Catalyzing Cyber: Stimulating Cybersecurity Market through Ecosystem Development
1 Nov 2023 09:10h - 09:55h UTC
Event report
Moderator:
- John Defterios
Speakers:
- H.E. Eng. Abdulrahman Ali Al-Malki
- Felix A. Barrio Juárez
- Ir. Dr. Megat Zuhairy bin Megat
- Eng. Walid A. Abukhaled
Table of contents
Disclaimer: This is not an official record of the GCF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the GCF YouTube channel.
Knowledge Graph of Debate
Session report
Felix A. Barrio Juárez
The European Union's Next Generation Action public policy aims to stimulate economic recovery through increased investment in research and development (R&D). This policy recognizes that investment in R&D is crucial for post-COVID economic recovery, specifically in the area of digital transformation.
In Spain, one in three euros invested through the Next Generation Action programme is allocated to digital transformation. This highlights the recognition of the importance of digital transformation for economic growth and recovery. Furthermore, Spain has spent over 224 million euros on R&D for small and medium enterprises (SMEs), supporting their role as a successful strategy for market catalysation.
The digital transformation and cybersecurity sector's contribution to Spain's economic growth has risen from 12% to 22% in just three years. This demonstrates the significant impact that digital transformation and cybersecurity have on Spain's national economic growth.
Cybersecurity is not only essential for economic growth but also plays a crucial role in national technological sovereignty. It allows for independence in terms of national technology and ensures the protection of critical infrastructure and sensitive data.
However, there are concerns about standards becoming barriers for smaller businesses and new entrants in the digital market. The establishment of strict standards may put small companies at a disadvantage and limit the entry of new players into the market. It is essential to strike a balance between setting standards and allowing for the participation of new entrants to foster innovation and competition.
Building cybersecurity capabilities is a top priority, and there is a call for the private sector to step up in this field. Felix emphasizes the importance of prioritising the development of cybersecurity capabilities and highlights the need for private initiative in building these capabilities.
Additionally, public services have a role to play in empowering vulnerable sectors, such as consumers, to be part of the cybersecurity solution. By focusing on the more vulnerable sectors and involving the public in cybersecurity efforts, Felix believes that public services can contribute to promoting peace, justice, and strong institutions.
In conclusion, the European Union's Next Generation Action public policy recognises the importance of investment in R&D for economic recovery, particularly in digital transformation. Spain is investing significantly in digital transformation and supporting the growth of SMEs through R&D funding. The digital transformation and cybersecurity sector are playing an increasingly important role in Spain's economic growth. However, there are concerns about standards becoming barriers for smaller businesses and new entrants. Building cybersecurity capabilities and empowering the public are crucial aspects of addressing these challenges.
Ir. Dr. Megat Zuhairy bin Megat
In 2020, Malaysia established a cybersecurity strategy with a five-year plan to create a secure, trusted, and resilient cyberspace. The strategy is built upon five pillars: effective governance and management, legislative strengthening and enforcement, innovation R&D, capacity and capability building, and global collaboration. It aligns with the Malaysia Digital Economy Blueprint and the IR 4.0 policy, supporting the nation's goals of industry, innovation, and infrastructure.
One argument in favor of Malaysia's cybersecurity strategy is that it supports other nations' strategies and policies, highlighting the importance of partnerships and collaboration in addressing cyber threats. The strategy also aims to build a strong cybersecurity workforce by promoting it as a career choice among students and collaborating with industry and academic institutions.
However, there is a concern that an excessive focus on standards might impede innovation. While standards are crucial for efficiency and consistency, too much emphasis on them could limit the rate of innovation. Striking the right balance between standards and innovation is essential for an environment that fosters both safety and technological advancement.
In conclusion, Malaysia's cybersecurity strategy, with its five pillars and alignment with national strategies, reflects the country's commitment to a secure cyberspace. By focusing on education, industry collaboration, and capacity building, Malaysia aims to effectively tackle cyber threats and build a robust cybersecurity workforce. It is crucial to maintain a balance between adhering to standards and promoting innovation to ensure continued growth in the sector.
Eng. Walid A. Abukhaled
The importance of cybersecurity is highlighted in the provided data, with it being described as a top priority. There is a consensus among the arguments that cybersecurity is of utmost importance and should be taken seriously by organizations and nations alike. Daily cyber attacks targeting strategic companies and assets are a major concern, indicating the widespread risk posed by cyber threats. It is emphasized that no organization is immune from these attacks, with a cautionary message to those who believe it cannot happen to them.
SAMI, a defence system, recognizes the significance of cybersecurity and takes it seriously. It is stated that SAMI develops state-of-the-art technology to ensure independence and incorporates cybersecurity into its day-to-day business operations. This indicates a proactive approach to maintaining a robust cybersecurity strategy.
Furthermore, the argument is made that education on cybersecurity is crucial. It is stated that education is the number one issue, and the role of cybersecurity in educating people is tremendous. This underscores the need for raising awareness and ensuring that individuals are equipped with the necessary knowledge and skills to protect themselves and their organizations from cyber threats.
