CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...

Page created by Alberto Holland
 
CONTINUE READING
CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...
CYBER CONNECTIONS FOR A
  STRONGER NEW SOUTH
  WALES – EVENT REPORT
CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...
CONTENTS

    •   Contents……………………………………………………………………………………………………………………………….1
    •   Executive Summary……………………………………………………………………………………………………………….1
    •   Todd Williams Opening Remarks…………………………………………………………………………………………..2
    •   Summary of University Presentations……………………………………………………………………………………3
    •   Summary of Industry Presentations………………………………………….…………………………………………..7
    •   Summary of Start-up Presentations…………………………………………………………………………………….12
    •   Summary of Government Presentations……………………………………………………………………………..14
    •   Summary of Panel discussion………………………………………………………………………………………………16
    •   Review of Workshops………………………………………………………………………………………………………….17
    •   Wrap-up………………………………………………………………………………………………………………………………19

Executive Summary:

Cyber Connections for a Stronger NSW was a roundtable hosted by the NSW Cyber Security Network
on the morning of Tuesday the 18th September. It brought together key stakeholders to start the
discussion about developing a robust cyber security ecosystem in New South Wales. Universities,
government services, utilities, businesses, and small/medium enterprises were represented.

Universities pitched the variety of research and development projects they had for cyber security to
demonstrate the collaboration opportunities for stakeholders in the ecosystem. While there were
common areas such as blockchain and IoT, each university presented a unique focus and expertise.
For example, the University of Wollongong demonstrated considered experience in cryptography
while the University of Western Sydney showcased their multidisciplinary approach featuring
psychology.

Government and industry presented their current cyber security challenges, in which people remain
one of the largest and common. However, there were specific issues for different verticals. Hunter
Water shared insights in how challenging it is to manage a network of remotely located vulnerable
infrastructure while nib discussed the complexity of handling sensitive medical data and preventing
mismanagement. Government and industry also highlighted the need for immediate solutions to
current issues rather than long-term research.

A panel of industry, government, and non-government representatives highlighted some specific
aspirations for cyber security in NSW. Specifically, education, outreach, and diversification in the
ecosystem. The key insight to draw from the roundtable is the need for compromise and hustle.
Universities need to recognise that they need to offer immediate solutions (technical or not) to
current problems to engage industry and government. Industry and government need to recognise
the value in investing and contributing to the long-term research which universities are conducting.
This allows them to have solutions ready for some of the problems of tomorrow.

Continually effective collaboration is not going to happen without effort from all stakeholders to
interact and contribute. It’s not only them who hustle should be expected from, the NSW Cyber
security Network needs to continue to create events for these opportunities to develop.

The final session for the day was three workshops in the areas of policy, current threats, and future
threats. These workshops found a variety of challenges and opportunities in each area. The NSW
Cyber Security Network would like to invite stakeholders to consider what was discussed in these
workshops with what each other stakeholder presented. With that considered, the Network would
like to lay down the challenge for stakeholders to envisage solutions and start the conversation with
other stakeholders for collaborative opportunities to forge a stronger ecosystem.
                                                                                                      1
CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...
Todd Williams Opening Remarks:

Todd Williams, the Director of the NSW Cyber Security Network opened the roundtable with a short
talk on the different stakeholders present and the purpose of the roundtable.

Todd Williams – Director, NSW Cyber Security Network

    •   Three key groups for the NSW cyber security ecosystem were present: Universities, the
        Private Sector, and Government.
    •   The key for today is defining what the current and future cyber security issues and
        capabilities are in NSW and how we can work together to solve them.
    •   The three key groups need to work together to build connections, opportunities, and
        solutions.

