UNSW Canberra Cyber
UNSW Canberra Cyber, Australia’s premier centre for the interdisciplinary study of cyber security and the campus Research Group on Cyber War and Peace, will convene an international conference in February 2019 on the “Cyber Storm.”
Australia’s former Minister of Cyber Security, Hon. Dan Tehan, warned in November 2016, of the need for the country to prepare for a cyber storm, even if it was an unlikely contingency. One view of the Cyber Storm sees it as the contingencies arising from protracted and complex, multi-vector, multi-wave, multi-theatre attacks against cyber assets. Such assets can include critical civil infrastructure, military C4ISTAR, computerised systems in weapons platforms, and even other civilian targets of military or national security significance. This conference will tease out scholarly approaches to characterising complex cyber crises (such as the “cyber storm”).
A related interest of the conference will be to look at the role universities and professional education institutions, such as military colleges, can play to address the unique challenges of workforce formation for the Cyber Storm.
For middle powers like Australia, the research foundations on which policy responses to the “cyber storm” depend are very weakly developed, or even non-existent. This is especially the case in the sub-field of simulations. The conventional wisdom, or at least the dominant practice, has been that the knowledge, skills and abilities needed would be acquired “on the job” in highly classified environments. There has been little space for open-source research and therefore minimal open-source education and teaching.
This scholarly conference will discuss research papers on these subjects by leading specialists from universities, professional colleges, think tanks, government, and industry.
UNSW Canberra at the Australian Defence Force Academy
Campbell, ACT 2600
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem