SlideShare a Scribd company logo
1 of 15
Download to read offline
Emancipating, Enriching, Equalising
and Empowering through the use of
ICTs

The Role of the Commonwealth in
Cyberspace
30 October 2013
The Commonwealth

•
•
•
•
•
•

•

54 Member Countries
Nearly  a  third  of  the  World’s  population
Combined GDP over £5 trillion
Mobile subscriptions ranging from 5% to 185%,
with an average of 84%
Fixed telephone lines ranging from 0.3% to
60%, with an average of 18%
Internet usage ranging from 1% to 85%, with
an average of 28%
A thriving hub of technology innovations and
possibly the largest ICT market in the world

2
The CTO
• Set up in 1901
• The oldest and the largest Commonwealth organisation in the field
of ICTs
• support members in using ICTs to deliver effective development
interventions that enrich, empower, equalise and emancipate all
peoples within the Commonwealth and beyond
• Traditional core activities
• Research & consultancy
• Capacity development & training
• Events & conferences
• Cybergovernance and Cybersecurity are focus areas under the
strategic plan of 2012-16

3
Context
• Cyberspace generates enormous social and economic
benefits
• Cyber population is growing
– Improving connectivity – national and international
– Broadband Commission & A4AI on promoting Broadband

• Meeting place of different people & cultures, views &
approaches
• Requires fostering entrepreneurship and innovation while
protecting freedom and liberty
• Where to strike the balance?
• Multi jurisdictional - Both national and international
aspects - interlinked
4
Cybergovernance
conceptualised

5
e-Bay - Community Action in
Cybergovernance
•
•
•
•
•

Population exceeded 100 million by end 2011
Commercially driven community
Multi jurisdictional
Operates on the basis of voluntary compliance
Motivation - Need to belong

6
Divergence
• Multistakeholder approach Vs. State-driven
• Voluntary norms Vs Treaty based
• Brought to sharp contrast at the World Conference on
International Telecommunications (WCIT) in December 2012
in Dubai
• Some concerns about the role of the State in Governing the
Cyberspace through International Telecommunications
Regulations.
• Disagreement  over  “resolving  to  instruct  the  SecretaryGeneral to continue to take the necessary steps for ITU to
play  an  active  and  constructive  role”
• Apparently so far 89 signatories out of 190 signatories

7
Commonwealth in
Cybergovernance
• Commonwealth has a role to play
• Based on the Commonwealth Values agreed at the Singapore
CHOGM in 1971 and reaffirmed in Harare in 1991
• Detailed in the Commonwealth Charter of 2013
(http://thecommonwealth.org/sites/default/files/page/docum
ents/CharteroftheCommonwealth.pdf), particularly
– respect for the protection and promotion of civil, political,
economic, social and cultural rights, including the right to
development
– commitment to remove disparities and unequal living standards
as guided by internationally agreed development goals
– recognise the importance of ICTs as instruments of
development ......... as well as for ........... sharing of cultures,
while enhancing security.

8
CTO’s  approach  to  
Cybergovernance
Develop a set of principles
Based on Commonwealth principles
Arrived through consensus
Involving consultations of a range of stakeholders policy makers, regulators, ICT implementing agencies,
CERTs etc
• Leveraging the strengths of developed countries to
assist developing countries
• That may eventually expand beyond the Commonwealth
•
•
•
•

9
CTO’s  Principles  of  
Cybergovernance
Foster innovation, freedom and understanding
Contribute to economic development
Enable social interactions
Recognise legitimate economic, cultural and security
concerns of members
• Promote multistakeholder partnerships
• Facilitate Pan-Commonwealth consultations and
international linkages
•
•
•
•

10
Progress – so far
• The first consultation of ICT policy makers and
regulators was held on 9th and 10th October 2013 in
Abuja, Nigeria
• Delegates from over 20 Commonwealth countries
– decided that the CTO should take the lead in
developing the Commonwealth Cybergovernance
Model
– committed to support the initiative
Issued the Abuja Declaration
http://www.cto.int/focus-themes/cybersecurity/

11
Next Steps
• A series of regional consultations
• Starting with a Caribbean Ministerial
Consultation on 5th December 2013 in Jamaica
in the margins of the Caribbean
Telecommunication  Union’s  Ministerial  meeting    
• Culminating  in  the  Commonwealth  ICT  Minister’s  
meeting at the Marlborough House in London on
3 – 4 March 2014 where the principles will be
debated and, if thought fit, adopted.

12
Aims & Objectives
• Create a standard all can subscribe to, resulting
in better international cooperation and
coordination
• Act as a beacon for non-Commonwealth
countries
• Provide an assurance to countries that extend
assistance that their aid is properly used
In order to make the Cyberspace a thriving,
innovative and rewarding place

13
How to get involved
• Take part in the consultations – when
invited
• Join related activities – Cybersecurity
Forum 2014 in London (5 – 7 March 2014)
• Participate in capacity building in Cyberrelated subjects through CTO

14
Lasantha De Alwis
Director/Head of Operations Department
Commonwealth Telecommunications Organisation
94-66, Glenthorne Road, Hammersmith, UK
+44(0)208 600 3814
l.dealwis@cto.int

15

More Related Content

What's hot

Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?APNIC
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...APNIC
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25ISOC-KG
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa ICT4Democracy in East Africa
 
Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)ISOC-KG
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityAFRINIC
 
Internet Governance
Internet GovernanceInternet Governance
Internet GovernanceARIN
 
Isoc report launch maarit 221115
Isoc report launch maarit 221115Isoc report launch maarit 221115
Isoc report launch maarit 221115ISOC-KG
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldGood Things Foundation
 
Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)ISOC-KG
 
Introduction to Broadband
Introduction to BroadbandIntroduction to Broadband
Introduction to BroadbandSamantha Wagner
 
SATNET Presentation
SATNET PresentationSATNET Presentation
SATNET PresentationSANGONeT
 
World Digital Solidarity
World Digital SolidarityWorld Digital Solidarity
World Digital Solidarityaciddtic21
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009pinardclark
 
CTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business DevelopmentCTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business Developmentsegughana
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesInternet Society
 

What's hot (20)

Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
 
Final project pig garry mukelabai
Final project pig garry mukelabaiFinal project pig garry mukelabai
Final project pig garry mukelabai
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
 
Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Isoc report launch maarit 221115
Isoc report launch maarit 221115Isoc report launch maarit 221115
Isoc report launch maarit 221115
 
The Commonwealth Cybercrime initiative
The Commonwealth Cybercrime initiativeThe Commonwealth Cybercrime initiative
The Commonwealth Cybercrime initiative
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital World
 
Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)
 
Introduction to Broadband
Introduction to BroadbandIntroduction to Broadband
Introduction to Broadband
 
SATNET Presentation
SATNET PresentationSATNET Presentation
SATNET Presentation
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
World Digital Solidarity
World Digital SolidarityWorld Digital Solidarity
World Digital Solidarity
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009
 
CTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business DevelopmentCTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business Development
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 

Viewers also liked

Critical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCritical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCommunity Protection Forum
 
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...NetSecure Day
 
Iremos en quelques mots
Iremos en quelques motsIremos en quelques mots
Iremos en quelques motsClément Têtu
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-TerrorismChallenge:Future
 
Indian para special forces
Indian para special forcesIndian para special forces
Indian para special forcesBhanu Teja
 
20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactorPersonal Interactor
 
Guide amdec (très intéressant)
Guide amdec (très intéressant)Guide amdec (très intéressant)
Guide amdec (très intéressant)pascalbaudin
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 

Viewers also liked (13)

Critical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCritical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency Issues
 
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
 
Emergency Preparedness - State of the Art
Emergency Preparedness - State of the ArtEmergency Preparedness - State of the Art
Emergency Preparedness - State of the Art
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Iremos en quelques mots
Iremos en quelques motsIremos en quelques mots
Iremos en quelques mots
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism
 
Indian para special forces
Indian para special forcesIndian para special forces
Indian para special forces
 
