Japan’s Cyber Security Minister Admits He Just Doesn't Get It

Japan's cyber security minister, who gained global notoriety recently when he said he doesn't use a computer, has now admitted he's not that familiar with the whole cyber security field either.

Yoshitaka Sakurada, 68, who also serves as minister for the 2020 Tokyo Olympics, faced a parliamentary committee Thursday on the country's new cyber security law.

"I, myself, am not that familiar with" cyber security matters, he told the committee, according to the Japan Times.

"My biggest job is to read out written replies without making any mistakes," he said, referring to responses to questions written for him by his ministry's bureaucrats.

The Japan Times reported that Sakurada even struggled with that role. During the meeting, it reported, there were times when Sakurada failed to read such documents correctly, while he also misunderstood questions from lawmakers and made some inappropriate answers.

An opposition lawmaker said he could harm Japan's economy, to which he replied, "I'm here because a Cabinet minister is needed."

Japan is revising its cyber security law ahead of the Olympics, with an amendment approved on Thursday meant to facilitate information sharing between public and private sectors to ward off possible cyber-attacks.

Sakurada, who was appointed in a cabinet reshuffle in October, has a long-standing reputation for gaffes. In 2016 he described the "comfort women" forced into providing sexual services to the occupying Japanese troops in the past century as "professional prostitutes", sparking an angry response from South Korea.

Last week, he told another parliamentary committee he didn't use a computer.

"I've been doing business independently since I was 25 years old, so I have been giving instructions to employees and secretaries," he said, according to Kyodo News. "I never touch my computer myself."

This week, he expanded on that topic.

"I use a smartphone many times a day because it's very useful," he said. "I've never felt any inconvenience from not being able to type by myself."

He is not alone. US President Donald Trump is reported as not using a computer, though he frequently tweets from his phone.

Sydney Morning Herald:

You Might Also Read:

Japanese Cybersecurity Minister Does Not Use Computers

« Learning From Hackers To Protect Against Attacks
GDPR’s Impact: The First Six Months »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Mellanox Technologies

Mellanox Technologies

Mellanox Technologies is a leading supplier of end-to-end Ethernet and InfiniBand intelligent interconnect solutions and services for servers, storage, and hyper-converged infrastructure.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Intersec Worldwide

Intersec Worldwide

Intersec Worldwide is a boutique Information Security Firm specializing in PCI Compliance, Assessment, Remediation, Forensics, Data Breach Investigations, Incident Response and IT Managed Services.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.