You are on page 1of 24

Volume 9, June 2021 Towards an inclusive

cyberspace
Developing Sierra

GLOBAL
Leone’s National
Cybersecurity
Strategy

CYBER -page 4-

The ASEAN-

EXPERTISE
Singapore
Cybersecurity
Centre of Excellence

MAGAZINE (ASCCE)
-page 20-

EU CyberNet - same
kid, new and larger
block
-page 28-

Gender
Empowerment in
Cyber:
GFCE Women in
Cyber Capacity
Building Network
-page 32-

WHY ARE CYBER PORTALS


IMPORTANT FOR CCB?
-page 16-
3
Volume 9, June 2021 Editorial
Global Cyber Regions Editorial
Expertise Magazine Africa
On behalf of the Editorial Board, I am pleased to welcome you
4 Towards an inclusive cyberspace: to the ninth (9th) edition of the Global Cyber Expertise Magazine!
Developing Sierra Leone’s National This edition is released in conjunction with the virtual GFCE Con-
Cybersecurity Strategy sultation Meeting 2021, an opportunity for the GFCE Community to
gather and share their ideas and input.
8 Building local partnerships helps
young Batswana to be ‘CyberSmart’ The Global Cyber Expertise Magazine is a joint initiative by the
African Union, the European Union, the Organization of American
Americas States and the Global Forum on Cyber Expertise. The Magazine aims
to provide cyber policymakers and stakeholders insight on cyber
12 Cybersecurity and the pandemic: capacity building projects, policies and developments globally.
The Importance of Public-
Private Partnerships in the In this issue, our cover story takes a look at why cyber portals
Aftermath of COVID-19 are important for cyber capacity building, from our Americas sec-
tion. The Americas section also includes an article exploring the
16 Why are Cyber Portals Important for CCB? importance of public-private partnerships in the aftermath of COV-
ID-19. From Africa, we have an article on the development of Sierra
Asia & Pacific Leone’s national cybersecurity strategy, in addition to an article
20 The ASEAN-Singapore Cybersecurity focused on building local partnerships to help young Batswana to be
‘cyber smart’. From Asia and the Pacific, we have an article highlight-
Centre of Excellence (ASCCE)
ing the development and workings of the ASEAN-Singapore Cyber-
24 The CMM in the Pacific security Centre of Excellence (ASCCE), and another article analyzing
the use of the CMM in the Pacific region. From Europe, we have a
Europe follow-up article from one of our previous issues on EU CyberNet. In
addition to the regional section, we have three articles in our global
28 EU CyberNet – same kid, developments section. Firstly, this issue dives into the GFCE Women
new and larger block in Cyber Capacity Building Network to highlight gender empow-
erment in cyber. Next, we have an article rethinking cybersecurity
capacity building based on revelations from the healthcare sector.
Global Developments Last but not least, this issue features an article on the GFCE’s region-
al approach as one of the key GFCE Strategic Building Blocks.
32 Gender Empowerment in
Cyber: GFCE Women in Cyber We thank our guest writers for their valuable contributions to
Capacity Building Network the ninth (9th) edition of the Magazine and we hope you enjoy read-
ing the Global Cyber Expertise Magazine!
36 Rethinking Cybersecurity Capacity
Building: Healthcare shows the way On behalf of the Editorial Board,

40 The GFCE’s Regional Approach David van Duren


Director of the GFCE Secretariat
4 Towards an inclusive cyberspace: Developing Sierra Leone’s National Cybersecurity Towards an inclusive cyberspace: Developing Sierra Leone’s National Cybersecurity 5
Strategy | Africa Strategy | Africa

TOWARDS AN INCLUSIVE An inclusive approach to


cyber policymaking goes hand in
Background and
Sierra Leone’s CMM
strategy development process
in particular. Subsequently, in

CYBERSPACE: DEVELOPING
hand with this by helping to en- March 2020 GPD and the Minis-
sure that views of those that are try convened a multistakeholder
affected are taken into account The process goes back to workshop to increase awareness

SIERRA LEONE’S NATIONAL


and not side-lined by securitized 2016, when Sierra Leone under- among stakeholders on cyber
and threat-driven narratives. In went a cybersecurity capacity policy issues, gather information
fact, experience from countries review (best known as a “CMM”) on the landscape, increase co-

CYBERSECURITY
that have developed their nation- carried out by Oxford’s Global ordination, and provide a space
al cybersecurity strategies in an Cyber Security Capacity Centre for stakeholders to discuss their
inclusive way has shown that this and the International Telecom- priorities and inform the process

STRATEGY
approach not only enables stake- munication Union. The final CMM of NCSS development. Shortly
holder views to be better repre- report highlighted the need for after, the COVID-19 pandemic
sented, but also helps increase Sierra Leone to develop a nation- hit worldwide and as a result,
buy-in from relevant stakeholders al cybersecurity strategy, with in-person meetings had to be put
when it comes to implementing one of the recommendations be- on hold. Despite being unable to
the strategy, thus ensuring a ing for Sierra Leone to “Embark host in-person workshops, MIC
more sustainable, effective and toward developing a National continued working on the strat-
robust response to cyber threats. Cybersecurity Strategy to set out egy and, in February 2021, they
Written by: Daniela Schnidrig, Senior Program Lead, Global Partners Digital One example is Sierra Leone, the objectives, roles and respon- convened a validation work-
who recently adopted a national sibilities necessary for achieving shop with over 80 representa-
Inclusive and human-rights based cyber policymaking is critical to realize the full cybersecurity strategy developed a comprehensive and integrated tives from different stakeholder
in consultation with local and national cybersecurity posture. groups to gather their feedback
potential of cyberspace and ensure that it continues to underpin social and economic
international stakeholders. This strategy should be aligned on the revised drafts of the Na-
prosperity and promote a society for all. Between 2018-2021, the Ministry of Information with national goals and risk prior- tional Cybersecurity Strategy and
and Communications of Sierra Leone developed its national cybersecurity strategy with Between 2018-2021, Glob- ities to be effective and provide Policy and discuss priorities and
support from Global Partners Digital (GPD) and in collaboration with other international al Partners Digital (GPD), with actionable directives.”1 With the roles in the implementation. The
implementers via the GFCE’s Clearing House Function. The development process financial support from the United strategy being a clear priority to Strategy and Policy documents
featured several instances of stakeholder consultation and capacity building to inform the Kingdom Foreign, Common- improve its cyber maturity and were adopted by the Cabinet in
wealth and Development Office resilience, Sierra Leone’s MIC got March 2021.
strategy. This article aims to share the experience and lessons learned from developing
(UK FCDO) and in collaboration to work.
Sierra Leone’s national cybersecurity strategy in an inclusive way, to help inform future with other international imple- It’s important to note that,
policymaking processes and capacity building efforts. menters, supported the process In 2018 Sierra Leone joined in addition to the strategy, Sierra
of developing Sierra Leone’s the GFCE and started liaising Leone had also been working
national cybersecurity strategy. with GPD, a UK based civil so- on other cyber efforts, such as
On the ground, the process was ciety organization whose aim is undergoing a National Cyber Risk
led by the Ministry of Information to support cyber policymaking Assessment (NCRA) supported
“There is an urgent Inclusive and Human The value of this approach and Communications (MIC). This processes to make them more by the UK Home Office, receiving
Rights Based Cyber is clear: an online environment article aims to share the experi- open, inclusive and transparent, pro bono strategy, policy and
need to reinforce Policymaking that enables individuals to exer- ence and lessons learned from and its policy outcomes more technical cybersecurity advice
cise their rights and enjoy their developing Sierra Leone’s nation- rights respecting. With support from Templar Executives, and
the importance of freedoms is a prerequisite for al cybersecurity strategy with from a cybersecurity consultant receiving support from Council
There is an urgent need user trust, which, in turn, is cru- the GFCE and the broader cyber from the region, GPD delivered of Europe’s GLACY+ project on
inclusive and human to reinforce the importance of cial for sustained uptake and use capacity building community several activities in partnership cybercrime. Given the different
rights based cyber cyber policymaking
inclusive and human rights based
in order to
of the Internet. The absence of
such conditions – where, instead,
to inform future cyber capac-
ity building and policymaking
with MIC, aimed at developing
the strategy with local stake-
initiatives going on, the informal
“Friends of Sierra Leone” group
policymaking .” realize the full potential of cyber- users fear their privacy may be efforts.. holders’ input. For example, GPD was created through the GFCE’s
space, ensuring that it continues undermined through lack of data and the Ministry co-convened a Clearing House Function. In this
to underpin social and economic protection or due to pervasive civil society training workshop regard, the GFCE played a crucial
prosperity and promote a society surveillance – has been identified in December 2019 to build the role in providing a platform for
for all. as one of the key obstacles for capacity of civil society groups implementers supporting Sier-
meaningful access and future to enable them to engage in ra Leone to stay informed and
growth of the digital economy. cyber policy discussions, and the coordinated. In addition, different
6 Towards an inclusive cyberspace: Developing Sierra Leone’s National Cybersecurity Towards an inclusive cyberspace: Developing Sierra Leone’s National Cybersecurity 7
Strategy | Africa Strategy | Africa

Lessons learned tion, and actively seek to avoid


duplication. Mechanisms like the
GFCE Clearing House can play a
critical role in facilitating this type
Meaningful stakeholder input can
of coordination.
lead to better informed policy
Cybersecurity affects a It’s a marathon, not a sprint
range of different stakeholders,
many of whom have differing Projects that seek to impact
experience and areas of expertise government policy processes in
on the subject. Much of this is un- a sustainable way should take
likely to exist within government note of the average length of the
alone. Bringing different stake- policy process on the ground, as
holder groups’ rich expertise into well as pandemic related delays.
cyber policymaking processes Short-term interventions are
can help foster a more accurate unlikely to be effective as they
and evidence-based picture of may fail to cover the full length of
the cybersecurity landscape, the the process. This, compounded
possible implications of different by the COVID-19 pandemic and
policies being considered, and restrictions related to curbing its
how best to engage with those spread, has the potential to intro-
other stakeholders during a pol- duce more delays that can affect
Figure 1. Multistakeholder workshop participants, March 2021. Figure 2. From left to right, Permanent Secretary of the Ministry of Information and
icy’s implementation. Sierra Leo- project implementation. There-
Communications of Sierra Leone, Mr. Kenneth Adu-Amanfoh, Hon. Minister of Informa-
ne’s strategy reflects stakehold- fore, flexibility in project timelines
tion and Communications Mohamed Rahman Swaray, and Ag. Director of Communica-
ers’ priorities, and the buy-in built can contribute to project success.
tions Mr. Mohamed Jalloh.
GFCE events presented oppor- through the consultations has the
tunities for the different imple- “Sierra Leone’s potential to make the implemen- Inclusive processes are themselves
menters to meet with each other
strategy reflects tation process smoother. a way to build capacity “Sierra Leone’s REFERENCES1
and with the Sierra Leone Gov- 1. Page 17, Cybersecurity
ernment.
stakeholders’ Ensuring coordination between The value of stakeholder strategy reflects Capacity Review, Republic of
engagement extends beyond Sierra Leone. Global Cyber
As a result of project ef- priorities, and the
the donor and implementer
creating better policy outcomes stakeholders’ Security Capacity Centre, Ox-
communities is essential
forts, the strategy development and ensuring effective implemen-
process featured strong multi- buy-in built through There are often numerous tation– it also acts as a capacity
priorities, and the ford Martin School, University
of Oxford, and International
stakeholder engagement and
contributed to a rights-based the consultations
donors and implementers op-
erating in a given environment
building effort in itself. buy-in built through Telecommunications Union.
https://cybilportal.org/projects/
approach to cyber policymaking
has the potential
with similar activities, and a lack Depending on the exist- the consultations cmm-review-sierra-leone/
in Sierra Leone, as evidenced by of coordination mechanisms and ing interest and capacity of
a commitment to protecting and
to make the measures can, for example, result local stakeholders, additional has the potential
promoting human rights being in multiple events which seek to investment and efforts might be
featured in the strategy.
implementation address similar issues and invite necessary to facilitate meaningful to make the
similar target groups. Insufficient engagement and leverage the
process smoother.” activity coordination can there- knowledge and expertise that implementation
fore contribute to fatigue among stakeholders can bring to the
local actors, risks stretching their process. The above-mentioned
process smoother.”
capacity to engage and remain training workshop hosted in
interested, and threatens local December 2019 illustrates this:
buy-in. Mitigation of this situation the event was a way to increase
relies on deliberate coordination awareness and build the capacity
efforts by both donor and imple- of civil society groups to be able
menter communities to identify to subsequently engage in the
potential overlap, share informa- strategy development process.
8 Building local partnerships helps young Batswana to be ‘CyberSmart’ | Africa Building local partnerships helps young Batswana to be ‘CyberSmart’ | Africa 9

BUILDING LOCAL Many of the messages pertinent


to the lives of young people also
• InFuture Foundation: A
non-governmental organiza-
‘Just as we teach our chil-
dren how to tie their shoes or

PARTNERSHIPS HELPS
apply to those in other age cat- tion (NGO) delivering eB- ride a bike, we must also educate
egories. In devising a campaign otho - a program dedicated them about the risks of the inter-
that would be translatable to to raising cyber awareness net and how to adopt safe online

YOUNG BATSWANA TO
all age groups, it was therefore among young people. practices. The CyberSmart BW
essential that digital content was • Inspired Horizons: A campaign is designed to teach
carefully combined with tradi- non-governmental, non-profit young people about both the

BE ‘CYBERSMART’
tional print and broadcast media, making youth organization risks of the internet, and the pre-
which continues to have broad which focuses on youth de- cautions they can take to protect
national reach. velopment and skills building themselves.’
through innovative education
Working collaboratively and capacity building. The campaign ran along two
• Ministry of Transport and parallel tracks; the first being
with local stakeholders Telecommunications: The a public information campaign
leader of national Cyberse- including TV and radio broad-
Building connected net- curity and Cyber Resilience casts, online forums and a media
works has always been at the programs and initiatives workshop; the second being an
very heart of the work of Cyber- • Botswana Communications interactive digital competition
Written by: Cyber4Dev Communications Team 4Dev. At the core of our work is Regulatory Authority (BO- throughout October 2020.
the endeavor to mentor, support CRA): The telecommunica-
Established in 2018, Cyber4Dev, funded by the European Union, aims to support the and encourage our partner coun- tions sector regulator provid- Working with local influenc-
tries to enhance not just their ing oversight of the growing er Zeus Bantsi and broadcasters
capabilities of nations across the globe to formulate and implement strategies and
technical cyber capacities, but cyber environment in Botswana, a series of public in-
campaigns that increase cyber resilience. To achieve this, our project works collaboratively their ability to engage, encourage formation videos were developed
with partners and stakeholder organizations across nine priority countries as well as our and build the cyber literacy of aimed at increasing awareness
growing network of associate countries in Africa, Asia and the Americas. In response their citizens, enabling them to “Just as we teach of online threats and providing
to an increasing number of socially engineered cyber scams aimed at young people, in maintain strong cyber resilience viewers with the tools to combat
October 2020 the Cyber4Dev worked in conjunction with local partners in the Republic in their everyday lives. our children how them. The videos provided tips
on encryption, creating strong
of Botswana and embarked on a month long Cyber Hygiene campaign ‘CyberSmartBW’
The project has been en-
to tie their shoes passwords, protecting social
with the aim of raising the awareness of the importance of good cyber hygiene. gaged in Botswana since 2018, or ride a bike, we media profiles and securing net-
working alongside the Ministry works.
of Transport and Communica- must also educate
tions, the Botswana Commu- Following tips from the pub-
nications Regulatory Authority them about the risks lic information campaign, young
(BOCRA), as well as local and people were challenged to show-
Over the past decade, The efforts to inform and encourage engineering, scams and black- regional stakeholders in support of the internet and case their own creative flair and
Republic of Botswana has been strong and resilient cyber citizens mail. Cyber hygiene teaching in of Botswana’s efforts to further digital savvy through the creation
on an accelerated drive to join has never been more important. schools is still limited and so far, increase its cyber capacity. how to adopt safe of short two minute videos and
the digital revolution. Adoption the media has not picked up on social media posts aimed at edu-
of digital technologies in vari- the potential dangers of poor Botswana has a number of
online practices.” cating their peers of the dangers
Developing a
ous spheres of society has seen cyber hygiene. niche organizations operating of cyber risks, with prizes for the
internet penetration in the coun- Digital First Cyber within the youth services space. top four entries.
The Campaign
try grow by over 600% between Awareness campaign In the ever evolving digital As a project, we have observed
2010 and 2020 and in an increas- media landscape, where mobile the crucial role that local grass- The competition asked en-
ingly digitized world, the volume devices are quickly becoming the root partners play in designing CyberSmartBW was trants to consider -
of cyber scams and hacks on Like many countries, despite dominant means of accessing and implementing campaigns. launched in September 2020
everyday citizens continues to its growing digital connectivity, information, the need to develop Working alongside our experts by the Deputy Head of the EU Why cyber security is impor-
rise. Botswana is no different in Botswana is still on a journey to innovative and engaging content Nick Small and Sylvia Beamish, Delegation to Botswana, Silvia tant to their lives?
this respect and with a young expand its digital and cybersecu- that can easily be shared online the ‘CyberSmartBW’ campaign Bopp-Hamrouni who remarked;
and growing population, the rity awareness. Young people are is paramount to the success of was implemented in collaboration How can they protect them-
importance of supporting local particularly vulnerable to social public awareness campaigns. with: selves from attacks?
10 Building local partnerships helps young Batswana to be ‘CyberSmart’ | Africa Building local partnerships helps young Batswana to be ‘CyberSmart’ | Africa 11

guided them on how to report


about the threats at hand and
thus enabled them to fully under-
stand the public interest aspect
of cyber security.

“The topic of cyber


security is often one
that is veiled by a
level of complexity
meaning that it is
often overlooked
Figure 1. Cyber Smart BW campaign logo.
by the media.” Figure 2. Ambassador Jan Sadek with Selwana Motsemeng.

Lessons Learned
Legacy and continuing
Why is this important
The result? The competition to build momentum
garnered over 100 long listed for policy makers? • Building partnerships– Rec- • Sharing experiences – At its • A Repeatable Solution –
entries, with young people from Creating campaigns with Creating campaigns with ognizing that developing and very heart, the campaign While the campaign was de-
across Botswana presenting their citizen participation at their core citizen participation at their core maintaining cybersecurity was designed to provide a signed and developed specifi-
view on ways to tackle scammers gives policy makers a rare insight gives policy makers a rare insight and promoting cyber hy- platform for young people cally for Botswana, it can be a
and build resilience. into how cyber awareness, or into how cyber awareness, or giene is a continuous effort, to share their experience template for similar programs
lack thereof, can impact upon the lack thereof, can impact upon the it is vital that a broad range online and to use this to in other environments. The
The Impact lives of the people that policies lives of the people that policies of stakeholders are engaged devise innovative messages approach, tools and content
are designed to serve. Working are designed to serve. Working and contribute– building a regarding the importance of developed, can provide a ba-
collaboratively with local expert collaboratively with local expert network of supportive part- staying safe online. With their sis for jump-starting targeted
By design, the campaign practitioners, who work with practitioners, who work with ners. As highlighted in Bot- unique understanding of how campaigns to promote cyber-
was ambitious in its overall goal young people directly, also allows young people directly, also allows swana’s National Cybersecu- they and their friends use the security and cyber hygiene
to start conversations about on- for practical discourse to take for practical discourse to take rity Strategy, participation of internet each day, which plat- and, importantly, to help
line safety and increase the cyber place in a way that is relevant place in a way that is relevant civil society is key to reaching forms they rely on, and what establish the much-needed
awareness of young people in and meaningful to the target and meaningful to the target out into the community and threats they are exposed cooperation and collabora-
Botswana. As lofty a goal as this audience. audience. promoting the importance of to, campaign participants tion across sectors.
was, judging from the response staying safe online. The cam- brought real-world knowl-
and engagement that the cam- Galvanizing media interest paign focused on this, estab- edge to bear in developing
paign received it was clear that lishing partnerships between promotional messages that
engaging young people in se- The topic of cyber security is the public sector and civil resonated with the target
rious conversations about their often one that is veiled by a level society organizations, and audience.
lives online was invaluable in of complexity meaning that it is importantly, creating a net- NOTES
enabling them to express their often overlooked by the media. work of CSOs that embraced For more information, visit:
understanding of cyber risks, as As part of the national promo- the objectives of promoting www.cyber4dev.eu/botswa-
well as enabling us to gather a tional campaign, we were able cyber hygiene. na-cybersmartbw-campaign/
true insight into their digital lives to engage 35 local journalists at
and the potential risks they are an interactive workshop which
exposed to. helped to demystify cyber scams,
12 Cybersecurity and the pandemic: The Importance of Public-Private Partnerships in the Cybersecurity and the pandemic: The Importance of Public-Private Partnerships in the 13
Aftermath of COVID-19 | Americas Aftermath of COVID-19 | Americas

CYBERSECURITY AND THE factors associated with protect-


ing national security when shar-
“The likelihood of a
PPP succeeding is
• Open Communication: As
both sectors have specific

PANDEMIC: THE IMPORTANCE


ing more classified and sensitive expectations, compromise is
information. At the same time, usually required. Clear and
companies, may be concerned commonly observed honest communication is vital

OF PUBLIC-PRIVATE
with the confidentiality and pro- to establish pragmatic and
tection of their data maintained
to be based on the stimulating common expec-
by the public sector. Nonethe- existence of a robust •
tations.
Reciprocity Approach: The

