{"id":14502,"date":"2014-06-25T12:15:56","date_gmt":"2014-06-25T02:15:56","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=14502"},"modified":"2014-06-26T10:23:53","modified_gmt":"2014-06-26T00:23:53","slug":"cyber-wrap-32","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Jason<\/a><\/p>\n

It\u2019s a grim picture in this week\u2019s cyber wrap as news of attacks and vulnerabilities pile up. According to the Australian Signals Directorate (ASD), foreign-state sponsored cyberattacks on Australian targets have surged<\/a> by 21%, with thousands more likely unreported. The ASD Cyber Security Picture 2013<\/a> is chock-full of interesting statistics, explores how adversaries have diversified their tradecraft, and offers a critical warning that supply chain, contractor and third party vulnerability could compromise individuals\u2019 personal information security.<\/p>\n

This uptick of cyber malfeasance was certainly on show last week, with the New York Times<\/i> exploring<\/a> the increased popularity of cyber extortion schemes like those that hit Feedly and Evernote in recent days. Meanwhile, Hong Kong\u2019s unofficial referendum<\/a> on chief executive nominations was hit by \u2018one of the largest and most persistent\u2019 distributed-denial-of-service (DDoS) attacks ever, while news broke of state-sponsored attacks targeting 75 US airports, two falling to the advanced persistent threat (APT) operation.<\/p>\n

Increasingly public cyber incidents have spurred the business community into action. Unfortunately, the legal scope for the kind of action<\/a> businesses can take remains muddled, with questions surrounding honey-pot liability and the right to retaliate. With the default Department of Justice response to corporate retaliation\u2014\u2018Oh wow, now I have two crimes\u2019\u2014many companies are turning to insurance to limit the cyber damage to their tangible bottom-lines. Although cyber insurance is hyped as a booming market, the reality is that the cyberinsurance industry is a mess<\/a>. Even in the vaunted critical infrastructure sector, underwriters cite a lack of data points as a major hindrance to cyber insurance. For instance, Carter Schoenberg<\/a> points out that \u2018Flo\u2019 (a well-known character on US insurance ads) certainly doesn\u2019t know her way around cyber insurance, however he does offer a few helpful hints.<\/p>\n

Although countries like India are scrambling to boost their cybermaturity<\/a>, the booming private sector demand for skilled cybersecurity professionals has left governments struggling to secure their own systems. Despite a title sourced from the turn of the millennium, RAND\u2019s report H4CKER5 WANTED<\/a>, has pertinent, contemporary findings. The report finds scarcity, high competition, and even crisis in the cybersecurity labour market. However, with educational initiatives already in-place \u2018the best steps may already have been taken\u2019 and it\u2019ll simply be a matter of time before the labour lag catches up with market demand.<\/p>\n

The French Minist\u00e8re de la D\u00e9fense has instituted its own response: \u00a0France is circumventing the cyber labour market altogether by looking to train its own cadre of cyber defence experts<\/a>. While other governments could easily adopt this measure, in the US a skilled workforce isn\u2019t the only government challenge in cyberspace. The Federal Bureau of Investigations<\/a> has been proverbially caught NIFOC with an FOI release of its official glossary of \u2018Twitter shorthand\u2019 which has left many questioning, AYFKMWTS?<\/p>\n

Of course, it\u2019s not all doom and gloom. With cyber experts worldwide working to improve cyber security, policy, education, and awareness, there\u2019s always hope for the future of cyberspace. The ASPI International Cyber Policy Centre hosted<\/a> one such thought leader last week when it welcomed Jason Healey<\/a>\u00a0(pictured above), Director of the Cyberstatecraft Initiative at the Atlantic Council in Washington, DC.<\/p>\n

Jason\u2019s presentation looked to the history of cyber conflict<\/a> to draw lessons for today\u2019s cyber cohort. Three key lessons included 1) the constant dynamics of cyber conflict, despite changing technology levels, 2) the consistent overestimation of the impact of cyber attacks, which has led to a focus on disruptive attacks at the expense of more prevalent issues such as cyber espionage, and 3) that the more strategically significant a cyber conflict, the more similar it is to conflicts in the air, on land, and on the sea.<\/p>\n

Following the short presentation, Jason was joined by Andrew Bewick, General Manager, Defence at IBM and Justin Bassi, National Security Advisor at the Office of the Attorney-General for an engaging discussion moderated by ICPC Director Tobias Feakin. The conversation touched on the need to convince senior policymakers of the importance of cyber issues, the critical role for education and awareness raising, as well as the need for the private sector to drive the issue forward. Live tweets from the event can be found @ASPI_ICPC<\/a>.<\/p>\n

Lastly, ICANN50 wraps up in London tomorrow. Keep your eyes on London50<\/a> for releases from the event and on the Strategist<\/i> next week for a special edition Governing the Net<\/a> overview of what went down.<\/p>\n

Kl\u00e9e Aiken is an analyst in<\/em>\u00a0ASPI\u2019s\u00a0International Cyber Policy Centre<\/a>.<\/em><\/em><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

It\u2019s a grim picture in this week\u2019s cyber wrap as news of attacks and vulnerabilities pile up. According to the Australian Signals Directorate (ASD), foreign-state sponsored cyberattacks on Australian targets have surged by 21%, with …<\/p>\n","protected":false},"author":153,"featured_media":14504,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[],"class_list":["post-14502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"It\u2019s a grim picture in this week\u2019s cyber wrap as news of attacks and vulnerabilities pile up. According to the Australian Signals Directorate (ASD), foreign-state sponsored cyberattacks on Australian targets have surged by 21%, with ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-25T02:15:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-06-26T00:23:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/06\/IMG_6730-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/06\/IMG_6730.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/06\/IMG_6730.jpg\",\"width\":5184,\"height\":3456,\"caption\":\"Jason Healey\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/#primaryimage\"},\"datePublished\":\"2014-06-25T02:15:56+00:00\",\"dateModified\":\"2014-06-26T00:23:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"It\u2019s a grim picture in this week\u2019s cyber wrap as news of attacks and vulnerabilities pile up. According to the Australian Signals Directorate (ASD), foreign-state sponsored cyberattacks on Australian targets have surged by 21%, with ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-06-25T02:15:56+00:00","article_modified_time":"2014-06-26T00:23:53+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/06\/IMG_6730-1024x683.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/06\/IMG_6730.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/06\/IMG_6730.jpg","width":5184,"height":3456,"caption":"Jason Healey"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/#primaryimage"},"datePublished":"2014-06-25T02:15:56+00:00","dateModified":"2014-06-26T00:23:53+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-32\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14502"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=14502"}],"version-history":[{"count":8,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14502\/revisions"}],"predecessor-version":[{"id":14520,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14502\/revisions\/14520"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/14504"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=14502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=14502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=14502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}