SlideShare a Scribd company logo
1 of 15
Download to read offline
Emancipating, Enriching, Equalising
and Empowering through the use of
ICTs

The Role of the Commonwealth in
Cyberspace
30 October 2013
The Commonwealth

•
•
•
•
•
•

•

54 Member Countries
Nearly  a  third  of  the  World’s  population
Combined GDP over £5 trillion
Mobile subscriptions ranging from 5% to 185%,
with an average of 84%
Fixed telephone lines ranging from 0.3% to
60%, with an average of 18%
Internet usage ranging from 1% to 85%, with
an average of 28%
A thriving hub of technology innovations and
possibly the largest ICT market in the world

2
The CTO
• Set up in 1901
• The oldest and the largest Commonwealth organisation in the field
of ICTs
• support members in using ICTs to deliver effective development
interventions that enrich, empower, equalise and emancipate all
peoples within the Commonwealth and beyond
• Traditional core activities
• Research & consultancy
• Capacity development & training
• Events & conferences
• Cybergovernance and Cybersecurity are focus areas under the
strategic plan of 2012-16

3
Context
• Cyberspace generates enormous social and economic
benefits
• Cyber population is growing
– Improving connectivity – national and international
– Broadband Commission & A4AI on promoting Broadband

• Meeting place of different people & cultures, views &
approaches
• Requires fostering entrepreneurship and innovation while
protecting freedom and liberty
• Where to strike the balance?
• Multi jurisdictional - Both national and international
aspects - interlinked
4
Cybergovernance
conceptualised

5
e-Bay - Community Action in
Cybergovernance
•
•
•
•
•

Population exceeded 100 million by end 2011
Commercially driven community
Multi jurisdictional
Operates on the basis of voluntary compliance
Motivation - Need to belong

6
Divergence
• Multistakeholder approach Vs. State-driven
• Voluntary norms Vs Treaty based
• Brought to sharp contrast at the World Conference on
International Telecommunications (WCIT) in December 2012
in Dubai
• Some concerns about the role of the State in Governing the
Cyberspace through International Telecommunications
Regulations.
• Disagreement  over  “resolving  to  instruct  the  SecretaryGeneral to continue to take the necessary steps for ITU to
play  an  active  and  constructive  role”
• Apparently so far 89 signatories out of 190 signatories

7
Commonwealth in
Cybergovernance
• Commonwealth has a role to play
• Based on the Commonwealth Values agreed at the Singapore
CHOGM in 1971 and reaffirmed in Harare in 1991
• Detailed in the Commonwealth Charter of 2013
(http://thecommonwealth.org/sites/default/files/page/docum
ents/CharteroftheCommonwealth.pdf), particularly
– respect for the protection and promotion of civil, political,
economic, social and cultural rights, including the right to
development
– commitment to remove disparities and unequal living standards
as guided by internationally agreed development goals
– recognise the importance of ICTs as instruments of
development ......... as well as for ........... sharing of cultures,
while enhancing security.

8
CTO’s  approach  to  
Cybergovernance
Develop a set of principles
Based on Commonwealth principles
Arrived through consensus
Involving consultations of a range of stakeholders policy makers, regulators, ICT implementing agencies,
CERTs etc
• Leveraging the strengths of developed countries to
assist developing countries
• That may eventually expand beyond the Commonwealth
•
•
•
•

9
CTO’s  Principles  of  
Cybergovernance
Foster innovation, freedom and understanding
Contribute to economic development
Enable social interactions
Recognise legitimate economic, cultural and security
concerns of members
• Promote multistakeholder partnerships
• Facilitate Pan-Commonwealth consultations and
international linkages
•
•
•
•

10
Progress – so far
• The first consultation of ICT policy makers and
regulators was held on 9th and 10th October 2013 in
Abuja, Nigeria
• Delegates from over 20 Commonwealth countries
– decided that the CTO should take the lead in
developing the Commonwealth Cybergovernance
Model
– committed to support the initiative
Issued the Abuja Declaration
http://www.cto.int/focus-themes/cybersecurity/

11
Next Steps
• A series of regional consultations
• Starting with a Caribbean Ministerial
Consultation on 5th December 2013 in Jamaica
in the margins of the Caribbean
Telecommunication  Union’s  Ministerial  meeting    
• Culminating  in  the  Commonwealth  ICT  Minister’s  
meeting at the Marlborough House in London on
3 – 4 March 2014 where the principles will be
debated and, if thought fit, adopted.