PARTNERSHIPS IN THE
less, an increasing trend shows
governments and industry alike framework, entailing discouragement of a part-
recognize that mutual informa- nership is commonly driven
defined principles,
AFTERMATH OF COVID-19
tion exchange is within national by hesitation and disinterest
security interest, as threats can from both partners. Culti-
significantly damage both sec- inputs, and expected vating active participation
tors. through resource and knowl-
benefits by both edge sharing should be at the
Coordination is particularly forefront of discussions and
vital when it comes to protecting
the government activities.
Written by: Mariana Jaramillo, Cybersecurity Program Intern, CICTE/OAS critical infrastructure. Globally,
85% of critical infrastructure is
and industry” • Legal Basis: Cybersecurity is
highly interdisciplinary, involv-
The COVID-19 pandemic has accelerated the reliance on digital platforms to perform privately owned. In Latin Amer- ing many entities from both
daily and essential activities, making them increasingly susceptible to cyberthreats.
ica, private investment in critical Recommendations for sectors. Thereby, developing
infrastructure is 56%, where- Partnership Success a legal basis in the form of a
According to the Unisys Security Index, since the beginning of the global pandemic, as 44% is attributed to public national legal act or a memo-
cybercrimes have increased up to 74% in Latin America and the Caribbean (LAC). These investment. Given the propor- randum of understanding can
cyberthreats are increasingly becoming more sophisticated and complex, outpacing both tionately equal investment of Public-private cybersecurity consolidate a coordinated
the governmental and private sector’s ability to respond, but represents an opportunity both sectors, protecting national partnerships must continuously framework.
to handle cybersecurity challenges jointly and face them as a shared responsibility. The assets is an intertwined interest. adapt to effectively respond both • Inclusion of SMEs: Many
Meaningful collaboration in a PPP reactively and proactively with SMEs provide third-party
devastating effects of the pandemic on the region call for the need to reinforce and
is perceived to rely on articulat- the necessary agility to combat services to large and critical
revise cybersecurity Public Private Partnerships (PPP) as an approach to address shared ing mutual benefits and value the dynamic environment of service providers. The in-
threats. propositions within this context. cyber threats. The likelihood of a volvement of SMEs and start-
PPP succeeding is commonly ob- ups in PPPs can increase their
The Road to Recovery nearly 1.6% of the region’s GDP in a highly interdependent cyber- The benefits of PPPs go be- served to be based on the exist- experience, cybersecurity
– PPP in the Cyber and 9.5% of the current cost of security landscape. Particularly, yond information sharing. Part- ence of a robust framework, en- capacity and drive for inno-
cybercrime worldwide. This has cyberthreat intelligence sharing nerships have the potential to re- tailing defined principles, inputs, vation.
Pandemic
undeniably been exacerbated regarding attackers and their spond to cyberthreats, as well as and expected benefits by both • Point of Contact: Common-
due to the pandemic-driven vul- associated methods, enables adopt more proactive approach- the government and industry. ly, multiple public bodies are
Strengthening cybersecuri- nerabilities of the “new normal.” organizations to better prepare es to cybersecurity. PPP is shown involved in PPPs, such as the
ty is a determining factor in the Contrary to the assumption that for and respond to risks. Build- to be optimal for building cyber- The European Union Agen- Ministry of Defense, Ministry
advancement of LAC’s digital underfunding in cybersecurity is ing on the premises of collective security capacity to close the cy for Network and Information of International Affairs and
transformation. The impact of a significant factor for increased response to cybersecurity, infor- gap of notorious cyber breaches Security (ENISA) has identified Ministry of Economy. Ap-
the pandemic on digitalization threats, the primary reason for mation exchange contributes to in the region. An effective PPP the following recommendations pointing a government point
has increased world spending in successful cyberattacks is often trusted and transparent partner- cybersecurity framework can cre- to mitigate any potential collab- of contact that coordinates
the cybersecurity industry, with the sectors’ isolated response to ships. Consequently, information ate an environment that protects oration discrepancies and ensure public entities’ efforts is fun-
a forecast amounting to US$54 constantly evolving cyberthreats. sharing is commonly perceived and nurtures innovation. effective PPP evolvement: damental to ensure coherent
billion by 2021. However, accord- Considering the complexity and as one of the most valuable communication internally and
ing to the OAS-IBD 2016 Cyber- interconnectedness of the cy- commodities in industry-govern- with the private sector.
security Report, the financial berspace, no sector can address ment partnerships, despite being
damage caused by cybercrime in regional cybersecurity alone. a challenging element to achieve.
Latin America and the Caribbe- In the public sector, the hesita-
an represents more than US$90 The benefits of collective ac- tion to exchange information
billion per year, amounting to tion in cybersecurity are evident can mainly be attributed to the
14 Cybersecurity and the pandemic: The Importance of Public-Private Partnerships in the Cybersecurity and the pandemic: The Importance of Public-Private Partnerships in the 15
Aftermath of COVID-19 | Americas Aftermath of COVID-19 | Americas

tion of projects that can develop Cybersecurity Innovation Fund – Project beneficiaries examples
local cybersecurity solutions Country Name of the Project Project Description
in the context of the COVID-19
pandemic. The first edition of the Argentina NGEN Programmable and configurable infrastructure software capable of supporting the
fund demonstrated the region’s management of security incidents in the scope of work of a CSIRT.
talent, as 117 nominated projects
from distinctive sector organiza- Brazil The LGPD Data Hunter Text mining software to identify confidential information stored on organization
tions participated. The proposed devices
projects are segmented in eight
categories related to cybersecu- Chile Programing our Future Basic cybersecurity training targeted for female teenagers.
rity: education and awareness,
critical infrastructure, capacity
development, national agencies Colombia Hackers wanted Initiative to strengthen technical and educational capacities in cybersecurity at EAN
and public policies, cybersecurity University.
innovation for small and medi-
um-sized enterprises (SMEs), Mexico Interactive on Digital Security in Portal that provides recommendations on digital security for educators, children and
Figure 1. Cybersecurity Innovation Fund 2020 banner.. digital crime, incident response Indigenous Language adolescents, and parents of indigenous communities.
mechanisms, and remote work.
Uruguay ModSecIntl Portal that provides recommendations on digital security for educators, children and
A key component of this adolescents, and parents of indigenous communities.
“In 2019, the OAS Cybersecurity PPP is the capacity to enable
the diversification of cyberse- Figure 2. Cybersecurity Innovation Fund, examples of project beneficiaries.
and Cisco created Innovation Councils:
curity solutions through par-
How the public and ticipation from the civil sector,
the Cybersecurity private sectors can which expands their scope with In an increasingly challeng-
enhance alternate the inclusion of distinctive so- ing digital environment, the pro-
Innovation Councils cietal groups. Likewise, more tection of cyberspace requires
cybersecurity solutions
in Latin America, in the region
than half of the winning projects
have a gender and diversity
collaborative action. Considering
the dynamic and borderless na-
a space for multi- approach in their leadership and ture of cybersecurity, public and
expected project impact. The private sector cooperation is vital
stakeholder In 2019, the OAS and Cisco twelve selected projects are led to mitigate risks and strength-
created the Cybersecurity Inno- by organizations based in Ar- en capacities that adequately
collaboration, which vation Councils in Latin America, gentina, Brazil, Chile, Colombia, encounter regional vulnerabilities.
a space for multi-stakeholder Mexico, and Uruguay. In a region The damages inflicted by cyber-
aims to provide collaboration, which aims to severely affected by COVID-19, crime in Latin America and the
provide solutions to the cyberse- this Fund and, most importantly, Caribbean during the COVID-19
solutions to the curity gaps and risks faced in the the cybersecurity projects that pandemic call for the expansion
cybersecurity gaps region. The initiative represents
joint effort between the public
were selected, show that talent
can come from different sources
of amultistakeholder approach to
cybersecurity. Policymakers and
and risks faced and private sectors to democ- and that through collaboration, cooperation can leverage Public
ratize and improve cybersecu- they can be expanded to provide Private Partnerships as an effec-
in the region.” rity capacities in Latin America solutions to diverse cybersecurity tive instrument to reaching com-
through education, dialogue, and challenges. A few of the selected mon agendas. The entrenched
support to civil society stake- projects include: nexus of both sectors lies on a
holders. common goal: raise the level of Figure 3. Cybersecurity Innovation Fund, map of project beneficiaries.
As a continuity of the part- cybersecurity for the security
nership, and with the added and economic prosperity of the
support of the Citi Foundation, region.
the Cybersecurity Innovation
Fund was created. The fund, en-
dowed with US $200,000, seeks
to foster innovation in the execu-
16 Why are Cyber Portals Important for CCB? | Americas Why are Cyber Portals Important for CCB? | Americas 17

WHY ARE ples are UNIDIR’s Cyber Portal,


the GFCE’s Cybil Portal, OAS’s
Observatorio de Ciberseguridad
Level-specific Portals:
These are the portals that focus
on mapping international, re-
Building national
capacities through
Portals

CYBER PORTALS
and, more recently, the Brazilian gional and/or national cyberse-
Cybersecurity Portal (Portal Bra- curity developments. UNIDIR’s
sileiro da Cibersegurança), devel- Cyber Policy Portal, for example, In April 2021, the Igarapé
oped by the Igarapé Institute. provides an extensive map of Institute launched the Brazilian

IMPORTANT
UN Member States’ profiles and Cybersecurity Portal - one of the
“Cyber portals cyber policies. first portals fully dedicated to the
mapping the national environ-
play an important Theme-specific Portals: ment and discussion. The Portal

FOR CCB?
Those that are dedicated to one gathers more than 70 documents
role in assembling, or multiple thematic areas with- and 100 national initiatives from
communicating, and out the demarcation or explicit 10 sectors, seeking to systema-
commitment to one specific level tize and map the national cyber-
facilitating access to of analysis (national/regional/ security governance landscape,
international). This is the case that is, the key institutions,
information about of Diplo Foundation’s Geneva norms, and history of the field in
Written by: Louise Marie Hurel, Digital Security Program Lead, Igarapé Institute Internet Platform Digital Watch Brazil.
cybersecurity.” Observatory that monitors and
Cyber portals play an important role in assembling, communicating, and facilitating provides an overview of issues In so doing, our objective
that range from cybersecurity was (and is) to (i) shed light on
access to information about cybersecurity – helping policymakers, diplomats, civil The rise of Cyber
and human rights to economic the particularities of cyber policy
society organizations, academia, and the private sector in making sense of the growing Portals and infrastructure-related ones. taking place in the national agen-
landscape of initiatives and policies. As different organizations develop international and Another example is the GFCE’s da, (ii) integrate knowledge from
regional portals, the Igarapé Institute has recently launched the Brazilian Cybersecurity Cybil Portal that focuses map- different sectors in developing
Portal to map the country’s national cybersecurity governance landscape. Louise Marie Cyber portals play an impor- ping cyber capacity building ini- their respective policies, and (iii)
shares below some reflections on the importance of Cyber Portals to CCB and the lessons tant role in assembling, commu- tiatives and creating knowledge contribute to raising the baseline
nicating, and facilitating access that can foster better targeted understanding of the current ca-
learned from the process of developing the national portal.
to information about cybersecu- initiatives. pacities and gaps for multistake-
rity. They are both a resource for holder collaboration in national
other sectors looking to under- Repositories: Initiatives that cybersecurity.
stand and navigate some of the are primarily dedicated to the
A complex landscape of cyber norms, in particular, the tions, and spaces in which these latest developments in the field consolidation of a digital archive The Portal is the result of
applicability of international law discussions take place. However, and an important mechanism for cybersecurity or presenta- over two years of data collec-
to cyberspace. Regionally, many amidst a growing patchwork of that can support organizations tion of the result of a mapping tion and a series of interviews,
From the Morris worm to the organizations such as the OAS, initiatives, policymakers, diplo- in planning their own capacity exercise. The National Security consultations and meetings with
Colonial pipeline ransomware at- OSCE and ASEAN have sought mats, civil society organizations, building efforts. Some portals Archives Cyber Vault Library experts from different sectors.
tack, the past 30 years have been to work with member-states on academia, and the private sector focus on a thematic issue-areas provides primary-source mate- More importantly, it is one of the
marked by the increasing notori- the consolidation of cyber–Confi- are faced with the challenge of and others on specific levels of rial that ranges from court case responses to a diagnostic anal-
ety of both the vulnerability and dence Building Measures. Na- keeping up with the growing field analysis (national, regional, or documents, to maps and glos- ysis of the national landscape
interconnectedness of systems, tionally, governments have been and navigating what has become international) or sectors. Rather saries. The OAS Cybersecurity in which we had identified that,
networks and infrastructures. All developing their national cyber- a fragmented landscape of activ- than ideal types, there are some Observatory is another example while all sectors understand the
sectors have not only witnessed security strategies and other ities. basic characteristics that enable of a portal that has sought to importance of building cyber ca-
but also increasingly sought to policies that establish minimum portals to target and actively periodically map cyber capacities pacities and shared responsibility
include cybersecurity as a key standards for cybersecurity In response to this chal- respond to knowledge gaps in and maturity across countries in in doing so, there were some
concern in technical and policy across sectors. lenge, different organizations cybersecurity. A few examples the Americas region. challenges for action, namely:
development. Internationally, have started to develop a range include: (i) a lack of shared vocabulary
discussions at the Open-End- All these developments of repositories and portals to ag- to address cybersecurity threats
ed Working Group and the UN have contributed to what today gregate, organize and make avail- and risks; (ii) existence of varying
Group of Governmental Experts is a rich and complex landscape able information about norms level of cyber maturity across
have revolved around the devel- of policies, standards, actors, and initiatives in a systematic sectors; (iii) lack of normative,
opment and operationalization projects, CCB initiatives, institu- and accessible way. Some exam- strategic, and operational align-
18 Why are Cyber Portals Important for CCB? | Americas Why are Cyber Portals Important for CCB? | Americas 19

“More than a shared


responsibility,
cybersecurity
requires consistent
collective action
– and Portals are
one way of levelling
the playing field of
Figure 2: Cybersecurity Timeline in Brazil // Source
understandings.”
Figure 1. Cybersecurity Innovation Fund 2020 banner..
A complex landscape Finally, our experience in Translating how cybersecu- Last, but certainly not least,
building a national portal and rity is framed within a specific portals can also be an invita-
collaborating with other portal country. Beyond international tion for sectors to contribute to
More than a shared respon- developers has shown that there documents, national data allows collectively building knowledge
sibility, cybersecurity requires are multiple benefits in consol- for different sectors to better on cybersecurity. All sectors
consistent collective action – and idating knowledge that go well understand how cybersecurity have an important role to play
Portals are one way of levelling beyond facilitating access, such is approached in a particular in providing information and
the playing field of understand- as: country and/or region. Some jointly building what is a holistic
ings. By integrating knowledge governments have concentrated account of national capacities,
and working on strengthening Mapping existing poli- the development of a nation- policies, and institutions. NGOs
cyber capacities, they serve as cies and what has already al cybersecurity agenda to the and think tanks can meaningful-
an increasingly relevant tool for been achieved. Especially at ministry of economy, others to ly contribute to the discussion
national and international policy the national level and in devel- the ministry of defense, tracking and development, ensuring that
development. oping countries, it might seem these developments allows for a mapping efforts are reflective of
that cybersecurity is a relatively better positioning of the debate human rights, provide greater
Academia and civil society new subject. What we found is within these national realities. transparency over cybersecu-
Figure 1: Mapping Brazil’s Cybersecurity Governance Ecosystem // Source organizations have an important that this is not always the case rity policy and integrate a hu-
role to play in developing and – Brazil, for example, has only Going beyond the ‘usual man-centric approach to new
implementing CCB initiatives launched its national cyberse- suspects’ or cybersecurity ex- initiatives.
ment; and (iv) different under- protection and others. The Brazil- such as building repositories and curity strategy in 2020, but has perts. Depending on the portal,
standings of specific and shared ian cybersecurity Portal responds facilitating access to knowledge, engaged in the subject since the it can serve as an important hub
risks across sectors – to name a to those challenges by provid- especially at the national level – early 2000’s at least. for both experts working in the
few. ing a repository of legislations, as many of the examples in the field, but also to students, poli-
policies and official documents; sections above show. Many of Identifying gaps in policy cymakers and others that might
Portraying the national an interactive map of key actors these organizations are actively and institutional development. not be acquainted with cyberse-
cybersecurity governance land- (and what they have produced following cybersecurity debates By gathering policy data in a curity.
scape can be a challenging task so far in terms of cybersecurity); in different sectors, continually systematic and methodologically
due to the fast-paced changes a timeline of key developments; work with primary open-source rigorous manner, we were able
in regulation, the shifting and and recommendations for an data, and engage with key ex- to understand some trends in
evolving institutions, and the integrated and multistakeholder perts in the field. policymaking across the years
sometimes-blurry lines between approach to digital security risks. – such as the securitization and
concepts such as cybersecurity, militarization of the cybersecurity
cybercrime, critical infrastructure agenda from 2008-2016 and an
increasing push towards sector
specific regulations and data pro-
tection and security since 2018.
20 The ASEAN-Singapore Cybersecurity Centre of Excellence (ASCCE) | Asia & Pacific The ASEAN-Singapore Cybersecurity Centre of Excellence (ASCCE) | Asia & Pacific 21

THE ASEAN-SINGAPORE discussions, which is a key step


towards achieving security and
resilience in cyberspace.

CYBERSECURITY Singapore believes that


in order to be effective, cyber

CENTRE OF
capacity building should be a
shared responsibility and recip-
rocal endeavor amongst various
stakeholders. Cyber capacity

EXCELLENCE (ASCCE) building programs should also be


sustainable and politically neutral
so as to effectively address the
needs of a diverse set of coun-
tries in the long-term. In addition,
a coordinated capacity building
effort is needed to minimize
Written by: : Ka Man Yip, Head of Capacity Building Programs, Cyber Security Agency Singapore overlaps and ensure resources
are channeled to areas where
Cyber capacity building serves an effective tool, not only to strengthen our collective they are needed most. To this
cybersecurity posture, but also enable countries to contribute meaningfully to international end, taking a regional approach
to capacity building is useful as it
discussions, which is a key step towards achieving security and resilience in cyberspace.
allows for sharing of experienc-
The Association of Southeast Asian Nations (ASEAN), as a region, has recognized the es when dealing with problems
importance of coordinated capacity building at both the policy and technical levels. In the relevant to the region. This also
first ever ASEAN Leaders’ Statement on Cybersecurity Cooperation issued in 2018, under helps to build and strengthen
Singapore’s ASEAN Chairmanship, ASEAN Leaders tasked relevant Ministers to closely the network of officials dealing
consider and recommend feasible options to coordinate regional capacity building. It with cybersecurity issues who
assist one another during times Figure 1. ASCCE office.
is with these guiding principles that Singapore established the ASEAN Cyber Capacity
of need.
Program (ACCP) in 2016, which was subsequently expanded with the establishment of a
full-fledged ASEAN-Singapore Cybersecurity Centre of Excellence (ASCCE) in 2019.
What Singapore is
doing and the ASCCE of cyber policy, operational and ticipants for practical hands-on
technical capacities amongst experience.
It is with these guiding prin- senior ASEAN officials.
Importance of Cyber have to progress in tandem and capacity of each State to prepare ciples that Singapore established To date, we have organized
Capacity Building achieve tangible outcomes. We for and respond to cyber threats. the ASEAN Cyber Capacity Pro- The ASCCE has three prin- 18 distinct capacity building pro-
cannot afford to have a break in There is a global consensus on gram (ACCP) in 2016. In response cipal functions. First, it conducts grams on topics ranging from
momentum and need to continue the importance of cyber capac- to the positive feedback from research and provides training cybersecurity strategy, norms,
Cybersecurity is both a with cyber capacity building as it ity building in ensuring a more our partners in the region and on national cybersecurity strate- Confidence Building Measures
transnational and multi-discipli- is an effective tool to forge inter- secure and stable cyberspace as beyond, and with a view of better gy, legislation and cyber norms. (CBMs), international law, to
nary issue which requires interna- national cooperation to ensure an illustrated in the Final Substan- coordinating and delivering our Second, the ASCCE provides CERTs and incident-response
tional partnerships and cross-re- open, secure, stable, accessible, tive Report of the United Nation cyber capacity building pro- Computer Emergency Response related skills. In total, we worked
gional cooperation. The current interoperable, and peaceful ICT Open-Ended Working Group grams, the ACCP was expanded Team (CERT) training, focusing with 7 governmental partners
pandemic has emphasized our environment. on developments in the field of with the establishment of a full- on technical CERT-related skills and more than 22 non-govern-
increasing dependence on the information and telecommuni- fledged ASEAN-Singapore Cy- as well as the exchange of infor- ment partners from the industry
digital domain. This dependence As clichéd as it may sound, cations in the context of interna- bersecurity Centre of Excellence mation and best practices relat- and academia to deliver these
has been accompanied by in- we are only as strong as our tional security. Capacity building (ASCCE) in 2019. The ASCCE ed to cyber threat and attacks. courses to over 700 participants
creased risks and vulnerabilities. weakest link. The international will not only strengthen our col- which was set up with a commit- Lastly, the ASCCE also partners across all 10 ASEAN Member
As the cybersecurity threat land- community’s ability to prevent lective cybersecurity posture, but ment of SGD$30 million (approx. with academia for a Cyber Range States (AMS).
scape continues to evolve rapidly, or mitigate the impact of mali- also enable countries to contrib- USD$22.5 million) continues to to deliver virtual cyber defense
our discussions on this matter cious ICT activity depends on the ute meaningfully to international support a coordinated build-up training and exercises to par-
22 The ASEAN-Singapore Cybersecurity Centre of Excellence (ASCCE) | Asia & Pacific The ASEAN-Singapore Cybersecurity Centre of Excellence (ASCCE) | Asia & Pacific 23

“Regional Challenges to Cyber However, challenges remain. Future of Cyber tions implement such norms. To- “It would also be
Capacity Building There have been increasing calls Capacity Building gether with UNODA, Singapore
organizations for better coordination of in- will work with partners in ASEAN useful for the GFCE
ternational and regional cyber to help developing countries im-
have risen to the The last decade and a half capacity building efforts so as We also need to acknowl- plement these norms under the community to start
has seen a rise in global aware- to ensure that global resources edge that limiting ourselves to United Nations-Singapore Cyber
challenge, and ness on the importance of coor- are maximized and efforts are only identifying capacity building Program (UNSCP) workshops.
considering these
many regions now dinated international cyber ca-
pacity building efforts in building
not duplicated. There have also
been calls for global repositories
needs is insufficient. We will need
to develop metrics to measure Lastly, alongside with the
cyber adjacencies
have dedicated a secure and stable international and portals where information the effectiveness of cyber ca- COVID-19 pandemic and an al- and how it would
and regional cyberspace. Region- on capacity building activities pacity building programs, so that ways changing cyber and digi-
cyber capacity al organizations have risen to the can be made available, so that timely adjustments can be made tal landscape, we have seen an impact the future
challenge, and many regions now the international community can to the content and delivery of acceleration of a growing overlap
building initiatives. have dedicated cyber capaci- identify synergies and build on programs and ensure their value between cyber and cyber adja- trajectory of cyber
ty building initiatives. ASEAN, them to better coordinate our and effectiveness. This will ensure cencies such as data and supply
ASEAN, as a region, as a region, has recognized the global efforts for a more collabo- that the resources committed to chain security and disinformation, capacity building.”
has recognized importance of coordinated ca-
pacity building at both the policy
rative and sustainable approach
to cyber capacity building.
capacity building are prudently
used and maximized.
as well as emerging technology
issues such as AI, Quantum Com-
the importance and technical levels. In the first
ever ASEAN Leaders’ Statement The Cybil Portal established Singapore sees the impor-
puting and Cloud. There is a need
for cyber capacity building to ad-
of coordinated on Cybersecurity Cooperation by the GFCE is a good initiative tance in measurable outcomes of dress these new gaps as we have
issued in 2018, under Singapore’s that has enabled us to tap on the cyber capacity building programs also been receiving feedback and
capacity building at ASEAN Chairmanship, ASEAN rich exchanges of cyber capaci- so as to ensure the effectiveness interests from AMS on capacity
Leaders tasked relevant Ministers ty building initiatives which help of these programs as well as the building around such issues. As
both the policy and to closely consider and recom- foster public-private partnerships effective channeling of resourc- the ASCCE is demand driven, we
mend feasible options to coordi- and optimize resources. Closer to es to address these capacity are looking to delve more into
technical levels.” nate regional capacity building. home, the ASCCE strives to work gaps. In this regard, Singapore is programs which will more tightly
with AMS, ASEAN Dialogue Part- working on a metrics framework link policymakers with the oper-
ners as well as our colleagues at to measure the effectiveness of ational aspects of cybersecurity,
the ASEAN-Japan Cyber Capac- the various initiatives that we are as well as programs on securing
ity Building Centre (AJCCBC) in running under ASCCE. Using the digital technologies and cyber
Bangkok in supporting the call of ASCCE curriculum as a test-bed, adjacencies.
our Ministers and Senior Officials we hope to share with the wider
in raising regional cyber capacity international community on how As we gradually move
through offering complementary they can apply the metrics to toward a post-COVID world,
capacity building programs on their programs as well. it would also be useful for the
cybersecurity policy, operational GFCE community to start con-
and technical topics. Besides the metrics devel- sidering these cyber adjacencies
opment, the ASCCE’s focus for and how it would impact the
the next 2 years also includes our future trajectory of cyber ca-
work with UNODA on the devel- pacity building. Given the GFCE
opment of a Norms Implemen- community’s diversity, perhaps it
tation Checklist. The Checklist is timely now to consider moving
will be a simple guide for a set of discussions beyond the tradition-
actions that developing countries al definition of cybersecurity and
could take to implement the 11 onto the wider digital domain for
voluntary norms of responsible a truly holistic, multi-disciplinary
state behavior in the 2015 UN and multi-stakeholder approach
GGE report. It will also identify to capacity building.
the capacities needed to help na-

Figure 2. ASCCE office.


24 The CMM in the Pacific | Asia & Pacific The CMM in the Pacific | Asia & Pacific 25

THE CMM IN
THE PACIFIC

Written by: Dr. James Boorman, Head of Research and Capacity Building, OCSC

The Melbourne conference with the Pacific family seems like a distant memory. The Figure 1. The CMM review in the Federated States of Micronesia was part of an APT Expert Mission and in coordina-
COVID-19 pandemic will have long-lasting impacts. No community has escaped tion with World Bank for the Digital FSM Workshop.
untouched. In the Pacific family, the islands who have been fortunate enough to have Building digital
no cases are still impacted. The world has changed and our daily routine with it. resilience for the Where to start?
Building digital resilience for the new ‘normal’ is a global priority that requires a multi- new ‘normal’
dimensional approach, looking beyond IT. The CMM review process is a useful step on
The Cybersecurity Capac-
the digital resilience journey, helping partner nations to understand where they stand
ity Maturity Model for Nations
now and the next steps to take. The OCSC continues to work with the Pacific family, The world has changed and toward digital technology; build- (CMM) was developed by the
our partners and the GFCE community to coordinate online CMM reviews. We look our daily routine with it, mak- ing awareness; enabling access Global Cyber Security Capacity
forward to being part of capacity building projects that meet partner nation’s identified ing us even more reliant on the to education and professional Centre (GCSCC) at the University
priorities, are tailored to the local context, and deliver sustainable capacity with impact. digital environment at a pace training; regulation and legisla- of Oxford. The CMM considers
that no one was prepared for. For tion; and practices and technical cybersecurity to comprise of
many, recovery from the impacts controls to prepare for, detect, five dimensions, which together
of COVID-19 will be more about respond, and recover from inci- constitute the breadth of national
rapidly adapting to this new way dents. capacity that a country requires
of life rather than returning to to deliver effective cybersecurity.
Melbourne a ence and GFCE regional meeting demic, initiating social distanc- how things were before. Digital The five dimensions cover: cy-
distant memory in Melbourne? The Melbourne ing and the closing of borders. transformation is here to stay “For many, recovery bersecurity policy and strategy;
meeting with the Pacific family The COVID-19 pandemic is an and along with it the demand for encouraging responsible cyber-
seems like a distant memory. ongoing disaster, with immense equitable access to digital tech- from the impacts security culture within society;
Melbourne, May 2021. Aus- and long-lasting impacts across nology within a safer and more building cybersecurity knowl-
tralia, the ‘lucky country’ - a public health (physical and psy- secure environment which pro-
of COVID-19 will edge and capabilities; creating
COVID-19
saying that rings true more than chological), communities and the tects human rights, information, be more about effective legal and regulatory
ever today. Another day working regional and global economies. and national infrastructure. frameworks; and controlling risks
from home and chatting with our In February 2020 we could No community has escaped un- rapidly adapting through standards and technol-
Pacific friends and colleagues move freely, chat during coffee touched. In the Pacific family, the Building digital resilience re- ogies.
over coffee, instant messaging, breaks or over lunch and dinner, islands who have been fortunate quires a view beyond IT. It neces- to this new way
and webcam with an island back- and bid our friends farewell at enough to have no cases are sitates comprehensive planning, The CMM review process is a
drop that reminds us all of differ- the end of the conference before still impacted by the necessary robust and extensive infrastruc- of life rather than useful step on the digital resil-
ent times. Was it really February they flew home. In March 2020 pause in international travel and ture, and sufficient resources to ience journey, helping partner na-
2020 when we all last met at the the World Health Organization the knock-on delays for imported develop and implement national returning to how tions to understand where they
OCSC hosted Global Cyberse- declared COVID-19 as a pan- goods and supplies. strategy and policy that consid- stand now and the next steps to
curity Capacity Building Confer- ers: the local culture; attitudes
things were before.” take regarding the development
26 The CMM in the Pacific | Asia & Pacific The CMM in the Pacifi | Asia & Pacific 27

C. Marshall European Center for “Collecting data The CMM review process Where to next?
Security Studies, Daniel K. Inouye relies on extensive desk research,
Asia-Pacific Center for Security across the different analysis of unpublished docu-
Studies, UNDP, and the GFCE. ments provided by participants The next Pacific CMM review
dimensions of the and discussions in-country with is planned with our friends in the
The last face-to-face CMM decision makers and technical Cook Islands. The OCSC team
review in the Pacific was con-
CMM from multiple leads across 10 or more sessions continues to work with the Pa-
ducted in January 2020 in col-
laboration with APT as part of an
sources enables to gain insights from the private
sector, public sector, and civil so-
cific family, our partners and the
GFCE community to coordinate
Expert Mission at the invitation the research team ciety. Collecting data across the future reviews, joint missions,
of the Department of Transpor- different dimensions of the CMM and capacity building. We look
tation, Communications, and to build up a rich from multiple sources enables forward to being part of projects
Infrastructure (TC&I), National the research team to build up a that meet partner nation’s identi-
Government of the Federat- picture of the local rich picture of the local strengths, fied priorities, are tailored to the
ed States of Micronesia (FSM). priorities, challenges, and oppor- local context, and deliver sustain-
Through coordination with TC&I strengths, priorities, tunities toward contextualized able capacity with impact.
and the World Bank, stakeholders recommendations for next steps.
from all four states of FSM were
challenges, and The team often find that the act The team await the opportu-

Figure 2. A snapshot form the Tuvalu online CMM review.


able to participate in a three-day
consultation process following
opportunities of bringing people together in
the same room for these discus-
nity when we can all meet again
and say Bula; Talofa; Malo e lelei;
the Digital FSM Workshop held toward sions is itself a capacity building Halo; Ko na mauri; Kaselehlie; Mo-
on the 27 January 2020. Through activity, with the discussions gethin; Ran annim; Len wo; Kia
the Digital FSM Project, FSM’s contextualized amongst participants flowing on Orana; iokwe; Ekamowir Omo; or
or revision of their national plans. The OCSC has been en- digital transformation journey is beyond the focus group sessions Alii.
To this end, in 2020 a formal and gaged with the Pacific family well underway. The CMM review recommendations over coffee or lunch.
independent evaluation of the face-to-face since 2018, includ- is helping FSM to prioritize the The not-for-profit Oceania
CMM’s impact with countries ing: hosting a Pacific panel for next steps they want to take, for next steps.” With no COVID-19 cas- Cyber Security Centre (OCSC)
who have undergone reviews the Asia Pacific regional IGF in with the OCSC and partners con- es in Tuvalu, the focus group in Melbourne is formed by eight
found that the review process Vanuatu; working with the com- tinuing to support FSM on their The remote CMM participants were able to meet Universities in Victoria, Australia
was foundational to the country’s munity to start to map regional chosen journey towards digital face-to-face in-country, while with substantial funding from the
strategy and policy development. initiatives to raise awareness of resilience. the OCSC team joined via vid- Victorian Government.
existing efforts, avoid duplication Although the pandemic has eo conferencing. This enabled
Working with the and facilitate further collabora- disrupted this work, the response the participants to step away
tion at The Asia Foundation and has accelerated the need for from their desks or day jobs and
Pacific Family APNIC foundation event in PNG; digital resilience. The Tuvalu Min- benefit from having the time to
discussing regional challenges at istry of Justice, Communications engage and network with col-
the APT Policy and Regulatory and Foreign Affairs (MJCFA) has leagues within the focus group
Since 2018 the not-for-profit Forum and APT Symposium on a vision for Tuvalu to actively and beyond. Over four days, the
Oceania Cyber Security Centre Cybersecurity and Samoan Gov- participate in the global digital team engaged with more than 30
(OCSC) has had the privilege of ernment hosted Digital Pacific economy, not just consuming key stakeholders from: emergen-
working closely with the Pacific Conference; updating mapping content but also creating it in the cy response, criminal justice and
family in Samoa, Tonga, Vanuatu, efforts at the GDP workshop in form of digital goods and servic- law enforcement, education and
Papua New Guinea, Kiribati, the Fiji; and hosting the Melbourne es. In March 2021, the OCSC had civil society, critical infrastructure,
Federated States of Micronesia, events. Throughout the pandem- the honor of being invited by the government, and parliamentari-
and Tuvalu. Where possible the ic we have continued to engage MJCFA to work with them on ans. The outcome of the review
OCSC works in coordination with remotely, informally and formally, their journey towards digital resil- process will be a detailed report
the capacity building community, through regional panel discus- ience by conducting the first ever to the government with specific
including partners such as the sions, workshops, and wargames remote CMM review in the Pa- recommendations on next steps
ITU, APNIC, Asia-Pacific Telecom- via events hosted by several or- cific. The remote review enabled to strengthen existing capacity
munity (APT), and World Bank. ganizations: The Asia Foundation the OCSC team to work with the toward a safer and more secure
and APNIC foundation, ITU, APT, MJCFA at least 12 months earlier cyberspace for all Tuvaluan citi-
Samoan Government, George than expected, with international zens.
travel bans currently in place.
28 EU CyberNet – same kid, new and larger block | Europe EU CyberNet – same kid, new and larger block | Europe 29

