SlideShare a Scribd company logo
Cybersecurity Capacity Building:
Lessons Learned
Prof Michael Goldsmith – Co-Director and Senior Research Fellow
Professor William H. Dutton – Oxford Martin Fellow
Oxford Martin School, 18 February 2020
At the Heart of Oxford • A research programme at the Oxford Martin
School
• Part of the Cyber Security research network
at the University of Oxford
• Partnership and collaboration with the
Department of Computer Science,
Department of Sociology, Oxford Internet
Institute, Said Business School and others
Funding Partners
The 5 DIMENSIONS
of Cybersecurity
Capacity
D 5
Standards
Organisations,
and
Technologies
D 3
Cybersecurity
Education,
Training and
Skills
D 1
Cybersecurity
Policy
and Strategy
D 2
Cyber
Culture
and Society
D 4
Legal and
Regulatory
Frameworks
Example: Dimension, Factors, and Aspects
Aspect 2
Indicator Q
Indicator P
Indicator O
Indicator N
Indicator M
Indicator L
Indicator K
Indicator J
Indicator I
Indicator H
Indicator G
Indicator F
Indicator E
Indicator D
Indicator C
Indicator B
Indicator A
Start-up
Formative
Established
Strategic
Dynamic
5 STAGES of Maturity
Stakeholder
clusters
Academia, Civil
Society groups &
Internet
Governance Criminal Justice &
Law Enforcement
Defence &
Intelligence
Community
Government
Ministries
Legislators/Policy
OwnersCSIRT and IT
leaders
(Government &
Private)
Critical National
Infrastructure
Private Sector &
Businesses
Cyber Task Force
International
Partners
Stakeholder Clusters
Brazil
Colombia
Ecuador
Jamaica
+ 2 Regional
Studies by the
OAS
Botswana
Burkina Faso
Cabo Verde
Cameroon
Cote d’Ivoire
The Gambia
Ghana
Lesotho
Liberia
Madagascar
Bangladesh
Bhutan
Kyrgyzstan
Indonesia
Myanmar
Thailand
Sri Lanka
Status: January 2020
Fiji
Kiribati
Micronesia
Samoa
Papua New Guinea
Tonga
Vanuatu
Albania
Armenia
Bosnia & Herzegovina
Cyprus
Georgia
Iceland
Kosovo
Lithuania
Macedonia
Montenegro
Serbia
Switzerland
UK
Over 80 National Cybersecurity Capacity Reviews
Mauritius
Namibia
Niger
Nigeria
Senegal
Sierra Leone
Tunisia
Uganda
Zambia
Melbourne, Australia
Cape Town, South Africa
Cybersecurity Capacity Centre for Southern Africa
Consortium of University of Cape Town,
Research ICT Africa, the Norwegian Institute of
International Affairs (NUPI) and the GCSCC
Constellation of Regional
Cybersecurity Capacity
Research Centres
Lessons Learnt
• Policy and Strategy: Misperception of the role of the CSIRT.
• Culture and Society: Lack of awareness and of understanding of the
relationship between trust/confidence and security.
• Education and Training: Disconnect between educational offerings and
industry needs.
• Bada et al. (2018): study of 6 countries with lack of national programme for
raising awareness, and low ICT literacy levels. The authors link low awareness
to increasing cybercrime indicators.
• Legal Frameworks: Question whether new cybercrime/cybersecurity
legislation is needed or adapting existing law is sufficient.
• Standards: Standards adoption (particularly ISO standards) mostly ad-hoc.
• Overall: Lack of cooperation and information-sharing; resources; data
collection challenges.
• Countries found the reviews informative and helpful in identifying
previously under-considered capacity gaps.
• Diverse stakeholder groups enables comprehensive picture in report
development.
• Review itself as capacity-building exercise and allowed discussions
among different stakeholders.
• Various lessons learned across all five dimensions of cybersecurity
capacity.
The Impact of a CMM Assessment
• There are cybersecurity challenges not reflected on the current CMM.
• Workshop to discuss suggested changes and gather your feedback
(this Thursday at Fitzroy Ballroom, Sofitel Melbourne on Collins).
• The revised CMM will consider backwards comparability.
• Research outputs.
Revision of the CMM to Keep its Robustness
Research on Cybersecurity Capacity:
1. What is the status of capacity building?
2. What factors shape the development of capacity?
3. What are the implications of capacity building?
The Shaping and Impacts of
Cyber Security Capacity
Prof S. Creese‡, Dr P. Esteve-González*, Dr R. Shillair†,
and Prof W.H. Dutton*
‡ Founding Director, GCSCC, University of Oxford
* Oxford Martin Fellows, GCSCC, University of Oxford
† Assistant Professor, Quello Centre, Michigan State University &
GCSCC Research Associate
Research Model in Dutton et al. (2020)*
*Dutton, W.H., Creese, S., Shillair, R., and Bada, M. (2020). Cybersecurity Capacity: Does It
Matter? Journal of Information Policy, 9, 280-306.
Diffusion
(centrality)
Indicators of
Cyber Security
Capacity
Wealth
End User
Cyber Security
Problems
Size (scale)
Scale
Data
This study based on data from field research at the aspect level for 62
countries where the CMM was implemented (2015-2019).
• 31 countries from CMM assessments – collection of data by field
research (GCSCC and strategic & implementation partners).
• 31 countries in IDB and OAS (2016)* – collection of data by an online
survey.
*Inter-American Development Bank and Organization of American States (2016).
Cybersecurity. Are we ready in Latin America and the Caribbean? Cybersecurity Report
2016. Available at https://publications.iadb.org/en/cybersecurity-are-we-ready-latin-
america-and-caribbean (25 June 2019, last accessed).
Region Obs. Income (WB) Obs.
Africa 10 Low and lower-medium 22
America 31 Low: 6
Asia 6 Lower-medium: 16
Eastern Europe 5 Upper-medium 30
Europe 4 High 10
South Caucasus 2
Oceania 4
Total 62 Total 62
Countries in the Sample
62 countries where the CMM was applied (2015-2019)
The Cyber Security Capacity (CSC) Indicator
Our strategy is to summarize the CMM data on the maturity stage of
47 aspects through an overall average maturity stage that we name
Cybersecurity Capacity (CSC).
• Factors’ average maturity stages were calculated from their
corresponding aspects.
• Dimensions’ average maturity stage were calculated from their
corresponding factors.
• CSC was calculated as the average maturity stage of all dimensions.
Alternative indicators Correlation with CSC (N)
Global Cybersecurity Index (ITU) 0.61 (61)
Networked Readiness Index (WEF) 0.76 (50)
Secure Servers (Netcraft) 0.79 (61)
Software Spending (Global Innovation Index) 0.53 (39)
Cyber Security Capacity (CSC) related to
other Cybersecurity Indicators
Pearson’s correlation coefficients, number of observations in
parentheses. All correlations have statistical significance <.001.
What is the status of
cybersecurity capacity building?
Average Maturity Stage per Factor (N=62)
What factors are shaping capacity
building within nations?
Results of Multivariate Regressions to
Explain Cyber Security Capacity (CSC)
Robust standard errors in parentheses. Symbols +, *, **, *** indicate, correspondingly, levels of
significance at 0.1, 0.05, 0.01, 0.001.
CSC
Number of Users (log) 0.12***
(0.03)
Percentage of Users 0.01**
(0.00)
GDP per capita (log) 0.14*
(0.05)
Constant -1.55**
(0.51)
N 62
R-Squared 0.67
What are the implications of
capacity building for nations?
*p<.05; **p<.01; ***p<.001
Impact of CSC on End User Cyber Security Problems
(Piracy and Encounter Rates)
Figure 1: Cyber Security Capacity and Impact on Threats
*p<.05; **p<.01; ***p<.001
Impact of CSC on Use
(Individual, Government, and Business Usage)
*p<.05; **p<.01; ***p<.001
Impact of CSC on Voice
(Voice and Accountability)
• Mitigates end-user problems.
• Fosters ICT adoption and usage.
• Enhances citizens’ perception of freedom.
Capacity Matters: the Impact of CSC
Conclusions
• Sample of nations indicates most nations in the early
phases of capacity building.
• Capacity shaped by the scale and centrality of the
Internet and wealth of nations – a capacity divide
• National choices on building capacity have implications
for end-user problems, citizens’ perception of freedom,
as well as the vitality of ICT adoption and usage.
• Cybersecurity capacity needs to be prioritized in the
political agenda to address needs to raise maturity and
avoid inequalities across nations and regions.
Cybersecurity Divide and Global Gap
THANK YOU!
[EMAIL ADDRESS]
@CapacityCentre
Questions?
https://www.linkedin.com/company/
global-cyber-security-capacity-centre/
www.oxfordmartin.ox.ac.uk/cybersecurity
Department of Computer Science
University of Oxford
15 Parks Road, Oxford, OX1 3QD, UK
Phone: +44(0)1865 287903
cybercapacity@cs.ox.ac.uk

