{"id":25892,"date":"2016-04-13T12:30:18","date_gmt":"2016-04-13T02:30:18","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=25892"},"modified":"2016-04-13T11:32:48","modified_gmt":"2016-04-13T01:32:48","slug":"cyber-wrap-115","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Edited<\/p>\n

The recent<\/span> string<\/span><\/a> of ransomware incidents targeting health records held by hospitals has demonstrated the<\/span> vulnerability and appeal<\/span><\/a> of healthcare organisations to cybercriminals. The trend is reflected in a<\/span> data security incident report<\/span><\/a> from American law firm Baker Hostetler, which identifies healthcare as the most targeted industry, constituting 23% of all cybercrime incidents. In response, the American Hospital Association (AHA) has<\/span> called attention<\/span><\/a> to the need for improved cybersecurity in healthcare organisations. President and CEO of the AHA, Richard Pollock,<\/span> recognised<\/span><\/a> that cybersecurity is \u2018more than just an IT issue\u2019, and instead requires strong policy coordination and vigilant personnel. To aid this effort, AHA has added a<\/span> dedicated cybersecurity page<\/span><\/a> to their website that provides hospitals with information, resources, threat reduction tools and response plans.<\/span><\/p>\n

The US has also been taking a long hard look at its federal computer networks. This week, the Obama administration<\/span> proposed legislation<\/span><\/a> to establish a new Information Technology Modernization Fund (ITMF) for the 2017 fiscal year, valued at US$3.1 billion. Chief Information Officer, Tony Scott,<\/span> emphasised<\/span><\/a> that the US government currently relies on antiquated systems that are not only difficult to secure but also costly to maintain. The ITMF initiative, foreshadowed in the<\/span> Cyber Security National Action Plan<\/span><\/a> earlier this year, is designed to facilitate the \u2018retirement, replacement and modernisation of legacy IT\u2019. It includes the creation of an independent board of experts to identify high risk systems suitable for upgrade and transition to shared services and cloud computing. The ITMF legislation also requires agencies to repay money taken from the fund, a feature that\u2019s intended to support<\/span> sustainable<\/span><\/a> federal cybersecurity modernisation.<\/span><\/p>\n

Staying stateside, US Congress<\/span> introduced a new encryption bill<\/span><\/a> last week. While the<\/span> security\u2013privacy debate<\/span><\/a> has been unfolding between the FBI and Apple, onlookers have been waiting for Congress to weigh in on the issue. Well now they have, and they certainly aren\u2019t sitting on the fence. The <\/span>Compliance with Court Orders Act of 2016<\/span><\/i> will force companies to provide technical assistance to government, essentially<\/span> outlawing end-to-end encryption<\/span><\/a>. The nine page<\/span> discussion draft<\/span><\/a> outlines the legal requirement of commercial entities to not only provide<\/span> access to \u2018unintelligible\u2019 information<\/span><\/a> when indicated by a court order, but also to refrain from creating hardware or software designs that prevent this from being possible. It\u2019s fair to say that this bill hasn\u2019t been well received. Some headline highlights include descriptions of the draft as \u2018<\/span>a total nightmare<\/span><\/a>\u2019, \u2018<\/span>ludicrous, dangerous, technically illiterate<\/span><\/a>\u2019, \u2018<\/span>the technological equivalent of requiring all pigs to fly<\/span><\/a>\u2019, \u2018<\/span>as bad as experts imagined<\/span><\/a>,\u2019 and \u2018<\/span>more ridiculous than expected<\/span><\/a>\u2019. The contentious draft, put forward by Senate Intelligence Committee Chairman Richard Burr and high profile member Dianne Feinstein, is still being finalised so rest assured that more on the encryption issue is coming down the pipeline.<\/span><\/p>\n

