Executive Security Awareness

Course Group: 
Cyber Security

TAILORED FOR GROUPS ONLY

Delivery Modes Duration
Board and Senior Management Briefings on Cyber Security 4 Hours
Flag Officer/SES Briefings on Information Warfare Strategies in Asia 1 Hour
Executive Briefings 4-5 Days

Presenter Background

Dates & Registration

In-House and Group delivery: Contact the  for more information. Recommended for groups with over 10 personnel.

What you will receive:

  • Comprehensive set of course notes.
  • UNSW certificate of attendance.
  • Catering

Masters Credit: 72 hours (12 working days) of approved short course training (plus an assessment) can be credited as an unspecified elective on our Masters of Cyber Security / Cyber Security Operations.

  


 

Board  and Senior Management Briefings on Cyber Security (4 hours)

This briefing  is based on the US National Association of Corporate Directors (NACD) reported  five principles that all corporate boards should consider “as they seek to enhance their oversight of cyber risks.”  It does not assume technical cyber security knowledge and experience and does not seek to present an overly technical approach to the problems of cyber security

“The five principles are:

  1. Directors need to understand and approach cybersecurity as an enterprise-wide risk management issue, not just an IT issue.
  2. Directors should understand the legal implications of cyber risks as they relate to their company’s specific circumstances.
  3. Boards should have adequate access to cybersecurity expertise, and discussions about cyber-risk management should be given regular and adequate time on the board meeting agenda.
  4. Directors should set the expectation that management will establish an enterprise-wide risk management framework with adequate staffing and budget.
  5. Board-management discussion of cyber risk should include identification of which risks to avoid, accept, mitigate, or transfer through insurance, as well as specific plans associated with each approach.”

The presentation with thus provide insight into:

  • Cyber security as a management issue
  • Legal implications of cyber security for Boards
  • Cybersecurity expertise 
  • Staffing and budget implications
  • Risk Management

 


 

Flag Officer/SES Briefings on Information Warfare Strategies in Asia (1 hour each)

  1. US strategy and capability
  2. China strategy and capability
  3. Taiwan strategy and capability
  4. Japan strategy and capability
  5. Korean strategy and capability
  6. Russia Strategy and Capability
  7. India and Pakistan: Strategy and Capability
  8. Situation in NATO
  9. Situation in ASEAN
  10. Implications for Australia

 


 

Executive Briefings (4-5 Days each)

  1. Asian Security in the Information Age: The Cyberization of Strategy
  2. China as a Cyber Power and its Military Capabilities
  3. Australia’s Cyber Diplomacy
  4. Australia’s Cyber Forces

These Executive Briefings are intended as one-week in duration, but can be modified to meet the needs of particular client or institutions. They can be run at most times of the year with the exception of the period between 10 December and 27 January each year.

Module 1: Asian Security in the Information Age: The Cyberization of Strategy

The course provides analytical insights into the ways in which the advent of advanced information and communications technology have influenced military strategy and operations. It looks first at the cases of individual major powers (USA, China, Russia, India, Japan) and a range of middle powers (Iran, Israel, UAE, North and South Korea, Pakistan, Australia).  It then looks at how the international system has responded to new dilemmas of cyberspace affecting national and international security (cyber alliances, diplomatic strategies, mass surveillance, new and old norms, role of the globalized private sector, and cross-border critical information infrastructure.)  The final section of the course deals with some of the big analytical and policy dilemmas: cyber impacts on military nuclear, terrorism and cyberspace, information ethics and highly secure computing.

Possible Topics

  • Determinants of Cyber Power: Science, the Economy and Innovation
  • United States: The Unipolar Cyber Power
  • Measuring National Cyber Power
  • Information War: Its Impact on Strategy and Force Structure
  • Cyber Effects Operations and Doctrine
  • Unit 61398 of the People’s Liberation Army
  • Stuxnet and International Law
  • Cyber war and nuclear deterrence strategies
  • Conventional deterrence and cyber wepaons
  • Snowden, Wikileaks and Open Secrets
  • Internal Security and Mass Surveillance
  • Russia, France and Israel as Cyber Actors in Asia
  • How China Intends to Become a Cyber Power
  • Diplomacy for the Information Age
  • Japan and India: the Reluctant Cyber Power
  • Ethics in the Information Age
  • Cyber espionage and diplomacy
  • Cyber war and the Koreas
  • Critical Information Infrastructure
  • Cyber Capability in ASEAN
  • International Organizations and Management of Cyberspace
  • Pakistan, UAE, Saudi Arabia and Iran and Cyber Powers
  • Pakistan, Turkey, Saudi Arabia and the UAE as Cyber Space Powers
  • Islamic State, Terrorism and Cyber Assets
  • Highly secure computing
  • Cyberspace and Peace

