網(wǎng)絡安全期貨2030年新基礎(chǔ)白皮書_第1頁
網(wǎng)絡安全期貨2030年新基礎(chǔ)白皮書_第2頁
網(wǎng)絡安全期貨2030年新基礎(chǔ)白皮書_第3頁
網(wǎng)絡安全期貨2030年新基礎(chǔ)白皮書_第4頁
網(wǎng)絡安全期貨2030年新基礎(chǔ)白皮書_第5頁
已閱讀5頁,還剩26頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

CybersecurityFutures2030NewFoundations

WHITEPAPER

DECEMBER2023

Images:GettyImages

Contents

Foreword3

Executivesummary4

Introduction6

1

Findingsandinsightsfromtheworkshops7

1.1Overarchingobservations7

1.2Thenewdigitalsecuritylandscapefor20308

1.3Regionalvariances10

2

What’snext?Howtousethisreport11

2.1Whatstrengthsmatter11

2.2Whatweaknessesmatter12

2.3Whatobjectivesmatter12

Contributors14

Endnotes15

Disclaimer

Thisdocumentispublishedbythe

WorldEconomicForumasacontribution

toaproject,insightareaorinteraction.

Thefindings,interpretationsand

conclusionsexpressedhereinarearesult

ofacollaborativeprocessfacilitatedand

endorsedbytheWorldEconomicForum

butwhoseresultsdonotnecessarily

representtheviewsoftheWorldEconomic

Forum,northeentiretyofitsMembers,

Partnersorotherstakeholders.

?2023WorldEconomicForum.

Allrightsreserved.

CybersecurityFutures2030NewFoundations2

December2023

CybersecurityFutures2030:

NewFoundations

Foreword

AnnCleaveland

ExecutiveDirector,CLTC,UCBerkeley

DawnThomas

Co-Director,InstituteforPublicResearch,CNA

Theglobalcybersecuritylandscapeisconstantlyandrapidlychanging.By2030,itwillonceagainberadicallytransformed.Tobetterunderstandhowtechnological,political,economicand

environmentalchangesareimpactingthe

futureofcybersecurityforgovernmentsand

organizations,theUCBerkeleyCenterforLong-TermCybersecurity(CLTC),theWorldEconomicForumCentreforCybersecurityandCNA’s

InstituteforPublicResearchhavecollaboratedonCybersecurityFutures2030,aforesight-

focusedresearchinitiativethataimstoinformcybersecuritystrategicplansaroundtheglobe.

OurengagementintheCybersecurityFutures2030initiativereflectsasharedcommitmenttopromotedigitalsecurityasastrategicpriorityandunderstandhowsystemiccybersecurity

challengesareexperiencedandaddressed

indifferentregionsaroundtheworld.

AkshayJoshi

HeadofIndustryand

Partnerships,CentreforCybersecurity,World

EconomicForum

Throughaseriesofin-depthworkshopsheldinsixinternationallocations,weexploredvarious

alternativedigitalfuturesconsideringhow

cybersecurityissettotransformoverthenextfivetosevenyears.Thereportincludesinsightsfromtheglobalworkshopsthatarebroadlyapplicableacrosscountriesandregions.Thefindingsaim

tohelpdecision-makersingovernment,industry,academiaandcivilsocietyseizeopportunities

andmitigaterisksjustoverthehorizon.

Weextendourgratitudetothosewhocontributedtothisinitiative,recognizingthatonlythrough

collaborativeeffortscanwesecurelyharnessthepromiseandpotentialoftechnologicalprogress.Maytheinsightscontainedhereinspurmeaningfuldialogue,inspireactionandguideourcollective

journeytowardamoresecureandinclusivedigitalfuture.

CybersecurityFutures2030NewFoundations3

Executivesummary

Digitalinnovationisaccelerating.Decision-makersneedlong-termstrategicforesighttoseizeopportunitiesandmitigaterisks.

ThisreportpresentsfindingsfromCybersecurity

Futures2030,aglobalresearchinitiativefocusedonexploringhowdigitalsecuritycouldevolveoverthenextfivetosevenyears.Thegoalofthisprojectistohelpshapeafuture-focusedresearchandpolicyagendathatiswidelyapplicableacrosscountries

andsectors.

Thefindingsarebasedondiscussionsheldat

aseriesofin-personworkshopsconducted

throughout2023inDubai(UnitedArabEmirates),WashingtonDC(USA),Kigali(Rwanda),NewDelhi(India)andSingapore,aswellasavirtualworkshopwithparticipantsfrommultipleEuropeancountriesandtheUnitedKingdom.Theworkshopscentredondiscussionoffourscenariosthatportray

diverse“cybersecurityfutures”thatarefictional

(butplausible)depictionsoftheworldroughlyin

theyear2030.UCBerkeleyCenterforLong-TermCybersecurity(CLTC)independentlydesignedthescenariostoexploretrade-offsingoalsandvaluesthatdecision-makerswillhavetocontendwithinthenearfuture.

Keyfindings

–Accelerationintechnologyandbusiness

modelinnovation(bothlicitandcriminal)will

underpinthenewdigitalsecuritylandscapefor2030.Societiesmustfundamentallyreorient

theirresponsestoperennialdigitalsecuritychallenges,includingdataprivacy,talentdevelopmentandsustainability.

–Shoringuptrustwillbeakeygoalof

cybersecurityeffortsoverthenextdecade.Theonlinespreadofmis-anddisinformationarenowcorecybersecurityconcerns.

Cybersecuritywillbecomelessabout

protectingtheconfidentialityandavailabilityofinformationandmoreaboutprotectingitsintegrityandprovenance.

–Stablegovernmentsthatfollowthroughonlong-termtechnologyandcybersecurity

strategiescanbecometrusted“brands”,

gainingadvantagesinattractingtalent,

seizingleadershipopportunitiesinmultilateralstandards-settingprocessesandcounteringdisinformationcampaigns.

–Public-privatepartnershipswillbeimperativetomovetheneedleoncombatingsovereignandcriminalcyberattacksandinformation

operationsbutnewincentivestructureswillbeneededtoachievesuchpartnerships.

–Thereisawindowofopportunityforemerginganddevelopingcountriestoimplement“securebydesign”principlesthatthefirstwavesof

digitalizationhavelargelyfailedtoembed.

Decision-makersshouldmonitorthepaceof

digitalizationandtheabilityofpopulationsto

integratenewtechnologiessafelyandsecurely.

–Transformativeinvestmentincybersecuritytalentandtrainingwillbeapriorityobjective.Countries’abilitytoprojectthemselvesas

trustedglobalbrands,attractglobaltalent,retainhomegrowntalentandprovidea

productiveenvironmenttocapitalizeon

thattalentmatterssignificantly.Promoting

educationandawarenessofdigitalsecuritywillbecritical.

–Decision-makersacrossregionsare

strugglingtobalancetechnologyvalue-

chaininterdependenciesandself-sufficiency.Evenasnationaldataregulationsproliferate,

trustedstandardsareneededthatincentivizeinteroperabilityincybersecurityandartificial

intelligence(AI)security.Insomeregions,thereisasenseofagloballeadershipvoid,alack

oftrustedandexpertregulatorybodiesand

insufficientcapacityforenforcementofsecurityandprivacylawsandstandards.

–Thefocusinthenextthreetofiveyearswillbeonthepracticalitiesofnavigatingaworldin

flux.Thisdynamicwillvaryacrossregions,willbeinfluencedbytheirrelationshipswithChinaand/ortheUSandwillholdsteadyregardlessofthestrengthorweaknessoftheUS-Chinarelationshipoverthenextfiveyears.

CybersecurityFutures2030NewFoundations4

Takeawaysfordecision-makers

–Organizationswillneedtoensuretheyhave

astableandsecuresupplychainofresources,includingtechnologycomponents,rawmaterialsandskilled,affordableworkers.

–Effectivedigitalpoliciesandregulationsshoulddemonstrateclearandstable

prioritiesofcompanies,governmentsandotherorganizations.

–Resilience,humourandoptimismaboutthe

future–andtheopportunitiesthatawaitthosewillingandabletoseizethem–arecriticalintherun-upto2030.

–Havingadigitallyliteratepublicandcustomer

basethatismediasavvyandinoculatedagainstmis-,dis-andmal-information(MDM)willbeasourceofstrengthfororganizationsthatwishtosucceedinaneraofdegradingtrust.

–Leadersshouldactivelylookforwaysto

ensurethatemergingtechnologieshelpthegeneralpopulation,forexamplebystabilizingnationaleconomies,addressinghighcostsofliving,providingfoodsecurityandadvancingrenewableenergy.

–Thepublicandprivatesectorsshouldinvestineducation(e.g.medialiteracyandcybersecurityhygiene)forthegeneralpopulationtodecreasetheattacksurfaceandin-jobtrainingtoupskilladigitalworkforce.

