Day 0 Event #161 Preparing Your Internet to Power the Digital of Tomorrow
23 Jun 2025 10:15h - 11:15h
Day 0 Event #161 Preparing Your Internet to Power the Digital of Tomorrow
Session at a glance
Summary
This Day Zero session at the Internet Governance Forum focused on preparing internet infrastructure to support tomorrow’s digital economy, featuring speakers from regulatory bodies, technical organizations, and international development agencies. The discussion emphasized that robust internet infrastructure is a strategic necessity rather than a luxury, requiring collaboration across multiple stakeholder groups.
Norway’s representative highlighted their comprehensive approach, including 99.1% broadband coverage at 100+ Mbps, extensive 5G deployment, enhanced cybersecurity regulations aligned with EU directives, and infrastructure resilience through multiple autonomous transmission networks. Croatia’s regulator discussed the importance of balancing economic efficiency with security resilience, noting the challenge of justifying investments in redundant infrastructure that may only be needed during emergencies. The session emphasized agile regulation that supports innovation while maintaining security and trust.
Technical experts from ICANN and the Number Resource Organization stressed the critical role of multi-stakeholder collaboration in maintaining internet stability. They highlighted the importance of routing security through technologies like RPKI (Resource Public Key Infrastructure), which adds cryptographic verification to internet routing but remains underadopted globally. Smart Africa’s representative showcased continental initiatives like the One African Network project, which aims to eliminate roaming charges across 11 countries and demonstrates successful multi-stakeholder cooperation.
The UNDP presented their Digital Professional Development initiative for the Arab region, addressing the fact that 30% of the region remains unconnected. Their approach focuses on three pillars: promoting IPv6 adoption, supporting Internet Exchange Points (IXPs) for sustainable connectivity, and implementing RPKI for security. Throughout the discussion, speakers consistently emphasized that capacity building, education for general users, and long-term partnerships between governments, private sector, and technical communities are essential for creating resilient internet infrastructure that can support emerging technologies like AI and IoT while bridging the digital divide.
Keypoints
## Major Discussion Points:
– **Infrastructure Investment and Connectivity Goals**: Discussion of national broadband strategies, with Norway achieving 99.1% household coverage at 100+ Mbps and targeting universal gigabit access by 2030, while addressing the challenge that 30% of the Arab region (100+ million people) remains unconnected to the internet.
– **Cybersecurity and Regulatory Frameworks**: Examination of comprehensive security approaches including alignment with EU directives (NIS2, Cyber Resilience Act), implementation of sectoral CERT coordination models, and the balance between economic efficiency and national security resilience requirements.
– **Technical Security Standards and Best Practices**: Focus on routing security through RPKI (Resource Public Key Infrastructure) adoption, with current statistics showing 50-60% prefix coverage but less than 25% of networks fully protected, plus discussion of emerging privacy technologies like encrypted DNS and encrypted client hello.
– **Multi-stakeholder Collaboration Models**: Emphasis on partnerships between governments, regulators, private sector, and technical communities, with examples including Smart Africa’s One African Network project spanning 11 countries and various capacity building initiatives across regions.
– **Capacity Building and Digital Skills Development**: Recognition of the need for both basic digital literacy for general users and specialized technical expertise for network operators, with organizations running hundreds of workshops and training programs to address regional-specific needs.
## Overall Purpose:
The discussion aimed to address how internet infrastructure can be prepared to support tomorrow’s digital economy, focusing on the strategic necessity of technical preparedness rather than treating it as a luxury. The session sought to explore connectivity, security, and policy frameworks needed to create robust internet ecosystems globally.
## Overall Tone:
The discussion maintained a consistently professional and collaborative tone throughout. Speakers demonstrated expertise while acknowledging challenges, and there was a strong emphasis on partnership and shared responsibility. The tone remained constructive and forward-looking, with participants sharing concrete examples and actionable recommendations. Technical difficulties with some remote participants briefly interrupted the flow but didn’t detract from the overall positive and solution-oriented atmosphere.
Speakers
– **Chafic Chaya** – Regional Manager for Public Policy and Government Affairs for the RIPE NCC for the Middle East region, Session moderator
– **Frank Stien** – Representative from Norway’s regulator (Norwegian Communication Authority, NKOM), National CERT background
– **Sofia Silva Berenguer** – Representative from the NRO (Number Resource Organization), coordinates activities of the five RIRs
– **Adiel Akplogan** – Representative from ICANN
– **Rodrigue Guiguembde** – Representative from Smart Africa
– **Zdravko Jukic** – Representative from Croatia’s regulator, currently at BEREC (Body of European Regulators for Electronic Communications), member of Cyber Security and Resilience Working Group
– **Dany Wazen** – Online moderator from Jordan, handles UNDP activities in the region
– **Vinicius Fortuna** – Works at Google Jigsaw on internet access, resilience and privacy
– **Audience** – Unidentified audience member asking questions
Additional speakers:
– **Danny Wazin** – Mentioned as online moderator colleague from Jordan (appears to be the same person as Dany Wazen, possibly different spelling)
– **Ilka** – Mentioned as session reporter
Full session report
# Preparing Internet Infrastructure for Tomorrow’s Digital Economy: A Comprehensive Discussion Report
## Executive Summary
This Day Zero session at the Internet Governance Forum brought together representatives from regulatory bodies, technical organisations, and international development agencies to examine how internet infrastructure can be prepared to support tomorrow’s digital economy. The session was moderated by Chafic Chaya and featured speakers from Norway’s telecommunications regulator (NKOM), Croatia’s regulatory authority, ICANN, the Number Resource Organisation, Smart Africa, and UNDP.
Technical connectivity issues affected several online speakers throughout the session, highlighting the practical challenges of global digital participation. Despite these difficulties, the discussion covered key themes including national regulatory approaches, cybersecurity frameworks, routing security challenges, multi-stakeholder collaboration models, and capacity building initiatives. The session concluded with concrete next steps, including a new partnership between UNDP and RIPE NCC focused on IPv6 adoption, Internet Exchange Points (IXPs), and RPKI implementation in the Arab region.
## National Regulatory Approaches
### Norway’s Infrastructure Strategy
Frank Stien from Norway’s telecommunications regulator (NKOM) presented Norway’s comprehensive approach to digital infrastructure development. He reported that Norway has achieved 99.1% household broadband coverage at speeds exceeding 100 Mbps, with 96.2% having access to gigabit speeds. The country aims for universal gigabit access by 2030, supported by 85% geographic coverage with 4G and 5G networks built on extensive fibre infrastructure.
Stien emphasized that Norway’s cybersecurity approach includes sectoral CERTs across 15 different sectors, all coordinated by the national NCSC. He noted that densely populated areas require at least three independent transmission networks to ensure critical redundancy, and highlighted how national roaming capabilities combining all operational network parts can maintain connectivity during emergencies.
### European Regulatory Coordination
Zdravko Jukic from Croatia’s regulatory authority discussed the European perspective on balancing economic efficiency with security resilience. He articulated a fundamental challenge in infrastructure planning: while regulators typically avoid duplication for economic reasons, resilience requires building connections that may only be used during emergencies—investments that are not economically justified by themselves but are essential for national security.
Jukic highlighted Croatia’s work with BEREC (Body of European Regulators for Electronic Communications), noting that the organization renamed its working group to emphasize resilience. He mentioned Croatia’s early transposition of the EU’s NIS2 directive and the use of the 5G toolbox as an example of flexible European cooperation that provides common standards while allowing national customization.
## Technical Security and Routing Challenges
### RPKI Implementation Gaps
Sofia Silva Berenguer from the Number Resource Organisation addressed critical gaps in routing security, specifically regarding RPKI (Resource Public Key Infrastructure) implementation. Despite RPKI technology being available for over a decade, she reported that while 50-60% of prefix origin pairs are covered by route origin authorizations, less than 25% of networks implement full protection.
Silva Berenguer emphasized that RPKI adds cryptographic verification to BGP announcements, providing essential protection against route hijacking. She noted that implementation gaps often exist between technical teams who understand RPKI’s importance and decision-makers who control budgets and priorities. She also promoted the MANRS initiative as a reputation-based approach to improving routing security.
### DNS Privacy Concerns
Vinicius Fortuna raised concerns about DNS privacy, emphasizing the need to promote encrypted DNS and encrypted client hello technologies. He highlighted serious privacy vulnerabilities where domain names leak in plain text even with HTTPS encryption, creating detailed profiles of user behavior that can be analyzed by AI systems.
## Multi-stakeholder Collaboration and Regional Initiatives
### Continental Approaches
Rodrigue Guiguembde from Smart Africa described the organization’s work representing 40 countries and 1.6 billion people working toward a single digital market vision. He highlighted the success of the One African Network project, which has eliminated roaming charges across 11 countries, demonstrating concrete results from multi-stakeholder collaboration.
Guiguembde emphasized that no single actor can build African digital infrastructure alone due to the complexity of challenges including connectivity gaps, regulatory fragmentation, climate imperatives, and security risks. Smart Africa’s approach includes developing sovereign and green data centers that integrate environmental standards with connectivity goals.
### Global Technical Coordination
Adiel Akplogan from ICANN emphasized that the multi-stakeholder model has been critical for DNS stability over 40 years. He provided a crucial framework for understanding implementation challenges, describing the internet as “a global network made of small independent networks that are connected and operated at the local level.”
Akplogan noted that ICANN conducts over 200 workshops annually with regional focus and ongoing operational support, recognizing that partnership approaches are necessary to reach areas that single organizations cannot cover effectively.
## Development Initiatives and Capacity Building
### UNDP Regional Programs
Danny Wazen from UNDP, participating online from Jordan and serving as online moderator, presented new initiatives addressing digital infrastructure gaps in the Arab region. He reported that 30% of the Arab region’s population—representing over 100 million people—remains unconnected to the internet.
To address this gap, UNDP announced the launch of a Digital Professional Development initiative focusing on three critical pillars: promoting IPv6 adoption, supporting Internet Exchange Points (IXPs) for sustainable connectivity, and implementing RPKI for enhanced security. This initiative includes a new partnership with RIPE NCC for awareness campaigns and capacity building specifically in the Arab region.
### Skills Development Approaches
The discussion revealed different perspectives on appropriate knowledge levels for various stakeholders. Jukic argued that the general population needs basic cybersecurity awareness rather than expert-level technical knowledge, noting that simple practices can resolve 90% of security issues for typical users.
Stien offered a complementary view, emphasizing that broad foundational knowledge combined with specialized expertise through collaboration is essential. He noted the importance of understanding internet fundamentals to identify weak links in complex systems while acknowledging that no individual can understand everything.
## Session Challenges and Q&A Highlights
### Technical Connectivity Issues
The session experienced significant technical difficulties with online speakers, including Sofia Silva Berenguer, Adiel Akplogan, and Rodrigue Guiguembde. These connectivity challenges ironically highlighted the practical importance of the infrastructure resilience being discussed, though moderator Chafic Chaya managed to maintain session flow despite the technical problems.
### Audience Engagement
During the Q&A session, audience members raised important questions about IoT infrastructure management and ensuring that digital transformation projects reach remote areas rather than concentrating on urban centers. An audience member highlighted challenges facing rural communities including poor infrastructure, high data costs, and lack of access to digital devices.
Questions were also raised about appropriate digital skills levels for different populations and the methodology for balancing economic viability for operators with national security requirements for network resilience.
## Key Outcomes and Next Steps
### Concrete Partnerships
The most significant concrete outcome was the announcement of a new partnership between UNDP and RIPE NCC focused on addressing routing security and infrastructure development in the Arab region. This partnership will focus specifically on IPv6 adoption, IXP development, and RPKI implementation through awareness campaigns and capacity building.
### Ongoing Initiatives
Smart Africa committed to continuing expansion of the One African Network beyond its current 11 countries to eliminate roaming charges across the continent. ICANN will continue its extensive workshop program with enhanced regional focus, while the promotion of MANRS and other routing security best practices will continue through regional support.
### Final Speaker Recommendations
In their concluding one-minute summaries, speakers emphasized several key priorities:
– Frank Stien stressed the importance of redundancy and resilience in critical infrastructure planning
– Zdravko Jukic highlighted the need for balanced approaches to economic efficiency and security requirements
– Sofia Silva Berenguer emphasized urgent action on routing security implementation
– Rodrigue Guiguembde called for continued multi-stakeholder collaboration at continental scale
– Danny Wazen outlined the three-pillar approach of the new UNDP initiative
## Conclusion
Despite technical connectivity challenges that affected the session flow, this discussion demonstrated both the complexity of preparing internet infrastructure for tomorrow’s digital economy and the potential for concrete multi-stakeholder collaboration. The session moved beyond problem identification to establish specific partnerships and initiatives, particularly the UNDP-RIPE NCC collaboration focused on the Arab region.
The diversity of perspectives—from national regulators implementing comprehensive frameworks to development organizations addressing digital divides—highlighted common challenges across different contexts while providing practical examples of successful approaches. The emphasis on IPv6, IXPs, and RPKI as foundational technical priorities, combined with the recognition that no single actor can address complex infrastructure challenges alone, provides a framework for continued cooperation.
The session’s practical focus on balancing economic efficiency with security resilience, regional customization of global standards, and multi-level capacity building offers concrete approaches for addressing digital infrastructure development challenges. The partnerships and initiatives established provide mechanisms for sustained progress toward resilient, inclusive internet infrastructure capable of supporting sustainable digital development globally.
Session transcript
Chafic Chaya: On behalf of RIPE NCC and our esteemed speakers, I would like to welcome you to this Day Zero session, Preparing Your Internet to Power the Digital Economy of Tomorrow. My name is Shafiq Shaya, I am the Regional Manager for Public Policy and Government Affairs for the RIPE NCC for the Middle East region, and I will be joined by my colleague Danny Wazin as online moderator from Jordan. Today this session will seek to unpack a critical but often under-emphasized question. How can we ensure that the internet infrastructure is robust enough to support the digital ambition of tomorrow? So the discussion today will be grounded in the belief that technical preparedness is not a luxury but is a strategic necessity. We will discuss connectivity, routing security, IPv6, IXPs, RPKI, collaborative policy framework, capacity building, all these issues that create a robust internet ecosystem. Without any further ado, so please let me introduce and welcome our speakers online and on-site. We have Mr. Frank Steen from Norway. We have Ms. Sofia Silva Berenguer from the NRO. We have Mr. Adiel Aplogon from ICANN. We have Mr. Rodrigue Guagamboide from Smart Africa. And we have Mr. Stravaco Stravic from Croatia. Once again, welcome and thank you for my colleague Ilka who will be the reporter of this session. So I will begin with Mr. Frank, good morning and thanks for hosting the IJF in Norway. My first question for you is how Norway today is addressing the scalability and the security of the internet infrastructure. And we know that you are coming from the regulator from Norway. So we’d like to have your insights to kick off this discussion today.
Frank Stien: Thank you Tjafik. Welcome to Norway everyone. Today we discuss a very critical topic, preparing our internet infrastructure for tomorrow’s digital economy. Norway recognizes that a robust digital infrastructure, both fixed and cellular, is crucial for leveraging emerging technologies such as artificial intelligence, the internet of things and digital services. Firstly, Norway is significantly investing in providing broadband internet to everyone. Today Norway provides at least 100 megabit per second broadband coverage to 99.1% of households with gigabit coverage reaching 96.2%. The ambition is that everyone shall have access to gigabit infrastructure by 2030. 85% of our geographic area has 4G or 5G coverage and practically all households have immediate access to 5G or 4G connectivity. Our extensive fiber optic infrastructure complemented by an aggressive 5G rollout ensures high speed. has already said that the Internet of Things is essential to all bandwidth intensive and latency sensitive applications of AI and IoT. Secondly, cyber security remains paramount. Norway’s government has enhanced regulatory frameworks including aligning with the EU’s NIST2 Directive and the new Security Act. Additionally, starting August this year, the revised Radio Equipment Directive will mandate rigorous cyber security standards for IoT devices such as smartphones, smartwatches and connected toys. Requirements should also include robust authentication, secure storage, encryption and secure update mechanisms. The forthcoming Cyber Resilience Act, the CRA, will further strengthen our cyber security landscape, ensuring resilient and trustworthy digital products. Thirdly, infrastructure resilience is key. We work in close collaboration with the major network operators to actively strengthen the transmission networks with enhanced network redundancy and ensuring multiple autonomous nationwide transmission networks. Specifically, emphasis is laid down in ensuring that densely populated areas will be served by at least three independent transmission networks, providing critical redundancy. Mobile operators are encouraged to diversify their traffic across these networks, significantly boosting reliability. Moreover, proactive spectrum management is crucial in mitigating wireless interference, particularly as IoT adoption expands and our society is increasingly becoming more dependent on it. on wireless communication services both from land and satellite. By effectively detecting and removing unauthorized devices and signal jammers, the spectrum in Norway maintains clean and dependable wireless communications. And finally, regarding AI regulation, Norway has recently defined clear responsibility among Norwegian Communication Authority, NKOM, Norwegian Digitalization Agency, Digdir and Data Protecting Authority, and this collaboration will ensure effective implementation and oversight of the AI Act, fostering responsible AI integration across sectors. So, in conclusion, Norway’s approach combining ambitious infrastructure expansion, comprehensive cybersecurity regulation and robust network resilience and clear regulatory governance for emerging technologies will position us to strongly to power tomorrow’s digital economy, driving innovation and benefit across our nation. Thank you.
Chafic Chaya: Thank you so much, Mr. Frank. Thanks for those insights and remarks. And yeah, this is a good example of how governments with the different stakeholder groups can work hands on hands. Thank you. We’ll stay with the governments and with the regulator and I’ll go to Mr. Zdravko Jukic from Croatia. So, to chain with the same subject, how can agile regulation support internet development in safeguarding the trust and resilience?
Zdravko Jukic: Yes, thanks. Can you hear me? Yes. Okay, excellent. So, you will hear now another regulatory view on this topic. I’m currently at BEREC. BEREC is the body of European regulators, so all national Regulatory authorities are represented there from the European Union, from the candidate countries and some EEA countries. So in BEREC we have several working groups, one of them is Cyber Security Working Group and we recently changed the name of this group to Cyber Security and Resilience Working Group, just to stress the importance of this issue of the resilience. Because normally when you look at the economy and competition from the regulatory point of view, you look at how to motivate market players to cooperate, not to build the double infrastructures, not to duplicate infrastructure which is the most expensive part of the networks. But when it comes to resilience, there we do exactly the opposite, we try to build some connections that should be used maybe in some emergency situation. So they are not economically, let’s say, justified by itself. So this is a really hot topic that at BEREC, Cyber Security and Resilience Working Group, we will be looking at. We have some really good examples among BEREC members, one of them is Iceland, another one is Norway, of course, who have developed some rules and what we would like to do is to develop some kind of methodology that would be really a set of recommendations on how to balance this issue of what is economically safe for operators to invest and what is safe for a country. Because there are several levels of investment. First one is the investment of the operators. They invest network to be optimally to get the return on their investment as fast as possible to earn a lot of money. And if they lose and Zdravko Jukic Jukic. The European Union is a member state. It is not possible to develop any kind of mandatory requirements or regulations at the European Union level without consensus of all member states. Also, one important point, the NIS2 directive in Croatia has been fully transposed. We were one of the first member states to do that. Also, the 5G toolbox is also a good example of this cooperation at the European level, how to develop something that each member state can apply in its national market, so that you have a solution which is flexible, which is agreed by all, and which can be modified. for national situation. One also important topic is the trusted vendor issue and there as regulatory authorities we can only help other authorities in each member state like national security agencies when they do the assessments of which equipment is safe in the national market. So I think that would be to start our panel all from my side for now. Thanks.
Chafic Chaya: Thank you so much. This is a lot to digest. We know that you are busy with all this regulation and policies and you mentioned a lot of interesting topics and issues. Balance, collaboration, agile regulation. So this will be a good start to see or to chain with other stakeholder group, the technical community, with our colleague Sophia from the number resource organization, the organization which coordinates the joint activity between the five RIRs. Sophia, you are with us. We can’t hear you. Can you speak? Still I can’t hear Sophia. So awaiting to fix this technical issue, I will stay with the technical community but with the ICANN with our colleague Mr. Adiel. So Mr. Adiel, to chain with what Mr. Frank and Mr. Zdravko Jukic mentioned now, what role does ICANN for this collaboration with governments and other stakeholders in fostering connectivity and in encouraging the agile regulation and policies. No sound, please. Control room, we can’t hear Mr. Adiel. Can you speak?
