Jump to content

All Activity

This stream auto-updates

  1. Earlier
  2. Start Time: 6:00PM AEDT. Today's advanced threats from cyber criminals and state-backed organizations have undermined large utilities and critical infrastructures around the world. https://www.engineersaustralia.org.au/event/2021/02/cyber-security-and-critical-infrastructure-35626
  3. Australia's first national cyber security digital ecosystem ‘AUCyberscape’ is now available AUCyberscape is Australia’s first consolidated online destination for understanding Australia’s cyber security capabilities. The platform, which is free to users and providers, allows Australian cyber security companies to showcase their products, services, business solutions and sector experience; connect with customers; and access information to support their company development and growth. Businesses, government, investors and individuals can understand more about cyber security and t
  4. until
    ACSC Challenges, Lessons Learned and Cyber Security Advice for Australian Businesses by Karl Hanmore What are the major lessons that ACSC has learned over its journey to building the Australian Government's public facing cyber centre of excellence? What challenges are you anticipating to occur in the next 5 years? What areas should Australian businesses be investing into cyber security to protect themselves (technology, people, MSSPs)? About the speaker Mr Karl Hanmore was appointed to the role of First Assistant Director-General Cyber Security Services (CSS)
  5. until
    The Internet of Things Alliance Australia is proud to invite you to the launch of Australia's first IoT Security Awareness Guides. Admission is free. https://www.eventbrite.com.au/e/internet-of-things-security-awareness-guides-launch-tickets-141506225931
  6. until
    Cyber-physical System Assurance via Systems Engineering Based Regulation Presented by Mark van Zomeren Description: Using three hypothetical cases, which bear similarities to recent real-world cases, issues relating to the downside of cyber-physical systems are examined. Systems engineering principles and potential regulatory mechanisms are then considered, to determine if their application may have the potential to reduce or eliminate these issues. While these hypothetical cases do resemble real world events from over the past decade, there will be no in-depth anal
  7. Often cyber security involves a lot more than a technical solution. It requires taking into account people, cultures an economics at macro and micro levels. Non technical factors can create blind spots that attackers can exploit that can surprise designers. Such as the belief in compliance by users even the malicious one or that a user of a system would inconvenience many for a small perceived benefit. Have a look at the case study of prepaid electricity meters in Ross Andersen's security engineering book that shows how you need to account for cultural, social and economic issues to mak
  8. I started my working journey as a Naval Artificer Apprentice many many many decades ago specialising at the time in RF, EW, Navigation Aids, Secure Comms, Crypto machines, Teletypes, and related technologies. The journey from that point onwards included many different experiences in the Navy, Defence and eventually the commercial world developing systems, executive management, consulting and also CIO/ COO roles. The world is your oyster.
  9. One of the WW2 security awareness slogans and posters was “Loose lips sink ships”, so maybe for our modern times it could be “Fickle fingers destroy enterprises”.
  10. Cyber has blurred the traditional, very clear, boundaries between peace and war. The area between is often referred to as the ‘grey zone’. While the tactics used in the cyber domain have been used for centuries (think military deception, psychological operations, and information operations), the scale and speed of the conduct of these activities in cyberspace is unparalleled. We are in a constant state of competition, and cyber threats are increasing in frequency and sophistication.
  11. Sometimes it’s obvious – such as through ransomware messages, fake anti-virus messages, or phishing malware. But often, it’s not so clear, difficult to detect and goes unnoticed for a long time. The Australian Cyber Security Centre has published some handy information about hacking which you can find here: https://www.cyber.gov.au/acsc/view-all-content/threats/hacking. My suggestion would be to make sure you’re doing the basics well, and focus on increasing security to reduce the likelihood of a cyber breach.
  12. Information Warfare Division has a diverse workforce which includes ADF, APS and contractors. Like any government department, we advertise externally for positions we have available, so keep an eye out in the Public Service gazette. Alternatively, if you’re interested in a career in the ADF, visit defencejobs.gov.au.
  13. As I’ve said before, I’m open to all good ideas! Last year, we took part in a capture-the-flag competition with a cyber incident response team from National Australia Bank. I’d be very keen to see similar activities in the future.
  14. I’m referring to the humanities professions, such as Analysts, Lawyers, Anthropologists, and Psychologists etc. These professionals all have a role to play as the ‘Arts’ in Science, Technology, Engineering, Arts and Maths. We need to integrate the technical and humanities elements to solve complex problems in the cyber domain.
  15. Covert activity is not an ADF mission. However, all engineering disciplines must be engaged in this cross-disciplinary challenge.
  16. Absolutely. The Government has been crystal clear with Defence that we must engage closely with Australian industry. We will achieve national resilience in cyber space only if Government, industry, academia and individuals work together to develop collective resilience.
  17. I’m open to any and all good ideas here! If there are options for re-deploying the skills of experienced retiring engineers, we should consider it.
  18. It’s a good start! There’s no single ‘fix-all’ when it comes to cyber security. Check out the ASD Essential 8. Make sure you’re regularly patching your applications to repair any security flaws, and update your software when prompted.
  19. I’ll agree on the prestige aspect, as it’s hard to compete with our mission! But I’d argue it’s the opposite. Defence has difficulty retaining cyber operators who are lured by more attractive salaries in the private sector. While it pains me to see good people leave Defence, I’m realistic about the benefits to the nation when people seek experience elsewhere. Former members of the ADF bring skills and a work ethic that makes them extremely valuable outside the military. The good news is that many choose to remain active Reservists, which means we all benefit.
  20. We co-operate regularly and routinely with our Five Eyes partners and like-minded nations on current and emerging threats in the cyber domain, training initiatives, exercises, policy issues and academic thinking. Co-operation is key in the current threat environment.
  21. First, make sure you’re complying with the “ASD Essential 8”. Visit www.cyber.gov.au for more information. Subscribe to updates for the Australian Cyber Security Centre, and stay informed. Resilience is what we rely on when security fails. Everyone needs to be thinking constantly about how they can operate if their cyber security has been breached. How quickly can you recover? This conversation needs to happen at every level within every organisation from Board-level down to the most junior level. It’s no secret that cyber attackers are casting a wide net across Australia, and this
  22. The ADF works very closely with ASD. In my view, any smart cyber-operator – wherever they work within the Defence portfolio – contributes to our national cyber capability. We have uniformed members working within ASD, who contribute to a shared a mission. There will be some very talented cyber operators who do not necessarily fit well within the military, but are well-suited to a role with ASD. In the end, we all benefit!
  23. There’s plenty of open-source information about cyber/data breaches and I’m pleased we’re talking about this more openly. A relatively recent (2018), high profile data breach was the one experienced by ANU. What’s worth noting here is ANU’s openness and transparency about the breach, which helps lift our collective understanding of cyber-attacks.
  1. Load more activity
×
×
  • Create New...