Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
“A Case for Multi-stakeholder partnerships
for critical internet resources security in
the SADC Region”
By Cade Zvavanjanj...
Introduction
• Definition of the issue & Regional
specificities observed
• Existing policy measures and private
sector ini...
Key Terms
• Internet Critical Resources
• Cybersecurity
• Multi-stakeholder partnership
Current Global Governance & Security
Adapted from: The Center for Democracy & Technology
Current Cybersecurity SADC Efforts
Current Cybersecurity SADC Efforts
Current Needs of SADC States
Needs Cont……
Stakeholder Analysis
Stakeholder analysis Cont….
Stakeholder Analysis cont…
Stakeholder Analysis Cont…
Why MPs
• An effective MP for CIRS would
provide the abilities to detect threats
and dangerous or anomalous
behaviours, to...
MPs Characteristics
A multi-stakeholder process must have the following
characteristics:
•Involvement of stakeholders in t...
MPs in-depth
An effective partnership has:
• A representative group of members, large
enough to be sufficiently inclusive,...
• Growing influence of the business sector in the political
discourse and agenda setting.
• Critics fear that partnership ...
Conclusion
• MPs which address security and resilience have evolved in
many countries as an efficient means of protecting ...
Thank You
Cade Zvavanjanja
Director - Zimbabwe Cybersecurity
Center
cadezvavanjanja@gmail.com
+263 773796365
Upcoming SlideShare
Loading in …5
×

A case for multi-stakeholder cybersecurity by zvavanjanja

A presentation based on a thematic paper for Southern Africa Internet Governance forum, the full paper is on http://www.slideshare.net/drrevcade.

  • Be the first to comment

  • Be the first to like this

A case for multi-stakeholder cybersecurity by zvavanjanja

  1. 1. “A Case for Multi-stakeholder partnerships for critical internet resources security in the SADC Region” By Cade Zvavanjanja Director: Zimbabwe Cybersecurity Center SAIGF- 2015Southern Africa Internet Governance Forum-15’
  2. 2. Introduction • Definition of the issue & Regional specificities observed • Existing policy measures and private sector initiatives, impediments; • What worked well & Consequences of policy interventions, • Unresolved issues & Insights gained as a result of the experience; and • Proposed steps for further multi- stakeholder dialogue.
  3. 3. Key Terms • Internet Critical Resources • Cybersecurity • Multi-stakeholder partnership
  4. 4. Current Global Governance & Security Adapted from: The Center for Democracy & Technology
  5. 5. Current Cybersecurity SADC Efforts
  6. 6. Current Cybersecurity SADC Efforts
  7. 7. Current Needs of SADC States
  8. 8. Needs Cont……
  9. 9. Stakeholder Analysis
  10. 10. Stakeholder analysis Cont….
  11. 11. Stakeholder Analysis cont…
  12. 12. Stakeholder Analysis Cont…
  13. 13. Why MPs • An effective MP for CIRS would provide the abilities to detect threats and dangerous or anomalous behaviours, to create more secure network environments through better, standardized security programs and protocols and to respond with warnings or technical fixes as needed.
  14. 14. MPs Characteristics A multi-stakeholder process must have the following characteristics: •Involvement of stakeholders in the learning process •Stakeholders work towards a common goal •Work involves different sectors and scale •The objective is focused to bring about change •Deal with structural changes •Agreements are created based on cooperation •Stakeholders deal with power and conflict consciously •Bottom-up and top-down strategies are integrated in governance and policy making
  15. 15. MPs in-depth An effective partnership has: • A representative group of members, large enough to be sufficiently inclusive, but small enough to retain the ability to act quickly. • A circumscribed role for government with specific tasks and responsibilities laid out clearly. • Industry and private groups should take the lead. • Properly motivated members with significant interest and stakes connected to the problem.
  16. 16. • Growing influence of the business sector in the political discourse and agenda setting. • Critics fear that partnership initiatives allow transnational corporations and their interest groups growing influence over agenda setting and political decision-making by governments. • Risks to reputation: choosing the wrong partner • Distorting competition and the pretence of representativeness. • The selection of partners is also problematic in many • Proliferation of partnership initiatives and fragmentation of global governance. • Unstable financing – a threat to the sufficient provision of public goods. • Dubious complementarity – governments escape responsibility. • Selectivity in partnerships – governance gaps remain. • Trends toward elite models of global governance - weakening of representative democracy Challenges of MPs
  17. 17. Conclusion • MPs which address security and resilience have evolved in many countries as an efficient means of protecting their CIRs. • Each sector, public and private, brings its own, complementary strengths to the table, but such structures come with challenges in their formation, management, and effectiveness. ________ Recommendation: • Utilize a trust model; the scope of the working group needs to be a manageable size to be effective and include those directly affected, and yet large enough to include a broader universe of those impacted. • Incorporate a consensus model without hierarchy to allow the group to adapt and respond to fast changing conditions. • Gain the participation and support of key governing and regulatory bodies. • Formalize communications with stakeholder groups vs. relying on social networks
  18. 18. Thank You Cade Zvavanjanja Director - Zimbabwe Cybersecurity Center cadezvavanjanja@gmail.com +263 773796365

    Be the first to comment

    Login to see the comments

A presentation based on a thematic paper for Southern Africa Internet Governance forum, the full paper is on http://www.slideshare.net/drrevcade.

Views

Total views

450

On Slideshare

0

From embeds

0

Number of embeds

25

Actions

Downloads

14

Shares

0

Comments

0

Likes

0

×