Session
Organizer 1: Monojit Das, Indian Aerospace and Defence News (IADN)
Organizer 2: Yawri Carr, 🔒TU München
Organizer 3: Samaila Atsen Bako, 🔒CSEAN
Organizer 4: Kadu Dr Bhavana T., MIT ADT University Pune Maharashtra
Organizer 5: ENERST MAFUTA KATOKA, Internet Society ( Affordable Internet Access SIG )
Speaker 1: Kadu Dr Bhavana T., Private Sector, Asia-Pacific Group
Speaker 2: Monojit Das, Civil Society, Asia-Pacific Group
Speaker 3: Samaila Atsen Bako, Civil Society, African Group
Dr. Jannatul Ferdous, Associate Professor , Comilla Univeristy, Bangladesh.
Email; [email protected]
Dr. Khouzeifi Ishaka , Managing Director Doudbane Consulting
Republic of Chad
Gabriel Karsan, Civil Society, African Group
Yawri Carr, Civil Society, Latin American and Caribbean Group (GRULAC)
ENERST MAFUTA KATOKA, Technical Community, African Group
Roundtable
Duration (minutes): 90
Format description: Our roundtable reImagines stepping into a virtual amphitheater—a convergence of minds, onsite and online. Interactive Engagement Unlike monologues, our roundtable invites participation. Expert insights complimenting together. Participants weave reflections, creating a rich mosaic. It's dynamic, to Bridge gaps in cybersecurity and national security. Every voice matters. Multistakeholder Synergy Our diverse panel society forms a kaleidoscope. They mirror multistakeholderism. becoming a microcosm a diplomatic agora for the purpose Exchange perspectives, find common ground. Cyber threats heed no borders. Building on Data-Driven Insights Our Speakers shall use data whisperers toreveal nuggets. By Real world examplesbacked by data—gnite curiosity. Bub a knowledge relay. For the Impact of Tangible cyber resilience emerges. Abstract concepts find flesh. Use of Critical Reflection Crossroads where Participants pause. Reflect. The blend of onsite and online voices like harmonies enriches the dialogue. It's a symphony of wisdom for a Destination Collective insights, actionable seeds. Of Collaborative Dialogue
Where does cybersecurity merge with national security in the data-driven age? What are the intersections between policy and security in cyberspace? How can we improve synergy to enhance cybersecurity legislation in the global south? What should be the defining base parameters for shaping inclusive cyber laws and prioritizing digital security in national security policies?
What will participants gain from attending this session? Deep Understanding: We’ll unravel the intricate relationship between cyber and national security, demystifying the blurry boundaries. Participants will grasp the nuances, challenges, and opportunities in safeguarding digital spaces. Case Studies: By examining India and Nigeria as case studies, attendees will learn firsthand about cybercrime dynamics, vulnerabilities, and youth-driven threats. Real-world examples will illuminate the intersection of cyber and national security. Best Practices: Our exploration of best practices—such as open-source decentralization and security-by-design—will equip participants with tangible strategies. They’ll discover how to enhance cyber resilience, agility, and accessibility. Multistakeholder Approach: Participants will appreciate the role of diverse stakeholders—government, industry, academia, and civil society—in shaping effective policies. Collaboration and shared responsibility will be emphasized. Global South Perspective: As the global south rises, our workshop will empower attendees to advocate for inclusive cyber laws and prioritize digital security. They’ll leave with actionable insights to drive positive change.
