AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

Size: px
Start display at page:

Download "AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK"

Transcription

1 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association s eighth national conference. Before I begin, I would like to acknowledge the Wurundjeri people of the Kulin nation, the traditional owners of the land on which we are gathered, and pay my respects to their elders both past and present. I am very pleased to be opening this national conference here in beautiful Melbourne, my home town. It s always great to get out of Canberra and talk with people about cyber security. My team and I have done a lot of this over the past year and this is my favourite topic. The Australian Information Association always chooses interesting and topical themes for its national conferences, and this year s focus on trust in information security is no exception. o Trust in Australia s information security systems, practices and priorities is essential if collectively as a nation we are to make the most of the enormous opportunities that cyberspace has presented us with. o These opportunities and challenges will be discussed at length during the next two days. o I d like to kick off this discussion with a snapshot of what my department - the commonwealth department of the Prime Minister and Cabinet has heard during our review of cyber security in Australia. This includes both opportunities and threats and how this landscape can be shaped to our greater national advantage. Australians have quickly embraced the economic benefits of cyberspace. o Last year the internet-based economy contributed $79 billion to our economy or just over five per cent of GDP.

2 2 o We expect this will nearly double to $139 billion (or more than seven per cent of GDP) in five years. Businesses, governments and individuals are benefitting from mobile technology and connectivity. o They are using the internet to deliver products and services in a way that we never dreamed of only five or so years ago. o And they are using information gathered online to create individually tailored products and services. o This trend is accelerating as more and more of the things we use fridges, cars, even pacemakers are connected to the Internet. This 'Internet of Things' is now often referred to as the Internet of Everything. o This connectivity in cyberspace brings enormous opportunities. Businesses large and small can diversify and develop new business models. o And it s equally exciting for us as users, accessing information and connectivity with others in new ways. o As Australians we expect the online environment to be flexible and responsive to our needs, both our personal needs but also to support the country s economic growth and to encourage innovation across all sectors in business and the community. We have heard that if we improve cyber security that will support innovation in cyber space more generally and enable innovation more broadly and growth in Australia's economy. But as well as opportunities we all know there are significant risks in cyber space. And we will not benefit to the full extent if people do not trust our information security do not trust cyberspace. Malicious cyber entities pose risks to Australians and Australian businesses. Information security is a cornerstone of business security and sustainability, and protecting client, financial, and inventory data should be a high priority for us all. But if a business is connected to the internet, it is vulnerable and nearly 95 per

3 3 cent of Australian businesses are connected. As you know it s currently Stay Smart Online Week, and as part of this we re being reminded that: o One in five businesses use paid cloud computing services; o 85 per cent of business activities use the internet for financial activities; o 47 per cent of businesses have a web presence; o 56 per cent place orders via the internet; and o 31 per cent have a social media presence. These high levels of interconnectivity mean that a compromise of one organisation s systems can quickly affect others. o We all share the consequences of poor cyber security. One in ten Australian businesses report losses to cybercrime of more than A$1 million per year since The direct cost of cybercrime to the Australian economy is conservatively estimated to be around A$1 billion a year. Fighting cyber threats needs shared and joined up action so decision makers in government, businesses and households have the information they need to protect themselves and Australia. Commonwealth, State and Territory Governments and the private sector must cooperate to secure systems, supply chains and information. In short, cyber security is everyone s problem, everyone s challenge. It is not a problem government can tackle alone and it needs to be a priority at all levels in organisations, in particular senior leadership. Senior executives and board members need to consider: o What could a serious cyber incident cost our organisation? o Who would benefit from having access to our information?

4 4 o What makes us secure against threats? o Is the behaviour of my staff enabling a strong security culture? o Are we ready to respond to a cyber security incident? Knowing the answers to these questions will help us all protect our networks. How we in government can partner more with the private sector to improve Australia s cyber security has been the key focus of our Cyber Security Review. As part of the Review we spoke with more than 190 private and public sector organisations, and sought specialist advice from an Independent Panel of Experts. During our consultations we heard that we need: o Strong cyber security leadership government and business leaders must work together to make the changes needed to improve national cyber security. We heard that this is not just an issue for the cyber security and ICT work forces or CIOs and CISOs. It is an issue for leaders, for CEOs and for boards. o It almost goes without saying that Australia s networks and systems need to be hard to compromise and resilient to cyber attacks. To successfully achieve this will require sustained and close government-private sector cooperation. This includes through sharing information about threats, working together to develop responses and exercising our responses so we are prepared for significant attacks. The need to share more information on threats was one of the most frequently raised issues during our review consultations. But as you all know, making our systems hard to compromise is not just about sharing threat information, detecting intrusions and implementing strong border security it is also about strong internal controls. We need to ensure malicious software