More Related Content

What's hot

BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Boston Global Forum
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
Commonwealth Telecommunications Organisation
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
Michael Smith
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
Kroll
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Phil Agcaoili
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulations
Brunswick Group
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
Skoda Minotti
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
Matthew Rosenquist
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014
Symantec
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
SensePost
 
Capstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid SecurityCapstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid Securityreuben_mathew
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity Requirements
Kyle Brown
 
Facebook
FacebookFacebook
Facebook
BabelNews
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Group
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
McKonly & Asbury, LLP
 
NIST Cybersecurity Framework Cross Reference
NIST Cybersecurity Framework Cross ReferenceNIST Cybersecurity Framework Cross Reference
NIST Cybersecurity Framework Cross Reference
Jim Meyer
 
BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
Duane Blackburn
 

What's hot (20)

BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulations
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Capstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid SecurityCapstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid Security
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity Requirements
 
Facebook
FacebookFacebook
Facebook
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attack
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
NIST Cybersecurity Framework Cross Reference
NIST Cybersecurity Framework Cross ReferenceNIST Cybersecurity Framework Cross Reference
NIST Cybersecurity Framework Cross Reference
 
BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
 
Marc Crudgington Who I Am
Marc Crudgington Who I AmMarc Crudgington Who I Am
Marc Crudgington Who I Am
 

Similar to Cybersecurity Day for Parliament

Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Carolin Weisser
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Ivanti
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
CapitolTechU
 
National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...
Mohamed Ben Naseir
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
robbiesamuel
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
IJNSA Journal
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
GoogleNewsSubmit
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
Brian Matteson, CISSP CISA
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
OEB Cyber Security Framework
OEB Cyber Security FrameworkOEB Cyber Security Framework
OEB Cyber Security Framework
Norbi Hegedus
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
Lumension
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
Lumension
 
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxForm Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
alisondakintxt
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
Humphrey Humphrey
 
A holistic approach to risk management 20210210 w acfe france &amp; cyber rea...
A holistic approach to risk management 20210210 w acfe france &amp; cyber rea...A holistic approach to risk management 20210210 w acfe france &amp; cyber rea...
A holistic approach to risk management 20210210 w acfe france &amp; cyber rea...
Judith Beckhard Cardoso
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
BDPA Education and Technology Foundation
 

Similar to Cybersecurity Day for Parliament (20)

Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
ISACA 2016 Application Security RGJ
ISACA 2016 Application Security RGJISACA 2016 Application Security RGJ
ISACA 2016 Application Security RGJ
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
OEB Cyber Security Framework
OEB Cyber Security FrameworkOEB Cyber Security Framework
OEB Cyber Security Framework
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxForm Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
A holistic approach to risk management 20210210 w acfe france &amp; cyber rea...
A holistic approach to risk management 20210210 w acfe france &amp; cyber rea...A holistic approach to risk management 20210210 w acfe france &amp; cyber rea...
A holistic approach to risk management 20210210 w acfe france &amp; cyber rea...
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 

More from Oxford Martin Centre, OII, and Computer Science at the University of Oxford