Adiel Akplogan: So, thank you again for the question. So, the short answer first is that the multi-stakeholder model is critical for sustaining for a stable, secure and resilient internet infrastructure globally. For us, we can say that because, as you know, one of the critical missions that ICANN has is to coordinate the unique identifier system globally, including the DNS. And the multi-stakeholder model has been at the center of that coordination. And the DNS has been operating for more than 40 years and it has been stable, sustainable, resilient over those years. Which shows that when we bring different parties, different actors around the table to discuss issues related to those critical infrastructures, it works. The DNS glue those identifiers together, of course, and I can, in its operation, as a facilitator and coordinator of policy related to those identifiers, and the DNS particularly, use the different constituencies it has to identify issues related to the resiliency and the security of the DNS, discuss them and translate them into policy, then that operators implement or follow voluntarily. So we’ve seen that it has helped protect that infrastructure globally. The DNS, we usually explain it or define it as a simple address book, but it’s more complex than that. And not only that, over the 40 past years, the DNS has evolved significantly, adding layer of security, privacy, addressing some abuse channels and challenges. But the multi-stakeholder approach has helped work around those issues. Being from the ITF, where new evolution of the DNS has been developed to be implemented on the base DNS to make it more secure, to add privacy to it. Being from its users’ perspective or registration perspective by tackling abuse, for instance. All those evolutions have been developed through a very wide multi-stakeholder approach. So again, it shows that bringing different parties around complex issues helps build solutions that do not disrupt. the stability of the global infrastructure. That is at the global level. But to go back to the context of the previous intervention, that approach needs also to be translated to the local level in how policies are defined locally, because the same complexities apply at the local level. Although the Internet is a global network, it’s a global network made of small independent networks that are connected and that are operated at the local level. So, applying the same multi-stakeholder approach, ensuring that different parties are impacted by the Internet in general, but its operation specifically, are around the table to think, to share ideas and to look at what are the different aspects of implementing or addressing challenges that can be seen. So we, from ICANN’s perspective, continue to promote that multi-stakeholder approach in how we address those issues, but also how we engage at the local level with different operators to ensure that the DNS and the infrastructure in general, the unique identifier operation, remain stable, secure and resilient.
Chafic Chaya: Thank you, Adiel. Thank you so much for these remarks and for highlighting the importance of the multi-stakeholder in working with governments and regulators to secure the Internet infrastructure. So, I’ll go back to Sofia. Let’s see if we have Sofia back online. Can you hear me, Sofia? Sofia? No. No, we can’t hear you. Okay, let me check online if we are okay. Danny, can you hear me? Dany, can you hear me? I believe we have a problem with our online colleagues. We can’t hear them. I will follow up and check with Mr. Rodrigue, Smart Africa, maybe we are lucky if you can say some words to check the voice. No. No. Okay. So I will go back to my esteemed colleagues here and follow up and change with some discussion with you. I go back to Mr. Frank. So we know that you are coming from the national CERT from Norway. How ECOM CERT is coordinating infrastructure security across public and private sectors?
Frank Stien: In Norway we have a bit strange solutions when it comes to CERTs with national coverage and responsibility. We have sectorial CERTs within something like the 15 most important sectors and they are all coordinated by the national NCSC, the national CERT. The reason we are doing that is that we think that the CERTs need sector specific knowledge and they also need to know the sector and also different sectors are different. So these sectorial CERTs are also very, very different. but at the same time we are cooperating the different sectorial search very closely. One advantage is that we can handle incidents and attacks on a very low level, when we don’t need to extend it outside a certain sector. So this helps with scalability. But when attacks or problems are hitting multiple sectors, they will then work together. And of course it’s also very important that the different sectorial search work together, so we’re doing that online more or less all the time. When critical incidents are happening and we need to escalate, then typically the national search will take lead and get support from these sectorial search with all their knowledge and competence about different sectors. So we think that this combination really helps us to combine the private and the public sectors as well as government, important government functions, and it really enables us to handle sophisticated threat actors and sophisticated threats. So this is how we’re doing it here.
Chafic Chaya: Perfect, thank you. And this is how it should be done in collaboration with, once again, you as a regulator, with the other stakeholder group that you are working with. Going to Croatia. The same question, but I want to just reframe it. Can you give us some examples how this works on the ground?
Zdravko Jukic: One of the examples could be, for example, the situation where you have an emergency situation. Some network is down, like there was a situation with big floods in neighboring Slovenia, I think two years back. And then it was very important to enable national roaming for all subscribers in the country, because then you can combine all the parts of the network that are still operating. And it is crucial, it can be life-saving in such situations. So I think we need to have such mechanisms for emergency situations. It is always that you have to build something for an event that happens very rarely but has a huge impact. And then we need to plan in advance and have good measures and tools to deal with that.
Chafic Chaya: Thank you. We know that the awareness can come from the end users, and then this awareness can be encouraged and can be put by the regulators. Is there any collaboration or any, let’s say, education or webinars with the Croatian population, or with the Croatian community or society?
Zdravko Jukic: Yes, indeed we have a lot of such actions in Croatia together with our partners, with the Croatian Academic Network, with the police, with the Ministry of Interior. And we give courses, really, even from HACOM, from the national regulator, regularly to schools, to primary schools, to secondary schools, and to local governments in different counties. in Croatia because as you said it is very important to to have this broad awareness and not just among experts and people working at the operators and they know it is their work it is their job but also among the general populations and the users of the of the
Chafic Chaya: electronic communications services. Thank you, I will take this and go to Sofia. Sofia, can you hear me now? I can hear you. Okay, perfect, thanks, thank you. So once again, Sofia is from the Number Resource Organization, the organization that coordinates the activities of the five RIRs and my question for Sofia is we are talking about security, about resilience, so what you can tell us on the NRO global collaboration on routing security on RPKI
Sofia Silva Berenguer: and how this works with governments? Thank you, Jafik. So I would like to start by setting the context about why it’s necessary to secure the internet routing before I can introduce what RPKI is. As Adiel mentioned, the internet is a network of networks and BGP, Border Gateway Protocol, is the protocol used by those networks to decide where to send the traffic in order for it to reach its destination and the way that networks learn where other networks are is through BGP announcements. The thing is that this protocol, BGP, was not designed with security in mind so there is a need for a layer of security to be added on top to ensure that the traffic reaches its intended destination and that all the systems in the digital economy of today that rely on the internet can still work. So RPKI, which stands for Resource Public Key Infrastructure, adds that missing BGP piece of security and it does that by allowing that prefix holders issue cryptographically verifiable statements on the route intentions and then that information can be used by the routers that receive BGP announcements to verify whether those announcements are legitimate. And so this allows to stop routing issues and stop that routing is redirected or intercepted. RPKI was standardized more than 10 years ago and it is available through each RIR region in the world. However, many organizations have yet to adopt and deploy this technology. A few weeks ago when I checked statistics around 50 to 60 percent of the unique prefix origin pairs were covered by route origin authorizations that are the objects in RPKI used to for establishing that route intention on the origin of routes. And then the other side of things that is using that information to verify BGP announcements is what we call route origin validation and the statistic as of a few weeks ago was that less than 25 percent of those networks in the internet that we call autonomous systems less than 25 percent were fully protected by route origin validation. So as you can see there’s still room for more adoption of the technology to achieve maximum benefit of it and adoption can be encouraged in different ways. Through support, through reputation based approaches like for example the MANRS initiative some people may have heard of through regulation based approaches like the White House’s roadmap to enhancing routing security. In particular the RIRs are supporting adoption through providing training, technical support and resources. Sofia Berenguer, David Huberman, Rodrigue Guiguembde, Zdravko Jukic Jukic
Chafic Chaya: Sofia Berenguer, David Huberman, Rodrigue Guiguembde, Zdravko Jukic Jukic Sofia Berenguer, David Huberman, Rodrigue Guiguembde, Zdravko Jukic Jukic
Rodrigue Guiguembde: Yes, thank you very much. And thank you so much for this question. Sorry about this disconnection earlier. I think at Smart Africa, we believe that the multi-stakeholder partnership, the foundation for this inclusive digital development in Africa, we trust on it. And the alliance currently brings, as you know, 40 countries, 40 member states, representing 1.6 billion people. 1 billion African citizens, all committing on the same vision to create a single digital market. One of the flagship we have currently I wanted to sort out here is the One African Network. It’s a project which currently includes 11 countries and this initiative is still ongoing. And this initiative aims to eliminate roaming, charge and promote cross-border interconnection. It’s jointly developed by regulator, ministries, telcos and regional economic communities. So this is a real good model on this multi-stakeholder approach. It’s an example on that. We are also developing a program for a sovereign data center and green data center. This is another one we can give in terms of example. Building partnership with private and public sectors and designed to meet environmental standards. These projects of course integrate technical, economical, legal and climate resilience consideration which are crucial for Africa data sovereignty. So this is another example. All this one is just to tell you that we are putting in the center this multi-stakeholder approach. And of course currently for the internet governance parts, because the internet is the base of everything, we are trying to launch initiatives called CAIGA, the Council of Internet Governance Authorities. This council we start to build it since 2024. This is a unique mechanism. We wanted to bring the government, regulators, academia, technical experts and civil society to sort of and to make some action for the
Chafic Chaya: Thank you so much, these are great examples and I will come back to you to ask you about how we can balance between the different levels of advancement in the African countries. But I’ll go to my colleague Danny online. So once again, for our audience on site and online, if you would like to ask any question, please put your question in the chat room or just raise your hand. At the end, we’ll have a Q&A session and we’ll be happy to answer your questions. So Danny, any comments, anything we have online? And I’ll leave it for you. I know that you are handling the UNDP activities in the region and you have announcement or you can share with us your plans that’s related to what we are talking about in this session. For you, Danny.
Dany Wazen: Thank you very much, Shafiq, and it’s a pleasure to be on this very esteemed and very important panel to discuss this topic. I see online we have two insights and one question, which is really important, the first insight brought by Timothy and could be a question to the panel. So asking about would it be good if there is an infrastructure to ensure the communication of the IOTs? So to be able to be managed by the owner of the IOTs itself, it could be great if we can have this option. And another question, which is very much related, what are What are the needed digital skills and what are the essential digital skills in the internet-driven future? So we’re talking about all these perspectives and dimensions on how connectivity can prepare for the future. So what are the skills?
Chafic Chaya: Gentlemen, anyone want to take these questions before I give the floor back to Danny?
Frank Stien: Well, I can start with the last one about the skills. I think we will always need people with broad knowledge. My experience from cyber security, as you already know, it’s important to understand the fundamentals because the internet is really complex and in order to find weak links, when you’re putting up a stable, scalable system, is really to understand how this works. But at the same time, no one will ever be able to understand everything. So I think to have specialists in different areas and make those experts working together will always be very, very important and probably more important than actually a few people knowing very much.
Chafic Chaya: Mr. Zdravko Jukic, please.
