Tenacity Carries The Cybersecurity Message - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Tenacity Carries The Cybersecurity Message

Clarke's key challenge is to convince policy makers and businesses that they've been giving too little money, time, and attention to cyberthreats.

When national cybersecurity czar Richard Clarke talks about the danger that cyberterrorists pose to the nation's computer systems, it's clear he believes a major attack is simply a matter of when. He warns of a "digital Pearl Harbor," in which an attack on one portion of the nation's IT infrastructure would have a domino effect on other systems, halting operations at hospitals, airports, and utilities. "Our enemies know our technology as well as we do, and our enemies will use our technology against us," he says. "Our enemies will find the fissures and the seams in our high-tech economy."

Richard ClarkeClarke will need all his conviction and persistence to marshal the government, private businesses, and the IT industry behind a campaign to protect critical systems. Clarke, appointed in October by President Bush to the newly created post of special adviser to the president for cyberspace security, also is chairman of the President's Critical Infrastructure Protection Board. That position makes him the federal official most directly responsible for protecting not just IT systems and electronic networks such as telecommunications infrastructure and the Internet, but all essential utility systems, including energy, water, and transportation. He reports to Homeland Security Director Tom Ridge and National Security Adviser Condoleezza Rice.

Clarke is the son of a chocolate-factory worker

Boston Latin School, University of Pennsylvania, Massachusetts Institute of Technology

Government service since 1973, in posts such as deputy assistant secretary of state for intelligence and assistant secretary of state for politico-military affairs

Clarke just installed a biometric finger-scanning system on his own machine

He plays racquetball to unwind

Clarke, 50, is a government lifer who's moved through a number of defense and intelligence jobs. The thorniest part of his current position is convincing government officials and private companies that the threat posed by computer attacks is as big as he believes it is. Clarke considers it the government's job to discuss with IT vendors what they're doing to harden next-generation computer hardware and software systems and critical nationwide networks against electronic and physical attacks. "The problems they've seen to date aren't a good indicator of what they'll see in the future," Clarke says. "Rather than looking at the past, they need to look at the vulnerabilities."

Colleagues say Clarke's persistence will help him convince doubters of the pressing need to prepare for cyberattacks. "The thing about Dick is that once he gets the bit in his teeth, he doesn't let go easily," says Bob Kimmitt, executive VP of global and strategic policy at AOL Time Warner. As a National Security Council official, Kimmitt worked with Clarke in the late 1980s and early 1990s.

Clarke's determination and focus can come off as caustic or abrasive at times, yet he can't afford to ruffle too many feathers. How successful he'll be in preparing the country for cyberthreats will depend heavily on his powers of persuasion, since his office has only a half-dozen staffers and no regulatory authority of its own. Clarke must persuade others in government to carry out his office's policy recommendations, while also convincing private-sector companies to step up their own security efforts.

He doesn't think it's proper for the government to dictate exactly how the IT industry should respond to the threat of cyberterrorism. "The government is incapable of writing regulations to create IT security," he says. What it can do is increase awareness of the threat, research new security technologies, and assess how interdependent systems would respond in attack scenarios.

Clarke sees his key challenge as convincing policy makers and businesses that-in light of the Sept. 11 terrorist attacks-they've devoted too little money, time, and attention to cyberthreats. "We need to insist that the next generation of hardware and software systems have security built into their basic architecture," he says. "As long as we're a superpower, there will be people who will come after us."

close this window

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
11 Things IT Professionals Wish They Knew Earlier in Their Careers
Lisa Morgan, Freelance Writer,  4/6/2021
Time to Shift Your Job Search Out of Neutral
Jessica Davis, Senior Editor, Enterprise Apps,  3/31/2021
Does Identity Hinder Hybrid-Cloud and Multi-Cloud Adoption?
Joao-Pierre S. Ruth, Senior Writer,  4/1/2021
Register for InformationWeek Newsletters
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll