{"id":10435,"date":"2016-09-30T00:25:01","date_gmt":"2016-09-29T13:25:01","guid":{"rendered":"https:\/\/macquarietechnologygroup.com\/?p=10435"},"modified":"2023-03-01T16:37:16","modified_gmt":"2023-03-01T05:37:16","slug":"australian-cyber-security-capability","status":"publish","type":"post","link":"https:\/\/macquarietechnologygroup.com\/news\/australian-cyber-security-capability\/","title":{"rendered":"Building a strong technology and cyber security capability for Australia"},"content":{"rendered":"
In my last blog<\/a> I put forward a 5 pronged approach to cyber security.\u00a0There has been much discussion this week in Washington DC at the AU-US Cyber Security Dialogue about the third element \u2013 \u201cBuilding a strong technology and security capability\u201d<\/a>.<\/p>\n While there is a strong recognition by all that a strong cyber security capability requires a genuine public-private partnership, in part because much of a nations critical infrastructure and cyber capabilities resides within the private sector.\u00a0 The challenge is that such partnerships and open dialogues don\u2019t come naturally to many involved.<\/p>\n Nations and governments come from decades of ingrained secrecy around security, and now that we need to collaborate broadly for cyber, it\u2019s not easy.\u00a0 I\u2019ve seen it first hand, that despite the best intentions and top level support, when things go wrong, the drawbridge goes up and the shutters down.\u00a0 Issues get resolved not in a collaborative way, but rather within a closed group that often excludes leveraging the private sector.\u00a0 In the same vein, dialogues often only exist under formal structures rather than a free flowing natural manner, both ways.<\/p>\n It will take time to change his ingrained culture but this is what we need to do if we are going to get it right.\u00a0 As much research would suggest \u201cCulture eats strategy for Breakfast\u201d.\u00a0 Our nation\u2019s problem is that time is against us, we need to increase our risk taking to keep the drawbridges from going up if we are going to win.<\/p>\n <\/p>\n In an area that I am personally very familiar with, we do have examples of private-public partnerships that we can now turn into exemplars on how to do it right.\u00a0 The AU Government\u2019s Secure Internet Gateway (SIG) policy platform is an example of a partnership which has much of the right pillars in place.<\/p>\n Here, the Government chose to significantly raise its own cyber security stature by consolidating the number of internet connection points across government agencies, creating minimum standards of what is acceptable security, made it clear that the entire government needed to embrace, and leveraged the private sector to bring the skills, infrastructure and operational excellence to the table.\u00a0 Once implemented, this framework allowed the government to engage with a smaller number of private sector providers who would have an amplified impact both up and downstream.<\/p>\n This engagement was done by many arms of government and most notably by the Australian Cyber Security Centre (ACSC).\u00a0 It also created a platform that can be leveraged as the government seeks to invest, evolve and innovate further, at a technology, policy and collaboration level.<\/p>\n <\/p>\n While this model has been successful, its real opportunity to be a national exemplar is a few steps away.\u00a0 One such step, is that we need to get all levels of government on board.\u00a0 We can\u2019t have AU States for example at varying levels of interest and commitment to cyber.\u00a0 Nor does it make sense for them to create their own approach as if somehow cyber security is different at a state level and thus needs its own unique approach.<\/p>\n The AU States need to embrace, without exception, the blueprint created by the Secure Internet Gateway (SIG) policy platform, together with the adoption of the Australian Signals Directorate\u2019s Protective Security Policy Framework\u00a0(PSPF) in full if we are going to win the cyber battle, and have the right to be a leader in this domain in the region.<\/p>\n And even more profound, it will bring us closer to removing the digital barriers that make it so hard for different agencies across different levels of government to communicate, share and collaborate.<\/p>\n","protected":false},"excerpt":{"rendered":" In my last blog I put forward a 5 pronged approach to cyber security.\u00a0There has been much discussion this week in Washington DC at the AU-US Cyber Security Dialogue about the third element \u2013 \u201cBuilding a strong technology and security capability\u201d. Keeping the Drawbridges Down While there is a strong recognition by all that a […]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[13],"tags":[56,261,288,71,509,289,290,64,291],"class_list":["post-10435","post","type-post","status-publish","format-standard","hentry","category-articles","tag-acsc","tag-aidan-tudehope","tag-australia-cyber-security","tag-cyber-security","tag-cyber-security-australia","tag-cyber-security-capability","tag-cyber-security-government","tag-government","tag-public-sector-cyber-security"],"acf":[],"yoast_head":"\nKeeping the Drawbridges Down<\/strong><\/h3>\n
Creating Public-Private Sector Cyber Security Exemplars<\/strong><\/h3>\n
A Single Public Sector Approach<\/strong><\/h3>\n