The future of cybersecurity in Europe – from state of play to state of art – WS 05 follow up 2016

From EuroDIG Wiki
Revision as of 15:29, 3 July 2016 by Lorena (talk | contribs)
Jump to navigation Jump to search

Please use your own words to describe this session. You may use external references, websites or publications as a source of information or inspiration, if you decide to quote them, please clearly specify the source.


To follow the current discussion on this topic, see the discussion tab on the upper left side of this page

Session teaser

Cybersecurity: no-one wins by fighting yesterday’s battle. How can we look beyond current practice and consider the challenges ahead, in terms of trust, regulation and governance?

Session description

This session will build on the first workshop’s examples of good (and not so good) practice, looking ahead to the challenges that should be concerning us.

  • What are the roots of trust in online services; what destroys them, and what makes them stronger?
  • How do security and privacy relate to each other, and what kind of governance regime can optimise for both?
  • What can we learn from previous attempts at governance in this area?
  • What kind of governance positions us best to respond to the unexpected? Is one approach more "agile" than another?

Keywords

cybersecurity, security, trust, threats, governance, agility, privacy

Format

Just like the preceding WS5 session, we want to give your input pride of place, so please come ready to play an active role:

  • What impact does cybersecurity and its governance have on you, and your trust in the Internet?
  • Do you think there is a "balance" to be struck between security and privacy, or is it not a zero-sum game?

The structure of the session will be as follows:

  • Moderator's opening remarks, to set context
  • Questions and best practice examples from the audience
  • Comment and responses from the panellists
  • Interactive Q&A (everyone)
  • Moderator's wrap-up, and a second visit to the "Wishing Tree"

Further reading

People

Name, institution, country of residence

  • Focal Point

Robin Wilton, Internet Society, UK

  • Key participants
    • Dr. Louise Bennett, British Computer Society and Vivas Ltd.
      • Louise is the Chair of the BCS Security Community of Expertise, and a Director of vivas ltd, a consultancy specialising in governance and risk
    • Dr. Konstantinos Moulinos, ENISA
      • Konstantinos is an expert in network and information security (NIS), and manages ENISA's smart grid security project
    • Maarit Palovirta, Internet Society
      • Maarit is the Internet Society's European Regional Affairs manager, with a particular focus on central and Eastern Europe
    • Dr. Rainer Stentzel, German Federal Ministry of the Interior, task force on data protection reform
      • Rainer has a background in the policy and administration of law-enforcement, including a Trans-Atlantic posting as liaison officer to the US Department of Homeland Security.
  • Moderators

Olaf Kolkman, Internet Society, Netherlands (brief biography)

Dr. Tatiana Tropina, Max Planck Institute for Foreign and International Criminal Law, Germany (brief biography)

  • Remote moderator

Fotjon Kosta, Ministry of Energy and Industry, Albania

  • Org team

Nertil Berdufi, "Hena e Plote" BEDER University, Albania

  • Reporter

TBC

Current discussion

See the discussion tab on the upper left side of this page.

Conference call. Schedules and minutes

  • dates for virtual meetings or coordination calls
  • short summary of calls or email exchange
  • be as open and transparent as possible in order to allow others to get involved and contact you
  • use the wiki not only as the place to publish results but also to summarize and publish the discussion process

Mailing list

Contact: ws5@eurodig.org

Video record

Transcript

Transcript: The future of cybersecurity in Europe - from state of play to state of art

Messages

  • People tend to cluster together and collaborate within trusted communities, because with a trusted relationship something can be done. How to broaden this cooperation by binding with other clusters/communities?
  • We need to collaborate to get things done, and the essential point is then to create trust between stakeholder groups: successful examples were when battling spam and cooperation between CERTS and LEA’s. It can be done.
  • Diplomatic communities (with a so called ’military tradition’) and technical communities often mean something completely different when talking about security. There is a massive gap. But they are talking to each other and there certainly is an intention to continue the dialogue.
  • How to keep the different ‘clusters’ open, where issues are discussed? More transparency is necessary when it comes public-private-partnerships: all stakeholders should (be able to) participate.
  • There is a multitude of platforms and initiatives working on cybersecurity, all spending money and doing capacity building: but are they indeed open and transparent, and what effect do they have and how to bring them together? This is an open question…

Session twitter hashtag

Hashtag: #EuroDIGsec