5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx5th Estate Power Shift 2022.pptx
Cybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the WorkplaceCybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the Workplace
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Changing Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptxChanging Workplaces and Cybersecurity.pptx
25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx25SEP2022 WFH Slides.pptx
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Dutton power corrupts-2021
Dutton power corrupts-2021Dutton power corrupts-2021
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Future of public broadcasting and a university
Future of public broadcasting and a universityFuture of public broadcasting and a university
Social media realitie lisbon-2018
Social media realitie lisbon-2018Social media realitie lisbon-2018
Search&amp;politics lisbon-2018
Search&amp;politics lisbon-2018Search&amp;politics lisbon-2018
Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017Broadband to Neighborhood 18 dec 2017
Internet, Search and Threats to News Ecosystem
Internet, Search and Threats to News EcosystemInternet, Search and Threats to News Ecosystem
Search&amp;politics bruegel-25 oct2017
Search&amp;politics bruegel-25 oct2017Search&amp;politics bruegel-25 oct2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Political Transformations in Network Societies - the fifth estate
Political Transformations in Network Societies - the fifth estatePolitical Transformations in Network Societies - the fifth estate
Political Transformations in Network Societies - the fifth estate
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Tprc cultures-2016
Tprc cultures-2016Tprc cultures-2016

More from Oxford Martin Centre, OII, and Computer Science at the University of Oxford (20)

5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx
 
Cybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the WorkplaceCybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the Workplace
 
Changing Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptxChanging Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptx
 
25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University
 
Dutton power corrupts-2021
Dutton power corrupts-2021Dutton power corrupts-2021
Dutton power corrupts-2021
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth Estate
 
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
Digital Divides tprc-2019
 
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
 
Future of public broadcasting and a university
Future of public broadcasting and a universityFuture of public broadcasting and a university
Future of public broadcasting and a university
 
Social media realitie lisbon-2018
Social media realitie lisbon-2018Social media realitie lisbon-2018
Social media realitie lisbon-2018
 
Search&amp;politics lisbon-2018
Search&amp;politics lisbon-2018Search&amp;politics lisbon-2018
Search&amp;politics lisbon-2018
 
Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017
 
Internet, Search and Threats to News Ecosystem
Internet, Search and Threats to News EcosystemInternet, Search and Threats to News Ecosystem
Internet, Search and Threats to News Ecosystem
 
Search&amp;politics bruegel-25 oct2017
Search&amp;politics bruegel-25 oct2017Search&amp;politics bruegel-25 oct2017
Search&amp;politics bruegel-25 oct2017
 
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
 
Political Transformations in Network Societies - the fifth estate
Political Transformations in Network Societies - the fifth estatePolitical Transformations in Network Societies - the fifth estate
Political Transformations in Network Societies - the fifth estate
 
Tprc cultures-2016
Tprc cultures-2016Tprc cultures-2016
Tprc cultures-2016
 

Recently uploaded

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 

Recently uploaded (16)

