List of proposals for EuroDIG 2023: Difference between revisions

From EuroDIG Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 73: Line 73:
| 19 || [[consolidated_programme_2023#topic2_sub3_23 | Topic 2 / Subtopic 3]] || Chris Buckridge || RIPE NCC || Technical community || || <span class="table-squares-23 ig-eco">n</span> || || || || || || <span class="table-squares-23 t-a-o">n</span> || Is the UN commitment to a multistakeholder approach to Internet governance (as enshrined in the Tunis Agenda) at risk as we move towards the WSIS 20-year review? Is there a need to better shape, define and evolve multistakeholder processes and modalities for Internet governance?
| 19 || [[consolidated_programme_2023#topic2_sub3_23 | Topic 2 / Subtopic 3]] || Chris Buckridge || RIPE NCC || Technical community || || <span class="table-squares-23 ig-eco">n</span> || || || || || || <span class="table-squares-23 t-a-o">n</span> || Is the UN commitment to a multistakeholder approach to Internet governance (as enshrined in the Tunis Agenda) at risk as we move towards the WSIS 20-year review? Is there a need to better shape, define and evolve multistakeholder processes and modalities for Internet governance?
|- id="prop_20"
|- id="prop_20"
| 20 || [[consolidated_programme_2023#topic1_sub2_23 | Topic 1 / Subtopic 2 ]] || Karen Mulberry || IEEE || Technical community || || || || || || || <span class="table-squares-23 s-a-c">n</span> || || Cybersecurity by Design - Building in Resilience Cloud security technologies are procedures and technologies designed to address external and internal threats to an organisation’s security. Despite ongoing technology improvements, gaps in cloud forensics have been found involving a number of stakeholders, including cloud service providers, cloud application developers, and cloud service users. Considering cybersecurity needs in the design stage of products or services is critical, as is convening all of the affected stakeholders in the process. The standards creation process can help bring together a wide variety of stakeholders to have the conversations needed, and to contribute to structuring the process of making systems safe and trustworthy for all. This is an especially pertinent topic for Europe, as it recently proposed in the EU Cybersecurity Act, which strengthens the EU Agency for cybersecurity (ENISA) and establishes a cybersecurity certification framework for products and services. https://engagestandards.ieee.org/cybersecurity.html
| 20 || [[consolidated_programme_2023#topic3_sub2_23 | Topic 3 / Subtopic 2 ]] || Karen Mulberry || IEEE || Technical community || || || || || || || <span class="table-squares-23 s-a-c">n</span> || || Cybersecurity by Design - Building in Resilience Cloud security technologies are procedures and technologies designed to address external and internal threats to an organisation’s security. Despite ongoing technology improvements, gaps in cloud forensics have been found involving a number of stakeholders, including cloud service providers, cloud application developers, and cloud service users. Considering cybersecurity needs in the design stage of products or services is critical, as is convening all of the affected stakeholders in the process. The standards creation process can help bring together a wide variety of stakeholders to have the conversations needed, and to contribute to structuring the process of making systems safe and trustworthy for all. This is an especially pertinent topic for Europe, as it recently proposed in the EU Cybersecurity Act, which strengthens the EU Agency for cybersecurity (ENISA) and establishes a cybersecurity certification framework for products and services. https://engagestandards.ieee.org/cybersecurity.html
|- id="prop_21"
|- id="prop_21"
| 21 || [[consolidated_programme_2023#topic1_sub2_23 | Topic 1 / Subtopic 2 ]] || Karen Mulberry || IEEE || Technical community || || || || || || || <span class="table-squares-23 s-a-c">n</span> || || Trust, Authorization and Cybersecurity Risks – Defining the Digital Future As Europe works to bolster the pending Cyber Resilience Act, including rules to ensure more secure hardware and software products, cloud computing becomes a critical component, including the need for authorization decisions based on projected cyber risk and authentication-based trust factors; defining security guardrails around identity, platform, and application-level security in remote access scenarios; and addressing how to dynamically alter security and auditing controls based on importance of data, the environment context, and the level of risk in authorised activities. Common technical standards can help implement the draft act. https://standards.ieee.org/industry-connections/cybersecurity-agile-cloud-computing/
| 21 || [[consolidated_programme_2023#topic3_sub2_23 | Topic 3 / Subtopic 2 ]] || Karen Mulberry || IEEE || Technical community || || || || || || || <span class="table-squares-23 s-a-c">n</span> || || Trust, Authorization and Cybersecurity Risks – Defining the Digital Future As Europe works to bolster the pending Cyber Resilience Act, including rules to ensure more secure hardware and software products, cloud computing becomes a critical component, including the need for authorization decisions based on projected cyber risk and authentication-based trust factors; defining security guardrails around identity, platform, and application-level security in remote access scenarios; and addressing how to dynamically alter security and auditing controls based on importance of data, the environment context, and the level of risk in authorised activities. Common technical standards can help implement the draft act. https://standards.ieee.org/industry-connections/cybersecurity-agile-cloud-computing/
|- id="prop_22"
|- id="prop_22"
| 22 || [[consolidated_programme_2023#topic2_sub1_23 | Topic 2 / Subtopic 1 ]] <br /> [[consolidated_programme_2023#topic2_sub2_23 | Topic 2 / Subtopic 2 ]] || Vittorio Bertola || Open-Xchange || Private sector || || <span class="table-squares-23 ig-eco">n</span> || <span class="table-squares-23 hu-ri">n</span> || <span class="table-squares-23 i-a-e">n</span> || || || || || - European regulation and Internet fragmentation In the last couple of years, the calls against "Internet fragmentation" have been multiplying; "avoiding fragmentation" has even become a theme at the IGF. However, there are parties that consider the new wave of European Internet regulation, and sometimes even the GDPR, as a form of fragmentation, as they impose localisation requirements, break data flows to countries that do not align with the GDPR, and create content control and moderation requirements that push the development of EU-specific services. Is this correct or not? Is national and regional regulation a form of fragmentation, and when: always, never, under some conditions? Are there any principles that could be suggested to promote good regulation that protects user rights while ensuring alignment with local values and jurisdictions?
| 22 || [[consolidated_programme_2023#topic2_sub1_23 | Topic 2 / Subtopic 1 ]] <br /> [[consolidated_programme_2023#topic2_sub2_23 | Topic 2 / Subtopic 2 ]] || Vittorio Bertola || Open-Xchange || Private sector || || <span class="table-squares-23 ig-eco">n</span> || <span class="table-squares-23 hu-ri">n</span> || <span class="table-squares-23 i-a-e">n</span> || || || || || - European regulation and Internet fragmentation In the last couple of years, the calls against "Internet fragmentation" have been multiplying; "avoiding fragmentation" has even become a theme at the IGF. However, there are parties that consider the new wave of European Internet regulation, and sometimes even the GDPR, as a form of fragmentation, as they impose localisation requirements, break data flows to countries that do not align with the GDPR, and create content control and moderation requirements that push the development of EU-specific services. Is this correct or not? Is national and regional regulation a form of fragmentation, and when: always, never, under some conditions? Are there any principles that could be suggested to promote good regulation that protects user rights while ensuring alignment with local values and jurisdictions?

Revision as of 00:27, 1 March 2023

During the call for issues for EuroDIG we received 60 submissions in the period from 12 September till 31 December 2022. You can see the breakdown of proposals here and download the list of proposals as of 31 December 2022, 24:00 CET as pdf file. The list below is a rolling document where proposals will be added during the review period. Proposals marked with an asterisk * have been added after 31 Dec. 2022.

Categories are coloured as follows: (up to three categories per proposal could be selected)

 Access & literacy   Development of IG ecosystem   Human rights & data protection   Innovation and economic issues   Media & content   Cross cutting / other issues   Security and crime   Technical & operational issues 

You may sort the table by clicking at the head of the column. To restore the original sorting, just reload the page.