Agenda item 6
8 Mar 2024 15:00h - 18:00h
Event report
Agenda item 6
Table of contents
Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.
Knowledge Graph of Debate
Session report
Full session report
International Women’s Day coincides with key cybersecurity capacity building session at the Open-Ended Working Group
The Open-Ended Working Group on Security of and in the Use of ICTs convened a session that coincided with International Women’s Day, prompting the Chair to highlight the crucial role of women in peace, security, and various societal domains. The session focused on the multifaceted issue of capacity building within cybersecurity, with delegates from various countries and organizations contributing to a rich dialogue.
Delegates reached a consensus on the need for capacity building initiatives to be tailored to the unique challenges and needs of individual states. They shared national experiences and engaged in bilateral and regional programs, emphasizing the importance of context-specific capacity building and rejecting a one-size-fits-all approach.
Key points and proposals discussed included the need for national ICT policies and strategies, robust ICT infrastructure, national certs or cyber agencies, societal awareness of ICT security, and tools and skills for identifying threats and managing risks. The Philippines’ proposal for a needs-based cyber capacity building catalogue and India’s proposal for a Global Cybersecurity Cooperation Portal were among the initiatives that garnered attention. Delegates stressed the importance of avoiding duplication and ensuring new proposals complement and strengthen existing initiatives.
International cooperation was highlighted as essential in capacity building initiatives, with a focus on sharing best practices and engaging in partnerships with stakeholders from the public and private sectors, academia, and civil society. The role of the United Nations in capacity building efforts was scrutinized, with an emphasis on reinforcing the multilateral framework and complementing existing initiatives.
The session also addressed the need for additional resources and a funding mechanism within the UN framework to support capacity building in a sustainable way, with suggestions for a funding mechanism embedded within the larger context of development funding and Sustainable Development Goals.
On International Women’s Day, the integration of a gender perspective into capacity building efforts was underscored, with mentions of programs like the Women in Cyber Fellowship. The Chair concluded the session by summarizing the discussions, noting the importance of strengthening the UN’s role in cybersecurity capacity building, and setting the stage for further discussions on the topic.
The session underscored the critical importance of capacity building in cybersecurity, the need for tailored, demand-driven initiatives, the significance of international cooperation, and the necessity for the United Nations to play a pivotal role in strengthening the multilateral framework for cybersecurity. The Chair’s commitment as a gender champion was highlighted, as well as the need to address the gender gap in multilateral discussions proactively.
Session transcript
Chair:
Good morning, distinguished delegates. The ninth meeting of the seventh substantive session of the Open-Ended Working Group on Security of and in the Use of ICTs, established pursuant to General Assembly Resolution 75 240, is now called to order. Distinguished delegates, dear friends, today is a very happy day. Today is International Women’s Day. And so please allow me to begin by wishing all of you a very happy International Women’s Day. Today is a day for reflection about the role of women in our lives, in our families, in our communities, in our society, in our country, in our region, in our world. In our world, there’s no doubt that women have played an incredibly important role in all these domains. And there’s also no doubt that the role played by women have not always been appreciated, understood, acknowledged, respected, and empowered. So this is a day for reflection in terms of what each one of us can do. to make the change, and to make things better. Make things better for women, but also, through that, make things better for the world. The role of women in peace and security has been long established and recognized through the adoption of a very important resolution in the UN Security Council, Women, Peace and Security, the year 2000. And since then, the theme of Women, Peace and Security has been a very important theme that cuts across all aspects of the work of the United Nations. And on this day, we too must acknowledge the role of women in peace and security, in international peace and security. As agents of peace, as agents of peace building, women play an incredible role, again, at so many levels, in our families, in our communities, in our societies, in our countries, in our regions, and in the world, and here at the United Nations too. I also want to take this opportunity to acknowledge the role played by women in the OEWG process. The work that we do here in the OEWG, and this is the second iteration of the OEWG, which began in 2021, but the work that we do is a continuation of more than two decades of work. 25 years of discussions at the UN. on ICT security. And that makes this process very unique, because this is a process with a very long history. And I would add, a very productive history. And we must also, on this day, recognize the contribution made by women in the last two and a half decades to this specific context of ICT security. I won’t mention names, but those of us who have been involved in the process for some time, including in the previous OEWG, and prior to that, the GGE process, we know of the incredible role played by the incredible women from different parts of the world, who have made a contribution, who brought a brick in order to build the foundation, brick by brick. So we are lucky in this working group, the second edition of the working group, that we have a very strong foundation already, on which we are to build. So we can’t let down all the work done by our predecessors before, especially by the women, all these years. And I also take this opportunity to acknowledge, with great satisfaction and gratitude, the role played by women in this open-ended working group. And in this room, we see so many women, leaders in your own right, leaders in your own system, leaders in your own bureaucracies. Advocating, championing, leading and fighting for change. So your role is incredibly important and I’m full of admiration for the role that the women leaders in the OEWG play because you face so many struggles at so many levels but yet here you are, here you come, speaking with confidence, putting forward ideas, making contributions and making an effort to find common ground. And talking about the role of women in the OEWG, I want to also recognize the women in cyber fellows and I express my appreciation to the different countries who support this program which has enabled so many women to be involved in this process, engaged in this process and through their engagement and involvement they bring back the message of hope and the message of consensus from this working group back to their own systems. And so a big thank you to those countries who support the women in cyber fellows program and whether or not you are here as part of the women in cyber fellows program or in the working group. Under your own arrangements, I think it is important we recognise the role of all women who have played, and will continue to play, an incredibly important role in the OEWG. And I should add, going beyond, into the future mechanism. The future mechanism is also in the hands of all of us, and here too, the women leaders will play an incredibly important role. The other point that comes to my mind is that, as we seek to build on the cumulative and evolving framework, as we seek to improve the cumulative and evolving framework, as we try to add new elements to it, whether it is in the form of new guidance or new norms, and keeping the door open for future possibilities, including the possibility of additional legally binding obligations, as we discuss these challenging issues in this Working Group, we must also keep in mind that our task in the OEWG is to also bridge the gender-digital divide, empower the role of women in the context of ICT security, and support them, because by supporting the role of women in this process, we are also supporting the implementation of the framework. We are also strengthening the framework and getting it to be future ready. So friends, these are some thoughts that come from the heart. I hadn’t intended to make such a longish statement, but I thought it’s only appropriate that we begin today by recognizing the importance of this day. And as I speak today, the UN and the UN Secretary General and all Member States are commemorating International Women’s Day in the Equusoc Chamber, I believe, or Trusteeship Council. So it’s a very important commemoration going on at this very point. And because we are here, committed to continuing the work in this open-ended working group, we are not able to join that ceremony, but I thought that we should at least recognize the importance of this day. So I invite you to join me and give a round of applause to all our women leaders in this working group. And a special thanks to also to the women leaders on this side of the podium, members of the Secretariat, Catherine and Katya here, and my own team members here, who are seated behind me, Gillian, Clarice, and Emma, who have been strong pillars of support for me during this process. And also I think that we’ll take a group photo. Not now, later when, just before we adjourn, I think on a previous occasion we celebrated International Women’s Day by taking a group photo of all the women leaders in this process. So we will do that, say, around 12.45 p.m. I realized this morning I don’t have a pink tie, so I’m wearing a blue one, but there’s no reason why we should associate any particular color with any gender. So I brought my favorite blue tie and my gender champion badge, which was given to me by a women ambassador. So I wear it as a gender champion to remind me that this is a cause that we all must support, each one of us. So friends, that’s the first reason to be happy. Let me give you another reason to be happy and cheerful today. It’s Friday, and the weekend beckons, and I want to say that it’s satisfying that we have come to the fifth day by traversing some very important issues and having some very rich and productive discussions. So today we will continue our discussions on capacity building. I have a list of speakers that remains unfinished, so we will continue with the speakers list from yesterday, I think about 20 speakers, and then we will go to regular institutional dialogue later this morning and then well into the afternoon till as long as it takes, keeping in mind that The lights will be switched off at 6 p.m. So that’s our plan for today, and I give the floor now to Vietnam to be followed by Canada on capacity building. Vietnam, you have the floor, please.
Vietnam:
Thank you, Mr. Chair. We would like to express our appreciation for the guiding questions you provided on the topic of capacity building. Vietnam joins many delegations in acknowledging that capacity building is key to build and maintain an open, secure, stable, resilient, and peaceful cyberspace, as well as to support states, especially those who have limited cyber capabilities, to effectively prepare, prevent, respond, and mitigate the impact of malicious ICT activity. It’s crucial that all states share a common goal of strengthening national cyber and ICT capabilities, narrowing the development gap in the field of ICTs between countries and regions. We thus support the Philippines’ suggestion on the needs-based cyber capacity building catalog, which could, as mentioned before by the Philippines delegation, centralize and organize existing capacity building programs for easy access and reference. Mr. Chair, we underscore the critical role of digital forensic in investigating and mitigating cyber incidents. To fortify this, we support any initiatives aimed at improving e-forensic. This includes investing in cutting-edge technologies, methodologies, and skilled professionals to ensure the swift and accurate identification of cyber threats. Recognizing the interconnected nature… of cyber threats, we advocate for strengthened cooperation between SIRTs. By fostering collaborations at the global and regional level, we can share threat intelligence, best practices, and resources, thereby enhancing our collective ability to respond effectively to cyber incidents. Additionally, we emphasize the need to bolster anti-APT advanced persistent threat attack capabilities. As APTs become more sophisticated and persistent, investing in advanced tools, training, and collaborative strategies is paramount to safeguarding our digital infrastructure. Mr. Chair, recognizing the dynamic nature of cyber threats, we welcome and endorse training programs designed for high-level cybersecurity experts. These programs, specifically focusing on the train-the-trainers model, will empower individuals with the responsibility, knowledge, and skills needed to disseminate expertise at a broader scale. In conclusion, we believe that strengthening digital forensic, fostering SIRT cooperation, and enhancing anti-APT capabilities, and investing in high-level expert training programs through bilateral and multilateral cooperation are steps towards building a resilient and secure cyberspace for all. Thank you, Chair, for your kind attention.
Chair:
Thank you very much. Vietnam, Canada, to be followed by Slovenia. Canada, please.
Canada:
Thank you, Chair, distinguished colleagues, Chair, happy International Women’s Day to everyone. The issue of gender is cross-cutting and important. I must thank you for your kind attention. admit that I haven’t fully carried out my duty in this regard. I’m enthusiastic about continuing to work on this. Given the fact that I have not fully carried out my duty, I think this is something that I will address in today’s intervention on regular institutional dialogue. Chair, rather, Canada is convinced that capacity building is a cross-cutting question for all of the elements that we are addressing here. We agree that we need to celebrate our successes in this regard. Chair, we note the concerns that you expressed as regards capacity building, which, as you put it, needs to start now. From Canada’s viewpoint, for years we have been providing capacity building activities. I’ll give you one example, among others, of capacity building at the United Nations. We have the Wake Fellows program, which has yielded concrete results, as we’ve heard and seen throughout the week. We will continue to engage in capacity building and will be happy to do so. We think that our efforts in this regard deserve recognition. Indeed, Canada believes that capacity building, which we have been engaged in for several years and which we will continue to engage in, is an investment in cyber stability for everyone at the global level. This is why, right now, we support 12 projects for a total of 20 million U.S. dollars. Mr. Chair, Canada believes that it is vital to list the foundational capacities that allow states to understand malicious activities to defend against them, and to respond adequately. These essential foundational capacities for states include, inter alia, the following. Number one, technical expertise. Two, competence in identifying and mitigating cyber threats, vulnerabilities, and incidents. Three, legal frameworks. Four, the development of political strategies. Five, education and awareness raising. Six, international cooperation. And seven, infrastructure and technology. Chair, Canada remains attentive to the idea of having a global portal, and we thank the Philippines for their proposal and their presentation, which we endorse. We reiterate the importance of not duplicating work already done with existing portals. In this regard, it would be vital to draw on the experience and expertise of organizations such as the Global Forum on Cyber Expertise, the GFCE. The vast experience of the GFCE in developing cyber cooperation tools can guide the creation of a global portal while ensuring that it supplements existing resources. Furthermore, responding to your question about voluntary tools for optimal integration of capacity building measures, Canada believes that it should be possible, if all states in the OEWG agree, to envisage the creation of an easy-to-use checklist. That checklist could guide the states in a process of self-evaluation to determine whether capacity building activities are in keeping with the principles set forth in Annex C of the Second Annual Progress Report. The forthcoming roundtable on capacity building, slated for the 10th of May, will be or could be, an opportunity to discuss this idea and the best ways to implement such a checklist. Furthermore, the integration of these capacity-building principles in all of the subjects that we are discussing here would be facilitated by a virtuous cycle-type structure as set forth for years in the program of action. Chair, Canada thanks you for your second-to-last question, which is on gender. That question is particularly appropriate on this International Women’s Day. Canada believes that a meeting on mainstreaming the gender perspective in cyber capacity-building efforts would be useful and interesting. This discussion could rely on the mapping exercise to survey the landscape of capacity-building programs and initiatives prepared by the Secretariat of the OEWG. This meeting could address cyber attacks that impact women. It could address online gender-based violence, the promotion of diversified and inclusive decision-making processes, and the implementation of a balanced representation in cybersecurity policies. This is all we have. Thank you, Chair.
Chair:
Thank you very much, Canada, for your statement. I give the floor now to Slovenia to be followed by El Salvador.
Slovenia:
Thank you, Mr. Chair, for your indulgence. Mr. Chair, dear colleagues, good morning. A very special good morning goes, of course, to our cyber women colleagues gathered here today. Mr. Chair, Slovenia aligns itself with the statement delivered on behalf of the EU and its member states and would like to make the following remarks in its national capacity. Mr. Chair, cyber capacity building should be aimed at equipping states and organizations with the knowledge, skills, and tools they need to protect themselves and their digital assets. Protecting data and ensuring the resilience of critical infrastructure is essential and crucial for ensuring a free, open, and secure digital future for all. Throughout this session, we have heard the call by many states to keep sharing best practices, whether that is with regards to the application of the norms of responsible state behavior, international law, or capacity building. It has also been pointed out that when it comes to encouraging capacity building, the different needs by different states need to be taken into account. Each state faces different challenges and vulnerabilities in its cybersecurity domain. This comes down to factors such as technological infrastructure, economic development, and geopolitical dynamics. By tailoring capacity building efforts and best practices to accommodate these differences, we can ensure that all states have the necessary tools and knowledge to effectively combat cyber threats. Mr. Chair, Slovenia wishes to share its experience in the regional cyber capacity building efforts. As we have shared during the previous OEWG session, and as has been pointed out yesterday by my colleagues from France and Montenegro, Slovenia and France, together with Montenegro, established a regional cyber capacity center in the Western Balkans, or the WB3C. The WB3C center is already being recognized by different organizations such as the EU, OSCE, ITU, and… GFCE. The goal of the Centre is to educate the educators in national administrations on cutting-edge policies and practices in cybersecurity and combating cybercrime. In 2023, the Centre carried out six trainings based on a train-the-trainer model to beneficiaries from six Western Balkans countries. We are continuing this trend in 2024, with 12 trainings planned. WB3C is transforming into an international organisation which will allow a deeper and broader participation of multi-stakeholders in the region. As we realise the importance of contributing to the enhancement of the cybersecurity system of the Western Balkans, we place great emphasis on various international and inter-regional cooperation initiatives as well. As mentioned in the beginning, it is important to tailor the capacity-building efforts to the specific needs of the States. We welcome the amount of initiatives and encourage States to continue sharing information and best practices, continue improving our joint goal of bridging the digital divide and making sure that as many States as possible reach a minimum level of cybersecurity. Mr Chair, recalling your opening remarks, we agree that capacity-building is a topic that connects all of the pillars of the OEWG’s work. While we have presented our best practices, we agree that there is a need for a cross-regional approach to cybercapacity-building and we reiterate our commitment to these efforts and to the work of the Group. Thank you, Mr Chair.
Chair:
Thank you very much.
El Salvador:
We’d also like to express our thanks to Philippines for their presentation, and we will analyze it accordingly. I’d like to begin by stressing, as we’ve said in previous sessions, that capacity building is a crucial theme, and it is cross-cutting in nature for all the areas covered by the mandate of this group. In previous meetings, El Salvador has submitted details as to two specific areas within the broad spectrum of cyber training, security and cyber diplomacy. From our perspective, we believe that these areas do require a comprehensive approach. With regard to your question on basic capacities that the working group could develop, we continue to advocate capacities in the area of information security. We believe that this area will change fast, and therefore it’s vital to focus on areas such as data security, control of malware and the interface between programs and applications, and cryptographic standards, vulnerabilities, the use of vulnerabilities in software and binary systems, and also emerging technologies such as artificial intelligence as it affects cyber security. All this to ensure the availability and the authenticity and integrity and confidentiality of data and services which are accessible through information networks. With regard to cyber diplomacy and digital diplomacy, we emphasize the importance of to cover the needs of countries in cyberspace. We believe it’s fundamental to work on knowledge of norms and responsible conduct, and also confidence-building measures which prevent the escalation of any cyber. It is also essential to understand issues related to the governance of the Internet, the establishment of networks and the protection of communications technology, as well as understanding and dealing with cybercrime from a domestic and international perspective. These areas are not exhaustive. The relevance of each area depends on the priorities at the national level. In conclusion, we reiterate our appeal for adopting a multiple user focus. This could help our discussions given the nature of cyberspace. We believe that our experience in cyberspace comes from different sources and therefore the contributions of other stakeholders are of great importance in order to make progress in our discussions. Thank you, Chairman.
Chair:
Thank you very much, El Salvador, for your statement. Indonesia, to be followed by Germany.
Indonesia:
Thank you, Mr. Chair. Before addressing the aspects of capacity building, my delegation wishes to extend our appreciation for your able leadership in steering this substantive session, including for providing us with the Chair’s discussion papers. For our delegation, the papers provide us with a good basis to continue our discussions, both on a checklist of practical actions for the implementation of norms, as well as the regular institutional dialogue in which we will engage deeper in the next session. Mr. Chair, on the issue on capacity building, there are two things that my delegation wish to highlight in response to your guiding questions. First, we wish to recall the Chair’s reflection yesterday that capacity building is indeed the foundational element on which the other pillars rest. We reaffirm that the capacity building is one of the key elements that will assist countries to progress in their cybersecurity, including in the implementation of the cyber norms. It is crucial to ensure that the capacity building must address the our capacities to detect and respond to malicious ICT activities by utilizing existing mechanisms such as cert-to-cert cooperation. I wish to also convey several foundational capacities that my delegation proposes to develop, among others the routine communication test, tabletop exercise and cyber drill test, regular training to cert members to keep up-to-date with the new threats and defense methods, as well as the strengthening of the capabilities for cyber incident response including through training and support for C-certs and certs, implementation of emergency response, formulation of contingency plan on cyber crisis management, as well as the safe information exchange mechanism. Secondly, we once again emphasize the importance of the capacity building programs to be tailor-made and targeted based on the needs and requests by countries. That includes the financial resources and also the technology transfer aspect. In this regard, we welcome the new initiatives and proposals by member states to strengthen our efforts in capacity building. We welcome and support the proposal by the Philippines on the needs-based cyber capacity building dialogue. Such working paper is a concrete and practical contribution to ensuring the delivery of effective capacity building program. This working paper could also be synergized with other proposals by other countries such as the GCSP portal by India. And in this regard, we would also wish to note that the development of such portal could be linked to each national and regional certs in order to ensure instant and real-time sharing of information on cybersecurity to be provided directly to the operational and technical experts in their respective countries or regions. Finally, Mr. Chair, we also heed to your call on the nomination on the POC directory. We will convey the nomination of both the diplomatic POC which will be our Ministry of Foreign Affairs expert, as well as the technical POC, which will be our expert from the National Cybersecurity Agency in due course. Thank you, Mr. Chair.
Chair:
Thank you very much, Indonesia. Germany, to be followed by Switzerland.
Germany:
Thank you, Mr. Chair, for giving me the floor. Germany fully aligns itself with the statement of the European Union and wishes to add the following remarks in its national capacity. During the last OEWG session, it has truly been impressive to see how capacity building easily turned out to be the most popular agenda item within our program of work. This mere fact goes on to demonstrate the importance that states place upon acquiring and attaining the foundational capacities required to detect, defend against, or respond to malicious ICT activities. As you rightfully mentioned during our opening session on Monday, Honorable Chair, capacity building is indeed a cross-cutting and transversal issue and serves as a prerequisite for all other pillars informing our work at the OEWG. Therefore, it is vital to treat it with the same urgency, but also the long and deep breath it often takes. Capacity building cannot wait. However, we should not start racing ahead without the right equipment, nor a clear understanding and strategy on where to go and how to attain the envisaged level of cyber competency. First and foremost, Germany believes that capacity building should be a multidimensional, multifaceted tool that is built upon a strong partnership approach to ensure that it is effective, coordinated, evidence-based, and targeted to the needs and priorities of all parties. Germany further recognizes that capacity building should respect human rights, fundamental freedoms, be gender-sensitive and inclusive, transversal and non-discriminatory. It is fundamental. to promote the application of the UN Capacity Building principles adopted by the OEWG and streamline these into all our joint efforts to avoid duplication by leveraging our expertise and resources for a holistic approach to capacity building. Before turning specifically to your guiding questions, Germany would like to commend you, Honorable Chair, for having set a date for the Global Roundtable on Cyber Capacity Building in May. It is very timely to see the event taking shape already in the form of a high-level meeting designed to provide an action-oriented platform for capacity building practitioners, state representatives, and interested stakeholders to exchange ideas, share best practices, and build partnerships with the aim of building synergies and advancing the international community’s work on capacity building in concrete ways. Bearing in mind the high priority of capacity building for so many member states within this working group, Germany’s hope is that this will be an event that makes all the voices of a global, inclusive, and high-level multi-stakeholder representation heard that we need to hear to gain further ground and more depth on this matter. Now turning to your guiding questions, Germany would like to highlight the development of a national cyber strategy and policy, establishing a dedicated entity for cyber matters, setting up a CERT, promoting cooperation mechanisms with relevant stakeholders, and having access to specialized skills among some of the foundational capacities required for states to foster cyber resilience and respond to cyber threats. UNIDIR’s work as part of their study on mapping foundational cyber matters is a very useful resource within this regard and could serve as the backbone for further study within the OEWG. Moreover, it is specifically helpful for member states to identify the gaps within their own cyber ecosystem, as outlined yesterday by the Philippines with their presentation of an needs-based approach to achieve our common goal, implementing the UN Framework of Responsible State Behavior. Germany also appreciates the complementary work undertaken by UNODA to compile an overview on the landscape of existing capacity-building programs and initiatives within and outside the UN at global and regional levels, matchmaking concrete needs by member states with the already vast landscape of existing and continuously expanding offers of capacity-building programs is the first step of practically applying a demand-driven approach to capacity-building. In a similar vein, Germany already seeks to apply an inclusive demand-driven approach throughout its capacity-building programming by engaging with its partners early on to identify needs and gaps as early as during the design phase of future initiatives for cooperation. This is also why Germany sees merit in further looking into the proposal for a global cybersecurity cooperation portal by India and would like to thank the delegation once more for presenting its idea thoroughly during the last substantive session. It is now relevant to further elaborate how to merge the portal’s vision effectively into reality with existing portals such as the GFCE-CIBIL or UNIDIR cyber policy portal, as well as the proposal to establish a program of action in order to avoid duplication. Germany looks forward to discussing this idea further within the OEWG. With regards to voluntary checklists, Germany is supportive of applying these as a starting point for interested states as a means to provide actionable, measurable, and practical guidance to bolster their implementation endeavors. The Chair’s discussion paper on a checklist of practical action for the implementation of voluntary, non-binding norms of responsible state behavior in the use of ICTs has managed to compile a valuable resource and my delegation stance ready to contribute additional lessons learned, best practices, and expertise for continuous development. As today marks International Women’s Day, this holiday serves as an important reminder that we should strive to go above and beyond merely plugging a symbolic gender perspective into our work, not only once a year for a special occasion, but turning our principles into a lived reality on a daily basis. A holistic gender approach to cybersecurity goes beyond women’s participation and gender sensitivity. It acknowledges that humans are the ones impacted by cyber threats, and that people are too often in positions of vulnerability because of their sexual orientation or gender identity, for instance, and this carries particular risks for these people. To maintain a truly stable, secure, open, free, and human-centric cyberspace, the OEWG should go further in addressing and recognizing the gender dimensions of cybersecurity. As unequal power relations affect the experiences we all have online, to develop tools that incorporate a more inclusive gender perspective into capacity building, for one, gender disaggregated data should be gathered rigorously to allow for better understanding of the factors shaping women’s access and ability to benefit from digital technologies. Secondly, organizations like the Association for Progressive Communications, Chatham House, or Global Partners Digital, among others, have been at the forefront of creating gender-sensitive toolkits for the application to cybersecurity programming. These stakeholders should be consulted, and the toolkits used as the baseline for developing and of reflecting upon the role of gender in the implementation of the UN framework. Last but not least, Germany would like to reiterate its conviction that all pending items mentioned in the guiding question today might best come to fruition within the vision of a permanent, action-oriented future mechanism after 2025, namely the POA. Ultimately, it will surprise no one that Germany also sees a dedicated CBM for the exchange of information on available cyber capacity building to ensure international peace and security as a consistent next step within our joint endeavors at the OEWG. This could also be the way to turn your plea, Honorable Chair, that capacity building cannot wade into practice. Trust may not be built overnight, but it certainly helps the process to acquire skills and competences jointly learning from each other while ensuring that everyone has a seat at the table. Thank you.
Chair:
Thank you very much, Germany, for your statement. I just wanted to pick up one point that you made, Germany, and I just want to elaborate a little bit on that. You rightly expressed the hope that the Global Roundtable would be a platform also for a multi-stakeholder participation, and I wanted to completely endorse that. That indeed is the approach that I am taking in convening this Global Roundtable. In this regard, I wanted to highlight that I have written a letter to all stakeholders on the 27th of February inviting them to participate in the Global Roundtable. And expressions of interest to participate in the Global Roundtable can be made through the Secretariat, to UNODA, to Catherine Priceman, or to the Chair’s email, which is cyberoewgchair at gmail.com. The copy of the invitation I sent to the stakeholder community is on the OEWG website. That is the first point. Second, to all the stakeholders present here this morning or following the discussions on UN Web TV, I take this opportunity to invite you and ask you to be engaged in the Global Roundtable so that you can bring your knowledge and expertise and network to the Global Roundtable and contribute to our efforts to create an action-oriented platform, as you put it, Germany. The Global Roundtable is intended to be an action-oriented platform that will build synergies, that will build partnerships, that will strengthen existing partnerships, that will share lessons and best practices. And I think the participation of stakeholders is very important in this exercise. The third and last point that I wanted to make is that for members here, as well as to the stakeholders, if you think that there are stakeholders out there who have previously not been engaged in the OEWG process but who can make an important contribution to capacity building, do bring the letter of invitation to their attention. Do tell them about the Global Roundtable. And we want stakeholders from across the world. And it is also important that we have a diverse group of stakeholders from different parts of the world, because it is clear so far in the debate that everyone is doing capacity building already. So we are not starting from ground zero. Many countries are already doing things. Germany, you spoke about your efforts. Canada, you mentioned the many things that you are doing. And Canada, you also said that we need to recognize that. Yes, I agree. We need to recognize what is already being done. But we also need to recognize that a lot more needs to be done. And it is in that spirit that I think we have to press on with this topic in the OEWG. Because we know that it is also about confidence building. So my point is a very simple one. Please reach out and get the stakeholders involved in the Global Roundtable. I’ve issued an invitation. I’ve conveyed it at my informal dialogue with the stakeholder community. And I’ve put it on the website. But this may not reach everyone who needs to be included or invited to the Global Roundtable. So I count on each one of you, stakeholders here, as well as members, each one of you, to go out and pass the word to the stakeholders. And if you think there is a stakeholder in your country who needs to be involved, pass the word to them so that they can be included and they can be invited. They can join the Global Roundtable. So let’s work together to make this Global Roundtable a very inclusive one for all of us. Thank you very much, Germany, once again for making that point. I give the floor now to Switzerland, followed by Sweden.
Switzerland:
Mr. Chair, thank you for your guiding questions. We also would like to thank the Philippines for their presentation and will study it further. Adopting a national cyber strategy and establishing a national CSIRT or a national cybersecurity Security Center, which is embedded in trusted exchange with government and private sector partners nationally and internationally, are fundamental in building the key capacities regarding detecting, defending, and responding to malicious ICT activities. While technical capabilities, such as a CERT, functions lay out at the core of handling malicious ICT activities, they are but one part of a cross-level ecosystem which includes policymaking, diplomacy, legal frameworks, and the respective capacities to build such capabilities. Such functions must then proactively reach out on existing channels to ensure cooperation in case of malicious incidents. There are several guides, maturity models, and white paper on the necessary capacities as well as on how to build them. Such available tools might include the standard literature on CERTs as provided by FIRST, ENISA, and others, as well as cybersecurity maturity models or projects within the field of cybercapacity building such as within the GFCE. They allow for self-assessment of member states in regard to their existing capacities in all the topics mentioned in the questions and hence can support the formulation of specific demands. As many others already have said, we do not start from scratch. Many initiatives or programs of capacity building already exist. The report and the mapping exercise to survey the landscape of capacity building programs and initiatives is proof of that. We would like to thank the Secretariat for the report, which gives us a good overview on existing programs and initiatives. The Global Roundtable, to be held on 10 May, will be another opportunity to take stock, build on already existing programs and initiatives, and foster synergies and better coordination in cyber capacity building. Like other delegations, we would like to emphasize the importance of the gender perspective and multi-stakeholder participation. With regards to the proposal for a global cybersecurity cooperation portal, we think that such a portal at UN level should first and foremost focus on establishing a broad overview on already existing and available information on capacity building in its broadest term, without duplicating efforts already offering such solutions, for example the GFCE Sibyl Portal or UNIDIR Cyber Policy Portal. Mr. Chair, Switzerland considers capacity building in the area of international law to be very important. Once again, we would like to commend the African Union on its common position. The development of national or common positions on the application of international law in cyberspace allows states to participate in substantive discussions here at the open-ended working group or workshop such as the ones organized by UNIDIR. Such substantive discussions in turn serve to build capacity and we should therefore allow sufficient time for them. We hope that we have been able to make a contribution to capacity building with the working paper of a cross-regional group of states on the application of international humanitarian law to information and communication technologies in situations of armed conflict and a side event held this week and co-organized with Brazil and the ICRC. Finally, as other delegations, we would like to mention the Global Conference for Capacity Building that took place in Accra, Ghana last year. Switzerland will host a follow-up conference in 2025 and invites all states to endorse the Accra call for cyber-resilient development that encourages mainstreaming in capacity building and to cooperate in its implementation. Thank you, Chair.
Chair:
Switzerland, Sweden, to be followed by Argentina.
Sweden:
Thank you, Chair. Sweden aligns itself with the European Union, and in national capacity I’d like to share a few points. Development cooperation is one of the most important foreign policy tools to promoting and protecting our interests. An open, free, and secure cyberspace is essential for economic development, as well as for promoting political and social participation. Digitalization means significant opportunities for global development. Based on democracy, human rights, and the principle of the rule of law, we are committed to ensure that this potential is taking advantage of promoting digitalization and cybersecurity with a coherent action in trade, security policy, and development cooperation. Sweden is stepping up our international engagement in the field of cyber diplomacy. A dedicated strategy for Sweden’s foreign and security policy regarding cyber and digital issues is currently under preparation. We are currently also reforming our development agenda to take into account the importance of capacity building for digital development and cybersecurity. The civil society, including the private sector, plays a crucial part in this regard. In close collaboration with ITU, the Global Forum for Cyber Expertise, and Microsoft, we will launch a report, Mainstreaming Cybersecurity and Development, in the end of this month. The report summarizes a series of workshops and engagement held across the globe. The launch will be virtual March 26, and you are, of course, all invited to join this discussion. However, no event or activity should stand in isolation. Therefore, we hope that the findings of this report and launch will fit into the High-Level Capacity Building Roundtable, the 10th of May, shared under your progressive leadership. Lastly, the digital development and cybersecurity is closely interlinked. The discussion we have here in the Open-Ended Working Group on capacity building is not in isolation. And, Chair, as we also highlighted yesterday, the forthcoming Global Digital Compact, with the aim to close the digital divide, will include capacity building elements, as well as the forthcoming resolution AI for Development, which should stay focused on our mandate. Yet, the work done in the Open-Ended Working Group and the forthcoming POA mechanism might look into how discussions on capacity building can be mutually supportive during the course of the coming year, as to avoid duplicated efforts across the UN system post-2025. Resources are limited, and we should spend them wisely. Thank you, Chair.
Chair:
Sweden, thank you very much for your statement. Argentina, to be followed by Czechia.
Argentina:
Thank you very much, Mr. Chairman. While aligning ourselves with the statement made yesterday on behalf of 14 Latin American countries and the proposed language for the next APR that was contained in that statement, my delegation would like to make the following comments in our national capacity. Aware of the interoperable nature of cyberspace, minimizing cyber threats is a shared responsibility. born by the entire international community. That is why, for Argentina, capacity-building must be understood and implemented in a broad manner. This means that courses and workshops and capacity-building activities in the area of cybersecurity must be accompanied by specific programs in order that all states may have access to the necessary technology to create a resilient cyberspace, such as the security information tools. Now Chairman, under this agenda item, my delegation would like to highlight the work undertaken by women in cyber, not just to ensure the greater participation of female delegates in this meeting, but also for their efforts aimed at capacity-building for those female delegates. My delegation supports the proposal made by the distinguished delegate of Uganda last Tuesday with regard to setting up a United Nations voluntary fund for capacity-building with a broad scope in those countries and regions that most need it. Like other delegations, we believe this fund could be part of the future permanent mechanism. Also, we believe that the fund could be managed by the secretariat of that mechanism, and that could contribute to the drafting by that secretariat of progress reports on the implementation of capacity-building measures and how such measures and actions are adapted to regional needs and realities. Also, my delegation would like to thank the Philippines for proposing the creation of a catalogue of capacity-building. My delegation considers it important to avoid duplication of efforts. We believe that the web page of that future permanent mechanism could have a link to allow all members to have access to information on capacity-building. which is being undertaken in other international organizations, such as the ITU, the World Trade Organization, UNIDIA, and the Global Forum on Cyber Expertise, so that all these organizations and other institutions. Thank you.
Chair:
Thank you very much, Arjun Chinna. Czechia to be followed by the Syrian Arab Republic.
Czechia:
Thank you, Mr. Chair, for giving me the floor. Czechia aligns itself with the EU statement and wishes to emphasize a couple of points in its national capacity. Cybercapacity building is, for my country, an important part of the national cybersecurity policy. It is a key element in improving the overall resilience against malicious cyber activities. Czechia is a relatively small country in the global as well as the European context. However, this is often an advantage in regards to cybercapacity building. As a relatively small country that has its own experience with limited personal and financial resources, we understand well what the countries with which we share our experience on cybersecurity or cybercrime have to deal with. Czechia offers cybercapacity building projects to its international partners through a multitude of already existing programs. The number of our projects is constantly growing. Currently, we are active in cybercapacity building in different regions, including Africa, Latin America, Indo-Pacific, and Western Balkans. Based on our experience, we see that non-governmental stakeholders and public-private partnerships have an irreplaceable role in cyber capacity building. And in this context, we would like, once again, call on all states to allow non-governmental stakeholders and practitioners to actively participate in the OEWG and not to veto their accreditation. Now, in response to guiding questions, we wish to focus on a specific area of tools that could enable and significantly improve global cooperation and coordination between member states regarding cyber capacity building activities. As we already mentioned in previous sessions, Czechia has, in regards to cyber capacity building, a good experience with some of the existing platforms, primarily UNIDIR Cyber Portal, GFC Cyber Portal, Sibyl Portal, and EU Cybernet. But we also perceive new initiatives for cyber capacity building platforms, first of all, the Indian proposal of the Global Cyber Security Cooperation Portal, as well as Philippines’ proposal of cyber capacity building catalog that was introduced yesterday. Thus, we support further discussion about these new proposals while keeping in mind the agreed 2023 APR and especially its recommendation in paragraph 47, aiming at not undermining already existing efforts. In regards to the Indian proposal of the GCSCP, we believe that it could suitably complement the future program of action and include some other initiatives that Czechia favors, for example, the Kenyan proposal of threat repository from last year. And ideally, it should also merge with… UNIDIR and GFCE portals. If I were to mention very specific ideas that were voiced and which we like in relation to the Indian portal, it would be for example that the portal would allow member states to choose whether the information they upload or share would be public or restricted. It would certainly also be practical to have a quality search engine enabling to search the content of all documents in the portal database. However, Czechia recommends at least in the initial phase not to complicate the design of the portal too much, not to invent too many functions or modules for it, but and now I repeat what I have already said, to focus purely on if and how the portal could incorporate already existing initiatives. I thank you, Mr. Chair.
Chair:
Thank you. Czechia, Syrian Arab Republic, to be followed by Brunei Darussalam.
Syrian Arab Republic:
Thank you, Mr. Chair. We underline the importance of capacity building and assistance to help countries, particularly developing countries, bridge the digital gap and build their national capacities, thus ensuring digital access to all without discrimination. This will also help these countries develop the capacities they need to detect, defend against, respond to, or recover from malicious use of ICTs as well as the growing cyber threats. On capacity building, the following points must be taken into consideration. The parameters of international cooperation must be respected as provided for in the report of the 2021 Working Group and the annex to the second APR. This will promote respect for state sovereignty and will be aligned with the needs and priorities of recipient countries. This will also ensure respect for and protection of the confidentiality of information on the national capacities of states. Any capacity-building measure should be politically neutral, transparent, non-discriminatory, and unconditional, underpinned by the mutual consent of concerned parties. A dedicated capacity-building mechanism should be established to provide technical assistance to developing countries on fair and non-politicized grounds. A training capacity-building fund should be established under the auspices of the United Nations for the benefit of developing countries. International cooperation and assistance can neither be effective nor credible as long as the illegal and restrictive unilateral coercive measures continue to be imposed. The negative effects of these restrictions should not be overlooked. These measures should be lifted and should no longer be imposed since their effects hinder capacity-building. We hope that the upcoming capacity-building roundtable scheduled for May will create momentum. By adopting a plan of action with clear timetables and specific measures to be taken, we hope it will lead to concrete outcomes recognizing the importance of comprehensive capacity-building for developing countries. The plan of action should give priority to training and rehabilitation. through a permanent fellowship program under UN auspices. It should also include transfer of technology. Thank you, Mr. Chair.
Chair:
Thank you very much, Syrian Arab Republic. Brunei Darussalam, to be followed by Malaysia.
Brunei Darussalam:
Thank you, Mr. Chair. I extend my delegation’s gratitude to you for your ongoing guidance in this working group, as well as to the members of your team for their hard work. Brunei Darussalam is committed to maintaining an open, secure, stable, accessible, interoperable, and peaceful cyberspace. Capacity building has been instrumental in our efforts to advance our cybersecurity ecosystem. At large, capacity building remains a key pillar of ensuring security of and in the use of ICTs. As we’ve heard time and time again, the dynamic nature of the cyber threat landscape necessitates that states continuously enhance their cyber capacities. Additionally echoed throughout this working group’s discussions is how much capacity building cuts across other parts of the mandate of this OEWG. Thus, it’s imperative for cyber capacity building programs to be demand-oriented and tailored to specific needs and challenges to ensure effectiveness and relevance. Moreover, it is also ideal to enhance states’ selection process, especially for developing states, in order to facilitate more uptake in capacity building programs. In connection to this, we would like to thank the Secretariat for its mapping exercise to survey the landscape of capacity building programs and initiatives. While my delegation continues to study this paper and its observations, we acknowledge that it provides a fair list of existing efforts and program providers, as well as themes across different opportunities. At the same time, we feel that the UN, through this working group, could assume a greater role in addition to consolidating the different types of programs that are on offer, to also do so in such a way where there is continuity in accordance with the cyber threat landscape, and one that is optimal in empowering states. states to decide which program could cater to them best on the basis of needs and demand. In this regard, we thank the Philippines for the proposal they have presented on a needs-based capacity building catalog. The proposal provides a promising foundation to further enhance how states engage capacity building programs, as well as to maximize the UN’s role in being a more universal body that can bring states together. We look forward to hearing further details about this proposal from the Philippines, which has room for streamlining with other ongoing as well as potential initiatives that have been mentioned in this working group, such as UNIDAIR’s Cyber Policy Portal and the GCSCP proposed by India. My delegation welcomes the intersessional meetings of the OEWG and the preceding round table on capacity building in May to have further discussions on the issue of capacity building. Finally, Mr. Chair, I take this opportunity to reaffirm my delegation’s support to this process as we strive to advance and progress in addressing security of and in the use of ICTs. Thank you, Mr. Chair.
Chair:
Thank you very much, Brunai Darussalam, for your statement. Malaysia, you have the floor, please.
Malaysia:
Mr. Chair, Malaysia welcomes today’s discussions on capacity building. Capacity incidents are inevitable, and the effectiveness of response and recovery will depend on the preparedness of people, technology and processes in place to ensure minimal disruption. This level of preparedness and readiness rely on the capacity and capability that have been established. Capacity building in cybersecurity does not only entail developing a skilled workforce enhancing expertise but also fostering a culture of cyber security awareness or cyber hygiene. Cyber security awareness is vital in creating a cyber hygiene conscious society able to reap the full benefits of technologies including ICTs. In this regard, Malaysia joined others in commanding the Secretariat the mapping exercise to survey the landscape of capacity building programs initiative within the outside of the UN and the global and regional levels. Cyber security cannot be addressed through a one-size-fits-all. Malaysia supports Rwanda’s command on the groundwork needed to identify context-specific foundational capacities in cyber security. Malaysia also shares the view of Nigeria that capacity building should target existing technology as well as emerging trends. Further, Malaysia concurs with Australia’s statement on how cyber capacity building priorities and needs evolve just as technology evolves and that as the threat environment evolves our framework to address threat will also deepen. In line with the principle of security by design, Malaysia supports India’s call for OEWG to consider how cyber security considerations and good practices can be integrated into future digital development projects while recognizing the unique needs circumstances and state of cyber security development in both low and high income countries. Malaysia looks forward to additional deliberations on India’s proposal for the development of a global cyber security cooperation portal. Malaysia also thanks the Philippines for the proposal on a needs-based capacity building catalogue and believes these could be further explored. Malaysia also believes that the UN has a central role to play in increasing international cooperation among cybersecurity capacity builders, thus avoiding duplications of efforts and optimizing the use of limited resources. At the same time, it is imperative for states to organize themselves domestically through a risk-based approach in prioritizing or reprioritizing its capacity building needs so as to ensure that the UN’s central role will be well suited to national needs. This approach includes the identifications of cybersecurity areas that need enhancement and identifications of required capacities, followed by identifications of domestic agencies with the mandate for coordination and implementation. This is important in avoiding disintegration and redundant initiatives that do not bring about desired benefits. While it is important to ensure that the cybersecurity agenda is a top priority of governments, Malaysia shares the views of many member states on the invaluable contributions of industry and other stakeholders, given the nature and complexity of the cyber domain. In this regard, Malaysia looks forward to the high-level dedicated Global Roundtable on ICT Security Capacity Building in May, where ministers, senior officials, and experts will come together and discuss this critical subject. Finally, Malaysia would like to take this opportunity to wish all women participants a happy International Women’s Day. All of you are my inspirations, and to all the men, thank you for being our strong allies. Special thanks to the Women in International Security and Cyberspace fellowship, and in particular to Australia. As a fellow, I have witnessed first-hand the advantages of this capacity-building program, which enhances the knowledge and expertise of women involved to training and mentorship. Most of all, I believe it is a testament to the value of capacity-building as a confidence-building measure. Thank you.
Chair:
Thank you so much, Malaysia, for your statement and also for your wishes on International Women’s Day. Friends, we still have about 10 to 12 speakers. I propose that we take a 10-minute coffee break now, so we will come back and resume the speakers’ list. 10-minute coffee break. The meeting is adjourned. Thank you. I’m sorry to have broken up that raucous party in the corner. It sounded very fun and festive and that’s a good reason to be happy that we are getting to the almost at the end of our work this week. So let’s continue with the speakers list. I give the floor now to Ukraine to be followed by Fiji on capacity building. Ukraine, please.