                                                                                                2
CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...
Summary of University Presentations:

The Seven NSW Cyber security Network universities pitched their current cyber security research
and projects. A summary of each is listed below:

1.       University of Sydney

                                                  Dr Suranga Seneviratne – Lecturer in
                                                  Security School of Information
                                                  Technologies at the University of Sydney

Suranga Seneviratne from the University of Sydney (USYD) started the presentations and detailed
their various projects and collaboration:

     •   USYD has key capabilities in the three areas of Empirical Security, Network Intelligence, and
         Systems & Solutions.
     •   These capabilities have applications in defence, IT Infrastructure, health, and smart cities.
     •   USYD has signature projects in DeepContent, Blockchain (RedBelly), Visual Analytics, and the
         well-known Soufflé Project.

2.       University of Western Sydney
                                                       Dr Alana Maurushat – Professor in Cyber
                                                       Security and Behaviour, Western Sydney
                                                       University, Dean’s Unit, School of Social
                                                       Sciences and Psychology

Alana Maurushat from Western Sydney University (WSU) highlighted the university’s
multidisciplinary approach which addresses some of the more strategic challenges in cyber security:

     •   WSU covers a variety of areas including psychology, law and policy, artificial intelligence,
         network security, industry standards, and trust and governance.
     •   This provides the opportunity to not only cover the technical challenges but in addition the
         more human centric like privacy by design, social engineering, and data governance.
     •   WSU also uses collaboration with other universities and organizations to develop their
         expertise and understanding.

                                                                                                        3
CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...
3.       Macquarie University
                                                      Associate Professor Christophe Doche,
                                                      Executive Director of the Optus
                                                      Macquarie University Cyber Security Hub

Christophe Doche from Macquarie University (MQ) detailed the university’s work with Industry as
part of the Optus-Macquarie University Cyber Security Hub:

     •   MQ has a multidisciplinary research approach with focus on privacy, secure and reliable
         systems, human-centric security, cyber physical systems, and risk modelling.
     •   MQ has had success in a collaborative research project with Data61, Optus, and Data
         Republic on Privacy Preserving Data Sharing Technologies relying on different privacy.
     •   MQ has found that communication skills (including good listening), and world class research
         were the keys to success.

4.       University of Technology Sydney

                                                          Professor Ren Ping Liu, Head of
                                                          Discipline of Network and Cyber security
                                                          in the School of Electrical and Data
                                                          Engineering at the University of
                                                          Technology Sydney

Ren Ping Liu from the University of Technology Sydney (UTS) presented on their blockchain and IoT
research and projects in cyber security:

     •   UTS is working with Ultimo Digital Technologies to create IoT and blockchain based supply
         chain monitoring and security
     •   Blockchain is also being used in the development of secure data and certified information
         applications
     •   A key point from UTS was the balance between ensuring trust and protecting privacy

                                                                                                     4
CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...
5.       University of Newcastle
                                                         Professor Vijay Varadharajan, Global
                                                         Innovation Chair in Cyber security,
                                                         Faculty of Engineering and Built
                                                         Environment at University of Newcastle

Vijay Varadharajan from the University of Newcastle (UoN) while pitching its capabilities emphasised
their trust and engagement with industry and government:

     •   UoN conduct work on large scale data systems, IoT and cyber-physical systems, and Cloud
         Services/Infrastructure as well as the intersections between these areas.
     •   UoN shows several research areas and research projects including Adversarial Machine
         Learning and security/trust in autonomous systems.
     •   UoN also understands the distinction and demand between research and a product

6.       University of New South Wales
                                                           Professor Maurice Pagnucco, Deputy
                                                           Dean (Education), Engineering and the
                                                           Head of the School of Computer Science
                                                           and Engineering at the University of
                                                           New South Wales

Maurice Pagnucco from the University of New South Wales (UNSW) outlined their approach of
research in cyber security across the three faculties of Business, Engineering (including
telecommunications, computer science, and electrical), and Law:

     •   UNSW has expertise in cyber security in a variety of areas including but not limited to:
         artificial intelligence, machine learning, networks
     •   UNSW has had significant success in the L4 microkernel project which has seen them made
         “World leaders in application of formal methods to systems”
     •   UNSW is also currently working on projects including secure UAVs with DARPA, secure
         hardware for Cannon, and E-voting analysis for the NSW Electoral Commission.

