3], Lu Wei, until 2016 the head


"[13], Lu Wei, until 2016 the head of the CAC, was previously the head of the Beijing Propaganda Department, and oversaw the Internet Management Office, a "massive human effort" that involved over 60,000 Internet propaganda workers and two million others employed off-payroll. cyber chart organizational dhs security taosecurity let person backdoor binaire tresorit samm sacks binren binario heimlichen zugang schafft konzept dipinta encryption backdoors [9], The CAC is involved in the formulation and implementation of policy on a variety of issues related to the Chinese Internet. The NCCs impact on innovation will only become clear over the next decade. It was this experience that assisted General Secretary Xi Jinping in selecting Lu as the head of the newly formed Internet regulator, the CAC. Visit the National Cybersecurity Center Map. Women Hold 20 Percent Of Cybersecurity Jobs, @WomenKnowCyber List of Women In Cybersecurity, Women Know Cyber: 100 Fascinating Females Fighting Cybercrime, Women In Cybersecurity Profiles, by Di Freeze, Mastercard Launches AI-Powered Solution to Protect the Digital Ecosystem, INTRUSIONs Shield Brings Government-Level Cybersecurity to Businesses, Illusive Networks Raises $24 Million to Thwart Cyberattacks with Honeypots, Wires Next Gen Video Conferencing Platform Challenges Zoom and Teams, The Phish Scale: NIST Helps IT Staff See Why Users Click on Emails, CYR3CON Adds Advisor, Former CISO at Wells Fargo Capital Markets, The Latest Cybersecurity Press Releases from Business Wire. If the former proves true, and influence flows back and forth between CSAC and CAC, then both the impact and the implications of CSACs existence will prove far different than if it is in place merely to magnify the partys established views on cyber governance. Chinas path to becoming a cyber powerhouse is not free of obstacles. All rights reserved. Chinas competitors should be prepared to respond to these developments. Over the next decade, the NCC will provide the talent, innovation, and indigenization of cyber capabilities that Chinas Ministry of State Security, Ministry of Public Security, and Peoples Liberation Army Strategic Support Force hacking teams lack. Sources in Beijing indicate that the CSACs broader leadership team is of two minds on the value of opening the association to foreign participants. For decision makers in the Asia-Pac region, this is an invaluable list of vendors and service providers to choose from. The constitution of the CSACs membership is also likely to raise eyebrows internationally. [14], Among the areas the CAC regulates include usernames on the Chinese Internet, the appropriateness of remarks made online, virtual private networks, the content of Internet portals, and much more. Antiy Labsis the first Chinese company awarded AV-TEST and whose AVL SDK for mobile is now protecting more than 1.7 billion smart devices. On talent cultivation, the NCC is surefooted. If the PLA uses the same foreign-made software they are attacking, then their attack against that software leaves Chinese networks vulnerable to counterattack through replication. Pink Slips To Million Dollar Salaries: Are CISOs Underappreciated Or Overpaid? The countrys deficit of 1.4 million cybersecurity professionals weighs on the militarys ability to recruit qualified candidates.

