Cybersecurity revisited, or are best practices really best? – WS 05 2016: Difference between revisions

From EuroDIG Wiki
Jump to navigation Jump to search
Line 77: Line 77:
[https://arkadin-emea.adobeconnect.com/telemak_140436_eurodig_studio201 Find the link here]
[https://arkadin-emea.adobeconnect.com/telemak_140436_eurodig_studio201 Find the link here]


== Final report ==   
== Messages ==   
Deadline 2016
Deadline 2016



Revision as of 09:19, 17 June 2016


Please use your own words to describe this session. You may use external references, websites or publications as a source of information or inspiration, if you decide to quote them, please clearly specify the source.


To follow the current discussion on this topic, see the discussion tab on the upper left side of this page

Session teaser

This session is about good practice in cybersecurity, but we want to hear your case studies too: do they give you a warm fuzzy feeling, or a cold prickly feeling?

There’s an elephant in the room, but that’s OK… we’ve got it under surveillance.

Session description

It’s clear that cybersecurity threats can cross national boundaries; can cybersecurity defences? What are the challenges in doing so, and is anyone addressing them successfully?

Technologically, the direction of travel seems clear: it is easier to collect, share and process personal data than ever before, and to do so in greater quantities. Whole sectors of the economy are based on that principle. But how much does the technology improve our security, and how much does it erode our privacy?

And that elephant in the room: are cybersecurity concerns being used to undermine our fundamental rights?

OK - let’s acknowledge that cybersecurity has many stakeholders, and their interests often conflict. Is there a collaborative approach that can lead to better outcomes for all?

Keywords

Cybersecurity ; Best Practice ; Privacy ; Risk ; Collaborative Security

Format

The key message here is: please come ready to take part.

This topic reaches into the lives of all of us: we want to hear your perspective and, above all, your examples of good (and not so good) practice.

  • Moderator's opening remarks, to set context
  • Questions and best practice examples from the audience
  • Comment and responses from the panellists
  • Interactive Q&A (everyone)
  • Moderator's wrap-up and the "Wishing Tree"

Further reading

The Internet Society's guide to Collaborative Security

People

  • Focal Point : Robin Wilton, Internet Society, UK
  • Key participants
  • Prof. Ian Brown, Oxford Internet Institute, UK
Prof. Brown is an accomplished researcher and expert in cybersecurity policy and technology issues. He is a Principal Investigator for the Global Cybersecurity Capacity Centre at Oxford Martin School.
  • Nigel Hickson, ICANN, UK
Nigel is ICANN's Vice President for UN and IGO engagement, and is responsible for ICANN's public policy at the European level.
  • Lea Kaspar, Global Partners Digital, "rootless cosmopolitan"
Lea is Head of Programmes and International Policy at Global Partners Digital - she works at the intersection of international affairs, digital communications, and human rights.
  • Alexandru Frunza, Council of Europe, France
Alexandru has an impressive law-enforcement background in both theory and practice, having served in drug-trafficking and cybercrime enforcement and in public prosecutors' offices.
  • Moderator:
Olaf Kolkman, Internet Society, Netherlands and departure lounges (brief biography)
Dr. Tatiana Tropina, Max Planck Institute for Foreign and International Criminal Law, Germany (brief biography)
  • Remote moderator: Fotjon Kosta, Ministry of Energy and Industry, Albania
  • Org team

Nertil Berdufi, "Hena e Plote" BEDER University, Albania

  • Reporter: TBC

The reporter will take notes during the session and formulate 3 to 5 bullet points that:

  1. are summarised on a slide and presented to the audience at the end of the session
  2. relate to the session and to European Internet governance policy
  3. are forward looking and propose goals and activities that can be initiated after EuroDIG (recommendations)
  4. are in (rough) consensus with the audience
  5. are to be submitted to the secretariat within 48 hours after the session took place

Current discussion

See the discussion tab on the upper left side of this page.

Conference call. Schedules and minutes

  • dates for virtual meetings or coordination calls
  • short summary of calls or email exchange
  • be as open and transparent as possible in order to allow others to get involved and contact you
  • use the wiki not only as the place to publish results but also to summarize and publish the discussion process

Mailing list

ws5@eurodig.org

Remote participation

Find the link here

Messages

Deadline 2016

Session twitter hashtag

Hashtag: #eurodig16 #EuroDIGsec