MYSEC.TV

Home   /   RESOURCES   /   MYSEC.TV   / AUKUS Strategic Security Alliance announcement and implications

AUKUS Strategic Security Alliance announcement and implications

Tech & Sec Weekly
SHARE:

IN THIS VIDEO

A landmark defence and security partnership has been agreed by the leaders of the UK, the United States and Australia which will protect and defend shared interests in the Indo-Pacific.

Under the ‘AUKUS’ alliance, the three countries will enhance the development of joint capabilities and technology sharing, as well as foster deeper integration of security and defence-related science, technology, industrial bases and supply chains.

The first major initiative of AUKUS will be to deliver a nuclear-powered submarine fleet for Australia.

We speak with Dr. Malcolm Davis, Senior Analyst with the Australian Strategic Policy Institute (ASPI)in Canberra and Zack Cooper, Senior Fellow with the American Enterprise Institute (AEI) in Washington on this arrangement and the implications for Australia and Indo-Pacific.

#mysecuritytv #AUKUS #nationalsecurity #indopacific

Further Reading – Asia Pacific Security Magazine
https://www.asiapacificsecuritymagazi…
https://www.asiapacificsecuritymagazi…

OTHER VIDEOS IN THIS SERIES

Astronomers
April 18, 2024
An international team of astronomers has discovered 49 new gas-rich galaxies using the MeerKAT radio telescope in South Africa. Watch Now
apsm_03
April 8, 2024
What are the strategic directions for AI in homeland security. Attending Milipol APAC and TechX Summit 2024, we speak with Physicist and former Yale University Professor, Dimitri Kusnezov, Under Secretary for S&T, US Department of Homeland Security. Watch Now
apsm_01
April 8, 2024
With the rapidly evolving challenges in global travel, trade, and security, we speak to Australian Border Force Commissioner, Michael Outram APM at the Milipol APAC and TechX Summit 2024 in Singapore. Watch Now
apsm
April 2, 2024
Pentera is an automated pentesting platform. Validate every attack surface in your network, and test continuously to maintain control over your true security posture. Be proactive in fixing vulnerabilities, misconfigurations, leaked credentials, and privileges before they are exploited. Watch Now