{"id":27104,"date":"2016-06-16T14:30:39","date_gmt":"2016-06-16T04:30:39","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=27104"},"modified":"2016-06-16T14:25:50","modified_gmt":"2016-06-16T04:25:50","slug":"national-cyber-budgets-different","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/","title":{"rendered":"National cyber budgets: same, same but different"},"content":{"rendered":"

\"Image<\/p>\n

The latest report from UNSW\u2019s Australian Centre for Cyber Security (ACCS),<\/span> \u2018Australia’s Response to Advanced Technology Threats,\u2019<\/span><\/a> \u00a0claims that Australia doesn\u2019t take cyber threats seriously enough. The report argues that the differences between Australian cyber security rhetoric and spending compared to our allies, namely the US and UK, indicate that Australia is lagging behind in both our understanding of and responses to cyber threats. The report argues correctly that Australia has a long way to go towards developing the strong cyber security posture and workforce it requires. However, when making comparisons between Australia and other countries, it\u2019s helpful to understand a variety of factors that contribute to national differences.<\/span><\/p>\n

The transnational nature of cyberspace requires national cyber security budgets to address international cyber challenges. Developing conflict prevention frameworks, capacity building efforts, internet governance initiatives and international cybercrime engagement are priorities that demand international cooperation. So a certain proportion of states\u2019 cyber spending is directly comparable and a national budget can act as an indicator of a government\u2019s capacity to address global challenges and contribute to those international projects.<\/span><\/p>\n

However, it\u2019s important to remember that a proportion of a state\u2019s budget is reflective of its specific national cyber threat landscape. The cyber security risks seen on the ground differ in nature, number and extremity between countries. For example, while the<\/span> majority of breaches in France<\/span><\/a> are the product of hackers or criminal insiders, such incidents only represent 30% of cyber incidents in Brazil.<\/span><\/p>\n

Numerically, the threat faced by the US is enormous; IBM\u2019s 2015 Cost of Data Breach Study<\/span> found<\/span><\/a> that while 60% of global cyber incidents take place in the US, only 6% occur in Australia. Incidents in the US are not only more numerous but also more damaging. For example, an<\/span> international study by the Ponemon Institute<\/span><\/a> found the average cost of a breach in the US to be US$15 million, US$6.32 million in the UK and only US$3.47 million in Australia. Meanwhile, Australian government figures sit even lower, with the average cost of a breach to an Australian business<\/span> estimated at AU$276,323<\/span><\/a>.<\/span><\/p>\n

The divergent frequency and scale of incidents results in varying aggregate damage to each country. McAfee\u2019s 2014 report,<\/span> Net Losses: Estimating the Global Cost of Cybercrime<\/span><\/i><\/a>, undertook an international comparison of the proportion of a country\u2019s GDP lost as a result of malicious activity online. According to the report, Australia lost only 0.08% of its GDP, while the UK and the US lost 0.16% and 0.64% respectively.<\/span><\/p>\n

Even assuming that each country faced the exact same cyber threat, making budget comparisons in relative terms as a proportion of national GDP, rather than in absolute terms, more accurately reveals cyber security\u2019s position within national priorities. Referring to recent announcements of<\/span> US plans to invest US$19 billion<\/span><\/a> in cyber security efforts over one year, while the<\/span> UK has committed \u00a31.9 billion<\/span><\/a> over five, the report claims that Australia is annually being outspent by its allies by 400 and 10 times respectively.<\/span><\/p>\n

However, when broken down annually and measured as a proportion of GDP (as projected over the relevant funding years), Australia spends 0.003%, the UK 0.020% and the US 0.113% of national GDP on cyber security. The claim that the US is spending hundreds times more than Australia is based on a direct comparison of absolute budget allotment, without taking into account the size of the economy from which the investment is being made. Such comparisons are therefore misleading in the important discussions on Australia\u2019s funding strategies.<\/span><\/p>\n

