Leading into the future.
Strategy International · Think Tank & Consulting ServicesStrategy International · Think Tank & Consulting ServicesStrategy International · Think Tank & Consulting Services
(+357) 96 886 872
CY-2042, Nicosia

Towards a Global Cyber-Security


Towards a Global Cyber-Security

Global Cyber-Security is a necessity to be examined, evaluated and applied


Have you ever wondered what happens when technology, elements of which such as cyber-space, artificial intelligence, Robotics, Genetics and other related elements such a Computing, get together? Are we yet to see or envision a future that we were only acquainted with Science Fiction movies? Or are we already living inside of it?  Are we ready to embrace the 4th Technological and Industrial Revolution? How will future security take place and take part in? How will the world of global affairs be shaped? Mechanisms of technology although created by humans have now encircled us. We cannot live without technological support.

The Internet revised:

The Internet is engineered to support our human daily interaction. It is a new dimensional world. I do not believe we have reached the pick of opportunities coming from the internet. But we are now surely facilitated from multiple ways.
By the end of 2018, things have become however a bit more complicated. Although technology is progressing and so is the internet an option of a dimensional life, the internet has also become a source of where security may be at risk. The reason is quite simple. We are so keen in inter-networking all elements of life that our security privacy as well as market security maybe at stake.
On the question who would want to harm through the exploitation of the internet, I presume that this is now answered. As an article at the New York Times states, “It’s no secret that computers are insecure”[1].
The internet has become quite complex. As humans we are depend on technology. And in specifi, computers and most surely the internet. Our digital footprint is everywhere; our newly born children totally depend on technological advances and agility of it: From schooling to the manipulation of sources and materials which we use as technology tools. We are now locating threat at a higher level, where there is a higher risk. Obviously privacy and safety. We are now all “internetworked”.
Creativity and innovation hold risks. Computers are now embedded with automation. Physical data that are online can be mis-used or manipulated if not appropriately protected.
Soon we are to see actual converged technology of cybernetics (computer and internet) with “computing” and more as stated in the beginning, we should be ready to secure and protect.
For such reasons, we need to explore, analyze and sequence what is to happen from a legal, political and strategic points of view.

Internet’s Insecurities:

Security is serious policy concern. More so in the world of the internet. It withholds traps and illegalities that need to be regulated and ethically controlled if not controlled for the sake of our security and identity. In a government related environment, security is a “must”. The more networked our national and personal infrastructure is the more insecure we must feel as agile and easy to lead our lives, pathways and companies or governments.
“There is a need to comprehend the internet. To regulate internet security”.
There is a need to always hold accountable regulatory authorities and companies for making sure to hold a sound technology innovation that does more to offer rather than becoming an element of threat if any tools are rendered in the wrong hands.
We should regulate the internet. But only when we understand how the internet works. How and why we hold important a Cyber-Security policy. Why we need to regulated the Global Cyber-Security, from all sides, Legal, political, operational (IT), and strategic.
Note that one may operate the internet, from any remote area. National boundaries at this dimensional level do not really exist. Therefore where there is a large operation that cannot be controlled is most of the time maybe “mirrored”.
International and National Law is at levels applicable. But there is no sound or concrete global cyber-law. There is national cyber-law that is based on the basic element of crime. Such laws ordinarily, need to be constantly altered and considered. Whether they reflect true internet assurances and all kinds of security crimes that are or maybe committed.
At such instance we really seek to find out how the progress of the internet can be reflective to our policies on Global Cyber-Security. A Global Cyber-Security policy is not there just yet. The progress of technology is so fast that we also risk that the laws created or applied at a national or even international level may not be applicable when needed.
Governments, public companies, agencies, organizations and military organizations, private companies are spending time and effort and money to create operational protection mechanisms, highly sold to the customer or governments to protect until the day another product is created, service is needed or the current product is “hacked”. Vulnerabilities some IT experts will say, will always and continuously be there. Penetration efforts will always be there and crime-leveled efforts will continued to take place. As where there is good there is bad.
What creates as such insecurities are clear: 1. Our digital footprint that is already all over. 2 Our private or personal information (from banking, to identities, passports copies, or anything related with photos, videos and so on), 3. Our effort to continue living in a much more “smart” environment, in smart cities, which on the one hand we need and we have to, as it facilitates our lives, while psychologically we feel happy for being part of a future environment. 4 Protection still misses the global regulatory authority the simplicity and the world legalization to state what constitutes, insecurity, threat and elements of threat, what or who is to be accused of and why and what will be the sentencing.

HandbookGlobal Cyber-Security Put to the Test

In our most recent cooperation creation a “Handbook on Cyber-Development, Cyber-Democracy and Cyber-Defense” was developed (Edited by Carayannis, Campbell and Efthymiopoulos). It is now globally circulating we will case studies and analyses that are of most useful practice.
In this handbook we trace down with 48 world-wide issues related with Cyber-elements. There were contributions for converging market, economics, business, security, strategy, IT and other related elements about Cybernetics, the world of the internet and future opportunities.
Through areas and landscapes, through personal and market leveled experience we attempted to seek out to show to the world that convergence is happening from academia to the market and development economy. We further looked at the Defense measures that we surely need to be ready for. Making and marking  the Law of the Internet as a most important element along with security operations and security defense in the world of the internet.
CPDAs a primary result and to follow on, it is important to expand knowledge and to acquire much needed deeper information; stronger cooperation through education. Along with the UCLan Cyprus’ Law School in cooperation with experts of key knowledge and Strategy International are leading the way to an educational workshop on Global Cyber-Security.
It is important to examine legal and strategic challenges laid ahead with Global Cyber-Security. In this attempt to provide more information, to circulate knowledge and evaluation related information, UCLan Cyprus’ Law School in cooperation with Strategy International are organizing a Professional Training Course of (6 CPD credit hours), to be held, on 30 November and 1st of December 2018 at the Hilton Hotel in Nicosia, Cyprus.

Participants will be participating in a constant interactive process of strategic and operational learning and practical understanding of Cyber-Security at a legal, strategic and operational levels.

We put current challenges at evaluation, examination and testing, while the production of the CPD program for Professionals, will deliver robust results in which professionals of all levels from Law and IT to military and policing among others will get together discuss and explore all topics of Global Cyber-Security. The venue place will be at the Hilton Hotel in Nicosia.
The complete programme, expectations and CVs of the specialists and application can be viewed and completed at: https://www.uclancyprus.ac.cy/global-cyber-security-7-cpd-hours/. Prior completion of the Application is necessarily required.
CPD Programme
The professional training programme is intended to all professionals, specialists and technical advisors, among others. In specific, it is intended for public sector employees, solicitors and legal advisors, political scientists, IT specialized, military and policing officers, employees of national and homeland security, diplomats and other related with the subject private employees. The programme is intended to all those, which wish to learn on the legal, strategic and security examined cases and operating points of view on and about Cyber-Security.

[1] “Internet Hacking is About to Get Much Worse”, by Bruce Schneiner, The New York Times https://www.nytimes.com/2018/10/11/opinion/internet-hacking-cybersecurity-iot.html?fbclid=IwAR1l74eZOij0VON_CTUIBVJwDVfMeUTPsvLGu_lGr1aYqnQynM8G762PwpM [accessed on October 18th 2018].




All written content of this article on this site is the exclusive copyright and property of Strategy International (SI) Ltd and the author who has written to It.

To note, the opinions stated do not necessarily reflect the official policies of Strategy International.

No prior use in part or in its complete form, written, words, maps, charts or statistical, numerical information can be made, unless there is a written prior request and consent by the author and Strategy International and its legal representative.

All requests should be directed at [email protected]



Office address:

24 Minoos Street, Strovolos,
CY-2042 Nicosia


(+357) 96 886 872

Mail for information:

We look forward to discussing with your organization our joint collaboration.

Contact us via the details below, or enter your request.

    error: Content is protected !