience at a Center for Strategic and International    Studies event on March 15 that Joyce is officially taking the    position last held by Michael Daniel during the Obama    administration.  <\/p>\n<p>    Daniel praised Joyce and the Trump administration for selecting    him, saying he is a strong pick and that Joyce will make an    excellent cybersecurity coordinator.  <\/p>\n<p>    \"He has long experience in the cyber realm, knows the    interagency process very well, and has proven himself as a    leader at NSA,\" Daniel told FCW.  <\/p>\n<p>    Daniel stressed that Joyce is well versed in both offensive and    defensive cyber, having worked both in the TAO as well as the    former Information Assurance Directorate, which was focused on    protecting U.S. systems and networks from cyberthreats.  <\/p>\n<p>    Joyce worked with Curt Dukes, who is former head of the now    defunct Information Assurance Directorate.  <\/p>\n<p>    \"He brings instant credibility to the position,\" said Dukes who    also stressed Joyce's knowledge of cyber offense and defense.  <\/p>\n<p>    \"Two things I think he should prioritize out of the gate,\"    Dukes added, \"review of the administration's insider threat    program and review of the vulnerability equity process.\"  <\/p>\n<p>    Both of those topics came into the spotlight with the WikiLeaks    Vault 7 release of CIA hacking data. It is believed that the    information was provided to WikiLeaks by an insider, and the    release exposed the extent to which the CIA has hoarded    zero-day vulnerabilities, which many believe should be    disclosed to vendors and the public to increase cybersecurity.  <\/p>\n<p>    Daniel said that Joyce should focus on \"raising the level of    cybersecurity across the entire ecosystem, better integrating    cyber capabilities into our foreign policy [and] national    security tool set, and improving incident response capabilities    will be necessities.\"  <\/p>\n<p>    Daniel said that on the defensive side Joyce should focus on    boosting the security of federal civilian networks.  <\/p>\n<p>    While Joyce is receiving high praise from current and former    government officials, the question is whether the tech sector    will warm to a former NSA hacking chief as the new White House    cybersecurity advisor.  <\/p>\n<p>    In the wake of the Edward Snowden leaks about NSA surveillance    programs, many in industry became more wary about the NSA and    even questioned the information assurance mission and guidance.  <\/p>\n<p>    Amit Yoran, CEO of Tenable said in a press statement that he    feels Joyce has the respect of the security industry. \"I'm    confident in his ability to work both within the government and    with the private sector to improve national cybersecurity,\" he    said.  <\/p>\n<p>      About the Author    <\/p>\n<p>       Sean      Carberry is an FCW staff writer covering defense,      cybersecurity and intelligence. Prior to joining FCW, he was      Kabul Correspondent for NPR, and also served as an      international producer for NPR covering the war in Libya and      the Arab Spring. He has reported from more than two-dozen      countries including Iraq, Yemen, DRC, and South Sudan. In      addition to numerous public radio programs, he has reported      for Reuters, PBS NewsHour, The Diplomat, and The Atlantic.    <\/p>\n<p>      Carberry earned a Master of Public Administration from the      Harvard Kennedy School, and has a B.A. in Urban Studies from      Lehigh University.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continue reading here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/fcw.com\/articles\/2017\/03\/15\/joyce-white-house-cyber.aspx\" title=\"NSA vet Rob Joyce to lead cyber at White House - FCW.com\">NSA vet Rob Joyce to lead cyber at White House - FCW.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> White House The NSA's onetime top hacker is going to work in the White House. Rob Joyce, who once ran the National Security Agency's office of Tailored Access Operations -- the hacking division -- is taking on the role of White House cybersecurity coordinator. Tom Bossert, President Trump's homeland security advisor, told the audience at a Center for Strategic and International Studies event on March 15 that Joyce is officially taking the position last held by Michael Daniel during the Obama administration <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-vet-rob-joyce-to-lead-cyber-at-white-house-fcw-com\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-183372","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/183372"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=183372"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/183372\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=183372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=183372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=183372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}