• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

22 notable government cybersecurity initiatives in 2022

flyytech by flyytech
September 29, 2022
Home Security
Share on FacebookShare on Twitter


Cybersecurity continues to be high on the agenda of governments across the globe, with both national and local levels increasingly working to counter cybersecurity threats. Much like last year, 2022 has seen significant, government-led initiatives launched to help to address diverse security issues.

Here are 22 notable cybersecurity initiatives introduced around the world in 2022.

February

Israel commits to IDB cybersecurity initiative in Latin America, Caribbean

The Israeli government announced that it will join the Inter-American Development Bank (IDB) to establish a new cybersecurity initiative, committing $2 million USD to help strengthen cybersecurity capabilities in Latin America and the Caribbean (LAC). Israel’s funding would aid in building cyber capacity across the region by giving officials and policymakers access to forefront practices and world-leading knowledge and expertise, the government stated. “The cybersecurity initiative is paving the way for the safe and secure digitalization of Latin America and the Caribbean, one of the key elements for growth in the post-COVID era,” said Matan Lev-Ari, Israel’s representative on the IDB’s Board.

March

Singapore launches cybersecurity certification program to recognize good security practices

Singapore’s Cyber Security Agency (CSA) launched a new certification program to recognize enterprises that have adopted and implemented good cybersecurity practices. The certification comprises of two cybersecurity marks: Cyber Essentials, which recognizes small and medium enterprises that have put in place cyber hygiene measures, and Cyber Trust, a mark of distinction to recognize larger or more digitalized enterprises with comprehensive measures and practices.

To support enterprises in their journeys to attaining certification, the CSA also developed a toolkit for IT teams and curated an initial ecosystem of partners with product and service offerings that can help enterprises address requirements of the marks. “Supply chain cyberattacks will continue to proliferate in the digital space, and in time to come, companies could be required to demonstrate their cybersecurity posture when they conduct business as a way of providing greater assurance to their customers,” said David Koh, chief executive of CSA.

April

Singapore sets out licensing framework for cybersecurity service providers

Singapore’s CSA set out a licensing framework for cybersecurity service providers and established the Cybersecurity Services Regulation Office (CSRO) to administer it and facilitate liaisons with the industry and wider public on all licensing-related matters. The framework aims to better safeguard consumers’ interests and addresses the information asymmetry between consumers and cybersecurity service providers, along with improving service provider standards and standing over time, Singapore’s CSA stated.

It added that two types of cybersecurity service providers would be licensed – those providing penetration testing and managed security operations center monitoring services. “These two services are prioritized because service providers performing such services can have significant access into their clients’ computer systems and sensitive information,” the CSA wrote. “In the event that the access is abused, the client’s operations could be disrupted. In addition, these services are already widely available and adopted in the market, and hence have the potential to cause significant impact on the overall cybersecurity landscape.”

Australia launches REDSPICE to bolster national cybersecurity

The Australian federal government’s Australian Signals Directorate (ASD) announced the launch of the Resilience – Effects – Defence – SPace – Intelligence – Cyber – Enablers (REDSPICE) initiative to enhance the cyber resiliency and defense of national systems and critical infrastructure, with $9.9 billion (AUD) to be invested in bolstering Australia’s national cybersecurity capabilities over the next decade. Through REDSPICE, ASD said it will expand the range and sophistication of its intelligence, offensive, and defensive cyber capabilities. “REDSPICE is the necessary and timely change needed for ASD to continue its contribution to making Australia secure, in both peacetime and conflict,” wrote Rachel Noble, director general of ASD.