                                                                                                    5
CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...
7.       University of Wollongong
                                                         Professor Willy Susilo, Director of
                                                         Institute of Cyber security and
                                                         Cryptology, School of Computing and
                                                         Information Technology, University of
                                                         Wollongong

Willy Susilo from the University of Wollongong (UoW) finished the university presentations
showcasing the cryptographic capabilities of the university:

     •   UoW Strong cryptography and post quantum research capabilities including recognition
         from the US National Institute of Standards and Technology (NIST), and submissions to the
         post-quantum cryptography standard
     •   A key example of effective collaboration was their worth with an Airforce company testing
         security software for mission critical infrastructure
     •   The key takeaways for that success was the efforts in communication, collaboration, and
         using the joint expertise of academia and industry

                                                                                                     6
CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...
Summary of Industry Presentations:
Having heard Universities pitch what they could offer for research and areas of speciality, it was the
turn of industry and government to present on what were the current challenges they were facing.

Hunter Water
                                                    Richard Harris Chief, Information and
                                                    Technology Officer, Hunter Water

Richard Harris from Hunter Water opened the presentations giving some very real and valuable
insight to the challenges facing a water supplier:

    •   Hunter Water handles lots of detailed and interesting data as part of their day to day
        operation.
    •   They have a large scope of vulnerability with remote sights not even afforded the benefit of
        passive security. They contend with the use of legacy and emerging Information and
        Operational technology while digitally expanding. This results in such a large scope to
        manage.
    •   Despite this, the core issue remains how to handle and manage people. It remains the most
        significant cause of vulnerable due to factors like poor security awareness and education.
    •   For this reason, Hunter Water takes the philosophy of not trusting any of their
        infrastructure, and assuming that they are already compromised as they likely are.
    •   Richard very specifically noted that while research might give something a solution to
        something 5 years from now, the reality is that those solutions are needed now.
    •   The challenge is on top of that, it’s already a time-consuming duty to oversee Hunter Water
        so there isn’t the luxury to have drawn out conversations. Something which can be
        negotiated and executed without compromising the time Hunter Water must manage
        already existing security issues is essential.

                                                                                                         7
CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...
Nib
                                                            Wayne Bozza, Head of Cyber security IT
                                                            Governance and Risk, Nib

Wayne Bozza from nib spoke on what were the challenges of being a health insurance company
managing what is arguably some of the most sensitive information:

      •   The reality which nib has is that it operates in the health sector which is the most vulnerable
          to data breaches. Nib has to manage medical data which is considered the crown jewels.
          This a variety of data types and is vulnerable to mismanagement – intentional or not.
      •   The variety of compliance regimes and regulators like APRA, OAIC, and GDPR which nib is
          accountable to means there is constant scrutiny.
      •   Attackers are not only growing more sophisticated but uses areas of innovation such as
          automation to increase their capabilities and ultimately the threat they present.
      •   There are opportunities to provide a better service and offering to customers which nib
          would like to provide. In order to do this, they need a strong cyber security approach for
          their data, compliance, and the capability to significantly reduce the likelihood of
          compromise of that data.

                                                                                                        8
CYBER CONNECTIONS FOR A STRONGER NEW SOUTH WALES - EVENT REPORT - NSW ...
Commonwealth Bank of Australia

                                                            John Hare, Head of Cyber Outreach,
                                                            Commonwealth Bank of Australia

John Hare from the Commonwealth Bank of Australia shared his insights from consulting 3 internal
teams about what the current cyber security challenges were:

   •   The Reporting Team stated that effective board reporting was the current challenge.
       Translating threat from the technical to the non-technical while also adjusting to changing
       trends such as an evolving threat environment and quantifying risks.
   •   The Cyber Innovation and Emergency Tech Team stated developing ways to prevent and
       detect insider attacks. They highlighted the difficulties in finding indicators of those who are
       likely to conduct an insider attack despite the large number of data breaches attributable to
       insiders.
   •   The Detection and Response Team stated the difficulties in detecting and responding to data
       leakage and loss. That existing solutions produce too much noise, don’t scale, and produce
       friction for staff trying to undertake their usual duties. There is a need for a solution which
       provides better reporting and ease of friction while accounting for the increase variety and
       vulnerability of data.

