Like other countries, Australia is focused on protecting its critical infrastructure from cyber threats. However, there’s a serious gap in how we approach the protection of our valuable digital national identity assets.
These guidelines are intended for Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), cyber security professionals and information technology managers. As such, these guidelines discuss both governance and technical concepts in order to support the protection of organisations’ information and systems.
As New Zealand organisations adopt digital products and services at pace, they need to ensure they adjust their business risk settings, particularly the implementation of good cyber security policies and practices.
This document outlines the steps the U.S government is taking to advance an open, secure, interoperable and reliable cyberspace. Given the interconnected and global nature of cyberspace, the State Department engages in key diplomatic and programmatic initiatives to support many key objectives reflected in this...
With around 50,000 ships at sea or in port at any one time, the maritime transport industry is highly exposed to cyberattacks. The International Maritime Organisation (IMO) reacted quickly in introducing guidelines in response to terrorist attacks on shipping, but has arguably been slower in...
This paper forms part of a research project that examines cybercrime laws in the member countries of the Gulf Cooperation Council (GCC). Its aim is to assess whether these laws are fit for purpose, and to gauge their impact on the economy, security and civil...
Cyberattacks initiated by nation states have become the new normal, and countries including Australia have struggled with the challenge of how to respond to them. Far too often they’re considered a low priority. This paper offers a way forward, presenting a framework for deterrence -...
The aim of this document is to outline Australia’s current national security science and technology priorities and coordination of efforts, to best take advantage of investment in science and technology and address gaps in immediate and future national security capability.
For Australia, both defensive and offensive cyber capabilities are now an essential component of our nation’s military arsenal, and a necessary step to ensure that we keep up with global players.
This report found there is no whole-of-government capability to detect and respond effectively to cyber security incidents. There is very limited sharing of information on incidents amongst agencies, and some agencies have poor detection and response practices and procedures.
This report assesses the national approach of Asia–Pacific countries to the challenges and opportunities of cyberspace, taking a holistic approach that assesses governance and legislation, law enforcement, military capacity and policy involvement, and business and social engagement in cyber policy and security issues.
As technology evolves, more and more government services are being delivered online. New technology can deliver efficiencies to services and products, but it also carries new and significant risks. With increasing volumes of data being collected and used by various government systems, the security of...
The 2017 threat report includes insights into how the Australian Cyber Security Centre (ACSC) works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.
This resource outlines Australia's cyber affairs agenda for the next three years, with the hope of creating the environment for digital trade to generate economic growth and opportunities for Australia.
This article argues that the Australian Depertment o Defence needs to urgently conduct operationally-focused cyber-survivability trials that leverage its alliance with the United States.
The Australian Cyber Security Centre (ACSC) Threat Report continues to reflect the experience, focus, and mandates of the ACSC's member organisations. This report provides an insight into what the centre has been seeing, learning, and responding to, focusing on specific areas of change or new...
A fundamental shift is occurring in the management of cyber risk. The idea that cyberattacks are increasingly likely—and perhaps inevitable—is beginning to take hold among executives and boards. Business leaders are realizing that we have interconnected our world mostly using technologies designed for sharing information,...
This article is an opinion piece published by The Interpereter - Lowy Institute for International Policy. It was written shortly after the Australia's new cyber security policy was released in April 2016. The piece discusses the disadvantage of having the strategy's deliverables portioned into six...