Singapore this week announced plans to<\/span> update<\/span><\/a> its <\/span>Computer Misuse and Cybersecurity Act<\/span><\/i>. Senior Minister of State for Homeland Affairs, Desmond Lee, cited the<\/span> \u2018clear uptrend\u2019 in cybercrime<\/span><\/a> as a motivation for the overhaul. Noticeably,<\/span> credit-for-sex scams<\/span><\/a> have shot through the roof in the city state, generating an<\/span> annual loss<\/span><\/a> of S$2.9 million. Minister for Communications and Information, Yaacob Ibrahim,<\/span> underscored<\/span><\/a> the importance of reviewing the legislation, strengthening online defences and cracking down on cybercrime as Singapore moves towards becoming a \u2018Smart Nation\u2019.<\/span> Becoming a Smart Nation<\/span><\/a> is the vision of a Singaporean whole-of-government initiative: harnessing ICT, networks and data in order to \u2018support better living, create more opportunities and support stronger communities\u2019.<\/span><\/p>\n

Equal representation still remains a challenge in the cybersecurity workforce. Women account for<\/span> only 10%<\/span><\/a> of the information security industry. Anne Marie Slaughter and Elizabeth Weingarten from the New America Foundation have published<\/span> an article in <\/span>TIME Magazine<\/span><\/i><\/a> highlighting that the underrepresentation of women in this field is not simply an issue of gender equality, but also national security. They argue that \u2018gender, socioeconomic status, race and other identities can influence how people perceive security interventions\u2019, such that having a representative workforce designing security frameworks is an essential component of their effectiveness. By the same token, the US Department of Labor Statistics has revealed concerning information about the near absence of racial diversity in cybersecurity.<\/span> Figures indicate<\/span><\/a> that black or African-American people make up only 3% of information security analysts in the US. So it seems diversity should be at the forefront of employers\u2019 minds as they work to fill the<\/span> 1.5 million global cybersecurity talent shortfall<\/span><\/a>.<\/span><\/p>\n

Finally, Japan and Estonia agreed to<\/span> strengthen their cybersecurity cooperation<\/span><\/a> in Tokyo this week. Japan\u2019s Prime Minister Shinzo Abe and his Estonian counterpart Taavi Roivas<\/span> agreed<\/span><\/a> to share knowledge on information protection and data management in the lead up to the 2020 Tokyo Olympics and Paralympics. The pairing of Japan and Estonia isn\u2019t as strange as it appears at first glance. After suffering a bout of \u2018<\/span>cyber attacks\u2019<\/span><\/a> on its government, finance and media websites in 2007, Estonia has become a global hub for cybersecurity discussion, collaborating with NATO to produce influential research like the<\/span> Tallinn Manual<\/span><\/a>. Abe<\/span> applauded Estonia<\/span><\/a> as an international leader in cybersecurity from which Japan could learn a great deal. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

The recent string of ransomware incidents targeting health records held by hospitals has demonstrated the vulnerability and appeal of healthcare organisations to cybercriminals. The trend is reflected in a data security incident report from American …<\/p>\n","protected":false},"author":390,"featured_media":25893,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,713,1570,1002],"class_list":["post-25892","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyberattack","tag-encryption","tag-women"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The recent string of ransomware incidents targeting health records held by hospitals has demonstrated the vulnerability and appeal of healthcare organisations to cybercriminals. The trend is reflected in a data security incident report from American ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-13T02:30:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-04-13T01:32:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/CW.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"431\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/CW.png\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/CW.png\",\"width\":640,\"height\":431,\"caption\":\"Edited image courtesy of Flickr user Charis Tsevis\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/#primaryimage\"},\"datePublished\":\"2016-04-13T02:30:18+00:00\",\"dateModified\":\"2016-04-13T01:32:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The recent string of ransomware incidents targeting health records held by hospitals has demonstrated the vulnerability and appeal of healthcare organisations to cybercriminals. The trend is reflected in a data security incident report from American ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-04-13T02:30:18+00:00","article_modified_time":"2016-04-13T01:32:48+00:00","og_image":[{"width":640,"height":431,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/CW.png","type":"image\/png"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/CW.png","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/CW.png","width":640,"height":431,"caption":"Edited image courtesy of Flickr user Charis Tsevis"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/#primaryimage"},"datePublished":"2016-04-13T02:30:18+00:00","dateModified":"2016-04-13T01:32:48+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-115\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/25892"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=25892"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/25892\/revisions"}],"predecessor-version":[{"id":25894,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/25892\/revisions\/25894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/25893"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=25892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=25892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=25892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}