The US and UK are actually spending 35 and 6 times more than Australia in relative terms, respectively. The gap between Australian and US spending isn\u2019t as severe as suggested in the ACCS report, and must be understood in the context of each country\u2019s level of risk. Compared to Australia, the US experiences a 10 times higher rate of cyber incident, 8 times the cost to GDP and 5 times the cost per average breach. That reality means the existence of some gap in national funding response should in some sense be expected, and doesn\u2019t necessarily represent an Australian disregard of the importance of cybersecurity measures as the report suggests.<\/span><\/p>\n

Of course, the discrepancy is still significant and there\u2019s room for growth in the Australian budget. The need to invest and plan further for Australia\u2019s cyber workforce, as mentioned in the report, cannot be understated and is a priority<\/span> echoed by the ICPC<\/span><\/a>. Increasing Australian investment in cyber education, securing infrastructure and combatting cybercrime, as suggested by the report, is important to address the AU<\/span>$2 billion cost of malicious cyber activities<\/span><\/a> to the Australian economy each year.<\/span><\/p>\n

However, there\u2019s an important difference between calling for increasing investment and requesting more dramatic rhetoric. Policy development needs to take place in a reasoned and rational manner, so avoiding misleading and alarmist comparisons is essential. Threat perceptions must be accurate and breach reports honest, but unnecessarily dramatising the threat doesn\u2019t change the results on the ground.<\/span><\/p>\n

Australia should continue to increase its investment in cyber security to ensure it manages the risks, and can continue to enjoy the benefits of cyberspace. It\u2019s vital that this discussion is based on national realities and informed by an accurate understanding of where Australia sits in relation to its peers in terms of relative risk and response.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

The latest report from UNSW\u2019s Australian Centre for Cyber Security (ACCS), \u2018Australia’s Response to Advanced Technology Threats,\u2019 \u00a0claims that Australia doesn\u2019t take cyber threats seriously enough. The report argues that the differences between Australian cyber …<\/p>\n","protected":false},"author":390,"featured_media":27105,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,95,728],"class_list":["post-27104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-security","tag-hacking"],"acf":[],"yoast_head":"\nNational cyber budgets: same, same but different | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"National cyber budgets: same, same but different | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The latest report from UNSW\u2019s Australian Centre for Cyber Security (ACCS), \u2018Australia’s Response to Advanced Technology Threats,\u2019 \u00a0claims that Australia doesn\u2019t take cyber threats seriously enough. The report argues that the differences between Australian cyber ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-16T04:30:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-06-16T04:25:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/6938469933_08535f5c93_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"424\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/6938469933_08535f5c93_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/6938469933_08535f5c93_z.jpg\",\"width\":640,\"height\":424,\"caption\":\"Image courtesy of Flickr user Defence Images\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/\",\"name\":\"National cyber budgets: same, same but different | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/#primaryimage\"},\"datePublished\":\"2016-06-16T04:30:39+00:00\",\"dateModified\":\"2016-06-16T04:25:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"National cyber budgets: same, same but different\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"National cyber budgets: same, same but different | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/","og_locale":"en_US","og_type":"article","og_title":"National cyber budgets: same, same but different | The Strategist","og_description":"The latest report from UNSW\u2019s Australian Centre for Cyber Security (ACCS), \u2018Australia’s Response to Advanced Technology Threats,\u2019 \u00a0claims that Australia doesn\u2019t take cyber threats seriously enough. The report argues that the differences between Australian cyber ...","og_url":"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-06-16T04:30:39+00:00","article_modified_time":"2016-06-16T04:25:50+00:00","og_image":[{"width":640,"height":424,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/6938469933_08535f5c93_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/6938469933_08535f5c93_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/6938469933_08535f5c93_z.jpg","width":640,"height":424,"caption":"Image courtesy of Flickr user Defence Images"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/","url":"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/","name":"National cyber budgets: same, same but different | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/#primaryimage"},"datePublished":"2016-06-16T04:30:39+00:00","dateModified":"2016-06-16T04:25:50+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/national-cyber-budgets-different\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"National cyber budgets: same, same but different"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27104"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=27104"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27104\/revisions"}],"predecessor-version":[{"id":27106,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27104\/revisions\/27106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/27105"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=27104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=27104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=27104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}