Full Moon & Orb Sydney Heads/Flickr
“The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement, military, business and social engagement with cyber policy and security issues.”
Source: Nevill, L., Hawkins, Z., Feakin, T., & Woodall, J. (2016). Australian Strategic Policy Institute (ASPI) and available from this link (open access).
“This report provides an accessible and critical appraisal of the government’s implementation of the strategy over the past 12 months. It addresses each of the strategy’s five themes, highlighting achievements and areas of weakness; evaluates issues of execution; and suggests ways to evolve the delivery and initiatives of the strategy to achieve its objectives.”
Source: Hawkins, Z. & Nevill, L. (2017). Australian Strategic Policy Institute and available from this link (open access).
“Sharing information on the cyber landscape is a necessary and efficient way to benefit from mutual exposure to cyber threats and boost collective defensive capacity. The US has been pursuing cyber information sharing since the late 1990s, when the federal government directed the creation of public–private partnerships for critical infrastructure protection. The now decades-long development of a variety of information sharing models in the US provide case studies and lessons for the Australian cybersecurity community as it pursues deeper information sharing mechanisms.”
Source: Nevill, L. (2017). ASPI Policy brief and available from this link (open access).
Manly Harbour/M. Hardy
“This white paper by Europol, Middlesex University and UCD Geary Institute for Public Policy… draws together existing, recent evidence on online behaviour and associations with criminal and antisocial behaviour amongst young people. Specifically, it was designed to explore the trajectories and pathways that lead to ‘cyber-criminality’ through a series of mixed-methodological endeavours and the integration of theoretical frameworks across criminology and psychology, including cyberpsychology and computer science.”
Source: Aiken, M., Davidson, J., & Amann, P. (2016). Cybersecurity capacity portal and available from this link (open access).
“The ACSC Threat Report 2016 continues to reflect the experience, focus, and mandates of the ACSC’s member organisations. This report provides an insight into what the centre has been seeing, learning, and responding to, focusing on specific areas of change or new knowledge obtained.”
Source: Australian Cyber Security Centre and available from this link (open access).
This paper examines the application of deterrence concepts to cyberspace, discusses cybersecurity implications for broader deterrence frameworks, and makes policy recommendations to enhance cybersecurity and strengthen broader deterrence postures.
Source: Nevill, L. & Hawkins, Z. (2016) ASPI Special report and available from this link (open access).
Storm from North Head/Flickr
“Today’s advanced attacks focus more on exploiting human flaws than system flaws. To explore this under-reported aspect of enterprise threats, we created The Human Factor. This paper presents original ﬁeld research using data gathered by Proofpoint products deployed in customer settings around the world. It covers the latest trends in in email attachments, social media posts, and URLs. The Human Factor reveals not just who is clicking what, but how threat actors are exploiting the human factor. Because as the data makes clear, the weakest link in security is all of us.”
Source: Proofpoint and available from this link (open access).
North Head/M. Hardy
“Australia’s Cyber Security Strategy sets out the federal government’s philosophy and program for meeting the dual challenges of the digital age—advancing and protecting our interests online. A secure cyberspace provides trust and confidence for individuals, business and the public sector to share ideas and information and to innovate online.”
Source: Australia. Dept. of Prime Minister and Cabinet and available from this link (open access).
Full Moon & Orb Sydney Heads/Flickr
“The 2016 report identifies eight trends that reflect macro forces fuelling innovation: digital, analytics, cloud, the renaissance of core systems, and the changing role of IT within the enterprise, balanced with the implications of cyber risk—security, compliance, regulatory and compliance, quality, and safety.”
Source: Deloitte and available from this link. (Open access)