All Activity
- Last week
-
Santosh Thapa Chhetri joined the community
-
Mitlesh joined the community
-
ACSC Challenges, Lessons Learned and Cyber Security Advice for Australian Businesses
Jackson posted a calendar event in Community Calendar
untilACSC Challenges, Lessons Learned and Cyber Security Advice for Australian Businesses by Karl Hanmore What are the major lessons that ACSC has learned over its journey to building the Australian Government's public facing cyber centre of excellence? What challenges are you anticipating to occur in the next 5 years? What areas should Australian businesses be investing into cyber security to protect themselves (technology, people, MSSPs)? About the speaker Mr Karl Hanmore was appointed to the role of First Assistant Director-General Cyber Security Services (CSS) - Earlier
-
Internet of Things Security Awareness Guides Launch
Kiri Robbie posted a calendar event in Community Calendar
untilThe Internet of Things Alliance Australia is proud to invite you to the launch of Australia's first IoT Security Awareness Guides. Admission is free. https://www.eventbrite.com.au/e/internet-of-things-security-awareness-guides-launch-tickets-141506225931 -
Ethan Ross joined the community
-
TAFE4000 joined the community
-
Superkababi joined the community
-
Alex Wilson joined the community
-
smokescreen joined the community
-
Trevor Lindars joined the community
-
Patrick Berry joined the community
-
Jason Burman joined the community
-
Cyber-physical System Assurance via Systems Engineering Based Regulation
Jackson posted a calendar event in Community Calendar
untilCyber-physical System Assurance via Systems Engineering Based Regulation Presented by Mark van Zomeren Description: Using three hypothetical cases, which bear similarities to recent real-world cases, issues relating to the downside of cyber-physical systems are examined. Systems engineering principles and potential regulatory mechanisms are then considered, to determine if their application may have the potential to reduce or eliminate these issues. While these hypothetical cases do resemble real world events from over the past decade, there will be no in-depth anal -
Often cyber security involves a lot more than a technical solution. It requires taking into account people, cultures an economics at macro and micro levels. Non technical factors can create blind spots that attackers can exploit that can surprise designers. Such as the belief in compliance by users even the malicious one or that a user of a system would inconvenience many for a small perceived benefit. Have a look at the case study of prepaid electricity meters in Ross Andersen's security engineering book that shows how you need to account for cultural, social and economic issues to mak
-
I started my working journey as a Naval Artificer Apprentice many many many decades ago specialising at the time in RF, EW, Navigation Aids, Secure Comms, Crypto machines, Teletypes, and related technologies. The journey from that point onwards included many different experiences in the Navy, Defence and eventually the commercial world developing systems, executive management, consulting and also CIO/ COO roles. The world is your oyster.
-
Peter Hassall started following Am I being hacked?
-
Am I being hacked?
Peter Hassall replied to Kiri Robbie's topic in Q&A with Information Warfare Division, Defence
One of the WW2 security awareness slogans and posters was “Loose lips sink ships”, so maybe for our modern times it could be “Fickle fingers destroy enterprises”. -
Cyber has blurred the traditional, very clear, boundaries between peace and war. The area between is often referred to as the ‘grey zone’. While the tactics used in the cyber domain have been used for centuries (think military deception, psychological operations, and information operations), the scale and speed of the conduct of these activities in cyberspace is unparalleled. We are in a constant state of competition, and cyber threats are increasing in frequency and sophistication.
-
Am I being hacked?
Marcus Thompson replied to Kiri Robbie's topic in Q&A with Information Warfare Division, Defence
Sometimes it’s obvious – such as through ransomware messages, fake anti-virus messages, or phishing malware. But often, it’s not so clear, difficult to detect and goes unnoticed for a long time. The Australian Cyber Security Centre has published some handy information about hacking which you can find here: https://www.cyber.gov.au/acsc/view-all-content/threats/hacking. My suggestion would be to make sure you’re doing the basics well, and focus on increasing security to reduce the likelihood of a cyber breach. -
Information Warfare Division has a diverse workforce which includes ADF, APS and contractors. Like any government department, we advertise externally for positions we have available, so keep an eye out in the Public Service gazette. Alternatively, if you’re interested in a career in the ADF, visit defencejobs.gov.au.
-
Cyber range exercise
Marcus Thompson replied to Kiri Robbie's topic in Q&A with Information Warfare Division, Defence
As I’ve said before, I’m open to all good ideas! Last year, we took part in a capture-the-flag competition with a cyber incident response team from National Australia Bank. I’d be very keen to see similar activities in the future. -
I’m referring to the humanities professions, such as Analysts, Lawyers, Anthropologists, and Psychologists etc. These professionals all have a role to play as the ‘Arts’ in Science, Technology, Engineering, Arts and Maths. We need to integrate the technical and humanities elements to solve complex problems in the cyber domain.
-
Cyber worthiness strategy.
Marcus Thompson replied to Kiri Robbie's topic in Q&A with Information Warfare Division, Defence
Yes, and I believe this is getting better. -
Drain on cyber workforce
Marcus Thompson replied to Kiri Robbie's topic in Q&A with Information Warfare Division, Defence
I’ll agree on the prestige aspect, as it’s hard to compete with our mission! But I’d argue it’s the opposite. Defence has difficulty retaining cyber operators who are lured by more attractive salaries in the private sector. While it pains me to see good people leave Defence, I’m realistic about the benefits to the nation when people seek experience elsewhere. Former members of the ADF bring skills and a work ethic that makes them extremely valuable outside the military. The good news is that many choose to remain active Reservists, which means we all benefit. -
International cooperation?
Marcus Thompson replied to Kiri Robbie's topic in Q&A with Information Warfare Division, Defence
We co-operate regularly and routinely with our Five Eyes partners and like-minded nations on current and emerging threats in the cyber domain, training initiatives, exercises, policy issues and academic thinking. Co-operation is key in the current threat environment. -
First, make sure you’re complying with the “ASD Essential 8”. Visit www.cyber.gov.au for more information. Subscribe to updates for the Australian Cyber Security Centre, and stay informed. Resilience is what we rely on when security fails. Everyone needs to be thinking constantly about how they can operate if their cyber security has been breached. How quickly can you recover? This conversation needs to happen at every level within every organisation from Board-level down to the most junior level. It’s no secret that cyber attackers are casting a wide net across Australia, and this
-
The ADF works very closely with ASD. In my view, any smart cyber-operator – wherever they work within the Defence portfolio – contributes to our national cyber capability. We have uniformed members working within ASD, who contribute to a shared a mission. There will be some very talented cyber operators who do not necessarily fit well within the military, but are well-suited to a role with ASD. In the end, we all benefit!
-
There’s plenty of open-source information about cyber/data breaches and I’m pleased we’re talking about this more openly. A relatively recent (2018), high profile data breach was the one experienced by ANU. What’s worth noting here is ANU’s openness and transparency about the breach, which helps lift our collective understanding of cyber-attacks.
-
David Lang started following Q&A with Information Warfare Division, Defence
-
Am I being hacked?
Rudolf Ruys replied to Kiri Robbie's topic in Q&A with Information Warfare Division, Defence
When i did security for defense forces, the networks I did were unable to be hacked because they were dedicated networks and not part of a public one like internet. -
Am I being hacked?
Simon Allen replied to Kiri Robbie's topic in Q&A with Information Warfare Division, Defence
I wish there was a foolproof answer for this - I'd certainly sleep better! A SIEM is very useful for tracking anomalous behavior via event logs. Good endpoint protection that can report on executable chains is handy as well. Very keen to learn what others do, so I can integrate better methods into my own.