{"id":13418,"date":"2014-04-15T06:00:31","date_gmt":"2014-04-14T20:00:31","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=13418"},"modified":"2014-04-16T09:11:18","modified_gmt":"2014-04-15T23:11:18","slug":"cyber-maturity-in-the-asia-pacific-region","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/","title":{"rendered":"Cyber maturity in the Asia-Pacific region"},"content":{"rendered":"

\"Cyber<\/a>\u2018The Ukraine-Russia Cyber War is Heating Up<\/a>\u2019, \u2018Catastrophic Heartbleed bug exposes 60% of private internet data<\/a>\u2019, \u2018NSA surveillance program reaches \u2018into the past\u2019 to retrieve, replay phone calls<\/a>\u2019. The public discussion surrounding cyberspace is fraught with dire warnings, fear mongering and outright panic. The reality is that cyberspace is as complex and multifaceted as the tactile world in which it\u2019s entwined. While risks to privacy, assets, and even security are real, cyberspace also drives social mobility, economic empowerment, and connectivity. For this reason, to truly understand and act in cyberspace, a more comprehensive dialogue on the opportunities and pitfalls of the most unique of global commons must be developed.<\/p>\n

Today, ASPI\u2019s International Cyber Policy Centre releases its inaugural <\/span>Cyber Maturity in the Asia-Pacific Region 2014 <\/i>report<\/a> (PDF). The report attempts to capture this complexity and organise it in a digestible manner, using metrics to provide a snapshot through which government, business, and the public alike can garner an understanding of the cyber profile of regional actors. Cataloguing hardware and capabilities provides only a thin description of the cyber domain. Maturity on the other hand looks at the presence, implementation and operation of cyber-related structures, policies, legislation and organisations. These maturity indicators encompass whole-of-government policy and legislative structures, military organisation, business and digital economic strength and levels of cyber social awareness.<\/span><\/p>\n

The Asia-Pacific region is ideal for exploring the concept of cyber maturity. It has undergone tremendous economic growth, political transformation and social change. The development of cyberspace and the information and communications technology that powers it has been an integral part of the region\u2019s socioeconomic growth. The online environment is also growing rapidly in importance as an avenue for political and social expression in Asian societies. At the same time, the potential for conflict in the region is on the rise, as the traditional power brokers jostle for position. While it\u2019s clear that all the countries analysed are increasingly cognisant of cyberspace as a critical area, the approaches and priorities each adopts are diverse, and it\u2019s the exploration of each sector that proves most revealing.<\/span><\/p>\n

\"Cyber<\/a>

Cyber maturity weighted scores<\/p><\/div>\n

China received well-deserved high scores for international engagement and the military\u2019s role, but business-government digital dialogue, public awareness, and the vast gap in urban-rural connectivity are a drag on China\u2019s cyber maturity. Singapore is incredibly cyber savvy, but legislation that verges on censorship remains an area of concern. Myanmar suffers from a stark absence of infrastructure, but increased foreign investment in recent years, matched by ambitious government efforts, shows clear potential. Australia for its part leads the regional pack, with strong capabilities and international engagement. However a lack of whole-of-government strategy, ambiguity surrounding leadership and the need for an updated cyber strategy leave room for improvement.<\/p>\n

Oversimplifying the cyber domain as one where spooks, crooks, generals, and nefarious actors lurk in every corner presents a geography where conflict rules the day. But looking into the complexities of what cyberspace means, opens room for engagement, confidence-building, capacity-building and cooperation. While many paint the Asia-Pacific as a cauldron of conflict, likening it to pre-World War I Europe, conflict isn\u2019t inevitable, and the report shows there\u2019s incredible opportunity for governments, business, and even society as a whole to engage with regional partners. While likeminded states such as Japan, Singapore, United Kingdom, and United States provide the most opportunities for Australia, there are areas for engagement across the region.<\/span><\/p>\n

International engagement with China, military-to-military cooperation with India, and bolstering CERT-CERT dialogue with Indonesia, all offer avenues to collaborate. There\u2019s no doubt that cyber conflict is a real possibility in the Asia-Pacific, but as a global common it\u2019s international cooperation that\u2019ll secure cyberspace. Fighting cybercrime requires transnational responses, digital economies rely on an international marketplace, and social empowerment rises from connectivity. Cyberspace mirrors the conflicts and partnerships of the international community, and a mature approach to cyberspace must be equally all-encompassing.<\/span><\/p>\n

