SlideShare a Scribd company logo
1 of 15
Download to read offline
Emancipating, Enriching, Equalising
and Empowering through the use of
ICTs

The Role of the Commonwealth in
Cyberspace
30 October 2013
The Commonwealth

•
•
•
•
•
•

•

54 Member Countries
Nearly  a  third  of  the  World’s  population
Combined GDP over £5 trillion
Mobile subscriptions ranging from 5% to 185%,
with an average of 84%
Fixed telephone lines ranging from 0.3% to
60%, with an average of 18%
Internet usage ranging from 1% to 85%, with
an average of 28%
A thriving hub of technology innovations and
possibly the largest ICT market in the world

2
The CTO
• Set up in 1901
• The oldest and the largest Commonwealth organisation in the field
of ICTs
• support members in using ICTs to deliver effective development
interventions that enrich, empower, equalise and emancipate all
peoples within the Commonwealth and beyond
• Traditional core activities
• Research & consultancy
• Capacity development & training
• Events & conferences
• Cybergovernance and Cybersecurity are focus areas under the
strategic plan of 2012-16

3
Context
• Cyberspace generates enormous social and economic
benefits
• Cyber population is growing
– Improving connectivity – national and international
– Broadband Commission & A4AI on promoting Broadband

• Meeting place of different people & cultures, views &
approaches
• Requires fostering entrepreneurship and innovation while
protecting freedom and liberty
• Where to strike the balance?
• Multi jurisdictional - Both national and international
aspects - interlinked
4
Cybergovernance
conceptualised

5
e-Bay - Community Action in
Cybergovernance
•
•
•
•
•

Population exceeded 100 million by end 2011
Commercially driven community
Multi jurisdictional
Operates on the basis of voluntary compliance
Motivation - Need to belong

6
Divergence
• Multistakeholder approach Vs. State-driven
• Voluntary norms Vs Treaty based
• Brought to sharp contrast at the World Conference on
International Telecommunications (WCIT) in December 2012
in Dubai
• Some concerns about the role of the State in Governing the
Cyberspace through International Telecommunications
Regulations.
• Disagreement  over  “resolving  to  instruct  the  SecretaryGeneral to continue to take the necessary steps for ITU to
play  an  active  and  constructive  role”
• Apparently so far 89 signatories out of 190 signatories

7
Commonwealth in
Cybergovernance
• Commonwealth has a role to play
• Based on the Commonwealth Values agreed at the Singapore
CHOGM in 1971 and reaffirmed in Harare in 1991
• Detailed in the Commonwealth Charter of 2013
(http://thecommonwealth.org/sites/default/files/page/docum
ents/CharteroftheCommonwealth.pdf), particularly
– respect for the protection and promotion of civil, political,
economic, social and cultural rights, including the right to
development
– commitment to remove disparities and unequal living standards
as guided by internationally agreed development goals
– recognise the importance of ICTs as instruments of
development ......... as well as for ........... sharing of cultures,
while enhancing security.

8
CTO’s  approach  to  
Cybergovernance
Develop a set of principles
Based on Commonwealth principles
Arrived through consensus
Involving consultations of a range of stakeholders policy makers, regulators, ICT implementing agencies,
CERTs etc
• Leveraging the strengths of developed countries to
assist developing countries
• That may eventually expand beyond the Commonwealth
•
•
•
•

9
CTO’s  Principles  of  
Cybergovernance
Foster innovation, freedom and understanding
Contribute to economic development
Enable social interactions
Recognise legitimate economic, cultural and security
concerns of members
• Promote multistakeholder partnerships
• Facilitate Pan-Commonwealth consultations and
international linkages
•
•
•
•

10
Progress – so far
• The first consultation of ICT policy makers and
regulators was held on 9th and 10th October 2013 in
Abuja, Nigeria
• Delegates from over 20 Commonwealth countries
– decided that the CTO should take the lead in
developing the Commonwealth Cybergovernance
Model
– committed to support the initiative
Issued the Abuja Declaration
http://www.cto.int/focus-themes/cybersecurity/

11
Next Steps
• A series of regional consultations
• Starting with a Caribbean Ministerial
Consultation on 5th December 2013 in Jamaica
in the margins of the Caribbean
Telecommunication  Union’s  Ministerial  meeting    
• Culminating  in  the  Commonwealth  ICT  Minister’s  
meeting at the Marlborough House in London on
3 – 4 March 2014 where the principles will be
debated and, if thought fit, adopted.

12
Aims & Objectives
• Create a standard all can subscribe to, resulting
in better international cooperation and
coordination
• Act as a beacon for non-Commonwealth
countries
• Provide an assurance to countries that extend
assistance that their aid is properly used
In order to make the Cyberspace a thriving,
innovative and rewarding place

13
How to get involved
• Take part in the consultations – when
invited
• Join related activities – Cybersecurity
Forum 2014 in London (5 – 7 March 2014)
• Participate in capacity building in Cyberrelated subjects through CTO

14
Lasantha De Alwis
Director/Head of Operations Department
Commonwealth Telecommunications Organisation
94-66, Glenthorne Road, Hammersmith, UK
+44(0)208 600 3814
l.dealwis@cto.int

15

More Related Content

What's hot

Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?APNIC
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...APNIC
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25ISOC-KG
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa ICT4Democracy in East Africa
 
Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)ISOC-KG
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityAFRINIC
 
Internet Governance
Internet GovernanceInternet Governance
Internet GovernanceARIN
 
Isoc report launch maarit 221115
Isoc report launch maarit 221115Isoc report launch maarit 221115
Isoc report launch maarit 221115ISOC-KG
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldGood Things Foundation
 
Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)ISOC-KG
 
Introduction to Broadband
Introduction to BroadbandIntroduction to Broadband
Introduction to BroadbandSamantha Wagner
 
SATNET Presentation
SATNET PresentationSATNET Presentation
SATNET PresentationSANGONeT
 
World Digital Solidarity
World Digital SolidarityWorld Digital Solidarity
World Digital Solidarityaciddtic21
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009pinardclark
 
CTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business DevelopmentCTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business Developmentsegughana
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesInternet Society
 

What's hot (20)

Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
 
Final project pig garry mukelabai
Final project pig garry mukelabaiFinal project pig garry mukelabai
Final project pig garry mukelabai
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
 
Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Isoc report launch maarit 221115
Isoc report launch maarit 221115Isoc report launch maarit 221115
Isoc report launch maarit 221115
 
The Commonwealth Cybercrime initiative
The Commonwealth Cybercrime initiativeThe Commonwealth Cybercrime initiative
The Commonwealth Cybercrime initiative
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital World
 
Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)
 
Introduction to Broadband
Introduction to BroadbandIntroduction to Broadband
Introduction to Broadband
 
SATNET Presentation
SATNET PresentationSATNET Presentation
SATNET Presentation
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
World Digital Solidarity
World Digital SolidarityWorld Digital Solidarity
World Digital Solidarity
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009
 
CTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business DevelopmentCTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business Development
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 

Viewers also liked

Critical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCritical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCommunity Protection Forum
 
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...NetSecure Day
 
Iremos en quelques mots
Iremos en quelques motsIremos en quelques mots
Iremos en quelques motsClément Têtu
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-TerrorismChallenge:Future
 
Indian para special forces
Indian para special forcesIndian para special forces
Indian para special forcesBhanu Teja
 
20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactorPersonal Interactor
 
Guide amdec (très intéressant)
Guide amdec (très intéressant)Guide amdec (très intéressant)
Guide amdec (très intéressant)pascalbaudin
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 

Viewers also liked (13)

Critical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCritical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency Issues
 
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
 
Emergency Preparedness - State of the Art
Emergency Preparedness - State of the ArtEmergency Preparedness - State of the Art
Emergency Preparedness - State of the Art
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Iremos en quelques mots
Iremos en quelques motsIremos en quelques mots
Iremos en quelques mots
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism
 
Indian para special forces
Indian para special forcesIndian para special forces
Indian para special forces
 