The data also highlights the vulnerability of Saudi Arabia to cyber attacks. It is mentioned that Saudi Arabia was previously one of the most targeted countries. This demonstrates the need for a robust cybersecurity infrastructure and strategies to protect national assets and interests.
Another noteworthy argument is the creation of a regional or global command and control centre for cybersecurity. The data suggests that establishing such a centre would facilitate the identification, sharing, and prevention of cyber threats. It is also mentioned that this centre would serve as a platform for sharing best practices and regulatory reforms, contributing to the development of future cybersecurity leaders.
The relationship between foreign investments and the safety and security of a nation is brought up as well. The argument posits that there is a direct link between safety, security, and prosperity, emphasising the importance of protecting strategic assets and investments for the future economy.
The role of small and medium enterprises (SMEs) in supporting larger organizations and fostering innovation in the cybersecurity industry is recognised. It is highlighted that SMEs play a crucial role and can bring new and innovative ideas to the table. To support SMEs, the suggestion is made that regulations should be in place to allocate a certain percentage of contracts from large companies to support them. This would create a more level playing field and encourage the growth of SMEs in the cybersecurity sector.
The value of human capital is emphasised, with Vision 2030 in Saudi Arabia prioritising investment in human capital. This indicates recognition of the importance of developing and nurturing talent in the cybersecurity field.
Furthermore, the issue of salary inflation in the cybersecurity industry is raised. It is mentioned that cybersecurity specialists with four years of experience are demanding CEO-level salaries. This suggests a growing concern regarding the escalation of salaries in the industry.
Trust is identified as an integral component of the cybersecurity industry. The data highlights the need for a regulatory framework to earn trust and address issues such as data breaches, loss of personal information, and concerns about privacy infringements through apps.
Lastly, the data points out the benefits of global cooperation in cybersecurity. It is mentioned that the Global Cybersecurity Forum provides an opportunity to learn from global mindsets, indicating the value of knowledge exchange and collaboration in addressing the challenges of cybersecurity.
In conclusion, the extended summary highlights the importance of cybersecurity as a top priority, the need for increased security in the face of daily cyber attacks, and the recognition of cybersecurity by organizations and nations alike. It emphasizes the crucial role of education, the vulnerability of Saudi Arabia to cyber attacks, and the potential benefits of establishing a regional or global command centre for cybersecurity. The relationship between foreign investments and the safety and security of a nation is underscored, along with the support needed for SMEs and the value of human capital in the cybersecurity industry. The concerns of salary inflation and the importance of trust and global cooperation are also addressed. Overall, the data presents a comprehensive overview of the various aspects of cybersecurity and its significance in today's world.
H.E. Eng. Abdulrahman Ali Al-Malki
Cybersecurity plays a vital role in safeguarding assets and systems, although it can be costly. The protection of these valuable assets necessitates a significant budget allocation. Moreover, constant losses after cyber attacks can be mitigated through proper financial investment in cybersecurity. This perspective highlights the importance of cybersecurity measures despite the associated expenses.
A substantial cybersecurity budget not only ensures the protection of assets but also has the potential to attract global solutions and foreign companies. Nations with significant investments in cybersecurity have been successful in enticing international solutions. Additionally, a strong cybersecurity infrastructure instills confidence in foreign companies, thereby encouraging their investment. This stance emphasizes the positive outcomes of allocating a high budget to cybersecurity.
Furthermore, it is crucial to provide support and cooperation to Saudi Arabia's Cooperation Council in their leadership role in cybersecurity. Expressing support for their efforts signifies the importance of collaboration in creating effective cybersecurity measures. This cooperative approach fosters positive outcomes in achieving cybersecurity goals.
In Qatar, a comprehensive plan has been implemented to ensure sovereign security at a national level, particularly in relation to the World Cup. This comprehensive plan encompasses a national security framework that extends across all institutions, ministries, and select private sector companies. Vigilant monitoring of the framework's implementation on a daily basis ensures the highest level of security. Implementing such a plan demonstrates Qatar's commitment to national security.
During the World Cup, Qatar actively cooperated with international partners, receiving support from teams of other countries. This collaborative approach involved sharing problems and challenges with friendly nations and receiving analyzed data on security threats. This exchange of information and support during the World Cup helped strengthen Qatar's security measures.
Even after the World Cup, Qatar continues to maintain relationships with the countries they cooperated with. Ongoing sharing and receiving of data on sovereign security exemplify Qatar's commitment to sustaining these relationships. This enduring partnership remains essential in safeguarding national security.
Building capabilities and licensing workers in the field of cybersecurity is a priority in Qatar. The country has studied two directions in this realm, focusing on enhancing cybersecurity skills and knowledge, as well as licensing workers. These efforts span across different levels, including companies, organizations, as well as individual workers and engineers. By prioritizing these actions, Qatar aims to develop a workforce proficient in cybersecurity.
