'Cybersecurity' Threat or Opportunity. Saikat Datta Policy Director Centre for Internet & Society, India

Similar documents
China and International Governance of Cybercrime

Commonwealth Cyber Declaration

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Japan s Cyber Diplomacy

An Internet of Governments: How Policymakers Became Interested in Cyber. Maarten Van Horenbeeck, FIRST Klee Aiken, APNIC

Draft Resolution for Committee Consideration and Recommendation

Cybersecurity & Digital Privacy in the Energy sector

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

National Communications Authority

10025/16 MP/mj 1 DG D 2B

The Role of International Cooperation in Cyber Security

"DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY?

13967/16 MK/mj 1 DG D 2B

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Package of initiatives on Cybersecurity

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243),

G8 Lyon-Roma Group High Tech Crime Subgroup

RESOLUTION 45 (Rev. Hyderabad, 2010)

EU policy on Network and Information Security & Critical Information Infrastructures Protection

10007/16 MP/mj 1 DG D 2B

Valérie Andrianavaly European Commission DG INFSO-A3

The cost of cybercrime the benefits of cooperation

Regulating for a Digital Economy

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

RESOLUTION 130 (Rev. Antalya, 2006)

Comprehensive Study on Cybercrime

LEGAL SOLUTION CYBERCRIME LEGAL SOLUTION LEGAL SOLUTION NATIONAL, REGIONAL, INTERNATIONAL

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities

Cybersecurity & Spam after WSIS: How MAAWG can help

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

THE VALUE OF INTERNATIONAL COOPERATION IN CYBERSPACE: LESSONS FROM THE UNGGE PROCESS

10496/18 MC/sl 1 DGD 2

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Global cybersecurity and international standards

Japan-UK Joint Declaration on Security Cooperation

Society, the economy and the state depend on information and communications technology (ICT).

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3

ECOWAS Cyber security Agenda

International cyber strategy for Norway

Protecting Critical Information Infrastructure in times of increasing cyber conflict

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

Bureau of Industry and Security U.S. Department of Commerce

ITU Model Cybercrime Law: Project Overview

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

International Policy Division, Global ICT Strategy Bureau

Departamento de Asia y Pacífico

FINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

CSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE OCTOBER 2010

ITU-ACMA Asia Pacific Regulators Roundtable July 2014

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

Cyber Security Roadmap

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

H2020 & THE FRENCH SECURITY RESEARCH

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

RESOLUTION 130 (REV. BUSAN, 2014)

GLOBAL AGENDA FOR CYBER CAPACITY BUILDING

Promoting Global Cybersecurity

14965/17 MK/ec 1 DG D 2B

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

ASEAN: One Community, One Destiny.

ASEAN s Cyber Confidence Building Measures

Shaping the Cyber Security R&D Agenda in Europe, Horizon 2020

National CIRT - Montenegro. Ministry for Information Society and Telecommunications

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

Policy recommendations. Technology fraud and online exploitation

BDT Activities on Spectrum Management István Bozsóki Head of Division BDT/IEE/SBD

H2020 WP Cybersecurity PPP topics


The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018

Security and resilience in Information Society: the European approach

Globally Networked Customs Context, Concept, Rationale and Benefits - Indian Customs Perspective

A Modern European Data Protection Framework

Economy Report [CHINA] 24 rd APLMF Meeting Siem Reap, Cambodia. BeiJing, China. Report developed/approved by Position

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

Scope of the Member State mechanism

Towards a European Cloud Computing Strategy

European Directives and reglements for Information security

RESOLUTION 67 (Rev. Buenos Aires, 2017)

UNODC tackling cybercrime in support of a safe and secure AP-IS

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

G7 Bar Associations and Councils

U.S. National Security Space Strategy and Responsible Behavior in Space. Audrey M. Schaffer U.S. Department of Defense

The APEC Model. Global Partnership through Regional Initiatives

NATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post

A Multi-Stakeholder Approach in the Fight Against Cybercrime

European Union Agency for Network and Information Security

The Digitalisation of Finance

Transcription:

'Cybersecurity' Threat or Opportunity Saikat Datta Policy Director Centre for Internet & Society, India 2nd China-India Think Tank Forum Beijing, 24-25 June 2017

'Themes' Voices from the 2 nd China-India Think Tank Forum

'Made in China 2025...will have two approaches industrialisation & Information Technology...intelligent manufacture & new generation of IT' - Prof Huamg Qunhui DG, Institute of Industrial Economics 'We need to move from de-globalisation to reglobalisation' - Prof Li Xiangyang DG, National Institute of International Strategy 'Failure of Strategic Communication leads to mismatch of goals and becomes confrontational. We need a new security architecture' Prof Madhu Bhalla, Editor, India Quarterly, ICWA

