Role of Multilateral organization in Cyber Security

24 October 2013 - A Workshop on Enhanced Cooperation in Bali, Indonesia

Internet Governance Forum 2013

Workshop # 91 Report

Role of Multilateral organization in Cyber Security

Organizer Name 

Gelvanovska Natalija

Organizer Entity 

World Bank

Workshop Theme 

Enhanced Cooperation

Consise description 


With its overall objective of Poverty reduction and Shared prosperity World Bank Group (WBG) is highly dedicated to Building Bridges between Developing and developed worlds, most recently also in the area of Cyber Security. WBG direct investments into ICT projects were over $4 billion during FY03-FY10. Between FY 03-10 over 70% of all investment lending done by the WBG has sector specific ICT component. Dealing with the developing counters on the day-to-day basis WBG is well aware about the importance of ICTs to the economic development and social inclusion, but as well about the risks and threats which come together. It is of the crucial importance therefore to ensure those investments while building opportunities at the same time also address Cyber Security challenges. But what is the role that multilateral organization should perform to encourage and build Cyber Security?

Today there are many multilateral organisations (considering to or) working in the area of Cyber Security. It is obvious therefore that along with growing importance of ICTs the role of those institutions in addressing Cyber Security challenge in developing countries is evolving.

Workshop will address: Evolving role of Multilateral organization; Building Bridges between Developing and developed worlds; WBG initiatives; Dialogue with developing countries; Discussion on potential partnerships with other multilaterals and potential involvement of private sector into those efforts.

It is planned to organize the workshop in the format of two round tables. The first round table will bring together multilaterals and other international organizations to discuss their agendas, priorities and experience. While the second one will be dedicated to present the views of the developing world and will aim to discuss whether it is a positive match between the ‘supply’ and ‘demand’.



Structure and timing: 9:00-9:05: Opening remarks and Introduction. I Round Table (35 min.): 9:05 – 9:40: I Round Table – What multilaterals can offer? What are the Cyber Security agendas that multilateral institutions have adopted? Panellists will be encouraged to discuss: the agendas, priorities and plans of the work of their respective institutions; successes and difficulties addressing cyber security in developing world. Moderator for that session: Mr. David Satola, WB II Round Table (40 min.): 9:40 – 10:20: II Round Table - What are the needs of the developing countries? How we could we partner better? How efforts of multilaterals could match those needs better? What should be the form of co-operation; what opportunities could be employed and in which areas? Moderator for that session: Mr. Sherif Hashem, Vice President for Cybersecurity, National Telecom Regulatory Authority of Egypt 10:20-10:30: Summary and Closing remarks


Mr. David Satola (WB) and Mr. Sherif M.R. Hashem (Egypt)

Remote Moderator 


Have you organized workshops at previous IGFs?


Workshop format 


Workshop Transcript 


Brief substantive summary of the workshop and presentation of the main issues that were raised during the discussions 


The Workshop explored what role multilateral organizations play in addressing cyber security in developing countries and how this role could be strengthened through enhanced cooperation.

More specifically the Workshop developed the discussion around two main areas: 1) awareness of the types of assistance the international development community is offering to developing countries in view of institutional mandates and agendas; and 2) cyber security areas where cooperation among international organizations is in particular demand by developing countries, as evidenced by the four case studies.

Building on the international mandates and agendas of the multilaterals and other international organizations as well as countries supporting the development of the cyber security area, the Workshop made an effort to discuss the complementarities of those efforts in addressing the needs of developing countries.


Conclusions drawn from the workshop and further comments 


The Workshop came up with the following conclusions:

1)       A trusted, secure and resilient digital environment is essential for innovation and growth. Cyber resilience is a critical economic issue for countries and companies. As increasing areas of our economies and daily lives become dependent on and transformed by digital connectivity, a basic level of literacy around cyber resilience issues is a core leadership skill, regardless of industry or policy domain.

2)       There is a sufficient legal framework in place adequately supporting the cooperation among the multilaterals and other international organizations in the area of Cyber security;

3)       As witnessed by the Workshop participants, so far there has been no systematic approach in place for cooperation among different donors. Nonetheless, case-by-case cooperation is taking place;

4)       As a way to address this issue, some of the Workshop participants suggested that it may be beneficial to establish a community of practice in the area of the Cyber security engaging practitioners working with developing countries;

5)       Workshop participants agreed that complementarities among different donors may need to be explored more substantially in order to increase the effectiveness of development efforts;

6)       Multilateral financial institutions while financing the Internet infrastructure in developing countries must take the utmost account of mitigating the “cyber” risks;

7)       Protection of critical infrastructure, capacity building as well as well development of CERT infrastructure seems to be a major concern among the developing countries;

8)   Developing countries shared the opinion that Cyber issues are not the same across developed and developing worlds; despite the fact that core pillars and principles for cyber security are common at the same time “blind” transfer of experience will not work.


Reported by 

Natalija Gelvanovska

Estimate the overall number of women participants present at the session 

About half of the participants were women

To what extent did the session discuss gender equality and/or women's empowerment? 

It was mentioned briefly in the presentations and discussions

Discussion affecting gender equality and women's empowerment 


Workshops Staticals 
Number of FEMALE participantsNumber of MALE participantsNumber of Young participantsNumber of Developing Countries ParticipantsNumber of Developed Countries ParticipantsNumber of LDCs participantsNumber of TOTAL Participants
0 0 15 15 10 5 0