Whether it occurs will be an important factor in determining its intentions and impact. The Top Influencers And Brands, Top 5 Cybersecurity Facts, Figures & Statistics 2021 to 2025, Ransomware Damages To Hit $265 Billion In 2031, Up from $20 Billion in 2021, Women Represent 25 Percent of Global Cybersecurity Workforce in 2021, 100 Percent of Fortune 500 Companies Have A CISO in 2021, 6 Billion Internet Users by 2021; 75 Percent of the Worlds Population Online, The World Will Need To Protect 300 Billion Passwords by 2021, MSSPs (Managed Security Service Providers), Privileged Account Management (PAM) Companies, Fortune 500 Chief Information Security Officers (CISOs), Whos Who In Cybersecurity? First, Chinas military faces a shortage of cyber operators. Of these 257 members, there are no non-Chinese entities. What to Look for Next to Gauge CSAC Impact. Video Disinformation, How To Get Started in the Cybersecurity Field, FBI Cyber Division Section Chief Herb Stapleton, Cyberwarfare: Every American Business Is Under Cyber Attack, 10 Top Cybersecurity Journalists And Reporters To Follow In 2021, Cybersecurity Entrepreneur On A Mission To Eliminate Passwords, FBI Cyber Division Section Chief Warns Of Ransomware, Backstory Of The Worlds First Chief Information Security Officer, 10 Hot Penetration Testing Companies To Watch In 2021, 2020 Cybersecurity Jobs Report: 3.5 Million Jobs Unfilled By 2021, 10 Hot Cybersecurity Certifications For IT Professionals To Pursue In 2020, 50 Cybersecurity Titles That Every Job Seeker Should Know About, Top 5 Cybersecurity Jobs That Will Pay $200,000 To $500,000 In 2020, Directory of Cybersecurity Search Firms & Recruiters. The optics of the CSAC do not augur well for the development trajectory of cyber governance in China. Youll also find companies to help bake security into your own products and services. Top Influencers, 10 Top Cybersecurity Journalists And Reporters, 5 Security Influencers to Follow on LinkedIn, Top 25 Cybersecurity Experts to Follow On Social Media, List of Women in Cybersecurity to Follow on Twitter, Top 100 Cybersecurity Influencers at RSA Conference 2019, The Complete List of Hacker & Cybersecurity Movies, Christopher Porter, SVP & CISO, Fannie Mae, Robert Herjavec, Shark on ABCs Shark Tank, Sylvia Acevedo, CEO, Girl Scouts of the USA, Rob Ross, former Apple Engineer, Victim of $1 Million SIM Swap Hack, CISO Convene at One World Trade Center in NYC, Girl Scouts Troop 1574 Visit Cybercrime Magazine, Women Know Cybersecurity: Moving Beyond 20%, Phishing at a New York Mets Baseball Game, KnowBe4 Documentary: The Making of a Unicorn, Gee Rittenhouse, SVP/GM at Cisco Security, Ken Xie, Founder, Chairman & CEO at Fortinet, Jack Blount, President & CEO at INTRUSION, Theresa Payton, Founder & CEO at Fortalice, Craig Newmark, Founder of Craigslist on Cybersecurity, Kevin Mitnicks First Social Engineering Hack, Troels Oerting, WEFs Centre for Cybersecurity, Mark Montgomery, U.S. Cyberspace Solarium Commission, Sylvia Acevedo, CEO at Girl Scouts of the USA, Brett Johnson: Original Internet Godfather, Spear Phishing Attack Victim Loses $500,000, Laura Bean Buitta, Founder of Girl Security, Sarah Gilbert, Microsofts Gothic Opera Singer, Kevin Mitnick, The Worlds Most Famous Hacker, Mastering Cyber with Dr Jay, SVP at Mastercard, Whos Who In Cybersecurity: Top Influencers, What Are Deep Fakes? [10] The Director of both the state and party institutions is Zhuang Rongwen (), who serves concurrently as the Deputy Head of the party's Central Propaganda Department and deputy director of the state's State Council Information Office. The NCCs Exhibition Center, for example, hosts events that attract inventive talent from across the country. Or does their participation simply allow them to demonstrate to government stakeholders that they support ideas and initiatives like Internet sovereignty and Internet Plus? Replacing foreign software would go a long way to remediate the Partys concerns about foreign espionage and remove constraints on policy choices. Cybersecurity in Beijing, China. These cookies will be stored in your browser only with your consent. The tools these operators use may well be designed by NCC graduates, too. Meet the movers and shakers our editors are following, and who to call if your organization is hacked, suffers a data breach, or needs to enhance your cyber defense. There are two principal concerns regarding the CSACs makeup: 1. [17] The same year, the CAC debuted a song that Paul Mozur of The New York Times called "a throwback to revolutionary songs glorifying the state." Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. 