{"id":10426,"date":"2016-09-21T05:05:59","date_gmt":"2016-09-20T19:05:59","guid":{"rendered":"https:\/\/macquarietechnologygroup.com\/?p=10426"},"modified":"2024-07-29T11:49:53","modified_gmt":"2024-07-29T01:49:53","slug":"2016-year-focus-cyber-security-took-off-australia","status":"publish","type":"post","link":"https:\/\/macquarietechnologygroup.com\/news\/2016-year-focus-cyber-security-took-off-australia\/","title":{"rendered":"2016: The year focus on Cyber Security took off in Australia"},"content":{"rendered":"
As I made the journey across to Washington DC for the inaugural Australia-US Cyber Security Dialogue<\/a>, I reflected on just how much mileage there has been on the cyber security front in the last 6 months.\u00a0 I start the timeline in April when the Prime Minister, Malcolm Turnbull, launched his Cyber-Security Strategy<\/a>.\u00a0 This strategy had a long digestion period, partly driven by the fact that cyber security is a relatively new and evolving domain where there are few, if any, blueprints for the government to follow.\u00a0 In fact the April Strategy was the first in around 6 years and set the scene to focus on this important domain for the nation.<\/p>\n Since April, we have had a stream of events and actions that has propelled Cyber Security to the forefront.\u00a0 A few positive ones like initiatives designed to raise the cyber security stature of all Australians, both public and private sectors and our citizens.\u00a0 Collaboration centres to drive innovation and intelligence sharing, and negative events like the on-line Census that elevated one such cyber event type \u2013 Distributed Denial of Service<\/a> (DDOS) \u2013 into the nation\u2019s vocabulary.<\/p>\n As we move forward, I see the need for a five\u00a0pronged approach to Cyber-security:<\/p>\n This approach can be applied equally well at a business, or government agency level, as it can be to our Nation as a whole.\u00a0 And as we look to take on a leadership role in our region, they represent clear steps to assess where we need to focus that leadership energy.\u00a0 It\u2019s this last regional dimension that is particularly exciting for Australia and what motivates me personally when I enter into this week\u2019s dialogue.<\/p>\n When applying the above approach to the Australian Government, we now have a cyber security strategy in place, its now about the focus on the right culture and mindset to deliver.\u00a0 We have numerous elements in place\u2026 but there are still gaps.\u00a0 We still have a few government departments that look for every opportunity to bypass the advise of their own cyber experts \u2013 Australian Signals Directorate (ASD) as an example.\u00a0 This is unhelpful to a culture when we need everyone working together on a collective outcome.\u00a0 Ultimately it\u2019s the weakest link that drives how secure we are as a nation.\u00a0 We must have a tighter approach to being aligned here as the consequences are real and significant \u2013 reputational and financial.<\/p>\n Further, the Australian government has recognised just how important the cyber world is for jobs.\u00a0 We can’t outsource this domain to low cost jurisdictions that themselves may be the source of attacks and espionage.\u00a0 It\u2019s a key area for jobs for the future for Australia \u2013 and highly skilled ones that demand big salaries.\u00a0 We also need to have deep capabilities within government and the private sector so that we can play our part, and get the respect of our Allies, especially the USA, in the regional and global domain<\/p>\n","protected":false},"excerpt":{"rendered":" As I made the journey across to Washington DC for the inaugural Australia-US Cyber Security Dialogue, I reflected on just how much mileage there has been on the cyber security front in the last 6 months.\u00a0 I start the timeline in April when the Prime Minister, Malcolm Turnbull, launched his Cyber-Security Strategy.\u00a0 This strategy had […]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"1752,1204,4104,3492,2985,1725","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[261,288,273,71,289,290,64,291],"class_list":["post-10426","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-aidan-tudehope","tag-australia-cyber-security","tag-australian-government","tag-cyber-security","tag-cyber-security-capability","tag-cyber-security-government","tag-government","tag-public-sector-cyber-security"],"acf":[],"yoast_head":"\n5 Pronged Approach to Cyber Security<\/h3>\n
\n
Australian Government<\/h3>\n