20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor
 
Guide amdec (très intéressant)
Guide amdec (très intéressant)Guide amdec (très intéressant)
Guide amdec (très intéressant)
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Formation AMDEC
Formation AMDECFormation AMDEC
Formation AMDEC
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 

Similar to The Role of the Commonwealth in Cyberspace

ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07segughana
 
Aisi and Nici-Policy Doc
Aisi and Nici-Policy DocAisi and Nici-Policy Doc
Aisi and Nici-Policy DocAlain Nkoyock
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyGenève Lab
 
Digital divide
Digital divideDigital divide
Digital divideUc Man
 
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUEmmanuel Mumuni
 
Wsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryWsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryDr Lendy Spires
 
ISOC: IXPs Partnerships
ISOC: IXPs PartnershipsISOC: IXPs Partnerships
ISOC: IXPs PartnershipsATI Tunisia
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends Endcode_org
 
ISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and BeyondISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and BeyondATI Tunisia
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy workNawsheen Hosenally
 
National Initiatives ITU
National Initiatives ITUNational Initiatives ITU
National Initiatives ITUAdrian Hall
 
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...AhmBazlurRahman
 
Digital Development and Digital Inclusion
Digital Development and Digital InclusionDigital Development and Digital Inclusion
Digital Development and Digital InclusionMark Graham
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 

Similar to The Role of the Commonwealth in Cyberspace (20)

ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07
 
Aisi and Nici-Policy Doc
Aisi and Nici-Policy DocAisi and Nici-Policy Doc
Aisi and Nici-Policy Doc
 
Info 442 chapter 2
Info 442 chapter 2Info 442 chapter 2
Info 442 chapter 2
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public Policy
 
Digital divide
Digital divideDigital divide
Digital divide
 
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
 
Communications Development in Saudi Arabia
Communications Development in Saudi ArabiaCommunications Development in Saudi Arabia
Communications Development in Saudi Arabia
 
Wsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryWsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summary
 
ISOC: IXPs Partnerships
ISOC: IXPs PartnershipsISOC: IXPs Partnerships
ISOC: IXPs Partnerships
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 
ISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and BeyondISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and Beyond
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy work
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy work
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
National Initiatives ITU
National Initiatives ITUNational Initiatives ITU
National Initiatives ITU
 
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
 
Digital Development and Digital Inclusion
Digital Development and Digital InclusionDigital Development and Digital Inclusion
Digital Development and Digital Inclusion
 
Wcit 12
Wcit 12Wcit 12
Wcit 12
 
WCIT 2016 Manu Bhardwaj
WCIT 2016 Manu BhardwajWCIT 2016 Manu Bhardwaj
WCIT 2016 Manu Bhardwaj
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 

More from Community Protection Forum

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Community Protection Forum
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Community Protection Forum
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...Community Protection Forum
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Community Protection Forum
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCommunity Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Community Protection Forum
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsCommunity Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesCommunity Protection Forum
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceCommunity Protection Forum
 

More from Community Protection Forum (20)