2016 by the Center for Strategic and International Studies. Seeing information as a strategic weapon to achieve an asymmetric advantage, Chinas regime is likewise highly aware of the potential threat information constitutes when left uncontrolled. Samm Sacks is an adjunct fellow with the Strategic Technologies Program at the Center for Strategic and International Studies, and a senior analyst for China at the Eurasia Group, in Washington, D.C. Robert OBrien is a senior cybersecurity strategist at Microsoft Corporation. Such an opening would align with the recent actions of other key Chinese information security institutions, such as the China National Information Security Standards Technical Committee (TC260). The global shortage of cybersecurity professionals is expected to reach 3.5 million unfilled positions by 2021, up from 1 million in 2014. No single tool will establish an asymmetric advantage. "[16], In 2015, the CAC was also responsible for chasing down Internet users and web sites that published "rumors" following an explosion in the port city of Tianjin. Defense Industry, Acquisition, and Innovation, Weapons of Mass Destruction Proliferation, Energy, Climate Change, and Environmental Impacts, Family Planning, Maternal and Child Health, and Immunizations, Building Sustainable and Inclusive Democracy, Responding to Egregious Human Rights Abuses, institutions, laws, regulations, and policies aimed at strengthening cyber governance, Commentaries, Critical Questions, and Newsletters. How will CSACs international relationships and engagements shape its vision and mandate? Formally called the National Cybersecurity Talent and Innovation Base (), the NCC is being built in Wuhan. Chinese military strategists view cyber operations as a possible Assassins Mace ()a tool for asymmetric advantage over a superior force in military confrontation. "[26], Gibson Research Corporation attributed some of the attacks against GitHub to the CAC's operations. Gohereto send me story tips, feedback and suggestions. There are no silver bullets, but a workforce capable of significant innovation is critical to implementing the strategy. 4. Necessary cookies are absolutely essential for the website to function properly. All rights reserved. The Cyberspace Administration of China (CAC; Chinese: ) is the central internet regulator, censor, oversight, and control agency for the People's Republic of China. "[21], In July 2020, CAC commenced a three-month censorship action on We-Media in China. Fang has done little to alter this image in the CSACs early days. [28], Zhngyng Wnglu nqun h Xnxhu Wiyunhu Bngngsh, Comprehensively Deepening Reforms Commission, Central Commission for Discipline Inspection, Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, Education, Science, Culture and Public Health, Environment Protection and Resources Conservation, State Council (Central People's Government), State-owned Assets Supervision & Administration Commission, State Administration for Sci., Tech. How will the CSAC facilitate the development of Chinas ICT legal and regulatory regime? Who are some of the hottest and most innovative cybersecurity companies headquartered in China? 3. The selection of Fang as head of the association implies that the organization will have, like Fang himself, a hardline, or nationalistic, orientation. The NCCs leading mission is the National Cybersecurity School, whose first class of 1,300 students will graduate in 2022. Previously, the cybersecurity bureaucracy had been fragmented among players and agencies who lacked authority to engage in a meaningful capacity with international counterparts.

Address: Filtri tee 12, Tallinn 10132, Estonia. But the prospects for the NCCs impact on Chinas cyber capabilities are uneven. [23], In 2021, CAC launched a hotline to report online comments against the Chinese Communist Party. [12], The efforts of the CAC have been linked with a broader push by the Xi Jinping administration, characterized by Xiao Qiang, head of China Digital Times, as a "ferocious assault on civil society." These interactions should be watched closely for evidence of how the CSAC is evolving, both in its vision and mandate. The Talent Cultivation and Testing Center has the capacity to teach six thousand trainees each month, more than seventy thousand in a year at full capacity. Despite a deficit of 1.4 million cybersecurity professionals, China is already a near-peer cyber power to the United States. Authored by Mikk Raud, this analysis is part of the NATO CCD COEseries on national organisational modelsfor ensuring cyber security, which summarise national cyber security strategy objectives and outline the division of cyber security tasks and responsibilities between agencies. "This is consistent with previous malicious actions and points to the Cyberspace Administration of China (CAC) being directly involved"[27], A 2020 investigation by ProPublica and The New York Times found that CAC systematically placed censorship restrictions on Chinese media outlets and social media to avoid mentions of the COVID-19 outbreak, mentions of Li Wenliang, and "activated legions of fake online commenters to flood social sites with distracting chatter". 1. The NCC enjoys support from the highest levels of the Chinese Communist Party (CCP). The reports, edited by Kadri Kaska, give an overview of the mandate, tasks and competences of the relevant organisations and of coordination between them. Global spending on cybersecurity products and services is expected to exceed $1 trillion cumulatively from 2017 to 2021. Instead, China must reliably produce attack types for each system targeted. International competition forged Chinas commitment to growing its cyber capabilities.

The CCP has high expectations for the NCC, and policymakers and businesses are making the necessary investments to be successful. The combination of these diverse goals under the umbrella of one association, the CSAC, underscores a trend that started with the creation of the LSG: President Xi is tightly tying together the political bureaucracies overseeing ICT (hardware and software) and digital content (propaganda system). [6][7][8], The office is the majority owner of the China Internet Investment Fund, which has ownership stakes in technology firms such as ByteDance, Weibo Corporation, SenseTime, and Kuaishou. PHOTO: Cybercrime Magazine. By attacking the software, they prove its vulnerability. If the NCC is successful at spurring innovation, the pipeline may ease adoption of indigenous products and facilitate the replacement of foreign technology. [citation needed], According to a draft Cyber Security Law, made public on July 6, 2015, the CAC works with other Chinese regulators to formulate a catalog of "key network equipment" and "specialized network security products" for certification. The views expressed in this article are the authors own and do not necessarily reflect the position of any affiliated organization. Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs. Successive classes of NCC graduates and trainees will slowly fill the ranks of Chinas state-backed hackers and private-sector defenders. The NATO Cooperative Cyber Defence Centre of Excellence, ccdcoe-at-ccdcoe.org Accordingly, all views, positions, and conclusions expressed in this publication should be understood to be solely those of the author(s). Beijing Zhizhangyi Science & Technology Co., Ltd. CCP policymakers hope to see 2,500 graduates each year. Though still under construction, the NCCs first class of graduates will cross the stage in June 2022. 2. CSAC features 257 individual members, including senior representatives from Chinese Internet champions like Alibaba, Chinese network security companies, and influential scientific universities and research institutes, such as the Chinese Academy of Engineering and the Beijing University of Posts and Telecommunications. The Snowden revelations reinforced PLA concerns that foreign technology facilitates espionage. Moving forward, several signposts will point to CSACs overall influence and direction. Citing important Party organs, the report states that leaders have repeatedly made it clear that the National Cybersecurity Base must closely monitor independent innovation () of core cybersecurity technologies, promote Chinese-made independently controllable () replacement plans, and build a secure and controllable information technology system Local officials serve as a pipeline between the NCCs ecosystem and the needs of the Party by targeting nascent technologies. Hacking MFA: How Effective Is Multi-Factor Authentication? The CAC said that Sina Weibo had failed to properly police the comments made by users on the Internet. Big Tech Is Hacking The Skills Shortage In The U.S. Cybersecurity Theoretically Has No Spending Limit, Ransomware Damage Costs To Grow 30 Percent YoY Over The Next Decade, Cybercrime Cost The World $11.4 Million A Minute In 2021. With the creation of the CSAC, the intertwined matrix of Chinese cyber-governance institutions, laws, and policies has a new constituent. In the digital sphere, China stands out in its approach to internet governance, extensive industrial espionage, and increasing military focus on cyberspace operations. The attack would have required the ability to "tap into the backbone of the Chinese Internet. Indeed, they have already begun these engagements, with a recent forum in Moscow where Lu Wei and Fang told a receptive Russian audience that greater cyber sovereignty is needed and a visit to the Information Technology Industry Council (ITI) in Washington, D.C., completed last week. There are no non-Chinese representatives among its initial 257 members.

Japans National Institute for Defense Studies identified three issues Chinas military must overcome to build an effective cyber force: talent, innovation, and indigenization. The length of time it will take to reach full capacity remains unclear. Chinas National Cybersecurity Center (NCC) resides on a 40 km2 plot in Wuhan. Key stakeholders are making investments in research and development (R&D) facilities, talent programs, and the NCCs Incubator. Quite the contrary, in a recent interview about the association, Fang justified favoring Chinese companies over their (possibly) technologically more sophisticated foreign competitors on the grounds that they are more secure since they are bound by local government laws. The NCC will likely bolster Chinas capabilities, making competition in the cyber domain fiercer still. These cookies do not store any personal information. The anti-censorship group GreatFire.org provided data and reports showing man-in-the-middle attacks against major foreign web services, including iCloud, Yahoo, Microsoft, and Google. Its research is nonpartisan and nonproprietary. Besides supporting private-sector innovation, two other components of the NCC support government-focused research. The CAC is also involved in reviewing the procurement of network products or services for national security considerations. But innovation is fickle. In the same way a shortage of pilots would ground planes, Chinas shortage of cybersecurity professionals prevents the military from operating effectively. Data stored outside of China by Chinese companies is also required to undergo CAC approval. China wants to be a cyber powerhouse (). Among the categories of comments that were banned, included were those that "harmed national security," "harmed the nation's honor or interest," "damaged the nation's religious policies," "spread rumors, disturbed public order," and "intentionally using character combinations to avoid censorship. The CCP wants indigenous replacements for foreign software to protect its military and critical infrastructure from foreign interference. U.S. policymakers should expect that Chinas increased capabilities will threaten the U.S. advantage in cyberspace. Second, Chinas current system for innovation in the cyber domain will not meet its strategic goals. A local government report shows that policymakers intend to harvest indigenous innovation from the NCC. At the heart of this mission is the sprawling 40 km2 campus of the National Cybersecurity Center. Chinas Military-Civil Fusion strategy ensures that the Peoples Liberation Army (PLA) can harvest new tools that come from the NCC, regardless of who develops it, which may help China develop asymmetric advantage. [25], The CAC has been accused of assisting in cyber attacks against visitors to Chinese websites. This statement captures a broader trend in Chinas evolving ICT policy environment: linking security with a product or services Chinese origin. Its chair, Fang Binxing, is best known as the Father of the Great Firewall, Chinas Internet censorship and surveillance system; 2. As the pace of new ICT-related laws and regulations picks up this year and next, CSACs role in the build out of this new framework remains unclear. All rights reserved Cybersecurity Ventures 2018. We will focus subsequent commentaries on the politics and implications of these coming regulatory developments. Thus, while the CSAC is currently an organization closed to international stakeholders, its work will very much include regular interaction with these institutions and individuals. Other components indirectly support innovation. Cybercrime Magazine was scheduled to have briefings at the recent RSA Conference USA 2020 in San Francisco with some of the top cybersecurity companies in China. Still, the current shortfall leaves Chinas businesses and infrastructure vulnerable to attack, while spreading thin its offensive talent. Will the CSAC members from private industry, for example, have an opportunity to use this as a new channel to shape policy? Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. What will be the relationship between CSAC and CAC? For information about this list, contact the editors at Cybersecurity Ventures. [2][3][4][5] The office also holds the administrative title of the party's Office of the Central Cyberspace Affairs Commission (Chinese: ). All rights reserved Cybersecurity Ventures 2022, 2022 Cybersecurity Almanac: 100 Facts, Figures, Predictions & Statistics, Cybercrime Costs $10.5 Trillion Annually by 2025, Up from $6 Trillion in 2021, Ransomware Hits Every 2 Seconds In 2031, Up from 11 Seconds in 2021, Cybersecurity Spending To Be $1.75 Trillion Cumulatively, 2021 to 2025, 3.5 Million Unfilled Cybersecurity Jobs By 2021, Up from 1 Million in 2014, Cyberinsurance Market To Reach $34 Billion By 2031, Up From 8.5 Billion In 2021, Cyberinsurance Market To Grow 15 Percent YoY Over The Next Decade. It is under direct jurisdiction of the Central Cyberspace Affairs Commission, a party institution subordinate to the Central Committee of the Chinese Communist Party. In the attack, ads hosted on Baidu were able to leverage computers visiting from outside China, redirecting their traffic to overload the servers of GitHub. The Partys Cyberspace Affairs Commission established a committee to oversee the NCCs operations and policies, giving it a direct line to Beijing. We also use third-party cookies that help us analyze and understand how you use this website. With the creation of the LSG and CAC, Beijing has for the first time an institution that can engage in international cyber diplomacy at more senior levels. In particular, Chinas perception of disproportionate Western dominance in shaping the future of the global internet leads the nation to promote sovereignty-based internet governance that allows states to regulate cyberspace as they wish. Two of the NCCs 10 components directly target talent cultivation. Gohereto read all of my blogs and articles covering cybersecurity. Reproduction in whole or in part in any form or medium without expressed written permission of Cybersecurity Ventures is prohibited. The campus, which China began constructing in 2017 and is still building, includes seven centers for research, talent cultivation, and entrepreneurship; two government-focused laboratories; and a National Cybersecurity School. $1 trillion cumulatively from 2017 to 2021. Both were unable to attend due to theCoronavirus outbreak. [24] In 2022, CAC published rules that mandate that all online comments must be pre-reviewed before being published. The scope of the reports encompasses the mandates of political and strategic cyber security governance; national cyber incident management coordination; military cyber defence; and cyber aspects of crisis prevention and crisis management. Cybersecurity firms are responding to the cybercrime epidemic and labor crunch with a growing portfolio of solutions. This category only includes cookies that ensures basic functionalities and security features of the website. The NCC hosts two non-private laboratories, the Combined Cybersecurity Research Institute and the Offense-Defense Lab. It is mandatory to procure user consent prior to running these cookies on your website. Will the CSAC be opened to international representatives? Such rumors included claims that blasts killed 1,000 people, or that there was looting, or leadership ructions as a result of the blast. [22], In December 2020, CAC removed 105 apps, including that of Tripadvisor, from China's app stores that were deemed "illegal" in a move to "clean up China's internet". Both institutions likely conduct cybersecurity research for government use (see component analysis below). & Industry for National Defense, CCP Central Commission for Discipline Inspection, Central Leading Group for Inspection Work, Commission for Discipline Inspection of the Central Military Commission, Independent Commission Against Corruption (Hong Kong), Judicial Administrative Organs People's Police, Office for Safeguarding National Security of the CPG in the HKSAR, Central Leading Group for Propaganda and Ideology, Central Guidance Commission on Building Spiritual Civilization, National Press and Publication Administration, National Radio and Television Administration, Central Leading Group on Hong Kong and Macau Affairs, Association for Relations Across the Taiwan Straits, International Development Cooperation Agency, International Military Cooperation Office, State Administration of Foreign Experts Affairs, Central Committee of the Chinese Communist Party, "Cyberspace controls set to strengthen under China's new internet boss", "China's 'great firewall' just got taller", "China drafts rules to govern its booming livestreaming sales industry", "China orders Baidu to clean up low-brow content", "Chinese forum exposes cracks in the internet that could splinter wide open", "Buying Silence: The Price of Internet Censorship in China", Cyberspace Administration of China launches official website, Web of Laws: How China's new Cyberspace Administration is securing its grip on the internet, "China's communist authorities are tightening their grip on the private sector", "How the CAC became Chinese tech's biggest nightmare", "Congressional-Executive Commission on China (CECC) Hearing: Urging China's President Xi Jinping to Stop State-Sponsored Human Rights Abuses", "Seizing Weibo's "Commanding Heights" Through Bureaucratic Re-centralization", "China Cracks Down on Websites Accused of Spreading 'Rumors' About the Tianjin Blast", "China's Internet Censorship Anthem Is Revealed, Then Deleted", "China Quietly Targets U.S. Tech Companies in Security Reviews", "China Toughens Procurement Rules for Tech Equipment", "The State Cyberspace Administration of the People's Republic of China launched the 2020 "Qinglang" special action for a period of 8 months", "To safeguard national security, it is time for China to build up nuclear deterrent", "China orders removal of 105 apps, including TripAdvisor", "China launches hotline for netizens to report 'illegal' history comments", "Now China wants to censor online comments", "An Open Letter to Lu Wei and the Cyberspace Administration of China | GreatFire.org", "Leaked Documents Show How China's Army of Paid Internet Trolls Helped Censor the Coronavirus", China Internet Network Information Center, Ministry of Industry and Information Technology, Committee for Safeguarding National Security of the Hong Kong Special Administrative Region, Independent Commission Against Corruption, Campaign to Suppress Counterrevolutionaries, Strike Hard Campaign Against Violent Terrorism, Information operations and information warfare, List of Hong Kong national security cases, Residential Surveillance at a Designated Location, Institution for Party History and Literature Research, State Council of the People's Republic of China, Ministers in charge of ministries/commissions, https://en.wikipedia.org/w/index.php?title=Cyberspace_Administration_of_China&oldid=1094340523, Infoboxes without native name language parameter, Articles containing Chinese-language text, Articles containing simplified Chinese-language text, Articles with unsourced statements from November 2021, Creative Commons Attribution-ShareAlike License 3.0, Supra-ministerial policy coordination and consultation body, Cyberspace policy and regulatory oversight, This page was last edited on 22 June 2022, at 01:41.