13 Jul The cyber investment we had to have
I was aghast when out of the blue came an announcement on ABC News that the Australian federal government was allocating 1.35 billion dollars to cyber security and cyber defence over the next 10 years. To put this into perspective the 2016 Cyber Security Strategy was an investment of 230 million dollars over 4 years. The Federal Government’s Home Affairs website states “the cyber threat landscape has shifted and evolved dramatically” over the last 4 years and now cyber security requires further large scale investment and commitment. The 2020 Cyber Security Strategy is currently reviewing submissions and this funding announcement comes in response to not only that strategy being worked upon but also, recent cyber threats and attacks from state based actors and organised cyber crime networks to corporate businesses, government agencies and individual families.
Australia is on the offensive in some cases with cyber attacks, as was the case with ISIS in 2016 when the Australian Signals Directorate worked directly with the ADF to shoulder some of the technical burden of military battle. According to Fergus Hanson, Director of Australian Strategic Policy Institute’s International Cyber Policy Centre, the rules of conflict remain the same whether it is digital or arms based, there is an obligation by the state to maintain the integrity of national infrastructure such as power or water supply, so that civilians remain unharmed.
This latest investment announcement will specifically assist the training and development for at least 500 new cyber spies and warriors. Currently we have a workforce shortage in relation to information technology and the investment into targeted education in this field would hopefully cover the shortfall over the next decade.
Faster Networks help businesses protect their digital assets. We are a cyber security partner that brings the best software solutions that anticipate and fix digital vulnerabilities. Our areas of expertise includes Vulnerability Management, Security Orchestration Automation and Response (SOAR), Application Security, Infrastructure Security, Distributed Denial of Service (DDoS) Protection and Application Pentesting.