EU CYBERNET – “In the context


of cyber security,
of information, which is ever
more important in the ever more
connected cyberspace. Thirdly –
es are rather rare and practical
collaboration between the conti-
nent’s countries are often not as

SAME KID, NEW AND


there can never be an OSFA (one close as, for example,in the EU.
the countries in size fits all) label on countries At the same time, the region has
when it comes to cybersecurity a booming ICT sector and some
Latin America and maturity – as cyberspace reali- governments have taken the pan-

LARGER BLOCK the Caribbean are ties evolve, so should legislation, demic as an opportunity to revise
policies and initiatives. and redefine what cybersecuri-
important partners ty means. EU CyberNet and its
The levels of cyber resilience growing network of experts can
for the EU.” and the general awareness in Lat- therefore become a practical tool
in America about cyber threats for the various EU projects that
Why Latin America differ from country to country. are already active in the region.
Few have established rules for
and the Caribbean? the cyber defense of critical in-
Written by: Siim Alatalu, Director, EU CyberNet frastructure or an effective part-
nership between the state and
In the context of cyber the private sector. Cyber exercis-
EU CyberNet, the EU’s external cyber capacity building network introduced in GCEM security, the countries in Latin
issue 6, has recently been granted an extended mandate with new tasks. With the America and the Caribbean are
CynAct platform now online and regular events taking place for the cyber security important partners for the EU
experts enlisted in the network, the project is to launch a new competence center for due to their ambition to digitalize
their societies and achieve better
the Latin American and Caribbean region as well as to reach out to the EU Delegations
preparedness to counter cyber
worldwide. Siim Alatalu, Director of EU CyberNet, explains why this would be a good incidents, as well as the existence
time to get involved. of shared values between the
two regions in general. However,
as was highlighted in the 7th is-
sue of the Global Cyber Expertise
Magazine, there are also several
areas where EU-funded cyber
capacity building initiatives could
be of particular value.
A year in the ‘American the world. No doubt, it was a real ondly, the European Commission
mountains’ rollercoaster, or as we call it in proposed to extend the project Cyber attacks on critical
Estonian – ‘American mountains’; by two years and added tasks infrastructure continue to in-
as in order to stick to the work that were to take EU CyberNet’s crease in frequency and venture
It has been about a year plans, creative thinking became activities to a new level. The new into new areas. Just to high-
since the Global Cyber Expertise useful. However, by December tasks are to train the entire net- light the most recent cases, the
Magazine’s issue 6 in spring 2020 2020, we had two more surprises work of EU Delegations in cyber Colonial Pipeline attack in the
featured an article introducing waiting. security capacity building and to United States or ransomware
EU CyberNet as the ‘new kid provide lead support in estab- attacks such as the one against
on the cyber capacity building Having led the project for a lishing a regional cybersecurity the health sector in Ireland inter
block’. Little did any of us reading little over a year, we received two competence center in the Domin- alia indicate the need for the
it know of what was to follow? major decisions from the Europe- ican Republic that would cover inclusion of such threats in na-
Needless to say, the pandem- an Commission. First, EU Cyber- the entire Latin America and the tion-wide risk management . In
ic changed a lot on the global Net was included in the new EU Caribbean region. addition, a regional approach is
cyber capacity building scene, Cybersecurity Strategy whereby essential. Not only would it mean
posing new challenges for both the EU is to leverage EU Cyber- developing regional capabilities,
the various projects as well as the Net’s expertise in implementing but also building uponthe rou- Figure 1. Collage of the various backstage scenes of our 1-week online EU Cyber Eco-
increased teleworking bringing the cyber capacity building relat- tine of collaboration and sharing system course in May.
cybersecurity to limelight around ed parts of the strategy. Sec-
30 EU CyberNet – same kid, new and larger block | Europe EU CyberNet – same kid, new and larger block | Europe 31

Building sustainable The task of providing cyber “EU CyberNet’s


bridges in cyber capacity building related training
security expertise to EU delegations are targeted at expert pool today
well-versed experts in the dele-
gations that can act as reliable covers many
EU CyberNet’s expert pool and knowledgeable partners in
today covers many areas of ex- the cooperative effort of cyber
areas of expertise,
pertise, making it possible to sup-
port raising awareness of cyber
capacity building. In cooperation
between the EU, the host nations
making it possible
security matters in general and to and cybersecurity experts can to support raising
strengthen links between govern- be supported in order to prevent
ments, academia, and the private the critical infrastructure of the awareness of
sector. In March we launched our countries from falling victim to
online technical platform CynAct hostile activity as this could start cyber security
that will allow the stakeholders of a cyber crisis with global implica-
the network to inform experts of tions. matters in general
their upcoming missions and find
potential contributors. Further In the end, however, the
and to strengthen
development of the platform will
continue in 2021-22.
sustainability of our activities
depends on the people. EU
links between
CyberNet is already open for EU governments,
In May 2021 another impor- experts to sign up as members
Figure 2. A moment captured during the ‘Ciber Llamas’ exercise in the Dominican
Republic.
tant milestone was reached when of the network. If you know, for academia, and the
we launched the monthly online example, how to carry out sec-
EU CyberNet Club event se- toral and/or national strategies, private sector.”
ries – an expert-to-expert forum increase institutional capacity,
What is a regional host nation’s know-how - Estonia Preparations for the first where experts can learn from and prepare laws that respect human
has the unique experience of ini- engagements in this area are discuss with other members of rights, defend the critical infor-
cyber competence tiating and developing the NATO ongoing. In cooperation with the the EU CyberNet community of mation infrastructure, organize
centre? CCDCOE - as well as that of an Cyber4Development project on various issues happening on the the work of CERT, or build inter-
international group of experts May 19 we supported the Domin- cyber security scene today. Over national cooperation networks,
who on time for this issue of the ican Republic authorities to con- the coming months we aim to please check out our website:
Spearheaded by the estab- Magazine have completed a fea- duct a cybersecurity exercise “Ci- cover topics that touch upon the www.eucybernet.eu/expert-pool.
lishment of the NATO Cooper- sibility study on the future center. ber Llamas”. In the coming years, full span of cyber security, from The past couple of months have
ative Cyber Defence Centre of the center should develop into a strategic to technological issues, seen rapid growth in the oppor-
Excellence (CCDCOE) in Estonia The implementation plan regional hub that covers the full and from operational to legal and tunities for experts to become
in 2008, the number of regional foresees that the regional center range of cybersecurity needs of regulatory issues. involved in different activities of
cyber centers has continued to in Santo Domingo should achieve the regional participants, similarly the network. Therefore the best
grow. For example, in 2019 Sin- initial readiness by the end of to how EU CyberNet is to furnish time to join is now.
gapore created a regional cyber 2021. Negotiations with the the full range of needs of the EU.
center, the ASCCE, for fostering Dominican Republic authorities Reaching out to regional experts
cybersecurity in the ASEAN concerning the location of the and building capacity will be a
countries. There are at least two center’s facilities are already on- key functionality of the center
similar initiatives in Africa. So far, going. Our goal is to create max- that will support its long-term
Latin America and the Caribbe- imum synergy with the original sustainability
an does not have one and this tasks of the EU CyberNet, i.e. the
presents the EU and RIA with a establishment of an international
great responsibility. network of experts and organiz-
ing trainings. Therefore, we see
An international and regional the conduction of trainings as
organization cannot be estab- an essential part of the center’s
lished overnight. Fortunately, EU activities.
CyberNet can leverage both its
32 Gender Empowerment in Cyber: GFCE Women in Cyber Capacity Building Network | Gender Empowerment in Cyber: GFCE Women in Cyber Capacity Building Network | 33
Global Developments Global Developments

GENDER
EMPOWERMENT IN
CYBER: GFCE WOMEN
IN CYBER CAPACITY
BUILDING NETWORK
Figure 1: Colleagues from the WiCCB Network during the GFCE Annual V-Meeting 2020.
Written by: Giouli Lykoura, Advisor, GFCE Secretariat

With women representing less than one-quarter of the global cybersecurity workforce, a With more than 100+ fe- “Female Bringing the
male professionals in the GFCE Network together
growing need has become increasingly visible in recent years: networks among women
community from different cyber professionals
in the field. We needed toaddress existing global and regional challenges, promote backgrounds, the Women in
the participation of more women in STEM and cybersecurity professions and secure a Cyber Capacity Building Network need to be able to Over the past year, the
diversified cyber workforce. To address these needs within the GFCE Community, the plays a positive role, helping GFCE organized virtual meetings
Women in Cyber Capacity Building (WiCCB) Network was launched in 2019 during the women feel included and sup-
connect with others to bring the WiCCB Network
GFCE Annual Meeting in Addis Ababa by Ms. Carmen Gonsalves, GFCE Co-Chair and ported, addressing challenges,
identifying key success factors,
globally, share Capacity
together; the ‘Women in Cyber
Building’ online meet-
Head of International Cyber Policy at the Ministry of Foreign Affairs of the Netherlands.
and increasing their involvement experiences and ing in May 2020 was dedicated
in cyber capacity building. To to celebrating women globally
support the network’s mission, challenges, promote by sharing achievements, experi-
the GFCE aims to enhance the ences and discussing the added
following: best practices and value of the network. A second
session followed for ‘Empowering
1. Cooperation and knowl- create awareness.” the GFCE WiCCB’ (read report:
edge sharing among women page 6) during the GFCE Annual
involved in cyber capacity V-Meeting 2020 which focused
Added value of the encourage and support wom- during the GFCE Annual Meeting building; on identifying opportunities for
WiCCB Network en’s participation in the field of in Addis Ababa: to facilitate and 2. Identification of women’s collaboration within the network.
cybersecurity. In pursuit of these coordinate a strong, inclusive and cyber capacity needs on a In March 2021, a first regional
objectives, female professionals growing network of female pro- regional level; session on “Breaking the region-
Today, despite the growing need to be able to connect with fessionals in cybersecurity and 3. Growth of a trusted commu- al barriers to empower women
demand for cybersecurity pro- others globally, share experienc- cyber capacity building who can nity of cyber experts building in cyber capacity building” took
fessionals, women are under- es and challenges, promote best learn from each other and raise a diversified workforce; place, as part of the GFCE-OAS
represented in the global cyber practices and create awareness . awareness on capacity building Meeting for the Americas, with
workforce and still face a variety It was for this reason that issues, encouraging the inclusion female representatives from
of challenges that prevent their the GFCE Women in Cyber Ca- and empowerment of women in the LAC region discussing the
inclusion and advancement in the pacity Building (WiCCB) Network the field. main challenges women face
field. To tackle these challeng- was launched in 2019, by Ms. Car- in cybersecurity. In addition to
es, there is a need to promote, men Gonsalves GFCE Co-Chair,
34 Gender Empowerment in Cyber: GFCE Women in Cyber Capacity Building Network | Gender Empowerment in Cyber: GFCE Women in Cyber Capacity Building Network | 35
Global Developments Global Developments