May

UK sets out new nuclear cybersecurity strategy

The UK government outlined plans for a new cybersecurity strategy to protect the nations’ nuclear sector. Its aim is to build a comprehensive understanding of current sector cybersecurity strengths and challenges with key objectives to be achieved by 2026, as part of its wider National Cyber Strategy 2022. In the 2022 Civil Nuclear Cyber Security Strategy, the UK government outlined the goal of creating a civil nuclear sector which effectively manages and mitigates cyber risk in a collaborative and mature manner, with resilience in responding to and recovering from incidents. The new plans seek to build on existing understanding surrounding nuclear cybersecurity and introduce four key objectives which the sector should achieve within the next four years:

  1. Appropriately prioritizing cybersecurity as part of a holistic risk management approach, underpinned by a common risk understanding and outcome-focused regulation.
  2. Taking proactive action to mitigate supply chain cyber risks in the face of evolving threats, legacy challenges, and adoption of new technologies.
  3. Enhancing resilience by preparing for and responding collaboratively to cyber incidents to minimize impacts and recovery time.
  4. Collaborating to increase cyber maturity, develop cyber skills and promote a positive security culture.

These objectives will be delivered via several priority and supporting activities and overseen by a programmatic approach to delivery. These include Cyber Adversary Simulation (CyAS) assessments and other threat-informed testing activities across the sector’s critical IT and OT systems, baseline cybersecurity standards for the civil nuclear supply chain, and collaboration across the sector on third-party and component assurance and management.

Victoria state government invests $100,000 to train women in cybersecurity

The Victoria state government in Australia announced that it was investing $100,000 AUD in an initiative to train women with one year of experience in the IT sector or three years in cyber to either begin a career or prepare for leadership roles in cybersecurity. The initiative was launched in partnership with the Australian Women in Security Network (AWSN). The state government labelled the scheme as a program designed to improve female representation in the workforce, as the Australian Bureau of Statistics found women make up just 31% of local digital technology workers. The program, which began in July, includes specialist training, coaching and mentoring services, as well as attendance to workshops and networking events.

UK opens applications for Cyber Security Advisory Board

The UK government opened applications for membership of the Government Cyber Security Advisory Board (GCSAB). The aim of the GCSAB is to build on the success of the External Challenge Panel that brought industry and academic perspectives to support the development of the government’s wider Cyber Security Strategy, which was launched in January 2022 to help build a cyber-resilient public sector. The government stated that the GCSAB will be comprised of independent, external experts to build better links between government, the private sector, and academia, providing perspectives and input on addressing the challenges of government cybersecurity, as per a posting on its website. It invited candidates with cybersecurity expertise or competence or knowledge in the areas of strategy, standards, and assurance; governance, risk, and management program delivery; cyber detection and response technology; and cyber skills and culture to submit Expressions of Interest (EoI) for membership of the GCSAB, which will meet virtually every two months.

US proposals spell out 5G security advancements

The US government introduced a proposed five-step 5G Security Evaluation Process Investigation to address gaps in existing security assessment guidance and standards that arise from new features and services in 5G technologies. “The intent of this joint security evaluation process is to provide a uniform and flexible approach that federal agencies can use to evaluate, understand, and address security and resilience assessment gaps with their technology assessment standards and policies,”  said Eric Goldstein, executive assistant director for the Cybersecurity and Infrastructure Security Agency (CISA). “Such a process will provide assurance that the government enterprise system is protected and cybercriminals cannot gain backdoor entry into agency networks through 5G technology.” Specifically, the agencies involved seek to get ahead of the curve before any federal office conducts a security assessment to obtain authorization to operate (ATO). The five steps put forward were:

  1. Define the federal 5G use case.
  2. Identify the assessment boundary.
  3. Identify security requirements.
  4. Map security requirements to federal guidance.
  5. Assess security guidance gaps and alternatives.

UK proposes new code of practice to enhance app security and privacy

The UK government called for input from the technology sector on enhancing security and privacy requirements for app stores and app development. The consultation period came in the wake of a new report from the UK’s National Cyber Security Centre (NCSC) that revealed that apps containing malicious malware or those that have been poorly developed are putting users at significant risk. The UK government said it therefore aims to establish a new code of practice which will set out baseline security and privacy requirements for apps. Under new proposals, app stores for smartphones, game consoles, TVs, and other smart devices could be asked to commit to a new code of practice to boost app security and privacy standards, which would be the first such measure in the world, stated a press release on the UK government’s website. “The proposed code would require stores to have a vulnerability reporting process for each app so flaws can be found and fixed quicker. They would need to share more security and privacy information in an accessible way including why an app needs access to users’ contacts and location,” it added.

