27.12.2012 Views

Challenges in Cybersecurity Risks, Strategies, and ... - Unidir

Challenges in Cybersecurity Risks, Strategies, and ... - Unidir

Challenges in Cybersecurity Risks, Strategies, and ... - Unidir

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CONFERENCE OVERVIEW<br />

“<strong>Challenges</strong> <strong>in</strong> <strong>Cybersecurity</strong> – <strong>Risks</strong>, <strong>Strategies</strong>, <strong>and</strong> Confidence-Build<strong>in</strong>g” took place on<br />

December 13 <strong>and</strong> 14, 2011, at the Federal Foreign Office, Berl<strong>in</strong>, Germany. The conference<br />

focused on address<strong>in</strong>g the challenges <strong>and</strong> issues revolv<strong>in</strong>g around the emerg<strong>in</strong>g doma<strong>in</strong> of<br />

cybersecurity. It brought together key stakeholders <strong>and</strong> decision-makers from civil society,<br />

<strong>in</strong>dustry, multiple academic discipl<strong>in</strong>es, <strong>and</strong> governments. They took part <strong>in</strong> an <strong>in</strong>-depth<br />

assessment <strong>and</strong> discussion of fundamental problems, evolv<strong>in</strong>g issues, future national or<br />

<strong>in</strong>ternational regulatory regimes, <strong>and</strong> technical <strong>and</strong> non-technical approaches to cybersecurity.<br />

Explor<strong>in</strong>g options for confidence- <strong>and</strong> transparency-build<strong>in</strong>g measures <strong>in</strong> cyberspace was a key<br />

goal.<br />

In particular, the two-day meet<strong>in</strong>g aimed to:<br />

(1) develop jo<strong>in</strong>t approaches to keep the <strong>in</strong>ternet as an unrestricted global commons <strong>and</strong> a<br />

forum for free speech <strong>and</strong> commerce,<br />

(2) underst<strong>and</strong> exist<strong>in</strong>g <strong>and</strong> planned strategies, measures <strong>and</strong> approaches to protect<br />

cyberspace,<br />

(3) identify emerg<strong>in</strong>g risks <strong>and</strong> vulnerabilities <strong>in</strong> the cybersphere, rang<strong>in</strong>g from disruptions of<br />

critical <strong>in</strong>frastructures to economical <strong>and</strong> military espionage <strong>and</strong> sabotage <strong>and</strong> address<strong>in</strong>g<br />

technical <strong>and</strong> regulatory steps to measure <strong>and</strong> confront these risks,<br />

(4) explore the best ways to develop pr<strong>in</strong>ciples, norms <strong>and</strong> rules for appropriate <strong>and</strong><br />

responsible state behavior <strong>in</strong> cyberspace, <strong>in</strong>clud<strong>in</strong>g exist<strong>in</strong>g <strong>and</strong> future <strong>in</strong>ternational<br />

norms, laws, <strong>and</strong> measures to regulate state behavior <strong>in</strong> times of conflict,<br />

(5) exam<strong>in</strong>e the need to adapt <strong>in</strong>ternational humanitarian law to deal specifically with<br />

cyberwarfare,<br />

(6) strengthen <strong>in</strong>ternational efforts to keep cyberspace open <strong>and</strong> safe for all via enhanced<br />

transparency, confidence-build<strong>in</strong>g <strong>and</strong> security, <strong>in</strong>clud<strong>in</strong>g via the Organization for<br />

Security <strong>and</strong> Co-operation <strong>in</strong> Europe (OSCE), the Association of Southeast Asian Nations<br />

(ASEAN) Regional Forum (ARF) <strong>and</strong> the United Nations (UN).<br />

These issues were addressed <strong>in</strong> six Track sessions. Follow<strong>in</strong>g the Open<strong>in</strong>g Keynotes <strong>and</strong><br />

Introductory Talks by panelists, who gave details of the “cyberstrategies” of various<br />

governments, the meet<strong>in</strong>g broke down <strong>in</strong>to several “tracks”. On the first day, sessions dealt with<br />

questions regard<strong>in</strong>g “<strong>Cybersecurity</strong> <strong>and</strong> Society”, “<strong>Cybersecurity</strong> Dilemmas”, <strong>and</strong> “Introduc<strong>in</strong>g<br />

Transparency <strong>and</strong> Confidence-build<strong>in</strong>g”. The second day of the event focused on “Computer<br />

Network Activities”, “High-End Hack<strong>in</strong>g”, <strong>and</strong> “Regulat<strong>in</strong>g <strong>Cybersecurity</strong>”.<br />

The conference closed with a session that brought together the track chairs, who summed up the<br />

results of the conference. All meet<strong>in</strong>gs except for the Open<strong>in</strong>g Session were held under the<br />

Chatham House Rule.<br />

Participants came from the United States, Russia, Ch<strong>in</strong>a, Canada, Australia, Mexico, Georgia,<br />

Japan, Korea, Bahra<strong>in</strong>, the Emirates, <strong>and</strong> various European countries, mak<strong>in</strong>g this event a truly<br />

<strong>in</strong>ternational forum for c<strong>and</strong>id <strong>and</strong> productive multi-stakeholder discussions. Over 220<br />

<strong>in</strong>dividuals took part <strong>in</strong> total. It was not the <strong>in</strong>tention of the organizers that the conference would<br />

generate consensual recommendations.<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!