{"id":108386,"date":"2025-09-17T06:00:13","date_gmt":"2025-09-17T10:00:13","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=108386"},"modified":"2025-09-16T13:39:10","modified_gmt":"2025-09-16T17:39:10","slug":"building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/","title":{"rendered":"Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2"},"content":{"rendered":"<p>The Australian Government is planning the next stage to step up cybersecurity across Australia. As more agencies and organizations adopt a cloud-first strategy and begin embracing AI capabilities, their attack surface expands, making it more crucial than ever to have a robust cybersecurity strategy.<\/p>\n<p>Australia recognizes the need to mature its cybersecurity program across its entire government. And it\u2019s with good reason. Governments are major targets.<\/p>\n<p>Today, the government sector globally has the highest number of cyber attacks in the first half of 2025, according to a <a href=\"\/research-labs\/2025h1-threat-review\/\">mid-year report<\/a> from Forescout\u2019s research team, Vedere Labs:<\/p>\n<ul>\n<li>Government leads all sectors with 79 attacks (Jan. to June 2025)<\/li>\n<li>46% increase in Zero Day exploit attacks from 2024<\/li>\n<li>36% increase in ransomware attacks<\/li>\n<\/ul>\n<div>\n<a href=\"https:\/\/www.forescout.com\/resources\/forescout-submission-to-developing-horizon-2-of-the-2023-2030-australian-cyber-security-strategy\/\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"sideimage wp-image-108390\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Forescout-Horizon-2-Aus-Gov-Submission-thumbnail.jpg\" alt=\"\" width=\"923\" height=\"1201\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Forescout-Horizon-2-Aus-Gov-Submission-thumbnail.jpg 923w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Forescout-Horizon-2-Aus-Gov-Submission-thumbnail-231x300.jpg 231w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Forescout-Horizon-2-Aus-Gov-Submission-thumbnail-787x1024.jpg 787w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Forescout-Horizon-2-Aus-Gov-Submission-thumbnail-768x999.jpg 768w\" sizes=\"auto, (max-width: 923px) 100vw, 923px\" \/><\/a><br \/>\nIn Australia, the government has reported its own data (\u201c<a href=\"https:\/\/www.cyber.gov.au\/about-us\/view-all-content\/reports-and-statistics\/annual-cyber-threat-report-2023-2024\" target=\"_blank\" rel=\"noopener\">Annual Cyber Threat Report 2023-2024<\/a>\u201d):\n<ul>\n<li>Over 36,700 calls to its Australian Cyber Security hotline \u2014an increase of 12%<\/li>\n<li>The Australian Signals Directorate (ASD) responded to over 1,100 cyber security incidents<\/li>\n<li>Over 11% of cyber security incidents ASD responded to related to critical infrastructure<\/li>\n<\/ul>\n<p>\u201cIn FY2023-24, business email compromise and fraud were among the top self-reported cybercrimes for businesses and individuals in Australia. Ransomware and data theft extortion also remained a pervasive and costly threat,\u201d says the authors of the ASD \u201c<a href=\"https:\/\/www.cyber.gov.au\/about-us\/view-all-content\/reports-and-statistics\/annual-cyber-threat-report-2023-2024\" target=\"_blank\" rel=\"noopener\">Annual Cyber Threat Report 2023-2024<\/a>.\u201d<\/p>\n<p>In light of this environment, Forescout Technologies has submitted a comprehensive response to the <a href=\"https:\/\/www.homeaffairs.gov.au\/help-and-support\/how-to-engage-us\/consultations\/consultation-horizon-2-of-2023-2030-australian-cyber-security-strategy\" target=\"_blank\" rel=\"noopener\">Cyber Security Strategy for 2023 &#8211; 2030, Horizon 2 Policy Consultation<\/a>. Drawing on over two decades of operational experience supporting governments, defence, and critical infrastructure, Forescout outlines practical recommendations to strengthen national cyber resilience.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<h2>Bridging the Gaps from Horizon 1<\/h2>\n<p>The <a href=\"https:\/\/www.cyber.gov.au\/about-us\/view-all-content\/reports-and-statistics\/commonwealth-cyber-security-posture-2024\" target=\"_blank\" rel=\"noopener\">2024 Commonwealth Cyber Security Posture report<\/a> showed that many government agencies needed to implement strategies to advance to Cybersecurity Maturity Level 2, so that the services they offer to the community are safe and not at risk of going offline.<\/p>\n<p>Here are few key data points the report indicated:<\/p>\n<ul>\n<li>The proportion of government entities that reached overall Maturity Level\u202f2 across the Essential Eight mitigation strategies has declined. In 2024, 15\u202fper cent of all entities reached overall Maturity Level\u202f2, decreasing from 25\u202fper cent in 2023.<\/li>\n<li>In 2024, 75 per cent of entities had a cyber security strategy, an increase from 73\u202fper cent in 2023. Furthermore, 86\u202fper cent of entities addressed cyber security disruptions in their business continuity and disaster recovery planning, an increase from 83\u202fper cent in 2023.