{"id":12441,"date":"2014-02-24T12:15:21","date_gmt":"2014-02-24T01:15:21","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=12441"},"modified":"2014-02-25T10:17:39","modified_gmt":"2014-02-24T23:17:39","slug":"cybersecurity-by-executive-order","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/","title":{"rendered":"Cybersecurity by executive order"},"content":{"rendered":"

\"President<\/a><\/p>\n

Today ASPI has released a Strategic Insight<\/em><\/a>\u00a0on\u00a0President Obama’s cybersecurity executive order. The report breaks down the challenges, criticisms, and successes of the effort to date, before offering clear lessons from the US experience that can be applied to the Australian context. Here’s the executive summary:<\/p>\n

On 12\u00a0February 2014, the US National Institute of Standards and Technology (NIST) released the Framework for Improving Critical Infrastructure Cybersecurity<\/a>, the flagship accomplishment of the Obama administration\u2019s 2013 cybersecurity Executive Order<\/a>. Just weeks before the White House announced the order, the then Australian Prime Minister Julia Gillard made an equally exciting declaration introducing the Australian Cyber Security Centre<\/a> (ACSC). One year on, the contrast between the two efforts is stark.<\/p>\n

Facing years of congressional inaction on cyber issues, President Obama chose to take executive action on this critical national security issue. Executive Order 13636 set in motion a range of cross-governmental efforts to drive improvements to America\u2019s critical infrastructure cybersecurity, with an emphasis on public\u2013private partnerships.<\/p>\n

Although legislative malaise continues to mar progress, the US administration\u2019s cyber efforts are effective in laying out clear milestones and definitive timeframes to keep the gears of government moving and to measure progress. With the launch of the NIST framework, the merits of the effort will face further scrutiny. But efforts to harmonise priorities across the US Government and the commitment to engaging the private sector will ensure that the US has, at the very least, taken a significant first step forward in critical infrastructure cybersecurity.<\/p>\n

Similarly, the ACSC offers Australia a promising road forward to improve public\u2013private partnerships in cyberspace. However, with the \u2018Coming soon!\u2019 sign gathering dust and cyber efforts retreating behind the veil of government, Canberra needs to recommit to cyberspace.<\/p>\n

The US and Australia have common interests in developing a robust partnership between the government and private sector to develop whole-of-system cybersecurity. The Obama administration\u2019s efforts, while far from perfect, offer critical lessons that the Australian Government can adopt and adapt to improve system-wide cybersecurity and ensure that the ACSC is a successful endeavour. To move beyond political optics, the ACSC must embrace existing best practices, commit to meaningful public\u2013private partnerships, and set a pragmatic forward strategy.<\/p>\n

In any truly two-way dialogue on cybersecurity, the private sector must be equal participants. Efforts to streamline security clearances for critical private-sector actors, a dedicated public\u2013private secondment scheme, industry protections, and a collaborative standards process with clear incentives are needed to ensure that public\u2013private partnerships transcend simple lip service. In a sector as dynamic as cybersecurity, it\u2019s essential that efforts are underscored by flexibility and resilience and that the private sector is meaningfully engaged in the conversation rather than dictated to.<\/p>\n

At the same time, the government must hold itself to higher standards. A clear roadmap for whole-of-government cybersecurity policy is needed to provide direction and offer markers by which to measure success. Coordinating this effort will require that ownership of the policy area is reaffirmed, but also that power remains devolved to the most effective departments and agencies. Fixed deadlines and clearer leadership and coordination will not only improve intragovernmental efforts on cybersecurity, but also provide clarity for the private sector, improving confidence and collaboration.<\/p>\n

The ACSC offers the Australian Government a real opportunity not only to demonstrate that it takes cybersecurity seriously, but also to take practical steps to improve whole-of-system cooperation and security. It\u2019s up to the current government to be responsible stewards of this effort and transform the ACSC into a truly effective mechanism for intragovernmental and public\u2013private cooperation and collaboration on cyber issues. To do this, the Abbott government should channel the pragmatic steps outlined in the US Executive Order, pre-empt its weaknesses in privacy and liability protection, and put some weight behind the claim that Australia is indeed a regional cyberpower.<\/p>\n

Kl\u00e9e Aiken is\u00a0an analyst in ASPI\u2019s\u00a0International Cyber Policy Centre<\/a>. Image courtesy of the White House<\/a>.<\/em><\/em><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Today ASPI has released a Strategic Insight\u00a0on\u00a0President Obama’s cybersecurity executive order. The report breaks down the challenges, criticisms, and successes of the effort to date, before offering clear lessons from the US experience that can …<\/p>\n","protected":false},"author":153,"featured_media":12443,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[176,391,95],"class_list":["post-12441","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-barack-obama","tag-cyber","tag-cyber-security"],"acf":[],"yoast_head":"\nCybersecurity by executive order | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity by executive order | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Today ASPI has released a Strategic Insight\u00a0on\u00a0President Obama’s cybersecurity executive order. The report breaks down the challenges, criticisms, and successes of the effort to date, before offering clear lessons from the US experience that can ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-24T01:15:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-02-24T23:17:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/02\/Obama-SOTU.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"654\" \/>\n\t<meta property=\"og:image:height\" content=\"436\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/02\/Obama-SOTU.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/02\/Obama-SOTU.jpg\",\"width\":654,\"height\":436,\"caption\":\"President Barack Obama delivers the State of the Union address on 12 Feb 2013. Earlier that day he had signed Executive Order 13636, aimed at improving critical infrastructure cybersecurity.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/\",\"name\":\"Cybersecurity by executive order | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/#primaryimage\"},\"datePublished\":\"2014-02-24T01:15:21+00:00\",\"dateModified\":\"2014-02-24T23:17:39+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity by executive order\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity by executive order | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity by executive order | The Strategist","og_description":"Today ASPI has released a Strategic Insight\u00a0on\u00a0President Obama’s cybersecurity executive order. The report breaks down the challenges, criticisms, and successes of the effort to date, before offering clear lessons from the US experience that can ...","og_url":"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-02-24T01:15:21+00:00","article_modified_time":"2014-02-24T23:17:39+00:00","og_image":[{"width":654,"height":436,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/02\/Obama-SOTU.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/02\/Obama-SOTU.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/02\/Obama-SOTU.jpg","width":654,"height":436,"caption":"President Barack Obama delivers the State of the Union address on 12 Feb 2013. Earlier that day he had signed Executive Order 13636, aimed at improving critical infrastructure cybersecurity."},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/","url":"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/","name":"Cybersecurity by executive order | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/#primaryimage"},"datePublished":"2014-02-24T01:15:21+00:00","dateModified":"2014-02-24T23:17:39+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cybersecurity-by-executive-order\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity by executive order"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12441"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=12441"}],"version-history":[{"count":7,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12441\/revisions"}],"predecessor-version":[{"id":12470,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12441\/revisions\/12470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12443"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=12441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=12441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=12441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}