12
Aims & Objectives
• Create a standard all can subscribe to, resulting
in better international cooperation and
coordination
• Act as a beacon for non-Commonwealth
countries
• Provide an assurance to countries that extend
assistance that their aid is properly used
In order to make the Cyberspace a thriving,
innovative and rewarding place

13
How to get involved
• Take part in the consultations – when
invited
• Join related activities – Cybersecurity
Forum 2014 in London (5 – 7 March 2014)
• Participate in capacity building in Cyberrelated subjects through CTO

14
Lasantha De Alwis
Director/Head of Operations Department
Commonwealth Telecommunications Organisation
94-66, Glenthorne Road, Hammersmith, UK
+44(0)208 600 3814
l.dealwis@cto.int

15

More Related Content

What's hot

Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?APNIC
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...APNIC
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25ISOC-KG
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa ICT4Democracy in East Africa
 
Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)ISOC-KG
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityAFRINIC
 
Internet Governance
Internet GovernanceInternet Governance
Internet GovernanceARIN
 
Isoc report launch maarit 221115
Isoc report launch maarit 221115Isoc report launch maarit 221115
Isoc report launch maarit 221115ISOC-KG
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldGood Things Foundation
 
Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)ISOC-KG
 
Introduction to Broadband
Introduction to BroadbandIntroduction to Broadband
Introduction to BroadbandSamantha Wagner
 
SATNET Presentation
SATNET PresentationSATNET Presentation
SATNET PresentationSANGONeT
 
World Digital Solidarity
World Digital SolidarityWorld Digital Solidarity
World Digital Solidarityaciddtic21
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009pinardclark
 
CTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business DevelopmentCTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business Developmentsegughana
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesInternet Society
 

What's hot (20)

Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
 
Final project pig garry mukelabai
Final project pig garry mukelabaiFinal project pig garry mukelabai
Final project pig garry mukelabai
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
 
Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Isoc report launch maarit 221115
Isoc report launch maarit 221115Isoc report launch maarit 221115
Isoc report launch maarit 221115
 
The Commonwealth Cybercrime initiative
The Commonwealth Cybercrime initiativeThe Commonwealth Cybercrime initiative
The Commonwealth Cybercrime initiative
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital World
 
Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)
 
Introduction to Broadband
Introduction to BroadbandIntroduction to Broadband
Introduction to Broadband
 
SATNET Presentation
SATNET PresentationSATNET Presentation
SATNET Presentation
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
World Digital Solidarity
World Digital SolidarityWorld Digital Solidarity
World Digital Solidarity
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009
 
CTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business DevelopmentCTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business Development
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 

Viewers also liked

Critical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCritical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCommunity Protection Forum
 
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...NetSecure Day
 
Iremos en quelques mots
Iremos en quelques motsIremos en quelques mots
Iremos en quelques motsClément Têtu
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-TerrorismChallenge:Future
 
Indian para special forces
Indian para special forcesIndian para special forces
Indian para special forcesBhanu Teja
 
20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactorPersonal Interactor
 
Guide amdec (très intéressant)
Guide amdec (très intéressant)Guide amdec (très intéressant)
Guide amdec (très intéressant)pascalbaudin
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 

Viewers also liked (13)

Critical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCritical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency Issues
 
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
 
Emergency Preparedness - State of the Art
Emergency Preparedness - State of the ArtEmergency Preparedness - State of the Art
Emergency Preparedness - State of the Art
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Iremos en quelques mots
Iremos en quelques motsIremos en quelques mots
Iremos en quelques mots
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism
 
Indian para special forces
Indian para special forcesIndian para special forces
Indian para special forces
 