20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor
 
Guide amdec (très intéressant)
Guide amdec (très intéressant)Guide amdec (très intéressant)
Guide amdec (très intéressant)
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Formation AMDEC
Formation AMDECFormation AMDEC
Formation AMDEC
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 

Similar to The Role of the Commonwealth in Cyberspace

ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07segughana
 
Aisi and Nici-Policy Doc
Aisi and Nici-Policy DocAisi and Nici-Policy Doc
Aisi and Nici-Policy DocAlain Nkoyock
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyGenève Lab
 
Digital divide
Digital divideDigital divide
Digital divideUc Man
 
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUEmmanuel Mumuni
 
Wsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryWsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryDr Lendy Spires
 
ISOC: IXPs Partnerships
ISOC: IXPs PartnershipsISOC: IXPs Partnerships
ISOC: IXPs PartnershipsATI Tunisia
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends Endcode_org
 
ISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and BeyondISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and BeyondATI Tunisia
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy workNawsheen Hosenally
 
National Initiatives ITU
National Initiatives ITUNational Initiatives ITU
National Initiatives ITUAdrian Hall
 
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...AhmBazlurRahman
 
Digital Development and Digital Inclusion
Digital Development and Digital InclusionDigital Development and Digital Inclusion
Digital Development and Digital InclusionMark Graham
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 

Similar to The Role of the Commonwealth in Cyberspace (20)

ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07
 
Aisi and Nici-Policy Doc
Aisi and Nici-Policy DocAisi and Nici-Policy Doc
Aisi and Nici-Policy Doc
 
Info 442 chapter 2
Info 442 chapter 2Info 442 chapter 2
Info 442 chapter 2
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public Policy
 
Digital divide
Digital divideDigital divide
Digital divide
 
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
 
Communications Development in Saudi Arabia
Communications Development in Saudi ArabiaCommunications Development in Saudi Arabia
Communications Development in Saudi Arabia
 
Wsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryWsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summary
 
ISOC: IXPs Partnerships
ISOC: IXPs PartnershipsISOC: IXPs Partnerships
ISOC: IXPs Partnerships
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 
ISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and BeyondISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and Beyond
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy work
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy work
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
National Initiatives ITU
National Initiatives ITUNational Initiatives ITU
National Initiatives ITU
 
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
 
Digital Development and Digital Inclusion
Digital Development and Digital InclusionDigital Development and Digital Inclusion
Digital Development and Digital Inclusion
 
Wcit 12
Wcit 12Wcit 12
Wcit 12
 
WCIT 2016 Manu Bhardwaj
WCIT 2016 Manu BhardwajWCIT 2016 Manu Bhardwaj
WCIT 2016 Manu Bhardwaj
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 

More from Community Protection Forum

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Community Protection Forum
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Community Protection Forum
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...Community Protection Forum
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Community Protection Forum
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCommunity Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Community Protection Forum
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsCommunity Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesCommunity Protection Forum
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceCommunity Protection Forum
 

More from Community Protection Forum (20)