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 

Cybersecurity Day for Parliament

  • 1. Cybersecurity Capacity Building: Lessons Learned Prof Michael Goldsmith – Co-Director and Senior Research Fellow Professor William H. Dutton – Oxford Martin Fellow Oxford Martin School, 18 February 2020
  • 2. At the Heart of Oxford • A research programme at the Oxford Martin School • Part of the Cyber Security research network at the University of Oxford • Partnership and collaboration with the Department of Computer Science, Department of Sociology, Oxford Internet Institute, Said Business School and others
  • 4. The 5 DIMENSIONS of Cybersecurity Capacity D 5 Standards Organisations, and Technologies D 3 Cybersecurity Education, Training and Skills D 1 Cybersecurity Policy and Strategy D 2 Cyber Culture and Society D 4 Legal and Regulatory Frameworks
  • 6. Aspect 2 Indicator Q Indicator P Indicator O Indicator N Indicator M Indicator L Indicator K Indicator J Indicator I Indicator H Indicator G Indicator F Indicator E Indicator D Indicator C Indicator B Indicator A Start-up Formative Established Strategic Dynamic 5 STAGES of Maturity
  • 7. Stakeholder clusters Academia, Civil Society groups & Internet Governance Criminal Justice & Law Enforcement Defence & Intelligence Community Government Ministries Legislators/Policy OwnersCSIRT and IT leaders (Government & Private) Critical National Infrastructure Private Sector & Businesses Cyber Task Force International Partners Stakeholder Clusters
  • 8. Brazil Colombia Ecuador Jamaica + 2 Regional Studies by the OAS Botswana Burkina Faso Cabo Verde Cameroon Cote d’Ivoire The Gambia Ghana Lesotho Liberia Madagascar Bangladesh Bhutan Kyrgyzstan Indonesia Myanmar Thailand Sri Lanka Status: January 2020 Fiji Kiribati Micronesia Samoa Papua New Guinea Tonga Vanuatu Albania Armenia Bosnia & Herzegovina Cyprus Georgia Iceland Kosovo Lithuania Macedonia Montenegro Serbia Switzerland UK Over 80 National Cybersecurity Capacity Reviews Mauritius Namibia Niger Nigeria Senegal Sierra Leone Tunisia Uganda Zambia
  • 9. Melbourne, Australia Cape Town, South Africa Cybersecurity Capacity Centre for Southern Africa Consortium of University of Cape Town, Research ICT Africa, the Norwegian Institute of International Affairs (NUPI) and the GCSCC Constellation of Regional Cybersecurity Capacity Research Centres
  • 10. Lessons Learnt • Policy and Strategy: Misperception of the role of the CSIRT. • Culture and Society: Lack of awareness and of understanding of the relationship between trust/confidence and security. • Education and Training: Disconnect between educational offerings and industry needs. • Bada et al. (2018): study of 6 countries with lack of national programme for raising awareness, and low ICT literacy levels. The authors link low awareness to increasing cybercrime indicators. • Legal Frameworks: Question whether new cybercrime/cybersecurity legislation is needed or adapting existing law is sufficient. • Standards: Standards adoption (particularly ISO standards) mostly ad-hoc. • Overall: Lack of cooperation and information-sharing; resources; data collection challenges.
  • 11. • Countries found the reviews informative and helpful in identifying previously under-considered capacity gaps. • Diverse stakeholder groups enables comprehensive picture in report development. • Review itself as capacity-building exercise and allowed discussions among different stakeholders. • Various lessons learned across all five dimensions of cybersecurity capacity. The Impact of a CMM Assessment
  • 12. • There are cybersecurity challenges not reflected on the current CMM. • Workshop to discuss suggested changes and gather your feedback (this Thursday at Fitzroy Ballroom, Sofitel Melbourne on Collins). • The revised CMM will consider backwards comparability. • Research outputs. Revision of the CMM to Keep its Robustness
  • 13.
  • 14. Research on Cybersecurity Capacity: 1. What is the status of capacity building? 2. What factors shape the development of capacity? 3. What are the implications of capacity building?
  • 15. The Shaping and Impacts of Cyber Security Capacity Prof S. Creese‡, Dr P. Esteve-González*, Dr R. Shillair†, and Prof W.H. Dutton* ‡ Founding Director, GCSCC, University of Oxford * Oxford Martin Fellows, GCSCC, University of Oxford † Assistant Professor, Quello Centre, Michigan State University & GCSCC Research Associate
