{"id":28668,"date":"2016-09-14T12:35:11","date_gmt":"2016-09-14T02:35:11","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=28668"},"modified":"2016-10-17T13:18:36","modified_gmt":"2016-10-17T02:18:36","slug":"cyber-wrap-136","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"6046478725_b06ac48520_z\"<\/p>\n

Following the high profile<\/a> infiltration of the DNC\u2019s email servers earlier in this year, the FBI\u2019s now working to allay concerns<\/a> that vote counting machines could be next on the hit-list of would-be saboteurs. FBI Director James Comey was quick to point out that a breach of these systems is pretty tough, pointing<\/a> out the disjointed and \u2018clunky as heck\u2019 nature of the voting systems as the main barrier to malicious actors. \u2018A lot of people have found that challenging over the years, but the beauty of that is it\u2019s not exactly a swift part of the internet of things, and so it is hard for an actor to reach our voting process.\u2019<\/p>\n

Last week the White House announced<\/a> that retired Air Force Brigadier General Gregory J. Touhill will become the US\u2019s first federal Chief Information Security Officer (CISO). The creation of the post was foreshadowed by President Obama more than eight months ago via the Cybersecurity National Action Plan (CNAP)<\/a>. Touhill will make the shift from the Department of Homeland Security, where he currently serves as the deputy assistant secretary for cybersecurity and communications. According<\/a> to the White House, the federal CISO will be responsible for \u2018driving cybersecurity policy, planning, and implementation across the Federal Government\u2019. In essence his role will largely be concerned with protecting government networks and the US\u2019s critical infrastructure.<\/p>\n

On the home front, Australia\u2019s new Minister Assisting the PM for Cyber Security Dan Tehan has weighed in on the \u2018information as a weapon\u2019 discussion kicked off<\/a> by the DNC hack. Tehan called the incident<\/a> a \u2018wake-up call\u2019 and stressed that Australia must have \u2018the proper protections in place\u2019 to prevent similar incidents of what he terms \u2018cyber influencing\u2019 occurring here.<\/p>\n

Singapore\u2019s Cyber Security Agency (CSA) head David Koh has given a one-on-one interview<\/a> with GovInsider<\/em>, outlining the city-state\u2019s approach to managing cyber threats, innovation, public outreach and promoting security by design. Koh, who\u2019s led the CSA since it was formally established in April 2015, is currently overseeing the creation of a \u2018competency skills framework\u2019<\/a> developed with the private sector. Once complete, the framework should lay out specific career pathways available to IT experts in both technical and management streams. Koh also highlighted the importance of trust and assurance of data privacy to Singapore\u2019s \u2018Smart Nation\u2019<\/a> vision, arguing that without a foundation of confidence there will be a reluctance amongst the population to share the data that gives the ambitious program its life.<\/p>\n

Japan\u2019s Financial Services Agency is set to host the country\u2019s first cyber security exercise<\/a> exclusively for financial institutions. The drill\u2014scheduled to take place in October\u2014will see 80 financial institutions come together to test their wares against fictitious malicious cyber actors. The exercise came about following the increase online attacks targeting financial institutions in the country. Participants will include local and major regional banks, with the drill seeking to expand and build upon on numerous existing info-sharing and collaborative agreements between several Japanese financial institutions.<\/p>\n

Japan\u2019s NEC Corporation has won a contract to roll-out a new 5,300 kilometre submarine cable in South East Asia<\/a>. The Indonesia Global Gateway Cable System will connect the islands of Sumatra, Batam, Jawa, Bali, Kalimantan and Sulawesi with Singapore. It\u2019ll also link Indonesia with two other major international cables, boosting connectivity, resilience and internet speeds across the country.<\/p>\n","protected":false},"excerpt":{"rendered":"

Following the high profile infiltration of the DNC\u2019s email servers earlier in this year, the FBI\u2019s now working to allay concerns that vote counting machines could be next on the hit-list of would-be saboteurs. FBI …<\/p>\n","protected":false},"author":133,"featured_media":28669,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,95,728,692,1606],"class_list":["post-28668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-security","tag-hacking","tag-internet","tag-presidential-election-2016"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Following the high profile infiltration of the DNC\u2019s email servers earlier in this year, the FBI\u2019s now working to allay concerns that vote counting machines could be next on the hit-list of would-be saboteurs. FBI ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-14T02:35:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-17T02:18:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/6046478725_b06ac48520_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/6046478725_b06ac48520_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/6046478725_b06ac48520_z.jpg\",\"width\":640,\"height\":427},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/#primaryimage\"},\"datePublished\":\"2016-09-14T02:35:11+00:00\",\"dateModified\":\"2016-10-17T02:18:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Following the high profile infiltration of the DNC\u2019s email servers earlier in this year, the FBI\u2019s now working to allay concerns that vote counting machines could be next on the hit-list of would-be saboteurs. FBI ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-09-14T02:35:11+00:00","article_modified_time":"2016-10-17T02:18:36+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/6046478725_b06ac48520_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/6046478725_b06ac48520_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/6046478725_b06ac48520_z.jpg","width":640,"height":427},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/#primaryimage"},"datePublished":"2016-09-14T02:35:11+00:00","dateModified":"2016-10-17T02:18:36+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-136\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28668"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=28668"}],"version-history":[{"count":2,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28668\/revisions"}],"predecessor-version":[{"id":28671,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28668\/revisions\/28671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/28669"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=28668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=28668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=28668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}