WS 5: Cybersecurity revisited, or are best practices really best?
Please use your own words to describe this session. You may use external references, websites or publications as a source of information or inspiration, if you decide to quote them, please clearly specify the source.
To follow the current discussion on this topic, see the discussion tab on the upper left side of this page
This session is about good practice in cybersecurity, but we want to hear your case studies too: do they give you a warm fuzzy feeling, or a cold prickly feeling?
There’s an elephant in the room, but that’s OK… we’ve got it under surveillance.
It’s clear that cybersecurity threats can cross national boundaries; can cybersecurity defences? What are the challenges in doing so, and is anyone addressing them successfully?
Technologically, the direction of travel seems clear: it is easier to collect, share and process personal data than ever before, and to do so in greater quantities. Whole sectors of the economy are based on that principle. But how much does the technology improve our security, and how much does it erode our privacy?
And that elephant in the room: are cybersecurity concerns being used to undermine our fundamental rights?
OK - let’s acknowledge that cybersecurity has many stakeholders, and their interests often conflict. Is there a collaborative approach that can lead to better outcomes for all?
Cybersecurity ; Best Practice ; Privacy ; Risk ; Collaborative Security
The key message here is: please come ready to take part.
This topic reaches into the lives of all of us: we want to hear your perspective and, above all, your examples of good (and not so good) practice.
- Moderator's opening remarks, to set context
- Questions and best practice examples from the audience
- Comment and responses from the panellists
- Interactive Q&A (everyone)
- Moderator's wrap-up and the "Wishing Tree"
- Focal Point : Robin Wilton, Internet Society, UK
- Key participants
- Prof. Ian Brown, Oxford Internet Institute, UK
- Prof. Brown is an accomplished researcher and expert in cybersecurity policy and technology issues. He is a Principal Investigator for the Global Cybersecurity Capacity Centre at Oxford Martin School.
- Nigel Hickson, ICANN, UK
- Nigel is ICANN's Vice President for UN and IGO engagement, and is responsible for ICANN's public policy at the European level.
- Lea Kaspar, Global Partners Digital, "rootless cosmopolitan"
- Lea is Head of Programmes and International Policy at Global Partners Digital - she works at the intersection of international affairs, digital communications, and human rights.
- Alexandru Frunza, Council of Europe, France
- Alexandru has an impressive law-enforcement background in both theory and practice, having served in drug-trafficking and cybercrime enforcement and in public prosecutors' offices.
- Remote moderator: Fotjon Kosta, Ministry of Energy and Industry, Albania
- Org team
Nertil Berdufi, "Hena e Plote" BEDER University, Albania
- Reporter: TBC
The reporter will take notes during the session and formulate 3 to 5 bullet points that:
- are summarised on a slide and presented to the audience at the end of the session
- relate to the session and to European Internet governance policy
- are forward looking and propose goals and activities that can be initiated after EuroDIG (recommendations)
- are in (rough) consensus with the audience
- are to be submitted to the secretariat within 48 hours after the session took place
See the discussion tab on the upper left side of this page.
Conference call. Schedules and minutes
- dates for virtual meetings or coordination calls
- short summary of calls or email exchange
- be as open and transparent as possible in order to allow others to get involved and contact you
- use the wiki not only as the place to publish results but also to summarize and publish the discussion process
- People tend to cluster together and collaborate within trusted communities, because with a trusted relationship something can be done. How to broaden this cooperation by binding with other clusters/communities?
- We need to collaborate to get things done, and the essential point is then to create trust between stakeholder groups: successful examples were when battling spam and cooperation between CERTS and LEA’s. It can be done.
- Diplomatic communities (with a so called ’military tradition’) and technical communities often mean something completely different when talking about security. There is a massive gap. But they are talking to each other and there certainly is an intention to continue the dialogue.
- How to keep the different ‘clusters’ open, where issues are discussed? More transparency is necessary when it comes public-private-partnerships: all stakeholders should (be able to) participate.
- There is a multitude of platforms and initiatives working on cybersecurity, all spending money and doing capacity building: but are they indeed open and transparent, and what effect do they have and how to bring them together? This is an open question…
Session twitter hashtag
Hashtag: #eurodig16 #EuroDIGsec