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 

Recently uploaded

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

The Role of the Commonwealth in Cyberspace

  • 1. Emancipating, Enriching, Equalising and Empowering through the use of ICTs The Role of the Commonwealth in Cyberspace 30 October 2013
  • 2. The Commonwealth • • • • • • • 54 Member Countries Nearly  a  third  of  the  World’s  population Combined GDP over £5 trillion Mobile subscriptions ranging from 5% to 185%, with an average of 84% Fixed telephone lines ranging from 0.3% to 60%, with an average of 18% Internet usage ranging from 1% to 85%, with an average of 28% A thriving hub of technology innovations and possibly the largest ICT market in the world 2
  • 3. The CTO • Set up in 1901 • The oldest and the largest Commonwealth organisation in the field of ICTs • support members in using ICTs to deliver effective development interventions that enrich, empower, equalise and emancipate all peoples within the Commonwealth and beyond • Traditional core activities • Research & consultancy • Capacity development & training • Events & conferences • Cybergovernance and Cybersecurity are focus areas under the strategic plan of 2012-16 3
  • 4. Context • Cyberspace generates enormous social and economic benefits • Cyber population is growing – Improving connectivity – national and international – Broadband Commission & A4AI on promoting Broadband • Meeting place of different people & cultures, views & approaches • Requires fostering entrepreneurship and innovation while protecting freedom and liberty • Where to strike the balance? • Multi jurisdictional - Both national and international aspects - interlinked 4
  • 6. e-Bay - Community Action in Cybergovernance • • • • • Population exceeded 100 million by end 2011 Commercially driven community Multi jurisdictional Operates on the basis of voluntary compliance Motivation - Need to belong 6
  • 7. Divergence • Multistakeholder approach Vs. State-driven • Voluntary norms Vs Treaty based • Brought to sharp contrast at the World Conference on International Telecommunications (WCIT) in December 2012 in Dubai • Some concerns about the role of the State in Governing the Cyberspace through International Telecommunications Regulations. • Disagreement  over  “resolving  to  instruct  the  SecretaryGeneral to continue to take the necessary steps for ITU to play  an  active  and  constructive  role” • Apparently so far 89 signatories out of 190 signatories 7
  • 8. Commonwealth in Cybergovernance • Commonwealth has a role to play • Based on the Commonwealth Values agreed at the Singapore CHOGM in 1971 and reaffirmed in Harare in 1991 • Detailed in the Commonwealth Charter of 2013 (http://thecommonwealth.org/sites/default/files/page/docum ents/CharteroftheCommonwealth.pdf), particularly – respect for the protection and promotion of civil, political, economic, social and cultural rights, including the right to development – commitment to remove disparities and unequal living standards as guided by internationally agreed development goals – recognise the importance of ICTs as instruments of development ......... as well as for ........... sharing of cultures, while enhancing security. 8
  • 9. CTO’s  approach  to   Cybergovernance Develop a set of principles Based on Commonwealth principles Arrived through consensus Involving consultations of a range of stakeholders policy makers, regulators, ICT implementing agencies, CERTs etc • Leveraging the strengths of developed countries to assist developing countries • That may eventually expand beyond the Commonwealth • • • • 9
  • 10. CTO’s  Principles  of   Cybergovernance Foster innovation, freedom and understanding Contribute to economic development Enable social interactions Recognise legitimate economic, cultural and security concerns of members • Promote multistakeholder partnerships • Facilitate Pan-Commonwealth consultations and international linkages • • • • 10
  • 11. Progress – so far • The first consultation of ICT policy makers and regulators was held on 9th and 10th October 2013 in Abuja, Nigeria • Delegates from over 20 Commonwealth countries – decided that the CTO should take the lead in developing the Commonwealth Cybergovernance Model – committed to support the initiative Issued the Abuja Declaration http://www.cto.int/focus-themes/cybersecurity/ 11
  • 12. Next Steps • A series of regional consultations • Starting with a Caribbean Ministerial Consultation on 5th December 2013 in Jamaica in the margins of the Caribbean Telecommunication  Union’s  Ministerial  meeting     • Culminating  in  the  Commonwealth  ICT  Minister’s   meeting at the Marlborough House in London on 3 – 4 March 2014 where the principles will be debated and, if thought fit, adopted. 12
  • 13. Aims & Objectives • Create a standard all can subscribe to, resulting in better international cooperation and coordination • Act as a beacon for non-Commonwealth countries • Provide an assurance to countries that extend assistance that their aid is properly used In order to make the Cyberspace a thriving, innovative and rewarding place 13
  • 14. How to get involved • Take part in the consultations – when invited • Join related activities – Cybersecurity Forum 2014 in London (5 – 7 March 2014) • Participate in capacity building in Cyberrelated subjects through CTO 14
  • 15. Lasantha De Alwis Director/Head of Operations Department Commonwealth Telecommunications Organisation 94-66, Glenthorne Road, Hammersmith, UK +44(0)208 600 3814 l.dealwis@cto.int 15