recommended reading

On Deck: The Cyber Deputy


By Gautham Nagesh December 23, 2009

recent posts

After a long wait, the country finally has it's first cybersecurity czar in the person of Howard Schmidt. Like most of the experts, having interviewed Schmidt I'm well aware the depth of his experience and expertise in this area. But any federal manager is only as good as the people who support him, which is why I was very interested to see this report from Jason Miller of FedNewsRadio about his potential deputy:

Multiple sources say the next piece to the puzzle could be a staff member from the Senate Select Committee on Intelligence. Sources say Sameer Bhalotra is a leading candidate to be deputy cyber coordinator.

"Sameer interviewed with the White House earlier this year, but I don't think a decision has been made," says one source, who like the others requested anonymity because of the sensitivity of personnel announcements.

According to his bio, Bhalotra received an undergraduate degree in Physics and Chemistry from Harvard University and a doctorate in Applied Physics from Stanford University.

He also worked with the CIA in the science and technology directorate and developed new cross-community technology programs as a founding member of the science and technology staff within the Office of the Director of National Intelligence.

Bhalotra also was a member of the Commission on Cybersecurity for the 44th Presidency.

Bhalotra has been with the Senate Intelligence Committee since 2007 where he has focused on cybersecurity and leads the committee's cyber study team.

"Sameer knows how to get stuff done," says another source. "That is the type of person that this position needs."

Bhalotra certainly appears to have the right background for the job, since the intelligence community will undoubtedly be playing huge role in the re-shaping of federal cybersecurity policy next year. Hopefully if chosen his experience working with the Hill will prove valuable as he and Schmidt work to raise the profile and awareness of cybersecurity as a political and governmental issue.


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.