Ukraine:
Mr. Chair, Ukraine aligns itself with the statement delivered by the European Union and now would like to make some remarks in its national capacity. In the second annual progress report, states agreed that the OEWG could be a platform for the exchange on better understanding the needs of developing countries with the aim of narrowing the digital divide through capacity building efforts so as to work toward ensuring that all states have the necessary capacity to observe and implement the framework for responsible state behavior in cyberspace. Ukraine concurs with the conclusions also of the 2021 OEWG report that the principles of capacity building should be further mainstreamed in the capacity building initiatives on security and the use of ICTs. At the same time, in 2022 OEWG report, states expressed concern that the lack of awareness of existing and potential threats and the lack of adequate capacities to detect, defend against or respond to malicious ICT activities may make them more vulnerable. Ukraine welcomes the convening of a dedicated roundtable on capacity building on 10th May 2024, which we believe will bring high-level representatives of member states and stakeholders to exchange on best practices in this field. Mr. Chair, Ukraine reiterates its full support for the principles of responsible state behavior in cyberspace. …takes active part in the work of international platforms, including on capacity building, exchanges of information… …as well as collaborates with international partners, particularly NATO and the European Union… …to promote such principles and combat cyber threats. Our experience in countering armed aggression against our country, in particular in the cyber domain… …offers a stark reminder of the central role of cyber security in modern conflicts. Every day, various Ukrainian governmental bodies investigate thousands of cyber security incidents… …summarizing the experience gained from these events and taking into consideration… …ever-evolving threat landscape, our country continues to build up its security capabilities on a daily basis. Such initiatives include participation in joint cyber defense exercises and information sharing. Additionally, the government has begun allocating financial resources to develop its domestic cyber defense infrastructure. In particular, the representatives of Ukraine’s governmental bodies in charge of cyber security… …participate in annual command and staff exercises of the strategic level, national cyber readiness… …organized under the auspices of the National Cyber Security Coordination Center… …as well as various international events in the field of cyber security. Recently, the National Cyber Security Coordination Center and the State Service of Special Communications… …and Information Protection of Ukraine have signed a cooperation agreement with the European Union Agency… …for Cyber Security, ENISA, aimed at building capacity in the field of cyber security… …which includes best practices sharing, awareness raising, as well as exchange of information… …on the cyber security threat landscape. On 7th and 8th of February 2024, Kyiv hosted the first International Cyber Resilience Forum 2024… …Resilience at the Cyber War, initiated by the National Coordination Center for Cyber Security… U.S. Civilian Research and Development Foundation. The forum was supported by the U.S. Department of State and co-organized by the Ministry of Foreign Affairs of Ukraine, other Ukraine’s governmental bodies, as well as the Institute for Cyber Warfare Research. During the forum, participants reaffirmed their commitment to a united front against cyber aggression and stressed that the security of their countries’ national interests depends on Ukraine’s resilience. Overall, this is the first time in recent years that such a cybersecurity event has been held in Ukraine. It has brought together government and business representatives, the cyber community, technological companies and leading industry experts. The Kyiv International Cybersecurity Forum is planned to be held annually, creating the basis for the development of a platform of sharing best practices, joint strategies and measures to counter cyber threats. To conclude, Mr. Chair, we invite young member states to continue working on implementing principles of responsible state behavior, raising awareness, building capacities, especially in the light of already existing as well as emerging threats in cyber domain. Thank you, Mr. Chair.
Chair:
Thank you very much, Ukraine. Fiji, please.
Fiji:
Mbula vinaka, yandra vinaka, and good morning, Chair and dear colleagues. Fiji would also like to wish and echo other delegations in wishing everyone a happy International Women’s Day. Chair, international law, norms and confidence building measures can only be implemented and adhered to if all member states have the capacity and the capability to act on them. We convey our thanks to the Secretariat for the mapping exercise document and we are reviewing it closely. Chair, we thank you for the invitation yesterday to add to this living document and propose for the recently published outcomes document. of the inaugural Pacific Cyber Capacity Building and Coordination Conference, or P4C, be added to the Secretariat paper. The outcomes document outlines five key themes. Pacific leadership, contextualized capacity building, improved Pacific cyber ecosystem, embedded sustainability, and inclusive development. Chair, it also provides for 10 recommendations covering these five themes. For example, two such recommendations are to put in place a flexible plan that sufficiently balances the need for short-term interventions to respond to immediate needs with long-term maturity uplift. Another recommendation is to put in place a sustainability plan that addresses concerns surrounding long-term affordability, including the total cost of ownership for the life of a product or service, national sovereignty, local workforce capacity and capability uplift through knowledge sharing. In response to your first guiding question, Chair, these recommendations can be conceded on the foundational capacities from the perspective of the 13 Pacific island countries and our eight partner governments who are part of that conference. Additionally, Chair, we note that pursuant to the 2023 Microsoft Digital Defense Report, basic hygiene practices protects against 99 percent of attacks. We also note that there is a high turnover of the required skill sets, and there’s also statistics on the sector skills gap. Chair, this demonstrates the importance of having a resilient and robust workforce, building a culture of cyber hygiene in our communities, and a focus on the meaningful leadership and participation of women and girls. Chair, to this effect, last year we carried out the ITU Global Girls in ICT program at one of our peri-urban schools with a cohort of 55 girls from diverse economic and cultural backgrounds. We carried out a four-month program of tailored workshops and mentoring sessions for this cohort, which we found very successful, and we will continue to do this year. We also convened a Women in Tech conference last year to discuss not only the challenges that exist, but the opportunities that can be further enhanced. There are also efforts that are being undertaken to ensure tailored capacity building domestically to diverse audiences in partnership with development partners and with various stakeholders, and we will continue on all of these fronts. Fiji advocates for building and enhancing the technical, legal, diplomatic, and policy capacities of states in this regard. These include investment in the development of human resources, development of workforce plans and information sharing, train-the-trainer modules, and secondment rotation programs, including support in technical certifications. Chair, we request that an area that our group can look at is exploring a toolkit of job descriptions for essential positions, such as in national certs and cybersecurity and technical positions. Now these are all critical areas of need for developing states to ensure a healthy, robust, resilient, and a resilient digital workforce, and to adjust the challenge of recruiting and retaining the necessary skill sets. Chair, another foundational capacity that this group can also look at is to deepen the understanding on resilient technology infrastructure and the challenge of the increased cost of climate-resilient digital infrastructure, including data centers, the cost of forensic tools, and the ability to identify the origin of such cyberattacks, which have also been identified in the P4C outcomes document. We thank the various organizers for the side events that we have had this week, including the scenario-based events. We also thank the Government of Ireland in UNIDIR for organizing the side event looking at subsea communications cable as critical infrastructure, and we look forward to the report that is being put together. Chair, I referred to Fiji’s earlier intervention. on the way in which we’re implementing the CBMs, which includes capacity building efforts. In that vein, Fiji acknowledges the strategic, international, regional, and bilateral enduring partnerships, such as the governments that are partners in the Blue Pacific, the Council of Europe and state parties to the Budapest Convention, the Women in Cyber Fellowship partners, and technical, multilateral, and private sector partners like ITU, APT, GFCE, the Commonwealth Telecommunications Organization, UNIDIR, UNITAR, the Pacific Island Forum, Pacific Island Telecommunications Association, the Oceania Cybersecurity Center, World Bank, and ADB, to name a few. Fiji has already witnessed the tangible and far-reaching benefits of initiatives being birthed through these partnerships. With that being said, we also welcome further partnerships and are keen to learn more about the various tools that have been proposed in this OEWG. Chair, with regard to your second last guiding question, Fiji reiterates the need for gender-sensitive capacity building programs, as stated by other delegations, and are listening intently to the responses by delegations and support the statements made by Canada and others yesterday and this morning on this thematic area. We also acknowledge that initiatives such as the UN Singapore Fellowship and the Women in Cyber Fellowship have made great strides at building capacity and indeed is a confidence-building measure. Chair, finally, as Fiji, as other countries here today, also looks forward to the wave of prompt implementation of sustainable and the needed capacity-building initiatives which will generate not only greater participation but indeed result in greater impact. Thank you very much, and thank you.
Chair:
Thank you very much, Fiji, for your statement. Tonga to be followed by Sri Lanka.
Tonga:
Chair, this is my delegation’s first time to take the floor in this session, so we would like to thank you and your team and the Secretariat for the great work you have carried out throughout this entire process. To us all, happy International Women’s Day. On the topic of capacity building, we thank the Secretariat for the mapping exercise and its paper. We echo what was said yesterday by the distinguished delegate of Australia that it is encouraging to see that so much has been done to build the capacity of small and developing states, including Tonga. The mapping exercise did highlight the inaugural Pacific Cyber Capabilities and Coordination Conference, P4C, which you have already heard from Fiji and Australia mention, which was held in Fiji in October last year, and we fully support Fiji in calling for the addition of the outcome report to the mapping exercise of the Secretariat. We further believe that these are also outcomes that could apply at the global level. We would like to thank again the partners in the Blue Pacific member countries who made it possible, Australia, New Zealand, the United States of America, the United Kingdom, Canada, Germany, Japan, and the Republic of Korea, as well as the partners in Blue Pacific private sector who also made it possible, BAE Systems Australia, and Cyber CX, and finally, the P4C was not possible without the collaboration of the Oceania Cyber Security Centre and Global Forum on Cyber Expertise. We also note that from the mapping exercise the recognition of the Women in International Security and Cyberspace Fellowship, without which my delegation’s participation at this and previous sessions would not be possible. We hope to contribute our national position on the application of international law to cyberspace in the coming sessions, thanks to the capacity building received under the fellowship. And we thank the donor countries of this great initiative. As for your questions, Chair, I will address two, the first two questions. On question one, we’d like to contribute five foundational capabilities, lessons learned from our own country and which we are still learning. Number one, a national cybersecurity framework or strategy and implementation plan. Tonga adopted its national cybersecurity framework in May of 2022, alongside other complementary frameworks to improve the overall security profile and ICT capabilities across our government. We are in our implementation phase, which includes legislative reform, among other things. Two, the establishment of a national computer emergency team. Tonga established our national CERT in 2016, which has actively been upskilling itself through partnerships with providers such as Trustwave, the ITU, APNIC, to name a few. We plan on setting up a CERT in the future. Three, infrastructure and maintenance of information technology. Four, a dynamic knowledge-based economy through public awareness of cybersecurity risks. Our government has implemented plans and actions. to raise awareness of the importance of cyber security through awareness initiatives conducted by our National CERT, our Public Service Commission, and the creation of several working groups dealing with cyber safety, cyber security, and cyber crime. And five, lastly, international cooperation. Our national cyber security framework recognizes the vital importance of this and continue to build these relationships with organizations like FIRST, Asia Pacific CERT, and the Pacific Cyber Security Operational Network, PACSON, which help to build our awareness and competency in computer security incidents. These as well as our diplomatic partnerships helped our nation in responding to the ransomware attack on our state-owned telecommunications company in February of last year. Chair, with regards to your second question on the GCSCP, firstly, we thank the distinguished delegate from Philippines for her presentation, and we will study this further. We do agree with many other states that this could be consolidated into the UNIDIR cyber policy portal, which utilizes the GFCE civil portal as well. Thank you, Chair.
Chair:
Thank you so much, Tonga, for your intervention and contributions. I give the floor now to Sri Lanka to be followed by Botswana.
Sri Lanka:
Mr. Chair, my delegation underscores the critical importance of enhancing cyber security capacities in developing countries. Having carefully considered the guiding questions, we are of the view that we must appreciate the context, then define what we need to achieve, adapt to the local conditions. Proceed to seek sustainable and affordable solutions, attempt to add value, and be prepared for unforeseen contingencies. To strengthen the cybersecurity capacities of developing countries to detect and defend against malicious ICT activities requires several foundational capacities such as cybersecurity expertise, policy and legal frameworks, information sharing and collaboration, incident response capacities, technical infrastructure, awareness and education, and international cooperation. Chair, there are existing studies and frameworks that can serve as a foundation for this open-ended working group to study and build upon. These studies focus on identifying and developing foundational capacities in various domains related to technology, innovation, and sustainable development. Digital skills frameworks, technology readiness assessment models, sustainable development goals, and innovation capacity assessment models are some of the examples. By adopting a demand-driven approach, capacity building efforts can effectively address the specific needs and demands of developing countries and lead to more relevant and impactful outcomes. As we deliberate on the imperative of enhancing cybersecurity capacities in developing countries, it is essential to underscore the significance of leveraging existing mechanisms for effective collaboration and information sharing. Sri Lanka is hopeful that the Global Roundtable on ICT Security Capacity Building, scheduled to be held in May 2024, would provide a platform for developing countries to foster collaborations and share knowledge. experiences, and best practices in ICT security capacity building among diverse stakeholders from government, industry, academia, and civil society. Sri Lanka looks forward to participating at the Global Roundtable on ICT Security Capacity Building, understanding the importance of implementing comprehensive legal and regulatory frameworks and institutional arrangements to create an enabling environment for cyber security capacity building, Sri Lanka is focusing on strengthening laws and regulations relating to cyber security, such as data protection, privacy, and online safety, aligned with international standards and best practices, while considering the specific needs and circumstances of the country. Additionally, we are of the view that the United Nations can facilitate the mobilization of resources from member states, international organizations, and other stakeholders to support ICT capacity building initiatives in developing countries. This could include establishing funding mechanisms such as grant programs, public-private partnerships to facilitate capacity building initiatives in developing countries. Chair, we commend the capacity building mapping exercise undertaken by the Secretariat, which was mandated by the second APR, which serves as a vital tool for understanding the landscape of cyber capacity building initiatives. Further, on this International Women’s Day, Sri Lanka welcomes various tools that would assist states in incorporating gender perspectives into capacity building efforts. In this context, we appreciate the Women in Cyber Fellowship, which aims to address the need for greater representation of women. in UN negotiations on cyberspace. In conclusion, we are confident that, by working together with determination and collaboration, we can build a more secure and resilient cyberspace for the present and future generations. I thank you, Chair.
Chair:
Thank you very much, Sri Lanka. Botswana, to be followed by Antigua and Barbuda.
Botswana:
Mr. Chair, the Botswana delegation stresses the great importance capacity building has in assisting states in the organization of their national cybersecurity efforts, in developing policy frameworks to protect their critical infrastructure and critical information infrastructure against ICT threats, in the implementation of agreed norms, and to develop national positions on international law, among others. Chair, it has been noted by other delegations in the present and previous sessions how important it is for states to strengthen their capabilities not only to identify cyber threats, but also to respond to these threats and avert ill-use of ICTs. This requires strategic, operational, and technical capacity building that will ensure effective risk detection and remediation. To address your guiding questions, Chair, on some of the foundational capacities required for states to detect, defend against, or respond to malicious ICT activities, and also for them to utilize effectively existing mechanisms, the Botswana delegation identified the need for capacity building in the following areas, among others. A, skills in risk identification and management of areas that could be vulnerable to external ICT manipulation in an effort to come up with or outsource suitable ways to fight ICT threats. B, data management, because the more society relies on information communications technology, the more data is accumulated, thereby necessitating the creation of data management systems that are protective of this data and the higher the need for data management skills. C, skills for developing strategies and policies to enable good cyber governance, to ensure safe, fair and effective implementation of information technology, and to prevent malicious cyber use. Our delegation believes that the OEWG should determine the model for rolling out capacity building and work hand-in-hand with regional bodies to roll out the available capacity building initiatives. We have indicated before the relevance of regional bodies and capacity building for reason that they have a greater understanding of the needs of their member states and are better placed to facilitate capacity building from their end. Enhancing the technical, strategic and tactical capacity of member states to tackle cyber threats will create a safe cyber space which we all aspire for. With regards to how the global cyber security cooperation portal proposed by India last year should look like, it should be user-friendly and available in all UN languages, and it would also be useful if it considers the diverse experiences, behaviours, needs and priorities of different states, taking into consideration that these needs and priorities of states evolve over time, as has been highlighted by Australia. Our delegation applauds the Philippines for proposing such a user-friendly tool as required by previous discussions outlined in the second APR, which encourages states to develop and share tools that would assist states in implementing capacity building initiatives. Our delegation would be interrogating this tool further. Mr Chair, in the spirit of International Women’s Day, our delegation welcomes the incorporation of a gender perspective into capacity building efforts. We agree that incorporating the gender perspective will help bridge the gender-digital divide to ultimately achieve gender equality. Our delegation also calls for strengthening capacity of actors involved in designing and implementing cyber security policies to incorporate awareness campaigns that will tackle gendered cyber threats, provide gender-inclusive recommendations on cyber security hygiene strategies. and address cross-sectoral cybersecurity resource inequalities. Finally, Chair, the role of the OEWG in capacity building is to oversee the transfer of knowledge and skills using a multi-stakeholder approach and in collaboration with regional and country group efforts for the maintenance of global peace and stability in the cyberspace. Botswana looks forward to the Global Roundtable on Capacity Building and is undertaking national processes to facilitate high-level participation of this Roundtable. Thank you, Chair.
Chair:
Thank you very much, Botswana, for your statement and contributions. Antigua and Barbuda to be followed by Pakistan.
Antigua and Barbuda:
Mr. Chair, the State of Antigua and Barbuda in this seventh substantive session of the OEWG of security of and in the use of ICTs is pleased to make this statement in the area of capacity building. As it is our first time taking the floor during this session, our delegation would like to commend you and your team for your hard work and to pledge our support and cooperation in working towards a successful outcome to this process. Chair, we concur as you indicated in your opening remarks that capacity building remains a fundamental and cross-cutting pillar of all the related discussions on ICT security. And yes, much remains to be done in the area of capacity building. We have taken note of the needs-based cyber capacity building catalogue proposal by the Philippines and feel that there is merit also in Kenya’s proposal for a repository of threats. Chair, you have made the call for action in capacity building. In our intervention in the sixth substantive session, our delegation viewed technical capacity or expertise, incident response capability, to include simulated practical exercises especially geared towards response to attacks on critical infrastructures and the establishment of certs as foundational capacities required for states to detect, defend against, or respond to malicious incidents using ICTs. For Antigua and Barbuda, we are currently working on our national cybersecurity strategy and the proposal to identify our critical infrastructure which we deem important if we are to protect those critical infrastructures. To provide some level of response and resilience, we are open to any assistance with tools and equipment as we build out our cyber incident response team. As we seek to build a cyber capacity and enhance the cybersecurity ecosystem of the Latin America and Caribbean region, we are currently exploring becoming a participating nation of the Latin America and Caribbean Cyber Competence Center, LAC4. In April, in collaboration with the OAS, Antigua and Barbuda will host a cybersecurity tabletop exercise with participants from the Eastern Caribbean Islands of St. Lucia, St. Vincent and the Grenadines, Dominica, and Grenada. Chair, we continue to recognize and appreciate the efforts of the OAS, Canada, CARICOM Impacts, and their partners for their continued efforts in building cyber capacity in the application of international law to cyberspace, international humanitarian law, state behavior in cyberspace, cyber diplomacy, and CBM’s implementation. We’re taking small steps, but we are making an effort. Finally, Chair, as we celebrate International Women’s Day today, we applaud the contribution of all the female delegates in this process. Special congratulations to my fellow women in CyberFellows, whose session after session continue to display the results of capacity building that we have received. Words of gratitude are extended to our sponsors, Canada, Australia, UK, USA, the Netherlands and New Zealand. Thank you, Chair.
Chair:
Thank you very much, Antigua and Barbuda, and thank you for contributing to this important debate. I think the voice of the Sits and the voice of the Caribbean is very important and I appreciate very much that you have given us an update on some of the issues that is happening in your country and also in your region. Pakistan to be followed by Samoa.
Pakistan:
Thank you, Mr. Chair. Pakistan emphasizes the pivotal role of capacity building in effectively addressing current and potential cyber threats. The widening gaps in capabilities and skills among the state underscores the urgency of this endeavor. We commend existing capacity building initiatives as a valuable template for future program. However, a targeted focus on legal capacity building across diverse realms, including cyber governance and policymaking expertise, is indispensable. We support the proposal for an action plan to strengthen institutional strength, enabling states to actively engage in the POC directory and combat cyber threats effectively. Regarding the guiding question that what foundational capacities required for states to detect, defend against or respond to malicious ICT activities, we believe that the foundational capacities could include establishment of robust cybersecurity. frameworks and policies, development of a skilled cybersecurity workforce through training and education programs, collaboration and information sharing among cybersecurity agencies, continuous monitoring and evolution of cybersecurity measures to adopt evolving threats. Identification of such foundational capacities can support demand-driven capacity building by tailoring training programs and resource allocations based on specific needs identified by states. This approach ensures efficient utilization of resources and targeted improvement in cybersecurity capabilities. Checklists and tools for mainstreaming capacity building principles may include assessment framework for evaluating cybersecurity readiness and gaps, templates for conducting cybersecurity risk assessments and mitigating planning. Regarding the guiding question on additional role of the United Nations, the UN can play additional role in capacity building efforts by providing technical assistance and expertise to member states in developing cybersecurity strategies and capabilities, facilitating and coordinating international cooperation and collaboration through different platforms, supporting the exchange of best practices and lessons learned among the states and relevant stakeholders, advocating for increased funding and resources for cybersecurity capacity building, strengthening partnership with other international organizations, private sector, civil society organizations to enhance cybersecurity resilience globally. Chair Pakistan also supports establishment of a dedicated funding mechanism to support capacity building projects in developing countries. In closing, capacity building of all states on equal footing is a key measure for secure and stable governance. The principles of capacity building programs should be demand-driven, unconditional, sustainable and holistic. The upcoming Global Roundtable on Capacity Building provides a very good opportunity to build partnerships and advance focused and action-oriented development. capacity building initiatives. I thank you, Mr. Chair.
Chair:
Thank you very much, Pakistan. Samoa, to be followed by the Democratic Republic of the Congo.
Samoa:
Thank you, Chair. I would like to express our appreciation for your guidance and able leadership throughout this substantive session, and thank you for the guiding questions that we found useful in guiding our discussions. Chair, we have been listening carefully to the many interventions in this room since Monday, and have been absorbing and learning from the very useful information on experiences shared that we can relate and use in regards to our situation as SIDS. This open-ended working group is an opportunity for Member States to share information, national interests, build relations, and to determine our priorities to achieve our goal. However, for others, it is also an opportunity to learn from others with the most experience, whether in this room or in the corridors, and hopefully apply what we have learned to try and fill the gaps and advance our national capacity and processes on security in ICT. Thus, this process in itself is, in a way, a form of capacity building for others. In this regard, we would like to acknowledge with appreciation the sponsors of the Women in Cyber Security for enabling capacity building for women in this room who are making meaningful contributions to this process. Chair, the aim to build capacity is to narrow the digital divide by supporting developing countries through tele-capacity building to broaden understanding and be able to build resilience in the cybersecurity domain. We are of the view that capacity building should be inclusive, taking into account the different needs and capacity of States. and should be tailored to fit specific needs and circumstances, especially those of the developing countries. We thank the Philippines for the presentation of the Needs-Based Capacity Building Catalogue, and we will take this to Capitol for further consideration. We feel that the UN can play a role in consolidating other existing lists to avoid duplication. Chair, in response to your guiding question on foundational capacities, my delegation is of the view that states must be equipped with right infrastructures, personnel training to enhance competency in international law, and developing technical skills and knowledge, effective monitoring and analysis capabilities, capacity to implement the CPMs, build resilience in the field of information security, and importantly, mainstreaming gender into cyber capacity building. Chair, allow me to share an update on our national capacity building efforts. Samoa established its national CERT in 2021, and in 2022, Samoa and New Zealand signed a collaborative agreement on cyber security to provide support to each other through reciprocal information sharing, active sharing of data to assist in responding to incidents, and in incident handling and collaboration on development of projects to bolster cyber awareness and resilience. This partnership for Samoa has assisted in increasing our experience and awareness of cyber safety and security and building resilience in the cyber domain. Samoa has also received training for capacity from ITU on data protection, cyber security, public policy, and social engineering and ransomware. In the Pacific region, we have the first Pacific Cyber Capacity Building and Coordination Conference, P4C, held last October in Fiji and jointly funded by our partners in the Blue Pacific, which consists of Australia, New Zealand, the United Kingdom, the United States, Canada and the Republic of Korea. This was mentioned by delegates from Fiji, Australia and Tonga in their interventions yesterday and earlier this morning. The P4C provided a space to share experience and explore best practices and methods to improve cyber capacity building amongst our Pacific countries, as well as to strengthen cooperation on cybersecurity between Pacific partners. We echo Fiji’s suggestion on the recommendation and outcomes of this regional meeting, P4C, to be listed as identified foundational capacities for our region. However, ongoing capacity building is needed to sustain this effort for practical implementation. Lastly, Chair, SAMO welcomes with appreciation the convening of the upcoming Global Round Table on ICT Security Capacity Building in May. A dedicated high-level meeting on capacity building is very timely, given the imminent need for capacity building in the cyber domain. The invitation has been conveyed to CAPITAL and is currently under consideration. Chair, we will do our part as a foreign ministry to find resources for participation to this important high-level meeting. I thank you, Chair.
Chair:
Thank you very much, Samoa, for your contribution. I think your point about finding resources for participation in the Global Round Table is a very important one. And at the same time, it is important that the Global Round Table has a diverse representation from different regions, and I think we certainly would need the presence of leaders from the Pacific there, as well as from different regions. So I hope also that partners in this room will engage with their friends to see how you can support the participation of different countries so that we have a good representation of leaders and senior officials, and not to mention stakeholders, at the Global Roundtable. Thank you very much, Sumer, for your contribution. DRC, to be followed by Croatia.
Democratic Republic of the Congo:
Mr. President. Chair, this is the first time that my delegation has taken the floor. Therefore, allow me at the outset to congratulate you and your team and the Secretariat. I wish to commend your leadership and your commitment, which we are certain will allow us to achieve strong results. In a context where we’ve seen the growing use of information and communication technologies, use by state and non-state actors in times of armed conflict, my delegation remains concerned about the respect for international law in general and respect for international humanitarian law in particular. This is because we think that respecting the rules is necessary in this area. This effort will contribute to the maintenance of international peace and security. Having said that, our statement today will address confidence-building measures and capacity-building. But we want to briefly sketch out the obligations incumbent upon states, the obligation namely to respect international law in cyberspace and to abide by the rules of international humanitarian law there. Chair, it is true that information and communication technologies are a tool for human interaction. They are a vector for social development as well as an engine for economic growth, sustainable development and eradication of poverty. Yet it is just as much true that ICTs create numerous challenges that have made cyberspace a very dynamic area. This has impelled us to confirm that we need to continue to deepen our discussions here. This is why my delegation reaffirms that international law, including international humanitarian law, apply in the area of ICTs to guide the responsible behavior of states for activities in cyberspace have an impact on the physical world through the consequences that they can entail for critical infrastructure and the impact they can have on vulnerable people, especially young people and women. My delegation reiterates its support for the common African position, which was adopted by the African Union, the position that international law applies in cyberspace, and we are pleased to see our region, Africa, be the first to present a common position in this area. We encourage all the other regional groups to follow suit. Given the growing threat in cyberspace, my delegation stresses the importance, even the urgency, of regulating cyberspace not only among states but also together with public and private stakeholders to put in place a collective multilateral order to preserve international peace and security. Speaking of confidence-building measures, Mr. Chair, the Democratic Republic, number one, stresses the importance of the establishment by the United Nations of a point of contact Directory, to be developed in accordance with the principles of sovereignty and sovereign equality, and in accordance with the principle of the settlement of disputes by peaceful means and in accordance with the principle of noninterference in the internal affairs of states. Secondly, we stress the importance of cooperation among CERTs to improve the efficacy of how we combat threats, vulnerabilities, and security incidents. Next, to improve cooperation among states on capacity buildings to bridge the digital divide, protect infrastructures, critical infrastructure, and preserve essential services. Third, we stress the importance of cooperation among the public and private sector, allowing for the public and private sector to share resources and information to promote effective strategies to combat possible threats. Fourth, responding to your guiding question of how we can accelerate the implementation of confidence-building measures set out in the initial list of voluntary confidence-building measures, the Democratic Republic of the Congo favors support of regional and sub-regional organizations to accelerate the implementation of these measures. In order for this to happen, we encourage regional and sub-regional organizations to share their relevant experience and best practices within the group as is being done during this session. Chair, as for the appointment of the diplomatic and technical points of conduct, the Democratic Republic of the Congo wishes to reassure you that the process of appointment is underway and the names will be provided to you. As for capacity building, my delegation stresses the importance of international cooperation to address challenges in cyberspace. In this digitally interdependent world, international cooperation, including through assistance with technical expertise and through capacity building and knowledge transfer, remains essential to bridge the digital divide and to ensure that cyberspace is open, secure, stable, accessible, and peaceful. These capacity building efforts, which contribute importantly to the establishment of trust among states, can help us to develop strategies, policies, and national procedures for effective cybersecurity to strengthen capacities to protect critical infrastructure and uphold the law, and by extension, they can bolster trust among us. For our part, the Democratic Republic of Congo has a national digital plan known as Horizon 2025. This is a public policy document with 69 priority projects. It comprises four pillars. These are infrastructure, content, applied uses, and governance slash regulation. We have established a digital ministry. We have created an agency for digital development. The parliament recently ratified the digital code. We validated a national cybersecurity strategy. We’ve also implemented other projects that are operational today. These are all concrete achievements stemming directly from the national Horizon 2025 plan. However, in order to implement all these initiatives, we need financial resources to make them operational. We also need the basic – we need to bolster our basic infrastructure, such as the capacity of states to have access to electricity and to the internet. and to the digital tools that are the foundation on which ICTs are built. In the meantime, we’re concerned by the lack of information and capacity to detect cyberattacks, to defend against them, and to respond to them. That can make us more vulnerable. This is why we support the proposal aiming to encourage the continuation of technical exchanges on threats posed by ICT to strengthen our capacity to identify and detect malicious activities linked to ICTs, and to defend against them, and to respond with full knowledge of the facts while being aware of existing mechanisms, such as channels among certs, and we need to supplement those mechanisms. My delegation calls for strengthening coordination and cooperation with stakeholders such as businesses and non-governmental organizations and academia due to the role that they play in the context of partnerships with states, including for the purposes of training and research. Here again, we need the necessary capacity building to identify reliable stakeholders with whom we can engage in a genuine dialogue to strengthen the development of policies and to establish the trust needed to address attacks against digital security. Chair, we cannot conclude our intervention without hailing the UN Singapore Fellowship Program and without encouraging other states that are capable of doing so to follow suit, to allow other developing countries to close the existing digital divides. In closing, the Democratic Republic of the Congo remains open to any cooperation in the digital realm in a healthy way with no conditions imposed. We reaffirm our support to India’s proposal to establish a global cybersecurity portal, and we welcome the presentation made yesterday by the Philippines. We hope that the management of all of these tools will be placed under the care of the United Nations. I thank you for your attention.
Chair:
Thank you very much, Democratic Republic of the Congo. Thank you for your contribution, and I note that this is your first intervention this week, and just as well that we have heard you on this important topic. Thank you very much. Croatia, to be followed by Djibouti, please.
Croatia:
Thank you, Chair. And Croatia aligns itself with all previous interventions of the European Union, and in the national capacity, we would like to briefly express support to some great contributions from the last couple of days. When it comes to the application of international law in cyberspace and international humanitarian law, we fully support interventions by Colombia and Senegal on behalf of a group of states, and would like to thank them all for very valuable contributions to our discussions. We would also like to congratulate members of the African Union for their position paper, which is a beacon for other regions and a great example how to do homework. We at the European Union should follow their steps, and we hope that other regions will do the same. And to foster good neighboring relations, we would like to commend the excellent intervention by Cote d’Ivoire on application of international law in the cyberspace. Furthermore, following the intervention of Uganda, Ethiopia, and our other neighbor, on the need of the financial support for developing countries, we would like to stress the importance of embodying and connecting cybersecurity with development assistance. What was also highlighted at the Global Conference on Capacity Building. building in Accra last year. Acknowledging U.S. and other valuable contributors to the World Bank, we would like once again to emphasize the importance of encouraging the international financial institutions to dedicate more resources for financing cyber projects and development of secure ICT infrastructure, and we agree with Uruguay that we should also make a link with SDGs in this regard. On developing CBMs, we share views of Switzerland and Pakistan on step-by-step approach, and additionally we support statement of Chile made on behalf of the group of states. We look forward to German proposal on additional CBM on capacity building, and agree with Japan that program of action will be a right forum to discuss and elaborate further CBMs. We would also like to echo Republic of Korea on the need to connect capacity building with identifying POC for directory, and support Ecuador and Colombia proposal that the POC meeting on 9th of May should be held in the hybrid format, allowing the broad participation of POCs from all around the world. When it comes to the capacity building, as many colleagues have stated, no state should be left behind, and we should encourage exchanges and mutual cooperation. Croatia is lucky to have great neighbors and friends in the European Union and beyond, and that through exercises and collaboration we are not just developing our own capacities, but also helping others and sharing expertise. Despite the size and limited capacities, but with the whole of the government approach, we have managed to draft already a second national law on cybersecurity, which was adopted last month in the parliament. Among other things, the law identifies and expands the list of critical infrastructure and their obligations to report and build cyber resilience. but also introduces the obligation of cyber security exercises for public and private sector entities. Our delegation believes that through regional and cross-regional exercises, countries could raise their own resilience and capacities to better address cyber threats, but also build trust. Here, we also agree with Botswana on important role of regional organizations in implementation of capacity building initiatives. Our delegation would like to wholeheartedly thank Secretariat for dedicated work and enormous efforts invested into mapping exercise and report on capacity building, and we count on your support also in the future. Croatia agrees with intervention delivered by Argentina on behalf of Latin American countries on capacity building, and with Peru and Australia on cross-cutting nature of the capacity building. We will closely study the proposal by Philippines and believe that capacity building initiatives should be aligned and brought under one roof, and as Tonga mentioned, it could be done under auspices of UNIDIR. And as many colleagues have pointed out, our work in the field of ensuring ICT security nationally and worldwide would be almost impossible without useful and indispensable support by the multistakeholder community. And as Mauricio nicely put, public-private partnership is necessary for an efficient capacity building and for bridging digital divide. Thus, we would like to encourage broader participation of stakeholders, resuming active interaction with the states and providing the stakeholders adequate time to share their views. My delegation has invested additional efforts to summarize our interventions this session, and we will deliver only three of them, though saving some time, which we will gladly share with the stakeholders. Chair, we share also your views on the important participation of diverse stakeholders at the Global Roundtable in May. Thank you, Chair, and happy International Women’s Day.
Chair:
Thank you very much, Croatia, for your statement and also for your comments on the various other comments and contributions made by other delegations. Djibouti to be followed by Ghana.
Djibouti:
Thank you, Chairman. At the outset, allow me also to thank you for the sincere words of recognition with which you opened our meeting this morning, the 8th of March, 2024, which is the International Women’s Day. My delegation takes this opportunity to pay tribute to all women, to the central role they play in the family and in the world. Mr. Chairman, with regard to the issue of capacity building, my delegation reiterates the importance of this issue. Capacity building is a central issue. It contributes to enlarging the full use of cyberspace and should contribute, amongst other things, to enhancing confidence-building measures, as you highlighted yesterday. Therefore, capacity building is necessary to prevent potential threats, particularly for developing countries. Indeed, my delegation would like to stress that the Focal Points Guide will be a very important tool. It will make it possible to standardize our knowledge with regard to cybersecurity. This strategy should allow us to interconnect the world in an organized manner and ensure responsible behavior of states at the national level. That strategy will allow us to establish a national team which would enjoy training and which would monitor the critical infrastructure. and respect for private life. The capacity building should also allow us to organize programs with regard to wellness raising regionally, but also nationally, and this would affect all stakeholders, states, the public powers, legislative and parliamentary powers, as well as civil society. We’d like to thank the Secretary of the United Nations for the scholarships offered to women in the area of cyber security. Furthermore, the program on capacity building should take account of the particular natures of each state and their specific needs, and for that reason, international cooperation should be enhanced to support developing countries. We look forward with great interest to the organization of the next roundtable on capacity building, and we hope that it will bring specific, safe and secure solutions. Thank you, Mr. Chairman.
Chair:
Thank you very much, Djibouti, for your statement. Ghana, please.
Ghana:
Mr. Chair, thank you for giving me the floor. I would like to join others before me in wishing us all a happy Women’s Day. In response to your guiding questions on existing studies of foundational capacities that the OEWG could study and build upon, my delegation believes that frameworks such as the Cyber Security Capacity Maturity Model for Nations, developed by the Global Cyber Security Capacity Center, can be invaluable for identifying capacity building priorities. For instance, a collaborative case study between the Cyber Security Authority of Ghana and the World Bank, entitled Ghana, a case study in strengthening cyber resilience, was launched during the Global Conference on Cyber Capacity Building GC3B in 2023 in Accra. It underscored the significance of such models and frameworks in identifying capacity needs. and in recommending next steps for member states. Initiatives such as this conference, which was co-organized by the World Bank, the Global Forum on Cyber Expertise, the Cyber Peace Institute, and the World Economic Forum, and hosted by the government of Ghana, are useful in helping states prioritize their cyber security developments and clearly outlining subsequent steps. We believe that identifying the needed capacity at a foundational or formative level can lead to the realization of demand-driven capacity building by tailoring capacity building initiatives in a way that is beneficial to their respective states. Targeted capacity building programs that address specific needs and priorities can be developed based on identifying foundational capacities and gaps. This approach ensures effective resource allocation by focusing on building capacities in areas deemed foundational and critical for cyber security resilience. Mr. Chair, my delegation also wishes to emphasize the importance of international cooperation in all capacity building initiatives. Actively participating in regional and international cyber security communities, such as the Global Forum of Incidence Response and Security Teams, FIRST, and other similar forums to strengthen collaboration with other state sets, including signing bilateral and multilateral agreements for information sharing and joint response to cross-border cyber incidents is essential. Ghana has benefited from capacity building engagements with institutions like the Global Forum on Cyber Expertise, the Council of Europe, among others. Given the cross-border nature of cyber crimes, collaboration with both stakeholders and non-stakeholders is imperative to effectively build capacity to address these issues. While stressing the need for international cooperation, it is also important that member states implement appropriate measures at the national level to build a resilient cyber ecosystem. This ensures that all states can work together in a coordinated manner to harness the benefits of digitalization and contribute to a safe and secure cyberspace, reducing vulnerability to the various threats highlighted in the OEWG discussions over the past few days. To this end, Ghana would like to cite, as cited by Croatia, and highlight the Accra call signed during the inaugural conference on cyber capacity building in November 2023. This call outlines actions to strengthen the role of cyber resilience as an enabler for sustainable development, advanced demand-driven, effective, and sustainable cyber capacity building, foster strong relationships, stronger relationships and partnerships, and better coordination, and unlock financial resources and implementation modalities. We welcome other states and organizations to join this call to strengthen coordinated action in support of international cyber resilience. I thank you.
Chair:
Thank you very much, Ghana, for your statement and also for referencing the Accra call, which has also been mentioned by others. May I suggest to you that you could send us a copy of the Accra call so that it can be shared with members on the OEWG website. UNIDIR has asked for the floor, so three minutes for UNIDIR.
UNIDIR:
Thank you, Mr. Chair, for giving UNIDIR the floor and for your leadership throughout this process. Let me start by sending my best wishes for International Women’s Day to all women representatives in the room today. We know we still face an underrepresentation of women diplomats in many international security and disarmament fora, and this has a negative impact on policy development. I therefore wanted to celebrate your expertise, your enthusiasm, your commitment, and all the incredible contributions you continue to make to the work of this UNDP. group and to the world. I would like to express Unity’s gratitude to the many delegations that, since the beginning of the week, have shared their appreciation for our work. We are very happy to see our foundational cyber capabilities research so extensively referenced in the draft Norms Implementation Checklist included in the Chair’s discussion paper. This positive feedback is very important for us, as it signals that we are on the right track and that our work is impactful. Our gratitude for this goes to all of our donors, who, with their support, enable us to continue pushing the envelope and deliver useful activities. In relation to the topic of capacity building, I have three brief points I would like to share. First, we have heard the call for more scenario-based workshops, and also as a tool for capacity building. This is a very well-established methodology that has been successfully used by a variety of stakeholders in this room already. Australia, the Philippines and Uruguay used it last July and a few days ago. Many regional organizations we have heard will integrate this approach in their annual programs of work, and of course we used it as well last November and are currently exploring options to conduct similar exercises for the entire group in May. Having conducted many exercises of this kind in the past, I would like to share probably the most important lesson learned. The success of these workshops is 100% dependent on the participants. Even a perfectly designed workshop will fail to deliver its intended outcomes if participants do not approach it with the right mindset. And in the context of this group, I believe that there are two key determinants of what the right mindset actually is. First, the willingness to use the workshop as a platform to discuss scenarios from a substantive point of view, and not as another platform to reiterate known political positions. Second, ensuring that participants have sufficient familiarity with the subject to actively engage in the discussion. If everyone is there only to take notes and report back to capital, the workshop will be a very silent and underwhelming experience. With this in mind, I hope that if we manage to organize a workshop in May, you will be able to help us deliver the best possible results by engaging and participating. I would like to bring to your attention also a call for nominations that we broadcasted to all New York and Geneva-based missions earlier this week. This call for nominations refers to a training initiative on norms and international law that we are implementing with the support of the United States. Such training will include both an online, self-paced part and an in-person, fully-sponsored learning week in Geneva. Please refer to your permanent missions, and if for any reason our broadcast got lost, do not hesitate to contact us directly, and we’ll be happy to share the details with you. This capacity-building initiative includes also the possibility for states to request united help in developing or in designing the process to develop national positions on international law. Lastly, another important call for nominations was launched yesterday by UNIDIR. Building on and inspired by one of the most successful capacity-building initiatives we have witnessed in recent years, the Women in Cyber Fellowship, UNIDIR is piloting in 2024 a Women in AI Fellowship. Whether or not AI and its implications for international peace and security will find its own dedicated multilateral platform, there is no doubt that AI will impact most, if not all, already existing multilateral discussions. We only have to remember how earlier this week almost all interventions under the agenda item of threats included more or less detailed references to artificial intelligence. For this reason, we have decided to develop and pilot this fellowship, with a starting point being let’s not wait until there is a process in place with a potential gender gap to address. Let’s build a cohort of trained women diplomats that can shape the discourse from the beginning. And this is particularly important given the amplifying effect that artificial intelligence will have on adverse gendered impacts related to digital technologies. This is a pilot edition, relatively small in scale, and intended as a proof of concept. If we can get even close to the success of the Women in AI Fellowship, UNIDIR will be able to make a significant contribution. in cyber fellowship, then we hope that more support and resources will come from member states. You can find all details of this fellowship on our website, and as usual, you can contact us directly if you have any questions. Thank you.
Chair:
Thank you, UNIDIR, for your statement and also for all the work that you do. Friends, it’s ten minutes to one, and I have no further speakers on capacity building. I just wanted to share some very quick points to sort of wrap up the discussions we’ve had. Once again, this has been such a very rich and productive and constructive and concrete discussion, so thank you very much. Second, do submit the many statements that were made to the Secretariat or to the email of the chair’s office. I think it is good for all of us to look at some of these statements with greater attention as we return after this week of very productive discussions. And I also note that quite a number of delegations spoke in this debate under this section on capacity building for the very first time, which is also sending a very strong signal of the importance of this issue in terms of its cross-cutting nature, in terms of its foundational nature, to the rest of the things that we are trying to do in this Working Group. So I think we need to recognize the expressions of great interest, the expressions of greater needs and expectations, and, of course, we also have to recognize that a lot is already being done. So we are not starting from ground zero, but there is certainly a lot more distance we need to travel collectively in this open-ended Working Group. Now quite a number of proposals and ideas were made, but first In terms of the foundational capacities, a lot of you responded very concretely to this question. I think that’s very helpful that we have at least a sharing of views on what states regard as foundational capacities. And I think there could be some value in perhaps putting together on a piece of paper some of these common elements in terms of what is or what are some foundational capacities. Already listening to the statements, many of you said national ICT policies, national strategies and plans as a foundational capacity, certainly ICT infrastructure, national certs or cyber agencies, greater societal awareness of ICT security, and then tools and skills in terms of identifying threats, risks and how to manage them, as well as digital and data management capabilities. So quite a number of elements that overlap in terms of core foundational capacities, but also additional capacities that are context-specific, region-specific, country-specific, which is also a point that many of you made. So I will give some further thought as to how we can put together some of these foundational elements, at least on a piece of paper, and I’ll be happy to share them with you as well for further discussion. Many of you also, in the context of capacity building, mentioned there’s no one-size-fits-all, how the context is so important, how it must be demand-driven, how it must be needs-driven. I think that is a continuing theme right from the beginning, but we heard of that today because many of you spoke about your own national experiences, your bilateral programs that you have with your partners, regional programs, and of course, how you’ve participated in global capacity building initiatives. So in that sense, the discussion today is already a sharing of information exercise, sharing of best practices. So it supplements the mapping exercise. The report done by the Secretary General or the Secretariat is there as a reference point, but it’s a static picture of what happened based on the inputs submitted by 20 to 30 countries. It is a great starting point, but it can, over time, be supplemented by the information that we share with each other, by the information that each one of you may submit as additional things that you are doing or that are happening. Quite a number of proposals also were made today. So I thank the Philippines for their proposal, which many of you referenced. I think there was also a proposal from Kuwait for a tool to help states further discuss the rules, norms, and principles, and to track the national implementation of these rules, norms, and principles. And I think these two proposals are also related to the Global Cybersecurity Cooperation Portal that was proposed by India, which many of you also referenced. And the question for us is how do we synergize the different proposals, how do we build on each other, how do we avoid duplication. Now in the context of that, I think at least one of you said that new proposals should not undermine existing proposals. I can see where that point is coming from, but I think we also should have a mindset that doesn’t look at proposals that are put forward as proposals that could automatically undermine other proposals, but the question is how proposals can complement each other, how proposals can avoid duplication. It’s inevitable that in a multilateral architecture that there’s some degree of overlap. Overlap in itself does not amount to undermining or weakening other proposals, and a new proposal put forward should not be assumed to be a malicious one that will undermine something that’s existing. Some degree of overlap will be inevitable, whether it’s the ICT domain or SDGs domain across the board, there will be many different initiatives. So the question is not whether there’s an overlap, but whether there is duplication, whether there is duplication to such an extent that it becomes a distraction or a dilution of efforts and resources. So that’s where the question of synergies come in. How do we synergize and complement what is existing with what may be put forward? So this is something that we need to keep in mind. I invite all of you to keep an open mind, so it’s not a question of no new proposals versus let’s have more new proposals, but it’s a question of how do we build on what we already have in a step-by-step and incremental manner. Many other interesting proposals. in terms of designing national ICT policies and strategies. I think Greece and Thailand made a reference to it. Creation of national ICT infrastructure, national coordination mechanisms as foundational capacities. I think the US and Germany talked about it. Establishing and strengthening certs. Argentina, speaking on behalf of the group, referenced this, but also South Africa and Germany. Just to mention a few. And in terms of the types of capacity building that are needed, many of you spoke about transfer of ICT tools and technology required for ICT security. Nigeria and Uruguay referenced this. Access to expert advice when needed, Uruguay referenced this. Training the trainers, Albania made this suggestion. Encouraging states to build on technical assistance, including through workshops and trainings on all pillars of our framework. I think this was made by the group that Argentina spoke for. And cooperative approaches and pooling resources within regions, and I think the role of regional groups, I think, was referenced by many of you. Peru spoke about it, and then I think the Pacific Islands also spoke about this. The African delegations also spoke about this. So very, very detailed and rich suggestions on the table for us to think about how to take the next step. And then also in terms of how to improve capacity building efforts, integrating best practices and integrating capacity building principles into the programs. I think quite a number of you referenced capacity building proposals, principles. India also spoke specifically about this. Enhancing public and private sector partnerships. involving academia, civil society, innovators, stakeholders, many, many of you spoke about that and how we need to make stakeholders, industry, private sector as partners in this exercise. And then I think Rwanda mentioned the need to think of reviews and self-assessment tools to identify very context-specific capacity building needs. And of course, in the context of International Women’s Day, in particular, the whole question of gender perspective was mentioned by so many of you that I think we need to think very seriously about how we should reflect this in our outcome documents. I think there was also a suggestion to develop a checklist for capacity building providers to align the different programs. And I think this is also in line with the capacity building, in line with the second annual progress report, which is one of the recommended outcomes, paragraph 50 of the second APR. So I think that’s one area that we need to further focus on. And finally, certainly not the end of an exhaustive list. Finally, the question of funding for capacity building was mentioned by many of you. Uganda, Uruguay, Argentina, speaking for a group, Sri Lanka, underlined the need for additional resources to fund capacity building in a predictable and sustainable way, the idea of some kind of funding mechanism within the UN framework. And then I think Iran also referenced this, and some of you said this needs to be embedded within the larger context of development funding and SDGs, which was also referenced in the second annual progress report in paragraph 43E. So that is… a topic that has come again at this discussion and the whole issue of how do we mobilize resources, allocate resources through some kind of mechanism. So friends, these are very, very important points. And the other thing that I want to end on in one minute before we release our interpreters is that as we discuss the landscape, the plethora of stuff that is already existing there, we also need to focus specifically on what is the role of the United Nations? What is the role within the UN architecture that we need to do as the next concrete step? So that’s where some of the specific ideas have been put forward in terms of the portal or the needs-based e-catalog, but how do we do it in a way that complements, but more importantly, strengthens the multilateral framework? Remember, this is the OEWG at the United Nations. This is not a meeting outside in a different region that is in a regional framework. We are the United Nations open-ended working group operating within the framework of the UN Charter. And in that context, we have a cumulative and evolving framework. And therefore, there is a certain role for the United Nations. Now, what exactly is that role in this domain of capacity building, but also in various other domains is the question. The POC directory is anchored at the UN. It’s not floating around in a private sector outfit. The global POC directory is not an NGO or stakeholder initiative. It is anchored here at the United Nations. That’s because we all believe in strengthening the multilateral system. The United Nations is our international body, the only universal body that we have. So it’s also important that as we discuss in the OEWG, we think of strengthening the UN. UN in small, concrete, incremental steps. But doing things at the UN does not amount to undermining existing initiatives outside the United Nations. I think that is a distinction that we need to keep in mind. So what is it that we do meaningfully in the UN that complements efforts outside the UN but strengthens the multilateral framework? Because at the end of the day, this is the United Nations. We are all committed to strengthening the United Nations. The multilateral system, the UN Charter, international law, and the cumulative and evolving framework that we must continue to apply, implement, and strengthen and develop. So on that note, my friends, we’ve come to an end. I was hoping that we could go on to the next item, but certainly not. Thank you very much to the interpreters. We’ll meet here at 3 p.m. sharp. The meeting is adjourned. Enjoy your lunch.
Speakers
AA
Antigua and Barbuda
Speech speed
131 words per minute
Speech length
514 words
Speech time
235 secs
Report
In their statement during the seventh substantive session of the Open-Ended Working Group (OEWG) focusing on information and communication technologies (ICTs) security, the delegation from Antigua and Barbuda emphasised the critical importance of capacity building in the realm of ICT security.
They began by thanking the OEWG chair and team for their efforts, and assured full cooperation towards the group’s objectives. Aligning with the chair’s speech, the Antiguan delegates acknowledged that considerable work remains in the field of capacity building, an area they deemed foundational to the ICT security discourse.
They brought attention to two proposals aimed at bolstering capacity building measures: the Philippines’ idea for a needs-based cyber capacity building catalogue and Kenya’s suggestion for a central database of cyber threats to better inform collective defence strategies. The delegation from Antigua and Barbuda then shared details of their national undertakings, which include the development of a comprehensive national cybersecurity strategy and plans to identify critical infrastructure in need of protection.
Building an effective cyber incident response team remains a national priority, for which they seek international support in terms of tools, equipment, and technical assistance. Antigua and Barbuda’s commitment to regional collaboration was underscored by their intention to join the Latin America and Caribbean Cyber Competence Center (LAC4) officially.
This initiative is part of their broader strategy to enhance cross-national cyber competencies. They also mentioned an upcoming collaborative cybersecurity tabletop exercise, hosted with the Organisation of American States (OAS), involving multiple Eastern Caribbean Islands, aimed at improving collective cyber resilience.
Gratitude was extended for the ongoing assistance provided by entities such as the OAS, Canada, CARICOM Impacts, and their partners in critical areas like the cyber application of international law, cyber diplomacy, and the implementation of confidence-building measures. The statement further celebrated International Women’s Day by acknowledging the contributions of female delegates and the CyberFellows program to the field of cybersecurity.
In closing, acknowledgment was given to international sponsors—specifically Canada, Australia, the UK, the USA, the Netherlands, and New Zealand—for their support in developing cybersecurity capacity building initiatives. In summary, Antigua and Barbuda’s statement at the OEWG clearly articulates their commitment to enhancing cybersecurity capacity building within their nation and the wider international community.
They highlighted the significance of collaborative knowledge sharing, the necessity of ongoing developmental support for practical cybersecurity resources, and celebrated the spirit of inclusivity and international cooperation in the cybersecurity sphere.
A
Argentina
Speech speed
137 words per minute
Speech length
391 words
Speech time
171 secs
Report
The Argentine delegation, aligning with the consensus of 14 Latin American countries, emphasised the importance of cybersecurity during their address to the chairman. They advocated for robust and inclusive cybersecurity capacity building, recognising it as a transnational responsibility due to cyberspace’s interconnected nature.
Emphasising the multifaceted approach required, Argentina insisted that capacity-building should extend beyond educational initiatives like courses and workshops, to include enabling access to critical security technologies. This would help all nations to improve their cyber defences, contributing to a safer global digital environment.
Particularly noteworthy was the delegation’s focus on the vital contribution of women to cybersecurity. Argentina lauded efforts to increase female representation and participation, both at the meeting and in broader security-related educational activities. Argentina endorsed the Ugandan proposal for the creation of a United Nations voluntary fund dedicated to cybersecurity capacity building, with a vision for this fund to support particularly vulnerable nations and regions.
They suggested this fund could become part of a future permanent mechanism, whose secretariat would be responsible for managing the fund and preparing progress reports. These reports would aid in evaluating the effectiveness of the capacity-building programmes and their alignment with diverse regional necessities.
The delegation also commended the Philippine proposal for a comprehensive catalogue of capacity-building endeavours to avoid redundant work. Argentina proposed that this catalogue should be made readily available through a link on the permanent mechanism’s webpage, urging for close coordination with international entities such as the International Telecommunication Union (ITU), the World Trade Organization (WTO), the United Nations Institute for Disarmament Research (UNIDIR), and the Global Forum on Cyber Expertise (GFCE).
In closing, the Argentine representation envisioned a cohesive and secure cyberspace, prioritising the empowerment of women, adopting an all-encompassing strategy for enhancing cybersecurity, and promoting global cooperation to share information and expertise effectively. The summary maintains appropriate UK spelling and grammar throughout, ensuring accuracy and reflection of the main text.
B
Botswana
Speech speed
169 words per minute
Speech length
695 words
Speech time
247 secs
Report
The Botswana delegation emphasises the critical need for capacity building as a cornerstone for nations to effectively manage their cybersecurity operations. This involves the establishment of policies to protect critical infrastructure and the ability to respond efficiently to threats in information and communication technology (ICT), which should be in line with international standards and contribute to the evolution of international law.
In response to the chair’s enquiries, Botswana highlights three key areas where capacity building is necessary: 1. **Risk Identification and Management:** Enhanced skills are required to recognise potential vulnerabilities susceptible to external ICT exploitation and to develop or acquire corresponding countermeasures.
2. **Data Management:** With the increasing dependence on ICT and the accumulation of data, robust systems and proficiency in data management are crucial for safeguarding such information. 3. **Cyber Governance:** It is essential for states to develop capabilities to devise strategies and establish regulations that promote strong and fair cyber governance, preventing malicious cyber activities.
Botswana suggests that Open-ended Working Group (OEWG) should collaborate with regional entities to implement capacity-building programmes, leveraging their insight into specific needs and enabling more efficient facilitation. On the subject of the global cybersecurity cooperation portal proposed by India, Botswana endorses the creation of a platform that would be available in all UN languages, be user-friendly, and adapt to the varied and shifting requirements of states.
This support aligns with Australia’s comments on the changing needs of states and commends the Philippines for suggesting the portal, which aligns with the second annual progress report’s (APR) encouragement of states to develop tools that assist with capacity-building projects.
Botswana also recognises International Women’s Day, calling attention to the importance of integrating a gender perspective in capacity-building activities to address the gender-digital divide and promote gender equality. The delegation underlines the need to educate policy-makers on gender-specific cyber threats, implement gender-aware cyber security hygiene practices, and confront resource disparities across different sectors.
In conclusion, Botswana envisions the OEWG playing a crucial role in enabling the exchange of expertise and capabilities in a multi-stakeholder environment that is aligned with regional and national efforts. Such collaboration is seen as essential in maintaining global peace and stability in cyberspace.
The delegation eagerly anticipates its contribution to the Global Roundtable on Capacity Building and is preparing for active participation in this high-level dialogue. This comprehensive summary reflects Botswana’s dynamic and collaborative approach to cybersecurity, underscoring their commitment to ongoing dialogue, inclusivity, and the refinement of policies and practices to enhance the security of global cyberspace.
UK spelling and grammar have been used throughout, ensuring the summary is of high quality and accurately depicts the main analysis.
BD
Brunei Darussalam
Speech speed
191 words per minute
Speech length
508 words
Speech time
159 secs
Report
The delegate from Brunei Darussalam began by expressing gratitude to the Chair for steering the working group and to the team for their meticulous work. Brunei affirmed its dedication to promoting a cyberspace that is open, secure, stable, interoperable, and peaceful, placing emphasis on capacity building as a crucial component in enhancing their cybersecurity structure.
The representative emphasised the ongoing need to bolster cyber capacities in light of the mutable nature of cyber threats. Capacity building was highlighted as a pivotal department within the remit of the Open-Ended Working Group (OEWG) and as essential to maintaining security in ICT use.
The Bruneian delegate recommended demand-driven, tailor-made capacity building initiatives, which are considered to be more efficacious and pertinent. It was noted the importance of refining the selection procedures for these programmes, especially to aid developing countries in maximising capacity building opportunities.
The efforts by the UN Secretariat to conduct a survey of capacity building programmes were acknowledged by Brunei, which culminated in a directory of initiatives and providers. While still evaluating the results, the delegation recognised the usefulness of this list and suggested a more pronounced role for the UN via the working group.
This would encompass not just compiling the various programmes but also ensuring their relevance with the ever-evolving cyber threat landscape, thus empowering states to select programmes that resonate with their specific needs and requirements. The delegation commended the Philippines for its proposal of a needs-based capacity building catalogue, which is regarded as a firm foundation to improve state engagement with capacity building initiatives.
This proposal was signalled as a potential point of convergence with other ongoing and forthcoming projects, including UNIDIR’s Cyber Policy Portal and India’s outlined GCSCP. Brunei displayed eagerness for the forthcoming intersessional meetings of the OEWG and the May roundtable that will delve deeper into capacity building.
In conclusion, the delegate reiterated Brunei’s commitment to the OEWG proceedings and to addressing security concerns associated with the use of ICTs. These comments from Brunei’s representative indicate a harmonisation with the international urgency for augmented collaboration, coordination, and clarity in capacity building endeavours within cybersecurity.
C
Canada
Speech speed
125 words per minute
Speech length
718 words
Speech time
345 secs
Report
In observance of International Women’s Day, the speaker addressing the Open-Ended Working Group (OEWG) underscores the importance of incorporating gender considerations into their efforts, praising the focus on gender issues. They acknowledge the need for continued progress in capacity-building responsibilities, a field they wish to keep expanding, noting its critical role.
The speaker underscores Canada’s staunch commitment to capacity building as a cornerstone for global cyber stability. This commitment has been demonstrated through Canada’s historical dedication, substantiated by initiatives such as the allocation of 20 million USD towards supporting 12 projects. The speaker also highlights the success of the Wake Fellows program at the United Nations as proof of positive results from Canada’s investment in capacity-building programs.
Capacity building’s practical aspects are then expounded, with the delineation of seven foundational capacities needed by states: technical expertise, cyber threat identification and response, legal frameworks, political strategy development, education, international cooperation, and infrastructure and technology advancement. On the topic of cooperation and efficient use of resources, the speaker advocates for the Philippine proposal of creating a global portal, emphasising the necessity of avoiding redundant efforts.
They propose leveraging the Global Forum on Cyber Expertise (GFCE)’s extensive experience to guide the portal’s construction, to ensure it enhances and expands upon the capabilities of existing tools. Addressing voluntary tools for capacity building, the idea of a checklist is introduced, serving as a self-assessment guide for states to harmonise their activities with OEWG principles.
This checklist conversation sets the stage for the upcoming roundtable, expected to be a platform for discussing and honing the tool to ensure its effectiveness. The speaker then aligns the discussion with the day’s theme of gender, advocating for a concentrated meeting to explore gender-specific cyber challenges.
This meeting would utilise the OEWG’s mapping of capacity-building initiatives to examine the differing impacts of cyber attacks on women and formulate strategies against online gender-based violence. It would further discussions on encouraging diversity and balanced representation in cybersecurity policy-making.
Concluding, the speaker reaffirms Canada’s proactive role in endorsing capacity building to bolster cyber resilience, highlighting the imperative of integrating gender considerations into these initiatives. These proposals are positioned not only to improve defenses against cyber threats but to also promote inclusivity within the domain of international cybersecurity strategy, ensuring that the summary remains accurate, reflective of the source content, and uses UK spelling and grammar.
C
Chair
Speech speed
130 words per minute
Speech length
5176 words
Speech time
2396 secs
Arguments
Celebration of International Women’s Day and recognition of women’s role
Supporting facts:
- International Women’s Day is a day for reflection on the role of women
- Recognition of Women’s input in Peace and Security through a UN Security Council Resolution since 2000
- Acknowledgement of women’s contribution across all domains
Topics: International Women’s Day, Women, Peace and Security
Appreciation of women’s contributions to the OEWG process and ICT security
Supporting facts:
- The OEWG has a foundation built on over two decades of women’s contributions
- Women leaders play a vital role in the OEWG
- Gratitude towards countries supporting the women in cyber fellows program
Topics: Open-Ended Working Group, ICT security, Women in Cyber Fellows program
The necessity to bridge the gender-digital divide
Supporting facts:
- Chair emphasizes on supporting women’s role in ICT security to strengthen the framework
- Future mechanisms of the OEWG will also hinge on women’s pivotal participation
Topics: Gender-digital divide, ICT security, OEWG future mechanism
Capacity building is essential for a secure, stable, resilient, and peaceful cyberspace.
Supporting facts:
- Capacity building supports states, especially those with limited cyber capabilities, to prepare, prevent, respond, and mitigate cyber threats.
Topics: Cybersecurity, International Cooperation
Vietnam supports the Philippines’ suggestion of a needs-based cyber capacity building catalog.
Supporting facts:
- The catalog would organize existing capacity building programs for easy access and reference.
Topics: Cybersecurity, Capacity Building, ICT Development
Digital forensics is crucial in investigating and mitigating cyber incidents.
Supporting facts:
- Investing in advanced technologies and skilled professionals for e-forensics is important.
Topics: Digital Forensics, Cybersecurity
Vietnam advocates for enhanced global and regional cooperation between SIRTs.
Supporting facts:
- Collaborations can share threat intelligence, best practices, and resources.
Topics: Cybersecurity, International Cooperation, Threat Intelligence
Anti-Advanced Persistent Threat (APT) capabilities need to be bolstered.
Supporting facts:
- APTs are becoming more sophisticated, necessitating advanced tools and collaborative strategies.
Topics: Cybersecurity, Anti-APT Strategies
Vietnam endorses training programs for high-level cybersecurity experts, particularly the train-the-trainers model.
Supporting facts:
- Such programs will empower experts to disseminate knowledge at a broader scale.
Topics: Cybersecurity Education, Capacity Building
Gender is a cross-cutting and significant issue.
Supporting facts:
- Canada acknowledges the importance of International Women’s Day and gender issues.
Topics: Gender Equality, International Women’s Day
Canada is committed to addressing gender issues and capacity building.
Supporting facts:
- Canada has admitted to not fully carrying out its duty on gender issues but shows enthusiasm for future work.
- Canada has been engaged in capacity building activities for several years and supports international capacity building projects.
Topics: Gender Equality, Capacity Building, Cyber Stability
Capacity building is crucial for global cyber stability.
Supporting facts:
- Canada invests in capacity building activities through programs like the Wake Fellows program at the UN and endorses the ongoing support for these endeavors with 20 million U.S. dollars dedicated to 12 projects.
Topics: Capacity Building, Cyber Stability, Global Cooperation
A global portal for cyber capacity building could avoid duplication of efforts and enrich existing resources.
Supporting facts:
- Canada is attentive to the Philippines’ proposal for a global portal and underlines the importance of complementing existing resources.
- Canada suggests utilizing GFCE’s experience for the portal development.
Topics: Cyber Capacity Building, International Cooperation
An easy-to-use checklist for states could aid in the integration of capacity building measures.
Supporting facts:
- Canada proposes a checklist to help states self-assess their capacity building activities in alignment with Annex C of the OEWG report.
- Discussion on the checklist is anticipated for the roundtable on May 10th.
Topics: Cyber Capacity Building, Self-evaluation Tools
Incorporating a gender perspective in cyber capacity building is crucial, especially on International Women’s Day.
Supporting facts:
- Canada supports the idea of a meeting that focuses on gender perspective in cyber capacity building.
- Topics for such meeting could include cyber attacks on women and online gender-based violence.
Topics: Gender Perspective, Cyber Security
Capacity building is fundamental for cybersecurity development and norms implementation.
Supporting facts:
- Capacity building assists countries in detecting and responding to malicious ICT activities.
- Cert-to-cert cooperation is an existing mechanism for capacity building.
Topics: cybersecurity, capacity building
Capacity building programs should be customized and targeted based on individual country needs.
Supporting facts:
- Programs should include financial resources and technology transfer.
- The Philippines has proposed a needs-based cyber capacity building dialogue.
Topics: capacity building, tailor-made programs
Cooperation and information sharing are key to strengthening cybersecurity.
Supporting facts:
- Development of portals for real-time cybersecurity information sharing.
- Linking national and regional CERTs for efficient operation.
Topics: information sharing, cybersecurity cooperation
Global Roundtable should be an inclusive, action-oriented multi-stakeholder platform.
Supporting facts:
- Letter of invitation has been sent to stakeholders on 27th February.
- Stakeholders are invited to contribute to the Global Roundtable through UNODA or the Chair’s designated channels.
- Chair’s invitation has been posted on the OEWG website for wider dissemination.
Topics: Capacity Building, Cybersecurity, OEWG (Open-Ended Working Group), Global Roundtable on Cyber Capacity Building
Minimizing cyber threats is a shared international responsibility
Supporting facts:
- Recognizing the interoperable nature of cyberspace
Topics: Cybersecurity, International Cooperation
Capacity-building must be broad, including access to security information tools
Supporting facts:
- Need for courses, workshops, and specific programs
Topics: Capacity-building, Cyber Resilience
Highlighting the contribution of women in cyber and capacity-building
Supporting facts:
- Emphasis on greater participation of female delegates
Topics: Gender Equality, Cybersecurity
Support for creating a UN voluntary fund for capacity-building
Supporting facts:
- Proposal by Uganda for a fund with a broad scope
Topics: United Nations, Cybersecurity Funding
The fund should contribute to drafting progress reports
Supporting facts:
- Managed by the secretariat of a future permanent mechanism
Topics: Funding Management, Cybersecurity
Importance of avoiding duplication in capacity-building efforts
Supporting facts:
- Philippines’ proposal for creating a catalogue of capacity-building
Topics: Cybersecurity, Organizational Efficiency
Web page for the permanent mechanism should link to international organizations’ capacity-building information
Supporting facts:
- Linking to capacity-building initiatives from ITU, WTO, UNIDIA, and GCFE
Topics: Cybersecurity, Information Sharing
Cybercapacity building is a crucial part of national cybersecurity policy for resilience against cyber threats.