Identifying and managing risks within the supply chain is critical for maintaining uninterrupted services. Even the smallest entity within the supply chain has the potential to cause complete failure of the service. Neglecting to thoroughly study and address supply chain risks can lead to significant problems. This highlights the necessity of recognizing and effectively managing risks within the supply chain.
In conclusion, cybersecurity is indispensable for protecting assets and systems, despite its associated expenses. A high cybersecurity budget attracts global solutions and foreign companies, promoting economic growth. Supporting Saudi Arabia's Cooperation Council in their cybersecurity efforts is crucial for collaborative and effective measures. Qatar has implemented a comprehensive national security plan, ensuring sovereign security at a national level. The country actively cooperated with international partners during the World Cup and continues to maintain relationships with these countries. Additionally, building capabilities and licensing workers in the field of cybersecurity is a priority for Qatar. Identifying and managing risks in the supply chain is critical to avoid service failures. These insights shed light on the importance of cybersecurity and collaborative efforts in maintaining security and economic growth.
Moderator
Summary:
Cybersecurity plays a critical role in protecting strategic companies and assets from daily attacks. Saudi Arabian Military Industries (SAMI) is developing its defense system with a commercial mindset, ensuring cyber resilience and extreme protection. Education is crucial in mitigating cybersecurity risks, as people often underestimate the likelihood of being targeted. Clear regulations and policies are necessary to provide a framework for effective cybersecurity. International cooperation and collaboration are key to combating cyber threats, with suggestions for the establishment of regional/global command centers and sharing of threat intelligence. Consumer protection, support for SMEs, and finding a balance between standards and innovation are important considerations. Qatar has a comprehensive plan for sovereign security, while international collaborations during events like the World Cup demonstrate the importance of working together. Building trust, capacity, and capability in the cybersecurity field are also emphasized.
Speakers
EW
Eng. Walid A. Abukhaled
Speech speed
184 words per minute
Speech length
1688 words
Speech time
552 secs
Arguments
Cyber security is at the highest level of importance
Supporting facts:
- If there's a topic that is at the highest level of importance, probably it is cybersecurity
- The presence of this forum is amazing, it's great, and hopefully it will add great value
Topics: Cyber security, Global cyber security forum
Every organization faces the risk of cyber attacks
Supporting facts:
- There's daily attacks on almost every strategic company, on every strategic asset
- People who believe this may not happen to them, they better think again
Topics: Cyber security, Cyber attacks
Education on cyber security is crucial
Supporting facts:
- Education is the number one issue
- cyber security function plays a tremendous role in educating
Topics: Education, Cyber security
Saudi Arabia is one of the most targeted countries for cyber attacks.
Supporting facts:
- Saudi was one of the most targeted in a country for cyber attacks a couple of years ago.
Topics: Cybersecurity, Saudi Arabia
Creating a regional or global command and control center for cybersecurity would be beneficial.
Supporting facts:
- By identifying and sharing the type of attacks, countries can better prevent cyber threats.
- This type of center is crucial for the development of future leaders in cybersecurity.
- This would also be a platform for sharing best practices and regulatory reforms.
Topics: Cybersecurity, International Cooperation
Foreign investments are linked with the safety and security of a nation.
Supporting facts:
- There is a direct relationship between safety, security, and prosperity of any nations.
- Protection of strategic assets and investments is crucial to the future economy.
Topics: Cybersecurity, Foreign Investments, Economy
SMEs play a crucial role in supporting bigger organizations and fostering innovation in any industry, including cyber security
Supporting facts:
- Story of a global defense company acquiring a small enterprise with a significant innovative product
- Big corporations sometimes have standards and compliance issues that prevent quick innovation
Topics: Small and medium enterprises, Innovation, Cyber security
The biggest wealth the kingdom have is its people
Supporting facts:
- Vision 2030 emphasizes on human capital
Topics: human capital, talent development
Having issues of cybersecurity salary inflation
Supporting facts:
- Cyber security specialists with 4 years of experience asking for CEO level salaries
Topics: cybersecurity, salary
Global Cybersecurity Forum is beneficial
Supporting facts:
- Opportunity to learn from global mindsets
Topics: Cybersecurity, Global cooperation
Report
The importance of cybersecurity is highlighted in the provided data, with it being described as a top priority. There is a consensus among the arguments that cybersecurity is of utmost importance and should be taken seriously by organizations and nations alike.
Daily cyber attacks targeting strategic companies and assets are a major concern, indicating the widespread risk posed by cyber threats. It is emphasized that no organization is immune from these attacks, with a cautionary message to those who believe it cannot happen to them.
SAMI, a defence system, recognizes the significance of cybersecurity and takes it seriously. It is stated that SAMI develops state-of-the-art technology to ensure independence and incorporates cybersecurity into its day-to-day business operations. This indicates a proactive approach to maintaining a robust cybersecurity strategy.
