Speakers provisionally confirmed:
Hoepers, Cristine
Hountomey, Jean-Robert
Kolkman, Olaf
Palma Salas , Marcelo
Toimoana, Andrew
Vega, Erika
Wilson, Paul
Speakers provisionally confirmed:
Allen, Ernie
Bautista, Colonel Freddy
Beauchere, Jacqueline
Nejm, Rodrigo
Speakers provisionally confirmed:
Elrafihi, Mohamed
Miller, Carl
Ramadan, Omar
Confirmed speakers:
- Alexander Seger, Head of Cybercrime Division, Council of Europe
- Neide de Oliveira, Coordinator of the National Working Group on Cybercrime, Brazil
- Paul Mitchell, General Manager, Technology Policy, Microsoft Corporation
- Bertrand de la Chapelle, Director, Internet & Jurisdiction Project
- Emma Llanso, Director of the Free Expression Project, Center for Democracy & Technology
- Nathalia Foditsch, American University
- Christian Borggreen, Director, International Policy, Computer & Communications Industry Association (CCIA)
Link to event flyer.
Speakers provisionally confirmed:
Carvell, Mark
Esaki, Hiroshi
Ito, Yurie
Kolkman, Olaf
Lefèvre, Flávia
Shorey, Nick
Speakers provisionally confirmed:
Nigam, Hemu
Palumbo, Dan
2016 IGF Best Practice Forum (BPF) Cybersecurity: ‘Building Confidence and Security in the use of Information and Communications Technologies (ICTs) through Enhanced Cooperation and Collaboration’
Substantive Session
IGF Day 3: Thursday, 8 December 2016, 9:00 - 10:30am - WS Room #9
Title and Date/Length of the Session:
2016 IGF Best Practice Forum (BPF) Cybersecurity: ‘Building Confidence and Security in the use of Information and Communications Technologies (ICTs) through Enhanced Cooperation and Collaboration’
IGF Day 3: Thursday, 8 December 2016, 09:00 - 10:30am (90 Minutes)
Brief Description/Objective:
The ongoing work and draft output of the 2016 IGF Best Practice Forum on Cybersecurity emerged based on the general consensus from the community that the BPF might most benefit from addressing cooperation and collaboration between stakeholder groups as a topic.There was agreement that the community would benefit from having a multistakeholder discussion, including each of the major IGF stakeholder groups, on how to engage and communicate with each other on cybersecurity issues and that this work was uniquely fit for an IGF BPF. There was also agreement that the BPF for 2016 should not be seen in isolation, but should rather be seen in a long-term perspective and that capacity building would be an integral component for the work.
This session will present the draft output paper and provide the broader community with an overview of the work that the BPF has carried out over the past 6 months since the BPF was formally initiated in May of 2016. The session will also invite all contributors to the BPF to present and discuss their views on the subject matter and to comment on the contributions of others as reflected in the output. Finally, the discussion will aim to find a way forward for the work of the BPF cybersecurity.
During the meeting, we'll cover the work done so far and comments provided in the review platform.
Agenda:
- Introduce the BPF/Overview of the work and introduce draft output (15 minutes)
- Presentation of BPF work/output (15 mins)
- Interactive discussion with panelists, discussants and other contributors to the work of the BPF on the draft output and way forward for the BPF (1 hour)
Chair(s) and/or Moderator(s) and Speakers/Discussants:
Markus Kummer, Coordinator for 2016 IGF BPF Cybersecurity (Chair)
Segun Olugbile, Co-Coordinator for 2016 IGF BPF Cybersecurity
Maarten Van Horenbeeck, Fastly, FIRST (Moderator)
Panel:
Kerry-Ann Barrett and Barbara Marchiori, Organization of American States (OAS) (Speakers)
Hiroshi Esaki, Graduate School of Information Science and Technology, The University of Tokyo (Speaker)
All contributors to the BPF call for inputs will be invited to speak as discussants from the floor.
Workshop co-organizer(s):
Description of the workshop
The exhaustion of the IPv4 address supply has been predicted since the end of the 1980s. However, the large scale adoption of mobile devices and their associated IPv4 addressing needs accelerated the exhaustion timetable, and placed increased pressure on network operators to conserve IPv4 address.
This pressure has resulted in a marked increase in the use of technologies, such as Network Address Translation (NAT), that allow pools of addresses to be shared across multiple endpoints. These mechanisms enable the reuse of the limited pool of available IPv4 addresses, resulting in the number of connected endpoints vastly outnumbering the number of addresses in use in the public internet.
This has three important implications for Internet technology developers, and those who depend on certain behaviors of the technology.
Application designers need to consider the fact that an IP address does not necessarily identify an endpoint.
Law enforcement and forensic functions need to consider that an IP address alone may not be sufficient to correlate Internet activity observations with an endpoint; and even an IP address associated timestamp generally may not suffice.
Data retention mechanisms and policies that record or reference an IP address need to refactor their actions and requirements to consider that in increasingly large parts of the Internet, an IP address is merely a temporary identifier. Potentially large volumes of ancillary data are required to match an IP address to an endpoint.Description of the plan to facilitate discussion amongst speakers, audience members and remote participants
The workshop will be organized as a facilitated dialogue. Led by the moderator, subject experts will debate and discuss the key questions and issues. Subject experts will give opening comments, after which the moderator will turn to those attending the session and invited experts in the audience to engage in facilitated dialogue.
In addition to the background documents and papers that will be prepared ahead of the IGF, additional articles of interest, commissioned blogs, reference materials and social media conversations will be published and distributed ahead of the workshop.
Workshop panelists/session experts
The experts listed below have accepted the invitation to participate in the session. They are drawn from the Law Enforcement, Government, Academia, Civil Society, The Technical Community and Private sector stakeholder groups. A facilitated dialogue will be organized so that these experts can bring their knowledge and perspective to discuss and debate the challenges brought by IPv4 exhaustion and the challenges and opportunities presented by IPv6 adoption.
(1) Jeffrey R. Bedser is the founder and CEO of iThreat Cyber Group www.ithreat.com. Mr. Bedser has led ICG on its journey from an internet investigative firm to a technology driven threat Intelligence Company. ICG was formed in 1997 as Internet Crimes Group. Mr. Bedser has been a facilitator, panelist and speaker for organizations such as POLCYB, ASIS International, Infragard, HTCIA, The Conference Board, ICANN and the FBI Training Academy at Quantico. Mr. Bedser has received media coverage on multiple occasions discussing topics surrounding cyber-crime and cyber security.
For the session, Jeff will help present an overview of the current challenges being faced by cyber investigators as IPv4 addresses are exhausted and the transition to a wider deployment of IPv6 takes place.
(2) Ben Butler has been with Go Daddy since 2001. In 2002, He formed the Go Daddy Abuse Department, and served as Director of Network Abuse for over 10 years. In this role, Ben helped create and enforce company and public policies dealing with every form of potential abuse that happens online, including spam, phishing, identity theft, copyright infringements, cyberbullying, child exploitation issues, and rogue internet pharmacies. He recently took on a new role as Director of the Digital Crimes Unit. Ben comes from a strong technical background including several years as a network and email administrator, and has experience in customer service, business management, and marketing.
Ben will bring a registrar perspective to the conversation and dialogue.(3) John Curran is considered an Internet and telecommunications industry expert. Curran was one of the founding members and is the current President and Chief Executive Officer of the American Registry for Internet Numbers (ARIN), a Regional Internet Registry (RIR). He is also a Principal Associate at Isotropic, LLC., a cybersecurity and telecommunications service provider. Curran actively participates in the activities of the Internet Engineering Task Force (IETF) and has served as co-chairman of the Operations and Network Management Area and member of IPng (IPv6) Directorate.
For the session, John will bring the North American Regional Internet Registry perspective to the conversation.
(4) Laura DeNardis is an American author and a globally recognized scholar of Internet governance and technical infrastructure. She is a tenured Professor and Associate Dean in the School of Communication at American University. She is a Senior Fellow of the Centre for International Governance Innovation (CIGI) and serves as the Director of Research for the Global Commission on Internet Governance. With a background in Information engineering and a doctorate in Science and Technology Studies (STS), her research studies the social and political implications of Internet technical architecture and governance.
Laura is an appointed member of the U.S. Department of State Advisory Committee on International Communications and Information Policy (ACICIP). She has more than two decades of experience as an expert consultant in Internet Governance to Fortune 500 companies, foundations, and government agencies.
For the session, Laura will bring an academic and research perspective to the conversation.
(5) Athina Fragkouli is the Legal Counsel at the RIPE Network Coordination Centre (NCC), where she is responsible for all legal aspects of the organisation. She defines the RIPE NCC legal framework, provides advice, and gives legal support for all RIPE NCC activities. Athina works with a variety of Internet stakeholders such as network operators, governments, and Law Enforcement Agencies (LEA). She also represents the RIPE NCC in a variety of fora such as technical meetings and EU-organised events.
Athina - Will bring a European Regional Internet Registry perspective to the panel. As well she will bring a rights based, european and privacy perspective to the conversation.
(6) Merike Kaeo is a recognized global expert in information security and author of “Designing Network Security.” Prior to joining Farsight Security, Merike served as Chief Information Security Officer for Internet Identity (IID), where she was responsible for maintaining IID’s vision and ensuring the company’s sensitive information and technologies are protected. Prior to joining IID, Merike founded Double Shot Security, which provided strategic and operational guidance to secure Fortune 100 companies. She led the first security initiative for Cisco in the mid-1990s. Merike is on ICANN’s Security and Stability Advisory Council (SSAC) and the FCC’s Communications Security, Reliability and Interoperability Council (CSRIC). She earned a MSEE from George Washington University and a BSEE from Rutgers University.
(7) Iranga Kahangama is a Policy Advisor for the Federal Bureau of Investigation. Currently, Iranga serves in the Executive Staff Unit of the Science and Technology Branch at FBI Headquarters in Washington, DC. Since 2015, Mr. Kahangama has been working on Internet Governance efforts with the Internet Corporation of Assigned Names and Numbers (ICANN) and Regional Internet Registries, i.e., ARIN, RIPE NCC, the Internet Engineering Task Force and other Internet Governance organizations, to foster Internet policies and practices that ensure effective international law enforcement investigations. Prior to joining the FBI, Iranga completed his Master degree in Public Policy from the Harvard Kennedy School of Government.
Iranga will bring a US and international law enforcement perspective to the conversation and dialogue.
(8) Dick Leaning has over 28 years’ experience in Law Enforcement, leading teams of investigators in the Metropolitan Police Service (London), UK National Crime Squad (NCS) and the Serious Organised Crime Agency (SOCA) and from 2009 within SOCA’s Cyber Crime Department. Dick has been the UK representative at the G8 High-Tech Crime subgroup of senior experts and Interpol’s European High-Tech Crime Working Group with responsibility for enhancing the abilities of law enforcement. Based in The Hague since September 2011, Dick joined the United Kingdom Liaison Bureau (UKLB) desk as a Europol Cyber Liaison officer, and has recently taken on the role of Seconded National
The primary purpose of cybersecurity awareness campaigns is to influence the adoption of secure behaviour online. Past and current efforts to improve cybersecurity practices and to promote inclusiveness and growth have not had the desired impact. It is important, therefore, to critically reflect on the challenges involved in improving cybersecurity behaviour for individuals. In particular, understanding how people perceive risks is critical to creating effective awareness campaigns.
Speakers provisionally confirmed:
We do not have speakers in the traditional sense. This is an open discussion with all in attendance. There are representatives from INhope, GSMA, SIDN, AbuseHUB, Cyber Green, RIPENCC, Stop!Think!Connect!, US State Department, FIRST, CIRTBR, universities, and many others present to share their views on this topic for others to learn from.
The IGF's primary focus is to highlight how the discussion around Internet governance can impact the SDGs. Simultaneously, there has been increased attention drawn to the role of cybersecurity and its place both within the Internet governance framework, as well as how increased cybersecurity capacity might impact economic growth both in developed and developing countries.
However, there are conflicting views on whether these differing fields are operationally compatible. For example, working through governance frameworks to improve Internet penetration in developing countries would help achieve some aims of the development agenda, but could also erode global cybersecurity by increasing the number of users susceptible to malicious attacks. Additionally, there has not been clearly identifiable proof that actually increasing cybersecurity capacity will improve the economic advancement of a country, much less whether working in an Internet governance framework is the way to achieve this secure state.
This session aims to bring together individuals from different sectors who will provide arguments for a) the convergence of these three issues, b) reasoning for why they would be separate working streams, and c) provide stance on when security, development, and governance interact and when they do not based on examples.
WS126: Safe and Secure Cyberspace for Youth: Solutions for Asia and Africa (Friday, December 9, 09:00-10:30, @ Workshop Room 2)
【Overview】 How Can We Protect Youth Online?: Challenges v. Possible Solutions
The purpose of our workshop is to explore serious issues resulting from the rapid expansion of mobile broadband connections and the wide proliferation of smartphones across Asia and Africa. Our workshop introduces good practices to solve them, such as improving ICT literacy, setting-up Internet hotlines, and/or promoting the use of filtering services while respecting the freedom of expression and the right to know, in order to protect youth from illegal and harmful online contents and to promote the proper use of smartphones by youth. We strongly believe the workshop will help achieve inclusive and sustainable growth in developing countries.
The mobile-based network explosively increases the amount of data flow by which people’s standard of living can be improved. Ever more people are using social media for communication and expression, and in particular, it is no exaggeration to say that daily smartphone usage is indispensable for young people in order to share their opinions and pictures, sympathize or even mobilize to express their emotions via social media.
While the importance of mobile-based communication is self-evident, this trend also gives rise to a negative effect, i.e., easy access to illegal and harmful online contents. Such access causes serious problems like fictitious or expensive claims, online bullying, online child sexual exploitation and abuse, and cyber racism. In worst case scenario, these problems show up in the real world and cause physical impacts. Since the contents remain in the cyberspace perpetually unless appropriate measures are taken, an urgent response to these issues is required.
【Agenda】
1. Opening Remarks
2. Presentations (1): From Institutional Perspectives
3. Presentations (2): From Youth Perspectives
4. Panel Discussion (1): Cross-Regional & Age Dialogue
5. Panel Discussion (2): Brainstorming Session on SDGs
6. Q&A Session (Again; if time allows)
7. Closing Remarks from All Panelists
【Diverse Panelists】
-Dr. Makoto Yokozawa, Senior Consultant, Nomura Research Institute/Visiting Professor, The Graduate School of Informatics, Kyoto University
-Ms. Veronica Donoso, Executive Director, International Association of Internet Hotlines (INHOPE)
-Mr. Arsene Tungali, Co-founder & Executive Director, Rudi International
-Mr. Raymond Yang, Ambassador, NetMission.Asia
-Ms. Shirley Wong, Representative, Hong Kong Youth Internet Governance Forum (HKYIGF)
*Unfortunately, Dr. Cisse Kane, President of African Civil Society on the Information Society (ACSIS) cannot join us.
【Moderator】
-Mr. Kenta Mochizuki, Attorney at Law (New York), Public Policy & Corporate Governance, Corporate Management Group, Yahoo Japan Corporation
Speakers provisionally confirmed:
Bergstein , Brian
Lazanski , Dominique
Prakash , Pranesh
Tropina , Tatiana