{"id":19095,"date":"2015-03-18T12:30:21","date_gmt":"2015-03-18T01:30:21","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=19095"},"modified":"2015-03-19T12:21:05","modified_gmt":"2015-03-19T01:21:05","slug":"cyber-wrap-65","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/","title":{"rendered":"Cyber Wrap"},"content":{"rendered":"

\"AOL<\/a><\/p>\n

The third wave of the Internet is upon us, or so suggested AOL co-founder Steve Case<\/a> at this year\u2019s SXSW Interactive<\/a> in Austin this week. According to Case, companies will need to foster partnerships with embedded stakeholders such as teachers, doctors, and large corporations in order to thrive. Case continued that tech businesses would need to improve and increase their interaction with government as its role as both regulator and customer is \u2018heating up.\u2019<\/p>\n

A glance at US Department of Defense budget figures<\/a> leaves no doubt that the government focus on cyber is already intense. Spending at US Cyber Command is set to skyrocket by 92%, with costs totalling out at just over $1 billion over the next five years, with department-wide cyber spending estimated to hit $5.5 billion for fiscal year 2016. If numbers aren\u2019t enough to convince readers of the high priority the Pentagon\u2019s placing on cyber, US Secretary of Defense Ashton Carter<\/a>\u2019s decision to make Fort Meade his first troop visit underlined the case.<\/p>\n

Beyond cyber operations, one area where government has a significant impact is in research and development. Nowhere is that clearer than at the US Defense Advanced Research Projects Agency (DARPA). DARPA has announced that it will work to tackle one of the most pressing concerns for consumers in the digital economy, privacy<\/a>. The Brandeis Program, named after the former US Supreme Court Associate Justice Louis Brandeis<\/a>, aims to build \u2018information systems that can ensure private data can only be used for its intended purpose and no\u00a0other\u2019.<\/p>\n

Of course, not everyone trusts the US government\u2019s intentions in online privacy. A beneficiary of immense support from the US State Department and various other departments, the developers behind Tor<\/a>, an anonymity service, are looking to diversify their funding base, primarily tapping non-government support in response to growing public concern over official intrusiveness. Of course non-government entities are not necessarily neutral themselves. The private sector is far from immune to politicking, especially when it comes to cybersecurity<\/a>. A look into leading cybersecurity firms Kaspersky Lab, CrowdStrike, FireEye, and others shows that politics can play a large role in decision making.<\/p>\n

In Australia, the cyber debate has also been heating up of late, with commentators calling on the government to lift its game. Alan Dupont<\/a> has called on Defence to recognize the \u2018crucial role\u2019 that space and cyber space play in military operations and to use the 2015 Defence White Paper to carry out a \u2018much-needed reset\u2019. In Sydney<\/a>, a group of defence experts expressed concern over the lag between private sector and government efforts on cyber security. And Nigel Phair<\/a> has tapped into the global concern over the skills-demand gap for cyber expertise, calling on Canberra to go beyond a cybersecurity review and proactively nurture cyber talent).<\/p>\n

With the high demand for talent a clear challenge for both government and business hiring, newly-appointed head of ANU\u2019s National Security College, Rory Medcalf<\/a>, has suggested a revamped Australian Defence Force reserves as an opportunity to close the skills gap. That idea\u2014similar to schemes that have been gaining traction in the UK<\/a> and the US<\/a>\u2014would allow the military to tap into private-sector expertise in times of need.<\/p>\n

Looking to our neighbourhood, Ben Heyes<\/a>, CISO at Commonwealth Bank, has highlighted Australia\u2019s opportunity to become a regional hub for cyber security capability\u2014a move which would be both a boon for our economy and an avenue for enhancing regional cyber maturity. Reports suggest<\/a> that Australia has been heavily involved in certain aspects of regional capacity building. Recent revelations suggest that the Defence Signals Directorate (now the Australian Signals Directorate) sent an officer to New Zealand to help boost their cyber capabilities and lead a new operational unit within the Government Communications Security Bureau (GCSB). Of course there\u2019s plenty of scope for broader, less controversial, capacity building efforts across the region.<\/p>\n

Finally, make sure to join us and the Embassy of the Kingdom of the Netherlands next Wednesday 25 March<\/a>, for a discussion on the Global Conference on Cyber Space (GCCS) 2015. The discussion will explore the aims of the GCCS, wider Asia-Pacific perspectives on the key themes of the conference, and Team Australia\u2019s contribution to the GCCS.<\/p>\n

Kl\u00e9e Aiken<\/em><\/a> is an analyst in\u00a0ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em><\/a>. Image courtesy of Flickr user Case Foundation<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

The third wave of the Internet is upon us, or so suggested AOL co-founder Steve Case at this year\u2019s SXSW Interactive in Austin this week. According to Case, companies will need to foster partnerships with …<\/p>\n","protected":false},"author":153,"featured_media":19096,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[416,120,391,95,215],"class_list":["post-19095","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australian-government","tag-budget","tag-cyber","tag-cyber-security","tag-privacy"],"acf":[],"yoast_head":"\nCyber Wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The third wave of the Internet is upon us, or so suggested AOL co-founder Steve Case at this year\u2019s SXSW Interactive in Austin this week. According to Case, companies will need to foster partnerships with ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-18T01:30:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-19T01:21:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/2514641584_36740d158a_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/2514641584_36740d158a_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/2514641584_36740d158a_z.jpg\",\"width\":640,\"height\":426,\"caption\":\"AOL co-founder Steve Case\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/\",\"name\":\"Cyber Wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/#primaryimage\"},\"datePublished\":\"2015-03-18T01:30:21+00:00\",\"dateModified\":\"2015-03-19T01:21:05+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Wrap | The Strategist","og_description":"The third wave of the Internet is upon us, or so suggested AOL co-founder Steve Case at this year\u2019s SXSW Interactive in Austin this week. According to Case, companies will need to foster partnerships with ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-03-18T01:30:21+00:00","article_modified_time":"2015-03-19T01:21:05+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/2514641584_36740d158a_z.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/2514641584_36740d158a_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/2514641584_36740d158a_z.jpg","width":640,"height":426,"caption":"AOL co-founder Steve Case"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/","name":"Cyber Wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/#primaryimage"},"datePublished":"2015-03-18T01:30:21+00:00","dateModified":"2015-03-19T01:21:05+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-65\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber Wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/19095"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=19095"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/19095\/revisions"}],"predecessor-version":[{"id":19132,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/19095\/revisions\/19132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/19096"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=19095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=19095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=19095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}