Zdravko Jukic: Okay, thanks. Just to continue on this line, so I think not everybody has to be really a cyber security expert and know all the techniques and how to hack computers and systems, but what is needed for the general population, for general users, to know some basics. because what problems we face in Croatia and other European member states and I guess everywhere in the world that people receive simple short message like the old short message service and then the message says this is very important that you type in your credit card number and they do it so some basics should be applied and everybody should understand what it means then we will resolve I don’t know maybe 90% of the cases if a very advanced hacker comes into your system by some backdoor that is another issue that is the issue of this company if they have all the methodologies and all the rules in place if they are taking their business seriously because it can happen we will never have absolute security in any corporation in any company but we have to do our best and try to mitigate as much as we can
Chafic Chaya: well stated I think Adel I can do a lot in capacity building so maybe you can share something on this
Adiel Akplogan: yeah definitely we are pretty much engaged on capacity building I just want to mention as well that there are two challenges in capacity building there is one about the usage of the internet that is a more broader capacity and awareness that is needed for users to know that the same questions that they apply in their real life is also something important to bring into the virtual world because it’s not always clear in the mind of the people that capacity needs to be reinforced and the second is the operational part the operating the network making sure that people who operate the network also develop and gradually increase particularly coming from developing and emerging nation beef up their knowledge and expertise on this complex technology in operation so that to be able It is possible to have security and resilience in mind when operating and designing the network. From ICANN’s perspective, we put a lot of emphasis on that. Last year we have run more than 200 workshop and capacity building activities on technical implementation of best practices around the DNS particularly for registry. It is something that we continue doing and we don’t do it at the global level only. We try to bring in a regional flavor to it because we know that the needs are not the same across all the regions, all the countries, the challenges are not the same. So we try to translate our engagement to focus on the need that we see in each region, in each country. And what we have seen bringing more and more positive effort is to beyond the capacity building also providing support to those who are particularly operating those infrastructures that we think are critical for the overall stability to support them throughout their navigation of implementing those best practices. So it’s key to bridge that gap, but it’s also important to us to take it from different angles, local and user and global.
Chafic Chaya: Thank you. You mentioned a lot of interesting, let’s say, words, regional flavor, local capacity building. I go back to Danny with the UNDP and your initiative, which is the main pillar in your initiative that UNDP is now leading, is capacity building and infrastructure development. Can you give us just some or sum up what you are doing and how you are dealing with what Adil said, regional flavor? Yes, thank you very much. I think we may need a very interesting insight. So in UNDP, we have in the Arab region, we have launched recently a new initiative called Digital Professional Development. And as its name says, it’s how we can harness the power of digitalization to advance the SDGs agenda and the different countries and to accelerate the achievement of the goals. And what is it about? It’s a network of partners with convening partners from government, private sector, public sector, NGOs, academia, experts to come together, brainstorm and put and develop together impactful projects for the Arab region. And under each goal, like what can we do on digitalization? And the connectivity and infrastructure is really a delaying foundation for any digital transformation, we can build the most advanced solutions, but without a secure, safe, inclusive connectivity, we cannot advance. And if we look into our region, the Arab region is one of the least connected among the other regions in the world. And 30% of the Arab region, which means more than 100 million are not connected to the internet. And in order to advance this, we have recently launched two initiatives. One of them we are planning now with RIPE NCC as a partnership. So basically, the initiative is about connectivity for digital inclusion and to address these challenges. We wanted to work on bipartite access. The first one is related to scalability, which means scalable connectivity in order to be more inclusive. Second is allow sustainability for this connectivity through a different approach, and thirdly, is a safe and secure connectivity. For the Pillar 1, we want to promote the adoption of IPv6 with the mobile telecom operator and other internet providers in the countries by conducting awareness capacity building and support the transition of this toward the IPv6. On the second pillar, in terms of sustainability, we want to promote, as we heard from our colleague on the panel, the IXPs and the role of this internet exchange points in order to provide less or lower cost, but also reduce the dependence on international links and make further connectivity, and we are planning to support countries as models in the region between UNDP and RIPAC. And finally, the RPKI, as we’ve heard, the security, which is very much important, and we’re looking through this initiative to engage further with more partners on launching awareness campaigns and doing the capacity building for the security of the connectivity. So basically, this is a project that literally will be impactful for the region to increase the connectivity. Another entry point that we are working on for the connectivity and inclusion, digital inclusion, is a new framework, regulatory framework, that we are designing with different partners, the GSMA, Orido Mobile Telecom Operator, and others. It’s basically how we can give countries a legal framework, digital policies framework, that can support the country advancing on their digital economy by investing or designing policies and regulations for the connectivity and for the data centers and using also the data and AI. So basically these are like two main or two key interventions that we are planning into the Arab region and definitely we’re looking to engage further with partners in order to implement it in different contexts. Thank you Danny, thank you so much for this insight. Yes just I want to highlight here that there are some countries in the Middle East and African region that they don’t have yet the basic infrastructure. While here we are discussing AI and Internet of Things and the cloud computing, we still have countries without basic infrastructure and that’s why we are working with the UNDP to just make these countries join the developing countries. So we still have 10 minutes, I see that we have a question but I will give for each speaker one minute to just recap and give me one priority based on the discussion that we have during this session. So Mr. Frank your final remark for one minute please.
Frank Stien: Yes I probably should say something about regulation but my heart is in cyber security. So I think we have addressed for a couple of years the need for intelligence and information sharing among peers and among people across borders and I think we have a way to go in that field. It’s improving, everything goes better but I think I think still there is lots of work to do to cooperate and share information and intelligence, so that would be my point.
Chafic Chaya: Thank you. Mr. Radiel?
Adiel Akplogan: Yeah, I think I will highlight the fact that having a multi-stakeholder approach, bringing different parties around the table to discuss this complex issue, are important. Not only at the global level, and I will put the emphasis on that, we need to translate those into regional and local level in designing each aspect of regulation or technical design that will impact the global stability of the Internet. Capacity building is key. Best practices are also very important. Framing them in a way that people can actually implement them is another key. Sophia mentioned manners. There is also another one for the DNS, which is kindness, which tries to bring those best practices in the framework that can easily be implemented, that will help small operators that don’t have the same resources as a bigger one to look at everything and decide what to do. They can have a simple and easy entry point. The third point I want to highlight is the partnership. Beyond the multi-stakeholder approach, partnership between different players is key in helping advance those. We hear about the UNDP and the RIPE NCC partnership. ICANN has the Coalition for Digital Africa, which is also a very broad framework for partnership for the Africa region. Our partnership with UNESCO and IDN and so on and so forth are a way to actually mutualize our resources to make sure that what we are preaching and what we are advancing reaches an area that one organization alone cannot reach. Let’s continue strengthening this multi-stakeholder approach, and I think we will all contribute to a stable, resilient and stable Internet globally.
Chafic Chaya: Thank you so much. I believe we will have some takeaways from what you said now, but I will give the mic to Mr. Zdravko Jukic.
Zdravko Jukic: Yes, from our discussions it seems like this education for general population and users and capacity building for everyone seems to be very, very important. For us regulators, I would like to stress again, we will be very busy now in the coming days and months with this resilience issue and how to build more resilient networks, how to develop this, what I mentioned, methodology which will enable all national regulators to apply some rules to have more resilient, redundant networks in the end. And also what we can expect, some more discussions at the European level on the issue of trusted vendors, something similar to what we had with the 5G toolbox. So development of some technical and strategic measures, agreeing those measures at the union level, and then each member state would apply them according to the national situations and national judgments and geopolitical situation. So I think that’s all. Thanks.
Chafic Chaya: Thank you. So it’s a collaboration between stakeholders and regulators and collaboration amongst regulators themselves. Sofia, I’ll give you the one minute for you.
Sofia Silva Berenguer: Thank you. I guess from my side, what I would suggest prioritizing is the implementation of best practices. For example, in the space of routing security, to join a program like MANUS, to engage with the RIR for your region and seek support. Also, there’s lots of good documents in the space of IETF documenting best practices. We call them BCP, best common practice documents, because what we’ve heard is that sometimes, although technical people may be very convinced of the importance of technologies like RPKI, it’s hard to convince non-technical decision makers or even commercial sectors, commercial areas within some organizations, because the benefits may not be evident, may not be immediate. So, there is a need, and as the other panelists mentioned, for more capacity building, for more awareness raising. So, yeah, any efforts in that space that will help bridge that gap between very technical content and not so technical content that will allow decision makers to understand the importance of implementing best practices.
Chafic Chaya: Thank you, Sofia. Mr. Rodrigue?
Rodrigue Guiguembde: Yes, thank you very much. We have a lot of things to say, but last year we didn’t. Okay, one minute, sorry. I think that as we are looking for the future, one thing is clear, I think. No single actor can build African digital infrastructure alone. The complexity of the challenge we are facing, connectivity gaps, regulatory fragmentation, climate imperative, and endless risk, require a united, agile, and inclusive approach. This is very important. At Smart Africa, we are committed to turning vision into action by aligning government, the private sector, developing partners, and communities around concrete, high-impact solutions. Whether it is true, it could be true on African networks or in data centers. as I already said, and Armonized Spectrum challenges. We see these partners, not, we see the partnership, sorry, the code, sorry. Yes, we see this partnership not as a choice but a necessity, this is very important. So finally, if we want to prepare our infrastructure for this demand of tomorrow digital economy, we must invest not only in fiber and data centers but also in trust coordination and local capacity. Let’s move forward together with ambition and with purpose. Thank you very much.
Chafic Chaya: Thank you for these words, we’ll keep it in mind. Sorry for keeping you waiting, we have one question in the room, please go ahead. Please, can you introduce yourself? Hello, hello. Can you hear me? Yes, go ahead.
Vinicius Fortuna: My name is Vinicius Fortuna, I actually work at Google Jigsaw on internet access, resilience and privacy. And currently, when you use, even when you use a HTTPS, encrypted HTTP, like your domain name goes in plain text and it leaks. And that’s like with the advancement of AI, that’s becoming a very serious threat. I actually ran an experiment analyzing my own domain names and put it on LLM and create a profile about me and it’s scary, like you can tell the person’s employer, the health conditions, political associations, religion, sexual preferences and gender and all sorts of things. So, and there are two technologies to solve this, like encrypted DNS and encrypted client hello. So I’m wondering like what your organizations can do to help promote an adoption of these technologies by online services or the internet service.
Chafic Chaya: Thank you so much. As we don’t have any more time, I believe we’ll take this after the session ends and I’ll be here with my colleagues to answer your question. But I see another question, please go ahead, for 30 seconds please. But be sure that we’ll answer your questions after the session.
Audience: So, my question is basically going straight to you, NDP and Smart Africa. I was following with a very keen interest, more especially on the projects that are underway to bridge the digital divide, especially in the remote areas. Now, most of the projects, when they are being scaled, they are being done in the urban areas. So, I would really want to find out what are the policies or the laws that you have put in place to make sure that when you are scaling these things about the projects to do with digital transformation, you are channeling these initiatives to reach to the people that are living in the remote areas, because these are the people that are suffering from the poor infrastructure when it comes to internet. At the same time, even the data cost is very costly, which they cannot manage to access. And at the same time, they are also having the issue to do with the digital gadgets. So, that’s my question that I really want to get an answer. Thank you so much.
Chafic Chaya: Thank you so much. I’ll, once again, I will be here with our panelists to answer your question and I’ll be sure to give you the contact of my colleague Danny Wesson, so you can be in direct contact with him. Once again, thanks again for everyone, for our audience in the room, for our audience online, for our speakers. It was a really interesting discussion. We will have some takeaway and some recommendation, but just to summarize, collaboration, partnership, IPv6, RPKI, MANRS, the NSSEC should be in the public infrastructure plan, and the last one is long term investment in capacity building. Once again, thank you so much, and I believe I’m on time. Thank you. Thank you.
