Joseph Marks | Nextgov | March 31, 2017 | 0 Comments

NIST Cyber Board Wants Trump Advisers to Show Up to Next Meeting

Vice President Mike Pence, left, and President Donald Trump in the Oval Office of the White House, in Washington, March 31, 2017 Andrew Harnik/AP

A government cybersecurity advisory board wants to hear from the White House at its next meeting.

The National Institute of Standards and Technology’s Information Security and Privacy Advisory Board agreed at the close of three days of meetings Friday to ask the Trump administration to send a cyber representative to its next meeting and to meet in a closed session with that representative if that’s what it takes to make the meeting happen.

White House Cybersecurity Coordinator Rob Joyce was scheduled to appear during the second day of this round of ISPAB meetings but abruptly canceled. It would have been Joyce’s first public appearance in his new position, which he only began this month.

» Get the best federal technology news and ideas delivered right to your inbox. Sign up here.

The request comes as the Trump administration is working on a long-delayed executive order aimed at shoring up federal networks that were breached multiple times during the Obama administration.

Joyce previously led the National Security Agency’s network defense section.

Obama White House Cybersecurity Coordinator Michael Daniel appeared several times before the NIST advisory board.

The board also plans to send a letter to the White House and other relevant agencies urging increased attention to the digital security of state and local election systems, Chairman Chris Boyer told reporters.

The election security concerns will be part of a broad review of the most pertinent findings from the three days of meetings, Boyer said. The board sends such readouts after each of its meetings.

The letter, which must be agreed to by all board members, won’t get into deep policy recommendations but may suggest the government evaluate targeting some state and local cybersecurity grant money to election systems, said Boyer, who’s assistant vice president for global public policy at AT&T.

The letter will be sent in the next several weeks, he said.

Likely topics for ISPAB’s next meeting include efforts to combat armies of corrupted computers, known as botnets, and ransomware attacks in which hackers seize victim computers and only unlock them for a price, Boyer said.

The board will also likely address network segmentation and authentication issues, he said. That’s the process of ensuring employees only access documents and systems that are necessary to do their jobs and that network administrators are verifying those employees are who they say they are.

Improved segmentation and authentication can help reduce the dangers of an insider releasing sensitive information either mistakenly or maliciously.

“The problem you have in any organization with hundreds of thousands of employees is there’s always one, right?” Boyer said. “So, if that’s the case, how do you build in better authentication mechanisms so … you have the ability to track those people and limit the damage.” 


Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.