Challenges in Cybersecurity Risks, Strategies, and ... - Unidir
Challenges in Cybersecurity Risks, Strategies, and ... - Unidir
Challenges in Cybersecurity Risks, Strategies, and ... - Unidir
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CONFERENCE OVERVIEW<br />
“<strong>Challenges</strong> <strong>in</strong> <strong>Cybersecurity</strong> – <strong>Risks</strong>, <strong>Strategies</strong>, <strong>and</strong> Confidence-Build<strong>in</strong>g” took place on<br />
December 13 <strong>and</strong> 14, 2011, at the Federal Foreign Office, Berl<strong>in</strong>, Germany. The conference<br />
focused on address<strong>in</strong>g the challenges <strong>and</strong> issues revolv<strong>in</strong>g around the emerg<strong>in</strong>g doma<strong>in</strong> of<br />
cybersecurity. It brought together key stakeholders <strong>and</strong> decision-makers from civil society,<br />
<strong>in</strong>dustry, multiple academic discipl<strong>in</strong>es, <strong>and</strong> governments. They took part <strong>in</strong> an <strong>in</strong>-depth<br />
assessment <strong>and</strong> discussion of fundamental problems, evolv<strong>in</strong>g issues, future national or<br />
<strong>in</strong>ternational regulatory regimes, <strong>and</strong> technical <strong>and</strong> non-technical approaches to cybersecurity.<br />
Explor<strong>in</strong>g options for confidence- <strong>and</strong> transparency-build<strong>in</strong>g measures <strong>in</strong> cyberspace was a key<br />
goal.<br />
In particular, the two-day meet<strong>in</strong>g aimed to:<br />
(1) develop jo<strong>in</strong>t approaches to keep the <strong>in</strong>ternet as an unrestricted global commons <strong>and</strong> a<br />
forum for free speech <strong>and</strong> commerce,<br />
(2) underst<strong>and</strong> exist<strong>in</strong>g <strong>and</strong> planned strategies, measures <strong>and</strong> approaches to protect<br />
cyberspace,<br />
(3) identify emerg<strong>in</strong>g risks <strong>and</strong> vulnerabilities <strong>in</strong> the cybersphere, rang<strong>in</strong>g from disruptions of<br />
critical <strong>in</strong>frastructures to economical <strong>and</strong> military espionage <strong>and</strong> sabotage <strong>and</strong> address<strong>in</strong>g<br />
technical <strong>and</strong> regulatory steps to measure <strong>and</strong> confront these risks,<br />
(4) explore the best ways to develop pr<strong>in</strong>ciples, norms <strong>and</strong> rules for appropriate <strong>and</strong><br />
responsible state behavior <strong>in</strong> cyberspace, <strong>in</strong>clud<strong>in</strong>g exist<strong>in</strong>g <strong>and</strong> future <strong>in</strong>ternational<br />
norms, laws, <strong>and</strong> measures to regulate state behavior <strong>in</strong> times of conflict,<br />
(5) exam<strong>in</strong>e the need to adapt <strong>in</strong>ternational humanitarian law to deal specifically with<br />
cyberwarfare,<br />
(6) strengthen <strong>in</strong>ternational efforts to keep cyberspace open <strong>and</strong> safe for all via enhanced<br />
transparency, confidence-build<strong>in</strong>g <strong>and</strong> security, <strong>in</strong>clud<strong>in</strong>g via the Organization for<br />
Security <strong>and</strong> Co-operation <strong>in</strong> Europe (OSCE), the Association of Southeast Asian Nations<br />
(ASEAN) Regional Forum (ARF) <strong>and</strong> the United Nations (UN).<br />
These issues were addressed <strong>in</strong> six Track sessions. Follow<strong>in</strong>g the Open<strong>in</strong>g Keynotes <strong>and</strong><br />
Introductory Talks by panelists, who gave details of the “cyberstrategies” of various<br />
governments, the meet<strong>in</strong>g broke down <strong>in</strong>to several “tracks”. On the first day, sessions dealt with<br />
questions regard<strong>in</strong>g “<strong>Cybersecurity</strong> <strong>and</strong> Society”, “<strong>Cybersecurity</strong> Dilemmas”, <strong>and</strong> “Introduc<strong>in</strong>g<br />
Transparency <strong>and</strong> Confidence-build<strong>in</strong>g”. The second day of the event focused on “Computer<br />
Network Activities”, “High-End Hack<strong>in</strong>g”, <strong>and</strong> “Regulat<strong>in</strong>g <strong>Cybersecurity</strong>”.<br />
The conference closed with a session that brought together the track chairs, who summed up the<br />
results of the conference. All meet<strong>in</strong>gs except for the Open<strong>in</strong>g Session were held under the<br />
Chatham House Rule.<br />
Participants came from the United States, Russia, Ch<strong>in</strong>a, Canada, Australia, Mexico, Georgia,<br />
Japan, Korea, Bahra<strong>in</strong>, the Emirates, <strong>and</strong> various European countries, mak<strong>in</strong>g this event a truly<br />
<strong>in</strong>ternational forum for c<strong>and</strong>id <strong>and</strong> productive multi-stakeholder discussions. Over 220<br />
<strong>in</strong>dividuals took part <strong>in</strong> total. It was not the <strong>in</strong>tention of the organizers that the conference would<br />
generate consensual recommendations.<br />
7