recommended reading

Senate unlikely to revisit cybersecurity bill before election, Lieberman says

Sen. Joe Lieberman, I-Conn.

Sen. Joe Lieberman, I-Conn. // Richard Drew/AP

Senate Homeland Security Chairman Joe LiebermanI-Conn., told National Journal on Tuesday there is little chance the Senate will revisit his proposed cybersecurity legislation until after the November election.

Lieberman, a lead sponsor of the Cybersecurity Act of 2012, also said he supports a review by the White House of possible executive actions to boost cybersecurity. The broad cybersecurity bill has White House support but stalled amid partisan sniping and finger-pointing before Congress recessed in August. Republican critics say the bill could create regulations for private computer networks that would be burdensome to businesses.

“Negotiations are going on, but the fact is they haven’t made much progress,” Lieberman said. “Nobody thinks we’re going to take it up in this two-week period. I’m still hopeful we’ll get some agreement to go forward in the lame-duck session.”

Efforts to pass the bill in the final week before the recess broke down after lawmakers failed to agree on a limited number of germane amendments. Senate Majority Leader Harry Reid, D-Nev., has said he would revive the bill if supporters and critics could agree on a limited list of amendments or proposed a substitute bill that has wider support. Republicans incurred Reid's wrath after submitting amendments aimed at repealing the health reform law and banning some types of abortion.

“I don’t think there is any expectation that we’re going to get the kind of agreement that Senator Reid has said he wants,” Lieberman said. “I don’t see the negotiations reaching that point in the next two weeks.”

Lieberman said he has been talking with a range of supporters and critics, including Sens. Jon Kyl, R-Ariz.,Sheldon Whitehouse, D-R.I., and Saxby Chambliss, R-Ga. “So far, no breakthrough. I don’t think anything is going to happen until after the election,” he said.

Lieberman said he’s not giving up on the issue, but the breakdown in Congress appears to be fulfilling his own prediction from June, when he told National Journal that the bill might not survive if not approved during the summer.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.