What Obama's second-term Cabinet might look like

Obama drops in on a cabinet meeting in April. Obama drops in on a cabinet meeting in April. White House photo

Four years after promising to change Washington, President Obama has left everyone guessing just how much change will occur in a second term. This time, he may not want many tweaks to his senior staff or his Cabinet. But, like the past five two-term presidents, Obama will find that things never stay the same—even if he wants them to.

The president has had a fair amount of turbulence in his White House staff, including three chiefs of staff, two press secretaries, two legislative directors, and a shifting cast of senior advisers. But he has had a remarkably stable Cabinet. Only two of Obama’s 15 Cabinet posts have turned over—Defense and Commerce. And only two of his six Cabinet-level slots have seen turnover—budget director and head of the Council of Economic Advisers. But that very stability hints at the change to come in a second term. The long hours and constant stress inevitably take their toll. Few people have the stamina to last eight years.

On average in the five two-term presidencies since World War II, only one or two Cabinet officers have stayed for eight years. Bill Clinton held on to the most; five of his Cabinet secretaries stuck it out for the second term. In the Dwight Eisenhower and George W. Bush administrations, two Cabinets officers served for eight years; Richard Nixon and Ronald Reagan each had one who did the full stretch. That history suggests a big turnover ahead for a reelected Obama.

Read the full report from National Journal on potential changes in the Obama administration

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.