80 likes | 284 Views
Future Scenarios. WAIGF July 27-29, 2011 Ben Akoh, IISD. Outline. Introduction Why Important? Existing Scenarios, e.g. ISOC’s Four Cyber Security Scenarios Activities Close. Why important?. 4 cybercriminality scenarios. Activities (Rules).
E N D
Future Scenarios WAIGF July 27-29, 2011 Ben Akoh, IISD
Outline • Introduction • Why Important? • Existing Scenarios, e.g. ISOC’s • Four Cyber Security Scenarios • Activities • Close
Activities (Rules) • We shall discuss in four small groups of 4-5 each • No right or wrong answers • No debates about imaginations or dreams • Each answer should be a statement • Each group will document their statements and present them to plenary • Each group has a chair and rapporteur
Activity 1 • Examine the four scenarios – In 10 years from now, build a few more details specifically focused on cyber security in the West African Region (7 mins) • There is no limit to your imagination • Write every thing that comes to mind • Wear the “hat” of your group. • Private sector • Government / regulator • Society • Unregulated
Activity 2 • For each scenario, respond to the questions: • What should be done to attain this scenario? (5 mins) • What should be done to avoid this scenario? (5 mins) • Involve stakeholders, processes, issues in your thinking.
Activity 3 • Plenary • Each group reports back. • What are your future scenarios? • What needs to be done to attain them? • What needs to be done to avoid them?