a case for multi-stakeholder cybersecurity by zvavanjanja

18
“A Case for Multi-stakeholder partnerships for critical internet resources security in the SADC Region” By Cade Zvavanjanja Director: Zimbabwe Cybersecurity Center SAIGF- 2015 Southern Africa Internet Governance Forum-15’

Upload: cade-zvavanjanja

Post on 21-Jan-2018

294 views

Category:

Government & Nonprofit


2 download

TRANSCRIPT

Page 1: A case for multi-stakeholder cybersecurity by zvavanjanja

“A Case for Multi-stakeholder partnerships for critical internet resources security in

the SADC Region”

By Cade ZvavanjanjaDirector: Zimbabwe Cybersecurity Center

SAIGF-2015Southern Africa Internet

Governance Forum-15’

Page 2: A case for multi-stakeholder cybersecurity by zvavanjanja

Introduction• Definition of the issue & Regional

specificities observed • Existing policy measures and private

sector initiatives, impediments;• What worked well & Consequences of

policy interventions,• Unresolved issues & Insights gained as

a result of the experience; and• Proposed steps for further multi-

stakeholder dialogue.

Page 3: A case for multi-stakeholder cybersecurity by zvavanjanja

Key Terms

• Internet Critical Resources• Cybersecurity• Multi-stakeholder partnership

Page 4: A case for multi-stakeholder cybersecurity by zvavanjanja

Current Global Governance & Security

Adapted from: The Center for Democracy & Technology

Page 5: A case for multi-stakeholder cybersecurity by zvavanjanja

Current Cybersecurity SADC Efforts

Page 6: A case for multi-stakeholder cybersecurity by zvavanjanja

Current Cybersecurity SADC Efforts

Page 7: A case for multi-stakeholder cybersecurity by zvavanjanja

Current Needs of SADC States

Page 8: A case for multi-stakeholder cybersecurity by zvavanjanja

Needs Cont……

Page 9: A case for multi-stakeholder cybersecurity by zvavanjanja

Stakeholder Analysis

Page 10: A case for multi-stakeholder cybersecurity by zvavanjanja

Stakeholder analysis Cont….

Page 11: A case for multi-stakeholder cybersecurity by zvavanjanja

Stakeholder Analysis cont…

Page 12: A case for multi-stakeholder cybersecurity by zvavanjanja

Stakeholder Analysis Cont…

Page 13: A case for multi-stakeholder cybersecurity by zvavanjanja

Why MPs

• An effective MP for CIRS would provide the abilities to detect threats and dangerous or anomalous behaviours, to create more secure network environments through better, standardized security programs and protocols and to respond with warnings or technical fixes as needed.

Page 14: A case for multi-stakeholder cybersecurity by zvavanjanja

MPs CharacteristicsA multi-stakeholder process must have the following characteristics:•Involvement of stakeholders in the learning process•Stakeholders work towards a common goal•Work involves different sectors and scale•The objective is focused to bring about change•Deal with structural changes•Agreements are created based on cooperation•Stakeholders deal with power and conflict consciously•Bottom-up and top-down strategies are integrated in governance and policy making

Page 15: A case for multi-stakeholder cybersecurity by zvavanjanja

MPs in-depthAn effective partnership has: • A representative group of members, large

enough to be sufficiently inclusive, but small enough to retain the ability to act quickly.

• A circumscribed role for government with specific tasks and responsibilities laid out clearly.

• Industry and private groups should take the lead.

• Properly motivated members with significant interest and stakes connected to the problem.

Page 16: A case for multi-stakeholder cybersecurity by zvavanjanja

• Growing influence of the business sector in the political discourse and agenda setting.

• Critics fear that partnership initiatives allow transnational corporations and their interest groups growing influence over agenda setting and political decision-making by governments.

• Risks to reputation: choosing the wrong partner • Distorting competition and the pretence of representativeness. • The selection of partners is also problematic in many • Proliferation of partnership initiatives and fragmentation of

global governance. • Unstable financing – a threat to the sufficient provision of public

goods. • Dubious complementarity – governments escape responsibility.

• Selectivity in partnerships – governance gaps remain. \ • Trends toward elite models of global governance - weakening of

representative democracy

Challenges of MPs

Page 17: A case for multi-stakeholder cybersecurity by zvavanjanja

Conclusion

• MPs which address security and resilience have evolved in many countries as an efficient means of protecting their CIRs.

• Each sector, public and private, brings its own, complementary strengths to the table, but such structures come with challenges in their formation, management, and effectiveness.

________ Recommendation:• Utilize a trust model; the scope of the working group needs to

be a manageable size to be effective and include those directly affected, and yet large enough to include a broader universe of those impacted.

• Incorporate a consensus model without hierarchy to allow the group to adapt and respond to fast changing conditions.

• Gain the participation and support of key governing and regulatory bodies.

• Formalize communications with stakeholder groups vs. relying on social networks

Page 18: A case for multi-stakeholder cybersecurity by zvavanjanja

Thank You

Cade ZvavanjanjaDirector - Zimbabwe Cybersecurity

[email protected]

+263 773796365