Description:
The convergence of cyber and national security forms a complex Venn diagram, blurred by the rapid evolution of the internet. Over the past three decades, from the advent of the TCP/IP protocol to the present day, various cyber threats have emerged. These range from deadly computer viruses to modern state-sanctioned surveillance spyware like the notorious Log4j vulnerability. As our world digitizes, the security of the internet becomes inseparable from national security. Yet, many stakeholders remain unaware of their roles within this intricate security ecosystem, leading to misaligned priorities in safeguarding cyber resources, data, and people. Our workshop aims to dissect existing gaps between cybersecurity practices, policies, and insights related to national security agendas. By examining case studies and frameworks, we will map the intersections where cybersecurity implications meet national security imperatives. Taking India and Nigeria as case studies—both known for their cybercrime challenges—we'll explore how vulnerable, tech-savvy youth manipulate resources for illicit purposes. Rampant spyware, online fraud, phishing, surveillance, and cyber warfare pose significant national security threats. Each stakeholder group plays a crucial role in shaping the hierarchy and addressing gaps that contribute to cybercrimes. Strengthening cybersecurity legislation becomes a priority within the broader context of national security. Best practices will guide our exploration, including: Open Source Decentralization:Leveraging decentralized digital resources. Hardware Security by Design, Implementing protocols and standards. Policy Enhancements by Improving cyber resilience, agility Our multistakeholder inspired approach aims to empower secure, open institutions. Participants will gain insights into the symbiotic relationship between a safe cyber ecosystem and prioritized national security agendas. the global south rises in prominence, inclusivity becomes paramount. Our workshop will navigate the agency of strong cyber policies and emphasize the need for security-by-design cyber infrastructure. Decentralized national security policies, driven by user needs, will play a pivotal role in shaping a safer digital world
Mapping Legislation Differences (SDG 16): By dissecting cybersecurity laws in India and Nigeria, we foster global cyber stability. Harmonizing legal frameworks across borders ensures peace, justice, and strong institutions. Real-time insights will flow through an open idea and recommendation board. Consultative Policy Document (SDG 16): Our living report becomes a beacon. Transparent, accountable, and inclusive institutions emerge. Data-backed strategies fortify national security. SDG 16 thrives—a digital frontier safeguarded. Closing Knowledge Gaps (SDGs 4 and 9): Empowering individuals and communities—our mission. Cyber literacy blooms, bridging the divide. SDG 4 (Quality Education) and SDG 9 (Industry, Innovation, and Infrastructure) nod in agreement. Empowering Netizens (SDG 17): Our how-to guides—practical, actionable. Stakeholders unite. Partnerships for secure cyberspace form. SDG 17 smiles—a world woven together. In this symphony of goals, we compose resilience
Hybrid Format: We aim to build hybrid experiencebased i a seamless tapestry of interaction, bridging the onsite and online realms in our workshop: Designing for Inclusivity: Our goal: Equal footing for all. No digital divide. Onsite Experience: Interactive Displays: Onsite screens mirror online boards. Participants jot notes, share insights. Microphones: Handheld mics for onsite speaker Online Experience: Interactive Board: Our virtual whiteboar a canvas for ideas. Online participants type, doodle, react. Polls and Surveys: Real-time feedback via online polls. “Thumbs up” emojis ripple across screens. Complementary Tools: Our secret sauce: Digital companions. Slido: Our Swiss Army knife. Polls, Q&A, word clouds onsite and online sync. Miro Board: Our mural. Sticky notes bloom ideas, questions, doodles. Chat Channels: Onsite and online chatroom like zoom chat room in a bustling agora.
Report
Cybersecurity vs. National Security – Exploring the Intersection of Policy and Security in the Digital Age
Introduction
As the world increasingly relies on digital infrastructure, the distinction between cybersecurity and national security has become increasingly blurred. The integration of cyberspace into critical national functions—from defense to economic activity—requires a rethinking of traditional security paradigms. This session aimed to explore the intersections between cybersecurity and national security, emphasizing how the Global South, in particular, can enhance cybersecurity legislation and frameworks to address emerging threats in the digital age. The discussion highlighted the complexities of digital security, the importance of multistakeholder collaboration, and the need for inclusive policy development, with case studies drawn from India and Nigeria to provide concrete insights into the evolving landscape of cybercrime, vulnerabilities, and state security.
Cybersecurity and National Security: An Evolving Relationship
As we move further into a data-driven world, the convergence of cybersecurity and national security becomes more apparent. Traditional national security concerns, such as military defense, are now intertwined with the security of digital networks, making cybersecurity a critical element of national defense strategy. The session discussed the ways in which cyber threats, ranging from state-sponsored hacking to ransomware attacks, can destabilize national security by targeting critical infrastructure, including government systems, financial institutions, and communication networks.
For example, India has faced significant cybersecurity challenges in recent years, including attacks on government databases and critical industries. Similarly, Nigeria has seen a rise in cybercrime, with young people increasingly involved in internet fraud and cyberattacks. These challenges highlight the need for comprehensive cybersecurity frameworks that integrate national security strategies to protect the state’s digital resources.
Case Studies: India and Nigeria
India’s cyber landscape presents a unique example of a nation struggling to balance the rapid adoption of digital technologies with the need for robust cybersecurity measures. The country’s Information Technology Act (2000), while a step forward, has struggled to keep pace with the rapidly evolving digital threats. India’s National Cyber Security Policy, introduced in 2013, aims to provide a framework for addressing these challenges but has faced criticism for lack of implementation and coordination among various stakeholders. In the context of national security, India has been a target of several cyberattacks linked to state actors, emphasizing the necessity of a more integrated approach to cybersecurity.
Nigeria, with its fast-growing digital economy, faces similar challenges. The rise of youth-driven cybercrime, including online fraud and hacking, has created a security dilemma. The Nigerian Cybercrime Act (2015) was introduced to address these issues, but its enforcement has been inconsistent, and many vulnerabilities persist. In a nation where cybersecurity literacy is still developing, government action, private sector collaboration, and public awareness are needed to strengthen the cybersecurity framework.
By analyzing these case studies, participants were able to examine how vulnerabilities in digital infrastructure can translate into threats to national security and the importance of developing cybersecurity legislation that is both responsive and proactive.
Enhancing Synergy: Improving Cybersecurity Legislation in the Global South
For countries in the Global South, developing effective cybersecurity legislation is critical to fostering national security in the digital age. This requires a clear understanding of the unique risks and opportunities that these countries face as they digitalize their economies. Unlike Western nations that have well-established cybersecurity frameworks, many countries in the Global South are still in the early stages of developing comprehensive policies. The session emphasized the need for collaboration between governments, industry, academia, and civil society to create a shared responsibility for cybersecurity.
Several best practices were discussed, such as the adoption of “security-by-design” principles in digital infrastructure and the promotion of open-source, decentralized cybersecurity solutions that can empower local communities. One promising example is Kenya’s efforts to integrate cybersecurity into its national development plans, ensuring that digital infrastructure is protected from the outset. A multistakeholder approach, which involves diverse actors from government, technology, and civil society, is key to creating a resilient digital ecosystem that can withstand cyber threats.
The Role of Policy in Cybersecurity and National Security
The policy landscape plays a pivotal role in ensuring the security of both cyberspace and national infrastructure. Cybersecurity laws must align with national security priorities, ensuring that digital spaces are protected without infringing upon citizens’ rights. The GDPR in Europe serves as a notable example of balancing privacy with security, whereas policies in the Global South must take local contexts and needs into account.
National security policies in the Global South must be informed by a comprehensive understanding of local challenges. This includes addressing factors such as limited digital literacy, the lack of technical resources, and the growing threat of cybercrime among tech-savvy youth. Strong national security frameworks must not only protect infrastructure but also ensure that citizens’ rights to privacy and free expression are respected in the digital realm.
The session emphasized the need for policies that integrate the protection of both people and infrastructure. For example, South Africa’s Protection of Personal Information Act (POPIA) seeks to ensure privacy protections while promoting a secure digital environment. Such frameworks could be adapted to fit the specific security needs of other nations in the Global South.
Best Practices for Strengthening Cybersecurity Legislation
The session also explored several best practices that can strengthen cybersecurity legislation globally. These include:
1. Open Source Decentralization: Utilizing decentralized and open-source platforms can help reduce vulnerabilities and allow for community-driven cybersecurity solutions. This approach is particularly relevant in the Global South, where resources for cybersecurity may be limited.
2. Hardware Security by Design: Implementing strong security protocols at the hardware level can prevent many cyber threats. Governments and private sectors in the Global South must work together to ensure that digital infrastructure is built with security in mind.
3. Building Cyber Resilience: Rather than focusing solely on preventing cyberattacks, it is also crucial to build systems that are resilient to attacks. This includes continuous monitoring, timely responses, and robust recovery protocols.
4. Promoting Cybersecurity Education: Raising awareness about cybersecurity risks and best practices is essential for creating a culture of digital security. By investing in digital literacy, governments can equip citizens with the knowledge they need to protect themselves online.
Conclusion
The session concluded with a call to action for the Global South to prioritize cybersecurity as an integral part of national security strategy. As cyber threats continue to evolve, it is critical for governments, industry, and civil society to collaborate on developing comprehensive cybersecurity policies. By integrating cybersecurity with national security priorities, adopting best practices from global frameworks, and ensuring that policies are inclusive and contextually relevant, countries can better secure their digital infrastructures and safeguard national interests.
Ultimately, the session reinforced the importance of creating flexible, inclusive cybersecurity legislation that addresses the unique challenges faced by nations in the Global South. It also highlighted the need for strong institutional coordination and public-private partnerships to foster a secure digital environment. By doing so, countries can effectively bridge the gap between cybersecurity and national security, ensuring the protection of both citizens and infrastructure in the digital age.