{"id":26952,"date":"2016-06-03T11:00:57","date_gmt":"2016-06-03T01:00:57","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=26952"},"modified":"2016-06-08T17:40:44","modified_gmt":"2016-06-08T07:40:44","slug":"agenda-change-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/","title":{"rendered":"Agenda for Change 2016: cybersecurity"},"content":{"rendered":"

\"\"This piece is drawn from<\/i> Agenda for Change 2016: strategic choices for the next government<\/span><\/a>.<\/span><\/i><\/span><\/p>\n

Regardless of their political stripes, the next Australian government has a solid foundation from which to approach cyber policy, comprised of the new Australian Cyber Security Strategy, the National Innovation and Science Agenda and 2016 Defence White Paper. Alongside the release of the Strategy was the announcement of a four-year $230 million investment to enhance Australian cybersecurity capabilities and launch new cyber initiatives. The Australian government hasn\u2019t invested in this area since 2009, so it\u2019s well overdue.<\/span><\/p>\n

There\u2019s a significant opportunity to build capacity in our neighbourhood and more actively promote Australia\u2019s vision for the online environment: one which is open, safe and secure, while facilitating economic exchange and innovation. The Strategy sets out a sensible agenda for the next four years and lays the groundwork for expanded engagement. To achieve that, the Minister for Foreign Affairs will appoint Australia\u2019s first Cyber Ambassador, who will play a key role in crafting Australia\u2019s first public International Cyber Strategy. A strong International Cyber Strategy will lay out a more detailed position on key global debates, presenting a carefully considered plan for international engagement, and integrating the private sector into our international strategic thinking.<\/span><\/p>\n

Over the next four years, the government has allocated $6.7 million to sustain such work. While it\u2019s a significant improvement on DFAT\u2019s existing shoestring budget for cyber work, it remains a modest figure, particularly when compared to the budgets of our<\/span> key<\/span><\/a> partners<\/span><\/a>. The government must continue to boost the budget allocation for cyber issues in order to keep pace with our lofty international ambitions.<\/span><\/p>\n

DWP 2016 gave government an opportunity to answer questions about what kind of defence force and capabilities will be required to respond to cyber threats. Positively, cybersecurity has its own dedicated spending line, with a commitment of $300\u2013$400 million to that effort. The larger $730 million investment in threat research is set to include funding for cyber threat and capability R&D, but it\u2019s not clear exactly how much.<\/span><\/p>\n

A significant disclosure in the Cyber Strategy was the announcement that Australia possesses \u2018considerable\u2019 offensive cyber capabilities. When announcing that capability, the PM was careful to note that<\/span> its use was subject to \u2018stringent legal oversight and is consistent with our support for international law<\/span><\/a>.\u2019 That\u2019s an important limitation to reassure the international community that Australia will exercise restraint in the use and development of such capability. However the failure of DWP 2016 to address an offensive cyber capability leaves a gap in our understanding of how Defence will develop, sustain and employ such a capability. To address the gap, Defence should be tasked with delivering a Cyber Operations Strategy that outlines how both offensive and defensive cyber operations are governed and integrated into broader Defence activities.<\/span><\/p>\n

The new Strategy has elevated the private sector from \u2018partner\u2019 to \u2018co-leader\u2019 in the new National Cyber Partnership and invites private enterprise to co-lead and co-design initiatives such as new voluntary standards, jointly operate new cyber threat sharing centres, and undertake combined cyber incident exercises. The success of the new partnership will rely on government clearly stating its policy purpose, sustaining engagement and committing to fill the significant gaps in Australia\u2019s cyber workforce.<\/span><\/p>\n

Unfortunately, current education trends aren\u2019t creating the workforce that will be required to deliver the \u2018innovation, growth and prosperity\u2019 promised by the Strategy. Just $13.5 million has been allocated to making Australia a \u2018cyber smart\u2019 nation. The Strategy outlines plans to increase the quality and quantity of individuals coming through all levels of Australia\u2019s cyber security education pipeline. That includes the establishment of academic centres of excellence at universities, the expansion of cyber security training in Registered Training Organisations and the development of training for individuals at all career stages. This workforce plan is part of a broader government effort to address Australia\u2019s low number of STEM professionals, and is already supported by private sector efforts.<\/span><\/p>\n

Despite those positives, more work needs to be done in terms of addressing immediate skills gaps and gender representation in cybersecurity professions. Increasing initiatives and funding for the development of Australia\u2019s cyber workforce is a fundamental prerequisite to achieving all other elements of the Strategy.<\/span><\/p>\n

The Australian Cyber Security Strategy lays out a clearly prioritised and funded plan to achieve Australia\u2019s goals in cyberspace. It should be an excellent blueprint for any incoming government. Realising success will require equitable relationships between the public and private sectors; a robust, accountable implementation plan; a process of continual engagement; top-level leadership which is aware, engaged and equipped to make a difference; and, a plan which has substantial financial support. With all those elements in place, Australia will be well-positioned to succeed at both at home and abroad.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

This piece is drawn from Agenda for Change 2016: strategic choices for the next government. Regardless of their political stripes, the next Australian government has a solid foundation from which to approach cyber policy, comprised …<\/p>\n","protected":false},"author":49,"featured_media":26957,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[1712,1060,416,391,95,83],"class_list":["post-26952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-agenda-for-change-2016","tag-australian-cyber-security-centre","tag-australian-government","tag-cyber","tag-cyber-security","tag-elections"],"acf":[],"yoast_head":"\nAgenda for Change 2016: cybersecurity | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agenda for Change 2016: cybersecurity | The Strategist\" \/>\n<meta property=\"og:description\" content=\"This piece is drawn from Agenda for Change 2016: strategic choices for the next government. Regardless of their political stripes, the next Australian government has a solid foundation from which to approach cyber policy, comprised ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-03T01:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-06-08T07:40:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/7118780327_2b57a00ce1_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tobias Feakin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tobias Feakin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/7118780327_2b57a00ce1_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/7118780327_2b57a00ce1_z.jpg\",\"width\":640,\"height\":480},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/\",\"name\":\"Agenda for Change 2016: cybersecurity | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/#primaryimage\"},\"datePublished\":\"2016-06-03T01:00:57+00:00\",\"dateModified\":\"2016-06-08T07:40:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Agenda for Change 2016: cybersecurity\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\",\"name\":\"Tobias Feakin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"caption\":\"Tobias Feakin\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Agenda for Change 2016: cybersecurity | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Agenda for Change 2016: cybersecurity | The Strategist","og_description":"This piece is drawn from Agenda for Change 2016: strategic choices for the next government. Regardless of their political stripes, the next Australian government has a solid foundation from which to approach cyber policy, comprised ...","og_url":"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-06-03T01:00:57+00:00","article_modified_time":"2016-06-08T07:40:44+00:00","og_image":[{"width":640,"height":480,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/7118780327_2b57a00ce1_z.jpg","type":"image\/jpeg"}],"author":"Tobias Feakin","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Tobias Feakin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/7118780327_2b57a00ce1_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/7118780327_2b57a00ce1_z.jpg","width":640,"height":480},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/","url":"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/","name":"Agenda for Change 2016: cybersecurity | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/#primaryimage"},"datePublished":"2016-06-03T01:00:57+00:00","dateModified":"2016-06-08T07:40:44+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/agenda-change-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Agenda for Change 2016: cybersecurity"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd","name":"Tobias Feakin","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","caption":"Tobias Feakin"},"url":"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26952"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=26952"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26952\/revisions"}],"predecessor-version":[{"id":27049,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26952\/revisions\/27049"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/26957"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=26952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=26952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=26952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}