Module 2: China as a Cyber Power and Its Military Capabilities

This course provides advanced interdisciplinary study into the development of cyber policy in China across social, economic, political, military and technological domains. China wants to compete with the world’s most advanced countries in economic and military power. It knows that this depends on high-speed, innovative application of the most modern information technologies -- that China has to become a sophisticated information-based society. But does China have what it takes to get there? Are its leaders prepared to do what it takes to get there? The answer so far appears to be “not really”! This course will provide students with the tools and the opportunity to make their own assessment of the likely outcome of China’s information society ambition from a comprehensive point of view, looking at economic, political and military considerations -- and grounded in a broad ethical vision. 

Possible Topics

  1. China and the Information Society Ambition
  2. Macro-Ethics for an Information Society
  3. eDemocracy and iDictatorship
  4. The Surveillance State
  5. Trusted Information and Cyber Security in China
  6. China’s Transformation Intent
  7. The National Innovation System
  8. An Innovator Class
  9. Military Strategy and Capability for Information Warfare
  10. International cyber espionage
  11. Diplomacy for the Global Infosphere
  12. China’s Creative Industries

Module 3: Australia’s Cyber Diplomacy

This course provides advanced interdisciplinary study in Australia’s diplomacy and national strategies for cyber security. It engages primarily with four questions: the innovation economy as a foundation for national welfare and security; privacy and personal security in cyberspace; national strategies for cybersecurity; and Australian diplomacy on these issues. The course positions the student to understand better the profound influences of the new technologies, to appreciate the main policy dilemmas emerging in their exploitation, to develop the ability to undertake critical analysis of the issues, and communicate them accordingly. This course is unique in Australian universities but leading universities abroad have similar courses.

Possible Topics

  1. The Global Information Revolution and Its Champions
  2. Australia’s Position in the Global InfoSphere
  3. Australian Ethics and Law in Cyberspace
  4. Australian Heroes of the Information Revolution: Industry Case Studies
  5. Assessing Australia’s Relative Cyber Power
  6. National Innovation Systems: Lessons for Australia in International Political Economy
  7. Australia and Information Warfare
  8. Australia and the Cyber Espionage Threats
  9. Privacy of Australians in Cyberspace
  10. Australia’s metadata laws: an unfinished ethical contest
  11. Personal advancement and security in cyberspace
  12. Australian Diplomacy for Cyber Security

Module 4: Australia’s Cyber Forces

This course offers advanced interdisciplinary study of the transformation of Australian military and security forces to meet new cyber security threats and to exploit new capabilities offered by cyber assets. It complements an existing Humanities and Social Sciences (HASS) course on Cyber Security and World Politics and a proposed new HASS course on Australian Cyberspace Diplomacy.

A former Royal Navy officer, then serving in the Royal Australian Navy, concluded a 2007 analysis of Australian Cyber Warfare, writen in the Australian Army Journal, by stating: “The unresolved issue now is not so much how to integrate Information Operations into military operations, but rather how to persuade politicians and public servants to coordinate the efforts of their respective departments into a National Effects Based Approach so as to provide whole-of-government forward planning with the direction, legitimacy and promise of success a nation is entitled to expect”. This course provides analytical insights on the strategies, organisations and resources in question, which the 2013 ADF doctrine did not appear to address.

Possible Topics

  1. The Cyberspace Revolution in Military Affairs
  2. Middle Powers and the Military Cyber Strategy
  3. Australia’s Strategic Environment in Cyberspace
  4. Australia’s Military Cyberspace Ambitions
  5. Politics of Transformational Change in the ADF
  6. Australia’s Military Cyberspace Capabilities
  7. Information Activities Doctrine
  8. Critical National Infrastructure: End of the Air Sea Gap
  9. National Security Innovation Priorities
  10. ADF Training and the Information Revolution
  11. An Australian Cyber Militia
  12. National skills base in the civil sector.

 


 

AUSTRALIAN CENTRE FOR CYBER SECURITY

The Australian Centre for Cyber Security (ACCS) is a focal point for the research of some 60 scholars from various faculties across UNSW who conduct research work on different aspects of cyber security. The Centre is based in Canberra at the Defence Force Academy that provides both advanced research as well as undergraduate and graduate education on cyber security. ACCS brings together the biggest concentration of research and tertiary education for the multi-disciplinary study of cyber security in any single university in the Southern hemisphere. A number of ACCS scholars, in areas ranging from information technology and engineering to law and politics, have significant international reputations for their work.  

 

COURSE AVAILABILITY