Furthermore, the argument is made that education on cybersecurity is crucial. It is stated that education is the number one issue, and the role of cybersecurity in educating people is tremendous. This underscores the need for raising awareness and ensuring that individuals are equipped with the necessary knowledge and skills to protect themselves and their organizations from cyber threats.
The data also highlights the vulnerability of Saudi Arabia to cyber attacks. It is mentioned that Saudi Arabia was previously one of the most targeted countries. This demonstrates the need for a robust cybersecurity infrastructure and strategies to protect national assets and interests.
Another noteworthy argument is the creation of a regional or global command and control centre for cybersecurity. The data suggests that establishing such a centre would facilitate the identification, sharing, and prevention of cyber threats. It is also mentioned that this centre would serve as a platform for sharing best practices and regulatory reforms, contributing to the development of future cybersecurity leaders.
The relationship between foreign investments and the safety and security of a nation is brought up as well. The argument posits that there is a direct link between safety, security, and prosperity, emphasising the importance of protecting strategic assets and investments for the future economy.
The role of small and medium enterprises (SMEs) in supporting larger organizations and fostering innovation in the cybersecurity industry is recognised. It is highlighted that SMEs play a crucial role and can bring new and innovative ideas to the table.
To support SMEs, the suggestion is made that regulations should be in place to allocate a certain percentage of contracts from large companies to support them. This would create a more level playing field and encourage the growth of SMEs in the cybersecurity sector.
The value of human capital is emphasised, with Vision 2030 in Saudi Arabia prioritising investment in human capital. This indicates recognition of the importance of developing and nurturing talent in the cybersecurity field. Furthermore, the issue of salary inflation in the cybersecurity industry is raised.
It is mentioned that cybersecurity specialists with four years of experience are demanding CEO-level salaries. This suggests a growing concern regarding the escalation of salaries in the industry. Trust is identified as an integral component of the cybersecurity industry. The data highlights the need for a regulatory framework to earn trust and address issues such as data breaches, loss of personal information, and concerns about privacy infringements through apps.
Lastly, the data points out the benefits of global cooperation in cybersecurity. It is mentioned that the Global Cybersecurity Forum provides an opportunity to learn from global mindsets, indicating the value of knowledge exchange and collaboration in addressing the challenges of cybersecurity.
In conclusion, the extended summary highlights the importance of cybersecurity as a top priority, the need for increased security in the face of daily cyber attacks, and the recognition of cybersecurity by organizations and nations alike. It emphasizes the crucial role of education, the vulnerability of Saudi Arabia to cyber attacks, and the potential benefits of establishing a regional or global command centre for cybersecurity.
The relationship between foreign investments and the safety and security of a nation is underscored, along with the support needed for SMEs and the value of human capital in the cybersecurity industry. The concerns of salary inflation and the importance of trust and global cooperation are also addressed.
Overall, the data presents a comprehensive overview of the various aspects of cybersecurity and its significance in today's world.
FA
Felix A. Barrio Juárez
Speech speed
143 words per minute
Speech length
788 words
Speech time
332 secs
Arguments
Investment in research and development, particularly in digital transformation, is crucial for economic recovery post-COVID
Supporting facts:
- The European Union's Next Generation Action public policy is designed to boost economy recovery through R&D investment
- In Spain, one in three euros invested through this program is allocated to digital transformation
Topics: Investment, Research and Development, Digital Transformation, COVID-19, Economic Recovery
Investment in small and medium enterprises (SMEs) is a successful strategy for market catalysation
Supporting facts:
- There's a need for more SMEs to meet the requirements set by European directives
- This year, Spain spent over 224 million euros in R&D for SMEs, with more than 140 different projects
Topics: SMEs, Investment, Market Catalysation
Digital transformation and cybersecurity contribute significantly to Spain's national economic growth
Supporting facts:
- In three years, the digital transformation and cybersecurity sector's contribution to Spain's economic growth has risen from 12% to 22%
Topics: Digital Transformation, Cybersecurity, Economic Growth
Cybersecurity allows for national technological sovereignty
Supporting facts:
- Cyber security allows for independence in terms of national technology
Topics: Cybersecurity, National Sovereignty, Technology
Standards can become barriers for smaller businesses and new entrants in the digital market
Supporting facts:
- EU is boosting standardization process to establish requirements.
- There is a requirement for more than 150,000 new SMEs in Europe for providing new services in cybersecurity.
- Small companies in small towns may become dependent on foreign providers and big firms if standardization creates barriers.
Topics: Standardization, Cybersecurity, Small and Medium Enterprises, Digital Market
Felix emphasizes on the prioritization of building cybersecurity capabilities.
Supporting facts:
- They have built a hotline that attends to citizens and enterprises facing cyber attacks.
Topics: cybersecurity, consumer trust, small and medium enterprises
Felix believes in empowering the public to be a part of the cyber security solution
Supporting facts:
- Public service should focus on the more vulnerable sectors including consumers.