'Cybersecurity' ~ Threat or Opportunity

A threat & an opportunity to global stability Blurs the State & Non State Actor Needs a New Global Security Architecture Serves as the pivot to new and intelligent industrialisation Is the Key To Transitioning From Deglobalisation to Re-gobalisation

'China's Plan of Action in International Strategy of Cooperation on Cyberspace'

Peace & stability Rule based order in Cyberspace Partnership in Cyberspace Reform of Global Internet Governance System International Cooperation on Cyber Terrorism & Cyber Crimes Protection of Citizens Rights & Interests Including Privacy Digital Economy & Sharing of Digital Dividends Global Information Infrastructure Development and

'India's National Cyber Policy'

Secure Cyber system environment Assurance framework for the Regulatory framework Protection of Resilience of Critical Information Infrastructure Fiscal benefits to businesses that adopt best practices Global best practices in information security, risk management, business continuity management and cyber crisis management Harmonisation of international regulatory frameworks

`Budapest Convention on Cyber Crimes'

'China' China s refusal to accede to the Budapest Convention on Cyber Crime reflects its developing state-centric approach to international agreements on cyberspace. The Convention is a multilateral agreement that serves as a framework for international cooperation on cyber crime and a guide for the development of national cyber crime legislation In Track II discussions in 2012 between the U.S. think tank Center for Strategic and International Studies (CSIS) China's Institutes of Contemporary International Relations (CICIR), CICIR opined a UN treaty could be better at addressing the needs of developing countries in fighting cyber crime than does the Council of Europe-developed Convention. CICIR was also concerned that Convention provisions on transnational evidence collection for prosecutions of cyber crimes could violate state sovereignty

'India' India has refused to accede to the Budapest Convention on Cyber Crime India has argued for a new convention that is far more participatory and addresses concerns of developing countries India believes that any new convention or agreement on a global common such as the internet needs new statutory frameworks India is concerned that the Convention's provisions on transnational evidence collection for prosecutions of cyber crimes could violate state sovereignty India has insisted that a new Convention is drafted with active participation and consultation of new member states

'Wassenaar Arrangement'

India & China are not members of the Wassenaar Arrangement. China and the Wassenaar Arrangement held 5 rounds of dialogues between April 2004 & November 2008 During the talks, the two sides exchanged in depth views on issues in the field of the export control for conventional arms and dual-use goods and technologies India has been making a bid to join four multilateral export control regimes; the NSG, the Missile Technology Control Regime (MTCR), the Wassenaar Arrangement, and the Australia Group. India's export controls are in line with the Wassenaar Arrangement

'Bilateral Insecurities'

Hostage to mutual suspicions 'failure of strategic communication' Competitive neighbours Unsettled borders China, Pakistan & state-sponsored terrorism Tibet & The Dalai Lama Reshaping the Global Order Differing versions of Re-globalisation

'Bilateral Co-operation'

India has bilateral cyber dialogues with 11 countries India has recently obtained the necessary internal approvals for initiating a cyber dialogue with China The decision to initiate a bilateral cyber dialogue comes in the background of the interest expressed by China during the 5 th meeting of the India-China JWG on CT in March 2012 to have a comprehensive dialogue on Cyber issues. This proposal was repeated by the Chinese side to the Indian Expert on the sidelines of the UNGGE Meeting in June 2013\ Both India and China have been actively participating in various international fora such as the United Nations Group of Governmental Experts (UNGGE), ASEAN, UNODC, BRICS and SCO which are deliberating on various cyber issues such as the applicability of International Law and Norms of responsible

'SALT to START' Learnings from the Strategic Arms Reduction Talks (SALT) to the success of Strategic Arms Reduction Treaties (START)

Premised on the doctrine of Mutually Assured Destruction (MAD) Transparency of military posture Confidence Building Measures (CBMs) From Suspicion to Cooperation

'Recommendations for Areas of Cooperation'

Mutual Legal Assistance Treaty (MLAT) on cyber issues Joint Information Sharing & Analysis Centre for Cyber Incidents Research on Cryptography Build Capacity on Critical Information Infrastructure Centre Emphasis on FinTech & Internet of Things (IoT) Joint Expert Group on Reforming Wassenaar Arrangement, Budapest Convention & Talin Manual 2.0

'Thank You'