AISA Response to the Department of Prime Minster and Cabinet Consultation Paper: Cybersecurity Strategy Review

Size: px
Start display at page:

Download "AISA Response to the Department of Prime Minster and Cabinet Consultation Paper: Cybersecurity Strategy Review"

Transcription

1 AISA Response to the Department of Prime Minster and Cabinet Consultation Paper: Cybersecurity Strategy Review 31 March 2015 AISA Cybersecurity Strategy Review Submission Page 1

2 Executive Summary The Australian Information Security Association (AISA) is Australia s primary information security professional representative body. Established in 1999, the Australian Information Security Association (AISA) is a not-for-profit organisation formed to advance the cybersecurity and safety of all sectors of Australian life; public, corporate, and government Through its branch network, AISA provides the broadest opportunities for networking with over 3000 information security professionals from both the public and private sector from all over Australia. AISA's vision is a world where all people, businesses and governments are educated about the risks and dangers of cyber-attack and data theft, and to enable them to take all reasonable precautions to protect themselves against it. AISA is pleased to provide this submission in response to the Department of Prime Minister and Cabinet s (PMC) Cyber Security Review Consultation Paper. Member response is based on members responses to a survey (see Appendix A for a list of the survey questions). Responses headed AISA Role or AISA Response, which relate to AISA s own position in the Australian, is provided by the AISA Executive and the AISA Policy Committee. Roles and responsibilities in cyber security In relation to government agencies, AISA members had heard of ASD/DSD, AusCERT, ASIO and the AFP. Interaction with agencies was more limited. The agencies with which members had the most interaction were ASD/DSD, AusCERT and CERTAustralia. The ASD/DSD was clearly regarded as the most influential agency by AISA members. Most members thought that government agencies were carrying out their responsibilities reasonably well. Criticisms included absence of a consistent, coordinated strategy to improve Australia's cyber security posture, focus by agencies on high level policy development rather than outcomes and lack of collaboration between agencies Members indicated a preference for one agency/regulator having over-all responsibility for cyber security. AISA Cybersecurity Strategy Review Submission Page 2

3 Challenges and opportunities The top challenges for Australia in cyber security selected by survey respondents were poor information sharing and failure at the executive level to appreciate security risks. The top challenges for Australian organisations in cyber security selected by respondents were lack of investment in security and failure at the executive level to appreciate security risks. Most respondents regarded the ability to leverage an existing sophisticated and mature skills base as a key opportunity for Australia in cyber security (44% of respondents). Members also thought that the existence of strong communities of practice such as that supported by AISA offered a unique opportunity to foster skills development and training. Identifying the missing piece of cyber security in Australia AISA Response AISA believes that existing methods of approaching and managing cyber security need to be re-assessed in view of the rapidly changing environment. AISA s focus on thought leadership, skills management and professional development will help ensure that Australian information security professionals have the skills needed to equip them for the new 21 st century. The setting of a mandatory security base-line (29%) and supporting implementation of basic security at SMEs (27%) were regarded as the two most important missing pieces of cyber security in Australia. Most respondents referred to the need for a greater understanding at a board level of cybersecurity risks coupled with some sort of regulatory push by way of a mandated security base line or greater penalties for data security failures to encourage the adoption of improved security controls throughout the ecosystem. Cyber Security in the Australian economy Respondents believed that the following would encourage private sector investment in Australia s cyber security: AISA Cybersecurity Strategy Review Submission Page 3

4 Greater research and development deductions (20%) Wider collaboration with government (18%) Stronger links with universities (16%) Cyber Security Skills & Cyber Literacy AISA Role AISA envisions having a central role in the development and management of cybersecurity skills in Australia. AISA proposes to develop a professional certification program, similar to the UK Institute of Information Security Professionals (IISP) certification program, with the input of key government and industry stakeholders. To support this scheme, AISA will provide on-going education and professional development opportunities to its members. AISA will also contribute to skills development by creating a mentoring program, with a focus on women in security, and increased networking with the education and academic communities AISA has a strong interest in increasing cyber literacy in the community. Members believed that the key skills gaps were in the more advanced security positions such as security architects, secure developers and project managers with security skills. Members believe that Government and industry can work together to address the skills shortage by: o Reviewing current tertiary education & vocational training offerings, including post graduate programs o Sponsor employment of graduates e.g. apprenticeship scheme for employer to take on security graduates Incident Response AISA Role AISA is keen to work with the Government and other key stakeholders in the industry on collaborative incident response exercises. We propose to leverage the work done by the ASD in 2012 to jointly refresh the cyber security response plan and make this more applicable across various industries. AISA Cybersecurity Strategy Review Submission Page 4

5 AISA could also co-ordinate exercises across multiple organisations, run awareness and education sessions, keeping members informed of latest developments in cyber security approaches and develop trusted networks to support members in the event of real incidents. Members believed the government could provide better co-ordination of response, including both Australian government responses and the facilitation of international activity including foreign law enforcement Information sharing was seen as another key incident response issue. ICT Supply Chain Security AISA members support government funding of some sort verification or low-level audit activity for essential systems or for service providers hosting personal information and in other cases where assurance is required. Members also suggested that greater investment in research and development of products/services within Australia, rather than reliance on overseas suppliers would assist with supply chain issues. This in turn would also encourage the growth and retention of a skilled workforce in Australia. Partnerships and Information Sharing AISA Role Subject to available funding, AISA could establish two-way information sharing processes for the benefit of the Australian community. Members believes that information sharing about threats, risks, attacks, incidents and compliance to standards should be shared more broadly Members also believe that Whistle blower protection would help support information sharing Legislation, Standards, Guidelines and Privacy Issues AISA members overwhelmingly support a set of baseline standards or guidelines for information security AISA Cybersecurity Strategy Review Submission Page 5

6 There is also wide support for increased enforcement and penalties for noncompliance with agreed base-lines where private information is concerned or where such enforcement would be regarded as for the public good Cyber Security Research, Development and Innovation AISA Position AISA has already positioned itself as a thought leader in information security by engagement with both Australian and international researchers AISA and the government should work closely to identify key innovative cybersecurity research projects which could be managed by AISA as industry partner which would help position Australia as a thought leader in cybersecurity. Members believe that increased research and development deductions would support greater investment from the private sector in new solutions and help position Australia as a thought leader in cyber security. A Centre for Cybersecurity Excellence and Innovation should be established to support thought leadership on cyber security Further Consultation AISA would be happy to provide a more comprehensive response. In particular, AISA would like to run workshops with members to discuss the key issues raised in the review in more detail, and provide details from those more interactive sessions to the Department, as part of the consultation process. We appreciate the opportunity for public consultation and thank the PMC for their efforts. Arno Brok National Director Australian Information Security Association AISA Cybersecurity Strategy Review Submission Page 6

7 Contents AISA Response to the Department of Prime Minster and Cabinet Consultation Paper:... 1 Cybersecurity Strategy Review... 1 Executive Summary... 2 Roles and responsibilities in cyber security... 2 Challenges and opportunities... 3 Identifying the missing piece of cyber security in Australia... 3 Cyber Security in the Australian economy... 3 Cyber Security Skills & Cyber Literacy... 4 Incident Response... 4 ICT Supply Chain Security... 5 Partnerships and Information Sharing... 5 Legislation, Standards, Guidelines and Privacy Issues... 5 Cyber Security Research, Development and Innovation... 6 Further Consultation... 6 Chapter 1: Introduction and Background... 9 Background... 9 Methodology... 9 Chapter 2: General Questions AISA s Response Roles and responsibilities in cyber security Challenges and opportunities Identifying the missing piece of cyber security in Australia AISA s Response Chapter 3: Specific Questions Cyber Security in the Australian Economy AISA s Response AISA Cybersecurity Strategy Review Submission Page 7

8 Cyber Security skills and cyber literacy AISA s Response Incident Response AISA s Response ICT Supply Chain Security Partnerships and Information Sharing AISA s Response Legislation, standards, guidelines and privacy issues Cyber security research, development and innovation AISA s Response Contacts and Further Information Appendix A AISA Cyber Security Review Member Survey AISA Cybersecurity Strategy Review Submission Page 8

9 Chapter 1: Introduction and Background Introduction AISA thanks the Department of Prime Minister and Cabinet (PMC) for the opportunity to participate in the Australian Government s Cyber Security Review (the Review). AISA is delighted to provide this response to the Consultation Paper issued to AISA by PMC as part of that Review. Background AISA notes that the Review is being undertaken to better protect Australia s networks from cyber-attack and ensure all Australians can benefit from the opportunities provided by cyberspace. The Review s objectives are to: look to the future of the Internet, assess the risks and tell us how to make our online systems more resilient to attack; examine how government and industry can best team up to defend ourselves jointly from those who want to harm us in cyber space; assess how Government protects its own networks and the information it holds on behalf of the Australian people, and how to best protect critical infrastructure; consider ways to better engage with international cyber security forums to further Australia s interests and ways to cement our leadership on cyber security within our region; and Look for ways to better address Australia s cyber security skills needs, including attracting more women to the discipline, and support the Australian community to better understand their role in securing their interaction with cyberspace. Methodology This submission is based on a review by the AISA Executive and Policy Committee of the questions posed in the Consultation Paper and consideration of the role that AISA has to play in the Australian cybersecurity eco-system. Some of the questions in the Consultation Paper were directed more generally to the Australian cybersecurity landscape. To assist in answering those questions, input was sought from AISA s members via an on-line survey. A copy of the questions posed in the AISA Cybersecurity Strategy Review Submission Page 9

10 AISA member survey (which were based on the questions posed in Consultation Paper) is included in Appendix A. Responses to those questions have been collated and summarised in this submission and have been included under the sub-heading to differentiate that data from the information provided by AISA in regard to its own role. There were over 50 responses to the survey. Although sufficient to provide good data on members responses to the questions raised in the Consultation Paper, this number is reflective of both the limited amount of time available to secure member responses and the time needed by members to respond given the complexity of the issues raised. A number of comments were made by the survey participants in regard to the complexity of the issues raised, and the time required to respond. A number of respondents also queried whether a survey was the most appropriate method to secure member input on the questions raised. More detailed and considered input from a larger and broader group of members could be achieved with more time. Although AISA believes that the membership input which has been received has been valuable in terms of assisting AISA form its response to the questions raised in the Consultation Paper, given the complexity of those issues and their importance to the information security community AISA would welcome the opportunity to undertake a more comprehensive consultation process with its members. In particular, AISA believes that a series of facilitated workshops, involving a broader group of members from across different industries and geographies, would provide valuable input to this consultation process. Further submissions generated from those sessions could then be provided to the Department, as part of the consultation process. This would help ensure that the very important issues raised in this Review receive the widest possible consideration from the community of practitioners most concerned. We have responded to the questions raised in the Consultation Paper adopting the same headings, numbering and layout used in that document. AISA Cybersecurity Strategy Review Submission Page 10

11 Chapter 2: General Questions There are three broad areas that PM&C is seeking views from all organisations consulted. Roles and responsibilities, in particular the Australian Government s, in cyber security. Do current roles and responsibilities for cyber security in Australia need clarifying and/or updating? Do they reflect your views on the Australian Government s role and responsibilities and that of your organisation/institution? Challenges and opportunities. What is the key challenge Australia faces in cyber security? What is the key challenge being faced by your organisation in cyber security? What are opportunities for Australia in cyber security? Are we taking advantage of these? Identifying the most important missing piece of cyber security in Australia. What would you change about existing methods of approaching / managing cyber security, and why? AISA s Response AISA welcomes the opportunity to outline both its current role as the pre-eminent representative of the Australian information security community and the ways that AISA may be able to collaborate in the future with government, industry and other stakeholders to support cyber security initiatives in Australia. Generally, AISA regards itself is a vital player in Australian cyber security. Through its extensive member base, AISA supports the connection between government, policy makers, industry and the information security profession. AISA takes an advocacy position in regard to issues important to the information security community and provides an expert consensus view to government, industry and the community. AISA also provides thought leadership regarding cybersecurity in Australia and sees itself as being an important contributor to cybersecurity research, development and innovation in Australia. AISA Cybersecurity Strategy Review Submission Page 11

12 AISA recognises some existing weakness in collaboration between government and industry, 1 and is supportive of greater engagement between industry and government. With its membership base of over 3000, AISA is an important and uniquely placed intermediary to support this engagement. In particular, AISA can: Provide access to the most extensive network of information security professionals in Australia Support the development of the profession, including the assessment of professional skills Disseminate threat and risk information and act as a trusted intermediary in the two-way sharing of information between government agencies and the public sector Promote general public awareness of cybersecurity issues Be an international thought leader in information security. AISA is progressing the development of its role as the provider of independent skills assessment of information security professionals for different roles within the cybersecurity eco-system. AISA proposes to leverage an existing program such as the IISP framework developed and implemented in the UK, modifying it for the Australian environment. AISA recognises that the information security landscape is rapidly changing and that new lenses are required for considering information security in terms of risks, solutions and the information security community itself. AISA is positioning itself as a thought leader in information security, establishing links with leading local (such as the University of NSW, University of Queensland, Edith Cowan University and DSTO) and international academic research institutions (Information Security Group, Royal Holloway, University of London). AISA has already contributed to a pilot study of the Australian information security cohort, together with Royal Holloway as part of its Cyber Security Cartographies project. 2 AISA also recognises that there is a number of existing certification programs for information security professionals (such as CISSP, CISA and CISM). AISA has supported and will continue to support its members in achieving recognition pursuant to existing 1 The ASPI Cyber maturity index report identified weakness in collaboration between government and industry. 2 More information about the Cyber Security Cartographies project is available at AISA Cybersecurity Strategy Review Submission Page 12

13 certifications. In particular, AISA has established relationships with the providers of key existing security certifications (such as (ISC)² ISACA and others) Roles and responsibilities in cyber security Survey Questions Members were asked to respond to the following survey questions: Which agencies have you heard of in terms of their involvement in cyber security in Australia? [Number of different agencies were listed] Which have you interacted with in your professional capacity? How do you think each of the current government agencies is carrying out their role? Which do you think is the most influential in terms of Australia s cyber security? Should there be a single agency/regulator with over-all responsibility for cyber security (both government and private sector) Which of these agencies have you heard of in terms of their involvement in cyber security in Australia? From the list, most respondents indicated that they had heard of ASD/DSD, AusCERT, ASIO and the AFP. Somewhat fewer had head of CERT Australia and AGD and even fewer were aware of the role of the Australian Privacy Commissioner in relation to cyber security. Other agencies referred to by respondents included CLEDS, VAGO, NICTA, CSIRO, DSTO, DBCDE, and AGIMO. Although the AISA members have a reasonable understanding of the different agencies and their roles, managers (including CIO s and CISO s) are often uncertain about when and how an issue can be handed from one agency to another, and whether there is any coordination between these. Which have you interacted with in your professional capacity? While a number of respondents indicated that they had interaction with all or most of the listed agencies, approximately the same number of the respondents indicated that they had had no interaction with any government agency. In those responses where specific agencies were referred to, the agencies with which respondents had the most interaction were ASD/DSD, AusCERT and CERTAustralia AISA Cybersecurity Strategy Review Submission Page 13

14 (which all had 15 respondents who indicated some interaction). Following that were the AFP (8 respondents) and the AGD (6 respondents). Only 4 respondents referred to any specific interaction with the Australian Privacy Commissioner. How do you think each of the current government agencies is carrying out their role? Most respondents thought that government agencies were carrying out their responsibilities reasonably well. Comments included the following: Reasonably well, though it's a lot of bodies to deal with and knowing where to go is not always easy. I think there is some overlap/duplication, and some gaps. Given the number of different bodies with some responsibility, it is not always easy to know where to go and there is some overlap and duplication as well as some gaps Better coordination or clarity of scope would be helpful Criticisms included: Absence of a consistent, coordinated strategy to improve Australia's cyber security posture Focus by agencies on high level policy development rather than outcomes Lack of collaboration between agencies Effectiveness limited by funding and lack of evidence based responses. There was some suggestion that activities were motivated by politics rather than evidence At a state level, these government agencies have limited reach and as such governance over security matters is disjointed at best Information tends to be one way (towards the government) with little return Which do you think is the most influential in terms of Australia s cyber security? The ASD/DSD was clearly regarded as the most influential agency by AISA members responding to the survey. A number of members referred specifically to the ASD Top 35 one calling to practical and persuasive. Reference was also made to AGD and PM&C. Should there be a single agency/regulator with over-all responsibility for cyber security (both government and private sector)? AISA Cybersecurity Strategy Review Submission Page 14

15 Members indicated a preference for one agency/regulator having over-all responsibility for cyber security. Those in favour thought that would simplify the current approach. There was some suggestion that privacy should be outside the remit of the cyber security over sight authority. Some of those not in favour of a single over-sight authority regarded it as too difficult to establish or too important to have a single agency with over-all responsibility. Others indicated that there was still a central co-ordination role that could help with navigating through the different departments. Challenges and opportunities Survey Questions Members were asked to respond to the following survey questions: What is the key challenge Australia faces in cyber security? [Number of challenges listed] What would you regard as the main challenge for your organisation? [Number of challenges listed] What are opportunities for Australia in cyber security? [Number of opportunities listed] What is the key challenge Australia faces in cyber security? The top challenges for Australia in cyber security selected by respondents were: Poor information sharing (35%) Failure at the executive level to appreciate security risks (27%) Weak and under-resourced regulators (8.3%) What would you regard as the main challenge for your organisation? The top challenges for Australian organisations in cyber security selected by respondents were: Lack of investment in security (27%) Failure at the executive level to appreciate security risks (17%) Changing user behaviour (12.5%) AISA Cybersecurity Strategy Review Submission Page 15

16 The adoption of cloud computing and lack of reliable threat/risk information was regarded as the main challenge by only 4.17% of respondents. What are opportunities for Australia in cyber security? Most respondents regarded the ability to leverage an existing sophisticated and mature skills base as a key opportunity for Australia in cyber security (44% of respondents). Members also thought that the existence of strong communities of practice such as that supported by AISA offered a unique opportunity to foster skills development and training. Reference was made to CSIRO s invention of Wifi as an example of the things that could be achieved with appropriate support and collaboration with research organisations. Particular areas where it was felt that Australia had some special expertise that provided any opportunity for leadership in cyber security included: Security of ehealth is a major area where Australia could be exporting software, services, and intellectual property to the rest of the world. China has an aging population and is seeking to improve their healthcare systems to prepare for this. Australia could leverage our strong economic ties with China in this emerging industry. The Internet of Everything here Australia has an opportunity to provide leadership to the rest of the world. Securing of smartgrids, safety for driverless cars, security of e-voting, etc. There are a stunning number of areas in cyber security where our geographic isolation really doesn t matter. Identifying the missing piece of cyber security in Australia AISA s Response AISA believes that existing methods of approaching and managing cyber security need to be re-assessed in view of the rapidly changing environment. The convergence of the spread of cloud, the proliferation of user devices in the organisational environment, the growing recognition of shadow IT where the technology is being taken outside the control of the IT department, the rolling out of the internet of things all introduce new levels of ambiguity and contestation for IT and information security professional. AISA Cybersecurity Strategy Review Submission Page 16

17 AISA s focus on thought leadership, skills management and professional development will help ensure that Australian information security professionals have the skills needed to equip them for the 21 st century. By supporting AISA in its skills development and research and education engagements, as part of AISA s commitment to thought leadership and the information security profession, the Australian government could make a significant contribution to solving the most important missing piece of cyber security in Australia. Survey Questions Members were asked to respond to the following survey questions: What is the most important missing piece of cyber security in Australia? What would you change about existing methods of approaching / managing cyber security, and why? What is the most important missing piece of cyber security in Australia? The two most important missing pieces of cyber security in Australia were: Setting a mandatory security base-line (29% of respondents) Supporting the implementation of based security at SME s (27%) Other comments included: Innovation in our approach to managing information security Objective, reliable and performance based assessment of the best performing security solutions to give Business and individuals a fair chance at selecting a solution that will best minimise their risk Not re-inventing the wheel, and taking advantage of established global standards/approaches etc. What would you change about existing methods of approaching / managing cyber security, and why? Most respondents referred to the need for a greater understanding at a board level of cybersecurity risks coupled with some sort of regulatory push by way of a mandated security base line or greater penalties for data security failures to encourage the adoption of improved security controls throughout the ecosystem. AISA Cybersecurity Strategy Review Submission Page 17

18 The importance of business accountability for and correlating business risk to cyber security was referred to by a number of respondents. Ways to achieve this included the need to educate boards on information risk (which would lead to the introduction of more of a top down approach to information security with security becoming an integral cost of business much the same as hardware and software, not an optional overhead ). In addition to greater education, suggested changes that could be made in terms of business accountability included mandatory incident reporting and government incentives with measurable outcomes and increased sharing of information. A number of respondents referred to the need for better coordination of information exchanges between public and private sectors, so we can tackle cyber security problems collaboratively. Others referred to more streamlining of communication to avoid repeated information constantly needing to be relayed. Many respondents suggested the introduction of a set of mandatory base-line security controls, although problems with this approach were also acknowledged. Members were of the view that the base-line should be supported by some sort of penalty system. For example, one respondent said: Mandate a minimum baseline. Measure that baseline and penalise parties not compliant or not meeting the minimum requirements. It should come from organisations like the AICD, Government and other peak industry bodies. A law without a stick will never work and it hasn't worked in Australia. A mandatory security base-line is discussed further below. Reference was also made to the development of the information security profession and the importance of AISA s role in helping industry define and understand the varying roles within the professional. A number of respondents referred to the need to change the emphasis in security from technology to strategic thinking. One respondent referred to the need for information security to differentiate between technology and the human aspects of security, saying: At the heart of technology is human - human communications. These communications are either direct, mediated by a machine or undertaken by two machines for a human designated purpose. Once we shift the policy debate to that perspective, technological change becomes a feature of the environment rather than a hindrance. This can help shift the policy discussion to where it needs to be, focusing on the human consequences of cyber security rather than the technical AISA Cybersecurity Strategy Review Submission Page 18

19 AISA Cybersecurity Strategy Review Submission Page 19

20 Chapter 3: Specific Questions Cyber Security in the Australian Economy AISA s Response What do you see as AISA s role in Australia s cyber security and beyond? Established in 1999, the Australian Information Security Association (AISA) is a not-for-profit organisation formed to advance the cyber-security and safety of all sectors of Australian life; public, corporate, and government. AISA is the peak body for the information security profession in Australia. Through its extensive branch network, AISA provides the broadest opportunities for networking with over 3000 information security professionals from both the public and private sector from all over Australia. AISA's vision is a world where all people, businesses and governments are educated about the risks and dangers of cyber-attack and data theft, and to enable them to take all reasonable precautions to protect themselves against it. Our intention is to make Australia more secure on the Internet. This stretches from our largest banks, through to sole traders, through to retirees, through to schoolchildren. AISA wants all Australians to be more secure as a result of the collegial learning that AISA provides. There are a number of dimensions to AISA s role in Australia s cyber security, both now and in the future. AISA supports the connection between government and policy makers and the information security profession. On strategic policy issues such as those raised by this Review AISA is able to go to its extensive membership and provide feedback. In addition, through its branch meetings and education program AISA is both developing and supporting communities of practice throughout Australia and engaging with a wide range of different stakeholders, including the broader community. AISA supports the education of its members, takes an advocacy position in regard to issues important to the information security community and provides an expert consensus view to AISA Cybersecurity Strategy Review Submission Page 20

Cyber-safety for Senior Australians. Inquiry Submission

Cyber-safety for Senior Australians. Inquiry Submission SUBMISSION NO. 32 Cyber-safety for Senior Australians Inquiry Submission The AISA Response to the Parliament s Joint Select Committee s call for submissions Date 23 March 2012 Page 1 Executive Summary:

More information

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review About auda.au Domain Administration Ltd (auda) is the industry self regulatory, not for profit

More information

COMMUNICATIONS ALLIANCE LTD. Department of the Prime Minister and Cabinet Consultation Paper. Cyber Security Review

COMMUNICATIONS ALLIANCE LTD. Department of the Prime Minister and Cabinet Consultation Paper. Cyber Security Review COMMUNICATIONS ALLIANCE LTD Department of the Prime Minister and Cabinet Consultation Paper Cyber Security Review 2 Page 2 of 9 EXECUTIVE SUMMARY Communications Alliance appreciates the opportunity to

More information

AISA Position Statement: Mandatory Data Breach Notification in Australia

AISA Position Statement: Mandatory Data Breach Notification in Australia AISA Position Statement: Mandatory Data Breach Notification in Australia Overview Although AISA members are broadly in support of mandatory data breach notification in Australia they have a number of concerns

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Cloud Computing in the Victorian Public Sector

Cloud Computing in the Victorian Public Sector Cloud Computing in the Victorian Public Sector AIIA response July 2015 39 Torrens St Braddon ACT 2612 Australia T 61 2 6281 9400 E info@aiia.com.au W www.aiia.comau Page 1 of 9 17 July 2015 Contents 1.

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

The Australian Public Service Big Data Strategy

The Australian Public Service Big Data Strategy The Australian Public Service Big Data Strategy Improved understanding through enhanced data-analytics capability AIIA response March 2014 Contact for this submission: Suzanne Roche 39 Torrens St Braddon

More information

Australian Government Cyber Security Review

Australian Government Cyber Security Review Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

How To Manage Risk On A Scada System

How To Manage Risk On A Scada System Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document

More information

Electronic Health Records and Healthcare Identifiers: Legislation Discussion Paper

Electronic Health Records and Healthcare Identifiers: Legislation Discussion Paper Electronic Health Records and Healthcare Identifiers: Legislation Discussion Paper AIIA response July 2015 Ground Suite B 7-11 Barry Drive Turner ACT 2612 GPO Box 573 Canberra ACT 2601 T 61 2 6281 9400

More information

How To Improve Training In Australia

How To Improve Training In Australia New Arrangements for Training Product Development for Australian Industry ED15-0079 1 Key messages The Government aims to enhance Australia s economic prosperity by ensuring the future and emerging skills

More information

Compliance Guide: ASD ISM OVERVIEW

Compliance Guide: ASD ISM OVERVIEW Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy 2015 Action Plan A LIVING ACTION PLAN WITH ANNUAL REVIEWS New Zealand s Cyber Security Strategy provides a single cohesive framework to ensure that New Zealand is secure, resilient

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION In the ever-evolving technological landscape which we all inhabit, our lives are dominated by

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

IRAP Policy and Procedures up to date as of 16 September 2014.

IRAP Policy and Procedures up to date as of 16 September 2014. Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

Great skills. Real opportunities.

Great skills. Real opportunities. Department of Education, Training and Employment 130107 Photography: Tony Phillips Great skills. Real opportunities. The Queensland Government reform action plan for further education and training Foreword

More information

Securing the Nation: Creating cyber security, resilience and readiness

Securing the Nation: Creating cyber security, resilience and readiness NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:

More information

Vocational Education and Training Reform Submission

Vocational Education and Training Reform Submission Vocational Education and Training Reform Submission Prepared by: Suresh Manickam Date: 23 rd July 2014 Page 1 NECA response to VET reform draft RTO standards As a lead player in the electrical training

More information

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3

More information

THE HUMAN COMPONENT OF CYBER SECURITY

THE HUMAN COMPONENT OF CYBER SECURITY cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2015 All material presented in this publication

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations

Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations Submitted via ISAO@hq.dhs.gov and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA

More information

Connect Renfrewshire

Connect Renfrewshire How the council will use its information and technology assets to achieve successful change Contents Strategy Context 2 Digital Delivery and Citizen Engagement 4 Operational Excellence and Transformation

More information

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint Under control 2015 Hot topics for IT internal audit in financial services An Internal Audit viewpoint Introduction Welcome to our fourth annual review of the IT hot topics for IT internal audit in financial

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK Executive Summary Core statements I. Cyber security is now too hard for enterprises The threat is increasing

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Digital Continuity Plan

Digital Continuity Plan Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach

More information

Statewide Education and Training Services. Position Paper. Draft for Consultation 1 July 2013

Statewide Education and Training Services. Position Paper. Draft for Consultation 1 July 2013 Statewide Education and Training Services Position Paper Draft for Consultation 1 July 2013 This paper establishes the position for an SA Health Statewide Education and Training Service following the initial

More information

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016 Digital Industries Apprenticeship: Assessment Plan Cyber Security Technologist April 2016 1 Digital Industries Apprenticeships: Assessment Plan 1. General Introduction and Overview The apprenticeship Standard

More information

Submission in Response to the Personally Controlled Electronic Health Record System: Legislation Issues Paper

Submission in Response to the Personally Controlled Electronic Health Record System: Legislation Issues Paper Submission in Response to the Personally Controlled Electronic Health Record System: Legislation Issues Paper August 2011 About National Seniors Australia With a quarter of a million individual members

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

Guide to the National Safety and Quality Health Service Standards for health service organisation boards