5 5 can t run and administrator privileges are protected. And patching our software quickly with updates, while sometimes tedious, makes a significant difference to our security. Those we have consulted with have told us it is important to promote these sorts of practices in baseline guidelines of good cyber security practice that all organisations can implement. This will help ensure all organisations we connect with have reasonable security and these connections will not increase our vulnerability. The need for connectivity is driving the need for better security across the board. As we all know, as people with a strong interest in this field, strong cyber defence requires multiple layers of protection, beyond fences, guards, swipe access cards and clever coding. It is also about good information security practices, training and educating all those we work with, having current and appropriate information security documentation and continually evaluating our networks for vulnerabilities. We know that we are vulnerable from insiders who may maliciously (or accidentally) do us harm as well as from external threats. And our cyber controls need to address these internal as well as external threats. o At a more global level, Australia also needs to work hard internationally to ensure we continue to have a free, open and secure internet. The connectivity of cyberspace opens up new opportunities internationally, but this is dependent on countries supporting access to the internet. This is not universally the case some see an open internet as a threat to their authority and control, and would prefer to limit its connectivity. Australia is working hard to counter these views, in close step with our allies and friends. A key way for us to achieve this is by helping to build confidence in the internet and capacity in cyber security, both globally and

6 6 closer to home. Regional organisations where Australia is demonstrating its cyber security leadership include the ASEAN Regional Forum and the Asia-Pacific Computer Emergency Response Team Steering Committee, which we are currently chairing. We also need to continue working with international partners to prevent and shut down cybercrime that targets Australians which often emanates from beyond our borders. We are already doing this but given the resourcefulness of cyber criminals, this cooperation needs to be agile and innovative and focus on both detecting and defeating the criminals. Finally, Australia can contribute to the global cyber solution and boost our economy at the same time by promoting the development and export of our cyber security products and services. The global cyber security market will be worth around A$140 billion by 2020, and we must encourage and support our local cyber security entrepreneurs to take advantage of this opportunity. o Australia is an innovative country that adopts technology and does quality research. We can use this to grow our cyber security business and develop innovative cyber security solutions that enable all Australian companies to diversify, grow and expand internationally through secure cyber connectivity. o Another key issue that those we have talked to have told us is that we need to increase cyber security skills in Australia. Everyone is suffering from a shortage of people with the right skills. This is a worldwide problem but we also need to address it locally. The sorts of ideas that have been raised we us include: Addressing cyber security skills shortages by intervening at all levels of the education system from schools to universities. We have also been told we need to get more people interested in cyber security careers.

7 7 One of the best ways to do this is to start early by encouraging children in primary and then high school to think about these sorts of careers and to take the right subjects to enable this. Following this up with appropriately targeted, tailored and promoted courses at universities and other tertiary institutions. o And we have been told we should focus on increasing the diversity of people interested in careers in cyber security. For example women are underrepresented in cyber security professionals. We need a larger percentage of the population interested in these careers in order to increase the number of people in this workforce. We also need to develop new cyber skills in current workforces and senior leaders. In addition to improving the number and skills of the cyber security workforce we have heard that we need to raise awareness more broadly about cyber security. It is concerning that studies have shown Australians are more likely than people in many other similar nations to click on malicious links or be infected by malicious software. We have a number of awareness raising initiatives but people have told us a more joined up approach is needed. So in conclusions we have been told that improving our cyber security can have a transformative influence on the Australian economy. If we increase trust in our information security and therefore trust in cyber space this will enable us to fully benefit from the opportunities of the internet age. o But this is not easy to achieve. o We need practical, realistic initiatives that can be achieved incrementally.

8 8 Our stakeholders have told us that business, government and academia should work together on this on equal terms. Getting our cyber security right has much broader benefits than protecting classified information or preserving government and business infrastructure from attack (although this is of course very important!). The economic implications of cyber security are profound. It is you in the audience today, and people like you who work and care about information security, who will be tackling these challenges and in doing so shaping our future. I hope to have a chance to talk to as many of you as possible today and get your views on the way forward. Thank you very much for the opportunity to be with you today. Visit the Cyber Security Review page to find out more about the Government s Cyber Security Review.

