recommended reading

Cyber chief to name admired Senate staffer to deputy post, sources say

White House Cybersecurity Coordinator Howard Schmidt is expected soon to name a professional staffer for the Senate's Select Intelligence Committee as his deputy cybersecurity coordinator.

Sameer Bhalotra sent out notes Wednesday night informing people of his move to the White House, according to sources.

He has gained deep respect within the ranks of cybersecurity circles as a strong cyber adviser. "It's a shame to see Sameer leave the Hill and SSCI, but this is a real coup for Howard Schmidt," said James Lewis, a cybersecurity expert and senior fellow at the Washington-based Center for Strategic and International Studies.

Bhalotra has been involved in classified work and has extensive knowledge of the cybersecurity budget. As the key staffer on the Select Intelligence Committee since 2007, he was responsible for the entire cybersecurity budget. He also was a member of the Commission on Cybersecurity for the 44th Presidency, an advisory group that submitted policy recommendations to the Obama administration.

More important, Bhalotra is well-trusted in Congress, and sources say Republicans and Democrats are big fans. Adding him to Schmidt's team is enough reason for Congress to make the White House Network Operations Center a permanent federal office, according to Alan Paller, director of research at the SANS Institute, security training organization.

A bill sponsored by Rep. Diane Watson, D-Calif., and introduced in March, would do just that, and other legislative attempts to update the 2002 Federal Information Security Management Act also are expected to propose a similar measure.

"He is probably the most technically tuned-in staff member on the Hill," Paller said. "He's an innovator and a team builder and a mentor to many others on the Hill, where he headed the Senate's cyber staff caucus."

It was rumored in December 2009 that Bhalotra would be making the move to the White House, but a decision hadn't been made at the time.

"This is a great move for the administration," said Karen Evans, former administrator for e-government and information technology at the Office of Management and Budget. "Sameer brings an in-depth understanding of the issues facing the nation, complemented with his Hill experience."

According to his bio, Bhalotra received an undergraduate degree in physics and chemistry from Harvard University and a doctorate in applied physics from Stanford University.

Adam Ross is managing editor at the SANS Institute and writes the Cybersecurity Report Blog for Nextgov. You can reach him at

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.