We received very strong submissions that were presented in the session. The paper, ‘Simplifying Cyber Security Maturity Models Through National Culture: A Fuzzy Logic Approach’ by Jongkil Jeong, Marthie Grobler and Chamikara M.A.P.,1 develops a model to scope the boundaries of and impact between cybersecurity maturity, national culture, and user login credential strength. The paper presents further research using the CMM by the GCSCC and the Global Cybersecurity Index by the International Telecommunication Union (ITU) to optimise the developed model.
Another study, ‘Cybersecurity Maturity in the Pacific Islands – Informing a Regional CERT Framework’ by Anthony Adams, Gillian Oliver, and Carsten Rudolph,2 employs a qualitative interview technique to develop an inductive model for a regional Pacific Islands CERT framework. The research proposed a Pacific Islands regional model based on a network of affiliated national CERTs that operate independently and reflect their respective national interests, while collaborating on matters of shared interest, supported by regional partners providing targeted assistance to build national and regional cybersecurity capability maturity and resilience .
Also presented, was ‘Cyber risk to Australian democracy: cyber security from an election law perspective’ by Kathleen Beirne, which considers the effects of cyber operations on democratic processes from the normative framework of election law.
The Minitrack was chaired by Prof. Carsten Rudolph, Director of Research at the Oceania Cyber Security Centre and Associate Professor at Monash University. He was joined by other co-chairs Prof. Enrico Colandro and Prof. Wallace Chigona, directors of the Cybersecurity Capacity Centre for Southern Africa, and Dr. Louise Axon representing the GCSCC.
The constellation partners work as regional centres that conduct research into cybersecurity trends to help the world build capacity and prepare for future cybersecurity shocks. Based on the CMM data we have conducted regional-specific research; comparing and mapping out different elements at play in cybersecurity. A full list of GCSCC research can be found on our publications page.