This guide has been written to assist agencies holding Australian government data to safely and effectively share the data they are responsible for by using five data sharing principles.
This report argues that, as the Canadian economy becomes more data driven, the country needs a national data strategy that encourages innovation, provides security and privacy, prioritises transparency and oversight, and transcends jurisdictional barriers.
With around 50,000 ships at sea or in port at any one time, the maritime transport industry is highly exposed to cyberattacks. The International Maritime Organisation (IMO) reacted quickly in introducing guidelines in response to terrorist attacks on shipping, but has arguably been slower in...
HISA’s Cybersecurity Community of Practice (CoP) was established to inform and engage stakeholders and healthcare providers across the Australian health ecosystem regarding cybersecurity.
There are those who ask “who would be interested in hacking patient data?” It is precisely this attitude together with the...
The Australian government recognises that the data it holds is a strategic national resource that holds considerable value for growing the economy, improving service delivery and transforming policy outcomes for all Australians. This paper outlines key concepts and principles which may guide development of the...
This guide aims to assist you in developing and implementing an effective data breach response. It outlines the requirements relating to data breaches in the Privacy Act 1988 (Cth) (Privacy Act), including personal information security requirements and the mandatory data breach reporting obligations of the...
This paper argues that the requirement for purpose-driven and mission-specific cyber security education is increasing, and recommends that this become a focus of new initiatives in cyber security education.
This report examines the existing limited research on women in the cyber security industry, and women in science, technology, mathematics, and engineering (STEM) and information and communication technology (ICT) to identify barriers to women’s labour market participation.
The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.
This report should be viewed as a companion to the ACSC 2016 Threat Report . Both reports...
Japan’s cyberdefenses remain underdeveloped compared to the country’s great reliance on information and communications technology. Despite Japan’s initial slow response to the security challenges emerging from cyberspace, this paper posits that cybersecurity under the administration of Japanese Prime Minister Shinzo Abe has moved to the...
Cyberattacks and data breaches are facts of life for government agencies, businesses and individuals alike in today’s digitized and networked world. Just a few of the most high-profile breaches in 2016 alone include the hacking and subsequent release of emails from members of the Democratic...
The new Ambassador for Cyber Affairs says Australia is a target for cyber espionage, but he has not singled out any specific nation as a threat.
As the United States is grappling with explosive findings that Russia engaged in hacking during the Presidential election,...
The F.B.I. and Department of Homeland Security have released this report which details the ways that Russia acted to influence the American election through cyberespionage.
In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios. This preparation enables rapid recovery from incidents...
On 31 August 2016, the Senate referred the 2016 Census to the Senate Economics References Committee for inquiry and report by 24 November 2016. The terms of reference include the following matters:
The 2016 Census, with particular reference to:
a) the preparation, administration...
The Australian Government’s new paradigm of online engagement and services for Australians is not coming. It’s already here.
Government’s response to the eCensus events of 9 August 2016 provides an opportunity to change the conversation about cyber security: to one of trust and confidence...
The 2016 Global Internet Report takes a close look at data breaches through an economic lens and provides five clear recommendations for a path forward.
The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement,...
Cybersecurity continues to be a prominent issue in the US election race. An FBI bulletin, uncovered two weeks ago, reveals that the Bureau has been investigating recent hacking attempts on two state election websites. The hackers, suspected to be agents of a foreign state, targeted...