Supporting facts:
- Czechia is active in cybercapacity building in various regions including Africa, Latin America, Indo-Pacific, and Western Balkans.
- Czechia offers cybercapacity building projects through existing programs and its project number is growing.
Topics: Cybersecurity, National Policy
Czechia’s small size is advantageous in cybercapacity building, offering unique experiences to share with similar nations.
Supporting facts:
- Czechia identifies with other countries dealing with limited personal and financial resources in cybersecurity.
Topics: Cybercapacity Building, International Cooperation
Public-private partnerships and non-governmental stakeholders play an essential role in cyber capacity building.
Supporting facts:
- Czechia sees non-governmental stakeholders and public-private partnerships as irreplaceable in cyber capacity building.
Topics: Public-Private Partnerships, Non-Governmental Stakeholders
International collaboration platforms and initiatives are important for improving global coordination in cyber capacity building.
Supporting facts:
- Czechia has had positive experiences with platforms like UNIDIR Cyber Portal and supports further discussion on new proposals from India and the Philippines.
Topics: International Collaboration, Cyber Capacity Building
Integration and incorporation of existing cyber capacity building efforts into new initiatives are recommended.
Supporting facts:
- Czechia endorses the concept of merging new initiatives with existing portals such as UNIDIR and GFCE.
Topics: Cyber Capacity Building, Global Cooperation
A proposed Global Cyber Security Cooperation Portal should focus on compatibility with existing efforts and maintain simplicity in design.
Supporting facts:
- Czechia suggests that the Indian portal proposal should ideally merge with UNIDIR and GFCE portals and keep a simple initial design.
Topics: Cyber Security, Global Cooperation
The importance of capacity building and assistance to bridge the digital gap in developing countries is underlined.
Supporting facts:
- Help countries develop capacities to counter cyber threats
- Ensure digital access for all without discrimination
Topics: Capacity Building, Digital Divide
International cooperation should respect state sovereignty and align with recipient countries’ needs and priorities.
Supporting facts:
- Cooperation must follow the previous Working Group’s report
- Confidentiality of state information must be protected
Topics: International Cooperation, State Sovereignty
Capacity-building measures should be politically neutral, transparent, non-discriminatory, and unconditional.
Supporting facts:
- Should be based on mutual consent
- A dedicated mechanism is needed for fair assistance
Topics: Capacity Building, Political Neutrality
Unilateral coercive measures hinder capacity-building and should be lifted.
Supporting facts:
- Restrictive measures are illegal and affect credibility
- Their effects are counterproductive to capacity-building initiatives
Topics: Unilateral Sanctions, Capacity Building
A dedicated training capacity-building fund under UN auspices should be established.
Supporting facts:
- Fund to benefit developing countries
- Plan to include training and technology transfer
Topics: Capacity Building, United Nations
A plan of action from the upcoming capacity-building roundtable should be adopted.
Supporting facts:
- Aim for concrete outcomes
- Create momentum for comprehensive capacity-building
Topics: Capacity Building, Action Plan
Cybersecurity preparedness relies on developed capacity and capability.
Supporting facts:
- Effectiveness of cybersecurity response depends on the preparedness of people, technology, and processes.
- Capacity building is not only about workforce development but also about fostering a cultural awareness.
Topics: Cybersecurity, Capacity Building, Preparedness
There is no one-size-fits-all in cybersecurity capacity building.
Supporting facts:
- Malaysia supports Rwanda’s view on the need for context-specific foundational capacities.
Topics: Cybersecurity, Global Collaboration
Cybersecurity capacity building should accommodate evolving technology and threats.
Supporting facts:
- Malaysia agrees with Australia that cyber capacity building priorities should evolve with technology.
Topics: Cybersecurity, Emerging Technologies, Threat Evolution
Cybersecurity considerations and practices must integrate into digital development projects.
Supporting facts:
- Malaysia supports integrating cybersecurity in digital projects to ensure security by design.
Topics: Cybersecurity, Digital Development, Security by Design
Malaysia values the UN’s role in cybersecurity capacity building.
Supporting facts:
- The UN can help optimize the use of resources and avoid duplicated efforts in cybersecurity.
Topics: Cybersecurity, United Nations, International Cooperation
Risk-based approach necessary for prioritizing cybersecurity capacity needs.
Supporting facts:
- It’s essential for states to prioritize capacity building needs through a risk-based approach.
Topics: Cybersecurity, Risk Management
Collaboration with industry and stakeholders is vital in cybersecurity.
Supporting facts:
- Given the cyber domain’s nature, partnership with other sectors is important.
Topics: Cybersecurity, Stakeholder Engagement, Industry Collaboration
The necessity to enhance cyber security capacities in developing countries is critical
Supporting facts:
- Need for cybersecurity expertise, policy and legal frameworks, information sharing and incident response capacities
- Demand-driven approach can lead to relevant outcomes
Topics: cyber security, ICT development, capacity building
Adopting existing studies and frameworks can facilitate the capacity building process
Supporting facts:
- Digital skills frameworks, sustainable development goals, and innovation capacity assessment models can be used as foundations
Topics: sustainable development, technology readiness, innovation
Collaboration and information sharing mechanisms are pivotal to enhance cybersecurity measures
Supporting facts:
- Global Roundtable facilitates sharing best practices among stakeholders
- Information sharing is key to cyber defense
Topics: ICT security capacity building, collaboration, knowledge sharing
The United Nations could aid in resource mobilization for ICT capacity building in developing countries
Supporting facts:
- Establishing grant programs and public-private partnerships as potential funding mechanisms
Topics: United Nations, funding, resource mobilization
Incorporating gender perspectives into capacity building is crucial, as signified by the Women in Cyber Fellowship
Supporting facts:
- Addressing the underrepresentation of women in cyber security negotiations
Topics: gender perspectives, capacity building, Women in Cyber Fellowship
Strengthening legal and regulatory frameworks for cyber security is a priority for Sri Lanka
Supporting facts:
- Aligning with international standards while considering local circumstances
Topics: cyber law, data protection, online safety
Capacity building is a fundamental and cross-cutting pillar of ICT security.
Supporting facts:
- Chair emphasizes importance of capacity building in opening remarks.
- Antigua and Barbuda are working on national cybersecurity strategy and critical infrastructure identification.
Topics: ICT security, Capacity building
Antigua and Barbuda prioritize establishing CERTs and incident response capabilities.
Supporting facts:
- Antigua and Barbuda are working towards enhancing response to attacks on critical infrastructures.
- There is a proposal to identify and protect critical infrastructures in Antigua and Barbuda.
Topics: CERTs, Incident response, Cybersecurity
International collaboration and exercises are key to building cyber capacity in the Caribbean region.
Supporting facts:
- Antigua and Barbuda will host a cybersecurity tabletop exercise with participants from neighboring Eastern Caribbean Islands.
- Appreciation for OAS, Canada, CARICOM Impacts, and their partners for their efforts in the region.
Topics: International collaboration, Cybersecurity exercises, Caribbean cybersecurity
Efforts to engage women in cybersecurity and capacity building are acknowledged and honored.
Supporting facts:
- Antigua and Barbuda celebrate International Women’s Day and highlight female delegates’ contributions to capacity building.
- Gratitude extended to sponsors supporting women in cybersecurity.
Topics: Women in cybersecurity, Capacity building, Inclusion
Capacity building is crucial for combating cyber threats.
Supporting facts:
- Skills gaps among states highlight need for capacity building
- Commendation of existing initiatives as templates
Topics: Cybersecurity, International Cooperation
A focus on legal capacity building is necessary for cyber governance.
Supporting facts:
- Targeted focus on diverse realms, including policymaking expertise
- An action plan to strengthen institutional strength
Topics: Cyber Law, Policy Making
Foundational capacities for states include robust cybersecurity frameworks and policies.
Supporting facts:
- Establishment of cybersecurity frameworks
- Development of a skilled workforce
Topics: Cybersecurity, Policy Development
UN should provide additional support in cybersecurity capacity building.
Supporting facts:
- UN’s role in providing technical expertise
- Facilitating international cooperation
Topics: United Nations, Technical Assistance
A dedicated funding mechanism for capacity building in developing countries is supported.
Supporting facts:
- Support for establishment of funding mechanism
- Focus on developing countries
Topics: Funding, Development Aid
Capacity building programs should be demand-driven and sustainable.
Supporting facts:
- Principles of demand-driven and sustainable programs
- Utilization of resources in a targeted manner
Topics: Program Development, Sustainability
Croatia aligns itself with previous EU interventions and supports international law application in cyberspace.
Supporting facts:
- Interventions by Colombia and Senegal supported
- Congratulates the African Union on their position paper
Topics: Cybersecurity, International Law, Cyber Resilience
Croatia stresses the importance of linking cybersecurity with development assistance.
Supporting facts:
- Global Conference on Capacity Building in Accra cited
- Emphasis on international financial institutions’ role
Topics: Cybersecurity, Development Assistance, ICT Infrastructure
Croatia supports a step-by-step approach for developing Confidence Building Measures (CBMs).
Supporting facts:
- Views shared with Switzerland and Pakistan
- Looks forward to German proposal on CBM
Topics: Confidence Building Measures, Cyber Diplomacy
Croatia endorses hybrid format for the meeting on 9th of May, encouraging global participation.
Supporting facts:
- Proposal by Ecuador and Colombia supported
- Widens access for Points of Contact globally
Topics: Hybrid Meetings, Inclusivity, International Cooperation
Croatia emphasizes the role of regional exercises in building cybersecurity resilience.
Supporting facts:
- New national law on cybersecurity enacted
- Obligations for critical infrastructure expanded
Topics: Cybersecurity, Regional Cooperation, Exercises
Croatia recognizes the essential role of multistakeholder community in ICT security.
Supporting facts:
- Supports broader stakeholder participation
- Endorses statement by Mauritius regarding partnerships
Topics: Public-Private Partnerships, Multistakeholder Approach, Cybersecurity
Croatia calls for capacity building initiatives to be unified under a central framework.
Supporting facts:
- Proposal by Philippines considered
- Unification under UNIDIR suggested
Topics: Capacity Building, ICT Security
Capability building exercises are determined by participants’ engagement and mindset.
Supporting facts:
- The success of scenario-based workshops depends 100% on participants.
- Participants should discuss scenarios substantively and possess sufficient familiarity with the subject.
Topics: capacity building, international security, workshop participation
There’s a call for tailored training on norms and international law for capacity building.
Supporting facts:
- UNIDIR is implementing training with US support, including online and in-person components.
- States can request UNIDIR’s help in developing national positions on international law.
Topics: international law, cybersecurity, training
AI implications for peace and security should involve skilled women diplomats to shape the discourse.
Supporting facts:
- Almost all interventions referenced AI’s impact on security.
- UNIDIR plans a Women in AI Fellowship for 2024.
Topics: Artificial Intelligence, women empowerment, peace and security
The success of foundational capacity building is recognized, but there is more work to be done.
Supporting facts:
- Discussions highlighted elements like national ICT policies and CERTs as foundational capacities.
- Calls for integrating best practices and principles into capacity building programs.
Topics: capacity building, infrastructure, multilateral cooperation
The OEWG needs to define the role of the United Nations in the landscape of capacity building efforts.
Supporting facts:
- Existing initiatives should not be undermined by new proposals but complemented.
- Role of the UN in strengthening the multilateral system needs clarification.
Topics: OEWG, United Nations, capacity building
The OEWG discussion should be oriented towards actions that strengthen the UN’s role.
Supporting facts:
- UN hosts the global Point of Contact directory, signaling its importance.
- The UN is our universal body and actions should support its strengthening.
Topics: United Nations, cybersecurity, OEWG
Gender perspectives should be seriously considered in the OEWG’s outcome documents.
Supporting facts:
- Recognition of International Women’s Day during the meeting.
- Numerous mentions of the importance of a gender perspective during the capacity building discussion.
Topics: gender perspective, OEWG outcomes, policy
Report
International Women’s Day was a focal point of celebration that acknowledged women’s vital contributions, especially their pivotal roles in cybersecurity, peace, and security. This reflected on progress since the UN Security Council Resolution in 2000 which recognised women’s input in these fields.
The Open-Ended Working Group (OEWG) discussions highlighted the need for integrating a gender perspective into ICT security for more inclusive policy-making. Capacity building was a vital theme, seen as crucial for achieving secure, resilient and peaceful cyberspace. Discussions advocated for customised, demand-driven programmes catering to specific national needs, covering strategies from ensuring access to information security tools to fostering political neutrality and non-discrimination in capacity-building measures.
Support emerged for a global cyber capacity building portal, aiming to streamline efforts and avoid duplication. Canada advocated using experiences from resources like the Global Forum on Cyber Expertise (GFCE) for development of such a portal. The Philippines’ dialogue for a comprehensive needs-based cyber capacity building was highlighted, underpinning the tailored approach sought by countries.
A risk-based approach for cybersecurity capacity needs and the integration of cybersecurity into digital development to ensure security by design were emphasised. The importance of collaboration with industry and stakeholders was recognised, calling for broader participation in ICT security. The necessity of capacity building and assistance to bridge the digital gap in developing countries was underscored.
Discussions called for programmes facilitating knowledge acquisition and technology transfer, ensuring digital access for all without discrimination. International cooperation must align with the recipient countries’ needs and priorities. Proposals for a UN voluntary fund for capacity building aimed at benefiting developing countries were met positively, highlighting potential training opportunities and technology transfer.
Additional, predictable and sustainable funding for capacity-building initiatives was a key discussion point. Capacity building was also recognised as a cross-cutting issue and part of confidence-building measures, with the preparedness of people, processes and technology identified as essential for cybersecurity.
In conclusion, the OEWG discussions conveyed the criticality of advancing women’s roles, fostering capacity building, ensuring cybersecurity and embracing international cooperation. While the Chair remained neutral on several topics, the significance of gender considerations and funding for capacity building was clear.
However, much work remains for global cybersecurity resilience and inclusivity. The summary incorporates UK spelling and grammar, providing an accurate reflection of the analysis with an emphasis on long-tail keywords relevant to the topics discussed.
C
Croatia
Speech speed
158 words per minute
Speech length
843 words
Speech time
320 secs
Arguments
Croatia aligns with EU interventions and supports the application of international law in cyberspace.
Supporting facts:
- Croatia supports interventions by Colombia and Senegal on behalf of a group of states.
- Croatia expresses support for the valuable contributions to discussions on international law in cyberspace.
Topics: International Law, Cyberspace
Croatia commends AU’s position paper and encourages EU and other regions to follow suit.
Supporting facts:
- The AU position paper is seen as a beacon for regions.
- Croatia suggests the European Union should emulate the steps taken by the African Union.
Topics: African Union Position Paper, International Cooperation
Croatia emphasizes the need for financial support for developing countries in cybersecurity.
Supporting facts:
- Croatia highlights the intervention of Uganda and Ethiopia regarding financial support.
- The importance of cybersecurity within development assistance is underlined.
Topics: Cybersecurity, Development Assistance
Croatia advocates for international financial institutions to finance cyber projects and ICT infrastructure.
Supporting facts:
- Croatia acknowledges contributions from the U.S. to the World Bank.
- There’s a call for dedicating more resources to secure ICT development.
Topics: Cyber Projects Funding, ICT Infrastructure
Croatia supports a step-by-step approach to developing Confidence Building Measures (CBMs).
Supporting facts:
- Croatia shares the views of Switzerland and Pakistan.
- They look forward to Germany’s proposal on additional CBM on capacity building.
Topics: Confidence Building Measures, Cybersecurity
Croatian cyber resilience efforts include drafting national laws and mandatory cybersecurity exercises.
Supporting facts:
- Croatia has drafted its second national law on cybersecurity.
- The law mandates cybersecurity exercises for both public and private sector entities.
Topics: National Cybersecurity, Cyber Resilience
Croatia calls for broad stakeholder participation in cybersecurity capacity building.
Supporting facts:
- The delegation remarks on the importance of public-private partnerships.
- They advocate for the inclusion of diverse stakeholders in decision-making processes.
Topics: Stakeholder Participation, Cybersecurity Capacity Building
Croatia underlines the significance of linking cybersecurity to Sustainable Development Goals (SDGs).
Supporting facts:
- Cybersecurity is considered integral to development assistance.
- The country agrees with Uruguay on making the connection between cybersecurity and SDGs.
Topics: Cybersecurity, Sustainable Development Goals
Croatia values regional collaboration and exercises for improving cybersecurity capacities.
Supporting facts:
- Croatia engages in exercises and collaboration within the European Union.
- The country highlights the role of regional organizations in implementing capacity-building initiatives.
Topics: Regional Collaboration, Cybersecurity Capacity Building
Report
Croatia has embraced a forward-thinking and collaborative stance towards global cooperation and the enhancement of cybersecurity, evidenced by a range of affirmative actions and supportive statements on current cybersecurity and international law challenges. Addressing the application of international law in cyberspace, Croatia has aligned with European Union interventions, endorsing the view that established international law is applicable in the digital domain.
This perspective is reinforced by Croatia’s positive response to the inputs from Colombia and Senegal, indicative of its endorsement of a collective approach by states in tackling such novel challenges. Croatia has also recognised the African Union’s position paper as a paradigm for regional policy formulation, suggesting that the European Union and others could benefit from adopting similar strategic measures indicated by the African Union.
Such commendations position the African Union’s paper as a model for regional policy-making, showcasing Croatia’s willingness to participate in cross-regional policy dialogues and cooperative strategies. Central to Croatia’s cybersecurity agenda is the necessity for financial support to developing countries, in line with observations made by Uganda and Ethiopia regarding such support.
Croatia has thus highlighted the connection between cybersecurity and development aid, aligning it with Sustainable Development Goal 9—supporting industry, innovation, and infrastructure. Furthermore, Croatia has acknowledged the significant contributions from the United States to the World Bank, calling for increased resources to be channelled towards secure ICT development.
This advocacy for investment positions Croatia as a supporter of strengthening global cyber infrastructure, demonstrating an understanding of how cybersecurity is integral to international development. In the sphere of Confidence Building Measures (CBMs), Croatia has exhibited support for the approaches adopted by Switzerland and Pakistan while showing keen interest in Germany’s forthcoming proposals on additional CBMs focusing on capacity building.
This suggests Croatia’s support for a systematic approach in developing tools that build trust and prevent misunderstandings in the cyber domain. Domestically, Croatia has taken important steps in reinforcing its national cybersecurity, particularly by formulating its second national cybersecurity law.
This legislation encompasses mandatory cybersecurity exercises for state and business entities alike, evidencing Croatia’s comprehensive approach to bolstering national cyber resilience. The advocacy for participatory decision making is also a notable feature of Croatia’s approach, with an emphasis on the importance of public-private partnerships in the realm of building cybersecurity capacity, in line with Sustainable Development Goal 17, which focuses on partnerships.
This underpins a multi-stakeholder perspective that welcomes a diversity of viewpoints in shaping cybersecurity policy and strategy. By explicitly linking cybersecurity efforts to Sustainable Development Goals, especially SDG 9 and SDG 17, Croatia has shown its nuanced understanding of how cybersecurity measures intersect with wider socio-economic growth, agreeing with Uruguay on the foundational role of cybersecurity in realising these universal goals.
Lastly, Croatia values the development of cybersecurity through regional exercises and collaborative efforts, notably within the European Union. This not only reiterates the importance Croatia places on capacity building but also the role of regional organisations in implementing such initiatives effectively.
In conclusion, Croatia’s proactive participation underlines a vision where international law, capacity building, financial commitment, and inclusive partnerships converge to foster a more secure, resilient, and collaborative digital environment, intrinsically tied to achieving sustainable development and strengthened international governance.
C
Czechia
Speech speed
133 words per minute
Speech length
589 words
Speech time
267 secs
Report
Czechia, reinforcing the European Union’s stance, places considerable emphasis on cyber capacity building in its national security strategy to fortify defences against cyber threats. As a small nation, Czechia sees its size as an advantage for the efficient implementation of cyber capacity building projects.
The country has a substantial number of initiatives, which have experienced consistent growth and extended into diverse regions such as Africa, Latin America, the Indo-Pacific, and the Western Balkans. Czechia’s position is notable for its advocacy of including non-governmental entities and the establishment of public-private partnerships in cyber capacity building.
The country advocates for other states to allow non-governmental stakeholders to actively participate in the Open-Ended Working Group (OEWG) and criticises any potential veto of their accreditation. Addressing specific guiding questions, Czechia endorses pre-existing cyber capacity building platforms, like the UNIDIR Cyber Portal, for their role in fostering international governmental cooperation and coordination.
While welcoming new platforms like the Indian Global Cyber Security Cooperation Portal (GCSCP) and the Philippine cyber capacity building catalogue, Czechia stresses the need for alignment with the 2023 Agreed Resource Parameters (ARP), particularly the preservation of existing initiatives as outlined in paragraph 47.
Regarding the proposed Indian GCSCP, Czechia recognises its potential to enhance future programmes of action and integrate initiatives like the Kenyan threat repository proposal from the previous year. Czechia is interested in the portal’s feature that allows states to control the visibility of shared information and the inclusion of an effective search engine for its database.
Nonetheless, Czechia advocates for a simpler initial design to prevent overcomplication, recommending a focus on integrating current efforts and platforms. The comprehensive summary highlights Czechia’s contributions during the meeting, demonstrating its experience and dedication to cyber capacity building. The country approaches new proposals with a strategic, inclusive mindset, intent on ensuring cooperative cybersecurity ventures are effective and harmonious with existing mechanisms.
In conclusion, Czechia’s delegates thank the Chair for the opportunity to present their country’s perspective and recommendations. This revised summary has ensured the use of UK spelling and grammar and has refined the text to more accurately reflect the main analysis provided.
Long-tail keywords related to cybersecurity and cyber capacity building are seamlessly included without compromising on quality.
DR
Democratic Republic of the Congo
Speech speed
133 words per minute
Speech length
1298 words
Speech time
585 secs
Report
In a comprehensive address to an international assembly, the representative of the Democratic Republic of the Congo (DRC) commenced by extending cordial salutations to the Chair, Secretariat, and their colleagues for their commendable leadership and efforts in directing the discussion towards efficacious results.
The DRC delegation expressed grave concerns about the adherence to international law, particularly international humanitarian law, with the escalation in the use of information and communication technologies (ICTs) by state and non-state actors in armed conflicts. They emphasised that respecting legal frameworks within cyberspace is critical for maintaining international peace and security.