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

AUSTRALIA S CYBER SECURITY STRATEGY. Enabling innovation, growth & prosperity

AUSTRALIA S CYBER SECURITY STRATEGY. Enabling innovation, growth & prosperity AUSTRALIA S CYBER SECURITY STRATEGY Enabling innovation, growth & prosperity Australia s Cyber Security Strategy Commonwealth of Australia 2016 ISBN 978-1-925238-61-7 Australia s Cyber Security Strategy

More information

Australian Government Cyber Security Review

Australian Government Cyber Security Review Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and

More information

CYBER SECURITY STRATEGY AN OVERVIEW

CYBER SECURITY STRATEGY AN OVERVIEW CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without

More information

How To Manage Risk On A Scada System

How To Manage Risk On A Scada System Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document

More information

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity. Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND

More information

Overview. Introduction. Purpose. Goal. Perspectives (of our goal) Strategic Direction. Connected

Overview. Introduction. Purpose. Goal. Perspectives (of our goal) Strategic Direction. Connected 2 South Australia Connected Introduction Government is in the connections business. Everything we do ultimately comes down to better connecting the people of South Australia with the things they want and

More information

STRATEGIC SCIENCE AND RESEARCH PRIORITIES

STRATEGIC SCIENCE AND RESEARCH PRIORITIES STRATEGIC SCIENCE AND RESEARCH PRIORITIES At the inaugural meeting of the Commonwealth Science Council, members strongly supported the need and value of establishing science and research priorities, at

More information

COMMUNICATIONS ALLIANCE LTD. Department of the Prime Minister and Cabinet Consultation Paper. Cyber Security Review

COMMUNICATIONS ALLIANCE LTD. Department of the Prime Minister and Cabinet Consultation Paper. Cyber Security Review COMMUNICATIONS ALLIANCE LTD Department of the Prime Minister and Cabinet Consultation Paper Cyber Security Review 2 Page 2 of 9 EXECUTIVE SUMMARY Communications Alliance appreciates the opportunity to

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

THE HUMAN COMPONENT OF CYBER SECURITY

THE HUMAN COMPONENT OF CYBER SECURITY cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Cyber Security Solutions

Cyber Security Solutions Cyber Security Solutions Defending the Enterprise General Dynamics Information Technology defends mission-critical systems including government, health, finance, defence, large-enterprise and national

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM IIA South Event 16 th June 2015 Cyber, Social Media and IT Risks 1 st and 2 nd Line Perspective David Canham (BA) Hons, MIRM Agenda This evening we ll cover the following: Who, why and what? Traditional

More information

Connect Smart for Business SME TOOLKIT

Connect Smart for Business SME TOOLKIT Protect yourself online Connect Smart for Business SME TOOLKIT WELCOME To the Connect Smart for Business: SME Toolkit The innovation of small and medium sized enterprises (SMEs) is a major factor in New

More information

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy 2015 Action Plan A LIVING ACTION PLAN WITH ANNUAL REVIEWS New Zealand s Cyber Security Strategy provides a single cohesive framework to ensure that New Zealand is secure, resilient

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

SYMANTEC CYBERV ASSESSMENT SERVICE OVER THE HORIZON VISIBILITY INTO YOUR CYBER RESILIENCE MORE FOCUS, LESS RISK.

SYMANTEC CYBERV ASSESSMENT SERVICE OVER THE HORIZON VISIBILITY INTO YOUR CYBER RESILIENCE MORE FOCUS, LESS RISK. SYMANTEC CYBERV ASSESSMENT SERVICE OVER THE HORIZON VISIBILITY INTO YOUR CYBER RESILIENCE Cyberspace the always-on, technologically hyperconnected world offers unprecedented opportunities for connectivity,

More information

CYBER STREETWISE. Open for Business

CYBER STREETWISE. Open for Business CYBER STREETWISE Open for Business As digital technologies transform the way we live and work, they also change the way that business is being done. There are massive opportunities for businesses that

More information

Standing Council on Police and Emergency Management

Standing Council on Police and Emergency Management Standing Council on Police and Emergency Management Communiqué 29 June 2012 The Standing Council on Police and Emergency Management (SCPEM) met in Melbourne today, chaired by the Hon Peter Ryan MLA, Deputy

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing

More information

Cyber security the facts

Cyber security the facts Cyber security the facts By Dr Carolyn Patteson, Executive Manager, CERT Australia The cyber threat is real and ever present and every business is at risk. Australia s security and intelligence agencies

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Threat Intelligence. Benefits for the enterprise

Threat Intelligence. Benefits for the enterprise Benefits for the enterprise Contents Introduction Threat intelligence: a maturing defence differentiator Understanding the types of threat intelligence: from the generic to the specific Deriving value

