Officials host e-security discussion in Sydney

Powered by SC Magazine
 

The Federal Government recently gathered industry and community organisations together in Sydney to discuss future e-security challenges.

The Federal Government gathered industry and community organisations together last week in Sydney to discuss e-security challenges and future plans, in the final event of e-security Week.

At the Over the Horizon forum, Communications Minister, Senator Stephen Conroy and the Attorney-General, Robert McClelland MP, discussed the Government's future e-security policies.

“The online environment is highly interconnected and e-security threats to different parts of the Australian economy can no longer be addressed in isolation,” McClelland said.

“Protecting home and small business internet users is an important element in protecting Australia's critical infrastructure,” he added.

Senator Conroy said the Government is committed to working with industry, academia and the community to ensure trust and confidence in the online environment is maintained.

The Over the Horizon forum officially concluded National E-security Awareness Week which was launched by Senator Conroy on 6 June 2008 to highlight simple steps Australians should take to stay smart online.

“The Government is committed to empowering Australians with information to improve their security online. I would like to thank all the organisations involved in this week-long initiative,” Senator Conroy said.

 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1019

Vote