Defence to up ICT security skills
- 07 February, 2011 13:37
Defence is set to brush up on ICT security skills, signalling intentions to provide all personnel with additional training on technology-related risk.
According to Defence documents, the ICT Security Awareness Training project will help meet requirements to develop a strong security culture and make personnel aware of security threats and their responsibilities.
“This project will contribute to Defence and Government security by supporting strategies to raise security awareness, establish a strong security culture and improve security management,” the documents read.
Under the project, a survey of existing ICT security awareness training procedures, to be made available shortly by the Defence Security Authority (DSA), and any other security awareness training shortfalls will be conducted. Based on this survey, a list of topics and training modules will be created, which will allow Defence to prioritise and choose those topics and modules that need to be made available to Defence personnel.
A Defence contractor will then develop training packages identified by Defence and deliver them via computer-based training, posters and/or pamphlets and narratives to be used by Defence for face-to-face training.
The project follows the release of a report by the Kokoda Foundation into the state of ICT security in Australia late last week.
The report praised Federal Attorney General, Robert McClelland, for his groundwork in creating such bodies as the Cyber Security Operations Centre and the Computer Emergency Response Team (CERT). But the report said much more was needed.
"The gap between threat and response capabilities is growing," the report warns. "If we do not increase our focus on cyberspace, the threat will grow faster than our response and the cost of addressing the growing threat in the future will increase, possibly exponentially."
Australia and the UK in January committed to furthering cyber security between the two countries under the existing Australia-UK Ministerial (AUKMIN) consultations currently underway.
In a joint communiqué, the two nations said they would work together in “concrete and practical ways” to shape a more secure environment and advance common interests in the area of cyber security.
Follow Tim Lohman on Twitter: @tlohman
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Enterprise CIO Forum Executive Summary
- A New Set of Network Security Challenges
- IT Operations Wake up Call - The Impact of Consumer Driven IT
- Gympie Council Case Study - From country to coast, Gympie region gets protected
- Leading Through Connections – Insights from the Global Chief Executive Officer Study
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Six Reasons to Empower Your SharePoint Citizen Developers
More and more business applications are being created by “citizen developers” - end users who are not IT developers but who create solutions for themselves and their groups. This white paper explores six reasons to embrace citizen development in an intelligent way that minimises risks and maximises the return on your SharePoint investment. Read now.
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Unleashing the Power of Information
If business-relevant information is not well managed, secured and analysed, it can become an underutilized asset or—worst case—a legal and competitive liability. Nearly all of the IT and business executives who responded to a recent survey recognise this risk, and say they understand the importance of having an enterprise information management (EIM) strategy. Find out more on how to reduce costs, improve competitiveness and avoid risk by making information management an enterprisewide strategic priority.