Australia Cybercrime Capacity Building Conference 27-28 April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.

Slides:



Advertisements
Similar presentations
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Advertisements

Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
March 2012 Ports and Cities Conference Newcastle Dorte Ekelund, Executive Director Major Cities Unit Department of Infrastructure and Transport
From e-Government to e-Governance: The OECD Experience Elizabeth Muller E-Government Project OECD SitExpo February 1004, Casablanca - Morocco.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Near East Plant Protection Network for Regional Cooperation & Knowledge Sharing Food and Agriculture Organization of the United Nations An Overview on.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
#CPACONGRESS E3: Strengthening integrity in a complex environment Hawari Badri FCPA Assistant Secretary, Department of Immigration and Border Protection.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Digital public services and innovation
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Asia-Pacific Finance and Development Centre 2006 Biennial Forum Shanghai, September 2006 Session V: Regional Cooperation and Innovation Development Presented.
(Geneva, Switzerland, September 2014)
NIS Directive and NIS Platform
Dr. Rose Mwebaza Advisor – Women’s Economic and Political Participation Building an enabling environment for Women’s Economic and Political Participation.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Capable leadership is vital for meeting the challenges faced by aged care provider organisations and for the continued sustainability of the industry.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Department of Planning and Community Development Corporate Plan: Government priorities we contribute to Building friendly, confident and safe.
12/12/2013 Cluster Workshop on Cybersecurity 1 Michele Bezzi (SAP) Kazim Hussain (ATOS) SecCord & CYSPA Projects.
Confidential © IDA Singapore APEC-OECD Cooperative Initiative on Regulatory Reform February 2001 Singapore.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
OECD RECOMMENDATION ON DIGITAL GOVERNMENT STRATEGIES From citizen-centric to citizen-driven approaches Barbara Ubaldi Programme Manager– Reform of the.
Disaster risk reduction – How did we get here?
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Enhancing Learning and Teaching Through Technology: HEFCW Overview Celia Hunt Head of Strategy, Learning and Funding.
A National approach to Cyber security/CIIP: Raising awareness.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
The ten-year framework of the Global Centre for ICT in Parliament ECPRD Working Group on ICT Annual Meeting November 2010 Bucharest,
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Achieving a just and secure society How can international cooperation secure the internet? An overview of bilateral/multilateral issues of security in.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
The Canada Border Services Agency and Coordinated Border Management Regional Conference of Customs Directors General, April 22-25, 2012.
Risk and Crisis Management Building OECD Principles on Country Crisis Management.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
EUSBSR Priority Area Secure Steering Group meeting Swedish Civil Contingencies Agency / MSB CBSS Secretariat 2 June 2015, Tallinn.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
Highlights on the New ICT Strategy After the 25 th January Revolution Dr. Mohamed Salem Minister of Communications and Information Technology October 2011.
Shaping the future Consultation on the Heritage Lottery Fund’s Strategy January – 26 April 2011.
National and International Development Strategy International Development Unit / Gordon Thomson / January 2016.
Waisea Vosa Climate Change Unit Division of Political and Treaties Ministry of Foreign Affairs and International Cooperation.
ISACA Ireland Cyber Security Policy 9 February 2016.
Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
eGovernment Forum Electronic Procurement - the Commonwealth Perspective Mary Gorman Government Interoperability Facilitation Team 19 March 2003.
KTNUK Simon Yarwood July Introducing the KTN The UK’s Innovation Network The KTN is the UK’s innovation network. We bring together.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Building evaluation in the Department of Immigration and Citizenship
Sendai Framework for Disaster Risk Reduction
Cybersecurity in the ECOWAS region
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
IPR’s: new challenges and opportunities
Overview Rationale Context and Linkages Objectives Commitments
8 Building Blocks of National Cyber Strategies
Trust and Security Unit
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
Cyber Security Ecosystem of Georgia. Experience and Challenges
Refreshing New Zealand’s Cyber Security Strategy 2018
The European Union response to cyber threats
Overview Rationale Context and Linkages Objectives Commitments
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
Community of Users.
The Australian Government’s role in the Automated Vehicle environment
Presentation transcript:

Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government Attorney-General’s Department

Overview The evolving cyber environment What is the threat? The Australian Government Cyber Security Strategy Australia’s operational response arrangements International cooperation

What is the threat? Australia assesses a high degree of risk to its economy from cyber threats. Growing range of risks – crossing over from the ‘real world’ to the online. Cyber security is a national security priority –increasingly sophisticated and hostile threat environment –our reliance on ICT creates vulnerabilities

Cyber Security Strategy Released by the Attorney-General 23 November 2009 Integrated, whole of government approach –aims, objectives, priorities and agency roles in achieving them Build public awareness of risks and confidence in Australia’s response –shared responsibilities and expectations Aim: The maintenance of a secure, resilient and trusted electronic operating environment that supports Australia's national security and maximises the benefits of the digital economy

Guiding Principles National leadership Shared responsibilities Partnerships Active international engagement Risk management Protecting Australian values

Objectives All Australians are aware of cyber risks, secure their computers and take steps to protect their identities, privacy and finances online Australian businesses operate secure and resilient ICT to protect the integrity of their own operations and the identity and privacy of their customers The Australian Government ensures its ICT is secure and resilient

Strategic Priorities Threat awareness and response Cultural change Business-government partnerships Government systems International engagement Legal and law enforcement Knowledge, skills and innovation

CERT Australia Source of cyber security information for all Australians –single branding Building a network of trusted contacts –facilitate information sharing between ISPs, anti-virus researchers, IT security vendors and major corporations –Information exchanges

CERT Australia Coordinate Australia’s response to serious cyber events between Government and the private sector –in addition to AGD’s broader coordination role (includes media) –complements the role of Defence’s Cyber Security Operations Centre Point of contact for Australia’s international cyber security counterparts Complements the Cyber Security Operations Centre (CSOC) within the Department of Defence

International cooperation Internet is global and borderless. No country can secure its vital interests in cyber space on their own. Seek strengthened partnerships: –enhance links between national CERTs –develop appropriate international frameworks –learn from other countries, and assist if feasible.

Questions / Comments? Links Cyber Security Strategy: CERT Australia: