SlideShare a Scribd company logo
1 of 38
The Shaping and Impacts of
Cyber Security Capacity
October 2017
Prof William Dutton and Dr Patricia Esteve-Gonzalez –
Oxford Martin Fellows, GCSCC, University of Oxford
Dr Ruth Shillair – Assistant Professor, Quello Centre,
Michigan State University & GCSCC Research Associate
Department of Computer Science, University of Oxford
15 Parks Road, Oxford, OX1 3QD, UK
cybercapacity@cs.ox.ac.uk
www.oxfordmartin.ox.ac.uk/cybersecurity
Revision of presentation at
Addis Ababa, October, 2019
Introduction
Cybersecurity and Capacity Building
Cybersecurity capacity is the ability to employ the
collection of tools, policies, security concepts, security
safeguards, guidelines, risk management approaches,
actions, training, best practices, assurance and
technologies that can be used to protect the cyber
environment and organization and user’s assets.
Adapted from (ITU (Recommendation ITU–T X.1205), 2008)
Previous Funders
Oxford’s GCSCC:
Funding Partners
GCSCC Regional Partner
Strategic & Implementation Partners
Ministry of Foreign Affairs Netherlands
Ministry of Foreign Affairs Norway
UK Cabinet Office
Global Forum on Cyber Expertise
Early Publications on Shaping of Capacity and
its Implications for Nations
Reviews of each of the nations reviewed by the GCSCC discuss the factors
shaping capacity and its implications. Initial cross-national comparative analyses
are published in:
Creese, S., Shillair, R., Bada, M., Reisdorf, B.C., Roberts, T., and Dutton, W. H.
(2019), ‘The Cybersecurity Capacity of Nations’, pp. 165-179 in Graham, M., and
Dutton, W. H. (eds), Society and the Internet: How Networks of Information and
Communication are Changing our Lives, 2nd Edition. Oxford: Oxford University
Press.
Dutton, W. H., Creese, S., Shillair, R., and Bada, M. (forthcoming), ‘Cyber Security
Capacity: Does it Matter?’, Journal of Information Policy, forthcoming.
Key Research Questions of Paper in Progress
1. What is the status of national
cybersecurity capacity building?
2. What factors are shaping capacity
building within nations?
3. What are the implications of capacity
building for nations?
Approach and
Methodology
Basic Approach to Research on Cybersecurity
Capacity Building
• Cybersecurity
Maturity Model
(CMM)
• 5 Dimensions
Maturity
Model
• Modified Focus
Groups
• Interviews &
Desk Research
Field Research
• Coding of Maturity
Across Dimensions
• Cross-national
Comparative Analysis
Maturity
Data from CMM assessments
The core output of the GCSCC is the Cybersecurity Capacity Maturity
Model for Nations (CMM) – a model suitable for self-assessment of
current capacity, spanning multiple dimensions, multi-stakeholder
consultation process, creating a comprehensive benchmark of current
position and how to increase maturity.
The 5 DIMENSIONS
of Cybersecurity
Capacity
D 5
Standards
Organisations,
and
Technologies
D 3
Cybersecurity
Education,
Training and
Skills
D 1
Cybersecurity
Policy
and Strategy
D 2
Cyber
Culture
and Society
D 4
Legal and
Regulatory
Frameworks
Example: dimension, factors, and aspects
Five Stages of Cybersecurity Capacity
Maturity:
Start-up
Formative
Established
Strategic
Dynamic
Five Stages of Cybersecurity Capacity
Maturity:
Start-up
Formative
Established
Strategic
Dynamic
1. Start-up: at this stage either no cybersecurity
maturity exists, or it is very embryonic in
nature. There might be initial discussions about
cybersecurity capacity building, but no
concrete actions have been taken. There is an
absence of observable evidence of
cybersecurity capacity at this stage.
Five Stages of Cybersecurity Capacity
Maturity:
Start-up
Formative
Established
Strategic
Dynamic
2. Formative: some aspects have begun to grow
and be formulated, but may be ad-hoc,
disorganised, poorly defined – or simply new
However, evidence of this aspect can be clearly
demonstrated.
Five Stages of Cybersecurity Capacity
Maturity:
Start-up
Formative
Established
Strategic
Dynamic 3. Established: indicators of the aspect are in
place, and functioning. However, there is not
well-thought-out consideration of the relative
allocation of resources. Little trade-off
decision-making has been made concerning
the relative investment in this aspect. But the
aspect is functional and defined.
Data from CMM assessments
Cluster by region Cluster by CMM year Cluster by income
Region Obs. Year Obs. Income (WB) Obs.
Africa 10 2015 8 Low and Lower-Medium 22
America 31 2016 35 Low: 6
Asia 6 OAS: 31 Lower-Medium: 16
Eastern Europe 5 Non-OAS: 4 Upper-Medium 30
Europe 4 2017 5 High 10
South Caucasus 2 2018 10
Oceania 4 2019 4
Total 62 Total 62 Total 62
• 62 nations where the CMM has been implemented (2015 - 2019).
Collection of data
This study considers granulated data at the aspect level from the field
sessions with stakeholders (GCSCC and strategic & implementation
partners) in 31 countries.
• In-country focus group discussions with key stakeholders.
• 10 sessions over 3 days.
• This data is different from the CMM reports.
In addition, this study considers data at the aspect level for 31 countries
from IDB and OAS (2016).
• Collection of data by survey.
Conversion of all country data to the CMM model, 2014.
Cyber Security Dimensions Factors
1. Policy and Strategy D1.1 National Cybersecurity Strategy
D1.2 Incident Response
D1.3 Critical Infrastructure Protection
D1.4 Crisis Management
D1.5 Cyber Defence
D1.6 Digital Redundancy
2. Culture and Society D2.1 Cybersecurity Mind-Set
D2.2 Cybersecurity Awareness
D2.3 Confidence and Trust on the Internet
D2.4 Privacy Online
3. Education, Training, and Skills D3.1 National Availability of Cyber Education and Training
D3.2 National Development of Cybersecurity Education
D3.3 Corporate Training and Educational Initiatives within
Companies
D3.4 Corporate Governance, Knowledge and Standards
4. Legal and Regulatory Frameworks D4.1 Legal Frameworks
D4.2 Legal Investigation (Criminal Justice System)
D4.3 Responsible Disclosure
5. Standards, Organisations, and
Technologies
D5.1 Adherence to Standards
D5.2 Internet Infrastructure Resilience
D5.3 Cybersecurity Marketplace
Calculation of variables from data at the
aspect level
Our strategy is to summarize the CMM data on 50 aspects through an
overall index on Cybersecurity Capacity (CSC).
• Factors’ average maturity stages were calculated from their
corresponding aspects.
• Dimensions’ average maturity stage were calculated from their
corresponding factors.
• CSC was calculated as the average maturity stage of all dimensions.
Cybersecurity Capacity (CSC) related to Five Dimensions of the CMM
(factors)
Dimension CSC D1 D2 D3 D4 D5
CSC Overall Cyber Security Capacity 1.00
D1 Cybersecurity Policy and Strategy .91 1.00
D2 Cyber Culture and Society .95 .82 1.00
D3 Cybersecurity Education, Training, and Skills .89 .75 .83 1.00
D4 Legal and Regulatory Frameworks .91 .76 .87 .77 1.00
D5 Standards, Organisations, and Technologies .91 .84 .81 .77 .76 1.00
Pearson’s correlation coefficients for 62 observations. All correlations have statistical
significance <.001.
Cybersecurity Capacity (CSC) related to Other Cybersecurity Indicators
Alternative indicators CSC (N)
Global Cybersecurity Index (ITU) .61 (61)
Networked Readiness Index (WEF) .76 (50)
Secure Servers, logarithm (Netcraft) .79 (61)
Software Spending (Global Innovation Index) .53 (39)
Pearson’s correlation coefficients, number of observations in parentheses.
All correlations have statistical significance <.001.
What is the status of
Cybersecurity Capacity Building?
Average maturity stage per factor (N=62)
What Factors are Shaping the
Cybersecurity Capacity of
Nations?
Factors Related to Cybersecurity Capacity (CSC)
(sources)
Pearson’s correlation coefficients for 62 observations. Symbols +, *, **, *** correspond,
respectively, to levels of significance at 0.1, 0.05, 0.01, 0.001.
Category Independent variable CSC
Demographic Total Population .34**
Economic GDP per capita .59***
Infrastructure
Percentage of Users (Centrality of Internet) .60***
Number of Users (Scale of Use) .50***
Political and Administrative
System
Administrative Capacity .60***
Correlations Among Independent Variables
Pearson’s correlation coefficients for 62 observations. Symbols +, *, **, *** correspond,
respectively, to levels of significance at 0.1, 0.05, 0.01, 0.001.
1 2 3 4 5
1 Total Population (ln) 1.00
2 GDP per capita (ln) -.29* 1.00
3 Number of Users (ln, scale) .97*** -.07 1.00
4 Percentage of Users (centrality) -.30* .88*** -.06 1.00
5 Administrative Capacity -.21+ .63*** -.07 .65*** 1.00
What are the Implications of
Cybersecurity Capacity for
Nations?
Outcomes related to Cybersecurity Capacity (CSC)
Outcome Variables CSC (N)
Piracy -.82*** (34)
Encounter Rates -.35* (35)
NRI: Individual Usage
.76*** (50)
NRI: Business Usage
.61*** (50)
NRI: Government Usage
.65*** (50)
Voice & Accountability
.33** (62)
Pearson’s correlation coefficients, number of observations in parentheses.
Symbols +, *, **, *** indicate, correspondingly, levels of significance at 0.1,
0.05, 0.01, 0.001.
Path Analysis*
*Using SmartPLS: Ringle, C. M., Wende, S., and Becker, J.-M. 2015. "SmartPLS 3."
Boenningstedt: SmartPLS GmbH, http://www.smartpls.com
Centrality of
Internet Use
Cybersecurity
Capacity
Wealth
End User
Cyber Security
Problems
Scale of
Internet Use
Population
*p<.05; **p<.01; ***p<.001
Impact of CSC on Negative Outcomes
(Piracy and Encounter Rates)
End User
Cyber Security
Problems
R2=.821***
Percentage
of Population
Using
Internet
R2= .777**
Cybersecurity
Capacity
R2= .759***
GDP Per
Capita
b= .395***
b= -1.061***
b= .881****
Number of
Internet
Users
R2=.984***
b= -.030***
b=.295***
b=.226***
Total
Population b=1.031***
b=.576***
Administrative
Capacity
R2= .389***
b= .623****
b=.563***
b=.392***
b= .392***
Impact of CSC on Positive Outcomes
(Voice and Accountability, and NRI indicators of usage)
Percentage
of Population
Using
Internet
R2= .779**
Cybersecurity
Capacity
R2= .760***
GDP Per
Capita
Indicators of
Usage
R2=.952***
b= .420*
b= .397***
b= .868****
Number of
Internet
Users
R2=.984***
b= .424***
b=.300***
b=.226***
Total
Population b=1.031***
b=-.207***
*p<.05; **p<.01; ***p<.001
Administrative
Capacity
R2= .392***b= .607****
b=.562***
b=.385***
Conclusions
Conclusions
• Nations in the early phases of capacity building.
• Capacity (CSC) shaped by the scale and centrality of
the Internet along with the wealth and size of
nations and their respective capacity for
administrative change – a Capacity Divide?
• National choices on building CSC have implications
for cybersecurity as well as the vitality of Internet
use by individuals, business and government.
• New Questions: Relevance of cross-national
variations in patterns of capacity building.
Next Steps in Progressing the Research
Continue to Refine Indicators
• Cybersecurity Capacity
• Outcomes, e.g., beyond Encounter Rates
Structured Field Coding
• Systematic Coding of Field Research
• Operational Definitions of Maturity
THANK YOU!
[EMAIL ADDRESS]
@CapacityCentre
Thank You
https://www.linkedin.com/company/
global-cyber-security-capacity-centre/
www.oxfordmartin.ox.ac.uk/cybersecurity
Department of Computer Science
University of Oxford
15 Parks Road, Oxford, OX1 3QD, UK
Phone: +44(0)1865 287903
cybercapacity@cs.ox.ac.uk

More Related Content

Similar to GFCE 2019 Presentation (Updated Nov 2019)

Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Carolin Weisser
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...IJNSA Journal
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19consultancyss
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 
Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620MatthewTennant613
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
 
cybersecurity_framework_webinar_2017.pptx
cybersecurity_framework_webinar_2017.pptxcybersecurity_framework_webinar_2017.pptx
cybersecurity_framework_webinar_2017.pptxMuhammadAbdullah311866
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
Emergency Services Sector Cybersecurity Initiative UASI briefing
Emergency Services Sector Cybersecurity Initiative  UASI briefingEmergency Services Sector Cybersecurity Initiative  UASI briefing
Emergency Services Sector Cybersecurity Initiative UASI briefingDavid Sweigert
 
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJam
Tech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJamTech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJam
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJamUS-Ignite
 
Bhef almaden 20131122 v1
Bhef almaden 20131122 v1Bhef almaden 20131122 v1
Bhef almaden 20131122 v1ISSIP
 
Cybersecurity Capacity Building: Cross-National Benefits and International Di...
Cybersecurity Capacity Building: Cross-National Benefits and International Di...Cybersecurity Capacity Building: Cross-National Benefits and International Di...
Cybersecurity Capacity Building: Cross-National Benefits and International Di...PatriciaEsteveGonzal
 
Supporting your CMMC initiatives with Sumo Logic
Supporting your CMMC initiatives with Sumo LogicSupporting your CMMC initiatives with Sumo Logic
Supporting your CMMC initiatives with Sumo LogicCloudHesive
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestrationChadni Islam
 
IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesOmar Toor
 

Similar to GFCE 2019 Presentation (Updated Nov 2019) (20)

Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 
cybersecurity_framework_webinar_2017.pptx
cybersecurity_framework_webinar_2017.pptxcybersecurity_framework_webinar_2017.pptx
cybersecurity_framework_webinar_2017.pptx
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Emergency Services Sector Cybersecurity Initiative UASI briefing
Emergency Services Sector Cybersecurity Initiative  UASI briefingEmergency Services Sector Cybersecurity Initiative  UASI briefing
Emergency Services Sector Cybersecurity Initiative UASI briefing
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJam
Tech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJamTech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJam
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJam
 
Bhef almaden 20131122 v1
Bhef almaden 20131122 v1Bhef almaden 20131122 v1
Bhef almaden 20131122 v1
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
ICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptxICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptx
 
Cybersecurity Capacity Building: Cross-National Benefits and International Di...
Cybersecurity Capacity Building: Cross-National Benefits and International Di...Cybersecurity Capacity Building: Cross-National Benefits and International Di...
Cybersecurity Capacity Building: Cross-National Benefits and International Di...
 
Supporting your CMMC initiatives with Sumo Logic
Supporting your CMMC initiatives with Sumo LogicSupporting your CMMC initiatives with Sumo Logic
Supporting your CMMC initiatives with Sumo Logic
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestration
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 

More from Oxford Martin Centre, OII, and Computer Science at the University of Oxford

More from Oxford Martin Centre, OII, and Computer Science at the University of Oxford (20)

5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx
 
Cybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the WorkplaceCybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the Workplace
 
Changing Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptxChanging Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptx
 
25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University
 
Dutton power corrupts-2021
Dutton power corrupts-2021Dutton power corrupts-2021
Dutton power corrupts-2021
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth Estate
 
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
Digital Divides tprc-2019
 
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
 
Future of public broadcasting and a university
Future of public broadcasting and a universityFuture of public broadcasting and a university
Future of public broadcasting and a university
 
Social media realitie lisbon-2018
Social media realitie lisbon-2018Social media realitie lisbon-2018
Social media realitie lisbon-2018
 
Search&amp;politics lisbon-2018
Search&amp;politics lisbon-2018Search&amp;politics lisbon-2018
Search&amp;politics lisbon-2018
 
Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017
 
Internet, Search and Threats to News Ecosystem
Internet, Search and Threats to News EcosystemInternet, Search and Threats to News Ecosystem
Internet, Search and Threats to News Ecosystem
 
Search&amp;politics bruegel-25 oct2017
Search&amp;politics bruegel-25 oct2017Search&amp;politics bruegel-25 oct2017
Search&amp;politics bruegel-25 oct2017
 
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
 
Political Transformations in Network Societies - the fifth estate
Political Transformations in Network Societies - the fifth estatePolitical Transformations in Network Societies - the fifth estate
Political Transformations in Network Societies - the fifth estate
 
Tprc cultures-2016
Tprc cultures-2016Tprc cultures-2016
Tprc cultures-2016
 

Recently uploaded

VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

GFCE 2019 Presentation (Updated Nov 2019)

  • 1. The Shaping and Impacts of Cyber Security Capacity October 2017 Prof William Dutton and Dr Patricia Esteve-Gonzalez – Oxford Martin Fellows, GCSCC, University of Oxford Dr Ruth Shillair – Assistant Professor, Quello Centre, Michigan State University & GCSCC Research Associate Department of Computer Science, University of Oxford 15 Parks Road, Oxford, OX1 3QD, UK cybercapacity@cs.ox.ac.uk www.oxfordmartin.ox.ac.uk/cybersecurity Revision of presentation at Addis Ababa, October, 2019
  • 3. Cybersecurity and Capacity Building Cybersecurity capacity is the ability to employ the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Adapted from (ITU (Recommendation ITU–T X.1205), 2008)
  • 4. Previous Funders Oxford’s GCSCC: Funding Partners GCSCC Regional Partner
  • 5. Strategic & Implementation Partners Ministry of Foreign Affairs Netherlands Ministry of Foreign Affairs Norway UK Cabinet Office Global Forum on Cyber Expertise
  • 6. Early Publications on Shaping of Capacity and its Implications for Nations Reviews of each of the nations reviewed by the GCSCC discuss the factors shaping capacity and its implications. Initial cross-national comparative analyses are published in: Creese, S., Shillair, R., Bada, M., Reisdorf, B.C., Roberts, T., and Dutton, W. H. (2019), ‘The Cybersecurity Capacity of Nations’, pp. 165-179 in Graham, M., and Dutton, W. H. (eds), Society and the Internet: How Networks of Information and Communication are Changing our Lives, 2nd Edition. Oxford: Oxford University Press. Dutton, W. H., Creese, S., Shillair, R., and Bada, M. (forthcoming), ‘Cyber Security Capacity: Does it Matter?’, Journal of Information Policy, forthcoming.
  • 7. Key Research Questions of Paper in Progress 1. What is the status of national cybersecurity capacity building? 2. What factors are shaping capacity building within nations? 3. What are the implications of capacity building for nations?
  • 9. Basic Approach to Research on Cybersecurity Capacity Building • Cybersecurity Maturity Model (CMM) • 5 Dimensions Maturity Model • Modified Focus Groups • Interviews & Desk Research Field Research • Coding of Maturity Across Dimensions • Cross-national Comparative Analysis Maturity
  • 10. Data from CMM assessments The core output of the GCSCC is the Cybersecurity Capacity Maturity Model for Nations (CMM) – a model suitable for self-assessment of current capacity, spanning multiple dimensions, multi-stakeholder consultation process, creating a comprehensive benchmark of current position and how to increase maturity.
  • 11. The 5 DIMENSIONS of Cybersecurity Capacity D 5 Standards Organisations, and Technologies D 3 Cybersecurity Education, Training and Skills D 1 Cybersecurity Policy and Strategy D 2 Cyber Culture and Society D 4 Legal and Regulatory Frameworks
  • 13. Five Stages of Cybersecurity Capacity Maturity: Start-up Formative Established Strategic Dynamic
  • 14. Five Stages of Cybersecurity Capacity Maturity: Start-up Formative Established Strategic Dynamic 1. Start-up: at this stage either no cybersecurity maturity exists, or it is very embryonic in nature. There might be initial discussions about cybersecurity capacity building, but no concrete actions have been taken. There is an absence of observable evidence of cybersecurity capacity at this stage.
  • 15. Five Stages of Cybersecurity Capacity Maturity: Start-up Formative Established Strategic Dynamic 2. Formative: some aspects have begun to grow and be formulated, but may be ad-hoc, disorganised, poorly defined – or simply new However, evidence of this aspect can be clearly demonstrated.
  • 16. Five Stages of Cybersecurity Capacity Maturity: Start-up Formative Established Strategic Dynamic 3. Established: indicators of the aspect are in place, and functioning. However, there is not well-thought-out consideration of the relative allocation of resources. Little trade-off decision-making has been made concerning the relative investment in this aspect. But the aspect is functional and defined.
  • 17. Data from CMM assessments Cluster by region Cluster by CMM year Cluster by income Region Obs. Year Obs. Income (WB) Obs. Africa 10 2015 8 Low and Lower-Medium 22 America 31 2016 35 Low: 6 Asia 6 OAS: 31 Lower-Medium: 16 Eastern Europe 5 Non-OAS: 4 Upper-Medium 30 Europe 4 2017 5 High 10 South Caucasus 2 2018 10 Oceania 4 2019 4 Total 62 Total 62 Total 62 • 62 nations where the CMM has been implemented (2015 - 2019).
  • 18. Collection of data This study considers granulated data at the aspect level from the field sessions with stakeholders (GCSCC and strategic & implementation partners) in 31 countries. • In-country focus group discussions with key stakeholders. • 10 sessions over 3 days. • This data is different from the CMM reports. In addition, this study considers data at the aspect level for 31 countries from IDB and OAS (2016). • Collection of data by survey. Conversion of all country data to the CMM model, 2014.
  • 19. Cyber Security Dimensions Factors 1. Policy and Strategy D1.1 National Cybersecurity Strategy D1.2 Incident Response D1.3 Critical Infrastructure Protection D1.4 Crisis Management D1.5 Cyber Defence D1.6 Digital Redundancy 2. Culture and Society D2.1 Cybersecurity Mind-Set D2.2 Cybersecurity Awareness D2.3 Confidence and Trust on the Internet D2.4 Privacy Online 3. Education, Training, and Skills D3.1 National Availability of Cyber Education and Training D3.2 National Development of Cybersecurity Education D3.3 Corporate Training and Educational Initiatives within Companies D3.4 Corporate Governance, Knowledge and Standards 4. Legal and Regulatory Frameworks D4.1 Legal Frameworks D4.2 Legal Investigation (Criminal Justice System) D4.3 Responsible Disclosure 5. Standards, Organisations, and Technologies D5.1 Adherence to Standards D5.2 Internet Infrastructure Resilience D5.3 Cybersecurity Marketplace
  • 20. Calculation of variables from data at the aspect level Our strategy is to summarize the CMM data on 50 aspects through an overall index on Cybersecurity Capacity (CSC). • Factors’ average maturity stages were calculated from their corresponding aspects. • Dimensions’ average maturity stage were calculated from their corresponding factors. • CSC was calculated as the average maturity stage of all dimensions.
  • 21. Cybersecurity Capacity (CSC) related to Five Dimensions of the CMM (factors) Dimension CSC D1 D2 D3 D4 D5 CSC Overall Cyber Security Capacity 1.00 D1 Cybersecurity Policy and Strategy .91 1.00 D2 Cyber Culture and Society .95 .82 1.00 D3 Cybersecurity Education, Training, and Skills .89 .75 .83 1.00 D4 Legal and Regulatory Frameworks .91 .76 .87 .77 1.00 D5 Standards, Organisations, and Technologies .91 .84 .81 .77 .76 1.00 Pearson’s correlation coefficients for 62 observations. All correlations have statistical significance <.001.