–LeaderswillneedtostrategicallyandtacticallyuseregulationtoguardagainstthedownsidesofAIproductsastheyriseinprominenceandmusttakemeaningfulmeasurestocombat

MDMbeforeitfurtherdegradestrustandunity.

–Countriesshouldformandstrengthentrustedresearchinstitutions,particularlyinless-

developedeconomies,tosupportgovernmentsinaddressingthemostchallengingsocialandtechnicalcybersecurityproblemsof2030.

Thenextphaseofthisprojectwillincludeworkingwithdecision-makerstogenerateadditional

prioritiesandthinkingmorebroadlyabout

howfindingsfromthisreportcouldreshape

organizations’futures.Grapplingwiththese

kindsofquestionsshouldbeadefiningfocus

in2024forC-suites,boardsandgovernment

agenciesinternationally.

CybersecurityFutures2030NewFoundations5

Thisbroaderlookatcybersecuritycanbestbeunderstoodasdefendingagainstharmandpromotingopportunityanywheretechnology

touchessociety.

Introduction

CybersecurityFutures2030isaforesight-

focusedresearchinitiativethataimstoinform

cybersecuritystrategicplanningaroundtheglobe.

Awiderangeofissueshavechangedthe

cybersecurityagendaoverthepastfiveyears–fromdigitaltransformationduringaglobalpandemicto

thecommercializationoflargelanguagemodels

andfromthelargestmilitaryconflictsofthecyber

agetoaninternationalransomwarescourge.As

KenMcCallum,theDirector-GeneraloftheBritish

SecurityService,recentlyremarked:“Ifyouare

workingatthecuttingedgeoftechnologytoday,youmaynotbeinterestedingeopolitics,butgeopoliticsiscertainlyinterestedinyou.”1Thenextfiveyearswillbringanothersetofunprecedentedcybersecurity

challengesandopportunities.Thosewithstrategicforesightwillbebettersituatedtotiltthedigitalworldinadirectionthatismoresecure.

Tolookoverthehorizon,theUCBerkeleyCenterforLong-TermCybersecurity(CLTC),withthe

supportoftheWorldEconomicForum’sCentreforCybersecurity(C4C)andCNA’sInstituteforPublicResearch,launchedCybersecurityFutures2030,aglobalinitiativethatexploreshowdigitalsecuritycouldevolveoverthenextfivetosevenyears.Theaimistohelpshapeafuture-focusedresearch

andpolicyagendathatiswidelyapplicableacrosscountriesandsectors.Thisbroaderlookat

cybersecuritycanbestbeunderstoodasdefendingagainstharmandpromotingopportunityanywheretechnologytouchessociety.

BetweenJanuaryandApril2023,theCLTC

independentlydevelopedasetoffourscenariosthatportraypossible“cybersecurityfutures”

lookingforwardtoroughly2030.Thescenariosweredesignedtoexaminesomeofthetrade-

offsingoalsandvaluesthatdecision-makers

willhavetocontendwithinthenearfuture.The

scenariosfocusonwhatisrelevantandplausible,whilealsochallengingimplicitbeliefsandtoday’sconventionalwisdom.Ratherthanpredictthe

future,theyarespecificallydesignedtoelicitmeaningfullydifferentglobalperspectives.

BetweenMayandSeptember2023,theinitiativetookthesescenariostofiveinternationallocationsthatwillhavedifferentinfluencesandperspectivesonthedigitalsecuritylandscapeofthenext

decade:Dubai(UnitedArabEmirates),WashingtonDC(USA),Kigali(Rwanda),NewDelhi(India)

andSingapore.Inaddition,therewerevirtual

workshopswithparticipantsfrommultipleEuropeancountriesandtheUnitedKingdom.Aworkshop

ineachlocationhadamixofparticipantsfrom

government,business,civilsociety,academiaandotherdomains.Similarworkshopprocesseswereruntoextractreactionsandinsightsthatwould

becomparable.Thesecomparisonsarethemostimportantimmediateproductoftheworkshops.

Ofcourse,thesecomparisonscomewithcaveats,themostimportantofwhichistheuseofaggregategeographicalcategoriesasplaceholders.A

singleworkshopinNewDelhi(despitebroad

representationfromexpertsinacademia,industry,governmentandcivilsociety)cannotrepresentthecomprehensiveperspectiveofcitizensintheworld’smostpopulouscountry.Norcanaworkshopin

KigalispeakforthewholeAfricancontinent.The

geographiclabelsarebestthoughtofasimperfectproxiesthatshedlightoncommonalitiesand

differencesacrossmanyregionsthatwillimpactthefutureoftheglobaldigitalsecuritylandscape,but

therewasnocapacitytoconveneworkshopsinallpartsoftheworld.Anothercaveatisrecencybias;theworkshopparticipantsarepeopleandpeople

readfuturescenariosinthecontextofwhatismostimportantandurgentintheirmindsatthatmoment.Inthiscontext,itislikelyunsurprisingthatworkshopparticipantsmentionedartificialintelligence(AI)morethanotheremergingtechnologiesbyafactorof

10.Finally,scenariosthemselveshaveblindspots,evenastheystretchimaginationstotheedgeof

plausibility.Theworkshopprocesswasdesignedtominimizethesekindsofbiasesbutitisimpossibletofullyeliminatethem.

Theworkshopshelpedexposehowattitudesandperspectivesaredevelopinganddivergingacrossgeographies.Theinsightsreportedbelowarelikelytoreframethedecision-makingenvironmentand

willhelpdecision-makersingovernment,industry

andcivilsocietyreducefrictions,seizeopportunitiesforcooperationandbetterprepareforthefuture.

CybersecurityFutures2030NewFoundations6

Cybersecuritywillbecomelessaboutprotectingtheconfidentialityandavailability

ofinformationandmoreaboutprotectingits

integrityand

provenance.

Digitalsecurityisbeingreframedasthe

abilityofsocietiestomatchthespeed

oftrustwiththespeedofinnovation.In

eachworkshop,participantsvoicedfears

thatthespeedoftechnologicalandcriminal

2

1

Findingsandinsights

fromtheworkshops

Aseriesofinternationalworkshopsrevealed

criticalchallenges,uncertaintiesand

opportunitiesforgovernmentsandorganizationsinarapidlyevolvingcybersecuritylandscape.

Thisreportdetailsthreeoverarchingobservationsandthreeproposedelementsofthenewlandscapein2030thatemergedfromtheworkshops.

Eachdeservesfocusedattentioninstrategicplanningandfuturedecision-making.

1.1Overarchingobservations

1

innovationhassurpassedhumanity’sability

toensurethetrustworthinessofdigital

productsandinformation,whichhasprofoundconsequencesforthelegitimacyofnational

andinternationalinstitutions.Shoringup

trustemergedasakeygoalofcybersecurityeffortsoverthenextdecade.Atastrategic

level,stablegovernmentsthatfollowthroughonlong-termtechnologyandcybersecurity

strategiescanbecometrusted“brands”,

gainingadvantagesinattractingtalent,

seizingleadershipopportunitiesinmultilateralstandard-settingprocessesandcountering

disinformationcampaigns.ThisoutlookwasmostpronouncedinSingapore,IndiaandtheUnitedArabEmirates.Atamoreoperationallevel,participantsalsodiscussedregulators’roleinmonitoringmultinationalcompanies

closelywitheffectiveaccountabilitymeasures.

ThissentimentwasmostpronouncedinAfricaandtheEU.IntheUS,therewasmuchmore

tensionaboutwhois“incharge”oftrust–thegovernmentortheprivatesector.Agreement

thatpublic-privatepartnershipsareimperativetomovetheneedleoncombatingsovereign

andcriminalcyberattacksandinformation

operationswasaccompaniedbyanequal

senseofdisillusionmentaboutthefeasibility

ofsuchpartnershipsgivencurrentincentive

structures.Participantsvoicednearlyuniversalagreementthattheonlinespreadofmis-,

dis-andmal-information(MDM)arenowcorecybersecurityconcerns.Cybersecuritywill

becomelessaboutprotectingtheconfidentiality

andavailabilityofinformationandmoreaboutprotectingitsintegrityandprovenance.

Thepaceandscaleofdigitalizationwill

drivechangestotheglobalsecurity

landscapeasmuchas(ormorethan)

thespecificcapabilitiesofemerging

technologies.Workshopparticipants

focusedonAIandautomationmorethan

othertechnologiesbyafactorof10,thoughthecurrentandpotentialcapabilitiesof

quantumcomputing,theinternetofthings

(IoT)andadvancesinspacealsoemerged

aspriorities.Inthecontextofuncertainties

andvulnerabilities,participantscautioned

aboutfuturecleavagesthatcouldemerge

withquantumtechnologiesandidentifiedthedevelopmentanddeploymentofquantum-safecryptographyasapriority.Preparing

technicallyandbycreatingnormsand

boundariescouldhavesweepingpositive

impactsforgovernments,businessesandsocieties.Space–giventheintegrationofadvancedtechnologiesinspace-based

systems–cameupasanotherenvironmentwhereemergingtechnologycouldcause

futurecleavagesandasadomainripeforcountriestoinnovateandadvance.Yetthe

biggestthreattothedigitalsecuritylandscapeisstillmorehumanthantechnical.Thesecurityconsequencesofrapiddigitaltransformationhadparticularrelevanceinemergingand

developingcountrieswithlargepopulations.Cybersecuritychallengesandopportunitiesofthenextdecadewillbeproportionatetothepaceandscaleatwhichcountriesdigitalize.AsparticipantsinIndiapointedout,larger

populationscorrespondtoalargertargetforattacks,rangingfromdisinformation

CybersecurityFutures2030NewFoundations7

3

campaignstofraudandextortion–familiar

attacksthatwillonlybecomemorecomplexascriminalsgaineasierandcheaperaccesstomoresophisticatedtechnologies.The

upsideisthatthereisawindowofopportunityforemerginganddevelopingcountriesto

implement“securebydesign”principles

thatthefirstwavesofdigitalizationinmore

developedcountrieshavelargelyfailed

toembed.Toanticipateandaddressthe

cybersecuritychallengesofthenextdecade,decision-makersshouldmonitorthepaceofdigitalization–andtheabilityofpopulationstointegratenewtechnologiessafelyand

securely–ascloselyastheydothesecurityspecificationsofthetechnologyitself.

Debatesaboutinternetfragmentation

versusa“freeandopen”internet

aremorphingintomorepractical

conversationsabouttrade-offsbetween

digitalsovereigntyandinteroperability.

Decision-makersacrossregionsare

strugglingtocreatetherightbalancebetweentechnologyvalue-chaininterdependencies

andself-sufficiency.Forexample,even

asnationaldataregulationsproliferate,

includingacrossthecontinentofAfrica,

participantsvoicedmoreuniformandurgentcallsfortrustedstandardsthatincentivize

interoperabilityincybersecurityandAI

security.InSingapore,therewasmore

confidencethatthegovernmentcande-risk

itsdependenciesbyexertinginfluencethroughregulation,standardsandpartnershipsto

ensurethattechnologiesusedinthecountrymeethighcybersecuritystandards.Inotherregions,thereisaprofoundsenseofa

globalleadershipvoid,alackoftrustedand

expertregulatorybodiesandinsufficient

capacityfortheenforcementofsecurityand

privacylawsandstandards.Tomeetthis

need,multi-alignedcountriesmaybebest

positionedtofacilitatemultilateraleffortsandmostabletoadvancecommonnormsand

standardsthatbenefitcollectivecybersecurity,whilesimultaneouslyinvestingtolimittheir

technologyandsupplychaindependencies.Thispragmaticsenseofopportunitywas

heardmoststronglyinSingapore,theUnitedArabEmiratesandIndia.Thefocusinthenextthreetofiveyearswillbeonthepracticalitiesofnavigatingaworldinflux.

Thisdynamicseemstogaintractionas

countriesbecomeincreasinglyawareoftheconsequencesoftechnologicalcolonialism

thatregionshaveexperiencedtovarying

degreesdependingontheirrelationships

withChinaand/ortheUS,andholdssteadyregardlessofthestrengthorweaknessof

theUS-Chinarelationshipoverthenextfiveyears.Europeansworriedaboutafalsesenseofsecurityandaskedthequestion:“Ifthe

regionisreliantonexternallargetechnologycompaniestomanageourdataanddevelopAI,howcanweknowwhichtechnology

productsaresafetouse?”Chinesetools

permeateIndiaandRwanda(andAfrica

morebroadly),andChinesetechnology

companiescontinuetobeseenaspotentialpartnersforadvancingdigitalinfrastructureintheseregions.ThereisalsoconsiderableconcernaboutChina’sabilityandwillingnesstoprotectpartnertechnology,potentiallossofprivacyandtheendoflow-cost,high-

qualitytechnologyproductsiftheUSand

Chinacooperateinsteadofcompeting.

Participantsanticipatethatglobalalliancesaresettoreshuffleinthecomingyears,withopportunitiesforcountriestocreatenew

polesinamoremultipolarworld.

1.2Thenewdigitalsecuritylandscapefor2030

to2030willbeforcountries,communities

andindividualstonegotiateafairreturnon

investment(ROI)incontrolledandresponsibleuseoftheirdata.Whatdoesthismeanforthefutureofdigitalsecurityandprivacy?Europeanparticipantssawatightropewalkbetween

leadingtheworldindigitalregulationand

enforcementononesideandthefinancialandeconomicreturnsthatdata-poweredinnovationcouldgenerateontheother.InRwanda,

Theobjectivein2030willbeforcountries,

communities

andindividualstonegotiateafairreturnon

investmentin

controlledandresponsibleuseoftheirdata.

Accelerationintechnologyandbusinessmodel

innovation(bothlicitandcriminal)willunderpin

thenewdigitalsecuritylandscapefor2030.The

workshopsuncoveredauniversalsensethatthis

accelerationisnotlikelytobeincremental.Thenew

landscapewillrequiresocietiestofundamentally

reorienttheirresponsestoperennialdigital

securitychallenges,threeofwhicharechanging

inparticularlyimportantways:dataprivacy,talent

developmentandsustainability.

concernsemergedaboutAImodelsthatare

movingaheadwithoutAfricandata.African

representationintrainingdataiscriticalinorderforAIproductstobesafeandtrustworthyto

deployinanAfricancontextbuttechnology

producersandAfricandataownersmustbe

equalparticipantsinthetransaction.IntheUS,firmsmakinginvestmentsindataprotectionand

–“Makesureyouaregettingsomethinginreturn

foryourpersonaldata,”wasarefrainheard

aroundtheworld.Intheworkshopdiscussions,

almostnoonebelievedthatitisstillplausibleor

desirabletofullyrestrictflowsofpersonaldata.

Rather,thesentimentisthat“thecatisoutof

thebag”andthattheobjectiveinthedecade

CybersecurityFutures2030NewFoundations8

Transformativeinvestmentin

cybersecurity

talentandtrainingemergedasa

priorityobjectiveacrossscenariosandgeographies.

usewillneedtocontendwithemergingsocietalmovementsadvocatingformoreself-owned

orself-manageddata.Thereisalsopotentialforplatformfirmsandtheiruserstobecomenewalliesindisincentivizinglarge-scaledatascrapingbythirdparties.Butthe“Makesureourdataisoutthere–andusedsecurelyinwaysthatbenefitcommunities”sentiment

isapronouncedchangeinattitudetowardspersonaldatathanheardinthepast.

–Transformativeinvestmentincybersecurity

talentandtrainingemergedrobustlyasapriorityobjectiveacrossgeographies.Toafargreater

degreethanseeninthepast,participantsinallworkshoplocationsrecognizedtheimportanceofhumancapitalformanagingtechnology

andcybersecurity,regardlessoftechnologicaladvances.Severalintersectingdynamicswereuniversallycited:

a.Theintensifyingcompetitionforglobal

talent.Thebarforcybersecuritytalentis

gettinghigher.Participantsnotedthatas

automationandAIfulfillmanyentry-level

technicaljobs,therewillbeincreasingneedandopportunitiesforpeopletrainedin

supervisoryandpolicyrolesforcybersecurityandAIsecurity.Inaddition,thedemandforpeoplewhocandesign,buildanddeploy

securemachinelearningandAIproducts

isskyrocketing.Theabilityofcountriesto

projectthemselvesastrustedglobalbrands,attractglobaltalent,retainhomegrowntalentandprovideaproductiveenvironmentto

capitalizeonthattalentmatterssignificantly.Participantsexpressedacuteawareness

oftheriskofazero-sumgamedynamic–

wherebycountriescompeteoverthesamelimitedpooloftalent–ifcountriesdon’t

simultaneouslyinvestinthedevelopment

andretentionoflocaltalent,withparticularconsequencesforlessdevelopedcountries.Insteadof“braindrain”,decision-makerswillneedtoconsiderideaslike“braincirculation”(bywhichforeign-borntechnologists

transfertechnicalandinstitutionalknow-howbetweendistantregionaleconomies)inthenextdecade.2

b.Theurgencyforbroadcyberliteracytrainingtocombatdisinformationandgarden-varietycybercrime.Educationandawarenessof

digitalsecuritywillbecritical.Participantssawprofoundupsideforcompanies,

governmentsandNGOsthatsuccessfullycreateupdatedcampaignsandcurricula

toeducatethepublicondigitalsecurity

issuesandbestpractices.Thisisespeciallytruefornewtechnologyusersinless

developedcountries.

c.Localandregionaleducationandskilling

programmestoreshoresupplychainsand

enableeconomicdevelopment.Then

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論