                                                                                                      9
Cisco Systems

                                                          Simon Finn, Security Architect, Cisco
                                                          Systems

Simon Finn from Cisco presented on what were some of the new challenges were in cyber security
and how they were approaching them:

   •   New security challenges specifically to IoT of: Scale, impact, new business models, and
       device constraints have emerged
   •   IoT currently lacks transparency as well as suffering from weak solutions and
       implementation. This means where it is used it is a significant source of vulnerability.
   •   Cisco has identified the need for building transparency and trust. This means making IoT
       itself more technically secure, and transparency for IoT device composition, capabilities, and
       in implementation of solutions.
   •   There is a need for the utilising of IoT standards/trust labelling to demonstrated that IoT
       works beyond minimum standards. So, consider engaging organisations like the IoT Alliance
       Australia, and the Charter of Trust. This can allow for trust building beyond what is the
       minimum.

                                                                                                   10
IMB

                                                        Noel Knox, Manager, IT Architecture and
                                                        Security

Noel Knox from IMB provided a good wrap-up to the first round of government and industry
presenters and noted:

   •   Many of the presenters today have already covered the challenges which we are already
       contending with, so these are similar challenges which are shared by more than who is in the
       room.
   •   There is also a problem that people still think cyber security is an IT problem. It comes into
       its own domain where there is a need for not only technical controls and simply fixing what
       is broken, but a buy in from management and policy controls.
   •   Fostering ‘human firewalls’ can help mitigate many of the simple and potentially costly
       attacks which entities attack. It is not only the IT or cyber security team which needs to be
       aware of vulnerable and potential attacks but the whole scope of an organisation.

                                                                                                  11
Summary of Start-up Presentations:

Two start-ups presented on what they were working on and what they needed in cyber security to
maintain their success:

Airsight UAV
                                                              Ashley Cox, Chief Operating Officer,
                                                              Airsight UAV

Airsight UAV specialises in drones, AI, and IoT. Ashley Cox presented on what concerned them:

   •   Ultimately for start-ups the first concern in managing costs and paying the bills, everything
       else comes second. Cyber security solutions need to be aware of this
   •   Everything physical that Airsight uses has a ‘digital twin’ so there is a demand for an
       effective and reliable solution
   •   They need a set of protocols that can simultaneous assure clients that their data is safe and
       not inhibit innovation. These need to be tested, cost effective to implement and use, and
       proportionate to the risk

                                                                                                     12
AgriMilk

                                                        Tim Williams, Director, Agrimilk

Tim Williams from AgriMilk Consulting outlined some of their challenges:

   •   Areas of security for Agrimilk include in house systems, data collection/cloud transfer &
       hosting from clients, intellectual property collection, and client protection/confidentiality
   •   It’s important for Agrimilk and other innovation start-ups to develop and retain strong cyber
       security with the shift to automation and the 4th industrial revolution
   •   Agrimilk already interacts with multiple business and industries, so they have multiple
       stakeholders to hold themselves accountable and challenges to tackle in: Farming,
       AgBuiness/AgTech, Venture Capital, and Tech

                                                                                                  13
Summary of Government Presentations:
To round up the presentations, two government entities reported on the challenges which they
were currently facing.