<\/li>\n<\/ul>\n<p>Here is the criteria the government uses to accelerate widespread maturity:<\/p>\n<ul>\n<li>Cyber security hardening: An entity&#8217;s implementation of cyber security technical mitigations, primarily the Essential Eight mitigation strategies, to reduce the likelihood of an information and communications technology (ICT) system being compromised.4<\/li>\n<li>Incident preparedness and response: An entity&#8217;s readiness to respond to a cyber security incident, and actions when a cyber security incident occurs.<\/li>\n<li>Leadership and planning: An entity&#8217;s leadership engagement with cyber security and broader cyber security culture.<\/li>\n<\/ul>\n<p>There is more to do. Despite growing awareness of cyber threats, many government agencies remain stalled in their cybersecurity journey. The challenge is not resistance to change. Agencies are being asked to lead without a map. Forescout sees key barriers first-hand. Agencies are willing but uncertain how to move forward. To address this, Forescout calls for:<\/p>\n<ul>\n<li>Transparent tools that assess cybersecurity maturity, weaknesses, and network vulnerabilities in near or real-time.<\/li>\n<li>Targeted investments that can be quickly replicated.<\/li>\n<li>Proven best practice approaches that are production hardened.<\/li>\n<li>Showcasing high-performing high maturity agencies using independent data.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Accelerating Zero Trust Adoption<\/h2>\n<p>Zero Trust, which assumes networks are always at risk of malicious attack, is a cornerstone of Australia\u2019s cybersecurity strategy. More consistent implementation addressing the vulnerabilities of legacy systems and stronger identity management is necessary. Forescout recommends:<\/p>\n<ul>\n<li>Formal adoption of NIST SP 1800-35 Zero Trust standard as the guiding framework.<\/li>\n<li>New funding to support whole-of-government Zero Trust rollout.<\/li>\n<li>Investment in exemplar agencies to model scalable Zero Trust deployments.<\/li>\n<\/ul>\n<div style=\"margin: 10px 0 20px 0; border-top: 1px solid #CCCCCC; border-bottom: 1px solid #CCCCCC; padding: 10px 0 10px 0;\">\n<h4>Go deeper: Learn all about Forescout\u2019s <a href=\"\/wp-securing-government-and-defence-networks-with-forescouts-adaptive-zero-trust-approach\/\">approach to Zero Trust<\/a>. <\/h4>\n<\/div>\n<h3>Preparing for the Quantum Era<\/h3>\n<p>Quantum computing is fast approaching operational reality, threatening current encryption standards. Forescout urges immediate action:<\/p>\n<ul>\n<li>Establish a National Quantum Risk Framework and Roadmap.<\/li>\n<li>Accelerate adoption of Post-Quantum Cryptography.<\/li>\n<li>Invest in sovereign quantum-safe technologies.<\/li>\n<li>Launch a national awareness and transition program.<\/li>\n<\/ul>\n<p><a href=\"\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/\">Forescout\u2019s research<\/a>, including insights from Vedere Labs, highlights the urgency of preparing for quantum threats right now.<\/p>\n<p>&nbsp;<\/p>\n<h2>Securing Operational Technology (OT)<\/h2>\n<p>While Horizon 1 addressed IoT, Horizon 2 rightly must focus on OT devices that are critical to infrastructure and safety. Forescout outlines a seven-step strategy:<\/p>\n<ul>\n<li>Automated asset visibility across OT environments.<\/li>\n<li>Risk prioritisation using dual cybersecurity and operational scores.<\/li>\n<li>Passive threat detection to avoid operational disruption.<\/li>\n<li>Automated response orchestration across IT and OT.<\/li>\n<li>Support for hybrid deployments across air-gapped and cloud environments.<\/li>\n<li>Alignment with global frameworks like IEC 62443 and NIST CSF.<\/li>\n<li>Workforce development with cross-team collaboration and insider threat awareness.<\/li>\n<\/ul>\n<p>Forescout emphasises that visibility is the foundation of resilience: you can\u2019t secure what you can\u2019t see.<\/p>\n<p>&nbsp;<\/p>\n<h2>A Call to Action<\/h2>\n<p>Forescout\u2019s submission is more than a policy response. It\u2019s a call to action. Australia is moving from ambition to action, from frameworks to implementation, demonstrating outcomes. By funding foundational capabilities, showcasing success, and embracing emerging technologies, the nation can build a cyber-resilient future.<\/p>\n<div style=\"margin: 10px 0 20px 0; border-top: 1px solid #CCCCCC; border-bottom: 1px solid #CCCCCC; padding: 10px 0 10px 0;\">\n<h4>Go deeper: Watch this <a href=\"\/webinars\/mastering-zero-trust-the-five-essential-steps-to-zero-trust-assurance\/\">webinar at any time, on demand<\/a>: \u201cMastering Zero Trust: The Five Essential Steps to Zero Trust Assurance\u201d. <\/h4>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Australian government published the \u201cCyber Security Strategy for 2023 &#8211; 2030, Horizon 2 Policy\u201d. This blog highlights Forescout\u2019s response and guidance.