Cybersecurity revisited, or are best practices really best? – WS 05 2016: Difference between revisions
(→People) |
(→People) |
||
Line 40: | Line 40: | ||
Name, institution, country of residence | Name, institution, country of residence | ||
*'''Focal Point''' | *'''Focal Point''' | ||
Robin Wilton, Internet Society, UK | Robin Wilton, Internet Society, UK | ||
*'''Key participants''' | *'''Key participants''' | ||
* Nigel Hickson, ICANN, UK | |||
* Lea Kaspar, Global Partners Digital, "rootless cosmopolitan" | ** Nigel Hickson, ICANN, UK | ||
* Rights organisation TBC | ** Lea Kaspar, Global Partners Digital, "rootless cosmopolitan" | ||
** Rights organisation TBC | |||
*'''Moderator''' | *'''Moderator''' | ||
Olaf Kolkman, Internet Society, Netherlands and departure lounges | Olaf Kolkman, Internet Society, Netherlands and departure lounges | ||
*'''Remote moderator''' | *'''Remote moderator''' | ||
Fotjon Kosta, Ministry of Energy and Industry, Albania | Fotjon Kosta, Ministry of Energy and Industry, Albania | ||
Revision as of 16:46, 17 May 2016
Please use your own words to describe this session. You may use external references, websites or publications as a source of information or inspiration, if you decide to quote them, please clearly specify the source.
To follow the current discussion on this topic, see the discussion tab on the upper left side of this page
This session is about good practice in cybersecurity, but we want to hear your case studies too: do they give you a warm fuzzy feeling, or a cold prickly feeling?
There’s an elephant in the room, but that’s OK… we’ve got it under surveillance.
Session description
It’s clear that cybersecurity threats can cross national boundaries; can cybersecurity defences? What are the challenges in doing so, and is anyone addressing them successfully?
Technologically, the direction of travel seems clear: it is easier to collect, share and process personal data than ever before, and to do so in greater quantities. Whole sectors of the economy are based on that principle. But how much does the technology improve our security, and how much does it erode our privacy?
And that elephant in the room: are cybersecurity concerns being used to undermine our fundamental rights?
OK - let’s acknowledge that cybersecurity has many stakeholders, and their interests often conflict. Is there a collaborative approach that can lead to better outcomes for all?
Keywords
Cybersecurity ; Best Practice ; Privacy ; Risk ; Collaborative Security
Format
The key message here is: please come ready to take part.
This topic reaches into the lives of all of us: we want to hear your perspective and, above all, your examples of good (and not so good) practice.
- Moderator's opening remarks, to set context
- Questions and best practice examples from the audience
- Comment and responses from the panellists
- Interactive Q&A (everyone)
- Moderator's wrap-up and the "Wishing Tree"
Further reading
The Internet Society's guide to Collaborative Security: http://www.internetsociety.org/collaborativesecurity
People
Name, institution, country of residence
- Focal Point
Robin Wilton, Internet Society, UK
- Key participants
- Nigel Hickson, ICANN, UK
- Lea Kaspar, Global Partners Digital, "rootless cosmopolitan"
- Rights organisation TBC
- Moderator
Olaf Kolkman, Internet Society, Netherlands and departure lounges
- Remote moderator
Fotjon Kosta, Ministry of Energy and Industry, Albania
- Reporter
TBC The reporter will take notes during the session and formulate 3 to 5 bullet points that:
- are summarised on a slide and presented to the audience at the end of the session
- relate to the session and to European Internet governance policy
- are forward looking and propose goals and activities that can be initiated after EuroDIG (recommendations)
- are in (rough) consensus with the audience
- are to be submitted to the secretariat within 48 hours after the session took place
Current discussion
See the discussion tab on the upper left side of this page.
Conference call. Schedules and minutes
- dates for virtual meetings or coordination calls
- short summary of calls or email exchange
- be as open and transparent as possible in order to allow others to get involved and contact you
- use the wiki not only as the place to publish results but also to summarize and publish the discussion process
Mailing list
ws5@eurodig.org
Remote participation
Final report
Deadline 2016
Session twitter hashtag
Hashtag: #EuroDIGsec