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 

Recently uploaded

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

The Role of the Commonwealth in Cyberspace

  • 1. Emancipating, Enriching, Equalising and Empowering through the use of ICTs The Role of the Commonwealth in Cyberspace 30 October 2013
  • 2. The Commonwealth • • • • • • • 54 Member Countries Nearly  a  third  of  the  World’s  population Combined GDP over £5 trillion Mobile subscriptions ranging from 5% to 185%, with an average of 84% Fixed telephone lines ranging from 0.3% to 60%, with an average of 18% Internet usage ranging from 1% to 85%, with an average of 28% A thriving hub of technology innovations and possibly the largest ICT market in the world 2
  • 3. The CTO • Set up in 1901 • The oldest and the largest Commonwealth organisation in the field of ICTs • support members in using ICTs to deliver effective development interventions that enrich, empower, equalise and emancipate all peoples within the Commonwealth and beyond • Traditional core activities • Research & consultancy • Capacity development & training • Events & conferences • Cybergovernance and Cybersecurity are focus areas under the strategic plan of 2012-16 3
  • 4. Context • Cyberspace generates enormous social and economic benefits • Cyber population is growing – Improving connectivity – national and international – Broadband Commission & A4AI on promoting Broadband • Meeting place of different people & cultures, views & approaches • Requires fostering entrepreneurship and innovation while protecting freedom and liberty • Where to strike the balance? • Multi jurisdictional - Both national and international aspects - interlinked 4
  • 6. e-Bay - Community Action in Cybergovernance • • • • • Population exceeded 100 million by end 2011 Commercially driven community Multi jurisdictional Operates on the basis of voluntary compliance Motivation - Need to belong 6
  • 7. Divergence • Multistakeholder approach Vs. State-driven • Voluntary norms Vs Treaty based • Brought to sharp contrast at the World Conference on International Telecommunications (WCIT) in December 2012 in Dubai • Some concerns about the role of the State in Governing the Cyberspace through International Telecommunications Regulations. • Disagreement  over  “resolving  to  instruct  the  SecretaryGeneral to continue to take the necessary steps for ITU to play  an  active  and  constructive  role” • Apparently so far 89 signatories out of 190 signatories 7
  • 8. Commonwealth in Cybergovernance • Commonwealth has a role to play • Based on the Commonwealth Values agreed at the Singapore CHOGM in 1971 and reaffirmed in Harare in 1991 • Detailed in the Commonwealth Charter of 2013 (http://thecommonwealth.org/sites/default/files/page/docum ents/CharteroftheCommonwealth.pdf), particularly – respect for the protection and promotion of civil, political, economic, social and cultural rights, including the right to development – commitment to remove disparities and unequal living standards as guided by internationally agreed development goals – recognise the importance of ICTs as instruments of development ......... as well as for ........... sharing of cultures, while enhancing security. 8
  • 9. CTO’s  approach  to   Cybergovernance Develop a set of principles Based on Commonwealth principles Arrived through consensus Involving consultations of a range of stakeholders policy makers, regulators, ICT implementing agencies, CERTs etc • Leveraging the strengths of developed countries to assist developing countries • That may eventually expand beyond the Commonwealth • • • • 9
  • 10. CTO’s  Principles  of   Cybergovernance Foster innovation, freedom and understanding Contribute to economic development Enable social interactions Recognise legitimate economic, cultural and security concerns of members • Promote multistakeholder partnerships • Facilitate Pan-Commonwealth consultations and international linkages • • • • 10
  • 11. Progress – so far • The first consultation of ICT policy makers and regulators was held on 9th and 10th October 2013 in Abuja, Nigeria • Delegates from over 20 Commonwealth countries – decided that the CTO should take the lead in developing the Commonwealth Cybergovernance Model – committed to support the initiative Issued the Abuja Declaration http://www.cto.int/focus-themes/cybersecurity/ 11
  • 12. Next Steps • A series of regional consultations • Starting with a Caribbean Ministerial Consultation on 5th December 2013 in Jamaica in the margins of the Caribbean Telecommunication  Union’s  Ministerial  meeting     • Culminating  in  the  Commonwealth  ICT  Minister’s   meeting at the Marlborough House in London on 3 – 4 March 2014 where the principles will be debated and, if thought fit, adopted. 12
  • 13. Aims & Objectives • Create a standard all can subscribe to, resulting in better international cooperation and coordination • Act as a beacon for non-Commonwealth countries • Provide an assurance to countries that extend assistance that their aid is properly used In order to make the Cyberspace a thriving, innovative and rewarding place 13
  • 14. How to get involved • Take part in the consultations – when invited • Join related activities – Cybersecurity Forum 2014 in London (5 – 7 March 2014) • Participate in capacity building in Cyberrelated subjects through CTO 14
  • 15. Lasantha De Alwis Director/Head of Operations Department Commonwealth Telecommunications Organisation 94-66, Glenthorne Road, Hammersmith, UK +44(0)208 600 3814 l.dealwis@cto.int 15