The representative recognised the double-edged nature of ICTs, noting that while they contribute significantly to human connection, social advancement, and economic growth, they concurrently create a complex and risky cyberspace, entailing various threats. The delegation reinforced the viewpoint that international legal standards, including those of humanitarian nature, must be upheld in cyberspace to guide state conduct and prevent adverse impacts on critical infrastructure and vulnerable groups, with specific reference to youth and women.
This stance aligns with the African Union’s position, which the DRC endorses, and they urged other regional groups to adopt a similar consensus. Addressing the dangers within cyberspace, the DRC underlined the necessity and urgency of establishing a regulated, multilateral cyberspace governance framework that includes state, public, and private stakeholders to ensure international peace and security.
The speech highlighted several key confidence-building measures: 1. Creating a UN point of contact Directory that respects sovereignty, equality, peaceful dispute resolution, and non-interference. 2. Promoting enhanced cooperation among cyber emergency response teams (CERTs) to effectively tackle vulnerabilities and security incidents. 3. Working collaboratively to bolster capacity building and overcome the digital divide, thus securing critical infrastructure and maintaining essential services.
4. Facilitating information and resource-sharing between public and private sectors to formulate strategies against cyber threats. The DRC also called for the swift implementation of these measures, advocating for the engagement of regional and sub-regional organisations in exchanging experiences and best practices.
The delegation announced DRC’s steps to nominate diplomatic and technical points of contact, with commitment to provide the names shortly. In terms of capacity building, international collaboration was underscored as crucial for achieving a beneficial cyberspace environment globally. Necessary cooperation—for technical expertise, capacity building, and knowledge transfer—is essential for bridging the digital divide and ensuring an open, secure, stable, accessible, and peaceful cyberspace.
The DRC’s initiative included launching Horizon 2025, a digital strategy with infrastructure, content, governance, and regulatory components, and mentioned established frameworks like a digital ministry, a digital development agency, digital codes, and a national cybersecurity strategy. The delegation openly recognised the DRC’s financial and infrastructural hurdles, notably in power and internet services vital for ICT development.
Concerns were raised regarding the nation’s capability to detect, defend against, and recover from cyberattacks, urging ongoing technical exchange on ICT threats to strengthen cybersecurity risk management. The DRC called for enhanced coordination and cooperation with businesses, NGOs, and academia, recognising their importance in training, research, and policy making.
It highlighted the need for capacity-building to find dependable partners and foster dialogues that improve digital security. In conclusion, the DRC lauded the UN Singapore Fellowship Program and encouraged similar support from capable nations to help narrow the digital divide.
It expressed willingness to cooperate in digital endeavours unconditionally and endorsed India’s proposal for a global cybersecurity portal, applauding the Philippines for relevant contributions. The DRC’s position indicates its commitment to ensuring that cyberspace is collaboratively managed, preferably under the jurisdiction of the United Nations.
D
Djibouti
Speech speed
137 words per minute
Speech length
355 words
Speech time
156 secs
Report
In honour of International Women’s Day, the speaker highlighted the pivotal contributions of women in both domestic and global spheres, setting a context for discussions on the vital role of capacity building in cyber spaces, with a particular focus on the needs of less developed countries.
The speaker emphasised that capacity building is crucial to enhancing the functionality and security of cyberspace, contributing both to the utility of this digital environment and to the confidence-building measures discussed previously. For developing nations, capacity building was regarded as a critical defence against cyber threats and essential for maintaining safety.
The Focal Points Guide was mentioned as a key tool, expected to unify cybersecurity knowledge among nation-states and drive a harmonised approach to global connectivity and responsible conduct at the national level. There was a call for the establishment of national teams responsible for training, managing, and securing critical infrastructure and privacy.
The proposed development of programs designed to boost wellness awareness was discussed, with potential regional and national impact on a range of stakeholders including state authorities, legislatures, civic groups, and the broader public. The United Nations Secretary was commended for offering scholarships for women in cybersecurity, signalling a commitment to gender inclusivity within this field.
A bespoke approach to capacity building was advocated, one that would address the specific needs and characteristics of each state. The importance of enhancing international cooperation was stressed, deeming it vital for aiding developing nations in strengthening their cybersecurity. The speaker expressed excitement about the upcoming roundtable on capacity building, aiming to generate targeted, resilient, and secure solutions to cybersecurity issues, reflecting a forward-thinking resolve to confront the challenges posed by cyber threats.
In summary, the speech underscored the imperative for international unity and careful strategy in the realm of capacity building to secure vulnerable countries against cyber threats, while promoting the importance of women’s involvement in cybersecurity. The expanded summary ensures adherence to UK spelling and grammar standards, and reflects the core message of the original text, emphasising international collaboration and tailored capacity building initiatives, while highlighting the essential participation of women in cybersecurity.
ES
El Salvador
Speech speed
127 words per minute
Speech length
383 words
Speech time
181 secs
Report
Thank you to the Philippines for their insightful presentation. We continue to affirm capacity building as a central theme of our mandate, aligning with sentiments and priorities outlined in previous sessions. El Salvador’s discussions on cyber training, security, and diplomacy echo our group’s understanding that these topics require comprehensive approaches.
Acknowledging rapid developments in information security, there’s an urgent need for enhanced capacity in data security, malware management, and understanding the connection between software applications and cryptographic standards. Recognising vulnerabilities in software and binary systems is essential. With technologies like artificial intelligence emerging, we must integrate them into our cyber infrastructure securely, ensuring data and service availability, authenticity, integrity, and confidentiality.
Regarding cyber diplomacy, it’s imperative to underscore its role in managing the complex interactions of nations in cyberspace. Enhancing knowledge of responsible conduct norms, developing confidence-building measures to defuse cyber conflict potential, and deepening comprehension of internet governance are crucial steps.
We must also focus on building robust networks, safeguarding communication technologies, and effectively addressing both domestic and international cybercrime. Our analysis indicates that while there are overarching themes, the relevance and prioritisation of cyber issues vary by national context, requiring tailored solutions.
We support a multidimensional strategy, acknowledging cyberspace engagement’s diverse nature and the need for varied stakeholder contributions. In conclusion, we champion a multiperspective approach, valuing the range and depth of expertise different participants offer. Embracing this diversity—leveraging a wealth of insights—will enrich and advance our dialogue, promoting more effective collaboration within this group.
Thank you, Chairman, for the opportunity to present these observations.
F
Fiji
Speech speed
159 words per minute
Speech length
1052 words
Speech time
397 secs
Report
On International Women’s Day, the Fijian delegation commenced its statement by celebrating the occasion, noting its significance as a unifying event among member states. They quickly shifted focus to discuss international engagement and highlighted the importance of capacity and capability across member states for the proper implementation of international laws and norms.
The delegation expressed appreciation for the Secretariat’s mapping exercise document, which they are thoroughly reviewing. They proposed integration of the outcomes of the recent Pacific Cyber Capacity Building and Coordination Conference (P4C) into the Secretariat’s work. The P4C document focuses on Pacific leadership, region-specific capacity building, enhancing the regional cyber ecosystem, sustainability, inclusive development, and contains ten specific recommendations addressing the balance between immediate actions and strategic long-term development, alongside a sustainable plan for sovereignty and local expertise growth.
Highlighting the Microsoft Digital Defense Report, Fiji raised the critical nature of basic cyber hygiene in thwarting 99 percent of cyberattacks and the issue of high turnover and skill shortages in cyber skillsets. This underscores Fiji’s push for a comprehensive approach to bolstering technical, legal, diplomatic, and policy capacities in member states.
The statement also points to Fiji’s efforts to empower women and girls in technology, with successful initiatives like the ITU Global Girls in ICT program and the Women in Tech conference, addressing challenges and showcasing opportunities in the sector.
The delegation called for investment in human resource development and capacity-building strategies. They advocated for a cybersecurity job description toolkit that could help developing countries fortify and future-proof their digital workforce. Further complexities were discussed including climate-resilient technology infrastructure, the high cost of security tools, and the difficulty of attributing the sources of cyberattacks—challenges which were mirrored in the P4C outcomes document, revealing the layered cybersecurity difficulties faced by island nations.
The statement concluded by reiterating Fiji’s commitment to strategic partnerships at international, regional, and bilateral levels that are vital in developing cybersecurity capacities. Fiji’s delegation welcomed additional partnerships and showed interest in the tools proposed by the Open-Ended Working Group (OEWG).
Finally, Fiji supported the call for gender-sensitive capacity-building initiatives and endorsed statements by Canada and other nations on this requirement. They praised the UN Singapore Fellowship and the Women in Cyber Fellowship as models of capacity building that enhance confidence.
The summary reflects Fiji’s optimistic view on the prompt execution of sustainable capacity-building measures with potential for significant impact, reinforcing their dedication and anticipation for future collaborative progress in international engagement and cybersecurity capacity building.
G
Germany
Speech speed
157 words per minute
Speech length
1359 words
Speech time
518 secs
Report
During the Open-Ended Working Group (OEWG) session, Germany, aligning with the European Union’s stance, underscored the importance of capacity building in bolstering cyber resilience and response. Highlighting its integral role, Germany insisted on the urgency of a strategic focus on capacity building as it underlies all of the group’s activities.
Emphasising the need for a multidimensional approach, Germany called for robust partnerships and coordination in capacity building efforts. These efforts should be evidence-based, tailored to the needs of stakeholders, and adhere to human rights, while also being gender-sensitive and inclusive.
Germany underscored the importance of following UN Capacity Building principles to ensure cohesion and prevent effort duplication. Germany lauded the Chair for scheduling the Global Roundtable on Cyber Capacity Building in May, viewing it as a platform for productive dialogue, best practice exchange, and partnership creation to bolster international cyber capacity building.
Responding to the Chair’s guiding questions, Germany recognised the value of developing national cyber strategies, creating cyber-focused entities and CERTs, and promoting stakeholder cooperation and access to specialised skills as key components for state cyber resilience. It appreciated UNIDIR’s work in identifying foundational cyber capacities, which aligns with the UN’s framework for responsible state behaviour in cyberspace.
Germany pointed to the Philippines’ presentation as an excellent example of addressing specific state cyber needs. Furthermore, it held UNODA’s compilation of capacity-building initiatives in high regard, contributing towards a demand-driven model. In its own programming, Germany commits to an inclusive, demand-driven approach by collaborating with stakeholders to pinpoint needs and gaps.
It showed interest in India’s proposal for a global cybersecurity cooperation portal and advised integration with existing resources such as the GFCE-CIBIL and UNIDIR cyber policy portals to avoid redundancy. Germany backs the use of voluntary checklists as practical tools for states to steer their implementation of responsible ICT behaviour, and it supports the Chair’s endeavor in compiling such a checklist, to which it promises to contribute.
Acknowledging International Women’s Day, Germany highlighted the need for a genuine gender perspective in cyber policies and how online power dynamics disproportionately affect vulnerable groups. It advocated for the use of gender disaggregated data and consulting with entities possessing gender-sensitive cybersecurity toolkits.
Looking ahead, Germany championed the advancement of capacity building in cyberspace through a post-2025 permanent mechanism, which might include a Confidence-Building Measure dedicated to exchanging information on cyber capacity building—a step towards fostering global trust and enhancing international peace and security.
In summary, Germany emerged as an advocate for a comprehensive, cooperative approach to cyber capacity building, stressing the imperative for international cooperation and multi-stakeholder engagement to ensure a secure and equitable cyber environment.
G
Ghana
Speech speed
153 words per minute
Speech length
608 words
Speech time
239 secs
Arguments
Frameworks like the Cyber Security Capacity Maturity Model are essential for identifying cyber security capacity priorities and needs.
Supporting facts:
- The collaborative case study between the Cyber Security Authority of Ghana and the World Bank is an example of such frameworks in action.
- The case study was highlighted during the Global Conference on Cyber Capacity Building GC3B in 2023.
Topics: Cyber Security Capacity Maturity Model, Capacity Building
International cooperation is crucial for effective cyber capacity building.
Supporting facts:
- Ghana has benefited from collaborations with the Global Forum on Cyber Expertise and the Council of Europe.
- The Accra call emphasizes the need for coordinated action and global collaboration.
Topics: International Cooperation, Cyber Security
Demand-driven capacity building tailored to specific state needs leads to better resource allocation.
Supporting facts:
- Using models to identify capacity needs can lead to targeted programs that address these specific requirements.
- Ghana calls for action to advance demand-driven and effective cyber capacity building through the Accra call.
Topics: Capacity Building, Cyber Security Development
Active participation in cyber security communities like FIRST is essential for strengthening collaboration.
Supporting facts:
- Engagement with international communities can enhance information sharing and joint response to incidents.
- Bilateral and multilateral agreements play a significant role in this process.
Topics: Cyber Security Communities, International Cooperation
Report
The significance of structured frameworks, such as the Cyber Security Capacity Maturity Model, in evaluating cyber security capacity needs is widely acknowledged. This is illustrated by the positive case study involving the Cyber Security Authority of Ghana and the World Bank, which was a highlight at the 2023 Global Conference on Cyber Capacity Building (GC3B).
The overwhelmingly positive sentiment supports the argument that systematic frameworks are crucial in outlining strategic cyber security capacity priorities and facilitating effective responses to cyber threats. International collaboration is pivotal in cyber security capacity building, with Ghana benefiting significantly from partnerships with organisations like the Global Forum on Cyber Expertise and the Council of Europe.
This collaborative spirit is encapsulated in the Accra call, which advocates coordinated global action to tackle cyber challenges. The consensus is clear: cross-border cooperation is essential for building a robust global cyber defence. As suggested by the Accra call, demand-driven capacity building, tailored to specific national vulnerabilities, maximises the effectiveness of cyber security initiatives.
This approach leads to resourceful and targeted cyber security development strategies that cater to the unique needs of each state, ensuring that capacity building is both sustainable and impactful. Involvement in cyber security communities, such as FIRST, is considered vital for boosting collective capabilities in information sharing and incident responses.
These international networks, fostered by bilateral and multilateral agreements, are indispensable for a collaborative approach to cyber security that extends beyond national boundaries. Ghana is committed to the development of fundamental cyber security capacities, positioning them as critical components for national resilience.
Hosting the GC3B in 2023 and highlighting impactful frameworks and case studies underscore Ghana’s dedication to foundational cyber security capacity development, reinforcing the narrative that robust foundations are essential for the protection and sustainability of infrastructure. In summary, the discussions and practices related to cyber security capacity building form a narrative steeped in positivity and forward-thinking.
Strategic frameworks, global teamwork, customised capacity building, communal engagement, and foundational capacity-development are interwoven to enhance global cyber security infrastructure. These are in line with the Sustainable Development Goals 9 and 17, which promote industry, innovation, infrastructure, and strong global partnerships.
I
Indonesia
Speech speed
174 words per minute
Speech length
544 words
Speech time
187 secs
Report
The delegation commenced their address by expressing appreciation for the Chair’s adept leadership and the informative discussion papers, which they praised for fostering productive conversations on the enforcement of cyber norms and providing a foundation for future discussions. Addressing capacity building in response to the Chair’s queries, the delegation underscored its fundamental role in cybersecurity, echoing the Chair’s sentiment that it underpins other aspects.
They stressed the significance of enhancing capacities for nations to bolster cybersecurity and implement cyber norms effectively. They suggested prioritising the development of certain capacities, specifically: – Cert-to-cert cooperation, to more effectively detect and respond to malicious ICT activities. – The conducting of regular communication tests, tabletop exercises, and cyber drill tests, to improve readiness.
– Providing ongoing training for CERT team members, keeping them informed of new threats and defensive tactics. – Strengthening cyber incident response capabilities through additional training and support for both C-CERTs and CERTs. – Developing emergency response procedures, contingency plans for cyber crises, and secure information exchange mechanisms.
The delegation highlighted the necessity of tailored capacity building programmes, designed to meet each country’s individual needs, taking into account their financial and technological resources, thereby ensuring that all nations can access and benefit from these initiatives. They praised the spirit of cooperation and welcomed new proposals from member states to enhance capacity building.
The delegation specifically endorsed the Philippines’ suggested needs-based cyber capacity building dialogue, recognising its potential to deliver effective programmes. They proposed coupling this initiative with others, such as India’s Global Cybersecurity Strategy Portal (GCSP portal), suggesting that the portal’s development could be integrated with national and regional CERTs to enable timely and real-time information sharing on cybersecurity issues.
In their conclusion, the delegation responded to the Chair’s request for nominating points of contact (POCs) for the directory, confirming their commitment to appointing experts from both the Ministry of Foreign Affairs and the National Cybersecurity Agency to these roles in due course.
Overall, the delegation’s address was characterised by an emphasis on the bespoke nature of capacity development and international cooperation as essences for a robust global cyber community. Their promise to appoint POCs exemplified this commitment to furthering collaborative efforts in cybersecurity.
M
Malaysia
Speech speed
128 words per minute
Speech length
639 words
Speech time
300 secs
Report
In a detailed discussion on cybersecurity, Malaysia has highlighted the vital importance of capacity building for an effective response and recovery from cyber incidents. The nation recognises that cybersecurity resilience is linked to its state of preparedness, which can be achieved through a combination of skilled personnel, advanced technology, and efficient processes.
Additionally, Malaysia emphasises the promotion of cyber hygiene by increasing security awareness among the public, underlining the importance of both technical expertise and general awareness in achieving a secure digital environment. Malaysia commends the United Nations for its efforts in creating a global survey to understand capacity-building landscapes, viewing it as an essential step in navigating and coordinating international cybersecurity efforts.
Supporting Rwanda’s suggestion, Malaysia agrees on the necessity of recognising context-specific foundational capacities within cybersecurity, acknowledging the complexity added by local particularities that require customised solutions. In agreement with Nigeria, Malaysia underscores the importance of addressing both current and emerging technologies in capacity building, acknowledging that as the cyber threat landscape evolves, so must the protective frameworks.
Malaysia resonates with Australia’s view that continuous updating of cybersecurity measures is critical to their effectiveness. The country endorses India’s principle of ‘security by design’ for digital development projects and underscores the need for a holistic and inclusive approach considering the varied economic settings and cybersecurity maturity levels.
Malaysia also welcomes India’s initiative for a global cybersecurity cooperation portal, envisioning it as a means to strengthen international collaboration. Regionally, Malaysia supports the Philippines’ proposal for a needs-based capacity-building catalogue, thereby optimising and personalising cybersecurity efforts. The nation stresses the UN’s pivotal role in harmonising international cooperation and resource utilisation in cybersecurity capacity building.
It advocates for a robust domestic strategy adopting a risk-based approach to prioritise cybersecurity needs and emphasises the effective coordination and implementation by designated domestic agencies. Furthermore, Malaysia recognises the diverse nature of cyberspace and the value of stakeholders from industry and beyond.
The anticipation for the Global Roundtable on ICT Security Capacity Building is high, where senior officials, experts, and ministers are expected to convene to delve deeper into these crucial issues. Lastly, Malaysia honours International Women’s Day, celebrating the achievements of women and the support from men for gender equality.
Special appreciation is given to the Women in International Security and Cyberspace fellowship, facilitated by Australia, which is recognised as a confidence-building initiative demonstrating the positive impact of empowering women within the field of cybersecurity.
P
Pakistan
Speech speed
142 words per minute
Speech length
427 words
Speech time
180 secs
Arguments
Capacity building is critical for addressing cyber threats.
Supporting facts:
- Pakistan emphasizes the pivotal role of capacity building.
- The widening gaps in capabilities among states underscore the urgency of capacity building.
Topics: Cybersecurity, International Cooperation
Legal capacity building is crucial for cyber governance and policymaking.
Supporting facts:
- Focused on legal capacity building across diverse realms.
- Supports proposal for an action plan to strengthen institutional strength.
Topics: Legal Framework, Cyber Governance
Foundational cybersecurity capacities are necessary for states.
Supporting facts:
- Establishment of robust cybersecurity frameworks.
- Development of skilled cybersecurity workforce.
Topics: Cybersecurity Frameworks, ICT
The UN should take an additional role in cybersecurity capacity building.
Supporting facts:
- UN providing technical assistance and expertise.
- Facilitating international cooperation and best practices exchange.
Topics: United Nations, Cybersecurity, International Collaboration
Report
The global consensus emphatically recognises the importance of capacity building as a strategic defence against cyber threats. This consensus is aligned with United Nations Sustainable Development Goals (SDGs), particularly SDG 9, which focuses on industry, innovation, and infrastructure; SDG 16, targeting peace, justice, and strong institutions; and SDG 17, which promotes global partnerships for achieving these aims.
Pakistan has been an outspoken proponent, underlining the critical need for capacity enhancement to address the escalating disparities in capabilities among states. With an optimistic view on the necessity and urgency of international cooperation for capacity building, Pakistan endorses establishing substantial cybersecurity infrastructures and nurturing a competent cybersecurity workforce as essential to state security against cyber threats.
The establishment of resilient legal frameworks for cyber governance is acknowledged as crucial, with a consensus on prioritising legal capacity building across multiple domains. The creation of an action plan to bolster institutional strength reflects the belief that strong and effective legal frameworks are indispensable for sound cybersecurity policy-making.
This is particularly relevant to SDG 16’s objectives of fostering just and resilient institutions. The United Nations’ role in providing technical assistance and expertise, and in facilitating the exchange of best practices among nations, exemplifies the spirit of SDG 17, which encourages the reinforcement of international partnerships to meet common goals.
Pakistan supports the proposal for a specialised funding mechanism dedicated to cybersecurity capacity building for developing countries. This echoes the broader recognition of the unique challenges faced by these nations and the necessity of financial support to address them, promoting international solidarity and assistance in alignment with global development goals.
Furthermore, capacity building measures are advised to be demand-driven, unconditional, sustainable, and holistic, ensuring lasting benefits and adherence to the guiding principles of SDG 17. The anticipation surrounding the upcoming Global Roundtable demonstrates the perceived opportunity for advancing and potentially accelerating discussions and strategies related to sustainable cybersecurity development initiatives.
In conclusion, the global discourse consolidates the positive attitudes towards the need for cohesive strategies and sustainable development in the cybersecurity sector. Pakistan’s assertive stance exemplifies the worldwide impetus for advancement in this vital area. The synthesis of these views underscores a robust and evolving consensus on the criticality of orchestrated international cooperation and concrete support systems to enhance cybersecurity capacities globally, with a special focus on the increased vulnerabilities of developing countries to cyber threats.
The summary accurately captures the essence of the main analysis, using UK spelling and grammar, whilst also incorporating relevant long-tail keywords to maintain quality and comprehensiveness.