Topics: Public service, cybersecurity, consumer
Report
The European Union's Next Generation Action public policy aims to stimulate economic recovery through increased investment in research and development (R&D). This policy recognizes that investment in R&D is crucial for post-COVID economic recovery, specifically in the area of digital transformation.
In Spain, one in three euros invested through the Next Generation Action programme is allocated to digital transformation. This highlights the recognition of the importance of digital transformation for economic growth and recovery. Furthermore, Spain has spent over 224 million euros on R&D for small and medium enterprises (SMEs), supporting their role as a successful strategy for market catalysation.
The digital transformation and cybersecurity sector's contribution to Spain's economic growth has risen from 12% to 22% in just three years. This demonstrates the significant impact that digital transformation and cybersecurity have on Spain's national economic growth. Cybersecurity is not only essential for economic growth but also plays a crucial role in national technological sovereignty.
It allows for independence in terms of national technology and ensures the protection of critical infrastructure and sensitive data. However, there are concerns about standards becoming barriers for smaller businesses and new entrants in the digital market. The establishment of strict standards may put small companies at a disadvantage and limit the entry of new players into the market.
It is essential to strike a balance between setting standards and allowing for the participation of new entrants to foster innovation and competition. Building cybersecurity capabilities is a top priority, and there is a call for the private sector to step up in this field.
Felix emphasizes the importance of prioritising the development of cybersecurity capabilities and highlights the need for private initiative in building these capabilities. Additionally, public services have a role to play in empowering vulnerable sectors, such as consumers, to be part of the cybersecurity solution.
By focusing on the more vulnerable sectors and involving the public in cybersecurity efforts, Felix believes that public services can contribute to promoting peace, justice, and strong institutions. In conclusion, the European Union's Next Generation Action public policy recognises the importance of investment in R&D for economic recovery, particularly in digital transformation.
Spain is investing significantly in digital transformation and supporting the growth of SMEs through R&D funding. The digital transformation and cybersecurity sector are playing an increasingly important role in Spain's economic growth. However, there are concerns about standards becoming barriers for smaller businesses and new entrants.
Building cybersecurity capabilities and empowering the public are crucial aspects of addressing these challenges.
HE
H.E. Eng. Abdulrahman Ali Al-Malki
Speech speed
133 words per minute
Speech length
836 words
Speech time
376 secs
Arguments
Cybersecurity is expensive but vital for the protection of assets and systems
Supporting facts:
- Securing the systems and sites costs a lot of money
- Protection from constant losses after cyber attacks can be achieved with an appropriate budget
Topics: Cybersecurity, Economic Growth
Qatar had a comprehensive plan for sovereign security at national level
Supporting facts:
- They implemented a national security framework across all institutions, ministries and some private sector companies
- They monitored the implementation of the framework on a daily basis
Topics: National Security, Qatar, World Cup
Qatar continues to maintain relationships with these countries
Supporting facts:
- They are still in relationship with these countries even after the World Cup
- They continue to share and receive data on sovereign security with these countries
Topics: International Relations, Qatar, Cyber Security
Building capabilities and licensing workers in the field of cyber security is a priority
Supporting facts:
- In Qatar, two directions have been studied - building capabilities and licensing workers
- This is applicable at the company level, the organization level, and even at the level of the workers or engineers
Topics: cyber security, worker licensing, building capabilities
Identifying and managing risks in the supply chain is critical
Supporting facts:
- The smallest entity in the supply chain can cause a complete failure of the service
- The issue of supply chain risk has been discussed in a previous session
- Not studying the supply chain can cause significant problems
Topics: supply chain, risk management
Report
Cybersecurity plays a vital role in safeguarding assets and systems, although it can be costly. The protection of these valuable assets necessitates a significant budget allocation. Moreover, constant losses after cyber attacks can be mitigated through proper financial investment in cybersecurity.
This perspective highlights the importance of cybersecurity measures despite the associated expenses. A substantial cybersecurity budget not only ensures the protection of assets but also has the potential to attract global solutions and foreign companies. Nations with significant investments in cybersecurity have been successful in enticing international solutions.
Additionally, a strong cybersecurity infrastructure instills confidence in foreign companies, thereby encouraging their investment. This stance emphasizes the positive outcomes of allocating a high budget to cybersecurity. Furthermore, it is crucial to provide support and cooperation to Saudi Arabia's Cooperation Council in their leadership role in cybersecurity.
Expressing support for their efforts signifies the importance of collaboration in creating effective cybersecurity measures. This cooperative approach fosters positive outcomes in achieving cybersecurity goals. In Qatar, a comprehensive plan has been implemented to ensure sovereign security at a national level, particularly in relation to the World Cup.
This comprehensive plan encompasses a national security framework that extends across all institutions, ministries, and select private sector companies. Vigilant monitoring of the framework's implementation on a daily basis ensures the highest level of security. Implementing such a plan demonstrates Qatar's commitment to national security.
