Session
Organizer 1: Monojit Das, Indian Aerospace and Defence News (IADN)
Organizer 2: Yawri Carr, 🔒TU München
Organizer 3: Samaila Atsen Bako, 🔒CSEAN
Organizer 4: Kadu Dr Bhavana T., MIT ADT University Pune Maharashtra
Organizer 5: ENERST MAFUTA KATOKA, Internet Society ( Affordable Internet Access SIG )
Speaker 1: Kadu Dr Bhavana T., Private Sector, Asia-Pacific Group
Speaker 2: Monojit Das, Civil Society, Asia-Pacific Group
Speaker 3: Samaila Atsen Bako, Civil Society, African Group
Dr. Jannatul Ferdous, Associate Professor , Comilla Univeristy, Bangladesh.
Email; [email protected]
Dr. Khouzeifi Ishaka , Managing Director Doudbane Consulting
Republic of Chad
Gabriel Karsan, Civil Society, African Group
Yawri Carr, Civil Society, Latin American and Caribbean Group (GRULAC)
ENERST MAFUTA KATOKA, Technical Community, African Group
Roundtable
Duration (minutes): 90
Format description: Our roundtable reImagines stepping into a virtual amphitheater—a convergence of minds, onsite and online. Interactive Engagement Unlike monologues, our roundtable invites participation. Expert insights complimenting together. Participants weave reflections, creating a rich mosaic. It's dynamic, to Bridge gaps in cybersecurity and national security. Every voice matters. Multistakeholder Synergy Our diverse panel society forms a kaleidoscope. They mirror multistakeholderism. becoming a microcosm a diplomatic agora for the purpose Exchange perspectives, find common ground. Cyber threats heed no borders. Building on Data-Driven Insights Our Speakers shall use data whisperers toreveal nuggets. By Real world examplesbacked by data—gnite curiosity. Bub a knowledge relay. For the Impact of Tangible cyber resilience emerges. Abstract concepts find flesh. Use of Critical Reflection Crossroads where Participants pause. Reflect. The blend of onsite and online voices like harmonies enriches the dialogue. It's a symphony of wisdom for a Destination Collective insights, actionable seeds. Of Collaborative Dialogue
Where does cybersecurity merge with national security in the data-driven age? What are the intersections between policy and security in cyberspace? How can we improve synergy to enhance cybersecurity legislation in the global south? What should be the defining base parameters for shaping inclusive cyber laws and prioritizing digital security in national security policies?
What will participants gain from attending this session? Deep Understanding: We’ll unravel the intricate relationship between cyber and national security, demystifying the blurry boundaries. Participants will grasp the nuances, challenges, and opportunities in safeguarding digital spaces. Case Studies: By examining India and Nigeria as case studies, attendees will learn firsthand about cybercrime dynamics, vulnerabilities, and youth-driven threats. Real-world examples will illuminate the intersection of cyber and national security. Best Practices: Our exploration of best practices—such as open-source decentralization and security-by-design—will equip participants with tangible strategies. They’ll discover how to enhance cyber resilience, agility, and accessibility. Multistakeholder Approach: Participants will appreciate the role of diverse stakeholders—government, industry, academia, and civil society—in shaping effective policies. Collaboration and shared responsibility will be emphasized. Global South Perspective: As the global south rises, our workshop will empower attendees to advocate for inclusive cyber laws and prioritize digital security. They’ll leave with actionable insights to drive positive change.
Description:
The convergence of cyber and national security forms a complex Venn diagram, blurred by the rapid evolution of the internet. Over the past three decades, from the advent of the TCP/IP protocol to the present day, various cyber threats have emerged. These range from deadly computer viruses to modern state-sanctioned surveillance spyware like the notorious Log4j vulnerability. As our world digitizes, the security of the internet becomes inseparable from national security. Yet, many stakeholders remain unaware of their roles within this intricate security ecosystem, leading to misaligned priorities in safeguarding cyber resources, data, and people. Our workshop aims to dissect existing gaps between cybersecurity practices, policies, and insights related to national security agendas. By examining case studies and frameworks, we will map the intersections where cybersecurity implications meet national security imperatives. Taking India and Nigeria as case studies—both known for their cybercrime challenges—we'll explore how vulnerable, tech-savvy youth manipulate resources for illicit purposes. Rampant spyware, online fraud, phishing, surveillance, and cyber warfare pose significant national security threats. Each stakeholder group plays a crucial role in shaping the hierarchy and addressing gaps that contribute to cybercrimes. Strengthening cybersecurity legislation becomes a priority within the broader context of national security. Best practices will guide our exploration, including: Open Source Decentralization:Leveraging decentralized digital resources. Hardware Security by Design, Implementing protocols and standards. Policy Enhancements by Improving cyber resilience, agility Our multistakeholder inspired approach aims to empower secure, open institutions. Participants will gain insights into the symbiotic relationship between a safe cyber ecosystem and prioritized national security agendas. the global south rises in prominence, inclusivity becomes paramount. Our workshop will navigate the agency of strong cyber policies and emphasize the need for security-by-design cyber infrastructure. Decentralized national security policies, driven by user needs, will play a pivotal role in shaping a safer digital world
Mapping Legislation Differences (SDG 16): By dissecting cybersecurity laws in India and Nigeria, we foster global cyber stability. Harmonizing legal frameworks across borders ensures peace, justice, and strong institutions. Real-time insights will flow through an open idea and recommendation board. Consultative Policy Document (SDG 16): Our living report becomes a beacon. Transparent, accountable, and inclusive institutions emerge. Data-backed strategies fortify national security. SDG 16 thrives—a digital frontier safeguarded. Closing Knowledge Gaps (SDGs 4 and 9): Empowering individuals and communities—our mission. Cyber literacy blooms, bridging the divide. SDG 4 (Quality Education) and SDG 9 (Industry, Innovation, and Infrastructure) nod in agreement. Empowering Netizens (SDG 17): Our how-to guides—practical, actionable. Stakeholders unite. Partnerships for secure cyberspace form. SDG 17 smiles—a world woven together. In this symphony of goals, we compose resilience
Hybrid Format: We aim to build hybrid experiencebased i a seamless tapestry of interaction, bridging the onsite and online realms in our workshop: Designing for Inclusivity: Our goal: Equal footing for all. No digital divide. Onsite Experience: Interactive Displays: Onsite screens mirror online boards. Participants jot notes, share insights. Microphones: Handheld mics for onsite speaker Online Experience: Interactive Board: Our virtual whiteboar a canvas for ideas. Online participants type, doodle, react. Polls and Surveys: Real-time feedback via online polls. “Thumbs up” emojis ripple across screens. Complementary Tools: Our secret sauce: Digital companions. Slido: Our Swiss Army knife. Polls, Q&A, word clouds onsite and online sync. Miro Board: Our mural. Sticky notes bloom ideas, questions, doodles. Chat Channels: Onsite and online chatroom like zoom chat room in a bustling agora.