20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor
 
Guide amdec (très intéressant)
Guide amdec (très intéressant)Guide amdec (très intéressant)
Guide amdec (très intéressant)
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Formation AMDEC
Formation AMDECFormation AMDEC
Formation AMDEC
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 

Similar to The Role of the Commonwealth in Cyberspace

ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07segughana
 
Aisi and Nici-Policy Doc
Aisi and Nici-Policy DocAisi and Nici-Policy Doc
Aisi and Nici-Policy DocAlain Nkoyock
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyGenève Lab
 
Digital divide
Digital divideDigital divide
Digital divideUc Man
 
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUEmmanuel Mumuni
 
Wsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryWsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryDr Lendy Spires
 
ISOC: IXPs Partnerships
ISOC: IXPs PartnershipsISOC: IXPs Partnerships
ISOC: IXPs PartnershipsATI Tunisia
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends Endcode_org
 
ISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and BeyondISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and BeyondATI Tunisia
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy workNawsheen Hosenally
 
National Initiatives ITU
National Initiatives ITUNational Initiatives ITU
National Initiatives ITUAdrian Hall
 
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...AhmBazlurRahman
 
Digital Development and Digital Inclusion
Digital Development and Digital InclusionDigital Development and Digital Inclusion
Digital Development and Digital InclusionMark Graham
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 

Similar to The Role of the Commonwealth in Cyberspace (20)

ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07
 
Aisi and Nici-Policy Doc
Aisi and Nici-Policy DocAisi and Nici-Policy Doc
Aisi and Nici-Policy Doc
 
Info 442 chapter 2
Info 442 chapter 2Info 442 chapter 2
Info 442 chapter 2
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public Policy
 
Digital divide
Digital divideDigital divide
Digital divide
 
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
 
Communications Development in Saudi Arabia
Communications Development in Saudi ArabiaCommunications Development in Saudi Arabia
Communications Development in Saudi Arabia
 
Wsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryWsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summary
 
ISOC: IXPs Partnerships
ISOC: IXPs PartnershipsISOC: IXPs Partnerships
ISOC: IXPs Partnerships
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 
ISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and BeyondISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and Beyond
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy work
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy work
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
National Initiatives ITU
National Initiatives ITUNational Initiatives ITU
National Initiatives ITU
 
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
 
Digital Development and Digital Inclusion
Digital Development and Digital InclusionDigital Development and Digital Inclusion
Digital Development and Digital Inclusion
 
Wcit 12
Wcit 12Wcit 12
Wcit 12
 
WCIT 2016 Manu Bhardwaj
WCIT 2016 Manu BhardwajWCIT 2016 Manu Bhardwaj
WCIT 2016 Manu Bhardwaj
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 

More from Community Protection Forum

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Community Protection Forum
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Community Protection Forum
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...Community Protection Forum
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Community Protection Forum
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCommunity Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Community Protection Forum
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsCommunity Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesCommunity Protection Forum
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceCommunity Protection Forum
 

More from Community Protection Forum (20)

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 

Recently uploaded

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 

Recently uploaded (20)