Guide to the National Safety and Quality Health Service Standards for health service organisation boards Guide to the National Safety and Quality Health Service Standards for health service organisation boards April 2015 ISBN Print: 978-1-925224-10-8 Electronic: 978-1-925224-11-5 Suggested citation: Australian

More information

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations

More information

THE ACS BACKGROUND GENERAL COMMENTS

THE ACS BACKGROUND GENERAL COMMENTS The ACS (Australian Computer Society) Submission on the Whole-of-Government Information and Communication Technology (ICT) Sustainability Plan, Department of the Environment, Water, Heritage and the Arts

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Is cyber security now too hard for enterprises? Executive Summary Sponsors The creation and distribution of this study was supported by CGI, cybx and Fujitsu/Symantec. Premium sponsors: Gold sponsor: 2

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD

More information

Sector Development Ageing, Disability and Home Care Department of Family and Community Services (02) 8270 2218

Sector Development Ageing, Disability and Home Care Department of Family and Community Services (02) 8270 2218 Copyright in the material is owned by the State of New South Wales. Apart from any use as permitted under the Copyright Act 1968 and/or as explicitly permitted below, all other rights are reserved. You

More information

Making R&D Easier HMRC s plan for small business R&D tax relief. October 2015

Making R&D Easier HMRC s plan for small business R&D tax relief. October 2015 Making R&D Easier HMRC s plan for small business R&D tax relief October 2015 Contents 1 Introduction 4 2 Awareness 6 3 Design 8 4 Understanding 10 5 Administration 12 6 Next steps 14 2 Foreword Research

More information

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement. Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement June 2011 DISCLAIMER: This document is intended as a general guide only.

More information

Responsibility Deal between Government and the waste and resource management sector. June 2011

Responsibility Deal between Government and the waste and resource management sector. June 2011 www.defra.gov.uk www.esauk.org Responsibility Deal between Government and the waste and resource management sector June 2011 Department for Environment, Food and Rural Affairs Nobel House 17 Smith Square

More information

AER reference: 52454; D14/54321 ACCC_09/14_865

AER reference: 52454; D14/54321 ACCC_09/14_865 Commonwealth of Australia 2014 This work is copyright. In addition to any use permitted under the Copyright Act 1968, all material contained within this work is provided under a Creative Commons Attribution

More information

Defending against modern cyber threats

Defending against modern cyber threats Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation

More information

Standard 1. Governance for Safety and Quality in Health Service Organisations. Safety and Quality Improvement Guide

Standard 1. Governance for Safety and Quality in Health Service Organisations. Safety and Quality Improvement Guide Standard 1 Governance for Safety and Quality in Health Service Organisations Safety and Quality Improvement Guide 1 1 1October 1 2012 ISBN: Print: 978-1-921983-27-6 Electronic: 978-1-921983-28-3 Suggested

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

How To Regulate Speech Pathology

How To Regulate Speech Pathology Speech Pathology Australia Response to: Consultation paper: Options for regulation of unregistered health practitioners (February 2011) Australian Health Ministers Advisory Council Response date: Response

More information

Cyber Security Solutions

Cyber Security Solutions Cyber Security Solutions Defending the Enterprise General Dynamics Information Technology defends mission-critical systems including government, health, finance, defence, large-enterprise and national

More information

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage. Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee

More information

Australian Charities and Not-for-profits Commission: Regulatory Approach Statement

Australian Charities and Not-for-profits Commission: Regulatory Approach Statement Australian Charities and Not-for-profits Commission: Regulatory Approach Statement This statement sets out the regulatory approach of the Australian Charities and Not-for-profits Commission (ACNC). It

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Australian Industry Group Submission to the Queensland Government s Action Plan on Advancing Education, and Coding and Robotics in Queensland Schools

Australian Industry Group Submission to the Queensland Government s Action Plan on Advancing Education, and Coding and Robotics in Queensland Schools 21 December 2015 Queensland Government Email: advancingeducation@dete.qld.gov.au Australian Industry Group Submission to the Queensland Government s Action Plan on Advancing Education, and Coding and Robotics

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

TAFE Development Centre response to the Productivity Commission Issues Paper on the VET Workforce

TAFE Development Centre response to the Productivity Commission Issues Paper on the VET Workforce TAFE Development Centre response to the Productivity Commission Issues Paper on the VET Workforce In this response the TAFE Development Centre (TDC) addresses the specific questions that focus on workforce

More information

National Approach to Information Assurance 2014-2017

National Approach to Information Assurance 2014-2017 Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version

More information

Post-accreditation monitoring report: The Chartered Institute of Personnel and Development. June 2007 QCA/07/3407

Post-accreditation monitoring report: The Chartered Institute of Personnel and Development. June 2007 QCA/07/3407 Post-accreditation monitoring report: The Chartered Institute of Personnel and Development June 2007 QCA/07/3407 Contents Executive summary... 4 Accreditation conditions... 4 Observations... 5 Introduction...

