{"id":22422,"date":"2015-09-09T13:49:11","date_gmt":"2015-09-09T03:49:11","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=22422"},"modified":"2015-09-09T13:50:25","modified_gmt":"2015-09-09T03:50:25","slug":"cyber-wrap-87","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Night<\/a><\/p>\n

The Japanese Government formally adopted its new Cybersecurity Strategy<\/a> last Friday. The Strategy outlines the directions of Japanese cybersecurity policy as the country approaches the 2020 Olympics and Paralympics in Tokyo, and faces the challenges of a rising China. The Strategy\u2019s ultimate objective is to ensure a free, fair and secure cyberspace\u2014balancing the need for security with freedom of access and expression.<\/p>\n

The cyber threats posed to the Tokyo Olympics are at the forefront of the Strategy, which notes that extensive public, private and academic cooperation will be required to develop secure networks from the ground up, particularly as the interface between cyberspace and physical objects grows with the \u2018Internet of Things\u2019. This includes the recommendation that corporations position their Chief Information Security Officers at suitably senior levels to adequately make the changes necessary for more secure networks. Public-private partnerships are also noted as critical for the security of Japan\u2019s critical information infrastructure (CII), as is better information sharing between government agencies and CII operators. The Strategy was released for comment<\/a> in May this year, and was originally due for release in June, but was delayed to incorporate the lessons learned from the Japan Pension Service hack.<\/p>\n

Meanwhile, the Australian cyber community will be waiting until late October for the Australian Cyber Security Review to be released, according to a Prime Minister & Cabinet spokesperson<\/a>. The launch of the Strategy will reportedly follow closely after the fourth annual Cyber Security Challenge Australia<\/a> on 30 September. The Challenge is a public-private event for Australian tertiary students to test their cyber security skills and engage with key government and private sector cyber security leaders.<\/p>\n

Competitors in the Cyber Security Challenge may one day be press-ganged into national cyber service if Australian Information Security Association executive James Turner\u2019s proposal<\/a> to nationalise the Australian cyber security industry is adopted. Turner\u2019s proposal would see the role of the Australian Cyber Security Centre expand, and the pooling of cyber security expertise to provide a critical mass to support government and private sector cyber security. While suggestions like this seem extreme, governments around the world may start to consider similar measures to tackle this increasingly expensive problem. The US is reportedly planning to spend US$14 billion<\/a> on government cybersecurity in the 2015-2016 financial year, while corporate entities will spend US$31.5 billion in the same timeframe, but the vulnerability of both sectors \u00a0to hackers is unlikely<\/a> to decrease any time soon.<\/p>\n

Australia and India\u2019s bilateral cyber policy and security engagement took another forward step last month as the first Australia\u2013India Cyber Policy Dialogue<\/a> concluded successfully in New Delhi. Announced as part of the Framework for Security Cooperation agreed by Prime Ministers Modi and Abbott last November, the Dialogue reportedly discussed the \u2018full range\u2019 of cyber issues including threat perceptions and government cyber security arrangements, and international cyber security policy, governance and cybercrime cooperation. Notably, the two national CERT teams signed a framework to enhance their operational collaboration for information sharing and incident response. The Modi government\u2019s Digital India<\/a> programme was also discussed at the Dialogue\u2014an initiative that seeks to increase internet penetration to enable the delivery of core government services through high speed internet connections. However, India is facing the same cyber skills shortages as many other nations, requiring an estimated<\/a> 1 million cyber security professionals by 2025 to meet its goals, from its current base of 62,000.<\/p>\n","protected":false},"excerpt":{"rendered":"

The Japanese Government formally adopted its new Cybersecurity Strategy last Friday. The Strategy outlines the directions of Japanese cybersecurity policy as the country approaches the 2020 Olympics and Paralympics in Tokyo, and faces the challenges …<\/p>\n","protected":false},"author":364,"featured_media":22425,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,95,713,454,21],"class_list":["post-22422","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-security","tag-cyberattack","tag-policy","tag-strategy-2"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The Japanese Government formally adopted its new Cybersecurity Strategy last Friday. The Strategy outlines the directions of Japanese cybersecurity policy as the country approaches the 2020 Olympics and Paralympics in Tokyo, and faces the challenges ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-09T03:49:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-09-09T03:50:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/8537197814_ebfacf55b7_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/8537197814_ebfacf55b7_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/8537197814_ebfacf55b7_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"Night View with Tokyo Tower Special Lightup\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/#primaryimage\"},\"datePublished\":\"2015-09-09T03:49:11+00:00\",\"dateModified\":\"2015-09-09T03:50:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The Japanese Government formally adopted its new Cybersecurity Strategy last Friday. The Strategy outlines the directions of Japanese cybersecurity policy as the country approaches the 2020 Olympics and Paralympics in Tokyo, and faces the challenges ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-09-09T03:49:11+00:00","article_modified_time":"2015-09-09T03:50:25+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/8537197814_ebfacf55b7_z.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/8537197814_ebfacf55b7_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/8537197814_ebfacf55b7_z.jpg","width":640,"height":427,"caption":"Night View with Tokyo Tower Special Lightup"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/#primaryimage"},"datePublished":"2015-09-09T03:49:11+00:00","dateModified":"2015-09-09T03:50:25+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-87\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22422"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=22422"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22422\/revisions"}],"predecessor-version":[{"id":22426,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22422\/revisions\/22426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/22425"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=22422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=22422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=22422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}