{"id":45872,"date":"2022-03-25T06:12:46","date_gmt":"2022-03-25T06:12:46","guid":{"rendered":"http:\/\/e8f624ef-bdfd-4a68-95c9-85d8a9884797"},"modified":"2022-03-25T06:12:46","modified_gmt":"2022-03-25T06:12:46","slug":"pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/","title":{"rendered":"PJCIS supports passage of second tranche of critical infrastructure cyber laws"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\/2019\/07\/16\/517393c5-555a-4d15-b316-7d86a609a578\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Australia&#8217;s parliamentary body tasked with reviewing cyber laws has thrown its support behind the federal government&#8217;s second tranche of critical infrastructure cyber laws.<\/p>\n<p>&#8220;The new laws are a critical tool that will bring together government and industry to strengthen our defences against significant threats from nation state adversaries and criminal actors,&#8221; Liberal Senator and Parliamentary Joint Committee on Intelligence and Security (PJCIS) committee chair James Paterson said.<\/p>\n<p>The <em>Security Legislation Amendment (Critical Infrastructure Protection) Bill 2022 <\/em>(SLACIP Bill) contains outstanding elements of cyber laws passed by the Parliament last year,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/critical-infrastructure-bill-should-be-split-to-swiftly-give-government-last-resort-powers-pjcis\/\">per recommendations<\/a>&nbsp;from the committee for the cyber laws to be enshrined in two phases. Among these outstanding elements are requirements for entities deemed &#8220;most important to the nation&#8221; to adhere to enhanced cybersecurity obligations, such as potentially installing third-party software. It also seeks to introduce risk management programs that would apply to entities within the 11 sectors classified as critical infrastructure sectors.<\/p>\n<p>During the PJCIS&#8217; review of the law, the committee heard from critical infrastructure industry representatives who criticised the software installation scheme as they believed it would <a href=\"https:\/\/www.zdnet.com\/article\/australias-cyber-laws-potentially-harmful-to-security-critical-infrastructure-community\/\">introduce unnecessary security risks<\/a> into those types of environments.<\/p>\n<p>Despite hearing these concerns, the PJCIS has supported the enshrinement of the requirement in its <a href=\"https:\/\/parlinfo.aph.gov.au\/parlInfo\/download\/committees\/reportjnt\/024898\/toc_pdf\/AdvisoryreportontheSecurityLegislationAmendment(CriticalInfrastructureProtection)Bill2022.pdf;fileType=application%2Fpdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">advisory report<\/a> [PDF], saying it believes the Australian Signals Directorate (ASD) would enforce that requirement carefully.<\/p>\n<p>&#8220;The committee sought assurances from the Department [of Home Affairs] and ASD that the installation of system software would be used only as a &#8216;provision of last resort&#8217;, and received evidence from both the Department and ASD that most sophisticated entities would be able to provide section 30DB and 30DC reports through existing or current open-source tools,&#8221; the PJCIS wrote.<\/p>\n<p>It added that, in theory, the ASD would already be collaborating with organisations that have systems of national significance and have an understanding of their cybersecurity posture when making any calls for third-party software to be installed.<\/p>\n<p>Acknowledging that the Bill&#8217;s requirement are a work in progress, the committee recommended for the Department of Home Affairs and the Cyber and Infrastructure Security Centre to establish further consultation with critical infrastructure industry representatives, relevant employee representative bodies, and trade unions for further feedback about the Bill&#8217;s risk management programs.<\/p>\n<p>Similarly, the committee wants industry roundtables to continue for the same purpose.<\/p>\n<p>&#8220;The threat to Australia is increasing in scale and sophistication, and so it&#8217;s never been more important to harden our systems. That requires a collaborative effort from government and industry to identify and counter cyber threats targeted at our critical infrastructure, many of which are currently regarded as soft targets by our adversaries,&#8221; Paterson said.<\/p>\n<p>These recommendations came along with nine others, including for the federal government to commission an independent review of the operation of Australia&#8217;s critical infrastructure cyber laws one year after the SLACIP Bill receives Royal Assent.<\/p>\n<p>&#8220;To ensure the laws achieve this critical objective, the committee has recommended that their effectiveness be reviewed once fully implemented to ensure they remain fit for purpose and proportionate to the threat environment,&#8221; Paterson said.<\/p>\n<p>The federal government&#8217;s critical infrastructure reforms sit alongside the&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/trio-of-home-affairs-bills-covering-cyber-ransomware-telco-data-enter-parliament\/\">ransomware action plan<\/a>&nbsp;as being its primary regulatory efforts for bolstering Australia&#8217;s cybersecurity posture.<\/p>\n<p>Labelled by Home Affairs Secretary Mike Pezzullo last month as the government&#8217;s&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/pezzullo-frames-critical-infrastructure-bills-as-defence-and-ransomware-plan-as-offence\/\">defence<\/a>&nbsp;against cyber threats, the federal government is hoping the second tranche of cyber laws will create a standardised critical infrastructure framework for Australia&#8217;s intelligence agencies.<\/p>\n<h3>RELATED COVERAGE<\/h3>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The committee noted that more consultation on cyber laws is still required, however.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45872","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PJCIS supports passage of second tranche of critical infrastructure cyber laws 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PJCIS supports passage of second tranche of critical infrastructure cyber laws 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-25T06:12:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\/2019\/07\/16\/517393c5-555a-4d15-b316-7d86a609a578\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"PJCIS supports passage of second tranche of critical infrastructure cyber laws\",\"datePublished\":\"2022-03-25T06:12:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/\"},\"wordCount\":595,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\\\/2019\\\/07\\\/16\\\/517393c5-555a-4d15-b316-7d86a609a578\\\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/\",\"name\":\"PJCIS supports passage of second tranche of critical infrastructure cyber laws 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\\\/2019\\\/07\\\/16\\\/517393c5-555a-4d15-b316-7d86a609a578\\\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-03-25T06:12:46+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\\\/2019\\\/07\\\/16\\\/517393c5-555a-4d15-b316-7d86a609a578\\\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\\\/2019\\\/07\\\/16\\\/517393c5-555a-4d15-b316-7d86a609a578\\\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PJCIS supports passage of second tranche of critical infrastructure cyber laws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PJCIS supports passage of second tranche of critical infrastructure cyber laws 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/","og_locale":"en_US","og_type":"article","og_title":"PJCIS supports passage of second tranche of critical infrastructure cyber laws 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-25T06:12:46+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\/2019\/07\/16\/517393c5-555a-4d15-b316-7d86a609a578\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"PJCIS supports passage of second tranche of critical infrastructure cyber laws","datePublished":"2022-03-25T06:12:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/"},"wordCount":595,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\/2019\/07\/16\/517393c5-555a-4d15-b316-7d86a609a578\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/","url":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/","name":"PJCIS supports passage of second tranche of critical infrastructure cyber laws 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\/2019\/07\/16\/517393c5-555a-4d15-b316-7d86a609a578\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2022-03-25T06:12:46+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\/2019\/07\/16\/517393c5-555a-4d15-b316-7d86a609a578\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4e60c086de72b2b307cc4ca97ae8f17d271d78c1\/2019\/07\/16\/517393c5-555a-4d15-b316-7d86a609a578\/parliament-house-canberra-distance.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/pjcis-supports-passage-of-second-tranche-of-critical-infrastructure-cyber-laws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"PJCIS supports passage of second tranche of critical infrastructure cyber laws"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45872"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45872\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}