This paper examines how the availability and deliverability of digital government services can be achieved in the face of unpredictable demand.
This discussion paper seeks the public's views about how the Australian government can incentivise businesses to invest in cyber security, including through possible regulatory changes.
All governments, civil society groups and businesses—large and small—need to know how to manage and mitigate the risk of ransomware, but organisations can’t deal with the attacks on their own. This policy report addresses key areas in Australia where new policies and strategies and improved...
In December 2020, the Standing Committee on Petitions resolved to inquire into and report on aspects of the House of Representatives’ petitioning system relating to security and accessibility. This report outlines the findings from this inquiry.
Digitisation of elections in Australia induces new vulnerabilities that malign foreign entities can exploit to subvert our democratic sovereignty. Despite this threat landscape, according to this paper, Australia’s digital-analogue hybridity safeguards federal elections from hard cyber security risks that might seek to directly tamper with...
This report outlines the principles of secure communication, and uses some examples of emerging technologies to illustrate what the next generation of secure communications might look like.
The purpose of this research was to better understand the landscape of where small businesses are at in terms of cybersecurity. In particular, awareness of cyber security, attitudes to cyber security, actions and intentions around cyber security, the extent to which small businesses are trading...
Based on three key pillars of values, security and prosperity, this framework will help to guide Australia's practical international engagement across cyber and critical technology issues, in order to create an environment that embraces the enormous opportunities of innovation, while mitigating against the risks.
This report aims to raise policy makers’ awareness about the importance of responsible “vulnerability treatment”, namely the discovery, management and handling, as well as co-ordinated disclosure of digital security vulnerabilities in products and information systems.
The Office of the Australian Information Commissioner (OAIC) periodically publishes statistical information about notifications received under the Notifiable Data Breaches (NDB) scheme to assist entities and the public to understand the operation of the scheme. This report captures notifications made under the NDB scheme for...