  • 16. Research Model in Dutton et al. (2020)* *Dutton, W.H., Creese, S., Shillair, R., and Bada, M. (2020). Cybersecurity Capacity: Does It Matter? Journal of Information Policy, 9, 280-306. Diffusion (centrality) Indicators of Cyber Security Capacity Wealth End User Cyber Security Problems Size (scale) Scale
  • 17. Data This study based on data from field research at the aspect level for 62 countries where the CMM was implemented (2015-2019). • 31 countries from CMM assessments – collection of data by field research (GCSCC and strategic & implementation partners). • 31 countries in IDB and OAS (2016)* – collection of data by an online survey. *Inter-American Development Bank and Organization of American States (2016). Cybersecurity. Are we ready in Latin America and the Caribbean? Cybersecurity Report 2016. Available at https://publications.iadb.org/en/cybersecurity-are-we-ready-latin- america-and-caribbean (25 June 2019, last accessed).
  • 18. Region Obs. Income (WB) Obs. Africa 10 Low and lower-medium 22 America 31 Low: 6 Asia 6 Lower-medium: 16 Eastern Europe 5 Upper-medium 30 Europe 4 High 10 South Caucasus 2 Oceania 4 Total 62 Total 62 Countries in the Sample 62 countries where the CMM was applied (2015-2019)
  • 19. The Cyber Security Capacity (CSC) Indicator Our strategy is to summarize the CMM data on the maturity stage of 47 aspects through an overall average maturity stage that we name Cybersecurity Capacity (CSC). • Factors’ average maturity stages were calculated from their corresponding aspects. • Dimensions’ average maturity stage were calculated from their corresponding factors. • CSC was calculated as the average maturity stage of all dimensions.
  • 20. Alternative indicators Correlation with CSC (N) Global Cybersecurity Index (ITU) 0.61 (61) Networked Readiness Index (WEF) 0.76 (50) Secure Servers (Netcraft) 0.79 (61) Software Spending (Global Innovation Index) 0.53 (39) Cyber Security Capacity (CSC) related to other Cybersecurity Indicators Pearson’s correlation coefficients, number of observations in parentheses. All correlations have statistical significance <.001.
  • 21. What is the status of cybersecurity capacity building?
  • 22. Average Maturity Stage per Factor (N=62)
  • 23. What factors are shaping capacity building within nations?
  • 24. Results of Multivariate Regressions to Explain Cyber Security Capacity (CSC) Robust standard errors in parentheses. Symbols +, *, **, *** indicate, correspondingly, levels of significance at 0.1, 0.05, 0.01, 0.001. CSC Number of Users (log) 0.12*** (0.03) Percentage of Users 0.01** (0.00) GDP per capita (log) 0.14* (0.05) Constant -1.55** (0.51) N 62 R-Squared 0.67
  • 25.
  • 26. What are the implications of capacity building for nations?
  • 27. *p<.05; **p<.01; ***p<.001 Impact of CSC on End User Cyber Security Problems (Piracy and Encounter Rates) Figure 1: Cyber Security Capacity and Impact on Threats
  • 28. *p<.05; **p<.01; ***p<.001 Impact of CSC on Use (Individual, Government, and Business Usage)
  • 29. *p<.05; **p<.01; ***p<.001 Impact of CSC on Voice (Voice and Accountability)
  • 30. • Mitigates end-user problems. • Fosters ICT adoption and usage. • Enhances citizens’ perception of freedom. Capacity Matters: the Impact of CSC
  • 32. • Sample of nations indicates most nations in the early phases of capacity building. • Capacity shaped by the scale and centrality of the Internet and wealth of nations – a capacity divide • National choices on building capacity have implications for end-user problems, citizens’ perception of freedom, as well as the vitality of ICT adoption and usage. • Cybersecurity capacity needs to be prioritized in the political agenda to address needs to raise maturity and avoid inequalities across nations and regions. Cybersecurity Divide and Global Gap
  • 33. THANK YOU! [EMAIL ADDRESS] @CapacityCentre Questions? https://www.linkedin.com/company/ global-cyber-security-capacity-centre/ www.oxfordmartin.ox.ac.uk/cybersecurity Department of Computer Science University of Oxford 15 Parks Road, Oxford, OX1 3QD, UK Phone: +44(0)1865 287903 cybercapacity@cs.ox.ac.uk