<\/p>\n","protected":false},"author":165,"featured_media":108389,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[833],"class_list":["post-108386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2<\/title>\n<meta name=\"description\" content=\"The Australian government published the \u201cCyber Security Strategy for 2023 - 2030, Horizon 2 Policy\u201d. This blog highlights Forescout\u2019s response and guidance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2\" \/>\n<meta property=\"og:description\" content=\"The Australian government published the \u201cCyber Security Strategy for 2023 - 2030, Horizon 2 Policy\u201d. This blog highlights Forescout\u2019s response and guidance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-17T10:00:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Colin Garro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/\"},\"author\":{\"name\":\"Drago Bozhkov\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/c46a9e0c63a7dc2b610a93039890c879\"},\"headline\":\"Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2\",\"datePublished\":\"2025-09-17T10:00:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/\"},\"wordCount\":882,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/\",\"name\":\"Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg\",\"datePublished\":\"2025-09-17T10:00:13+00:00\",\"description\":\"The Australian government published the \u201cCyber Security Strategy for 2023 - 2030, Horizon 2 Policy\u201d. This blog highlights Forescout\u2019s response and guidance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/c46a9e0c63a7dc2b610a93039890c879\",\"name\":\"Drago Bozhkov\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/4926355a2f898174d35e71a070a40a0d\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/095d0c0b48b839147163b8d9361c012c919c6e3606e072308af89b44ecd9c70c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/095d0c0b48b839147163b8d9361c012c919c6e3606e072308af89b44ecd9c70c?s=96&d=mm&r=g\",\"caption\":\"Drago Bozhkov\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2","description":"The Australian government published the \u201cCyber Security Strategy for 2023 - 2030, Horizon 2 Policy\u201d. This blog highlights Forescout\u2019s response and guidance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/","og_locale":"en_US","og_type":"article","og_title":"Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2","og_description":"The Australian government published the \u201cCyber Security Strategy for 2023 - 2030, Horizon 2 Policy\u201d. This blog highlights Forescout\u2019s response and guidance.","og_url":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2025-09-17T10:00:13+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg","type":"image\/jpeg"}],"author":"Colin Garro","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/"},"author":{"name":"Drago Bozhkov","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/c46a9e0c63a7dc2b610a93039890c879"},"headline":"Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2","datePublished":"2025-09-17T10:00:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/"},"wordCount":882,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/","url":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/","name":"Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg","datePublished":"2025-09-17T10:00:13+00:00","description":"The Australian government published the \u201cCyber Security Strategy for 2023 - 2030, Horizon 2 Policy\u201d. This blog highlights Forescout\u2019s response and guidance.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/building-a-cyber-resilient-australia-forescouts-vision-for-horizon-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Building a Cyber Resilient Australia: Forescout\u2019s Vision for Horizon 2"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/c46a9e0c63a7dc2b610a93039890c879","name":"Drago Bozhkov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/4926355a2f898174d35e71a070a40a0d","url":"https:\/\/secure.gravatar.com\/avatar\/095d0c0b48b839147163b8d9361c012c919c6e3606e072308af89b44ecd9c70c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/095d0c0b48b839147163b8d9361c012c919c6e3606e072308af89b44ecd9c70c?s=96&d=mm&r=g","caption":"Drago Bozhkov"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/Australia-Horizon-2.jpg","is_file":false,"excerpt_manually_set":true,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/108386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=108386"}],"version-history":[{"count":3,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/108386\/revisions"}],"predecessor-version":[{"id":108394,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/108386\/revisions\/108394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/108389"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=108386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=108386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=108386"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=108386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}