{"id":16745,"date":"2020-09-08T14:00:18","date_gmt":"2020-09-08T17:00:18","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=16745"},"modified":"2020-09-08T10:31:50","modified_gmt":"2020-09-08T13:31:50","slug":"critical-infrastructure-resilience-strategy","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/critical-infrastructure-resilience-strategy\/","title":{"rendered":"Critical Infrastructure Resilience Strategy"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-16746\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/09\/critical-infrastructure-resilience-strategy.jpg\" alt=\"Critical Infrastructure Resilience Strategy\" width=\"145\" height=\"205\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/09\/critical-infrastructure-resilience-strategy.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/09\/critical-infrastructure-resilience-strategy-106x150.jpg 106w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Commonwealth of Australia<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> In the wake of the 11 September 2001 terrorist attacks in the United States and the 2002 Bali Bombings, the Australian Government established a national Critical Infrastructure Strategy for Australia. This \u2018all hazards\u2019 Strategy provided a strong foundation on which critical infrastructure owners and operators and governments could prepare for, and respond to, a range of significant disruptive events.<br \/>\nSuccessive Strategies have encompassed over a decade of collaborative effort and achievement by businesses and all levels of government. The resilience of Australia\u2019s critical infrastructure has been enhanced by the collective work of the States and Territories, the Commonwealth Government and the owners and operators of critical infrastructure. The Trusted Information Sharing Network (TISN) continues to provide a secure, non-competitive environment in which all stakeholders have the opportunity to work together to ensure the continued operation of critical infrastructure.<br \/>\nThe Critical Infrastructure Resilience Strategy (the Strategy), which consists of this Policy Statement and a Plan for practical implementation, builds on past successes, provides greater value to stakeholders, and continues to deliver significant outcomes for business and the economy, governments and the community.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2020\/09\/critical-infrastructure-resilience-strategy.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Commonwealth of Australia R\u00e9sum\u00e9: In the wake of the 11 September 2001 terrorist attacks in the United States and the 2002 Bali Bombings, the Australian Government established a national Critical Infrastructure Strategy for Australia. This \u2018all hazards\u2019 Strategy provided a strong foundation on which critical infrastructure owners and operators and governments could prepare for, and respond to, a range of significant disruptive events. Successive Strategies have encompassed over a decade&hellip; <\/p>\n","protected":false},"author":3,"featured_media":16746,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,25,112],"tags":[],"class_list":["post-16745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-seguranca-publica-e-defesa","category-download"],"views":87,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=16745"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16745\/revisions"}],"predecessor-version":[{"id":16747,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16745\/revisions\/16747"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/16746"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=16745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=16745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=16745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}