such meetings, the GFCE is also What’s Next Knowledge Module


encouraging knowledge sharing In parallel to the creation of Outcomes 2021
through tools, publications, pro- regional consultation sessions,
jects related to gender which are The GFCE has identified and based on the findings of Coordination Regional Network Chapters Knowledge Module
uploaded on the ‘Women’ target three pillars to enhance its efforts cyber capacity building needs
audience group on Cybil Knowl- in supporting the WiCCB Net- per region, an online knowledge • Database of global and re- • Formation of regional consul- • Develop a training module
edge Portal. work in 2021: module on “Reducing the Gender gional initiatives for women tation roundtable discussions to reduce the gender gap in
Gap in Cybersecurity Leadership” in cybersecurity and capacity on key topics in cyber capac- cybersecurity leadership
Based on the input and Coordination will be developed, facilitated building; ity building; • Identify other topics on cyber
active participation of our female by the AU-GFCE Collaboration • Connect with other existing • Creation of Regional Network capacity building to develop
colleagues, the GFCE WiCCB The GFCE plays a coordi- Project with a specific focus on networks to avoid the dupli- Chapters to identify regional a series of training module for
Network has managed to: nating role, connecting female the Africa region. The knowledge cation of efforts and explore needs for women in cyber women;
cybersecurity professionals module, developed by the end opportunities for collabora- capacity building;
1. Enhance knowledge sharing across the world to collaborate, of December, will highlight the tion;
on cyber capacity building enhance knowledge and informa- importance of women in cyber- • Formation of a GFCE WiCCB
challenges between women tion sharing, create networking security leadership and encour- Ambassadors Group
from different regions; opportunities and develop re- age the conversation on how to
2. Provide the opportunity to gional and global meetings. The reduce the gender gap.
demonstrate knowledge and GFCE aims to further enhance Figure 2: Outcomes of WiCCB Network Work Plan 2021 .
expertise on different career collaboration between the WiC-
paths in cybersecurity; CB Network and other global or
3. Allow the community to regional initiatives,platforms and “The GFCE aims
better understand regional processes , to better coordinate Looking ahead
needs and connect with one and strengthen efforts towards to further enhance Ms. Carmen Gonsalves’ Testimonial
another; common goals for women in
cybersecurity.
collaboration In the coming years, the
between the WiCCB Since the launch of the WiCCB GFCE aims to empower the
Regional Network Chapters Network in Addis Ababa, I am WiCCB Network and support
Network and other heartened by the enthusiasm of global and regional efforts of
The GFCE will increase the many women in the GFCE women in cybersecurity and
regional focus of the network, global or regional community being involved in the cyber capacity building, while
by identifying regional needs and network, actively supporting the continuing to look for ways to
challenges through regular con- initiatives,platforms need for women to connect and collaborate with other initiatives
sultations and collaboration with collaborate on cyber capacity and bring greater awareness to
regional organizations. Regional and processes.” building. Women are able to bring those beyond the GFCE commu-
needs and priorities will be dis- different perspectives, act as role nity to the network’s mission and
cussed and identified on a variety models and make a real impact on accomplishments. If you would
of topics related to cyber capac- international processes related to like to connect with the WiCCB
ity building, contributing to cre- cyber capacity building. For this reason, we aim to increase the Network and join our efforts
ating regional network chapters. exchange of best practices, ideas and different point of views by supporting diversity and inclusiv-
This goal relates to the GFCE’s organizing regular panel discussions and seminars, connecting ity in the field of cyber capacity
efforts towards increasing its with global and regional networks. Our female colleagues in the building, please get in touch with
regional focus in 2021, setting re- GFCE WiCCB Network have a broad spectrum of talent, skills, the GFCE Secretariat by emailing
gional perspectives and priorities knowledge and expertise on cyber capacity building and that is contact@thegfce.org
for cyber capacity building. the reason why we all ought to inspire and support the next
generation of cyber professionals worldwide, building a
diversified and inclusive network”.
36 Rethinking Cybersecurity Capacity Building: Healthcare shows the way | Rethinking Cybersecurity Capacity Building: Healthcare shows the way | 37
Global Developments Global Developments

RETHINKING effective capacity building. As


cyberattacks increased, amplify-
ing the vulnerabilities created by
“There can be
no sustainable
and resilience. Indeed, privacy
and data breaches have popu-
lated the cyber threat landscape

CYBERSECURITY
the pandemic, the same period and given rise to a daunting con-
also witnessed the emergence of cybersecurity unless vergence of cyberattacks against
assistance efforts in the form of hospitals, research laboratories,
innovative coalitions. Individuals
all communities can non-governmental organizations

CAPACITY BUILDING: and entities are allying with the


aim of protecting our common
good by securing cyberspace,
access cybersecurity
and resilience
and vaccination centers, further
exacerbated by the spread of the
COVID-19 pandemic.

HEALTHCARE
defending the health sector,
bringing assistance to victims of programs.” Research on the economic
extortion, protecting elections, impact of cyberattacks against
and denouncing violations of our Case Study: Healthcare healthcare abounds, but little to

SHOWS THE WAY fundamental rights, among other


urgent actions. as a vulnerable sector
in need of reinforced
no research is currently avail-
able on the societal impact of
those attacks and on the spe-
Assistance and capacity preparedness cific capacity-building needs of
building are often complemen- affected communities. Aiming
tary with fostering cyber aware-
and resilience to fill this gap, the CyberPeace
Written by: Stéphane Duguin, CEO, The CyberPeace Institute
ness, cyber hygiene, and a more Institute recently published a
secure cyberspace. Despite the strategic analysis focusing on the
In the course of the past twelve months, we have seen exponential growth of criminal multiplication of such initiatives, As the healthcare sector societal impact on victims. The
we still have little understanding increasingly depends on digital, key findings show that as a vital
attacks, massive disinformation campaigns and systematic attacks targeting the
of their final impact, especially on often converging systems and human service and hence vulner-
healthcare sector in particular. Paradoxically, the same period has also seen the individuals and vulnerable com- devices, it becomes increasingly able sector, healthcare requires
emergence of evolving coalitions of individuals and entities allying in urgency to protect munities. One main challenge lies vulnerable to attacks and mali- more effective cybersecurity
cyberspace as a common good. Despite the multiplication of assistance and capacity in the fact that building capacity, cious activities without having capacity building measures as
building initiatives, we still have little understanding of their impact on individuals in the sense of building well-func- had access to the economic and cyber threats take advantage of
and vulnerable communities. How can the complex jigsaw of initiatives and resource tioning and accountable institu- organizational means required to technical, societal and individual
tions able to effectively respond build effective cybersecurity skills vulnerabilities.
allocation be reconciled with sustainability and long-term impact, particularly in local
to cybercrime and enhance coun-
contexts, where needed most? With the analysis and recommendations in its report tries’ cyber resilience, comes at
Playing with Lives: Cyberattacks on Healthcare are Attacks on People’ the CyberPeace a cost often out of reach for the
Institute proposes a paradigm shift for cybersecurity capacity building based on an most vulnerable communities.
evidence-led approach prioritizing the involvement of all stakeholders, especially civil
society organizations and empowering local communities. The CyberPeace Institute
has documented the often
shadowed societal impact of
malicious activities against the
healthcare sector. Building on
the findings of this analysis,
The Importance achieve a peaceful cyberspace, the capacity to respond to cyber- with this article, the CyberPeace
of Cyber Capacity cybersecurity capacity building attacks and the major global risks Institute proposes recommenda-
(CCB) activities are indispensa- they present to our societies, tions for stronger cybersecurity
Building
ble and the work of the GFCE is targeting notably vulnerable and capacity building based on an
remarkable in this regard. As em- stressed sectors and industries. evidence-led approach and the
In the course of the past phasized in the latest final report In the current context, exacerbat- empowerment of communities.
twelve months, we have seen an of the OEWG, to mitigate the ed by the COVID-19 pandemic,
exponential growth of criminal malicious use of information and healthcare has been one of the Figure 1. Malicious activities against the healthcare sector often have a shadowed
attacks, massive disinformation communication technologies, most targeted sectors, accentu- societal impact.
campaigns and systematic at- each State, and particularly in the ating the crucial need for step-
tacks. To tackle these threats and developing world, should have ping up capabilities, including via
38 Rethinking Cybersecurity Capacity Building: Healthcare shows the way | Rethinking Cybersecurity Capacity Building: Healthcare shows the way | 39
Global Developments Global Developments

“Capacity building While there is almost global This is supported by a Call to


consensus that cybersecurity Governments to join forces in the
activities must capacity building is necessary for promotion of cyberpeace in the
the achievement of a safe and healthcare sector and the deliv-
imperatively be stable cyberspace, there can be ery of direct operational support
no peace nor stability if victims to healthcare. The approach
available at the and vulnerable communities are starts from the victim and builds
micro level of not systematically included in the
solution. To achieve sustainable
knowledge and resilience around
the specificities of the organiza-
vulnerable local cyberpeace, cybersecurity ca- tion and the affected commu-
pacity building activities must: nities. The healthcare sector is
communities to have the first focus area, other critical
• be evidence-led and assess infrastructure sectors will follow.
a more holistic and the specific needs of the As a chain is no stronger than
reality on the ground and in its weakest link, cybersecurity
successful impact.” context; capacity building activities must
• involve all stakeholders, start focusing on empowering
By successful impact of especially civil society organi- people to ensure successful,
CCB, we mean community-level zations, in the documentation long-term impact that leaves no
change that creates value for and of attacks and in fostering one behind.
is acknowledged by beneficiar- accountability mechanisms;
Figure 2. As the healthcare sector depends on digital systems and devices, it becomes increasingly vulnerable to ies and all others affected. In the • involve people on the
attacks and malicious activities. realm of cybersecurity, such val- ground to empower local
ue can be translated into aware- populations and vulnerable
ness, education, security, and communities.
Cybersecurity capacity A Paradigm Shift on the macro state level and protection at the national level.
building strives to tackle these for Cybersecurity fail to comprehensively capture How can we measure the impact The CyberPeace Institute
challenges by addressing the and evaluate the complexity of cybersecurity capacity build- has embraced the shift towards
Capacity Building
vulnerabilities of the technology of the victims involved or the ing on individuals and vulnerable empowering vulnerable commu-
in use, by creating stronger regu- specificities and needs of vul- communities? Research may nities in its mission to address
latory regimes and by promoting Cybersecurity capacity nerable communities affected. index States’ efforts and com- global challenges in the pro-
security best practices for end building activities seek to sup- Indeed, cybersecurity cannot mitments to cybersecurity but tection of critical civilian infra-
users. The first two fall within the port and empower individuals, be achieved without effectively the real impact remains unquan- structure. At the CyberPeace
macro-level of state actions and communities and governments empowering those communities tifiable. Therefore, while CCB Institute, we put individuals at
responsibilities. States are indeed by reducing security-related risks that do not have the necessary improvement should be based on the center, seeking to empower
expected to afford protection by emerging from access and use of means to access capacity build- better coordination mechanisms them for a more sustainable and
declaring the entire healthcare as information and communication ing programs. among projects and initiatives, long-term cyberpeace. With an
vitally critical infrastructure. This technologies. CCB is essential there is a pressing need to focus initial focus on the healthcare
enhances information exchange to fostering the development of on quantifying the cyber resil- sector, the CyberPeace Institute
and reinforces the enforcement skills, human resources, policies ience and cybersecurity maturity has launched the Cyber 4 Health-
of protection mechanisms under and institutions to increase the of local communities. care program to assist healthcare
international law. The third aim is security and resilience of States professionals, analyze attacks
implemented at a more local level directly, and indirectly, of all. and advance policies to protect
in accordance with contextual the sector.
specificities to empower vulnera- Too often, CCB has fo-
ble communities. Our approach is cused on providing top-down
based on practical, evidence-led assistance at the national level
analysis conducted in the health- through exchange of legal and
care sector. We are confident, administrative best practices,
however, that similar high-lev- and providing access to technol-
el considerations can also be ogy with the goal of increasing
applied to other critical civilian national cybersecurity capaci-
infrastructure sectors. ties. Such efforts focus primarily
40 The GFCE’s Regional Approach | Global Developments The GFCE’s Regional Approach | Global Developments 41