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 

The Role of the Commonwealth in Cyberspace

  • 1. Emancipating, Enriching, Equalising and Empowering through the use of ICTs The Role of the Commonwealth in Cyberspace 30 October 2013
  • 2. The Commonwealth • • • • • • • 54 Member Countries Nearly  a  third  of  the  World’s  population Combined GDP over £5 trillion Mobile subscriptions ranging from 5% to 185%, with an average of 84% Fixed telephone lines ranging from 0.3% to 60%, with an average of 18% Internet usage ranging from 1% to 85%, with an average of 28% A thriving hub of technology innovations and possibly the largest ICT market in the world 2
  • 3. The CTO • Set up in 1901 • The oldest and the largest Commonwealth organisation in the field of ICTs • support members in using ICTs to deliver effective development interventions that enrich, empower, equalise and emancipate all peoples within the Commonwealth and beyond • Traditional core activities • Research & consultancy • Capacity development & training • Events & conferences • Cybergovernance and Cybersecurity are focus areas under the strategic plan of 2012-16 3
  • 4. Context • Cyberspace generates enormous social and economic benefits • Cyber population is growing – Improving connectivity – national and international – Broadband Commission & A4AI on promoting Broadband • Meeting place of different people & cultures, views & approaches • Requires fostering entrepreneurship and innovation while protecting freedom and liberty • Where to strike the balance? • Multi jurisdictional - Both national and international aspects - interlinked 4
  • 6. e-Bay - Community Action in Cybergovernance • • • • • Population exceeded 100 million by end 2011 Commercially driven community Multi jurisdictional Operates on the basis of voluntary compliance Motivation - Need to belong 6
  • 7. Divergence • Multistakeholder approach Vs. State-driven • Voluntary norms Vs Treaty based • Brought to sharp contrast at the World Conference on International Telecommunications (WCIT) in December 2012 in Dubai • Some concerns about the role of the State in Governing the Cyberspace through International Telecommunications Regulations. • Disagreement  over  “resolving  to  instruct  the  SecretaryGeneral to continue to take the necessary steps for ITU to play  an  active  and  constructive  role” • Apparently so far 89 signatories out of 190 signatories 7
  • 8. Commonwealth in Cybergovernance • Commonwealth has a role to play • Based on the Commonwealth Values agreed at the Singapore CHOGM in 1971 and reaffirmed in Harare in 1991 • Detailed in the Commonwealth Charter of 2013 (http://thecommonwealth.org/sites/default/files/page/docum ents/CharteroftheCommonwealth.pdf), particularly – respect for the protection and promotion of civil, political, economic, social and cultural rights, including the right to development – commitment to remove disparities and unequal living standards as guided by internationally agreed development goals – recognise the importance of ICTs as instruments of development ......... as well as for ........... sharing of cultures, while enhancing security. 8
  • 9. CTO’s  approach  to   Cybergovernance Develop a set of principles Based on Commonwealth principles Arrived through consensus Involving consultations of a range of stakeholders policy makers, regulators, ICT implementing agencies, CERTs etc • Leveraging the strengths of developed countries to assist developing countries • That may eventually expand beyond the Commonwealth • • • • 9
  • 10. CTO’s  Principles  of   Cybergovernance Foster innovation, freedom and understanding Contribute to economic development Enable social interactions Recognise legitimate economic, cultural and security concerns of members • Promote multistakeholder partnerships • Facilitate Pan-Commonwealth consultations and international linkages • • • • 10
  • 11. Progress – so far • The first consultation of ICT policy makers and regulators was held on 9th and 10th October 2013 in Abuja, Nigeria • Delegates from over 20 Commonwealth countries – decided that the CTO should take the lead in developing the Commonwealth Cybergovernance Model – committed to support the initiative Issued the Abuja Declaration http://www.cto.int/focus-themes/cybersecurity/ 11
  • 12. Next Steps • A series of regional consultations • Starting with a Caribbean Ministerial Consultation on 5th December 2013 in Jamaica in the margins of the Caribbean Telecommunication  Union’s  Ministerial  meeting     • Culminating  in  the  Commonwealth  ICT  Minister’s   meeting at the Marlborough House in London on 3 – 4 March 2014 where the principles will be debated and, if thought fit, adopted. 12
  • 13. Aims & Objectives • Create a standard all can subscribe to, resulting in better international cooperation and coordination • Act as a beacon for non-Commonwealth countries • Provide an assurance to countries that extend assistance that their aid is properly used In order to make the Cyberspace a thriving, innovative and rewarding place 13
  • 14. How to get involved • Take part in the consultations – when invited • Join related activities – Cybersecurity Forum 2014 in London (5 – 7 March 2014) • Participate in capacity building in Cyberrelated subjects through CTO 14
  • 15. Lasantha De Alwis Director/Head of Operations Department Commonwealth Telecommunications Organisation 94-66, Glenthorne Road, Hammersmith, UK +44(0)208 600 3814 l.dealwis@cto.int 15