Defence to up ICT security skills
- 07 February, 2011 13:37
Defence is set to brush up on ICT security skills, signalling intentions to provide all personnel with additional training on technology-related risk.
According to Defence documents, the ICT Security Awareness Training project will help meet requirements to develop a strong security culture and make personnel aware of security threats and their responsibilities.
“This project will contribute to Defence and Government security by supporting strategies to raise security awareness, establish a strong security culture and improve security management,” the documents read.
Under the project, a survey of existing ICT security awareness training procedures, to be made available shortly by the Defence Security Authority (DSA), and any other security awareness training shortfalls will be conducted. Based on this survey, a list of topics and training modules will be created, which will allow Defence to prioritise and choose those topics and modules that need to be made available to Defence personnel.
A Defence contractor will then develop training packages identified by Defence and deliver them via computer-based training, posters and/or pamphlets and narratives to be used by Defence for face-to-face training.
The project follows the release of a report by the Kokoda Foundation into the state of ICT security in Australia late last week.
The report praised Federal Attorney General, Robert McClelland, for his groundwork in creating such bodies as the Cyber Security Operations Centre and the Computer Emergency Response Team (CERT). But the report said much more was needed.
"The gap between threat and response capabilities is growing," the report warns. "If we do not increase our focus on cyberspace, the threat will grow faster than our response and the cost of addressing the growing threat in the future will increase, possibly exponentially."
Australia and the UK in January committed to furthering cyber security between the two countries under the existing Australia-UK Ministerial (AUKMIN) consultations currently underway.
In a joint communiqué, the two nations said they would work together in “concrete and practical ways” to shape a more secure environment and advance common interests in the area of cyber security.
Follow Tim Lohman on Twitter: @tlohman
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
5 Ways To Be More Productive At Work
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
Ensuring Online Business in Asia-Pacific
In an increasingly connected world, your company’s online presence is often the first - and sometimes the only – way that your customers and clients engage with you. In this whitepaper, we look at how companies can leverage the right technology and service to deliver a secure network infrastructure - from internal communication and record-keeping to product design and financial management.
Cloud-Based Mobile Device Security Streamlines Data Protection
Read this white paper to learn why cloud-based security offers superior protection that meets today’s requirements for identifying and preventing access to malicious sites and applications while reducing management complexity and IT staff time and effort. This whitepaper discusses: • Increased use of mobile devices and the associated risks • Ways to address security challenges • Benefits of cloud-based anti-malware solutions