Insights
Cyber security policy in developing countries: Rowing in an unfamiliar world without a paddle by Mars Cacacho, Senior Security Engineer The advent of borderless information has struggling to comprehend. brought endless opportunities to all nations Coming from a developing country in Southwith tech playing a vital role in the core of eco- east Asia, one cannot set aside envy whenever nomic stability. Citizens bear witness to how one thinks of even a minuscule of comparison governments can be at the mercy of advance- to what developed nations have to offer. It does ment, especially so when it comes to curbing not take a genius to learn in kindergarten the the pandemic. very names of developed countries, their capIn this era where data and information are ital cities, and the plethora of adjectives that already more valuable than gold and oil, gain- come with them. The facts just became more ing the upper hand in acquiring, and eventu- and more obvious by the day: developing counally monopolising, information is an unspoken, tries are indeed a couple of decades behind round-the-clock Olympics. first worlds. This goes beyond employment The world is evolving at an insane pace. rate, GDP, healthcare, and higher education, to We’re now used to seeing first world countries’ name a few. home garage-grown startups become unicorns Developed countries have mustered roand help shape the bust cyber security world, generation afcapabilities. Since ter generation. Along they’re viewed as “Nurturing knowledge, with this progress prominent models of upskilling, and building comes the predicacyber security stratments of technology, egies, policies, and competencies could help and especially setech advancement, close the cyber security gap curity. Critical bugs, developing nations unsanitised codes, try to mimic Europebetween developed and exploited vulnerabilian countries and the developing countries” ties, denial of service, United States. Relucbotnet attacks, cyber tant leaders hastily espionage, advanced jump to legislation, persistent threats, and data breaches continue initiate large-scale propositions, create CERTs, to target organisations large and small. These and find ways to generate resources for national attacks can ground planes, cripple industrial cyber security infrastructures. They do so withplants, and even disrupt nuclear plants’ centri- out reviewing their own ICT roadmaps or first fuges. improving the very foundations of their state of Whilst developed countries are already tak- technology: internet services, communications, ing strides towards sustaining multifaceted cy- peace and order, costs of doing businesses, reber security approaches, developing countries sources, and investment security. are navigating their own labyrinths of internal With the promise of comfort in computing, issues in lobbying policies for digital infrastruc- government institutions begin digitising servictures. Meanwhile, underdeveloped nations are es without considering the risks. Unnecessary at the foot of digital transformation and are still automation has created a lucrative avenue – a 20
SECON CYBER