{"id":20805,"date":"2016-10-07T09:28:19","date_gmt":"2016-10-07T16:28:19","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=20805"},"modified":"2016-10-07T12:05:28","modified_gmt":"2016-10-07T19:05:28","slug":"gov-palo-alto-networks-supports-u-s-australia-cybersecurity-collaboration","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/10\/gov-palo-alto-networks-supports-u-s-australia-cybersecurity-collaboration\/","title":{"rendered":"Palo Alto Networks Supports U.S.\u2013Australia Cybersecurity Collaboration"},"content":{"rendered":"<p>In late September, I was honored to represent Palo Alto Networks among a select group of stakeholders in Washington, D.C. for the inaugural <a href=\"https:\/\/www.csis.org\/events\/deepening-us-australia-cyber-security-cooperation\" rel=\"nofollow,noopener\"  target=\"_blank\">Track 1.5 Cybersecurity Dialogue<\/a> between senior government and industry officials from the United States (U.S.) and Australia. The Track 1.5 Dialogue\u2014a term used to denote the combination of official and unofficial diplomatic interactions between nation-states\u2014was established in January 2016 by President of the United States Barack Obama and Australian Prime Minister Malcolm Turnbull as a forum to strengthen cybersecurity cooperation between the two countries.<!--more--><\/p>\n<p>The U.S.\u2013Australia dialogue, which was co-hosted by the U.S.-based <a href=\"https:\/\/www.csis.org\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Center for Strategic and International Studies<\/a> and the <a href=\"https:\/\/www.aspi.org.au\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Australian Strategic Policy Institute<\/a>, came at a time when both the U.S. and Australia had been increasingly focused on expanding meaningful collaboration between government and industry to ensure an open, secure and reliable internet for the benefit of the broader global community. Prime Minister Turnbull and U.S. Secretary for Homeland Security Jeh Johnson concluded the day-long meeting with keynote addresses that highlighted the ongoing initiatives and set the stage for the subsequent dialogue.<\/p>\n<p>In his remarks, Prime Minister Turnbull highlighted the April 2016 release of Australia\u2019s new <a href=\"https:\/\/cybersecuritystrategy.dpmc.gov.au\/assets\/pdfs\/dpmc-cyber-strategy.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">Cyber Security Strategy<\/a>, which includes an emphasis on the critical role that private industry plays in strengthening cybersecurity through technological innovation and cyberthreat information-sharing initiatives.<\/p>\n<p>Among other initiatives, Secretary Johnson highlighted the Cybersecurity Act of 2015, which President Obama signed last December, and its role in expanding the cyberthreat information-sharing environment between governments and the private sector. He noted that <a href=\"https:\/\/www.cert.gov.au\/\" rel=\"nofollow,noopener\"  target=\"_blank\">CERT Australia<\/a> had recently become the first international participant in the sharing program the new law governs: <a href=\"https:\/\/www.dhs.gov\/ais\" rel=\"nofollow,noopener\"  target=\"_blank\">Automated Indicator Sharing (AIS)<\/a>.<\/p>\n<p>Both leaders framed the day\u2019s dialogue as coming at a pivotal time, when our current era\u2014the digital age\u2014presents both immense opportunities and inherent risk and vulnerability. Each stressed how the near-daily succession of cybersecurity incidents has the potential to undermine the trust society places in our digital infrastructure, preventing us from realizing all the potential productivity benefits our digitally connected economy offers.<\/p>\n<p>Prime Minister Turnbull also issued a call to action\u2014for governments and industries around the world to work together to foster a shared understanding of this existential threat and develop a common language for discussing it. In particular, Prime Minister Turnbull highlighted the challenge of translating the technical terminology of cybersecurity practitioners into a more familiar, risk-based framework that senior government and C-suite, or company executive, decision-makers can understand.<\/p>\n<p>Palo Alto Networks has been a global leader in these efforts to foster a common understanding of cybersecurity and empower leaders at all organizational levels to take the steps necessary to manage risk and proactively prevent cyberthreats.\u00a0 As an example, on September 21, the day before the Track 1.5 Dialogue, Palo Alto Networks partnered with Forbes to release the Australia edition of <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/09\/cso-navigating-the-digital-age-in-australia\/\" target=\"_blank\"><em>Navigating the Digital Age: T<\/em><em>he Definitive Cybersecurity Guide for Directors and Officers<\/em><\/a><em>.<\/em><\/p>\n<p>The Australia edition is the first in an upcoming series of regionally based follow-ups to our original <a href=\"http:\/\/connect.paloaltonetworks.com\/cyberhandbook\" target=\"_blank\"><em>Navigating the Digital Age<\/em><\/a> book, which was released in the U.S. in October 2015 in partnership with the New York Stock Exchange and other influential organizations. The book series collects the expertise of CEOs, CISOs, forensic experts, lawyers, academics and government officials to provide corporate boards, executives and officers with practical advice on managing cyber risk. The books also provide a framework for executives to better understand the cybersecurity landscape, ask the right questions, set the right tone, and promote conversations across their organizations about everyone\u2019s shared cybersecurity responsibility.<\/p>\n<p>Whether it be during high-level government dialogues, like the U.S.\u2013Australia Track 1.5, or through initiatives like the <em>Navigating the Digital Age<\/em> book series, Palo Alto Networks is tirelessly committed to driving this important conversation\u2014across industry sectors and borders\u2014that cybersecurity risk can be effectively managed with the right mix of next-generation technologies, a prevention-first mindset, and an educated workforce, all informed by an open and global cybersecurity dialogue.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In late September, I was honored to represent Palo Alto Networks among a select group of stakeholders in Washington, D.C. for the inaugural Track 1.5 Cybersecurity Dialogue between senior government and industry &hellip;<\/p>\n","protected":false},"author":129,"featured_media":20199,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[484],"tags":[447,120,1497,2754],"coauthors":[1179],"class_list":["post-20805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","tag-australia","tag-cybersecurity","tag-navigating-the-digital-age","tag-track-1-5-dialogue"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/09\/government-web-banner-650x300.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/20805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/129"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=20805"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/20805\/revisions"}],"predecessor-version":[{"id":20835,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/20805\/revisions\/20835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20199"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=20805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=20805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=20805"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=20805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}