addressing converged risks in converged infrastructures a
play

Addressing Converged Risks in Converged Infrastructures A View - PowerPoint PPT Presentation

Addressing Converged Risks in Converged Infrastructures A View from Government from Government Jeff Malone Assistant Director Critical Infrastructure Department of Broadband, Communications and the Digital Economy Scope Part 1 -


  1. Addressing Converged Risks in Converged Infrastructures – A View from Government from Government Jeff Malone Assistant Director – Critical Infrastructure Department of Broadband, Communications and the Digital Economy

  2. Scope • Part 1 - Convergence and its discontents • Part 2 - Historical background • Part 3 – Current Government Initiatives • Part 4 - Future directions

  3. Part 1 - Convergence and its Discontents • Convergence in Infrastructure • Convergence in the Threat

  4. Convergence in Infrastructure • Digital convergence • Public and private • Domestic and international • Physical and virtual

  5. Convergence in the Threat Space • Tools used • Targets attacked

  6. Part 2 - Historical Background • 1970s – 1980s • 1990s • Early 21 st Century

  7. 1970s – 1980s • 1979 - Protective Security Review / Vital • 1979 - Protective Security Review / Vital Installations Program • 1986 – DSD designated National Computer Security Authority • 1980s – Information Exchange Steering Committee • 1980s – concepts of the Information Society

  8. 1990s • OGIT/OGO – Government ICT • OGIT/OGO – Government ICT • NISCC/IPAC/NOIE – Information Economy • Y2K • Protecting the National Information Infrastructure

  9. Early 21 st Century • Government ICT and the Information • Government ICT and the Information Economy - NOIE • Cybercrime Bill 2001 • E-Security National Agenda

  10. Part 3 – Current Initiatives • E-Security National Agenda reviewed in 2006 2006 • Established E-Security Policy and Coordination Committee • Three priorities: – Protecting Government ICT – Protecting National Critical Infrastructure – Protecting Home Users and SMEs

  11. Protecting Government ICT • OnSecure • OnSecure • Business Continuity

  12. Protecting Critical Infrastructure

  13. Communication Sector Infrastructure Assurance Advisory Group (CSIAAG) • Telecommunications, Broadcast, Submarine Cables, Postal • Trusted information sharing environment • Other activities – Exercises – Risk Management Framework

  14. Information Technology Security Expert Advisory Group • Cross-sectoral • Cross-sectoral • Information papers

  15. SCADA Community of Interest • Working group of ITSEAG • Working group of ITSEAG • Practitioner workshops

  16. Other Initiatives • GovCERT • Computer Network Vulnerability Assessment Program • Critical Infrastructure Modelling and Analysis Program • CYBERSTORM series of exercises

  17. Protecting Home Users and SMEs • Stay Smart Online • Stay Smart Online Alert Service • National E-Security Awareness Week • E-Security Education Package

  18. Stay Smart Online website www.staysmartonline.gov.au Encouraging home Encouraging home users and small businesses to adopt smart e-security practices and behaviours

  19. Stay Smart Online Alert Service • The Stay Smart Online Alert Service is available through the Stay Smart Online website. through the Stay Smart Online website. • The Alert Service is a free subscription service and provides information to home users and small businesses on Australian context e- security threats and possible solutions to address them.

  20. 2008 National E-Security Awareness Week • Australia’s National E-Security Awareness • Australia’s National E-Security Awareness Week ran from 6 -13 June 2008. - Range of events, community activities and initiatives held across Australia (both regional and cities) throughout the Week.

  21. E-Security Education Package for Australian Schools • An e-security package for Australian schools is currently being developed. • Targeted at both primary and secondary children to improve secure online behaviours.

  22. Part 4 - Future Directions • National Security Strategy • Homeland and Border Security Review • E-Security Review

  23. National Security Statement • Significant electoral commitment by Government • Provides whole-of-government perspective on national security • Considers broad range of Australia’s interests and threats – specifically includes ‘cyber’ threats

  24. Homeland and Border Security Review • Comprehensive review of border and • Comprehensive review of border and homeland security – includes critical infrastructure protection • Conducted by Ric Smith – coordinated out of DPMC • Presently being considered by Government

  25. E-Security Review 2008 • Develop new policy framework for e- security security • Address emerging issues • Submissions sought • Will report to Government in October 2008.

  26. Conclusion

  27. Questions?

Recommend


More recommend