Biden taps cyber policy veteran for new Pentagon post

Avatar

President Joe Biden on Thursday announced he intends to nominate Michael Sulmeyer, the U.S. Army’s principal cyber advisor, to be the Pentagon’s first digital policy chief.

Recorded Future News first reported last year that Sulmeyer — who has served in various senior roles at the National Security Council, U.S. Cyber Command and the National Security Agency — was in contention to be the department’s assistant secretary of defense for cyber policy.

The post was created in the fiscal year 2023 defense policy bill following years of congressional irritation that the Pentagon lacks a civilian leader who is accountable for digital security policy.

The department previously tasked an independent third-party to examine the proposed office and how to set it up within the agency’s bureaucracy. 

Sources previously told Recorded Future News that the office would most likely open this week.

A DOD spokesperson did not immediately respond to a request for comment.

In his current role, Sulmeyer is responsible for advising the Army Secretary Christine E. Wormuth “on all cyber matters, including issues of readiness, capabilities, and strategy,” the White House said in a statement.

In addition, he was the head of the Cybersecurity Project at the Harvard Kennedy School’s Belfer Center for Science and International Affairs. 

Sulmeyer also taught at the University of Texas School of Law and was a senior fellow at Georgetown University’s Center for Security and Emerging Technology, according to the White House.

GovernmentLeadershipNewsNews BriefsPeople
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Martin Matishak

is the senior cybersecurity reporter for The Record. Prior to joining Recorded Future News in 2021, he spent more than five years at Politico, where he covered digital and national security developments across Capitol Hill, the Pentagon and the U.S. intelligence community. He previously was a reporter at The Hill, National Journal Group and Inside Washington Publishers.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Chinese government hacker exploiting ScreenConnect, F5 bugs to attack defense and government entities

Next Post

Jacksonville Beach and other US municipalities report data breaches following cyberattacks

Related Posts

Getting off the Attack Surface Hamster Wheel: Identity Can Help

IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it and how to manage it.  The process is simple: begin by thoroughly assessing the attack surface, encompassing the entire IT environment. Identify all potential entry and exit points where unauthorized access could occur. Strengthen these vulnerable points using
Avatar
Read More