  • 22. Cybersecurity Capacity (CSC) related to Other Cybersecurity Indicators Alternative indicators CSC (N) Global Cybersecurity Index (ITU) .61 (61) Networked Readiness Index (WEF) .76 (50) Secure Servers, logarithm (Netcraft) .79 (61) Software Spending (Global Innovation Index) .53 (39) Pearson’s correlation coefficients, number of observations in parentheses. All correlations have statistical significance <.001.
  • 23. What is the status of Cybersecurity Capacity Building?
  • 24. Average maturity stage per factor (N=62)
  • 25.
  • 26. What Factors are Shaping the Cybersecurity Capacity of Nations?
  • 27. Factors Related to Cybersecurity Capacity (CSC) (sources) Pearson’s correlation coefficients for 62 observations. Symbols +, *, **, *** correspond, respectively, to levels of significance at 0.1, 0.05, 0.01, 0.001. Category Independent variable CSC Demographic Total Population .34** Economic GDP per capita .59*** Infrastructure Percentage of Users (Centrality of Internet) .60*** Number of Users (Scale of Use) .50*** Political and Administrative System Administrative Capacity .60***
  • 28. Correlations Among Independent Variables Pearson’s correlation coefficients for 62 observations. Symbols +, *, **, *** correspond, respectively, to levels of significance at 0.1, 0.05, 0.01, 0.001. 1 2 3 4 5 1 Total Population (ln) 1.00 2 GDP per capita (ln) -.29* 1.00 3 Number of Users (ln, scale) .97*** -.07 1.00 4 Percentage of Users (centrality) -.30* .88*** -.06 1.00 5 Administrative Capacity -.21+ .63*** -.07 .65*** 1.00
  • 29.
  • 30. What are the Implications of Cybersecurity Capacity for Nations?
  • 31. Outcomes related to Cybersecurity Capacity (CSC) Outcome Variables CSC (N) Piracy -.82*** (34) Encounter Rates -.35* (35) NRI: Individual Usage .76*** (50) NRI: Business Usage .61*** (50) NRI: Government Usage .65*** (50) Voice & Accountability .33** (62) Pearson’s correlation coefficients, number of observations in parentheses. Symbols +, *, **, *** indicate, correspondingly, levels of significance at 0.1, 0.05, 0.01, 0.001.
  • 32. Path Analysis* *Using SmartPLS: Ringle, C. M., Wende, S., and Becker, J.-M. 2015. "SmartPLS 3." Boenningstedt: SmartPLS GmbH, http://www.smartpls.com Centrality of Internet Use Cybersecurity Capacity Wealth End User Cyber Security Problems Scale of Internet Use Population
  • 33. *p<.05; **p<.01; ***p<.001 Impact of CSC on Negative Outcomes (Piracy and Encounter Rates) End User Cyber Security Problems R2=.821*** Percentage of Population Using Internet R2= .777** Cybersecurity Capacity R2= .759*** GDP Per Capita b= .395*** b= -1.061*** b= .881**** Number of Internet Users R2=.984*** b= -.030*** b=.295*** b=.226*** Total Population b=1.031*** b=.576*** Administrative Capacity R2= .389*** b= .623**** b=.563*** b=.392*** b= .392***
  • 34. Impact of CSC on Positive Outcomes (Voice and Accountability, and NRI indicators of usage) Percentage of Population Using Internet R2= .779** Cybersecurity Capacity R2= .760*** GDP Per Capita Indicators of Usage R2=.952*** b= .420* b= .397*** b= .868**** Number of Internet Users R2=.984*** b= .424*** b=.300*** b=.226*** Total Population b=1.031*** b=-.207*** *p<.05; **p<.01; ***p<.001 Administrative Capacity R2= .392***b= .607**** b=.562*** b=.385***
  • 36. Conclusions • Nations in the early phases of capacity building. • Capacity (CSC) shaped by the scale and centrality of the Internet along with the wealth and size of nations and their respective capacity for administrative change – a Capacity Divide? • National choices on building CSC have implications for cybersecurity as well as the vitality of Internet use by individuals, business and government. • New Questions: Relevance of cross-national variations in patterns of capacity building.
  • 37. Next Steps in Progressing the Research Continue to Refine Indicators • Cybersecurity Capacity • Outcomes, e.g., beyond Encounter Rates Structured Field Coding • Systematic Coding of Field Research • Operational Definitions of Maturity
  • 38. THANK YOU! [EMAIL ADDRESS] @CapacityCentre Thank You https://www.linkedin.com/company/ global-cyber-security-capacity-centre/ www.oxfordmartin.ox.ac.uk/cybersecurity Department of Computer Science University of Oxford 15 Parks Road, Oxford, OX1 3QD, UK Phone: +44(0)1865 287903 cybercapacity@cs.ox.ac.uk

