
Australia pushes pedal on cyber infrastructure resilience
Australia’s Department of Home Affairs has hosted its first Cyber and Infrastructure Conference, providing industry professionals insights to champion organizational security and resilience.
Held in Sydney on 25 March, the inaugural event featured a number of expert speakers, a panel Q&A and a live hypothetical exercise on managing security risk.
Home Affairs Secretary Michael Pezzullo AO set the tone early in his opening address, when he cautioned that a cyber incident, akin in hostility to what we might see in physical warfare, could occur in the “not too distant future.”
“This is not a script for a fictional future action thriller. It is a cold, hard risk, for which we have to be prepared,” he said.
The recent spate of cyber attacks on critical infrastructure organizations has demonstrated the need to provide a coordinated response to risk management. This is particularly true for insider risk. Creating an insider risk program that puts the human first is going to be a key priority moving forward in protecting the critical organizations that underpin our way of life.
A Human-Centric Approach to Risk
One of the biggest takeaways at the conference was the need to change perceptions on cybersecurity and, in particular, insider risk.
This was a key topic during a panel discussion between Min Livanidis (Amazon Web Services), Leanne Close (Risk 2 Solution Group), John Yates (Scentre Group), Mike Gallacher (Ports Australia) and Brianna Casey (Foodbank).
It is becoming increasingly accepted that humans are the number one cause of most cyber security incidents. But that’s not to say most security incidents are a result of insider threats.
The reality is most human-led security incidents are a result of non-malicious behavior. MITRE Corporation defines non-malicious as an insider who does not seek to cause harm.
While most insider threats were once an insider risk, not all insider risks go on to become an insider threat. With this understanding comes the opportunity to change the narrative away from militarized language (which only alienates and disenchants employees) towards enabling language (that seeks to empower and support people). Insider risk leaders can, and should, consider the language they use to communicate to employees in their efforts to mitigate risk. Whether in day-to-day communications or in security or HR policy creation, language can make all the difference in fostering a culture where employees can, and want, to be active participants of an insider risk program.
Critical infrastructure will increasingly be at the heart of national and international life. As the security landscape continues to evolve, now is the time for organizations to revisit their security strategy and, in particular, the way they address insider risk.
Building an insider risk program that puts the human at the center of the cyber strategy is a must going forward, and a major part of this includes changing the narrative away from insider threat management and towards insider risk mitigation using language that is supportive, not suspicious.
To learn more about the insider risk landscape and recommendations for proactive risk mitigation, download our 2023 Insider Risk Investigations Report.
The post Australia pushes pedal on cyber infrastructure resilience appeared first on DTEX Systems Inc.
*** This is a Security Bloggers Network syndicated blog from DTEX Systems Inc authored by Kellie Roessler. Read the original post at: https://www.dtexsystems.com/blog/australia-pushes-pedal-on-cyber-infrastructure-resilience/