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

Submission to the Department of Environment Regulation s Draft Guidance Statement on Regulatory Principles December 2014

Submission to the Department of Environment Regulation s Draft Guidance Statement on Regulatory Principles December 2014 Submission to the Department of Environment Regulation s Draft Guidance Statement on Regulatory Principles December 2014 Chamber of Commerce and Industry of Western Australia (Inc) About CCI The Chamber

More information

How To Defend Yourself Against Cyber Attacks

How To Defend Yourself Against Cyber Attacks Overview of Cyber Security: Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel,

More information

www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future

www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence

More information

Chief Information Officer

Chief Information Officer Security manager Job description Job title Security manager Location Wellington Group Organisation Development Business unit / team IT Solutions Grade and salary range Pay Group 1, Pay Band 6 Reports to

More information

Malware isn t The only Threat on Your Endpoints

Malware isn t The only Threat on Your Endpoints Malware isn t The only Threat on Your Endpoints Key Themes The cyber-threat landscape has Overview Cybersecurity has gained a much higher profile over the changed, and so have the past few years, thanks

More information

Australian Commission on Safety and Quality in Health Care National Safety and Quality Framework GPO Box 5480 SYDNEY NSW 2001

Australian Commission on Safety and Quality in Health Care National Safety and Quality Framework GPO Box 5480 SYDNEY NSW 2001 Health Information Management Association of Australia Limited ABN: 54 008 451 910 Ph: +61 2 9887 5001 Fax: +61 2 9887 5895 Locked Bag 2045 North Ryde NSW 1670 Australia www.himaa.org.au 10 September 2009

More information

PACB One-Day Cybersecurity Workshop

PACB One-Day Cybersecurity Workshop PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance

More information

Australian Government Cloud Computing Policy

Australian Government Cloud Computing Policy Australian Government Cloud Computing Policy Maximising the Value of Cloud VERSION 2.0 MAY 2013 AGIMO is part of the Department of Finance and Deregulation Contents Foreword 3 Introduction 4 Australian

More information

Cyber Essentials Scheme. Summary

Cyber Essentials Scheme. Summary Cyber Essentials Scheme Summary June 2014 Introduction... 3 Background... 4 Scope... 4 Assurance Framework... 5 Next steps... 6 Questions about the scheme?... 7 2 Introduction The Cyber Essentials scheme

More information

A PASSION FOR QUALITY A QUEST FOR PERFECTION

A PASSION FOR QUALITY A QUEST FOR PERFECTION A PASSION FOR QUALITY A QUEST FOR PERFECTION Bespoke maintainable software, carefully designed, and artistically implemented WE SOFTWARE DEVELOPMENT www.geeks.ltd.uk all of these clients wanted... PERFORMANCE

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

Of Citadels And Sentinels: State. Tim Legrand and Jeff Malone

Of Citadels And Sentinels: State. Tim Legrand and Jeff Malone Of Citadels And Sentinels: State Strategies For Contesting Cyber-terror Tim Legrand and Jeff Malone 4 key issues and challenges 1. A cyber architecture designed for efficiency, not security 2. Private

More information

Technology and Cyber Resilience Benchmarking Report 2012. December 2013

Technology and Cyber Resilience Benchmarking Report 2012. December 2013 Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication

More information

Australian Government Cloud Computing Policy

Australian Government Cloud Computing Policy Australian Government Cloud Computing Policy Maximising the Value of Cloud VERSION 2.1 JULY 2013 AGIMO is part of the Department of Finance and Deregulation Contents Foreword 3 Introduction 4 Policy 5

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

RECOGNITION OF MEDICAL SPECIALTIES UNDER THE MEDICAL PRACTITIONERS ACT 2007 QUESTIONNAIRE AND GUIDANCE FOR ASPIRANT SPECIALTIES

RECOGNITION OF MEDICAL SPECIALTIES UNDER THE MEDICAL PRACTITIONERS ACT 2007 QUESTIONNAIRE AND GUIDANCE FOR ASPIRANT SPECIALTIES RECOGNITION OF MEDICAL SPECIALTIES UNDER THE MEDICAL PRACTITIONERS ACT 2007 QUESTIONNAIRE AND GUIDANCE FOR ASPIRANT SPECIALTIES NAME, POSITION, AND CONTACT DETAILS OF PERSON COMPLETING THE QUESTIONNAIRE

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

The Dow Chemical Company. statement for the record. David E. Kepler. before

The Dow Chemical Company. statement for the record. David E. Kepler. before The Dow Chemical Company statement for the record of David E. Kepler Chief Sustainability Officer, Chief Information Officer, Business Services and Executive Vice President before The Senate Committee

More information

ICT Strategy Consulting Services for Schools. Helping schools to establish a clear vision for ICT.

ICT Strategy Consulting Services for Schools. Helping schools to establish a clear vision for ICT. ICT Strategy Consulting Services for Schools. Helping schools to establish a clear vision for ICT. ICT Strategy Consulting Services for Schools. ICT has transformed the way that children learn and teachers

More information