{"id":1293,"date":"2024-09-22T16:29:44","date_gmt":"2024-09-22T16:29:44","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1293"},"modified":"2024-10-19T13:17:27","modified_gmt":"2024-10-19T13:17:27","slug":"public-private-intelligence-sharing-our-best-defence-in-cyber-warfare","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/public-private-intelligence-sharing-our-best-defence-in-cyber-warfare\/","title":{"rendered":"Public, private intelligence sharing our best defence in cyber warfare"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"259\" height=\"194\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Blog201.webp\" alt=\"https:\/\/lmntrix.com\/wp-content\/uploads\/2020\/05\/Blog201.jpg\" class=\"wp-image-1294\" style=\"width:535px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>Tomorrow\u2019s wars will be fought with binary, not bombs. Clandestine, guerilla raids on critical infrastructure by state-sponsored cyber attackers have the potential to bring nations to their knees. This kind of warfare, fought over the web, is indiscriminate \u2013 targeting not just the military but also civilians.&nbsp;<br><br>This isn\u2019t the plot summary of some science fiction film. In fact, Australia has already begun preparing for this next level of warfare. In July this year, 30,000 Australian and American troops took part in the Pacific\u2019s largest ever military exercise, dubbed operation <a href=\"http:\/\/www.abc.net.au\/news\/2017-07-16\/australian-military-prepares-for-emerging-threats-at-war-games\/8712028\" target=\"_blank\" rel=\"noopener\">Talisman Sabre<\/a>. In conjunction with the usual military drills, officers also tested their capabilities in cyber space, defending critical infrastructure and practicing offensive techniques.<br><br>Australia\u2019s preparations extend beyond just drills. <a href=\"http:\/\/www.news.com.au\/national\/politics\/cyber-warfare-australia-launches-new-military-information-unit-asd-to-target-criminal-hackers\/news-story\/9e60e30a3ce9deef51b8e7cbf9e8b0a1\" target=\"_blank\" rel=\"noopener\">A cyber warfare unit<\/a> has recently been created within the Australian Defence Force to conduct both offensive and defensive cyber operations. Although there were already exceptional cyber capabilities within the military, the unit is designed to ensure Australia\u2019s cyber security capability stays on the cutting edge. The goal is to move capabilities beyond the defensive, enabling the army to take the fight to adversaries. &nbsp;&nbsp;<br><br>This unit \u2013 <a href=\"https:\/\/www.itnews.com.au\/news\/australia-has-created-a-cyber-warfare-unit-467115\" target=\"_blank\" rel=\"noopener\">the \u2018Information Warfare Unit\u2019<\/a> \u2013 comprises 100 cyber security specialists and will expand to 900 analysts within a decade. This shows how seriously the threat is being taken. Critically, the unit isn\u2019t just about preparing for war, it is also working to protect entrepreneurs, small businesses, corporations, government departments, and any other organisation typically in the cross hairs of cyber attackers. The data these businesses hold, and the functions they carry out, are all enemy targets and this new division is essential to ensuring their safety \u2013 and ours.&nbsp;<br><br>Along with government departments, some of the biggest targets will be large Australian enterprises. Now, more so than ever, it is critical that the private and public sectors share the cyber intelligence they have so that both parties can be prepared for anything thrown at them. Attackers are known to share methods and tactics so, in order to advance the state of threat intelligence, private and public organisations must also collaborate and correlate data, quickly.<br><br>One of the <a href=\"https:\/\/theconversation.com\/cyber-revolution-in-australian-defence-force-demands-rethink-of-staff-training-and-policy-80317\" target=\"_blank\" rel=\"noopener\">biggest challenges this new military branch will face is staffing<\/a>. This division will be unlike other parts of the military; favoring brain over brawn. Recruitment will require not only finding the best of the best, but enticing them away from lucrative private sector positions. Finding the initial staff is only the first battle. The Defence Force will need to determine the skill sets required and what training is necessary if they\u2019re to fill the 900 roles envisioned in 10 years\u2019 time; the personnel simply do not exist today, so they\u2019ll need to be cultivated.&nbsp;<br><br>For the younger generation, still unsure of what to study, cyber security and computer science skills are in incredibly high demand. In the meantime, intelligence is our greatest asset in the fight against cyber adversaries. The private and public sectors must share whatever information they have, as quickly as they can, if we\u2019re to be prepared \u2013 both to defend and to attack.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tomorrow&rsquo;s wars will be fought with binary, not bombs. Clandestine, guerilla raids on critical infrastructure by state-sponsored cyber attackers have the potential to bring nations to their knees. This kind of warfare, fought over the web, is indiscriminate &ndash; targeting not just the military but also civilians.&nbsp; This isn&rsquo;t the plot summary of some science [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1294,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1293"}],"version-history":[{"count":2,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1293\/revisions"}],"predecessor-version":[{"id":3715,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1293\/revisions\/3715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1294"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}