Editor's Notes

  1. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  2. Intro
  3. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  4. Dimension: The 5 dimensions represent the clusters of cybersecurity capacity through which the Capacity Centre analyses the nuances of capacity. They represent the different research ‘lenses’ through which cybersecurity capacity is studied. Accordingly, the most fundamental structure of the CMM is divided into dimensions, which consist of a number of factors. These five dimensions cover the broad expanse of areas that should be considered when seeking to enhance cybersecurity capacity. We recognise that these dimensions may overlap with one another on certain issues, and indeed the Capacity Centre hopes to understand the interdependences between cybersecurity capacities as it conducts more national capacity reviews. Within each dimension, there are several factors, aspects, stages of maturity, and indicators of cybersecurity capacity, each of which is defined as follows:
  5. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  6. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  7. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  8. Before running the full model the multi-variable constructs were tested for validity and reliability. We used confirmatory factor analysis to test both the indicators of cybersecurity capacity and end user cyber security problems. The data satisfactorily passed the tests, indicating both the capacity indicators and the end user problems were reliable. Full details are in the paper since I don’t have time to go over those in depth here. The overall model was tested using structural equation methods (using SmartPLS- a partial least squares method of analysis). This helped us better see the impacts of the variables on each other. Again, further details of model strength and validity indicators are in the paper. In looking at scale- the total population and number of Internet users were closely tied together. No surprises there. And in looking at diffusion’s impact to investment in capacity- there is a strong positive relationship- with a beta of .437 The GDP per capita was also a and this generally carried through to a higher investment in the elements of cyber security capacity. The “ of Cyber Security Capacity” are the items that specifically address capacity that are a part of the investment by the nations that have a higher GDP per capita. So you can see that of the -.457 (beta) .370 (beta) can be accounted for by the cyber security capacity elements.
  9. Before running the full model the multi-variable constructs were tested for validity and reliability. We used confirmatory factor analysis to test both the indicators of cybersecurity capacity and end user cyber security problems. The data satisfactorily passed the tests, indicating both the capacity indicators and the end user problems were reliable. Full details are in the paper since I don’t have time to go over those in depth here. The overall model was tested using structural equation methods (using SmartPLS- a partial least squares method of analysis). This helped us better see the impacts of the variables on each other. Again, further details of model strength and validity indicators are in the paper. In looking at scale- the total population and number of Internet users were closely tied together. No surprises there. And in looking at diffusion’s impact to investment in capacity- there is a strong positive relationship- with a beta of .437 The GDP per capita was also a and this generally carried through to a higher investment in the elements of cyber security capacity. The “ of Cyber Security Capacity” are the items that specifically address capacity that are a part of the investment by the nations that have a higher GDP per capita. So you can see that of the -.457 (beta) .370 (beta) can be accounted for by the cyber security capacity elements.
  10. The GCSCC has developed the Cybersecurity Capacity Maturity Model for Nations (CMM) as a model to facilitate the assessment of the maturity of a country’s cybersecurity capacity. Developed in consultation with over two hundred international experts drawn from governments, international organisations, academia, public & private sectors and civil society, the CMM reviews cybersecurity capacity across five dimensions:
  11. Last page option 1