Last Friday, ACS attended the 80th anniversary gala of the Liberal Party in Sydney. ACS was represented by Senior members – Cindy Chung, NSW BEC Chair and Murali Sagi, Chair, ACS NSW Fellow Committee as well as our Corporate Affairs and Public Policy team. Our table was hosted by Senator the Hon Simon Birmingham – Shadow Minister for Foreign Affairs and Leader of the Opposition in Senate. ACS works closely with both major parties, attending the gala gave ACS the opportunity to speak with senior Shadow Ministers including Senator Birmingham, among many others, to discuss our policy ideas especially on AI and Cyber. Senator Birmingham thanked ACS for their sponsorship on the evening. Cindy and Murali were also able to meet with the Hon The Hon. Peter Dutton MP Leader of the Opposition and were able to have a conversation regarding ACS and how we can assist with policy development. We look forward to continuing to work with all sides of politics throughout 2024. #ICT #ICTSector #CyberSecurity #AI #PublicPolicy
ACS (Australian Computer Society)’s Post
More Relevant Posts
-
The global cost of cybercrime is rapidly increasing. In 2023, it was estimated to have surged to a staggering US$8 trillion. Amidst these rising challenges, there are abundant opportunities to confront and mitigate these risks. Discover more in our latest report https://deloi.tt/4bPY1aA #Cybersecurity #JusticeReimagined
To view or add a comment, sign in
-
The global cost of cybercrime is rapidly increasing. In 2023, it was estimated to have surged to a staggering US$8 trillion. Amidst these rising challenges, there are abundant opportunities to confront and mitigate these risks. Discover more in our latest report. #cybersecurity #JusticeReimagined
Justice Reimagined | Deloitte Australia | Defence, Security & Justice
deloitte.com
To view or add a comment, sign in
-
B2B Demand Gen veteran | Field Marketing | Partner Marketing | Start-up creativity with grown-up efficiency | Strategic thinker with sleeves that still roll up
The Semperis strategic advisory board is a who's who in cybersecurity leadership and innovation, from private and public sector circles. For those in Australia, #CISOSYD on 21st February is a great opportunity to hear The Hon. Malcolm Turnbull, 29th Prime Minister, discuss cyber trends and threats facing the industry today. #ActiveDirectory #ADSecurity
#Semperis Strategic Advisory Board member The Hon. Malcolm Turnbull AC, 29th Prime Minister of Australia, will be speaking at #CISOSYD on 21st February at Royal Randwick. While Mr Turnbull was Prime Minister, in 2016 he released Australia's first Cybersecurity Strategy. His insights in how this came to be and the role government, business and citizens have in cybersecurity are thought-provoking. Gina Luzzi, Michael Choo and I will be at the two day event on 20 and 21 Feburary. I will also be speaking about when #activedirectory is under attack and the impact this has to overall business technology operations. Register at https://lnkd.in/dcMP9kT5
To view or add a comment, sign in
-
I was privileged enough to attend this online event today. A few things stuck out to me the first was the questions around Spyware Vs Ransomware, Espionage services, Mercenary Spyware. I particularly enjoy the differentiation between these layers. As a person who works in Digital StateCraft focusing on conflict areas of the world; I have been working to help collect evidence and build political structures to prosecute the NSO Group amongst other things. I whole heartedly agree with the panelists we need a singular common global set of security responses to these common threats. This should include not only regulation but an active engaged OS-Int community engaged in sanctioned active measures. The terms mercenary/extortion/hostage/human trafficking are a few that pop out in my mind. My team engages in active measures to help break down the structural technical and political support of these groups. My current project is the removal of Russian Oil networks from NSO's leadership structure as well identifying their interconnection into crypto laundry and exchanges. Please feel free to check out this fantastic Atlantic Council DFL production as well as my most recent take of my introduction video; explaining some of my active measures demos; to help mitigate foreign malign influence. https://lnkd.in/dS4ajMgz
📡 🕵♂️ Have you ever wondered about what's going on with spyware? 🕵♀️ 📡 🌩 Join us for a moderated panel discussion "On the state of spyware: Mapping the risks and incentives of the market" - on Friday, March 15, from 1:00 pm to 2:00 pm ET - coming to you live 🎥 from the 12th annual Washington, DC #Cyber912 Strategy Challenge at American University Washington College of Law, American University School of International Service. The panel will feature Ingrid Dickinson, Security Policy Manager, Global Threat Disruptions, Meta; Kirsten Hazelrig, Policy Lead, Cyber and Intelligence Technologies, MITRE; Rose Jackson, Director, Democracy & Tech Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council; and Monica Ruiz, Senior Government Affairs Manager, Digital Diplomacy, Microsoft. The panel will be moderated by Jen Roberts, Assistant Director, Cyber Statecraft Initiative, Atlantic Council. Join us virtually as the panel explores the global positioning of the spyware market and recent steps from both the public and private sector to limit the harms stemming from the market. To register and learn more: https://lnkd.in/gy-i7PyD
On the state of spyware: Mapping the risks and incentives of the market
https://www.atlanticcouncil.org
To view or add a comment, sign in
-
Yesterday, the UN Ad Hoc Committee (#AHC) on cybercrime kicked off their sixth negotiating session towards the future treaty. Member states have gathered in New York to discuss the draft text (https://lnkd.in/ezJc7M29). Since the start of the negotiations in 2022, Chatham House's Cyber Policy team has followed the process closely and convened side events. If you're interested in learning more about UN negotiations and cybercrime policymaking, check out some of our commentary and analysis: 🎙 Joyce Hakmeh interviewed H.E. Faouzia Mebarki (chair of the AHC process) on the impact an international instrument on cybercrime could have: https://lnkd.in/eUTSERgn 🌐 Amrit Swali and I explored how the future treaty could help - or harm - victims and vulnerable groups: https://lnkd.in/eEjFQj-J 📑 In this briefing paper, James Shires and team adopted a 'gender mainstreaming' lens to recommend improvements to various draft articles: https://lnkd.in/ezkXWMp4. 🌎 After the first session, Joyce Hakmeh shared a commentary on whether a cybercrime convention for all can truly be achieved: https://lnkd.in/eMDty8YM? 📚 Finally, here's an accessible explainer on what the cybercrime treaty process is, why it matters, and key issues that have united and divided states: https://lnkd.in/ebt_tpnY. Watch this space for our latest thinking and analysis on the future UN cybercrime treaty.
