Cybersecurity revisited, or are best practices really best? – WS 05 2016: Difference between revisions
Line 81: | Line 81: | ||
== Session twitter hashtag == | == Session twitter hashtag == | ||
Hashtag: | Hashtag: #EuroDIGsecurity | ||
[[Category:Sessions]][[Category:Sessions 2016]][[Category:Security 2016]][[Category:Security]] | [[Category:Sessions]][[Category:Sessions 2016]][[Category:Security 2016]][[Category:Security]] |
Revision as of 16:32, 17 May 2016
Please use your own words to describe this session. You may use external references, websites or publications as a source of information or inspiration, if you decide to quote them, please clearly specify the source.
To follow the current discussion on this topic, see the discussion tab on the upper left side of this page
This session is about good practice in cybersecurity, but we want to hear your case studies too: do they give you a warm fuzzy feeling, or a cold prickly feeling?
There’s an elephant in the room, but that’s OK… we’ve got it under surveillance.
Session description
It’s clear that cybersecurity threats can cross national boundaries; can cybersecurity defences? What are the challenges in doing so, and is anyone addressing them successfully?
Technologically, the direction of travel seems clear: it is easier to collect, share and process personal data than ever before, and to do so in greater quantities. Whole sectors of the economy are based on that principle. But how much does the technology improve our security, and how much does it erode our privacy?
And that elephant in the room: are cybersecurity concerns being used to undermine our fundamental rights?
OK - let’s acknowledge that cybersecurity has many stakeholders, and their interests often conflict. Is there a collaborative approach that can lead to better outcomes for all?
Keywords
Cybersecurity ; Best Practice ; Privacy ; Risk ; Collaborative Security
Format
- Moderator's opening remarks, to set context
- Questions and best practice examples from the audience
- Comment and responses from the panellists
- Interactive Q&A (everyone)
- Moderator's wrap-up and the "Wishing Tree"
Further reading
The Internet Society's guide to Collaborative Security: http://www.internetsociety.org/collaborativesecurity
People
Name, institution, country of residence
- Focal Point
Focal points take over the responsibility and lead of the session organization. Focal points are kindly requested to observe EuroDIG's session principles. Focal points work in close contact and cooperation with the programme director.
- Key participants
Until 15 May 2016. Key participants (workshop) are experts willing to provide their knowledge during a session – not necessarily on stage. Key participants should contribute to the session planning process and keep statements short and punchy during the session. Panellist (plenary) will be selected and assigned by the org team, ensuring a stakeholder balanced dialogue also considering gender and geographical balance. Panellists should contribute to the session planning process and keep statements short and punchy during the session. Please provide short CV’s of the participants involved in your session at the Wiki or link to another source.
- Moderator
Until 15 May 2016. The moderator is the facilitator of the session at the event. Moderators are responsible for including the audience and encouraging a lively interaction among all session attendants. Please make sure the moderator takes a neutral role and can balance between all speakers.
- Please provide short CV of the moderator of your session at the Wiki or link to another source.
- Remote moderator
Until 15 May 2016. The remote moderator is in charge of facilitating participation via digital channels such as WebEx and social medial (Twitter, facebook). Remote moderators monitor and moderate the social media channels and the participants via WebEX and forward questions to the session moderator. Please contact the EuroDIG secretariat if you need help to find a remote moderator.
- Org team
Organising team is a group of people shaping the session. Every interested individual can become a member of an organising team (org team).
- Reporter
Until 15 May 2016. The reporter takes notes during the session and formulates 3 (max. 5) bullet points at the end of each session that:
- are summarised on a slide and presented to the audience at the end of each session
- relate to the particular session and to European Internet governance policy
- are forward looking and propose goals and activities that can be initiated after EuroDIG (recommendations)
- are in (rough) consensus with the audience
- are to be submitted to the secretariat within 48 hours after the session took place
Please provide short CV of the reporter of your session at the Wiki or link to another source and contact the EuroDIG secretariat if you need help to find a reporter.
Current discussion
See the discussion tab on the upper left side of this page.
Conference call. Schedules and minutes
- dates for virtual meetings or coordination calls
- short summary of calls or email exchange
- be as open and transparent as possible in order to allow others to get involved and contact you
- use the wiki not only as the place to publish results but also to summarize and publish the discussion process
Mailing list
ws5@eurodig.org
Remote participation
Final report
Deadline 2016
Session twitter hashtag
Hashtag: #EuroDIGsecurity