addressing converged risks in converged infrastructures a
play

Addressing Converged Risks in Converged Infrastructures A View - PowerPoint PPT Presentation

Addressing Converged Risks in Converged Infrastructures A View from Government from Government Jeff Malone Assistant Director Critical Infrastructure Department of Broadband, Communications and the Digital Economy Scope Part 1 -


  1. Addressing Converged Risks in Converged Infrastructures – A View from Government from Government Jeff Malone Assistant Director – Critical Infrastructure Department of Broadband, Communications and the Digital Economy

  2. Scope • Part 1 - Convergence and its discontents • Part 2 - Historical background • Part 3 – Current Government Initiatives • Part 4 - Future directions

  3. Part 1 - Convergence and its Discontents • Convergence in Infrastructure • Convergence in the Threat

  4. Convergence in Infrastructure • Digital convergence • Public and private • Domestic and international • Physical and virtual

  5. Convergence in the Threat Space • Tools used • Targets attacked

  6. Part 2 - Historical Background • 1970s – 1980s • 1990s • Early 21 st Century

  7. 1970s – 1980s • 1979 - Protective Security Review / Vital • 1979 - Protective Security Review / Vital Installations Program • 1986 – DSD designated National Computer Security Authority • 1980s – Information Exchange Steering Committee • 1980s – concepts of the Information Society

  8. 1990s • OGIT/OGO – Government ICT • OGIT/OGO – Government ICT • NISCC/IPAC/NOIE – Information Economy • Y2K • Protecting the National Information Infrastructure

  9. Early 21 st Century • Government ICT and the Information • Government ICT and the Information Economy - NOIE • Cybercrime Bill 2001 • E-Security National Agenda

  10. Part 3 – Current Initiatives • E-Security National Agenda reviewed in 2006 2006 • Established E-Security Policy and Coordination Committee • Three priorities: – Protecting Government ICT – Protecting National Critical Infrastructure – Protecting Home Users and SMEs

  11. Protecting Government ICT • OnSecure • OnSecure • Business Continuity

  12. Protecting Critical Infrastructure

  13. Communication Sector Infrastructure Assurance Advisory Group (CSIAAG) • Telecommunications, Broadcast, Submarine Cables, Postal • Trusted information sharing environment • Other activities – Exercises – Risk Management Framework

  14. Information Technology Security Expert Advisory Group • Cross-sectoral • Cross-sectoral • Information papers

  15. SCADA Community of Interest • Working group of ITSEAG • Working group of ITSEAG • Practitioner workshops

  16. Other Initiatives • GovCERT • Computer Network Vulnerability Assessment Program • Critical Infrastructure Modelling and Analysis Program • CYBERSTORM series of exercises

  17. Protecting Home Users and SMEs • Stay Smart Online • Stay Smart Online Alert Service • National E-Security Awareness Week • E-Security Education Package

  18. Stay Smart Online website www.staysmartonline.gov.au Encouraging home Encouraging home users and small businesses to adopt smart e-security practices and behaviours

  19. Stay Smart Online Alert Service • The Stay Smart Online Alert Service is available through the Stay Smart Online website. through the Stay Smart Online website. • The Alert Service is a free subscription service and provides information to home users and small businesses on Australian context e- security threats and possible solutions to address them.

  20. 2008 National E-Security Awareness Week • Australia’s National E-Security Awareness • Australia’s National E-Security Awareness Week ran from 6 -13 June 2008. - Range of events, community activities and initiatives held across Australia (both regional and cities) throughout the Week.

  21. E-Security Education Package for Australian Schools • An e-security package for Australian schools is currently being developed. • Targeted at both primary and secondary children to improve secure online behaviours.

  22. Part 4 - Future Directions • National Security Strategy • Homeland and Border Security Review • E-Security Review

  23. National Security Statement • Significant electoral commitment by Government • Provides whole-of-government perspective on national security • Considers broad range of Australia’s interests and threats – specifically includes ‘cyber’ threats

  24. Homeland and Border Security Review • Comprehensive review of border and • Comprehensive review of border and homeland security – includes critical infrastructure protection • Conducted by Ric Smith – coordinated out of DPMC • Presently being considered by Government

  25. E-Security Review 2008 • Develop new policy framework for e- security security • Address emerging issues • Submissions sought • Will report to Government in October 2008.

  26. Conclusion

  27. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend