{"id":16662,"date":"2014-10-30T12:39:42","date_gmt":"2014-10-30T01:39:42","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=16662"},"modified":"2014-10-31T07:32:03","modified_gmt":"2014-10-30T20:32:03","slug":"transpacific-pragmatism-on-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/","title":{"rendered":"Transpacific pragmatism on cybersecurity"},"content":{"rendered":"
\"Cyber<\/a><\/figure>\n

Each year the US Department of Homeland Security holds a National Cyber Security Awareness Month<\/a>. By virtue of time zones, this year\u2019s edition got a bit of a headstart, (unofficially) kicking off in Brisbane at the 50th Asia Pacific Economic Cooperation Telecommunications and Information Working Group (APECTEL50). This year saw the Security and Prosperity Steering Group (SPSG) hold an awareness-raising activity via live-webcast on issues ranging from mobile device security to adapting policing to tackle cybercrime. While a useful exercise, given the proliferation of international cyber fora, what value can APEC bring to the cybersecurity space?<\/p>\n

Cybersecurity is a natural fit for Asia Pacific Economic Cooperation (APEC), with APECTEL in a clear position to own the space. The organisation has long recognised that its economic goals are dependent on the \u2018integrity and security of the e-commerce environment\u2019 and the interdependence of networked economies makes international efforts critical. And while APEC has long faced scrutiny over its existence, there\u2019s real work to be done in smoothing economic transactions, building norms, and sharing best practices.<\/p>\n

In the APEC model, members implement measures voluntarily. That sometimes results in uneven adoption. Still, market forces push member economies towards synchronisation. And while such a model can\u2019t be applied to all aspects of cyber policy, there\u2019s plenty of room for APEC\u2019s collaborative and cooperative culture to feed into some much-needed international cyber initiatives.<\/p>\n

In fact, APEC has a history of tackling cyber issues, tracing back to 2001 when critical sector protection came to the fore. Cybersecurity became a regular feature in APEC statements on counterterrorism and, behind a push by the United States, the 2002 APEC Telecommunications and Information Ministers endorsed a broad APEC Cybersecurity Strategy. In the spirit of the organisation, the document was fully voluntary but it did outline seven clearways forward for economies and avenues for cooperation on cyber issues. In 2005, the document evolved into the Trusted, Secure and Sustainable Online Environment (TSSOE<\/a>) that provides a solid reference point for APEC-member economies on cyber issues.<\/p>\n

Many will understandably baulk at such documents, seeing them as far too soft to meaningful change. However the networks of habit built and the sharing of best practices can and do lead to much-needed progress. There\u2019ll never be a single solution to \u2018solve cyber\u2019 and APECTEL shouldn\u2019t attempt to find one. Instead it should play to its strengths, using the prism of economics and non-binding discussion to bring together traditional rivals in the cyber domain to push for pragmatic solutions to critical matters.<\/p>\n

Areas of natural confluence, as demonstrated at APECTEL50, include issues of mobile security (long on the agenda for SPSG), Domain Name System Security Extensions (DNSsec), and Internet Protocol version 6 (IPv6). Capacity building, information sharing, CERT to CERT cooperation, and even cybercrime initiatives can also be folded easily into the group\u2019s efforts. There\u2019s an acute awareness of the vitality of security in maintaining confidence in, and the vibrancy of, digital economies, and within a collaborative environment dominated by pragmatic line agencies, clear avenues for cooperation can be built. The space allows for commonalities to come to the fore and progress to be made without letting specific disagreements scuttle all efforts. By selectively focusing on areas where cooperation can succeed, incremental progress can be made and new benchmarks be set, rather than waiting for wholesale consensus on all aspects of any effort. APECTEL acts as a facilitator to build partnerships and adapt general best practices to economy-specific contexts.<\/p>\n

APEC\u2019s primary mandate<\/a> is \u2018to support sustainable economic growth and prosperity in the Asia-Pacific region,\u2019 and as Communications Minister Malcolm Turnbull has said, \u2018there isn\u2019t a digital economy, there is an economy and its digital.\u2019 Taken together, the confluence of interest is clear. APECTEL\u2019s pragmatic working culture allows for progress without letting the quest for perfection become the enemy of the good. That approach was on show in spades in Brisbane. \u00a0And while not nearly as sexy as cyber war, cyber espionage or the ideological bickering rampant at other international meetings, it\u2019s equally if not more vital to the vibrancy of the global economy. APECTEL51 in the Philippines will again fly largely under the radar, but under the leadership of an ambitious TEL chair in Malaysia and armed with a capable SPSG steering group, this is certainly a space to watch.<\/p>\n

Kl\u00e9e Aiken<\/a> is an analyst in\u00a0ASPI\u2019s\u00a0International Cyber Policy Centre<\/a>. Image courtesy of Flickr user Shinichi Higashi<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Each year the US Department of Homeland Security holds a National Cyber Security Awareness Month. By virtue of time zones, this year\u2019s edition got a bit of a headstart, (unofficially) kicking off in Brisbane at …<\/p>\n","protected":false},"author":153,"featured_media":16672,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[558,1019,143,391,95,168],"class_list":["post-16662","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-apec","tag-apectel","tag-asia-pacific","tag-cyber","tag-cyber-security","tag-norms"],"acf":[],"yoast_head":"\nTranspacific pragmatism on cybersecurity | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Transpacific pragmatism on cybersecurity | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Each year the US Department of Homeland Security holds a National Cyber Security Awareness Month. By virtue of time zones, this year\u2019s edition got a bit of a headstart, (unofficially) kicking off in Brisbane at ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-30T01:39:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-10-30T20:32:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/10\/9077798762_fed8080691_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/10\/9077798762_fed8080691_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/10\/9077798762_fed8080691_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"Cyber security in the Asia Pacific\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/\",\"name\":\"Transpacific pragmatism on cybersecurity | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/#primaryimage\"},\"datePublished\":\"2014-10-30T01:39:42+00:00\",\"dateModified\":\"2014-10-30T20:32:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Transpacific pragmatism on cybersecurity\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Transpacific pragmatism on cybersecurity | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Transpacific pragmatism on cybersecurity | The Strategist","og_description":"Each year the US Department of Homeland Security holds a National Cyber Security Awareness Month. By virtue of time zones, this year\u2019s edition got a bit of a headstart, (unofficially) kicking off in Brisbane at ...","og_url":"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-10-30T01:39:42+00:00","article_modified_time":"2014-10-30T20:32:03+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/10\/9077798762_fed8080691_z.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/10\/9077798762_fed8080691_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/10\/9077798762_fed8080691_z.jpg","width":640,"height":427,"caption":"Cyber security in the Asia Pacific"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/","url":"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/","name":"Transpacific pragmatism on cybersecurity | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/#primaryimage"},"datePublished":"2014-10-30T01:39:42+00:00","dateModified":"2014-10-30T20:32:03+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/transpacific-pragmatism-on-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Transpacific pragmatism on cybersecurity"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/16662"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=16662"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/16662\/revisions"}],"predecessor-version":[{"id":16685,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/16662\/revisions\/16685"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/16672"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=16662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=16662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=16662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}