Editor's Notes

  1. Intro
  2. Dimension: The 5 dimensions represent the clusters of cybersecurity capacity through which the Capacity Centre analyses the nuances of capacity. They represent the different research ‘lenses’ through which cybersecurity capacity is studied. Accordingly, the most fundamental structure of the CMM is divided into dimensions, which consist of a number of factors. These five dimensions cover the broad expanse of areas that should be considered when seeking to enhance cybersecurity capacity. We recognise that these dimensions may overlap with one another on certain issues, and indeed the Capacity Centre hopes to understand the interdependences between cybersecurity capacities as it conducts more national capacity reviews. Within each dimension, there are several factors, aspects, stages of maturity, and indicators of cybersecurity capacity, each of which is defined as follows:
  3. CMM
  4. The GCSCC will work closely with the Local Host, who is made up of staff from the government organisation with which the agreement was drawn up, in organising the CMM review process. The Local Host is responsible to identify the relevant stakeholders and schedule consultations in coordination with the GCSCC. The following participants constitute several clusters of stakeholders, which should be invited to the consultations:
  5. We will make sure that the new version of the CMM is backward compatible with the previous version of the CMM.
  6. Come and see Cybil in the Basecamp Ask Cybil a question and win a bottle of Ginger Beer from Oxford Meet the Portal Advisory Group and give feedback to one of its members
  7. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  8. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  9. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  10. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  11. Before running the full model the multi-variable constructs were tested for validity and reliability. We used confirmatory factor analysis to test both the indicators of cybersecurity capacity and end user cyber security problems. The data satisfactorily passed the tests, indicating both the capacity indicators and the end user problems were reliable. Full details are in the paper since I don’t have time to go over those in depth here. The overall model was tested using structural equation methods (using SmartPLS- a partial least squares method of analysis). This helped us better see the impacts of the variables on each other. Again, further details of model strength and validity indicators are in the paper. In looking at scale- the total population and number of Internet users were closely tied together. No surprises there. And in looking at diffusion’s impact to investment in capacity- there is a strong positive relationship- with a beta of .437 The GDP per capita was also a and this generally carried through to a higher investment in the elements of cyber security capacity. The “ of Cyber Security Capacity” are the items that specifically address capacity that are a part of the investment by the nations that have a higher GDP per capita. So you can see that of the -.457 (beta) .370 (beta) can be accounted for by the cyber security capacity elements.
  12. Before running the full model the multi-variable constructs were tested for validity and reliability. We used confirmatory factor analysis to test both the indicators of cybersecurity capacity and end user cyber security problems. The data satisfactorily passed the tests, indicating both the capacity indicators and the end user problems were reliable. Full details are in the paper since I don’t have time to go over those in depth here. The overall model was tested using structural equation methods (using SmartPLS- a partial least squares method of analysis). This helped us better see the impacts of the variables on each other. Again, further details of model strength and validity indicators are in the paper. In looking at scale- the total population and number of Internet users were closely tied together. No surprises there. And in looking at diffusion’s impact to investment in capacity- there is a strong positive relationship- with a beta of .437 The GDP per capita was also a and this generally carried through to a higher investment in the elements of cyber security capacity. The “ of Cyber Security Capacity” are the items that specifically address capacity that are a part of the investment by the nations that have a higher GDP per capita. So you can see that of the -.457 (beta) .370 (beta) can be accounted for by the cyber security capacity elements.
  13. Before running the full model the multi-variable constructs were tested for validity and reliability. We used confirmatory factor analysis to test both the indicators of cybersecurity capacity and end user cyber security problems. The data satisfactorily passed the tests, indicating both the capacity indicators and the end user problems were reliable. Full details are in the paper since I don’t have time to go over those in depth here. The overall model was tested using structural equation methods (using SmartPLS- a partial least squares method of analysis). This helped us better see the impacts of the variables on each other. Again, further details of model strength and validity indicators are in the paper. In looking at scale- the total population and number of Internet users were closely tied together. No surprises there. And in looking at diffusion’s impact to investment in capacity- there is a strong positive relationship- with a beta of .437 The GDP per capita was also a and this generally carried through to a higher investment in the elements of cyber security capacity. The “ of Cyber Security Capacity” are the items that specifically address capacity that are a part of the investment by the nations that have a higher GDP per capita. So you can see that of the -.457 (beta) .370 (beta) can be accounted for by the cyber security capacity elements.
  14. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  15. Last page option 1