Fire and Rescue New South Wales

                                                        Asaf Ahmad, Chief Information Security
                                                        Officer, Fire and Rescue New South
                                                        Wales

Asaf Ahmad from Fire and Rescue NSW outlined some of the specific challenges to the organisation:

   •   Fire and Rescue NSW has a lot of responsibilities and scale due to the wide variety of areas
       of responsibility which extend beyond responding to fires. They are working with the NSW
       Digital Government Strategy – 2018 which emphasises a secure, integrated and responsive
       system as a minimum.
   •   Their network extends into a variety of functions including training, restoring, despatching,
       incident management, portable interfaces, finance and asset management. Thankfully, the
       NSW fire service keeps its Corporate and 000 network separate but an impact on either
       creates a variety of issues which translate to more than just loss of business
   •   The key current challenges for the service are in capability, maturity, blending
       security/information/data architecture, culture, and security posture.
   •   The current key threats of prominence are user awareness, protecting sensitive information,
       and incident detection & response. An example of this is the information leak regarding the
       Tathra fire controversy.
   •   Fire and Rescue NSW would also like to develop their detection and response capabilities
       but have limitations in skilled resources and budgets.
   •   They are also open to collaboration with universities and business but have limitations in
       policies and schedules

                                                                                                  14
New South Wales Pathology
                                                       James Patterson, Chief Information
                                                       Officer, NSW Pathology

James Patterson from NSW Pathology spoke on how the cyber security environment was changing
and some of the new challenges which they were experiencing:

   •   Two significant disruptions to how NSW Pathology are digital specimens and data retention
       legislation. The detail and variety of data which they manage has increased as well as the
       period for which they retain that data.
   •   There are also opportunities in the quantification, patterns, clinical relevancy, and genomics
       of that data which means it is more valuable. This also means it is more important to
       manage and protect this data.
   •   NSW pathology has a diverse operating environment with at least 7 different systems,
       emulated alphas, operational technology, (OT) and Legacy systems
   •   James noted that despite this they are ASD certified and use cloud services which are more
       secure than their internal network
   •   Two significant attacks that NSW Pathology has had to contend with are the WannaCry
       ransomware and spear phishing.

                                                                                                   15
Panel Discussion Summary

                                                                                Left to Right
                                                                                Louise Chappell, Director, Australian
                                                                                Human Rights Institute

                                                                                Brian Williams, National Security and
                                                                                Solutions Manager, NEC

                                                                                Richard Harris Chief, Information and
                                                                                Technology Officer, Hunter Water

A Panel of Louise Chappell, Brian Williams, and Richard Harris discussed the current needs for the
development of cyber security in NSW:

    •   Education in cyber security that extends from schooling to the workforce, this is so that both
        people and entities in New South Wales can be more resilient to threats. People need to be
        more informed on the basic issues such as privacy, password security, and the unfair ways in
        which malicious actors may try to exploit them.
    •   A development of outreach, communication, and community in the NSW Cyber security
        ecosystem. While there are many meetups and notable initiatives which engage the
        technical end of the workforce, a more open-ended newsletter available to all to inform of
        strategic issues would be a valuable investment.
    •   Diversification in the skillsets and expertise backgrounds contributing to cyber security in
        NSW. We need psychologists to develop effective strategies for managing people,
        sociologists to maintain ethical standards, and a workforce who can communicate how
        important cyber security is. Diversification can also mitigate the complacency that can leads
        towards significant cyber security issues.

The panellists also presented what their single biggest wish in cyber security is:

    •   For young people to understand risk and consequence in the context of social media where
        callous sharing of information can have very real impacts.
    •   For employers to be more committed to investing in the capability of their staff at all levels
        in cyber security.
    •   For a cyberbullying to no longer be an issue, and for the most likely cyberbullies to not be so
        called ‘friends’ of the victim.

                                                                                                       16
Summary of Workshops:
As a final session for the roundtable, workshops in three different areas were held to identify
opportunities and issues.