Frank Stien
Speech speed
106 words per minute
Speech length
882 words
Speech time
496 seconds
Norway provides 99.1% broadband coverage at 100+ Mbps with goal of gigabit access for all by 2030
Explanation
Norway has achieved extensive broadband coverage with high-speed internet access for nearly all households. The country has set an ambitious target to provide gigabit infrastructure to everyone by 2030, demonstrating significant investment in digital infrastructure.
Evidence
Today Norway provides at least 100 megabit per second broadband coverage to 99.1% of households with gigabit coverage reaching 96.2%
Major discussion point
Infrastructure Development and Investment
Topics
Infrastructure | Development
85% of Norway’s geographic area has 4G/5G coverage with extensive fiber infrastructure
Explanation
Norway has achieved comprehensive mobile network coverage across most of its territory, complemented by robust fiber optic infrastructure. This combination ensures high-speed connectivity for bandwidth-intensive and latency-sensitive applications including AI and IoT.
Evidence
85% of our geographic area has 4G or 5G coverage and practically all households have immediate access to 5G or 4G connectivity. Our extensive fiber optic infrastructure complemented by an aggressive 5G rollout ensures high speed
Major discussion point
Infrastructure Development and Investment
Topics
Infrastructure | Development
Norway implements sectorial CERTs across 15 sectors coordinated by national NCSC for specialized threat response
Explanation
Norway has established a unique cybersecurity structure with specialized Computer Emergency Response Teams for different sectors, all coordinated by the national CERT. This approach allows for sector-specific knowledge and expertise while maintaining coordination for cross-sector incidents.
Evidence
We have sectorial CERTs within something like the 15 most important sectors and they are all coordinated by the national NCSC, the national CERT. The reason we are doing that is that we think that the CERTs need sector specific knowledge
Major discussion point
Cybersecurity and Network Resilience
Topics
Cybersecurity | Infrastructure
Disagreed with
– Zdravko Jukic
Disagreed on
Approach to cybersecurity organizational structure
Enhanced regulatory frameworks including EU NIST2 Directive and new Security Act strengthen cybersecurity landscape
Explanation
Norway has implemented comprehensive cybersecurity regulations aligned with EU standards, including new requirements for IoT devices. These frameworks mandate security features like authentication, encryption, and secure update mechanisms for connected devices.
Evidence
Norway’s government has enhanced regulatory frameworks including aligning with the EU’s NIST2 Directive and the new Security Act. Additionally, starting August this year, the revised Radio Equipment Directive will mandate rigorous cyber security standards for IoT devices
Major discussion point
Cybersecurity and Network Resilience
Topics
Cybersecurity | Legal and regulatory
Agreed with
– Adiel Akplogan
– Rodrigue Guiguembde
– Zdravko Jukic
Agreed on
Multi-stakeholder collaboration is essential for internet infrastructure development and governance
Densely populated areas require at least three independent transmission networks for critical redundancy
Explanation
Norway emphasizes infrastructure resilience by requiring multiple independent transmission networks in populated areas. This redundancy ensures continued connectivity even if one or two networks fail, with mobile operators encouraged to diversify traffic across these networks.
Evidence
Specifically, emphasis is laid down in ensuring that densely populated areas will be served by at least three independent transmission networks, providing critical redundancy. Mobile operators are encouraged to diversify their traffic across these networks
Major discussion point
Cybersecurity and Network Resilience
Topics
Infrastructure | Cybersecurity
Agreed with
– Zdravko Jukic
Agreed on
Network resilience and redundancy are fundamental for critical infrastructure
Norway defined clear AI regulation responsibilities among multiple agencies for effective oversight
Explanation
Norway has established a collaborative governance structure for AI regulation by clearly defining roles among different agencies. This multi-agency approach ensures comprehensive oversight and effective implementation of AI regulations across various sectors.
Evidence
Norway has recently defined clear responsibility among Norwegian Communication Authority, NKOM, Norwegian Digitalization Agency, Digdir and Data Protecting Authority, and this collaboration will ensure effective implementation and oversight of the AI Act
Major discussion point
Regulatory Frameworks and Policy Development
Topics
Legal and regulatory | Infrastructure
Broad foundational knowledge combined with specialized expertise through collaboration is essential
Explanation
Frank argues that while broad understanding of internet fundamentals is crucial for identifying vulnerabilities, no single person can master everything. The key is having specialists in different areas working together collaboratively.
Evidence
My experience from cyber security, as you already know, it’s important to understand the fundamentals because the internet is really complex and in order to find weak links, when you’re putting up a stable, scalable system, is really to understand how this works. But at the same time, no one will ever be able to understand everything
Major discussion point
Capacity Building and Digital Skills
Topics
Development | Cybersecurity
Agreed with
– Adiel Akplogan
– Zdravko Jukic
– Sofia Silva Berenguer
Agreed on
Capacity building and digital skills development are critical priorities
Disagreed with
– Zdravko Jukic
Disagreed on
Level of technical knowledge required for general population
Rodrigue Guiguembde
Speech speed
124 words per minute
Speech length
494 words
Speech time
237 seconds
Smart Africa’s One African Network project eliminates roaming charges across 11 countries through multi-stakeholder collaboration
Explanation
Smart Africa has developed a flagship project that removes roaming charges and promotes cross-border interconnection across 11 African countries. This initiative demonstrates effective multi-stakeholder collaboration involving regulators, ministries, telecommunications companies, and regional economic communities.
Evidence
One of the flagship we have currently I wanted to sort out here is the One African Network. It’s a project which currently includes 11 countries and this initiative is still ongoing. And this initiative aims to eliminate roaming, charge and promote cross-border interconnection. It’s jointly developed by regulator, ministries, telcos and regional economic communities
Major discussion point
Infrastructure Development and Investment
Topics
Infrastructure | Development | Economic
Smart Africa represents 40 countries and 1.6 billion people working toward single digital market vision
Explanation
Smart Africa operates as a continental alliance bringing together 40 member states representing a massive population with a unified vision. The organization aims to create a single digital market across Africa, demonstrating the scale and ambition of pan-African digital cooperation.
Evidence
And the alliance currently brings, as you know, 40 countries, 40 member states, representing 1.6 billion people. 1 billion African citizens, all committing on the same vision to create a single digital market
Major discussion point
Multi-stakeholder Governance and Collaboration
Topics
Development | Economic | Infrastructure
No single actor can build African digital infrastructure alone due to complexity of challenges
Explanation
Rodrigue emphasizes that the challenges facing African digital infrastructure are too complex for any single organization to address independently. Issues like connectivity gaps, regulatory fragmentation, climate concerns, and security risks require coordinated efforts from multiple stakeholders.
Evidence
No single actor can build African digital infrastructure alone. The complexity of the challenge we are facing, connectivity gaps, regulatory fragmentation, climate imperative, and endless risk, require a united, agile, and inclusive approach
Major discussion point
Multi-stakeholder Governance and Collaboration
Topics
Development | Infrastructure | Legal and regulatory
Agreed with
– Adiel Akplogan
– Frank Stien
– Zdravko Jukic
Agreed on
Multi-stakeholder collaboration is essential for internet infrastructure development and governance
Smart Africa developing sovereign and green data centers integrating environmental standards
Explanation
Smart Africa is working on data center projects that address both data sovereignty and environmental concerns. These initiatives involve partnerships between public and private sectors and are designed to meet environmental standards while supporting Africa’s digital infrastructure needs.
Evidence
We are also developing a program for a sovereign data center and green data center. This is another one we can give in terms of example. Building partnership with private and public sectors and designed to meet environmental standards
Major discussion point
Technical Standards and Best Practices
Topics
Infrastructure | Development | Economic
Zdravko Jukic
Speech speed
128 words per minute
Speech length
1066 words
Speech time
496 seconds
BEREC renamed working group to emphasize resilience, balancing economic efficiency with redundancy requirements
Explanation
BEREC has shifted focus to include resilience alongside cybersecurity, recognizing the need to balance economic considerations with security requirements. This represents a challenge as resilience often requires investments that may not be economically justified but are necessary for national security.
Evidence
We recently changed the name of this group to Cyber Security and Resilience Working Group, just to stress the importance of this issue of the resilience. Because normally when you look at the economy and competition from the regulatory point of view, you look at how to motivate market players to cooperate, not to build the double infrastructures, not to duplicate infrastructure which is the most expensive part of the networks. But when it comes to resilience, there we do exactly the opposite
Major discussion point
Cybersecurity and Network Resilience
Topics
Cybersecurity | Legal and regulatory | Infrastructure
Disagreed with
– Frank Stien
Disagreed on
Approach to cybersecurity organizational structure
Croatia fully transposed NIS2 directive and uses 5G toolbox as example of flexible European cooperation
Explanation
Croatia has successfully implemented EU cybersecurity directives and demonstrates how European cooperation can work effectively. The 5G toolbox serves as a model for developing flexible solutions that can be adapted to national circumstances while maintaining EU-wide coordination.
Evidence
The NIS2 directive in Croatia has been fully transposed. We were one of the first member states to do that. Also, the 5G toolbox is also a good example of this cooperation at the European level, how to develop something that each member state can apply in its national market, so that you have a solution which is flexible, which is agreed by all, and which can be modified for national situation
Major discussion point
Regulatory Frameworks and Policy Development
Topics
Legal and regulatory | Cybersecurity | Infrastructure
Agreed with
– Adiel Akplogan
– Rodrigue Guiguembde
– Frank Stien
Agreed on
Multi-stakeholder collaboration is essential for internet infrastructure development and governance
Trusted vendor assessments require collaboration between regulatory authorities and national security agencies
Explanation
Zdravko explains that regulatory authorities have a supporting role in trusted vendor assessments, working alongside national security agencies. This collaborative approach ensures that equipment safety evaluations consider both regulatory and security perspectives.
Evidence
One also important topic is the trusted vendor issue and there as regulatory authorities we can only help other authorities in each member state like national security agencies when they do the assessments of which equipment is safe in the national market
Major discussion point
Regulatory Frameworks and Policy Development
Topics
Legal and regulatory | Cybersecurity | Infrastructure
Emergency situations like floods require national roaming capabilities combining all operational network parts
Explanation
Zdravko provides a practical example of network resilience during natural disasters, where national roaming becomes critical for maintaining communications. This demonstrates how regulatory frameworks must prepare for rare but high-impact events that can be life-saving.
Evidence
One of the examples could be, for example, the situation where you have an emergency situation. Some network is down, like there was a situation with big floods in neighboring Slovenia, I think two years back. And then it was very important to enable national roaming for all subscribers in the country, because then you can combine all the parts of the network that are still operating. And it is crucial, it can be life-saving in such situations
Major discussion point
Cybersecurity and Network Resilience
Topics
Infrastructure | Cybersecurity | Development
Agreed with
– Frank Stien
Agreed on
Network resilience and redundancy are fundamental for critical infrastructure
General population needs basic cybersecurity awareness rather than expert-level technical knowledge
Explanation
Zdravko argues that widespread cybersecurity education should focus on basic awareness for the general public rather than technical expertise. Simple knowledge about common threats like phishing can prevent the majority of security incidents.
Evidence
I think not everybody has to be really a cyber security expert and know all the techniques and how to hack computers and systems, but what is needed for the general population, for general users, to know some basics. because what problems we face in Croatia and other European member states and I guess everywhere in the world that people receive simple short message like the old short message service and then the message says this is very important that you type in your credit card number and they do it so some basics should be applied and everybody should understand what it means then we will resolve I don’t know maybe 90% of the cases
Major discussion point
Capacity Building and Digital Skills
Topics
Development | Cybersecurity | Sociocultural
Agreed with
– Frank Stien
– Adiel Akplogan
– Sofia Silva Berenguer
Agreed on
Capacity building and digital skills development are critical priorities
Disagreed with
– Frank Stien
Disagreed on
Level of technical knowledge required for general population
Sofia Silva Berenguer
Speech speed
137 words per minute
Speech length
595 words
Speech time
258 seconds
RPKI adds cryptographic verification to BGP announcements but adoption remains low at 25% for route origin validation
Explanation
Sofia explains that RPKI provides essential security for internet routing by allowing cryptographic verification of route announcements. However, despite being available for over 10 years, adoption rates remain concerning with less than 25% of networks implementing full protection.
Evidence
A few weeks ago when I checked statistics around 50 to 60 percent of the unique prefix origin pairs were covered by route origin authorizations that are the objects in RPKI used to for establishing that route intention on the origin of routes. And then the other side of things that is using that information to verify BGP announcements is what we call route origin validation and the statistic as of a few weeks ago was that less than 25 percent of those networks in the internet that we call autonomous systems less than 25 percent were fully protected by route origin validation
Major discussion point
Routing Security and RPKI Implementation
Topics
Infrastructure | Cybersecurity
Agreed with
– Dany Wazen
– Chafic Chaya
Agreed on
RPKI adoption is crucial but remains insufficient globally
50-60% of prefix origin pairs covered by route origin authorizations, showing room for improvement
Explanation
While there has been progress in RPKI deployment with over half of prefix origin pairs now covered by route origin authorizations, Sofia indicates there is still significant room for improvement. This partial adoption limits the overall security benefits of the technology.
Evidence
A few weeks ago when I checked statistics around 50 to 60 percent of the unique prefix origin pairs were covered by route origin authorizations
Major discussion point
Routing Security and RPKI Implementation
Topics
Infrastructure | Cybersecurity
Implementation of best practices requires bridging gap between technical and non-technical decision makers
Explanation
Sofia identifies a key challenge in cybersecurity adoption: the difficulty of convincing non-technical decision makers about the importance of technologies like RPKI. The benefits may not be immediately evident or commercially obvious, requiring better communication and awareness efforts.
Evidence
Although technical people may be very convinced of the importance of technologies like RPKI, it’s hard to convince non-technical decision makers or even commercial sectors, commercial areas within some organizations, because the benefits may not be evident, may not be immediate. So, there is a need, and as the other panelists mentioned, for more capacity building, for more awareness raising
Major discussion point
Technical Standards and Best Practices
Topics
Development | Infrastructure | Cybersecurity
Agreed with
– Frank Stien
– Adiel Akplogan
– Zdravko Jukic
Agreed on
Capacity building and digital skills development are critical priorities
Adiel Akplogan
Speech speed
123 words per minute
Speech length
1089 words
Speech time
530 seconds
Multi-stakeholder model critical for DNS stability over 40 years, bringing different parties together for policy development
Explanation
Adiel argues that the multi-stakeholder approach has been fundamental to the DNS’s success and stability over four decades. This model brings together diverse stakeholders to discuss complex infrastructure issues and translate them into implementable policies.
Evidence
The multi-stakeholder model has been at the center of that coordination. And the DNS has been operating for more than 40 years and it has been stable, sustainable, resilient over those years. Which shows that when we bring different parties, different actors around the table to discuss issues related to those critical infrastructures, it works
Major discussion point
Multi-stakeholder Governance and Collaboration
Topics
Infrastructure | Legal and regulatory | Development
Agreed with
– Rodrigue Guiguembde
– Frank Stien
– Zdravko Jukic
Agreed on
Multi-stakeholder collaboration is essential for internet infrastructure development and governance
Local implementation of multi-stakeholder approach needed since internet is global network of local operations
Explanation
While the internet is global, Adiel emphasizes that it consists of many small independent networks operated locally. Therefore, the multi-stakeholder approach must be applied at local levels to address the specific challenges and needs of different regions and countries.
Evidence
Although the Internet is a global network, it’s a global network made of small independent networks that are connected and that are operated at the local level. So, applying the same multi-stakeholder approach, ensuring that different parties are impacted by the Internet in general, but its operation specifically, are around the table to think, to share ideas and to look at what are the different aspects of implementing or addressing challenges that can be seen
Major discussion point
Multi-stakeholder Governance and Collaboration
Topics
Infrastructure | Legal and regulatory | Development
ICANN conducted 200+ workshops focusing on regional needs and providing ongoing operational support
Explanation
ICANN has implemented extensive capacity building efforts with over 200 workshops annually, emphasizing regional customization. The organization recognizes that different regions have different needs and challenges, requiring tailored approaches to capacity building.
Evidence
Last year we have run more than 200 workshop and capacity building activities on technical implementation of best practices around the DNS particularly for registry. It is something that we continue doing and we don’t do it at the global level only. We try to bring in a regional flavor to it because we know that the needs are not the same across all the regions, all the countries, the challenges are not the same
Major discussion point
Capacity Building and Digital Skills
Topics
Development | Infrastructure | Sociocultural
Agreed with
– Frank Stien
– Zdravko Jukic
– Sofia Silva Berenguer
Agreed on
Capacity building and digital skills development are critical priorities
Partnership approach necessary to reach areas single organizations cannot cover effectively
Explanation
Adiel emphasizes that partnerships between different organizations are essential for maximizing reach and impact. Single organizations have limited resources and scope, but through partnerships, they can mutualize resources and extend their influence to areas they couldn’t reach alone.
Evidence
Our partnership with UNESCO and IDN and so on and so forth are a way to actually mutualize our resources to make sure that what we are preaching and what we are advancing reaches an area that one organization alone cannot reach
Major discussion point
Multi-stakeholder Governance and Collaboration
Topics
Development | Infrastructure | Legal and regulatory
Dany Wazen
Speech speed
140 words per minute
Speech length
143 words
Speech time
61 seconds
30% of Arab region population (100+ million people) lacks internet connectivity, requiring scalable solutions
Explanation
Dany highlights a significant digital divide in the Arab region where over 100 million people remain unconnected to the internet. This represents 30% of the regional population and demonstrates the urgent need for inclusive connectivity solutions.
Evidence
And if we look into our region, the Arab region is one of the least connected among the other regions in the world. And 30% of the Arab region, which means more than 100 million are not connected to the internet
Major discussion point
Infrastructure Development and Investment
Topics
Development | Infrastructure | Digital access
UNDP launching Digital Professional Development initiative focusing on IPv6 adoption and IXP promotion
Explanation
UNDP has launched a comprehensive digital development initiative targeting three key areas: scalable connectivity through IPv6 adoption, sustainable connectivity through Internet Exchange Points, and secure connectivity through RPKI implementation. This initiative involves partnerships with organizations like RIPE NCC.
Evidence
We have recently launched two initiatives. One of them we are planning now with RIPE NCC as a partnership. So basically, the initiative is about connectivity for digital inclusion and to address these challenges. We wanted to work on bipartite access. The first one is related to scalability, which means scalable connectivity in order to be more inclusive. Second is allow sustainability for this connectivity through a different approach, and thirdly, is a safe and secure connectivity
Major discussion point
Infrastructure Development and Investment
Topics
Development | Infrastructure | Economic
UNDP partnership with RIPE NCC promotes RPKI adoption through awareness campaigns and capacity building
Explanation
As part of the broader digital inclusion initiative, UNDP is specifically working with RIPE NCC to promote routing security through RPKI implementation. This involves conducting awareness campaigns and capacity building activities to improve internet security in the region.
Evidence
And finally, the RPKI, as we’ve heard, the security, which is very much important, and we’re looking through this initiative to engage further with more partners on launching awareness campaigns and doing the capacity building for the security of the connectivity
Major discussion point
Routing Security and RPKI Implementation
Topics
Development | Cybersecurity | Infrastructure
Agreed with
– Sofia Silva Berenguer
– Chafic Chaya
Agreed on
RPKI adoption is crucial but remains insufficient globally
UNDP developing regulatory framework with GSMA for digital policies supporting connectivity and data centers
Explanation
UNDP is creating a comprehensive regulatory framework in partnership with GSMA and mobile operators to help countries develop digital economy policies. This framework covers connectivity, data centers, and data/AI usage policies to support national digital transformation efforts.
Evidence
Another entry point that we are working on for the connectivity and inclusion, digital inclusion, is a new framework, regulatory framework, that we are designing with different partners, the GSMA, Orido Mobile Telecom Operator, and others. It’s basically how we can give countries a legal framework, digital policies framework, that can support the country advancing on their digital economy by investing or designing policies and regulations for the connectivity and for the data centers and using also the data and AI
Major discussion point
Regulatory Frameworks and Policy Development
Topics
Legal and regulatory | Development | Economic
Vinicius Fortuna
Speech speed
132 words per minute
Speech length
141 words
Speech time
63 seconds
DNS privacy concerns with encrypted DNS and encrypted client hello technologies need promotion
Explanation
Vinicius raises concerns about privacy leakage through unencrypted domain names, even when using HTTPS. He demonstrates how AI can analyze domain name patterns to create detailed personal profiles, highlighting the need for encrypted DNS and encrypted client hello technologies.
Evidence
Currently, when you use, even when you use a HTTPS, encrypted HTTP, like your domain name goes in plain text and it leaks. And that’s like with the advancement of AI, that’s becoming a very serious threat. I actually ran an experiment analyzing my own domain names and put it on LLM and create a profile about me and it’s scary, like you can tell the person’s employer, the health conditions, political associations, religion, sexual preferences and gender and all sorts of things
Major discussion point
Technical Standards and Best Practices
Topics
Cybersecurity | Human rights | Infrastructure
Audience
Speech speed
156 words per minute
Speech length
180 words
Speech time
69 seconds
Remote areas suffer from poor infrastructure and high data costs requiring targeted policy interventions
Explanation
An audience member highlights the persistent digital divide affecting remote areas, where poor internet infrastructure combines with high data costs and lack of access to digital devices. They question what specific policies are being implemented to ensure digital transformation initiatives reach these underserved populations.
Evidence
Most of the projects, when they are being scaled, they are being done in the urban areas. So, I would really want to find out what are the policies or the laws that you have put in place to make sure that when you are scaling these things about the projects to do with digital transformation, you are channeling these initiatives to reach to the people that are living in the remote areas, because these are the people that are suffering from the poor infrastructure when it comes to internet. At the same time, even the data cost is very costly, which they cannot manage to access. And at the same time, they are also having the issue to do with the digital gadgets
Major discussion point
Digital Inclusion and Access
Topics
Development | Infrastructure | Economic
Chafic Chaya
Speech speed
116 words per minute
Speech length
2081 words
Speech time
1076 seconds
Technical preparedness is not a luxury but a strategic necessity for supporting digital ambitions
Explanation
Chafic emphasizes that robust internet infrastructure is essential for supporting tomorrow’s digital economy. He frames technical preparedness as a fundamental requirement rather than an optional enhancement, highlighting the critical nature of infrastructure investment.
Evidence
So the discussion today will be grounded in the belief that technical preparedness is not a luxury but is a strategic necessity
Major discussion point
Infrastructure Development and Investment
Topics
Infrastructure | Development | Economic
Comprehensive internet ecosystem requires connectivity, routing security, IPv6, IXPs, RPKI, and collaborative policy frameworks
Explanation
Chafic outlines the multiple technical components necessary for a robust internet ecosystem. He identifies key areas including connectivity infrastructure, security protocols, next-generation internet protocols, and collaborative governance frameworks as essential elements.
Evidence
We will discuss connectivity, routing security, IPv6, IXPs, RPKI, collaborative policy framework, capacity building, all these issues that create a robust internet ecosystem
Major discussion point
Technical Standards and Best Practices
Topics
Infrastructure | Cybersecurity | Legal and regulatory
Some Middle East and African countries lack basic infrastructure while others discuss advanced technologies
Explanation
Chafic highlights the significant digital divide where some countries in the region still lack fundamental internet infrastructure. This creates a challenging situation where advanced technologies like AI and IoT are being discussed while basic connectivity remains unavailable in certain areas.
Evidence
Yes just I want to highlight here that there are some countries in the Middle East and African region that they don’t have yet the basic infrastructure. While here we are discussing AI and Internet of Things and the cloud computing, we still have countries without basic infrastructure
Major discussion point
Digital Inclusion and Access
Topics
Development | Infrastructure | Digital access
Key takeaways include collaboration, partnership, IPv6, RPKI, MANRS, DNS security, and long-term capacity building investment
Explanation
Chafic summarizes the essential elements identified during the discussion for building robust internet infrastructure. He emphasizes both technical implementations and collaborative approaches as necessary components for future-ready digital infrastructure.
Evidence
We will have some takeaway and some recommendation, but just to summarize, collaboration, partnership, IPv6, RPKI, MANRS, the NSSEC should be in the public infrastructure plan, and the last one is long term investment in capacity building
Major discussion point
Technical Standards and Best Practices
Topics
Infrastructure | Cybersecurity | Development
Agreed with
– Sofia Silva Berenguer
– Dany Wazen
Agreed on
RPKI adoption is crucial but remains insufficient globally
Agreements
Agreement points
Multi-stakeholder collaboration is essential for internet infrastructure development and governance
Speakers
– Adiel Akplogan
– Rodrigue Guiguembde
– Frank Stien
– Zdravko Jukic
Arguments
Multi-stakeholder model critical for DNS stability over 40 years, bringing different parties together for policy development
No single actor can build African digital infrastructure alone due to complexity of challenges
Enhanced regulatory frameworks including EU NIST2 Directive and new Security Act strengthen cybersecurity landscape
Croatia fully transposed NIS2 directive and uses 5G toolbox as example of flexible European cooperation
Summary
All speakers emphasized that complex internet infrastructure challenges require collaboration between governments, private sector, technical community, and other stakeholders. They provided examples of successful multi-stakeholder initiatives and stressed that no single entity can address these challenges alone.
Topics
Legal and regulatory | Infrastructure | Development
Capacity building and digital skills development are critical priorities
Speakers
– Frank Stien
– Adiel Akplogan
– Zdravko Jukic
– Sofia Silva Berenguer
Arguments
Broad foundational knowledge combined with specialized expertise through collaboration is essential
ICANN conducted 200+ workshops focusing on regional needs and providing ongoing operational support
General population needs basic cybersecurity awareness rather than expert-level technical knowledge
Implementation of best practices requires bridging gap between technical and non-technical decision makers
Summary
Speakers agreed that capacity building must occur at multiple levels – from basic user awareness to specialized technical expertise. They emphasized the need for regional customization and bridging the gap between technical and non-technical stakeholders.
Topics
Development | Cybersecurity | Infrastructure
Network resilience and redundancy are fundamental for critical infrastructure
Speakers
– Frank Stien
– Zdravko Jukic
Arguments
Densely populated areas require at least three independent transmission networks for critical redundancy
Emergency situations like floods require national roaming capabilities combining all operational network parts
Summary
Both speakers emphasized the importance of building redundant network infrastructure that can withstand failures and emergency situations. They provided specific examples of how redundancy saves lives and maintains connectivity during crises.
Topics
Infrastructure | Cybersecurity
RPKI adoption is crucial but remains insufficient globally
Speakers
– Sofia Silva Berenguer
– Dany Wazen
– Chafic Chaya
Arguments
RPKI adds cryptographic verification to BGP announcements but adoption remains low at 25% for route origin validation
UNDP partnership with RIPE NCC promotes RPKI adoption through awareness campaigns and capacity building
Key takeaways include collaboration, partnership, IPv6, RPKI, MANRS, DNS security, and long-term capacity building investment
Summary
Speakers agreed that RPKI is essential for routing security but current adoption rates are inadequate. They emphasized the need for awareness campaigns and capacity building to increase implementation.
Topics
Infrastructure | Cybersecurity
Similar viewpoints
Both speakers from regulatory backgrounds emphasized the importance of coordinated cybersecurity responses involving multiple agencies and sectors, with clear roles and responsibilities defined for different stakeholders.
Speakers
– Frank Stien
– Zdravko Jukic
Arguments
Norway implements sectorial CERTs across 15 sectors coordinated by national NCSC for specialized threat response
Trusted vendor assessments require collaboration between regulatory authorities and national security agencies
Topics
Cybersecurity | Legal and regulatory
Both speakers highlighted the massive scale of digital divide challenges in their respective regions and the need for coordinated regional approaches to address connectivity gaps affecting hundreds of millions of people.
Speakers
– Rodrigue Guiguembde
– Dany Wazen
Arguments
Smart Africa represents 40 countries and 1.6 billion people working toward single digital market vision
30% of Arab region population (100+ million people) lacks internet connectivity, requiring scalable solutions
Topics
Development | Infrastructure | Digital access
Both speakers emphasized the critical role of partnerships between international organizations to maximize reach and impact, particularly in addressing digital development challenges in underserved regions.
Speakers
– Adiel Akplogan
– Dany Wazen
Arguments
Partnership approach necessary to reach areas single organizations cannot cover effectively
UNDP launching Digital Professional Development initiative focusing on IPv6 adoption and IXP promotion
Topics
Development | Infrastructure | Legal and regulatory
Unexpected consensus
Balance between economic efficiency and security redundancy in network infrastructure
Speakers
– Zdravko Jukic
– Frank Stien
Arguments
BEREC renamed working group to emphasize resilience, balancing economic efficiency with redundancy requirements
Densely populated areas require at least three independent transmission networks for critical redundancy
Explanation
It was unexpected to see regulators explicitly acknowledging the tension between economic optimization and security requirements, with both speakers recognizing that resilience investments may not be economically justified but are necessary for national security. This represents a sophisticated understanding of the trade-offs involved in infrastructure policy.
Topics
Cybersecurity | Legal and regulatory | Infrastructure
Regional customization of global technical standards and policies
Speakers
– Adiel Akplogan
– Zdravko Jukic
– Dany Wazen
Arguments
ICANN conducted 200+ workshops focusing on regional needs and providing ongoing operational support
Croatia fully transposed NIS2 directive and uses 5G toolbox as example of flexible European cooperation
UNDP developing regulatory framework with GSMA for digital policies supporting connectivity and data centers
Explanation
There was unexpected consensus across different types of organizations (technical, regulatory, development) on the need to adapt global standards to local contexts. This suggests a mature understanding that one-size-fits-all approaches don’t work for complex technical infrastructure challenges.
Topics
Legal and regulatory | Development | Infrastructure
Overall assessment
Summary
The speakers demonstrated strong consensus on fundamental principles including the necessity of multi-stakeholder collaboration, the critical importance of capacity building, the need for network resilience and redundancy, and the urgency of improving RPKI adoption. There was also agreement on the challenges of balancing economic efficiency with security requirements and the importance of regional customization of global standards.
Consensus level
High level of consensus with significant implications for internet governance. The agreement across different stakeholder groups (regulators, technical community, development organizations) suggests that there is a shared understanding of the challenges and potential solutions. This consensus provides a strong foundation for coordinated action on internet infrastructure development, particularly in addressing the digital divide and improving cybersecurity. The alignment between different perspectives indicates that multi-stakeholder initiatives are likely to be more effective and sustainable.
Differences
Different viewpoints
Approach to cybersecurity organizational structure
Speakers
– Frank Stien
– Zdravko Jukic
Arguments
Norway implements sectorial CERTs across 15 sectors coordinated by national NCSC for specialized threat response
BEREC renamed working group to emphasize resilience, balancing economic efficiency with redundancy requirements
Summary
Frank advocates for a decentralized sectorial CERT approach with specialized knowledge per sector, while Zdravko focuses on centralized European coordination through BEREC working groups that balance economic and resilience considerations
Topics
Cybersecurity | Infrastructure | Legal and regulatory
Level of technical knowledge required for general population
Speakers
– Frank Stien
– Zdravko Jukic
Arguments
Broad foundational knowledge combined with specialized expertise through collaboration is essential
General population needs basic cybersecurity awareness rather than expert-level technical knowledge
Summary
Frank emphasizes the importance of broad foundational knowledge of internet fundamentals, while Zdravko argues that basic awareness is sufficient for the general population and can resolve 90% of security issues
Topics
Development | Cybersecurity | Sociocultural
Unexpected differences
Privacy and encryption priorities
Speakers
– Vinicius Fortuna
– Other panelists
Arguments
DNS privacy concerns with encrypted DNS and encrypted client hello technologies need promotion
Various arguments focused on infrastructure, routing security, and basic connectivity
Explanation
Vinicius raised advanced privacy concerns about DNS leakage and AI profiling capabilities, which was unexpected given that most panelists were focused on basic infrastructure development and traditional security measures. This highlighted a gap between advanced privacy considerations and fundamental connectivity challenges
Topics
Cybersecurity | Human rights | Infrastructure
Overall assessment
Summary
The discussion showed remarkably high consensus among speakers, with most disagreements being tactical rather than strategic. Main areas of difference included organizational approaches to cybersecurity (centralized vs. decentralized), required knowledge levels for general population, and specific methods for promoting technical standards adoption
Disagreement level
Low to moderate disagreement level with high strategic alignment. The implications are positive as speakers shared common goals of robust internet infrastructure, multi-stakeholder collaboration, and capacity building. The tactical differences actually complement each other and suggest multiple viable approaches to achieving shared objectives. The main challenge identified is bridging the gap between advanced technical capabilities and basic infrastructure needs in developing regions
Partial agreements
Partial agreements
Similar viewpoints
Both speakers from regulatory backgrounds emphasized the importance of coordinated cybersecurity responses involving multiple agencies and sectors, with clear roles and responsibilities defined for different stakeholders.
