{"id":51047,"date":"2019-10-04T12:50:03","date_gmt":"2019-10-04T02:50:03","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=51047"},"modified":"2019-10-04T12:50:03","modified_gmt":"2019-10-04T02:50:03","slug":"its-time-to-reboot-australias-cybersecurity-strategy","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/","title":{"rendered":"It\u2019s time to reboot Australia\u2019s cybersecurity strategy"},"content":{"rendered":"
<\/figure>\n

Australia\u2019s 2020 cybersecurity strategy needs the input of all Australians\u2014from individuals to academia, business, community associations and regulators. The government has issued a discussion paper calling for views<\/a>, asking Australians to contribute to shaping Australia\u2019s future and making our 2020 strategy world-leading. The closing date for submissions is 1 November 2019.<\/p>\n

It\u2019s time for a reboot and time to bring everyone into the discussion.<\/p>\n

Cybersecurity is a concept that\u2019s not well understood. Frequently it gets tangled up with buzzwords like artificial intelligence and blockchain. More often than not, it\u2019s seen as a scary realm with intangible consequences. So, while everyone has heard of data breaches (and the millions of victims of some of those breaches), many people struggle to work out what the actual loss is.<\/p>\n

Consumers aren\u2019t alone in that. Australia\u2019s courts don\u2019t recognise damages like anxiety and emotional harm that may come with identity theft or romance scams. Those losses are very real.<\/p>\n

In the business world, the picture in the boardroom (in 2017 at least) appears patchy. Only 45% of companies who responded to the ASX 100 cyber health check<\/a> survey said that they were confident or very confident in their ability to detect, respond to and manage a cyber intrusion. That statistic suggests that a majority of companies are feeling overwhelmed and underprepared.<\/p>\n

All the while, many assert that the government should do more. Yet, when pressed, they often can\u2019t define what it is the government should actually be doing.<\/p>\n

Government action in the cybersecurity sphere, in a public sense, is often described as having an effective strategy coupled with legislative and regulatory settings that are favourable to innovation and unlocking all that this connected world brings\u2014while ensuring there are serious consequences for those who fail to keep our personal data safe.<\/p>\n

Cybersecurity awareness for every single Australian is a tough sell. The risk is intangible, cybersecurity insurance is offered as some sort of magical solution, and we have legislation that appears to include fines that have never been imposed in relation to recent breaches.<\/p>\n

For the average person, it\u2019s easier to just switch off. \u2018Quiet Australians\u2019 are used to getting on with the job and prefer not to be drawn into things that are overly contested or seen as niche issues.<\/p>\n

However, we all have a vested interest in getting cybersecurity settings right\u2014from protecting our personal information, to thinking about what kinds of jobs will be around in 2025, to ensuring the integrity and safety of critical infrastructure.<\/p>\n

In April 2016, the government released a cybersecurity strategy covering the period to 2020. It was ambitious and tried to tackle many of the big-ticket items you would expect from government. It spanned everything from government partnerships with industry and academia, to better preparedness of our networks and systems to detect and respond to cyberattacks, and (of course) growth and innovation.<\/p>\n

It also set the goal of raising the cybersecurity awareness of every Australian. In my experience, that is truly a massive undertaking.<\/p>\n

In 2019, the government has rightly recognised that it\u2019s time for a cybersecurity strategy \u2018reboot\u2019. The discussion paper released in September is a forward-looking document that\u2019s about ensuring Australia is well positioned for the future.<\/p>\n

The language is inclusive and invites views on a wide range of questions. Home Affairs Minister Peter Dutton, whose portfolio includes cybersecurity, writes in the foreword, \u2018I encourage all Australians to have a say in this discussion paper\u2014from small businesses to large corporations, tech experts to interested individuals.\u2019<\/p>\n

Cybersecurity impacts us all\u2014from the personal data we\u2019re required to share in order to obtain services, to the critical infrastructure that we rely on every day to go about our lives and the companies that use and store our data when they don\u2019t always need to.<\/p>\n

Strong cybersecurity must be seen as a mandatory part of doing business, irrespective of whether that business is conducted by a government department, a university or a small company.<\/p>\n

We should all have a view on cybersecurity. After all, this is about our data and the security of the systems and everyday connected things that we rely on. It\u2019s also about our future, about calling boardrooms to account, and about realising our shared ambition to make Australia the safest place to do business online.<\/p>\n

It is time for quiet Australians to find their voices.<\/p>\n","protected":false},"excerpt":{"rendered":"

Australia\u2019s 2020 cybersecurity strategy needs the input of all Australians\u2014from individuals to academia, business, community associations and regulators. The government has issued a discussion paper calling for views, asking Australians to contribute to shaping Australia\u2019s …<\/p>\n","protected":false},"author":1025,"featured_media":51049,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[17,391,2138,2175],"class_list":["post-51047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australia","tag-cyber","tag-cybersecurity","tag-data","dinkus-cybersecurity-strategy"],"acf":[],"yoast_head":"\nIt\u2019s time to reboot Australia\u2019s cybersecurity strategy | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"It\u2019s time to reboot Australia\u2019s cybersecurity strategy | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Australia\u2019s 2020 cybersecurity strategy needs the input of all Australians\u2014from individuals to academia, business, community associations and regulators. The government has issued a discussion paper calling for views, asking Australians to contribute to shaping Australia\u2019s ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-04T02:50:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/10\/GettyImages-1088674664.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"724\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rachael Falk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rachael Falk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/10\/GettyImages-1088674664.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/10\/GettyImages-1088674664.jpg\",\"width\":724,\"height\":482,\"caption\":\"Old ship throttle\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/\",\"name\":\"It\u2019s time to reboot Australia\u2019s cybersecurity strategy | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/#primaryimage\"},\"datePublished\":\"2019-10-04T02:50:03+00:00\",\"dateModified\":\"2019-10-04T02:50:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/8960af01fe98f59d4359389f5581c89d\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"It\u2019s time to reboot Australia\u2019s cybersecurity strategy\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/8960af01fe98f59d4359389f5581c89d\",\"name\":\"Rachael Falk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/174c15abbe245de6d56c684d7849378a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/174c15abbe245de6d56c684d7849378a?s=96&d=mm&r=g\",\"caption\":\"Rachael Falk\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/rachael-falk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"It\u2019s time to reboot Australia\u2019s cybersecurity strategy | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/","og_locale":"en_US","og_type":"article","og_title":"It\u2019s time to reboot Australia\u2019s cybersecurity strategy | The Strategist","og_description":"Australia\u2019s 2020 cybersecurity strategy needs the input of all Australians\u2014from individuals to academia, business, community associations and regulators. The government has issued a discussion paper calling for views, asking Australians to contribute to shaping Australia\u2019s ...","og_url":"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2019-10-04T02:50:03+00:00","og_image":[{"width":724,"height":482,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/10\/GettyImages-1088674664.jpg","type":"image\/jpeg"}],"author":"Rachael Falk","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Rachael Falk","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/10\/GettyImages-1088674664.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/10\/GettyImages-1088674664.jpg","width":724,"height":482,"caption":"Old ship throttle"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/","url":"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/","name":"It\u2019s time to reboot Australia\u2019s cybersecurity strategy | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/#primaryimage"},"datePublished":"2019-10-04T02:50:03+00:00","dateModified":"2019-10-04T02:50:03+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/8960af01fe98f59d4359389f5581c89d"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/its-time-to-reboot-australias-cybersecurity-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"It\u2019s time to reboot Australia\u2019s cybersecurity strategy"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/8960af01fe98f59d4359389f5581c89d","name":"Rachael Falk","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/174c15abbe245de6d56c684d7849378a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/174c15abbe245de6d56c684d7849378a?s=96&d=mm&r=g","caption":"Rachael Falk"},"url":"https:\/\/www.aspistrategist.ru\/author\/rachael-falk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/51047"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/1025"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=51047"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/51047\/revisions"}],"predecessor-version":[{"id":51051,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/51047\/revisions\/51051"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/51049"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=51047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=51047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=51047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}