Policy

The Policy Workshop found:

         •   There is a need to move education in cyber security to a new model. It is not acting as an
             effective mitigator against phishing and other manipulation attacks. The use of better
             simulations may help in this education process.
         •   Reducing business disruption and ensuring a ‘frictionless business experience’ in both
             the ongoing implementation of cyber security and incident response is important.
         •   Policy makers will have to balance between using data for benefit/insights and the
             responsibility to secure it. In addition, there needs to be accountability when the failure
             of a cloud service provider can ‘wipe out’ businesses.
         •   The ‘trust tightrope’ of transparency and privacy will be an ongoing issue. Both
             transparency and privacy are essential for an entity but how can they ensure what they
             do reveal what won’t be manipulated and how do regulators ensure compliance with
             privacy?
         •   Policy makers needs to compensate for the ongoing issue of vulnerability of technologies
             and the limitations of individuals to detect and respond to threats.
         •   There needs to be a developed understanding of what the restraints of policy are under
             Australian legislation and how future legislation can be influenced for a better outcome.
         •   There needs to be a greater ownership of cyber security at the board level to ensure the
             commitment and resilience of entities.
         •   If the government wants strong cyber security, then it needs to focus on legislation
             which advocates it and supports the industry.

                                                                                                     17
Current Threats and Solutions

The Workshop on Current Threats and Solutions discussed:

   •   There is a need to question whether policy is currently appropriate and is currently
       facilitating vulnerability. Certain sectors are asking for more detailed and rigorous regulation
       to comply to, does it indicate an issue of under-regulation?
   •   In addition, the government legislation in privacy and encryption – undermining resilience?
   •   The skills shortage is a current issue. It is not only relevant to a shortage in professionals but
       general awareness, and training. The user experience and how people are education might
       need to change.
   •   The current behaviour/attitude towards cyber security. Is there an issue with a dismissal of
       how pertinent the challenges are?
   •   GDPR while a good compliance regulation, could be compromising the ability of small and
       medium businesses to be resilient. It is cutting in to budget and its insistence of machine-
       readable data on request means that it is available to attackers as well.
   •   How data is currently handled is also an issue. Is there a way to make file sharing and
       emailing more secure without impacting the user experience? Could external entities help
       with this question?
   •   The security of IoT devices is a current issue as seen in many attacks. Will infrastructure
       automation lead to a lack of visibility and detection?
   •   As seen in the presentations, the sometimes-conflicting business and security priorities
       mean vulnerability. This is especially relevant to small and medium businesses.
   •   A potential program to support was big business mentoring small businesses in cyber
       security.

                                                                                                      18
Future Cyber Security Threats

The Future Cyber Security Threats summary:

    •   Individual data rights are likely to become a greater challenge in the future as entities will
        have more legislation like GDPR to comply with. Subject-controller relations are going to
        need development as well as a test of how feasible the regime GDPR sets out is.
    •   Health data is going to continually become more important and difficult to keep secure,
        especially with the emergence of genetic testing and the MyHealth database.
    •   We may have to appeal to the wisdom of sociologists. Sociologists might know more about
        ethics and security because they have been studying security dilemmas around much longer
        than cyber security professionals. Cyber security is a tangled network of complication and
        varying ideas.
    •   There is a need to develop cyber security education with a consistent approach and
        framework to avoid growth in a knowledge and skills gap. We need to utilise different
        analytics and multi-disciplinary approaches.
    •   Access to a variety of new and scalable technologies like machine learning and Artificial
        Intelligence will facilitate better resilience if used correctly. They will also enhance the
        capabilities of attackers, so it is important we are ready to use these technologies.
    •   Technology can increasingly be used for privacy as well. Will this make cyber security
        difficult?
    •   How do we ensure there are appropriate trust mechanism to mitigate sophistication in spear
        phishing attacks like bioinformatics?
    •   There is going to be an authentication evolution, we need to be ready to take advantage of it
        and to mitigate the new varieties and styles of attacks that develop to circumvent it.

Wrapping Up:
Feedback from attendees at the NSW Cyber Security Network event point to it being a success, and
has given the network a deeper understanding of the capabilities and challenges of the NSW
ecosystem. What we need to do now is continue to foster the ecosystem and develop those
relationships between industry, government, and universities to better utilise those capabilities and
tackle those challenges.

                                                                                                   19
You can also read