Ransomware

Don’t Miss Out! Australia’s CIRMP Filing Starts July 1

The Australian government is implementing stricter cybersecurity measures by mandating critical infrastructure operators to develop and maintain a cybersecurity framework.

by Krishna Murthy July 16, 2024

Share on LinkedInShare on Twitter

The Cyber & Infrastructure Security Centre (CISC) of Australia has recently announced that the Critical Infrastructure Risk Management Program (CIRMP) Annual Report filling period will begin from July 1 till September 28, 2024.

Organizations must submit their cybersecurity reports using this designated form by August 17, 2024. They will be required to develop, implement, and maintain a cybersecurity framework under the Security of Critical Infrastructure (SOCI) CIRMP Rules.

This project is part of the Australian Government’s effort to promote confidence in digital products and services, not only by ensuring their security and integrity but also by demonstrating the government’s commitment to trustworthiness. By this way, the country aims to not only strengthen the privacy of the citizens but also improve the identity of such products in the eyes of the people.

Australia’s Global Collaboration Plan for Cybersecurity

While technology evolves, some of the most problematic digital products are still deficient in data protection. Many digital products still lack basic security features. So, both individuals and companies who use them become easy targets for cybercriminals. The incursion of Advanced Persistent Threats (APT) in industry, as well as technology obsoleteness, makes it necessary to cooperate with other countries.

For this reason, the Australian government is pushing for sustainable cooperation to address the problems of cybercrime by adhering to standards. This includes measures like information sharing, exchanging the best examples in terms of cybersecurity, and employing innovation across countries.

However, questions remain as to how international treaties among nations can counter possible cyberattacks through public-private cooperation and how quickly can they react in the direction of the restoration of the cyberspace stable.

Australia has several complementary mechanisms to ensure digital products are secure by design such as Protective Security Policy Framework (PSPF), and the Security of Critical Infrastructure Act 2013. With these mechanics, Australia aims to secure its digital products from the beginning.

Work is currently being pursued under component three in the 2023-2030 National Security Strategy to address technology resilience and security by means of not only IT (Information Technology) but also in OT (Operational Technology) and ICS (Industrial Control System).

Advantages of Learning & International Collaboration for Cybersecurity

The Australian government is acquiring knowledge from the approaches of international partners and is using them to the fullest extent.

“Australia and our international partners share a common goal: securing all technologies, including those employed in OT and ICS environments,” said a representative from the Australian Department of Home Affairs to Industrial Cyber.

Public and Private Sector Collaboration for Cybersecurity

The next generation of the public-private partnership (PPP) is crucial for boosting Australia’s cybersecurity position. Sharing information, the development of best practices, and response to cyber incidents in a coordinated manner are parts of the collaborative process, thus, keeping Australia’s digital infrastructure on the same page.

Australia gains additional benefits from its cooperations with foreign partners, and besides the sharing of cases and strategies, it helps and promotes each respective partnership.

“Cybersecurity goes beyond borders,” the Department of Home Affairs spokesperson explained in layman’s terms.

“Australia depends not only on the operational part of the agency but on the strong relationships with our foreign partners to deliver timely and necessary information to improve the responses to and mitigate cyber threats. The close international collaboration observed in aviation safety activities has served as a successful model for our efforts.”

The spokesperson insisted that the trend of coordinated regulations and policies is intensifying, and thus, it requires a more comprehensive and inclusive approach.

“Previously, the legislators had the freedom to modify the boundaries of the policy set up in a specific area since policy making was done according to the forms of each jurisdiction at that time. However, now we are observing cybersecurity go global through various technologies that are running a cross-border environment, largely avoiding the specific cases of the jurisdiction’s law, economy, and cultural factors. Hence, the countries all around the world not only recognize new and unique problems but are also willing to find different ways of policy issues to bring about international agreement and transparency,” the spokesperson concluded.

Source

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button