During the World Cup, Qatar actively cooperated with international partners, receiving support from teams of other countries. This collaborative approach involved sharing problems and challenges with friendly nations and receiving analyzed data on security threats. This exchange of information and support during the World Cup helped strengthen Qatar's security measures.
Even after the World Cup, Qatar continues to maintain relationships with the countries they cooperated with. Ongoing sharing and receiving of data on sovereign security exemplify Qatar's commitment to sustaining these relationships. This enduring partnership remains essential in safeguarding national security.
Building capabilities and licensing workers in the field of cybersecurity is a priority in Qatar. The country has studied two directions in this realm, focusing on enhancing cybersecurity skills and knowledge, as well as licensing workers. These efforts span across different levels, including companies, organizations, as well as individual workers and engineers.
By prioritizing these actions, Qatar aims to develop a workforce proficient in cybersecurity. Identifying and managing risks within the supply chain is critical for maintaining uninterrupted services. Even the smallest entity within the supply chain has the potential to cause complete failure of the service.
Neglecting to thoroughly study and address supply chain risks can lead to significant problems. This highlights the necessity of recognizing and effectively managing risks within the supply chain. In conclusion, cybersecurity is indispensable for protecting assets and systems, despite its associated expenses.
A high cybersecurity budget attracts global solutions and foreign companies, promoting economic growth. Supporting Saudi Arabia's Cooperation Council in their cybersecurity efforts is crucial for collaborative and effective measures. Qatar has implemented a comprehensive national security plan, ensuring sovereign security at a national level.
The country actively cooperated with international partners during the World Cup and continues to maintain relationships with these countries. Additionally, building capabilities and licensing workers in the field of cybersecurity is a priority for Qatar. Identifying and managing risks in the supply chain is critical to avoid service failures.
These insights shed light on the importance of cybersecurity and collaborative efforts in maintaining security and economic growth.
ID
Ir. Dr. Megat Zuhairy bin Megat
Speech speed
148 words per minute
Speech length
1150 words
Speech time
465 secs
Arguments
Malaysia established cybersecurity strategy in 2020 with a five-year plan
Supporting facts:
- Involves five pillars: effective governance and management, legislative strengthening and enforcement, innovation R&D, capacity and capability building, and global collaboration
- Heading of the plan is The National Cybersecurity Agency of Malaysia (NAXA)
Topics: National Cybersecurity Strategy, Malaysia
Malaysia Cybersecurity strategy aims to establish a secure, trusted, and resilient cyberspace
Supporting facts:
- Aligns with the Malaysia Digital Economy Blueprint and IR 4.0 policy
- Supports science, technology, engineering and math (STEM) education policy
Topics: Cybersecurity, Malaysia
Malaysia should invest more in capacity building to utilize cybersecurity threat intel and information effectively
Supporting facts:
- Malaysia is in collaboration with global cybersecurity entities
- Malaysia aspires to have 25,000 - 30,000 cybersecurity personnel. Currently has less than 15,000
- Malaysia has a command center to handle cybersecurity threat intel
Topics: Cybersecurity, Capacity Building, Global Collaboration
Collaboration with industry and academic institutions is vital in drafting new policies or directions
Supporting facts:
- When drafting the cybersecurity bill, inputs from industries and academicians were considered essential; The Malaysian qualification agencies require universities to prove that their programs incorporate insights from industries
Topics: Digital Transformation, Cybersecurity, Academic Collaboration
Too much focus on standards might impede innovation
Supporting facts:
- In the construction industry, standards very much focus on safety, health, and quality but could deter innovation
- With standards established and not transforming or improving, threats know what the standards are
Topics: Innovation, Standards
Securing, trust and resilience in cyberspace are vital.
Supporting facts:
- 60% of attacks are on airport infrastructure
- 86% of global CEOs believe there will be a catastrophic event in their cyber operations
Topics: Cybersecurity, Digital innovation
Report
In 2020, Malaysia established a cybersecurity strategy with a five-year plan to create a secure, trusted, and resilient cyberspace. The strategy is built upon five pillars: effective governance and management, legislative strengthening and enforcement, innovation R&D, capacity and capability building, and global collaboration.
It aligns with the Malaysia Digital Economy Blueprint and the IR 4.0 policy, supporting the nation's goals of industry, innovation, and infrastructure. One argument in favor of Malaysia's cybersecurity strategy is that it supports other nations' strategies and policies, highlighting the importance of partnerships and collaboration in addressing cyber threats.
The strategy also aims to build a strong cybersecurity workforce by promoting it as a career choice among students and collaborating with industry and academic institutions. However, there is a concern that an excessive focus on standards might impede innovation.
While standards are crucial for efficiency and consistency, too much emphasis on them could limit the rate of innovation. Striking the right balance between standards and innovation is essential for an environment that fosters both safety and technological advancement. In conclusion, Malaysia's cybersecurity strategy, with its five pillars and alignment with national strategies, reflects the country's commitment to a secure cyberspace.
By focusing on education, industry collaboration, and capacity building, Malaysia aims to effectively tackle cyber threats and build a robust cybersecurity workforce. It is crucial to maintain a balance between adhering to standards and promoting innovation to ensure continued growth in the sector.
M
Moderator
Speech speed
178 words per minute
Speech length
2121 words
Speech time
714 secs
Arguments
Cybersecurity is of utmost importance, with daily attacks on strategic companies and assets
Supporting facts:
- There are daily attacks on almost every strategic company, on every strategic asset.
Topics: Cybersecurity, Global Business, Strategic assets
SAMI, owned by Saudi government, is developing its defense system with a commercial mindset
Supporting facts:
- SAMI was established in 2018, 100% owned by public investment fund.
- SAMI's mandate is to localize 50% of the defense spend in the Kingdom of Saudi Arabia.
Topics: SAMI, Defense system, Commercial business
Cybersecurity is integral in designing defense systems and ensuring their safety
Supporting facts:
- Every system designed at SAMI, is ensured to be cyber resilient and extremely protected.
Topics: Cybersecurity, Defense systems, Protection
Education is important to mitigate risks associated with cybersecurity
Supporting facts:
- SAMI's cybersecurity function plays a role in educating, as still many people believe they would not be a victim of cyber attacks.
Topics: Education, Cybersecurity, Protection
There is a need for clear regulations and policies in cybersecurity
Supporting facts:
- NCA is praised for putting forth clear regulations and policies for cybersecurity.
Topics: Cybersecurity, Regulations, Policies
Malaysia has a five year cybersecurity strategy established in 2020
Supporting facts:
- The strategy supports the Malaysia Digital Economy Blueprint and the IR 4.0 policy
- It is focused on governance and management, legislative enforcement, innovation R&D, capability building, awareness, education, and global collaboration
Topics: Cybersecurity, Malaysia, National Cybersecurity Agency of Malaysia
Cybersecurity is expensive but necessary and beneficial in the long term
Supporting facts:
- Higher cybersecurity budgets not only point to better protection but also attract global solutions and provide appropriate infrastructures for future projects.
- Countries making large investments in cybersecurity can attract companies, protect the existing foundations and prevent potential losses from cyber attacks.
Topics: Cybersecurity, Budgets, Investments, Infrastructure
The European Union has a public policy called Next Generation Action which supports economic recovery post-COVID by investing in digital transformation and research & development.
Supporting facts:
- One of each three euros invested through this program is allocated to digital transformation.
- The main successful experience has been to invest directly in research and development in digital transformation.
Topics: EU, Public Policy, Next Generation Action, Economic Recovery, COVID, Digital Transformation
Small and Medium Enterprises (SMEs) play a crucial role in digital transformation and in boosting the economy.
Supporting facts:
- Investing in research and development in SMEs is important.
- Spain has moved from 12% of our national economic growth to 22% of the growth depending on digital transformation and in particular cyber security.
Topics: SMEs, Economy Boost, Digital Transformation
Countries need to balance international cooperation and national sovereignty in cybersecurity.
Supporting facts:
- Cybersecurity allows national sovereignty in terms of technology.
Topics: International Cooperation, National Sovereignty, Cybersecurity
Saudi Arabia was among the most targeted in cyber attacks and learned many lessons from this
Supporting facts:
- Saudi was one of the most targeted in country in cyber attacks a few years ago
Topics: Saudi Arabia, Cyber attacks, Cybersecurity
Need for a regional/global command and control center for sharing threats and responses
Supporting facts:
- Eng. Walid suggests setting up a regional/global command center to share vulnerabilities and threats
Topics: Cybersecurity, International Cooperation, Threat Sharing
Future security and prosperity dependent on cyber safety
Supporting facts:
- Foreign investments link to safety and security of a nation
- Future is about cyber, and it is directly related to the protection of strategic assets and investments
Topics: Cybersecurity, Economic Security, Foreign Investment
Saudi Arabia's geographical and cultural position could facilitate a bridging role in global technology disputes
Supporting facts:
- Moderator asked about the possibility of Saudi Arabia bridging the tech competition between the U.S. and China
Topics: Technology, Global Politics, U.S., China, Saudi Arabia
Global collaboration is crucial in Malaysia's cybersecurity strategy.
Supporting facts:
- Malaysia collaborates with cybersecurity entities globally, they're viewed as a middle ground country.
- They receive threat intel from ASEAN, EU, US, China.
Topics: Cybersecurity, Global collaboration, Threat Intel
There is a significant talent gap in Malaysian cybersecurity.
Supporting facts:
- Malaysia aims to have about 25,000 to 30,000 cybersecurity knowledgeable personnel, but currently has less than 15,000.
Topics: Cybersecurity, Education, Workforce
Increasing capacity building and promoting cybersecurity as a career choice are necessary.
Supporting facts:
- There's a need to increase the number of students in Malaysia choosing cybersecurity as their career and education choice, starting from primary school.
