Breakthrough Sessions

Dallas Process:

International Priority Communications (IPC) Policy
Cyber Conflict Policy and Rules of the Road – includes Cyber Crime
Trusted Cybersecurity Information Sharing
ICT Development Supply Chain Integrity
Worldwide Cyber Response Coordination Capability

London Process:

Law & Privacy: Rules of the Road for Achieving Protection
Legal Frameworks for International Efforts to Counter Cybercrime

Worldwide Cybersecurity:

Reliability of Global Undersea Water Cable Critical Infrastructure (ROGUCCI)
Youth Protection and Digital citizenship

Public Health Models for the Internet 


Scott Charney, Microsoft
Byeong Gi Lee, IEEE
Harry Raduege Jr., Deloitte
Sir David Veness, London First


Greg Austin, EastWest Institute, chair

Maria Livanos Cattaui, Petroplus Holdings 
Melissa Hathaway, Hathaway Global
James Lash, Manchester Principal LLC
Vartan Sarkissian, Knightsbridge
Deborah Taylor-Tate, 2009 ITU Laureate for child Online Protection


Francis Finlay, Co-Chairman, EastWest Institute, chair of Host committee
David Cohen, Reit Property Management India
Thor Bjorgolfsson, Novator
Lady Barbara Judge, UK Pension Protection Fund
Louise Richardson, University of St. Andrews
Sir Edmund Burton, UK Information Assurance Advisory Council
Sir Peter Bonfield, NXP Semiconductors
Rumi Verjee, Rumi Foundation
Armen Sarkissian, Eurasia House International
Lord Toby Harris, House of Lords

Vasil Hudak, J.P. Morgan 

Karl Frederick Rauscher, EastWest Institute, Chair
Salma Abbasi, E-Worldwide Group
Mark Adams, Cox Communications
Massoud Amin, University of Minnesota
Koichi Asatani, Kogakuin University
Scott Borg, Cyber Consequences Unit
Manuel Pedrosa de Barros, ANACOM
Chi-Ming Chen, AT&T
Hsiao-Hwa Chen, Cheng Kung Univ.
Richard D. G. Cox, Spamhaus
Tariq Durrani, University of Strathclyde

Gib Godwin, Northrop Grumman
Stu Goldman, Bell Labs Fellow (ret.)
Marsali Hancock, iKeepSafe
John M. Howell, IEEE Commun. Society
James Isaac, IEEE CS
Luis Kun, U.S. NDU
Andrey Korotkov, Moscow State Institute
Yuxiao Li, Beijing Post & Telecom Univ.
Ramses Martinez, VeriSign
Jack McGourty, Columbia University
Paul Nicholas, Microsoft
Michael O’Rierdan, MAAWG
Wayne Pacine, U.S. FRB
Steve Purser, ENISA
Andrea Rigoni, GCSEC
Mohammed Sabunchi, DIFC (ret.)
Phyllis Schneck, McAfee
Andrea Servida, European Commission
Amit Sharma, Ministry of Defense, India
Curtis Siller, IEEE
Abhishek Vaish, Indian Institute of IT
Dean Veverka, ICPC
Yonglin Zhou, Internet Society of China
Richard Zhao, NSFocus


Artyom Ajemov, Moscow Technical University
Charles Barry, United States National Defence University
John S. Edwards, Digicom Inc.
J.B. Godwin, Northrop Grumman Information Systems
James Bret, Michael, U.S. Naval Postgraduate School
Viktor Minin, Coordination Council of CIS on Information
Paul Nicholas, Microsoft
Boris Slavin, Union of Chief Information Officers of Russia
Leonid Todorov, Coordination Center for .RU top level domain
Thomas C. Wingfield, NATO Cyber Defence Centre of Excellence
Yuxiao Li, Beijing Post & Telecom University
Zhou Yonglin, Internet Society of china 

The worldwide Cybersecurity Summit is part of a process of continuing work by a large number of collaborators in various "breakthrough" groups or other working groups. The people listed here are participating in this work. Not all will attend the summit.


Stein Scholberg, Judge, Norway (Co-Chair)

Pavan Duggal, Advocate at the supreme court of India (Co-Chair)

Gilberto Martins de Almeida, Professor, Brazil

Lansantha De alwis, Lawyer, Commonwealth Technology Organization

Graham Butle, CEO Bitek Inc, UK

Solange Bhernaouti-Helie, Professor, Switzerland

Tatiana Tropina, Phd, Russia


This interactive working program gives participants unique opportunities to collaborate with professional peers from around the world. Participants will be able to work on issues pre-identified as critical, internationally-stalled policy areas, or on those that are participant-proposed at the summit. Examples of the specific policy challenges to be addressed in the Breakthrough Groups can be found in a separate document. The success of the summit is measured by the breakthroughs made by these groups both during the summit, and in the follow-up activities.


14.15 - 15.15

BREAKOUT SESSION I for Breakthrough and Interest Groups: Addressing the Issue; Committing to the Process

Abbey Room: International Priority Communications (IPC) I: Value Proposition and Incentive Structure

Co-Chaired by Wayne pacine, U.S. Federal Reserve Board and Sir Peter Bonfield, NXP Semiconductors

St. James Suite: New Non-state Actor power in Cyberspace

Henry Moore Room: Collective Action to Improve global Internet Health I

Chair: Scott Charney, Microsoft

Rutherford Room: Measuring the Cybersecurity Problem

St. James Suite: Cyber Babel - building a Cybersecurity Glossary and Taxonomy:

Co-chairs: Valery Yashenko, Moscow State University & Gib Godwin, Northrop Grumman

Westminster Suite: New Governance for GUCCI (Global Undersea Cables Critical Infrastructure)

Chaired by Mick Green, International Cable Protection Committee

Wordsworth Room: Protecting Youth I: Building a Global Culture of Digital Citizenship

Chair: John W. Kluge Jr., Digital Safety & Citizenship, EastWest Institute

Wordsworth Room: Financial Services I

Shelley Room: Rules of Engagement for cyberspace: Recommendations from the Dallas Breakthrough Group

Abbey Room: Countering Cyber crime through International Law: Recommendations from the EWI Working Group

Co-chairs: Stein Schjolberg & Lasantha de Alwis

15.15 - 15.45


Networking Break


15:45 – 17.00

BREAKTHROUGH GROUPS SESSION II for Breakthrough and Interest Groups: Addressing the Issue; committing to the Process

Abbey Room: International Priority Communications (IPC) II: Next Steps for International Cooperation

Co-chaired by Matt Bross, Huawei and Antoaneta Angelova-Krasteva, European Commission

St. James SuiteAssessing the Entanglement of protected entities in cyberspace

co-chaired by Andrey Korotkov, Moscow State institute of Foreign Affairs and David Pollington, Microsoft

Henry Moore Room: Collective Action to Improve global Internet Health II

Chair: Scott Charney, Microsoft

Rutherford Room: Fighting Spam I - New forum and Cooperation

Co-chaired by Zhou Yonglin, Internet Society of China and Jerry Upton, messaging Anti-Abuse Working Group (MAAWG)

Abbey Room: Cyber crime II: Redefining the need: Operational Case Studies from National Jurisdictions (India, UK, UAE)

Co-chaired by Pavan Duggall and Stewart Room

Westminster Suite: International Coordination for Attacks on GUCCI

Wordsworth Room: Protecting youth: What works, and what does not work so well?

Co-chaired by Marsali Hancock, iKeepSafe and James Lyne, Sophos

Wordsworth Room: Financial Services II

Shelley Room: Rules of Engagement for cyberspace: Treaty Options or Just confidence Building?


17.00 - 17.30


International Pathways to Cybersecurity

Introduction: Professor Joseph Nye, Harvard University
         Speaker: Hon. Tom Ridge, Senior Advisor, Deloitte LLP, President and CEO Ridge Global LLC





08.30 - 9.00   Registration
09.00 - 10.00   BREAKOUT SESSION III for Breakthrough and Interest Groups: Addressing the Issue; Committing to the Process

Abbey Room: Information and Communications Technology (ICT): Developing Supply Chain Integrity Principles

Co-chaired by andrea Servida, European Commission and Manuel Pedrosa de Barros, ANACOM

St. James Suite: Markers in cyberspace

Chaired by Leonid Todorov, Coordination Center for .RU

Abbey Room: Cyber Crime III: Framing a General Obligation for Cybersecurity? Next steps

Rutherford Room: Fighting Spam II - Best Practice Implementation 

Co-chaired by Zhou Yonglin, Internet society of China and Fred Stringer, AT&T

Henry Moore Room: CyberSphere I Exercise Planning 

Westminster Suite: Best Practice for Timely GUCCI Repairs in Territorial Waters

Co-chaired by David Coughlin, Tyco Telecommunications and Maria Cattaui, Petroplus Holdings AG

Wordsworth Room: Protecting Youth III: Voluntary Measures

Co-chaired by Salma Abbasi, eWorldwide Group and Shi Xiansheng

Wordsworth Room: Financial Services III

Shelley Room: Rules of Engagement for cyberspace: Next Steps for Advancing Treaty Options and/or confidence Building