US CIO Tony Scott. Brendan Smialowski / AFP / Getty Images

Tony Scott, chief information officer of the country, wants to rebuild the way to run the government. On Friday, he will announce a long-term strategy focused on cybersecurity hiring elite technologists, using emerging technologies and to promote consistent, rapid responses to cyber attacks.

“Most of the things that we have built a system of today have their design point of 10, 15, even 20 years ago,” said Scott Buzzfeed News. “I’m talking about operating systems, I’m talking about the hardware and software. What we should have done in response to today’s cyber threats such as hovercraft and Bubble Wrap is what we’ve created. And we can only do so much of that.”

Scott provides a state model based on cloud computing and repeating the upgrade. It is the task of the federal agencies with a more active role replacement of obsolete networks and their underlying technology. And he hopes to lure cyber security talent appeals to the civil service, as well as the seemingly insurmountable problems of protection of networks from government opponents multiplication.

Implementation Plan cybersecurity Scott follows a series of complex data breaches targeting state agencies. The biggest hack, and perhaps the most embarrassing for the Obama administration, personnel management hit earlier this year when millions of Social Security numbers and fingerprints belonging to current, former, and prospective federal employees were stolen. Colossal theft, which affects more than 21 million people, has led to the resignation of the Director of OPM in Katherine Archuleta and urgent call to upgrade outdated networks and rectify glaring vulnerability of government IT.

In the aftermath of the violation, Scott instituted security measures throughout the state, including fixes for vulnerabilities, reducing the number of privileged administrators, and using basic tools such as two-factor authentication. Using smart cards with the help of federal employees to securely access the state machine has increased from 42% after the breach by 80% in mid-October, he said. This form of strong authentication, are believed to act as a preventative measure. In both of these disorders and OPM goal hacked accounts given hackers a way in.

“I think that one of the key differences between this work and the things that have gone on before, how are we going to measure,” Scott said, referring to a quantitative improvement in the framework of the federal workforce. “And Congress Watch, the inspectors general look, GAO [General Accounting Office] watching, and we report the results. This creates a center, which may have been not enough before.”

In what has been described as winning technology companies, the Obama administration has decided not to seek legislation forcing Silicon Valley firms to establish so-called “backdoors” to their encrypted devices, the thorny issue of cybersecurity, companies such as Apple, and Google are watching closely.

During the 2015 FBI Director James Comey and other government officials have expressed frustration in Congress with what they describe as “dark” problem, whereby the encrypted devices and applications place offenders beyond the reach of the law. In turn, cryptologists and privacy advocates argue that granting privileged access to law enforcement and technologically infeasible and be sure to introduce security weaknesses

In this discussion, the director Scott clear. “I think that in the long term, we probably not well served backdoors to encryption and overall we ultimately benefit as a society, without having a very strong encryption to crack, “he said. “And I say that knowing that he would present some difficulties for law enforcement and investigative agencies.”

CIO Scott is the third country, the state is set during the first term of President Obama in 2009. Prior to joining the federal government, Scott served as CIO in the company of VMware, Microsoft, and the Walt Disney Company.