Topics: Cybersecurity, Education, Workforce development
Collaboration with industry and academic institutions are critical when drafting cybersecurity bill or other policies in digital transformation
Supporting facts:
- The cybersecurity bill drafting involves getting inputs from the industries and feedback from academicians to make it more comprehensive
Topics: Digital Transformation, Policy Making, Collaboration, Cybersecurity
Qatar has a comprehensive plan in place to address issues related to sovereign security
Supporting facts:
- This plan is based on a national framework applied to all institutions in Qatar.
- The implementation of the framework is being monitored daily.
Topics: Sovereign Security, Qatar, National Framework
Collaboration with friendly countries was pivotal during the World Cup held in Qatar
Supporting facts:
- Many countries wanted to participate with Qatar in the event.
- These countries provided support in various forms including sharing data.
Topics: World Cup, International Collaboration, Data Sharing
Cybersecurity and digital market standardization may create barriers for SMEs
Supporting facts:
- Boosting standardization process can establish a strong lay of requirements
- EU is predicted to need more than 150,000 new SMEs to meet these new cyber security requirements
- There are disparities in market conditions within the EU, with Eastern and Western countries facing different challenges
Topics: Cybersecurity, Digital Market, Standardization, SMEs, Barriers
There is a need to balance between establishing stringent standards and encouraging the growth of SMEs
Supporting facts:
- Very small companies, especially those based in smaller towns, may depend on foreign providers and big firms
- Potential risk of SMEs being left vulnerable if standards prove to be too high a barrier
Topics: Cybersecurity, Digital Market, Standardization, SMEs
Standards may improve efficiency but could demote innovation, especially in industries like construction where safety, health and quality are paramount
Supporting facts:
- Ir. Dr. Megat Zuhairy shared that moving away from standards in construction could compromise safety, health, and quality
- Standards may deter or demote innovation, according to Dr. Megat Zuhairy
Topics: Standards, Innovation, Construction Industry, Safety, Health, Quality
While standards help with efficiency and communication, focusing too much on them can expose industries to more threats
Supporting facts:
- Dr. Megat Zuhairy suggested that sticking rigidly to standards exposes industries to threats since they might not be innovating or improving
Topics: Standards, Threats, Efficiency, Communication
SMEs play a crucial role in supporting larger organizations and promoting innovation
Supporting facts:
- Global defense company made a valuable acquisition from an SME working from a home garage
- Large corporations may have policies that can slow down innovation, emphasizing the importance of SMEs
Topics: SMEs, Innovation, Industry Support
Trust is an essential factor for adoption of digital transactions and e-commerce
Supporting facts:
- Successful business transactions require trust in the system
Topics: Trust, Cybersecurity, E-commerce
Need of more support from private initiative for boosting cybersecurity
Supporting facts:
- Cybersecurity is crucial in the digital age.
- Private initiatives can contribute in developing cybersecurity measures.
Topics: Cybersecurity, Private initiative
Focus of public services on vulnerable sectors is critical
Supporting facts:
- Vulnerable sectors need special attention from public services.
- Consumer is considered as the main vulnerable sector.
Topics: Public services, Vulnerable sectors, Consumer protection
Establishment of 017 hotline for cybersecurity issues
Supporting facts:
- 017 hotline was established three years ago.
- The hotline receives about 2000 calls per week.
Topics: Cybersecurity hotline, Public support
There is a need to build capabilities and license workers in cyber security
Supporting facts:
- According to H.E. Eng. Abdulrahman Ali Al-Malki, building capabilities at the company, organization and individual level is vital for cyber security.
Topics: Cyber Security, Workforce Development
Supply chain presents the biggest risk in cyber security
Supporting facts:
- H.E. Eng. Abdulrahman Ali Al-Malki mentioned that non-studying of supply chain for any service or organization results in major problems as it has the potential to cause a complete service failure.
Topics: Cyber Security, Supply Chain
Malaysia's focus is on secure, trusted, and resilient cyberspace where the priorities are mainly capacity and capability building
Supporting facts:
- Malaysia promotes digital transformation and believes that establishing trust will bring more people and machines into cyberspace
- Innovation, generative AI establish a totally different cyberspace environment
Topics: Cyberspace, Digital Transformation, Trust Building, Capacity Building, Capability Building
Report
Summary: Cybersecurity plays a critical role in protecting strategic companies and assets from daily attacks. Saudi Arabian Military Industries (SAMI) is developing its defense system with a commercial mindset, ensuring cyber resilience and extreme protection. Education is crucial in mitigating cybersecurity risks, as people often underestimate the likelihood of being targeted.
Clear regulations and policies are necessary to provide a framework for effective cybersecurity. International cooperation and collaboration are key to combating cyber threats, with suggestions for the establishment of regional/global command centers and sharing of threat intelligence. Consumer protection, support for SMEs, and finding a balance between standards and innovation are important considerations.
Qatar has a comprehensive plan for sovereign security, while international collaborations during events like the World Cup demonstrate the importance of working together. Building trust, capacity, and capability in the cybersecurity field are also emphasized.