- The Strategist - https://aspistrategist.ru -

Cyber wrap

Posted By on August 27, 2014 @ 14:30

Michael Daniel is a Special Assistant to the President and the Cybersecurity Coordinator [1]

This week, Australian government and private sector cooperation on cybersecurity appears to have picked up pace. Speaking at a summit [2] in Sydney, Mike Rothery, First Assistant Secretary at the Attorney-General’s Department’s National Security Resilience Policy Division, revealed that an ‘outreach to industry had identified a pressing need for tangible risk assessment tools as opposed to an ever-extending laundry list of potential threats’. Julian Bajkowski writes [3] that ‘the government’s wider cybersecurity outreach has been fostering a channel of boardroom diplomacy between industry and senior representatives of the ASIO, ASD and CERT’. The push is intended to encourage private-sector executives to help protect the national interest by assessing their own risks and bolstering defences accordingly.

For more on that discussion, Stilgherrian explores [4] the vulnerabilities in Australia’s modern industrial economy, looking at SCADA systems in particular. He says that ‘consultations between the Australian government and industry have revealed a patchy security landscape’. On phys.org, Phil Ciciora looks [5] at a study published by the University of Illinois that places public–private information-sharing frameworks at the centre of combating cybersecurity threats. The researchers [6] argue the need to ‘encourage the development of a ‘Circle of Trust’, bringing the public and private sectors together to resolve cybersecurity threats more effectively’.

To the region now, where Mihoko Matsubara, senior cyber security analyst at the Pacific Forum CSIS discusses [7] on East Asia Forum what Japan’s new defence policy means for international cooperation on cybersecurity. Despite constraints, such as there being no internationally-agreed definition of ‘armed attack’ in cyberspace upon which to base the right to collective self-defence, Matsubara observes that ‘does not mean that the reinterpretation of the Japanese constitution prohibits Japan from contributing to other countries’ cyber defences’.

In Singapore, the Infocomm Development Authority [8], a statutory board that charts Singapore’s transformation into a global IT hub, will set up a Monitoring and Operations Control Centre [9] to help the government guard against, and respond to, security threats. ‘Following a wave of cyber security breaches, Singapore needs to ensure its security measures stay updated and can counter increasing threats’, Minister for Communications and Information Yaacob Ibrahim told a seminar on Tuesday.

In Indonesia, Australia’s Justice Minister Michael Keenan held counterterrorism and crime co-operation talks last week at the Jakarta Centre for Law Enforcement Cooperation in Semarang. Mr Keenan announced further support for the centre and an agreement [10] that ‘lays out the strategic, formal framework for ongoing cooperation between Australia’s and Indonesia’s two National Police forces’. The centre [11] runs training programs for police officers across the region in areas including cybercrime. For more on Australia–Indonesia police cooperation, see David Connery, Natalie Sambhi and Michael McKenzie’s piece here [12] on The Strategist, and their related ASPI report [13].

Further afield, the question of whether NATO needs a stronger policy against cyber threats has come to prominence in recent weeks. While NATO has announced its intention to include cyber attacks in its Washington Treaty under Article 5, members have yet to reach an agreement [14] on how that article should be applied. James G. Stavridis and Dave Weinstein argue [15] on The Boston Globe that the Treaty needs to ‘define exactly what constitutes cyber aggression, and how NATO members, individually or collectively, will respond’. Edgar Buckley and Ioan Pascu oppose [16] ‘spelling out in advance any specific conditions for invoking Article 5’ and say that ‘NATO should judge each situation as it arises’.

In the US, White House cyber czar Michael Daniel [17] has come under criticism [18] for his comments [19] on the technical vs policy cybersecurity divide. ‘Being too down in the weeds at the technical level could actually be a little bit of a distraction,’ he said in a recent interview. His position doesn’t, on the face of it, sound unreasonable: policy should be made by managers, not by tech-heads.

Simon Hansen [20] is a research intern in ASPI’s International Cyber Policy Centre [21]. Image courtesy of Flickr user Center for Strategic and International Studies [22].



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /cyber-wrap-39/

URLs in this post:

[1] Image: https://aspistrategist.ru/wp-content/uploads/2014/08/8494284435_79a8eb2b53_z.jpg

[2] summit: http://www.gartner.com/technology/summits/apac/security/

[3] writes: http://www.governmentnews.com.au/2014/08/plain-english-reboot-government-cyber-security-outreach/

[4] explores: http://www.zdnet.com/mining-logistics-utilities-least-ready-to-face-threats-7000032960/

[5] looks: http://phys.org/news/2014-08-deter-cyberattacks-public-private-partnership.html

[6] researchers: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2135618

[7] discusses: http://www.eastasiaforum.org/2014/08/21/collective-self-defence-what-japans-new-defence-policy-means-for-international-cooperation-on-cyber-security/

[8] Infocomm Development Authority: http://www.ida.gov.sg/

[9] Monitoring and Operations Control Centre: http://www.channelnewsasia.com/news/singapore/government-to-boost-cyber/1330568.html

[10] agreement: http://www.ministerjustice.gov.au/Mediareleases/Pages/2014/ThirdQuarter/22August2014-ADecadeOfStrengtheningLawEnforcementTiesWithIndonesia.aspx

[11] centre: http://www.jclec.com/

[12] here: https://aspistrategist.ru/police-cooperation-can-help-restart-the-relationship/

[13] their related ASPI report: https://www.aspistrategist.ru/publications/a-return-on-investment-the-future-of-police-cooperation-between-australia-and-indonesia

[14] agreement: http://insidecybersecurity.com/Cyber-General/Cyber-Public-Content/nato-debates-policy-for-cyber-defense-of-public-and-private-sectors/menu-id-1089.html

[15] argue: http://www.bostonglobe.com/opinion/2014/08/22/nato-needs-strong-policy-against-cyber-threats/cetoHkprGGZHMUAjfOhjHJ/story.html

[16] oppose: http://www.atlanticcouncil.org/publications/articles/how-to-avoid-wars-nato-s-article-5-and-strategic-reassurance

[17] Michael Daniel: http://www.govinfosecurity.com/who-michael-daniel-a-4784

[18] criticism: http://www.vox.com/2014/8/21/6053819/white-house-cybersecurity-czar-brags-about-his-lack-of-technical

[19] comments: http://www.govinfosecurity.com/interviews/michael-daniels-path-to-white-house-i-2422

[20] Simon Hansen: https://www.aspistrategist.ru/about-aspi/aspi-staff/interns/simon-hansen

[21] International Cyber Policy Centre: http://cyberpolicy.aspistrategist.ru/

[22] Center for Strategic and International Studies: https://www.flickr.com/photos/csis_er/8494284435

Copyright © 2024 The Strategist. All rights reserved.