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

CYBERSECURITY INDEX OF INDICES

CYBERSECURITY INDEX OF INDICES Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration

More information

National Cloud Computing Strategy. May 2013

National Cloud Computing Strategy. May 2013 National Cloud Computing Strategy May 2013 On 29 May 2013 The Minister for Broadband, Communications and the Digital Economy, Stephen Conroy, released the Government s National Strategy Cloud Computing

More information

Improving ACT Public High Schools and Colleges

Improving ACT Public High Schools and Colleges Improving ACT Public High Schools and Colleges A discussion paper to generate ideas Better schools will only come when those in schools dare to have dreams and work to make them a reality Caldwell and

More information

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks F-43 FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks Possible Ouestion Why has the Government not confronted China about cyber attacks including on DFAT, such as those aired

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Securing the Nation: Creating cyber security, resilience and readiness

Securing the Nation: Creating cyber security, resilience and readiness NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:

More information

Careers in Cyber Operations. Defence Signals Directorate

Careers in Cyber Operations. Defence Signals Directorate Careers in Cyber Operations Defence Signals Directorate 1 In a game where our adversaries operate with no rules and unknown boundary lines, you will be exploring the possibilities and inventing the seemingly

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Cybercrime in the Automotive Industry How to improve your business cyber security

Cybercrime in the Automotive Industry How to improve your business cyber security Cybercrime in the Automotive Industry How to improve your business cyber security Robert Morbin, Project Co-ordinator, SMMT Simon Kendall, Cyber Security, Department for Business, Innovation and Skills

More information

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days) Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an

More information

Security tips for the use of social media websites

Security tips for the use of social media websites CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Cyber-safety for Senior Australians. Inquiry Submission

Cyber-safety for Senior Australians. Inquiry Submission SUBMISSION NO. 32 Cyber-safety for Senior Australians Inquiry Submission The AISA Response to the Parliament s Joint Select Committee s call for submissions Date 23 March 2012 Page 1 Executive Summary:

More information

CIO, CISO and Practitioner Guidance IT Security Governance

CIO, CISO and Practitioner Guidance IT Security Governance June 2006 (Revision 1, August 2007) () 1 CIO, CISO and Practitioner Guidance Whatever your business, security and privacy are key matters that affect your enterprise and those dependent upon you. There

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was

More information

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack

More information

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private

More information

Great skills. Real opportunities.

Great skills. Real opportunities. Department of Education, Training and Employment 130107 Photography: Tony Phillips Great skills. Real opportunities. The Queensland Government reform action plan for further education and training Foreword

More information

Cybercrime Security Risks and Challenges Facing Business

Cybercrime Security Risks and Challenges Facing Business Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact

More information

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked

More information

The Australian Capital Territory in the Asian Century

The Australian Capital Territory in the Asian Century The Australian Capital Territory in the Asian Century August 2013 SUMMARY The Australian Government s Australia in the Asian Century White Paper has given added impetus to action the ACT government is

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following

More information

Australian Strategic Policy Institute National Security Dinner West Tower Suite, Level 35, Sofitel Hotel 25 Collins Street, Melbourne 21 August 2008

Australian Strategic Policy Institute National Security Dinner West Tower Suite, Level 35, Sofitel Hotel 25 Collins Street, Melbourne 21 August 2008 Australian Strategic Policy Institute National Security Dinner West Tower Suite, Level 35, Sofitel Hotel 25 Collins Street, Melbourne 21 August 2008 Introduction Thank you Chris it s a great pleasure to

More information

NAPCAN s strategy is to bring about the changes necessary in individual and community behaviour to stop child abuse and neglect before it starts by:

NAPCAN s strategy is to bring about the changes necessary in individual and community behaviour to stop child abuse and neglect before it starts by: The Director Cyber Safety Policy and Programs Department of Communications GPO Box 2154 CANBERRA ACT 2601 Dear Director, Re: Discussion Paper on Enhancing Online Safety for Children NAPCAN (National Association

More information

NEW ZEALAND S CYBER SECURITY STRATEGY

NEW ZEALAND S CYBER SECURITY STRATEGY Appendix 1 NEW ZEALAND S CYBER SECURITY STRATEGY June 2011 New Zealand Government 7 June 2011 ISBN: 978-0-478-38200-6 www.med.govt.nz/cyberstrategy MED11 Foreword from the Minister The Internet and digital

More information

Cyber Security key emerging risk Q3 2015

Cyber Security key emerging risk Q3 2015 Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more