The <\/span>Cyber Maturity in the Asia-Pacific Region 2014 <\/i>report<\/a> (PDF) and infographic<\/a> is the first edition of an annual series that seeks to both inform and spur debate. Join the discussion <\/span>@ASPI_ICPC<\/a> #cybermaturity.<\/span><\/p>\n

Tobias Feakin\u00a0is a senior analyst at ASPI and director of ASPI\u2019s\u00a0International Cyber Policy Centre<\/a>. Kl\u00e9e Aiken and\u00a0<\/em>Jessica Woodall are analysts in the ICPC.\u00a0Images\u00a0(c) ASPI 2014.<\/em><\/em><\/em><\/em><\/em><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

\u2018The Ukraine-Russia Cyber War is Heating Up\u2019, \u2018Catastrophic Heartbleed bug exposes 60% of private internet data\u2019, \u2018NSA surveillance program reaches \u2018into the past\u2019 to retrieve, replay phone calls\u2019. The public discussion surrounding cyberspace is fraught …<\/p>\n","protected":false},"author":49,"featured_media":13421,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[143,391,169,777,95],"class_list":["post-13418","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-asia-pacific","tag-cyber","tag-cyber-crime","tag-cyber-maturity","tag-cyber-security"],"acf":[],"yoast_head":"\nCyber maturity in the Asia-Pacific region | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber maturity in the Asia-Pacific region | The Strategist\" \/>\n<meta property=\"og:description\" content=\"\u2018The Ukraine-Russia Cyber War is Heating Up\u2019, \u2018Catastrophic Heartbleed bug exposes 60% of private internet data\u2019, \u2018NSA surveillance program reaches \u2018into the past\u2019 to retrieve, replay phone calls\u2019. The public discussion surrounding cyberspace is fraught ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-14T20:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-04-15T23:11:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/04\/Cyber-metric-banner-cropped.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"703\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tobias Feakin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tobias Feakin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/04\/Cyber-metric-banner-cropped.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/04\/Cyber-metric-banner-cropped.jpg\",\"width\":703,\"height\":443},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/\",\"name\":\"Cyber maturity in the Asia-Pacific region | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/#primaryimage\"},\"datePublished\":\"2014-04-14T20:00:31+00:00\",\"dateModified\":\"2014-04-15T23:11:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber maturity in the Asia-Pacific region\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\",\"name\":\"Tobias Feakin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"caption\":\"Tobias Feakin\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber maturity in the Asia-Pacific region | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/","og_locale":"en_US","og_type":"article","og_title":"Cyber maturity in the Asia-Pacific region | The Strategist","og_description":"\u2018The Ukraine-Russia Cyber War is Heating Up\u2019, \u2018Catastrophic Heartbleed bug exposes 60% of private internet data\u2019, \u2018NSA surveillance program reaches \u2018into the past\u2019 to retrieve, replay phone calls\u2019. The public discussion surrounding cyberspace is fraught ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-04-14T20:00:31+00:00","article_modified_time":"2014-04-15T23:11:18+00:00","og_image":[{"width":703,"height":443,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/04\/Cyber-metric-banner-cropped.jpg","type":"image\/jpeg"}],"author":"Tobias Feakin","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Tobias Feakin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/04\/Cyber-metric-banner-cropped.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/04\/Cyber-metric-banner-cropped.jpg","width":703,"height":443},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/","url":"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/","name":"Cyber maturity in the Asia-Pacific region | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/#primaryimage"},"datePublished":"2014-04-14T20:00:31+00:00","dateModified":"2014-04-15T23:11:18+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-maturity-in-the-asia-pacific-region\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber maturity in the Asia-Pacific region"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd","name":"Tobias Feakin","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","caption":"Tobias Feakin"},"url":"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13418"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=13418"}],"version-history":[{"count":9,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13418\/revisions"}],"predecessor-version":[{"id":13454,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13418\/revisions\/13454"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/13421"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=13418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=13418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=13418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}