THE GFCE’S
only better understand and meet Collaboration with GFCE Regional
the regional needs and demands, Regional Organizations Meetings and
but also to support the GFCE
Engagements
Community with bringing their

REGIONAL
expertise and know-how to the As capacity building requires
region. By increasing regional trust between implementers and The GFCE also plans to hold
focus, the GFCE is also able to the beneficiary community, to more regional meetings in 2021,
more accurately identify needs, ensure sustainable and long-term to bring together relevant stake-

APPROACH
discover best practices, and am- impact, the GFCE is connecting holders (donors, implementers
plify regional efforts to the global and collaborating with region- and beneficiaries) of the region
level; which is in line with its ef- al organizations to support its to discuss, learn and find solu-
forts to maintain a demand-driv- regional efforts. By doing so, the tions to capacity building chal-
en approach to capacity building. GFCE taps into platforms that lenges. Through these regional
have built long-lasting, trusting meetings, the GFCE can fortify
relationships with their respec- its coordination role, and more
tive member States, and that can effectively match needs with
Written by: Kathleen Bei, Advisor, GFCE Secretariat “As capacity help the GFCE tailor its approach offers for support. These regional
in the respective regions. Many meetings also increase the re-
building requires regional organizations also al- gional visibility and awareness of
Over the last two years, the need for a regional approach in the GFCE has
become undeniable. By increasing regional focus, the GFCE is able to more accurately
trust between ready have a clear overview of the GFCE and its work on cyber
regional perspectives and ca- capacity building, and can lead
identify needs, discover best practices, and amplify regional efforts to the global implementers and pacity needs and can therefore to increased knowledge transfer
level; which is in line with its efforts to maintain a demand-driven approach to work with the GFCE to trans- to the region. Besides discussing
capacity building. As of 2021, the GFCE has officially established on-the-ground
the beneficiary late them into specific activities capacity building needs, it is also
to support capacity building. important to gather stakeholders
presence in the Pacific, Africa, Europe, Asia, and the Americas; with all continents community, to In turn, the GFCE is a valuable to share regional good practices
represented by the GFCE Community. partner for regional organizations and initiatives to promote greater
ensure sustainable as it provides access to a global knowledge-sharing. The entire
multistakeholder implementing second day of the GFCE Consul-
“A regional approach and long-term network and a platform to share tation Meeting 2021 is dedicat-

GFCE’s Regional Focus is favorable because A demand-driven impact, the GFCE good practices and lessons learnt
across regions. Furthermore,
ed to regional meetings to give
participants a better understand-

countries within approach is connecting the GFCE aims to support exist- ing of the GFCE’s as well as its
ing regional organizations and Member and Partner’s efforts on
As of 2021, the GFCE has
a region tend to and collaborating structures in their cyber capacity a regional level. Read more about
officially established on-the- Over the last two years, the building efforts to avoid duplica- the GFCE’s planned and ongoing
ground presence in the Pacific, share similarities in need for a regional approach with regional tion. efforts in the different regions:.
Africa, Europe, Asia, and the in the GFCE has become un-
Americas; with all continents priorities and are deniable. A regional approach organizations
represented by the GFCE Com- is favorable because countries
munity. The GFCE’s ongoing seen to be able to within a region tend to share to support its
efforts to bolster its regional similarities in priorities and are
reach a common seen to be able to reach a com- regional efforts.”
focus is outlined in the Strategic
Building Blocks document that mon understanding, agreement
was presented during the GFCE understanding, or way forward more easily than
Annual V-Meeting last year. Some
key milestones towards 2022 that
agreement or way in other multilateral fora . Fur-
thermore, a regional approach
are linked to these efforts include forward more can be instrumental in improving
connecting and cooperating with regional collaboration and knowl-
regional organizations, organiz- easily than in other edge sharing amongst stake-
ing regional coordination meet- holders in the region. In placing a
ings and increasing awareness of multilateral fora.” greater emphasis on the regional
the GFCE. approach, the GFCE aims to not
42 The GFCE’s Regional Approach | Global Developments The GFCE’s Regional Approach | Global Developments 43

Africa Latin America Southeast Asia technology (ICT) infrastructure,


and Caribbean the GFCE is looking forward to
strengthening engagement and
Following the success of Since the GFCE held its better coordination of capacity
the GFCE Annual Meeting 2019 In collaboration with the Annual Meeting 2018 in Singa- building efforts in the region.
and based on the input of the Organization of American States pore, the GFCE has sought to
Community, the GFCE has giv- (OAS), the GFCE held its first improve representation from the Europe
en additional emphasis on its event on cyber capacity building Southeast Asian region to bet-
engagement in Africa. Many in Latin America and Caribbean ter understand the needs of the
GFCE members and partners are (LAC) in March 2021. The aim of region and the existing capacity The GFCE held its first re-
interested in or already work- the meeting was to introduce the building efforts. At present, four gional meeting in Lille, France in
ing on capacity building in the LAC Community Stakeholders to out of eleven ASEAN countries January 2020. During the meet-
region, and the GFCE has exten- the GFCE and demonstrate how are already GFCE members. ing, the mapping of European
sive expertise and experience the GFCE can support the imple- As plans to hold an in-person capacity building projects on the
that would be valuable to share. mentation of cyber capacities. Southeast Asia regional meet- Cybil Knowledge Portal was pre-
In 2021, the GFCE Secretariat The GFCE-OAS partnership was ing in 2020 fell through due to sented and discussed. Given that
therefore welcomed two new Figure 1. GFCE Knowledge Modules on key capacity building topics will be developed formally announced during the travel restrictions, the first GFCE a large number of implementers
members to the team – Mr. Moc- and delivered as part of the AU-GFCE project. meeting, with the OAS acting as Southeast Asia regional meeting within the GFCE Community are
tar Yedaly and Dr. Martin Koyabe the GFCE’s regional hub in LAC was announced during the GFCE European or Europe-based, Eu-
– to support its efforts through and Ms. Kerry-Ann Barrett as Consultation Meeting 2021. The ropean stakeholders have point-
a two-tier approach. Mr. Moctar GFCE-OAS Liaison. The GFCE- meeting, organized in collabora- ed out the importance of active
Yedaly is involved in outreach to OAS Hub will be the linking pin tion with Cyber Security Agency knowledge and expertise sharing,
new members and partners in The Pacific between the GFCE Community (CSA) Singapore, will take place while focusing on addressing
the region, executing a GFCE-Af- and regional stakeholders, im- in the margins of the Singapore a country’s capacity building
rica Strategy in order to better proving support and visibility International Cyber Week (SICW) gaps and weakness. The GFCE
coordinate capacity building The GFCE Pacific Regional while facilitating greater knowl- to LAC while coordinating and in October 2021. As ASEAN hopes to connect with other
efforts. Dr. Martin Koyabe is Meeting in February 2020, held in edge sharing. By appointing Ms. enhancing knowledge sharing of member states have increasing multi-stakeholder platforms and
focused on the two-year AU- the margins of the OCSC-GCSCC Cherie Lagakali, a local who can initiatives, and functioning as a placed an emphasis on cyber- actors in the region to organize
GFCE collaboration project which Global Cyber Capacity Confer- build relationships with those on point of contact for various activ- security and creating trust in an in-person European meeting
aims to expand African coun- ence, was the GFCE’s very first the ground, the GFCE ensures ities including the GFCE Clearing information and communications later in 2021.
tries’ cyber capacity building engagement in the Pacific region. that the needs of the Pacific are House.
knowledge to better understand, During the meeting, donors, most accurately identified and
identify and address their nation- implementers and beneficiaries will lead to a long-term solution
al cyber capacity needs. Over in the region came together to that the Pacific community can
the two-year period, this project share perspectives and learn be confident of. As of June 2021,
will map cyber capacity building from each other’s invaluable the scoping assessment is now
priorities in the region, establish insights, highlighting the need for complete, and the next step is to
a multi-stakeholder Africa Cyber greater peer-to-peer sharing. A validate the design options for a
Experts (ACE) Community to key takeaway from the meeting is GFCE Hub with the Pacific Com-
strengthen knowledge sharing, that capacity building initiatives munity Stakeholders.
and develop knowledge modules in the region were most effective
based on the expertise of the when designed with an aware-
GFCE Community. These efforts ness of the local ecosystem and
will enable the GFCE to better needs. In an effort to address the
understand and address the ca- demands and needs that were
pacity building needs of African discussed during the meeting,
countries, enhance cooperation the GFCE appointed Ms. Cherie
and knowledge sharing between Lagakali as the first GFCE Pacific
stakeholders, and facilitate the Liaison to conduct a compre-
GFCE Community in bringing hensive scoping assessment and
their knowledge and expertise explore how a GFCE Pacific Hub Figure 2. Speakers at the GFCE-OAS Meeting for the LAC region presenting the GFCE Toolbox.
to the region through the GFCE can best support and coordinate
Knowledge modules. Africa capacity building in the region
Volume 9, June 2021 Colophon
Global Cyber Editorial Board:
Expertise Magazine Adil Sulieman (AU)
Georgiana Macovei (EU)
Belisario Contreras (OAS)
Kathleen Bei (GFCE)

Guest Editors:
Daniela Schnidrig
Cyber4Dev Communications Team
Mariana Jaramillo
Louise Marie Hurel
Ka Man Yip
James Boorman
Siim Alatalu
Giouli Lykoura
Stéphane Duguin

Artwork & Design:

Roguer Restrepo Estrada (Colorful Penguins)


Anna Noij (GFCE)

Chief editors:

Kathleen Bei (GFCE)


Anna Noij (GFCE)

Publishers

African Union, www.au.int, contact@africa-union.org,


@_AfricanUnion

European Union, www.europa.eu, SECPOL-3@eeas.europa


eu, @EU_Commission

Global Forum on Cyber Expertise, www.thegfce.org,


contact@thegfce.org, @theGFCE

Organization of American States, www.oas.org/cyber,


cybersecurity@oas.org, @OEA_Cyber

Disclaimer

The opinions expressed in this publication are


solely those of the authors and do not necessarily
reflect the views of the AU, EU, GFCE or OAS,
or the countries they comprise of.
Global Cyber
Expertise Magazine

AU • EU • GFCE • OAS
contact@thegfce.org

Issue 10 submission deadline:


10 October 2021

You might also like