More information

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

The UK Cyber Security Strategy. Report on progress December 2012. Forward Plans

The UK Cyber Security Strategy. Report on progress December 2012. Forward Plans The UK Cyber Security Strategy Report on progress December 2012 Forward Plans We are at the end of the first year of meeting the objectives outlined in the National Cyber Security Strategy. A great deal

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

ATTACHMENT. Response to the International Education Discussion Paper VICTORIA S FUTURE INDUSTRIES

ATTACHMENT. Response to the International Education Discussion Paper VICTORIA S FUTURE INDUSTRIES ATTACHMENT Response to the International Education Discussion Paper VICTORIA S FUTURE INDUSTRIES AUGUST 2015 Introduction There are over 34,000 international students living and/or studying at one of the

More information

Cyber Attacks: Securing Agencies ICT Systems

Cyber Attacks: Securing Agencies ICT Systems The Auditor-General Audit Report No.50 2013 14 Performance Audit Cyber Attacks: Securing Agencies ICT Systems Across Agencies Australian National Audit Office Commonwealth of Australia 2014 ISSN 1036 7632

More information

NNIT Cybersecurity. A new threat landscape requires a new approach

NNIT Cybersecurity. A new threat landscape requires a new approach NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities

More information

Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks

Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks Please cite this paper as: OECD (2012), Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks, OECD Digital Economy Papers, No. 210, OECD Publishing.

More information

AISA Response to the Department of Prime Minster and Cabinet Consultation Paper: Cybersecurity Strategy Review

AISA Response to the Department of Prime Minster and Cabinet Consultation Paper: Cybersecurity Strategy Review AISA Response to the Department of Prime Minster and Cabinet Consultation Paper: Cybersecurity Strategy Review 31 March 2015 AISA Cybersecurity Strategy Review Submission Page 1 Executive Summary The Australian

More information

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review About auda.au Domain Administration Ltd (auda) is the industry self regulatory, not for profit

More information

Australian Work Health and Safety Strategy 2012 2022. Healthy, safe and productive working lives

Australian Work Health and Safety Strategy 2012 2022. Healthy, safe and productive working lives Australian Work Health and Safety Strategy 2012 2022 Healthy, safe and productive working lives Creative Commons ISBN 978-0-642-78566-4 [PDF online] ISBN 978-0-642-78565-7 [Print] With the exception of

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Audit summary of Security of Infrastructure Control Systems for Water and Transport V I C T O R I A Victorian Auditor-General Audit summary of Security of Infrastructure Control Systems for Water and Transport Tabled in Parliament 6 October 2010 Background Infrastructure critical to the

More information

COMMISSION OF THE EUROPEAN COMMUNITIES

COMMISSION OF THE EUROPEAN COMMUNITIES EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, [ ] COM(2006) 251 COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

Western Australian Auditor General s Report. Information Systems Audit Report

Western Australian Auditor General s Report. Information Systems Audit Report Western Australian Auditor General s Report Information Systems Audit Report Report 10 June 2012 Auditor General s Overview The Information Systems Audit Report is tabled each year by my Office. It summarises

More information

Compliance Guide: ASD ISM OVERVIEW

Compliance Guide: ASD ISM OVERVIEW Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework

More information

Customer Service. 1 Good Practice Guide

Customer Service. 1 Good Practice Guide Customer Service 1 Good Practice Guide Contents Photography by OzShots Foreword 3 The application of this guide to employees in the public service 4 Core principles of customer service 4 Leading and modelling

More information

A global infrastructure to safeguard your business_

A global infrastructure to safeguard your business_ Global Security Services A global infrastructure to safeguard your business_ Global Solutions More than just peace of mind: increase confidence and reduce risk across your entire organisation_ How do you

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

DRAFT ECONOMIC DEVELOPMENT STRATEGY, RETAIL AND TOURISM ACTION PLANS PUBLIC EXHIBITION

DRAFT ECONOMIC DEVELOPMENT STRATEGY, RETAIL AND TOURISM ACTION PLANS PUBLIC EXHIBITION ITEM 2. FILE NO: DRAFT ECONOMIC DEVELOPMENT STRATEGY, RETAIL AND TOURISM ACTION PLANS PUBLIC EXHIBITION S038970 SUMMARY Sydney is Australia s largest and only global city. It is the leading knowledge-based

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Keeping out of harm s way in cyberspace

Keeping out of harm s way in cyberspace Keeping out of harm s way in cyberspace Martin Smith MBE FSyI Chairman and Founder The Security Company (International) Limited The Security Awareness Special Interest Group What is Cybercrime? Criminal

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical

More information

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Introduction This Advice provides an overview of the steps agencies need to take

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information