For Australia, both defensive and offensive cyber capabilities are now an essential component of our nation’s military arsenal, and a necessary step to ensure that we keep up with global players.
This report found there is no whole-of-government capability to detect and respond effectively to cyber security incidents. There is very limited sharing of information on incidents amongst agencies, and some agencies have poor detection and response practices and procedures.
This guide aims to assist you in developing and implementing an effective data breach response. It outlines the requirements relating to data breaches in the Privacy Act 1988 (Cth) (Privacy Act), including personal information security requirements and the mandatory data breach reporting obligations of the...
This survey of 385 not for profit organisations identified a significant under-investment in IT, with many organisations using systems that aren’t working well enough to provide efficient services.
The Global Risks Report 2018 is published at a time of encouraging headline global growth. Any breathing space this offers to leaders should not be squandered: the urgency of facing up to systemic challenges has intensified over the past year amid proliferating signs of uncertainty,...
This report assesses the national approach of Asia–Pacific countries to the challenges and opportunities of cyberspace, taking a holistic approach that assesses governance and legislation, law enforcement, military capacity and policy involvement, and business and social engagement in cyber policy and security issues.
In 2017, the Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) teamed up for the second year in a row to look at the lives and experiences of cybersecurity professionals. This year’s report is based on data from a survey of 343...
This resource outlines Australia's cyber affairs agenda for the next three years, with the hope of creating the environment for digital trade to generate economic growth and opportunities for Australia.
This paper provides an overview of the Victorian Protective Data Security Framework and its role in protecting information held by Victorian government agencies, as well as a background of the global and domestic developments in this area.
The articles reprinted in this report give a range of perspectives on the recent Australian Intelligence Community (AIC) review and its recommendations.
This paper argues that the requirement for purpose-driven and mission-specific cyber security education is increasing, and recommends that this become a focus of new initiatives in cyber security education.
This report examines the existing limited research on women in the cyber security industry, and women in science, technology, mathematics, and engineering (STEM) and information and communication technology (ICT) to identify barriers to women’s labour market participation.
Sharing information on the cyber landscape is a necessary and efficient way to benefit from mutual exposure to cyber threats and boost collective defensive capacity.
The US has been pursuing cyber information sharing since the late 1990s, when the federal government directed the creation...
The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.
This report should be viewed as a companion to the ACSC 2016 Threat Report . Both reports...
This article argues that the Australian Depertment o Defence needs to urgently conduct operationally-focused cyber-survivability trials that leverage its alliance with the United States.
Zero-day vulnerabilities — software vulnerabilities for which no patch or fix has been publicly released — and their exploits are useful in cyber operations — whether by criminals, militaries, or governments — as well as in defensive and academic settings.
This report provides findings...
In the recent past phishing was an attempt to reveal personal information; passwords; bank and credit card numbers, usually within spam email that purports to be from a well-known legitimate enterprise. Phishing is rapidly evolving from attempting to just steal information to also be the...
Cyberattacks and data breaches are facts of life for government agencies, businesses and individuals alike in today’s digitized and networked world. Just a few of the most high-profile breaches in 2016 alone include the hacking and subsequent release of emails from members of the Democratic...
The new Ambassador for Cyber Affairs says Australia is a target for cyber espionage, but he has not singled out any specific nation as a threat.
As the United States is grappling with explosive findings that Russia engaged in hacking during the Presidential election,...