In today’s ‘deeply cybered’ world, technological developments are racing ahead of both military doctrine and international law (Demchak, 2012; Shackelford, 2013). As cybersecurity challenges conventional ideas of how security is delivered and governed, governments are struggling to adapt their models of cybersecurity cooperation. In many countries, it is not the state but rather the private sector that provides cyber services or that owns critical infrastructure, such as telecommunication networks and online platforms. Much of the cybersecurity expertise thus lies with non-state actors. In seeking to address cybersecurity challenges and build up resilience, governments are not able to go it alone (Dunn Cavelty, 2007; Reveron, 2012; Tropina and Callanan, 2015).
The legal and strategic frameworks of all Western Balkan economies recognize the need – and the opportunities – for public–private partnerships (PPPs) in cybersecurity. DCAF’s analysis of relevant laws and strategies in the region shows that some present the concept of PPPs as an aspirational principle, while others refer to multi-stakeholder cooperation in certain areas of strategic importance. Indeed, certain policies set out specific actions to be taken to establish a cybersecurity PPP.1 Overall, however, there is a lack of practical guidance on how to secure such cooperation and the region has seen few attempts to set up cybersecurity PPPs. Their presence is far more common in Western Europe and North America.
This Guide is designed to support Western Balkan governments and non-state actors that are planning to establish cybersecurity PPPs as part of their public–private cooperation.
Drawing on international best practice, and referencing the region’s distinctive cultural, economic, and social context, it highlights options for establishing suitable cooperation frameworks and methods for overcoming obstacles.
Chapter 1 defines the term ‘cybersecurity PPP’ and sets out the main concepts and principles that underpin the guidance on planning, establishing, and maintaining a cybersecurity PPP. It describes the critical role good governance plays in every stage of cybersecurity cooperation and underscores the benefits of assessing the maturity of a community of cybersecurity actors as part of the PPP planning process.
Chapter 2 provides practical, advice on how to plan, set up, and run a cybersecurity PPP in the specific context of the Western Balkans. It reviews key considerations that can inform various aspects of the process, including the selection and convening of stakeholders, communication among partners, the establishment of PPP objectives and rules, agreement on who leads and administers the PPP, and upskilling of stakeholders who may have limited experience in public–private cooperation.
Chapter 3 presents various types of cybersecurity PPPs and offers concrete examples from the Western Balkans and other parts of the world. It draws out useful lessons, noting what steps stakeholders can take to overcome challenges. The examples reveal the advantages of tailoring the modalities of planning, establishing, and maintaining a cybersecurity PPP to its specific objective.
1 For details, see DCAF
相关报告
2022西湖论剑大会专家演讲PPT合集(22份)
4912
类型:IT互联网
上传时间:2022-07
标签:信创、网络安全、智能)
语言:中文
金额:免费
国家电网-新一代信息通信及网络安全技术发展趋势
3255
类型:行研
上传时间:2020-12
标签:信息通信、网络安全)
语言:中文
金额:5积分
计算机行业安全服务:网络安全行业的制高点-20210221-方正证券-64页
2364
类型:行研
上传时间:2021-02
标签:计算机、网络安全)
语言:中文
金额:免费
网络安全IT路线图
2345
类型:行研
上传时间:2021-03
标签:网络安全、IT)
语言:中文
金额:免费
中国网络安全产业白皮书
2048
类型:行研
上传时间:2022-01
标签:网络安全)
语言:中文
金额:免费
2023全球网络安全前瞻调研报告
1858
类型:行研
上传时间:2023-07
标签:网络安全、互联网、信息安全)
语言:中文
金额:5积分
中国网络安全产业白皮书(2020年)
1816
类型:专题
上传时间:2020-09
标签:网络安全、白皮书)
语言:中文
金额:5积分
复旦发展研究院:重点国家网络安全立法洞察报告
1813
类型:专题
上传时间:2020-10
标签:网络安全、立法)
语言:中文
金额:5积分
图解-网络数据安全风险评估实施指引V1.0
1724
类型:专题
上传时间:2023-06
标签:网络安全、数据安全、互联网)
语言:中文
金额:5积分
信息安全技术网络安全等级保护大数据基本要求
1678
类型:经管职场
上传时间:2021-05
标签:网络安全、大数据)
语言:中文
金额:免费
积分充值
30积分
6.00元
90积分
18.00元
150+8积分
30.00元
340+20积分
68.00元
640+50积分
128.00元
990+70积分
198.00元
1640+140积分
328.00元
微信支付
余额支付
积分充值
应付金额:
0 元
请登录,再发表你的看法
登录/注册