S
Samoa
Speech speed
137 words per minute
Speech length
769 words
Speech time
336 secs
Report
The summary is well-articulated and correctly follows UK spelling and grammar conventions. However, it could benefit from some minor adjustments for readability and conciseness. Edits have been made as shown: The speaker began by expressing profound gratitude to the Chair for their skilled guidance throughout the session.
The Chair’s questions were commended for directing discussions effectively, which enriched the information sharing that ensued. This proved particularly beneficial to Small Island Developing States (SIDS), which could leverage the insights to overcome cybersecurity challenges. The significance of the open-ended working group was underlined as a platform for Member States to share information, establish national interests, form stronger relationships, and identify security priorities in the field of information and communication technologies (ICT), thus serving as an informal capacity-building tool.
The efforts of the sponsors of Women in Cyber Security were duly praised for enhancing the participation of women in the sector, contributing positively to the overall discussion. Capacity building was emphasised as a key factor for reducing the digital divide, with a call for an inclusive approach tailored to the varied needs and capabilities of states, especially developing countries.
The Philippines’ Needs-Based Capacity Building Catalogue was lauded, with plans for it to be further examined in Samoa’s capital. The possibility of the United Nations consolidating similar resources to prevent duplication and optimise efforts was also noted. Against the backdrop of the session’s guiding question on foundational capacities, the speaker outlined necessary elements that states need to strengthen cybersecurity: infrastructure development, international law training, enhancement of technical skills, effective monitoring, cybercrime prevention, information security resilience, and the incorporation of gender perspectives.
Samoa’s recent achievements were showcased, including the establishment of its national CERT in 2021 and a cybersecurity collaboration treaty with New Zealand in 2022 focusing on information sharing, incident management, and cyber awareness. The ITU’s role in providing Samoa with training in data protection, public policy, and cybersecurity awareness was acknowledged.
The inaugural Pacific Cyber Capacity Building and Coordination Conference (P4C) in Fiji was credited for fostering a collaborative platform for Pacific countries. Its recommendations were suggested to be recognised as foundational within the region, with an emphasis on continued capacity development for effective realisation.
The speaker ended by underscoring the upcoming Global Round Table on ICT Security Capacity Building in May as an essential forum for addressing the urgent need in cybersecurity capacity building. Samoa’s commitment to joining this high-level meeting was stated, with the Foreign Ministry’s support for obtaining the necessary resources.
The Chair was thanked once again for their exemplary direction. In terms of long-tail keywords, the summary could benefit from explicitly mentioning terms like “Cybersecurity collaboration agreements,” “Cybersecurity Capacity Building in Developing Countries,” “Importance of Women in Cyber Security,” and “ICT Security Challenges for SIDS,” where the context allows, but without sacrificing the quality and coherency of the content.
S
Slovenia
Speech speed
137 words per minute
Speech length
578 words
Speech time
253 secs
Report
During the session, the Chair and participants were recognised, with particular mentions going to the female colleagues active in the field of cyber. Slovenia supported the EU and its members’ views while adding its own national insights. Slovenia highlighted the urgent need for cyber capacity building as vital to equip states and organisations with the necessary skills, knowledge, and resources to protect their digital domains.
This included an emphasis on data protection and safeguarding critical infrastructure, which are viewed as essential to maintaining an open, free, and secure digital environment. There was a clear consensus on the importance of sharing best practices among nations in diverse areas such as responsible state behaviour in cyberspace, adherence to international law, and strategies for capacity building.
It was acknowledged that capacity-building solutions need to be tailored to address the specific challenges and vulnerabilities faced by individual states, including their technological, economic, and geopolitical contexts. Slovenia detailed its experiences in regional cyber capacity building, notably its collaboration with France and Montenegro in establishing the Western Balkans Cyber Capacity Centre (WB3C).
Recognised by international entities, including the EU, the OSCE, the ITU, and the GFCE, the centre aims to enhance cybersecurity knowledge and methodologies. Slovenia reported conducting six train-the-trainer sessions in 2023 and plans to double this in 2024, reflecting the centre’s growth into an international organisation.
The Slovenian representative emphasised the country’s commitment to strengthening cybersecurity systems in the Western Balkans, highlighting the value of international and inter-regional cooperation. Customised capacity-building efforts to cater to specific state requirements were emphasised, alongside the importance of initiatives for sharing information and best practices.
These steps are considered key to bridging the digital divide and raising global cybersecurity standards. In conclusion, Slovenia concurred with the Chair that capacity-building ties together all facets of the OEWG’s (Open-Ended Working Group’s) mandate. While proudly presenting their achievements, Slovenia acknowledged the need for a cross-regional cybersecurity capacity-building approach and reaffirmed its commitment to collaborative and customised efforts to advance the global cybersecurity agenda and support the OEWG’s objectives.
SL
Sri Lanka
Speech speed
122 words per minute
Speech length
571 words
Speech time
281 secs
Report
The delegate’s address underscored the critical importance of enhancing cybersecurity in developing nations, highlighting a strategic approach tailored to specific local contexts. This strategy underscores seeking sustainable and affordable solutions to cybersecurity challenges, along with the flexibility to adapt to unforeseen circumstances.
Central to the reinforcement of cybersecurity capacities is a holistic framework. The delegate emphasised that in order to safeguard against detrimental ICT activities effectively, developing countries must establish several foundational pillars. These include: developing cybersecurity expertise, creating strong policy and legal frameworks, encouraging information sharing and collaboration, enhancing incident response capabilities, investing in technical infrastructure, promoting widespread cybersecurity awareness, providing education on cybersecurity matters, and engaging in active international cooperation.
Leveraging existing studies and frameworks, the delegate advised that these resources could guide this working group’s initiatives. Innovations and strategies for achieving sustainable development goals, as well as capacity assessment models, should be considered as foundational elements. The address advocated for a demand-driven approach, specifically designed to meet the unique needs of developing nations, ensuring relevance and a deeper, more enduring impact of capacity-building measures.
Sri Lanka’s delegate expressed optimism about the forthcoming Global Roundtable on ICT Security Capacity Building in May 2024. The event promises opportunities for forming partnerships and sharing expertise, experiences, and best practices featuring a diverse group of stakeholders, including governments, industries, academic institutions, and civil society.
Sri Lanka is actively enhancing its cyber security measures, tailoring new laws and regulations to both local requirements and international norms. Efforts encompass data protection, online safety, and privacy, achieving a balance between international standards and local applicability. The role of the United Nations in providing financial support for ICT capacity-building projects was also stressed.
The delegate suggested that the UN could facilitate dedicated financial instruments, such as grants or public-private partnerships, to support these initiatives in developing countries. Praise was extended to the Secretariat for the capacity-building mapping exercise, designed as per the second APR’s direction.
It’s seen as a vital resource for steering global initiatives in cybersecurity capacity building. On International Women’s Day, the importance of gender inclusivity in cybersecurity was emphasised, specifically acknowledging programmes like the Women in Cyber Fellowship, which aim to enhance women’s participation in UN cyber negotiations.
In conclusion, the address called for collective determination to cultivate a safe and robust digital environment for future generations. Through a united effort, the vision of a fortified, resilient cyberspace seems attainable.
S
Sweden
Speech speed
134 words per minute
Speech length
431 words
Speech time
194 secs
Report
As the representative for Sweden, I presented a detailed insight into our country’s stance, which both supports our national position and aligns with the perspective of the European Union. I stressed that development cooperation is a fundamental element of our foreign policy goals, essential for advancing and protecting our national interests.
Central to my argument was the critical importance of an open, free, and secure cyberspace, which is vital not just for economic growth but also for enabling political and social participation across various domains. Sweden is committed to leading the way in cyber diplomacy, actively pursuing international engagement in this field.
Emphasising this pledge, we are in the initial stages of formulating a comprehensive foreign and security policy focussed on cyber and digital issues. This strategy signifies the proactive stance Sweden is adopting. Our reassessment of Sweden’s development strategy highlights the increased emphasis on fostering capabilities for digital advancement and cybersecurity.
The amended agenda resonates with the widespread agreement that a dynamic civil society—including the pivotal role of the private sector—propels development. This revision acknowledges the necessity for an inclusive array of multilateral partnerships to enhance our outreach and effectiveness.
In cooperation with respected organisations such as the ITU, the Global Forum on Cyber Expertise, and Microsoft, Sweden has spearheaded initiatives within the cybersecurity realm. Joint ventures have led to the creation of the ‘Mainstreaming Cybersecurity and Development’ report, which stems from a global series of workshops and discussions.
The forthcoming report is a call for discourse, with a virtual debut set for March 26th—an event that welcomes global stakeholders to participate further. This event is not a standalone effort but is integrally connected to subsequent engagements, specifically the High-Level Capacity Building Roundtable scheduled for May 10th.
This connection reflects Sweden’s comprehensive strategic vision, in which individual initiatives complement and benefit from a larger policy framework and leadership. The dialogues we undertake regarding digital development and cybersecurity are inherently linked. This synergy also pertains to the debates within the Open-Ended Working Group on capacity building, where Sweden has reiterated its proposal for a Global Digital Compact that aims to bridge the digital divide, including aspects of capacity building.
Additionally, the forthcoming resolution ‘AI for Development’ is set to focus on our designated remit. A nuanced understanding has developed that recognises the need for a harmonised and integrated approach to resource allocation beyond 2025 within discussions around capacity building. It has been acknowledged within the UN system that coordination is essential to prevent both overlap and the strategic use of limited resources.
To summarise, Sweden’s message conveys a vision of progressive engagement and international collaboration. It acknowledges the interconnectedness between digital development and cybersecurity, stressing the essential need to efficiently utilise our combined resources to achieve a secure and inclusive digital environment.
This expanded summary encapsulates Sweden’s strategic positioning and goals within the realms of cybersecurity and development cooperation.
S
Switzerland
Speech speed
147 words per minute
Speech length
642 words
Speech time
261 secs
Report
Switzerland has expressed appreciation to the Philippines for delivering a thorough presentation on cybersecurity, which has made a significant contribution to the current discourse. Highlighting the necessity of crafting comprehensive national cyber strategies, Switzerland promotes the setup of national cybersecurity centres, highlighting Computer Security Incident Response Teams (CSIRTs) as pivotal for an all-encompassing cyber defence strategy.
These centres are essential to an ecosystem that tackles threats and includes policy development, diplomatic initiatives, legal frameworks, and the creation of requisite capabilities for effective implementation. The Swiss delegation calls for an active engagement in fostering cooperation in response to cyber incidents, pointing out that guides, maturity models, and white papers by esteemed entities such as FIRST and ENISA, as well as the Global Forum on Cyber Expertise (GFCE) programs, can guide states to measure and boost their cybersecurity postures.
The delegation recognises the variety of tools available for supporting and appraising abilities in diverse cyber readiness aspects. Grateful for the foundational efforts of earlier undertakings, Switzerland values the Secretariat’s report for offering a comprehensive view of the cyber capacity-building program landscape.
The forthcoming Global Roundtable on 10 May is seen as a chance to evaluate and bolster ongoing endeavours, striving for better synergy and coordination among international cyber capacity-building initiatives. Switzerland stresses that a proposed global cybersecurity cooperation portal within the UN should not reproduce existing solutions like the GFCE Sibyl Portal or the UNIDIR Cyber Policy Portal but rather collate and rationalise capacity-building data.
The statement also underlines the importance of capacity building for the application of international law in cyberspace. Switzerland praises the African Union’s unified stance and the productive dialogues during open-ended working group sessions and UNIDIR workshops, which are vital for enhancing expertise in international cybersecurity legal frameworks.
Proactively advocating for international law in cyberspace, Switzerland refers to a cross-regional group’s working paper on applying international humanitarian law to ICTs in armed conflicts. The Swiss, alongside Brazil and the International Committee of the Red Cross (ICRC), co-hosted a related event, showcasing a dedication to capacity building in this sphere.
Anticipating future conferences, Switzerland cites the successful Global Conference for Capacity Building in Accra, Ghana, and announces intent to organise a follow-up conference in 2025. Switzerland encourages states to support and engage with the Accra initiative for cyber-resilient development, which aims to incorporate capacity building into wider development goals.
In sum, Switzerland thanks the Chair for their guidance through the discussions, thus concluding a detailed commentary on the complex realm of cyber capacity building and the journey toward sturdy global cybersecurity infrastructure.
SA
Syrian Arab Republic
Speech speed
122 words per minute
Speech length
356 words
Speech time
176 secs
Report
The speaker emphasises the urgent need for enhancing capacity-building efforts and assistance to enable developing countries to bridge the digital divide and strengthen their cybersecurity infrastructures. Such developments are vital for these countries to effectively counter and recover from the growing instances of cyber threats and the malicious use of information and communication technologies (ICTs).
There is a call for global collaboration in line with the recommendations of the 2021 Working Group report and the annex of the second Applied Research Programme (APR), stressing the importance of respecting state sovereignty. It’s also highlighted that cooperation should be tailored to the specific needs and priorities of the recipient countries while preserving confidentiality concerning their national capabilities.
The speaker asserts that capacity-building initiatives must operate on a politically neutral basis, ensuring transparency and non-discrimination, and should be free of any conditionality. Importantly, these initiatives must be carried out with the consent of all parties involved. There is a proposal for the establishment of a bespoke capacity-building framework to offer technical assistance to developing countries on fair and impartial terms.
This includes the creation of a training capacity-building fund, endorsed by the United Nations, aimed specifically at aiding these nations. Additionally, the speaker criticises unilateral coercive measures, or sanctions, deemed illegal and detrimental to capacity-building efforts. The adverse effects of such measures are underscored, with a strong recommendation for their immediate removal to create a better context for development assistance.
The upcoming roundtable in May is seen as an opportunity to foster progress, with the anticipation of adopting an action plan featuring clear timelines and definitive steps. This plan should prioritise capacity building through training and rehabilitation, encompassing a permanent fellowship program under the auspices of the UN, as well as facilitating technology transfer.
In closing, the speaker advocates for a holistic approach to capacity building for developing countries, using the forthcoming roundtable as a moment to firm up plans and secure tangible results aimed at achieving global digital equality and enhanced cybersecurity resilience.
T
Tonga
Speech speed
126 words per minute
Speech length
697 words
Speech time
331 secs
Report
The summary needs to be edited to ensure UK spelling and grammar, to correct any grammatical errors or sentence formation issues while aiming to preserve accuracy, detail, and quality. Here’s an edited version: The delegate commenced their address by conveying gratitude to the Chair, the team, and the Secretariat for their unwavering commitment throughout the process.
The occasion of International Women’s Day was duly honoured with fellow participants. The Secretariat’s capacity-mapping exercise received particular mention for instilling encouragement by revealing an extensive scope of work undertaken to enhance the capacities of smaller, developing states, including Tonga.
Attention was drawn to the Pacific Cyber Capabilities and Coordination Conference (P4C), hosted in Fiji the preceding year, pinpointed as a milestone event. The delegate supported Fiji’s proposal to incorporate the conference’s outcomes into the Secretariat’s mapping exercise, advocating their relevance on a global scale.
There was recognition of international partners from countries such as Australia, New Zealand, the USA, the UK, Canada, Germany, Japan, and Korea, as well as corporate entities like BAE Systems Australia and Cyber CX, for making this conference possible. The collaborations with the Oceania Cyber Security Centre and the Global Forum on Cyber Expertise were also highlighted.
The address acknowledged the Women in International Security and Cyberspace Fellowship for facilitating their attendance, illustrating capacity-building initiatives’ influence on diversifying representation and enhancing smaller states’ engagement in global discussions. On the subject of Tonga’s domestic strategies, the delegate outlined five pivotal cybersecurity capabilities crucial for developing resilience: the adoption and the execution of a national cybersecurity framework across government agencies, the inception and evolution of a national Computer Emergency Response Team (CERT) since 2016, forthcoming plans for a regional CERT, and rigorous IT infrastructure upkeep.
The delegate mentioned initiatives towards fostering a knowledge-based economy and the promotion of public cybersecurity awareness, pointing out contributions from various organisations. The importance of international cooperation in cybersecurity was emphasised, with examples such as the Forum of Incident Response and Security Teams (FIRST), the Asia Pacific Computer Emergency Response Team (APCERT), and the Pacific Cyber Security Operational Network (PACSON), which all played roles in Tonga’s response to a major ransomware incursion on a state-operated telecommunications entity.
Concluding the discussion, the delegate addressed proposals concerning the integration of the Global Cyber Capacity Building and Cooperation Programme (GCSCP) into the UNIDIR cyber policy platform. They agreed with the suggestion, referencing the delegate from the Philippines’ presentation, that merging the GCSCP with the GFCE civil portal could be advantageous and pledged to a comprehensive review of this proposal.
In conclusion, the delegate’s detailed summary underscored a significant focus on fostering cyber resilience at national and international tiers, the benefit of state and organisational cooperation, and the impactful nature of fellowship schemes. It placed emphasis on Tonga’s cybersecurity strategies and the need for expansive exploration and possible strategic amalgamation of cyber capacity-building resources.
U
UNIDIR
Speech speed
198 words per minute
Speech length
945 words
Speech time
287 secs
Report
In a session at UNIDIR, the speaker started by honouring International Women’s Day, applauding the women present and highlighting the significant but ongoing underrepresentation of women in international security and disarmament. This lack of representation was recognised as negatively influencing policy-making in these crucial areas.
The speaker then expressed appreciation for the delegations that have acknowledged UNIDIR’s research on foundational cyber capabilities, as reflected in the extensive citations within the draft Norms Implementation Checklist in the Chair’s discussion paper. UNIDIR’s work receiving positive feedback was noted as an encouraging indicator of the institute’s impactful progress, and gratitude was extended to donors for supporting their contributions.
The speaker addressed the effectiveness of scenario-based workshops, endorsed by experiences from Australia, the Philippines, and Uruguay, emphasising that the benefits of such workshops are contingent on the active and genuine engagement of participants rather than simply reaffirming pre-established political positions.
For the forthcoming workshop in May, the speaker stressed that success depends on participants’ readiness to partake constructively, which requires a sound understanding of the matter at hand. To promote this, UNIDIR announced a training programme backed by the United States on norms and international law, combining an online element with a study week in Geneva, aiming to help states develop or refine their national stances on international law.
Pertinent details have been shared with permanent missions, with an open offer for additional inquiries. Moreover, the introduction of the Women in AI Fellowship for 2024 was announced. This pilot scheme builds on the Women in Cyber Fellowship programme’s success and focuses on enabling women diplomats to actively contribute to AI discussions to negate any increase in gender imbalances due to AI advancements.
Based on the success of the pilot initiative, further support and resources from member states may be forthcoming, akin to the prior cyber initiative. UNIDIR invited those interested in the fellowship or other opportunities to get in touch or visit their website for more details.
To sum up, the speaker underscored the critical nature of fostering inclusive participation in the decision-making processes related to international security and disarmament and the urgency of tackling the gender divide, especially concerning emergent technologies such as AI.
U
Ukraine
Speech speed
156 words per minute
Speech length
722 words
Speech time
277 secs
Report
Ukraine has strengthened its commitment to the European Union’s principles on responsible state conduct in cyberspace. The country emphasises the importance of reducing the digital divide, particularly by enhancing capacity-building initiatives to help developing countries adhere to the norms of responsible behaviour in the digital domain.
Echoing the Open-Ended Working Group (OEWG) reports from 2021 and 2022, Ukraine is advocating the incorporation of capacity-building principles within cyber security and Information and Communication Technology (ICT) frameworks. Ukraine deems capacity building essential to mitigate vulnerabilities arising from inadequate cyber threat awareness and preparedness.
The country also welcomes the announcement of a dedicated roundtable event on 10 May 2024, expected to foster high-level dialogues and the sharing of best practices among member states and other stakeholders. Reaffirming its adherence to responsible state behaviour, Ukraine is proactively participating in international cyber security forums and knowledge-sharing initiatives, and is working in concert with NATO and the European Union to uphold these norms and counter cyber threats.
Drawing from its ongoing experience of armed conflict, Ukraine recognises cyber security’s crucial role in contemporary warfare and is continuously improving its capabilities through the analysis of cyber incidents. Ukraine is financially investing in its cyber defence infrastructure and regularly takes part in strategic cyber defence exercises both at home and abroad.
The cooperation agreement with the European Union Agency for Cyber Security (ENISA) is noteworthy, as it promotes capacity building through the exchange of best practices and awareness campaigns. Furthermore, Ukraine hosted the inaugural International Cyber Resilience Forum in Kyiv on 7th and 8th February 2024, highlighting the collective effort to combat cyber aggression and acknowledging Ukraine’s significant role in safeguarding international national interests.
The successful launch of the Kyiv International Cybersecurity Forum underlines Ukraine’s resolve to establish a consistent venue for addressing global cybersecurity threats and seeks to make this an annual event. In conclusion, Ukraine is urging all member states to collaborate in implementing the practices of responsible state behaviour, improving awareness, and bolstering abilities to combat the spectrum of cyber threats.
V
Vietnam
Speech speed
128 words per minute
Speech length
386 words
Speech time
181 secs
Report
Vietnam has expressed robust backing for global initiatives focused on bolstering cyber capacity to ensure an open, secure, resilient, and peaceful cyberspace. The delegation highlights the discrepancy in cyber capabilities between nations and emphasises the need to address this imbalance in Information and Communication Technologies (ICTs) competence globally.
In concurrence with the Philippines, Vietnam supports the creation of a centralised catalogue for capacity building programmes. This resource would streamline access to these initiatives, ensuring they are methodically organised to aid states, especially those with limited resources, in effectively responding to malicious ICT actions.
The critical importance of digital forensics in cyber incident management is underscored by Vietnam, which calls for investment in cutting-edge technologies and skilled personnel to strengthen e-forensic capabilities. Such advancements would enhance the efficiency and precision of cyber threat detection.
Vietnam also urges increased collaboration between Security Incident Response Teams (SIRTs) at both regional and global levels. Such partnerships are pivotal for exchanging threat intelligence, sharing best practices, and combining resources as part of an effective cyber incident response strategy.
The challenge posed by the growing complexity of Advanced Persistent Threats (APTs) is acknowledged, with Vietnam advocating for intensified development of protective tools, specialised training, and joint strategies to safeguard digital infrastructures. The country champions continuous professional advancement for cybersecurity experts and endorses ‘train-the-trainer’ programmes for their capacity to broadly disseminate expertise and improve cybersecurity skill sets within organisations.
In summary, Vietnam envisions a comprehensive strategy for cyber defence, encompassing the strengthening of digital forensic applications, the promotion of international SIRT cooperation, the advancement of anti-APT measures, and the investment in professional training initiatives. The delegation concludes by calling for a unified approach through bilateral and multilateral collaborations to fortify cyberspace security, reflecting a collective aim for enhanced international cyberspace security management.