{"id":15451,"date":"2014-08-27T14:30:21","date_gmt":"2014-08-27T04:30:21","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=15451"},"modified":"2014-08-28T14:32:38","modified_gmt":"2014-08-28T04:32:38","slug":"cyber-wrap-39","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
\"Michael<\/a><\/figure>\n

This week, Australian government and private sector cooperation on cybersecurity appears to have picked up pace. Speaking at a summit<\/a> in Sydney, Mike Rothery, First Assistant Secretary at the Attorney-General\u2019s Department\u2019s National Security Resilience Policy Division, revealed that an \u2018outreach to industry had identified a pressing need for tangible risk assessment tools as opposed to an ever-extending laundry list of potential threats\u2019. Julian Bajkowski writes<\/a> that \u2018the government\u2019s wider cybersecurity outreach has been fostering a channel of boardroom diplomacy between industry and senior representatives of the ASIO, ASD and CERT\u2019. The push is intended to encourage private-sector executives to help protect the national interest by assessing their own risks and bolstering defences accordingly.<\/p>\n

For more on that discussion, Stilgherrian explores<\/a> the vulnerabilities in Australia\u2019s modern industrial economy, looking at SCADA systems in particular. He says that \u2018consultations between the Australian government and industry have revealed a patchy security landscape\u2019. On phys.org, Phil Ciciora looks<\/a> at a study published by the University of Illinois that places public\u2013private information-sharing frameworks at the centre of combating cybersecurity threats. The researchers<\/a> argue the need to \u2018encourage the development of a ‘Circle of Trust’, bringing the public and private sectors together to resolve cybersecurity threats more effectively\u2019.<\/p>\n

To the region now, where Mihoko Matsubara, senior cyber security analyst at the Pacific Forum CSIS discusses<\/a> on East Asia Forum<\/em> what Japan\u2019s new defence policy means for international cooperation on cybersecurity. Despite constraints, such as there being no internationally-agreed definition of \u2018armed attack\u2019 in cyberspace upon which to base the right to collective self-defence, Matsubara observes that \u2018does not mean that the reinterpretation of the Japanese constitution prohibits Japan from contributing to other countries\u2019 cyber defences\u2019.<\/p>\n

In Singapore, the Infocomm Development Authority<\/a>, a statutory board that charts Singapore\u2019s transformation into a global IT hub, will set up a Monitoring and Operations Control Centre<\/a> to help the government guard against, and respond to, security threats. \u2018Following a wave of cyber security breaches, Singapore needs to ensure its security measures stay updated and can counter increasing threats\u2019, Minister for Communications and Information Yaacob Ibrahim told a seminar on Tuesday.<\/p>\n

In Indonesia, Australia\u2019s Justice Minister Michael Keenan held counterterrorism and crime co-operation talks last week at the Jakarta Centre for Law Enforcement Cooperation in Semarang. Mr Keenan announced further support for the centre and an agreement<\/a> that \u2018lays out the strategic, formal framework for ongoing cooperation between Australia’s and Indonesia’s two National Police forces\u2019. The centre<\/a> runs training programs for police officers across the region in areas including cybercrime. For more on Australia\u2013Indonesia police cooperation, see David Connery, Natalie Sambhi and Michael McKenzie\u2019s piece here<\/a> on The Strategist<\/em>, and their related ASPI report<\/a>.<\/p>\n

Further afield, the question of whether NATO needs a stronger policy against cyber threats has come to prominence in recent weeks. While NATO has announced its intention to include cyber attacks in its Washington Treaty under Article 5, members have yet to reach an agreement<\/a> on how that article should be applied. James G. Stavridis and Dave Weinstein argue<\/a> on The Boston Globe<\/em> that the Treaty needs to \u2018define exactly what constitutes cyber aggression, and how NATO members, individually or collectively, will respond\u2019. Edgar Buckley and Ioan Pascu oppose<\/a> \u2018spelling out in advance any specific conditions for invoking Article 5\u2019 and say that \u2018NATO should judge each situation as it arises\u2019.<\/p>\n

In the US, White House cyber czar Michael Daniel<\/a> has come under criticism<\/a> for his comments<\/a> on the technical vs policy cybersecurity divide. \u2018Being too down in the weeds at the technical level could actually be a little bit of a distraction,\u2019 he said in a recent interview. His position doesn\u2019t, on the face of it, sound unreasonable: policy should be made by managers, not by tech-heads.<\/p>\n

Simon Hansen<\/em><\/span><\/a>\u00a0is a research intern in ASPI\u2019s<\/em>\u00a0<\/span>International Cyber Policy Centre<\/em><\/span><\/a>. Image courtesy of Flickr user Center for Strategic and International Studies<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

This week, Australian government and private sector cooperation on cybersecurity appears to have picked up pace. Speaking at a summit in Sydney, Mike Rothery, First Assistant Secretary at the Attorney-General\u2019s Department\u2019s National Security Resilience Policy …<\/p>\n","protected":false},"author":214,"featured_media":15452,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391,95,8,756,135,261,484,50],"class_list":["post-15451","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber","tag-cyber-security","tag-indonesia","tag-indonesian-national-police","tag-japan","tag-nato","tag-private-sector","tag-singapore"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"This week, Australian government and private sector cooperation on cybersecurity appears to have picked up pace. Speaking at a summit in Sydney, Mike Rothery, First Assistant Secretary at the Attorney-General\u2019s Department\u2019s National Security Resilience Policy ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-27T04:30:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-08-28T04:32:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/8494284435_79a8eb2b53_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Hansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Hansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/8494284435_79a8eb2b53_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/8494284435_79a8eb2b53_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"Michael Daniel is a Special Assistant to the President and the Cybersecurity Coordinator\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/#primaryimage\"},\"datePublished\":\"2014-08-27T04:30:21+00:00\",\"dateModified\":\"2014-08-28T04:32:38+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\",\"name\":\"Simon Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"caption\":\"Simon Hansen\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"This week, Australian government and private sector cooperation on cybersecurity appears to have picked up pace. Speaking at a summit in Sydney, Mike Rothery, First Assistant Secretary at the Attorney-General\u2019s Department\u2019s National Security Resilience Policy ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-08-27T04:30:21+00:00","article_modified_time":"2014-08-28T04:32:38+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/8494284435_79a8eb2b53_z.jpg","type":"image\/jpeg"}],"author":"Simon Hansen","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Simon Hansen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/8494284435_79a8eb2b53_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/8494284435_79a8eb2b53_z.jpg","width":640,"height":427,"caption":"Michael Daniel is a Special Assistant to the President and the Cybersecurity Coordinator"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/#primaryimage"},"datePublished":"2014-08-27T04:30:21+00:00","dateModified":"2014-08-28T04:32:38+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-39\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a","name":"Simon Hansen","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","caption":"Simon Hansen"},"url":"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15451"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=15451"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15451\/revisions"}],"predecessor-version":[{"id":15474,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15451\/revisions\/15474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/15452"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=15451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=15451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=15451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}