a case for multi-stakeholder cybersecurity by zvavanjanja
TRANSCRIPT
![Page 1: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/1.jpg)
“A Case for Multi-stakeholder partnerships for critical internet resources security in
the SADC Region”
By Cade ZvavanjanjaDirector: Zimbabwe Cybersecurity Center
SAIGF-2015Southern Africa Internet
Governance Forum-15’
![Page 2: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/2.jpg)
Introduction• Definition of the issue & Regional
specificities observed • Existing policy measures and private
sector initiatives, impediments;• What worked well & Consequences of
policy interventions,• Unresolved issues & Insights gained as
a result of the experience; and• Proposed steps for further multi-
stakeholder dialogue.
![Page 3: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/3.jpg)
Key Terms
• Internet Critical Resources• Cybersecurity• Multi-stakeholder partnership
![Page 4: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/4.jpg)
Current Global Governance & Security
Adapted from: The Center for Democracy & Technology
![Page 5: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/5.jpg)
Current Cybersecurity SADC Efforts
![Page 6: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/6.jpg)
Current Cybersecurity SADC Efforts
![Page 7: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/7.jpg)
Current Needs of SADC States
![Page 8: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/8.jpg)
Needs Cont……
![Page 9: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/9.jpg)
Stakeholder Analysis
![Page 10: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/10.jpg)
Stakeholder analysis Cont….
![Page 11: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/11.jpg)
Stakeholder Analysis cont…
![Page 12: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/12.jpg)
Stakeholder Analysis Cont…
![Page 13: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/13.jpg)
Why MPs
• An effective MP for CIRS would provide the abilities to detect threats and dangerous or anomalous behaviours, to create more secure network environments through better, standardized security programs and protocols and to respond with warnings or technical fixes as needed.
![Page 14: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/14.jpg)
MPs CharacteristicsA multi-stakeholder process must have the following characteristics:•Involvement of stakeholders in the learning process•Stakeholders work towards a common goal•Work involves different sectors and scale•The objective is focused to bring about change•Deal with structural changes•Agreements are created based on cooperation•Stakeholders deal with power and conflict consciously•Bottom-up and top-down strategies are integrated in governance and policy making
![Page 15: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/15.jpg)
MPs in-depthAn effective partnership has: • A representative group of members, large
enough to be sufficiently inclusive, but small enough to retain the ability to act quickly.
• A circumscribed role for government with specific tasks and responsibilities laid out clearly.
• Industry and private groups should take the lead.
• Properly motivated members with significant interest and stakes connected to the problem.
![Page 16: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/16.jpg)
• Growing influence of the business sector in the political discourse and agenda setting.
• Critics fear that partnership initiatives allow transnational corporations and their interest groups growing influence over agenda setting and political decision-making by governments.
• Risks to reputation: choosing the wrong partner • Distorting competition and the pretence of representativeness. • The selection of partners is also problematic in many • Proliferation of partnership initiatives and fragmentation of
global governance. • Unstable financing – a threat to the sufficient provision of public
goods. • Dubious complementarity – governments escape responsibility.
• Selectivity in partnerships – governance gaps remain. \ • Trends toward elite models of global governance - weakening of
representative democracy
Challenges of MPs
![Page 17: A case for multi-stakeholder cybersecurity by zvavanjanja](https://reader031.vdocuments.net/reader031/viewer/2022021923/58f0a8211a28abee478b45af/html5/thumbnails/17.jpg)
Conclusion
• MPs which address security and resilience have evolved in many countries as an efficient means of protecting their CIRs.
• Each sector, public and private, brings its own, complementary strengths to the table, but such structures come with challenges in their formation, management, and effectiveness.
________ Recommendation:• Utilize a trust model; the scope of the working group needs to
be a manageable size to be effective and include those directly affected, and yet large enough to include a broader universe of those impacted.
• Incorporate a consensus model without hierarchy to allow the group to adapt and respond to fast changing conditions.
• Gain the participation and support of key governing and regulatory bodies.
• Formalize communications with stakeholder groups vs. relying on social networks