Speakers
– Frank Stien
– Zdravko Jukic
Arguments
Norway implements sectorial CERTs across 15 sectors coordinated by national NCSC for specialized threat response
Trusted vendor assessments require collaboration between regulatory authorities and national security agencies
Topics
Cybersecurity | Legal and regulatory
Both speakers highlighted the massive scale of digital divide challenges in their respective regions and the need for coordinated regional approaches to address connectivity gaps affecting hundreds of millions of people.
Speakers
– Rodrigue Guiguembde
– Dany Wazen
Arguments
Smart Africa represents 40 countries and 1.6 billion people working toward single digital market vision
30% of Arab region population (100+ million people) lacks internet connectivity, requiring scalable solutions
Topics
Development | Infrastructure | Digital access
Both speakers emphasized the critical role of partnerships between international organizations to maximize reach and impact, particularly in addressing digital development challenges in underserved regions.
Speakers
– Adiel Akplogan
– Dany Wazen
Arguments
Partnership approach necessary to reach areas single organizations cannot cover effectively
UNDP launching Digital Professional Development initiative focusing on IPv6 adoption and IXP promotion
Topics
Development | Infrastructure | Legal and regulatory
Takeaways
Key takeaways
Multi-stakeholder collaboration is essential for internet infrastructure development, with successful examples like Smart Africa’s One African Network and UNDP-RIPE NCC partnerships
Infrastructure resilience requires balancing economic efficiency with redundancy – densely populated areas need at least three independent transmission networks
Capacity building must address both general user awareness (basic cybersecurity practices) and technical expertise for network operators
RPKI adoption remains critically low at 25% for route origin validation despite being available for over 10 years, requiring increased awareness and implementation
Regional approaches are necessary as internet challenges vary significantly – 30% of Arab region lacks connectivity while developed countries focus on AI and IoT infrastructure
Sectorial CERT coordination (like Norway’s 15-sector model) provides specialized knowledge while enabling scalable incident response
Regulatory frameworks must be agile and collaborative, with examples like EU’s NIS2 directive and 5G toolbox showing flexible implementation approaches
No single actor can address complex digital infrastructure challenges alone – partnership between government, private sector, and technical communities is mandatory
Resolutions and action items
UNDP to launch Digital Professional Development initiative with three pillars: IPv6 adoption, IXP promotion, and RPKI security implementation
UNDP and RIPE NCC partnership to conduct awareness campaigns and capacity building for routing security in Arab region
BEREC to develop methodology for balancing economic investment with network resilience requirements across European member states
Smart Africa to continue One African Network expansion beyond current 11 countries to eliminate roaming charges
Continued promotion of MANRS initiative and best practices implementation through RIR regional support
Development of regulatory framework by UNDP with GSMA for digital policies supporting connectivity and data centers
ICANN to continue 200+ annual workshops with regional focus and ongoing operational support for DNS operators
Unresolved issues
Technical connectivity problems during session prevented full participation from some online speakers
Question about IoT infrastructure management by device owners remained unanswered due to time constraints
Privacy concerns regarding DNS leakage and need for encrypted DNS/encrypted client hello adoption not fully addressed
Specific policies for ensuring digital transformation projects reach remote areas rather than just urban centers
How to address high data costs and digital device access barriers in underserved communities
Detailed methodology for trusted vendor assessments and implementation across different national contexts
Specific mechanisms for intelligence and information sharing across borders for cybersecurity threats
Suggested compromises
Balance between economic efficiency and network redundancy through BEREC’s proposed methodology allowing flexible national implementation
Sectorial CERT approach combining specialized knowledge with coordinated national response capabilities
Multi-level capacity building addressing both basic user awareness and advanced technical skills rather than expecting universal expertise
Regional flavor in global initiatives allowing local adaptation while maintaining international coordination
Flexible regulatory frameworks like EU’s 5G toolbox that provide common standards while allowing national customization
Partnership-based resource sharing to reach areas single organizations cannot cover effectively
Thought provoking comments
But when it comes to resilience, there we do exactly the opposite, we try to build some connections that should be used maybe in some emergency situation. So they are not economically, let’s say, justified by itself.
Speaker
Zdravko Jukic
Reason
This comment highlighted a fundamental paradox in infrastructure planning – the tension between economic efficiency and resilience. It challenged the typical regulatory approach of avoiding duplication and introduced the complex concept of investing in ‘economically unjustified’ redundancy for security purposes.
Impact
This observation shifted the discussion from technical solutions to the deeper economic and policy challenges of building resilient infrastructure. It introduced the theme of balancing economic optimization with security needs, which became a recurring thread throughout the session.
Although the Internet is a global network, it’s a global network made of small independent networks that are connected and that are operated at the local level. So, applying the same multi-stakeholder approach, ensuring that different parties are impacted by the Internet in general, but its operation specifically, are around the table to think, to share ideas…
Speaker
Adiel Akplogan
Reason
This comment provided a crucial conceptual framework that bridged global and local perspectives. It reframed the internet from a monolithic global entity to a collection of interconnected local networks, emphasizing that global solutions must be implemented locally.
Impact
This perspective fundamentally shaped how other speakers approached their responses, leading to more nuanced discussions about regional variations, local capacity building, and the need for context-specific implementations of global best practices.
And in order to advance this, we have recently launched two initiatives… So basically, the initiative is about connectivity for digital inclusion and to address these challenges. We wanted to work on bipartite access. The first one is related to scalability… Second is allow sustainability… and thirdly, is a safe and secure connectivity.
Speaker
Dany Wazen
Reason
This comment was insightful because it provided a concrete, structured approach to addressing digital divides while integrating the theoretical concepts discussed earlier. The three-pillar framework (scalability, sustainability, security) offered a practical model for implementation.
Impact
This intervention grounded the discussion in real-world application and demonstrated how multi-stakeholder partnerships translate into actionable programs. It shifted the conversation from problem identification to solution implementation, inspiring other speakers to provide more concrete examples.
My experience from cyber security, as you already know, it’s important to understand the fundamentals because the internet is really complex and in order to find weak links, when you’re putting up a stable, scalable system, is really to understand how this works. But at the same time, no one will ever be able to understand everything.
Speaker
Frank Stien
Reason
This comment addressed a critical paradox in cybersecurity and internet governance – the need for both deep technical understanding and collaborative expertise. It acknowledged the inherent complexity while advocating for collaborative approaches to knowledge gaps.
Impact
This observation influenced the discussion on capacity building and skills development, leading other speakers to elaborate on different levels of expertise needed (from basic user awareness to technical specialization) and reinforcing the importance of multi-stakeholder collaboration.
No single actor can build African digital infrastructure alone. The complexity of the challenge we are facing, connectivity gaps, regulatory fragmentation, climate imperative, and endless risk, require a united, agile, and inclusive approach.
Speaker
Rodrigue Guiguembde
Reason
This comment powerfully synthesized the session’s themes while adding the crucial dimension of climate considerations and regional fragmentation. It elevated the discussion beyond technical and regulatory issues to encompass environmental and geopolitical realities.
Impact
This statement served as a compelling conclusion that tied together all the session’s themes – multi-stakeholder collaboration, capacity building, infrastructure resilience, and regional cooperation – while emphasizing the urgency and complexity of the challenges faced by developing regions.
Overall assessment
These key comments fundamentally shaped the discussion by introducing critical tensions and frameworks that elevated the conversation beyond technical specifications to strategic thinking. Zdravko’s economic paradox established the complexity of infrastructure planning, while Adiel’s global-local framework provided a conceptual foundation for understanding implementation challenges. Dany’s practical three-pillar approach demonstrated how theoretical concepts translate into actionable programs, and Frank’s expertise paradox reinforced the need for collaborative approaches. Finally, Rodrigue’s synthesis brought urgency and comprehensiveness to the discussion. Together, these comments created a rich dialogue that moved from problem identification through conceptual frameworks to practical solutions, while consistently emphasizing the interconnected nature of technical, economic, regulatory, and social challenges in building resilient internet infrastructure.
Follow-up questions
Would it be good if there is an infrastructure to ensure the communication of the IoTs so that they can be managed by the owner of the IoTs itself?
Speaker
Timothy (online participant)
Explanation
This question addresses the need for dedicated infrastructure for IoT device management and communication, which is crucial as IoT adoption expands and becomes more critical to digital infrastructure
What are the needed digital skills and what are the essential digital skills in the internet-driven future?
Speaker
Online participant (via Dany Wazen)
Explanation
This question seeks to identify the specific competencies required for the future digital economy, which is essential for capacity building and workforce development planning
How can organizations promote adoption of encrypted DNS and encrypted client hello technologies to address privacy concerns with domain name leakage?
Speaker
Vinicius Fortuna (Google Jigsaw)
Explanation
This addresses a serious privacy and security concern where domain names leak in plain text even with HTTPS encryption, potentially revealing sensitive personal information when analyzed by AI systems
What policies or laws are in place to ensure digital transformation projects reach remote areas rather than just urban centers?
Speaker
Audience member
Explanation
This question addresses the digital divide and the need for inclusive policies that ensure connectivity initiatives benefit underserved rural populations who face poor infrastructure, high data costs, and lack of digital devices
How to develop methodology for balancing economic viability for operators with national security requirements for network resilience?
Speaker
Zdravko Jukic
Explanation
This represents a key challenge for regulators in determining optimal investment levels for network redundancy that balance commercial interests with national security needs
How can countries balance different levels of digital advancement within regions like Africa?
Speaker
Chafic Chaya
Explanation
This addresses the challenge of coordinating digital development across countries with varying levels of infrastructure and technological advancement
How to improve intelligence and information sharing among cybersecurity peers across borders?
Speaker
Frank Stien
Explanation
This identifies a gap in international cybersecurity cooperation that needs further development to enhance global internet security
Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.