June

Israel announces The Cyber-Dome project to elevate national cybersecurity

The Israel National Cyber Directorate (INCD) outlined its new national cybersecurity project The Cyber-Dome – a big data and AI overall approach to proactive defense. Announced by Gaby Portnoy, director general of INCD, the project aims to diminish cyberattacks in the country by elevating national cybersecurity through new mechanisms in the national cyber perimeter. “The Cyber-Dome will also provide tools and services to elevate the protection of the national assets as a whole. It will synchronize nation-level real-time detection, analysis, and mitigation of threats,” Portnoy stated. “We need to protect our national assets in the best possible way and make cybersecurity protocols we use for critical infrastructure available for more sectorial organizations – government and private.”

Canada introduces new legislation to enhance cybersecurity

The Canadian government introduced proposed legislation to better protect Canadians and bolster cybersecurity across the financial, telecommunications, energy, and transportation sectors. Bill C-26, An Act Respecting Cyber Security (ARCS), sought to replace the Telecommunications Act to add security as a policy objective, bringing telecommunications in line with other critical sectors. “This will provide the government with the legal authority to mandate any necessary action to secure Canada’s telecommunications system. This includes prohibiting Canadian companies from using products and services from high-risk suppliers,” the government wrote. Furthermore, this legislation introduced the Critical Cyber Systems Protection Act (CCSPA) which lays a foundation for securing Canada’s critical infrastructure. “These legislative measures will help to further protect Canadians and defend our critical infrastructure in an evolving and increasingly complex digital environment,” commented Anita Anand, minister of national defense.

July

Germany bolsters cyber defenses in response to Russian cyberthreats

The German government announced plans to increase the nation’s cyber defenses in response to possible new threats from Russia amid its invasion of Ukraine. New measures put forward by Interior Minister Nancy Faeser involve promoting cyber resilience among small and medium enterprises and businesses that provide critical services such as transport, food, health, energy, and water supply, along with the introduction of a secure central video conferencing system for the federal government. A centralized platform for the exchange of information on cyberattacks between state and federal structures was also outlined, as were plans to modernize IT infrastructure of Germany’s domestic intelligence agency and police. Commenting, Faeser said, “The sea change we are facing in view of the Russian war of aggression against Ukraine requires a strategic repositioning and significant investment in our cybersecurity.”

August



Source_link

flyytech

flyytech

Next Post
XGIMI Aura review: This 4K projector beats my local cinema 

XGIMI Aura review: This 4K projector beats my local cinema 

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Google I/O 2023 Live Blog: everything that’s expected to come

Google I/O 2023 Live Blog: everything that’s expected to come

May 11, 2023
Pirated copies of Final Cut Pro infect Macs with cryptojacking malware • Graham Cluley

Pirated copies of Final Cut Pro infect Macs with cryptojacking malware • Graham Cluley

March 10, 2023

Trending.

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

October 23, 2022
Shop now. Pay later. on the App Store

Shop now. Pay later. on the App Store

February 25, 2023
How To Install Tiny11 for Arm64 on Raspberry Pi 4

How To Install Tiny11 for Arm64 on Raspberry Pi 4

February 19, 2023
Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

September 27, 2022
Hackers behind MGM cyberattack thrash the casino’s incident response

Hackers behind MGM cyberattack thrash the casino’s incident response

September 16, 2023

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

Diablo 3’s season 29 demonstrates everything Diablo 4 gets wrong

Diablo 3’s season 29 demonstrates everything Diablo 4 gets wrong

September 24, 2023
4 steps for purple team success

4 steps for purple team success

September 24, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT