New Zealand government reveals cybersecurity strategy
- 07 June, 2011 15:43
Less than a week after the Australian Federal Government announced plans for a Cyber White Paper, New Zealand authorities have followed suit with a cybersecurity strategy.
The strategy, available from the New Zealand Ministry of Economic Development (MED) website outlines a number of priorities including plans to partner with industry and non-government organisations to improve access to cybersecurity information, the establishment of a national cybersecurity centre, implementing steps to improve cybersecurity practices across government, and incident response and planning.
In May, the New Zealand Parliament website was the subject of a DDoS (distributed denial of service) attack by hacktivist group ,Anonymous, after the group specifically voiced protest over the Copyright (Infringing File Sharing) Amendment Bill passed in April. The group took offence to elements such as the deactivation of the Internet accounts of repeat copyright infringers for six months and fines of up to $NZ15,000.
Minister for Communications and Information Technology, Steven Joyce, said in a statement that cybersecurity was increasingly important to New Zealanders, business and government.
“Criminal elements are increasingly using the Internet to gain access to personal information, steal business’ intellectual property, undermine critical services and gain knowledge of sensitive government held information for financial or other malicious purposes," said Joyce.
"New Zealand’s cybersecurity strategy is the government’s strategic response to the growing cyber threat. It brings forward targeted initiatives aimed at improving cybersecurity for individuals, businesses, critical national infrastructure and government."
According to Joyce, the actions contained in the strategy would significantly improve New Zealand’s cybersecurity response and create a strong platform which it could build from to meet new security challenges as they emerge.
The strategy was developed in consultation with unnamed industry and government cybersecurity experts, non-government organisations, academia and security partners.
The Office of Communications and Information Technology has been contacted for comment by Computerworld Australia
Got a security tip-off? Contact Hamish Barwick at hamish_barwick at idg.com.au
Follow Hamish Barwick on Twitter: @HamishBarwick
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Benefits of Deploying Microsoft Exchange Server 2010 on Dell Compellent with Data Progression
Messaging and collaboration platforms have emerged as mission critical applications, consuming a large portion of IT spending for organisations. The rich features in these applications have significantly changed the messaging requirements and needs of today’s information from anywhere with any device, the result is an ever increasing demand on storage systems both in terms of capacity and bandwidth. Many organisations are rethinking their storage strategies to meet the demanding criteria and to handle the future requirements. Read more.
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
Enterprises and government agencies are under virtually constant attack today. It is clear that the cybercriminals, nation-states, and hacker activists waging these attacks are growing increasingly sophisticated and more effective in their efforts to steal and sabotage. Why are today’s security defenses failing? In this battle, your security teams are using outdated arsenal - download now to learn more.
Tips Choosing a Cloud Service Provider
Because cloud is still a new and evolving business model, it can be argued that the decision to select a cloud service provider should be approached with even greater diligence than other IT decisions. Many providers use the same term to define very different services, “hybrid cloud” is one example, making it difficult to compare offers. This whitepaper will help enterprises evaluate their options in two critical areas: the cloud service portfolio and the service provider itself. Read now.