To view or add a comment, sign in
-
We're thrilled to be a part of the 14th Annual #BillingtonCyberSecuritySummit this year. Mark your calendars for a must-attend session: 📅 Breakout A1: Protecting Data in a #ZeroTrust World 🕙 Wednesday, Sept 6, 10:25-11:10am In today's digital landscape, securing data is paramount. But it's not just about locking it away – it's about enabling its usefulness while ensuring uncompromising protection. Join us as we explore how an effective zero trust foundation plays a crucial role in achieving this balance. Our distinguished speakers bring their expertise to the forefront: Shane Barney, CISO at U.S. Citizenship & Immigration Services (USCIS) Gerald Caron, Chief Information Officer at International Trade Administration (ITA), Department of Commerce (DOC) Shery S Thomas, Cyber Technology Officer at United States Marine Corps Forces Cyberspace Command JR Williamson, CISO at Leidos Travis Rosiek, Public Sector CTO at Rubrik Willie Hicks, Public Sector Chief Technologist at Dynatrace Join us as we delve into strategies for crafting a robust data management plan that safeguards the scope, types, and utility of data for organizations of all kinds. https://lnkd.in/d-EgA24s #cybersecurity
Home
billingtoncybersummit.com
To view or add a comment, sign in
-
BLOG | How to Publicly Attribute a Cyber Operation to Another State Publicly attributing the authorship of malicious #cyber operations to another state has become an increasingly popular policy response for many states. In our latest #DirectionsBlog post, Christina Rupp sheds light on the political attention these official public political attributions receive, and the importance for states to reasonably explain and justify the reasoning behind particular public attributions. She argues that when balancing disclosure and strategic discretion in the public communication of an attribution, states should seek reasonable transparency. 🔗 Read more: https://lnkd.in/dgEedQ44
Striking the Right Balance: How to Publicly Attribute a Cyber Operation to Another State
https://directionsblog.eu
To view or add a comment, sign in
-
Stepping out from the shadows towards outreach, innovation, and transparency is a good thing. This opinion piece sheds light on newfound openness and transparency around previously secretive national instruments of power cultivated by the National Security Agency. It also highlights the agency's continued collaboration with government and commercial sectors to enhance national security. Check out the article for a fascinating insight into how the NSA is working to keep us safe. #NationalSecurity #Transparency #Collaboration
NSA’s transformation from secret agency to public cybercrime warrior
c4isrnet.com
To view or add a comment, sign in
-
Recommended reading: Op-Ed by my colleague Christina Rupp based on our policy paper on public attribution. Link to op-ed below, policy paper here: https://lnkd.in/eK9Esi-z
BLOG | How to Publicly Attribute a Cyber Operation to Another State Publicly attributing the authorship of malicious #cyber operations to another state has become an increasingly popular policy response for many states. In our latest #DirectionsBlog post, Christina Rupp sheds light on the political attention these official public political attributions receive, and the importance for states to reasonably explain and justify the reasoning behind particular public attributions. She argues that when balancing disclosure and strategic discretion in the public communication of an attribution, states should seek reasonable transparency. 🔗 Read more: https://lnkd.in/dgEedQ44
Striking the Right Balance: How to Publicly Attribute a Cyber Operation to Another State
https://directionsblog.eu
To view or add a comment, sign in
-
Developing a strong plan to address cybersecurity concerns across the Western Hemisphere.
Western Hemisphere Cyber Conference | Homeland Security
dhs.gov
To view or add a comment, sign in
64,388 followers
Pro bono Innovation and economic research, ICT governance, Healthcare patient advocate.
3wBipartisan IT policy agreement is usually the most effective. Unfortunately, sometimes politicians prefer mythology and predisposed positions to informed scientific input. Talking to representatives of all political parties can help to achieve sensible effective IT policy consensus. More important than ever with the rapid spread of AI usage. Well done ACS.