London Summit Report: Mobilizing for International Action

London Summit Report: Mobilizing for International Action

Against the backdrop of new revelations about cyber attacks and espionage, the EastWest Institute released a report on the Second Worldwide Cybersecurity Summit: Mobilizing for International Action, which drew more than 450 government, industry and technical leaders from 43 countries to craft new cybersecurity solutions.

Microsoft on Global Cyber Supply Chain Management

Microsoft on Global Cyber Supply Chain Management

Read a blog post and two white papers from Microsoft on securing the ICT supply chain. The papers expand on key principles that  Microsoft’s corporate vice president of Trustworthy Computing, Scott Charney, outlined in a keynote address at the summit.

London 2011 Videos

London 2011 Videos

Replay the Second Worldwide Cybersecurity Summit in full, with all keynotes and panels now available on the website.

Summit Attracts Worldwide Media Attention

Summit Attracts Worldwide Media Attention

EWI's Second Worldwide Cybersecurity Summit attracted broad media coverage from around the world. Here are some highlights.

EWI’S Cybersecurity Summit Advances Solutions for Digital Problems

EWI’S Cybersecurity Summit Advances Solutions for Digital Problems

On the second day of the EastWest Institute’s Second Worldwide Cybersecurity Summit in London, 450 private and public sector delegates advanced solutions to the complex problems facing our digital world.

Global Action against Global Cyber Threats

Global Action against Global Cyber Threats

Seats were tough to find at the first day of the Eastwest Institute’s Second Worldwide Cybersecurity Summit in London, where more than 450 government, industry and technical leaders from 43 countries gathered to craft new solutions for threats facing our digital world. 

Young People for Cybersecurity

Young People for Cybersecurity

On May 31, the EastWest Institute held the International Youth Congress on Digital Citizenship in London, bringing together dozens of young people with government, business and technical leaders to discuss solutions to universal Internet woes.

Fighting Spam to Build Trust

Fighting Spam to Build Trust

On May 27, 2011, the EastWest Institute and the Internet Society of China released the first joint China-United States report on cybersecurity, Fighting Spam to Build Trust. Produced by Chinese and U.S. experts convened by EWI and the Internet Society of China, the report marks the first step in an ongoing bilateral process.

Sir Michael Rake Joins the London Summit

Sir Michael Rake Joins the London Summit

 

Sir Michael Rake, Chairman of the BT Group plc., will deliver keynote address at the Second Worldwide Cybersecurity Summit in London, on June 1.

Making our online world more safe and secure

Making our online world more safe and secure

John Stewart, Vice President and Chief Security Officer at CISCO Systems, previews the London Cybersecurity summit on CISCO blog. He will join the summit on June 2, as one of the commentators on the results from the breakthrough groups.

Critical Terminology Foundations

Critical Terminology Foundations

On Wednesday April 27, the EastWest Institute and the Information Security Institute released the first joint Russian-American report to define critical terms for cyber and information security.

India: Stepping Up to the Cyber Challenges

India: Stepping Up to the Cyber Challenges

At a major U.S.-India seminar in New Delhi, senior Indian political leaders push for stronger international cooperation to deal with cyber threats. Franz-Stefan Gady reports.

Educating and Protecting Young Digital Citizens

Educating and Protecting Young Digital Citizens

On April 4, 2011, the EastWest Institute hosted the International Youth and Technology Forum in partnership with Columbia University, where the event was held. It brought together everyone from cybersecurity experts and activists to government representatives and Girl Scouts to lay the groundwork for a new alliance aimed to protect – and empower – kids and teenagers in our digital world.

First China-U.S. Effort to Fight Spam

First China-U.S. Effort to Fight Spam

Speaking at the Messaging Anti-Abuse Working Group 21st General Meeting in Orlando, Fla., on Feb. 23, the EastWest Institute’s Chief Technology Officer Karl Frederick Rauscher previewed a joint China-United States report on cybersecurity to be published next month. Fighting Spam to Build Trust will be the first product of talks between Chinese and United States experts convened by EWI.

First Joint Russian-U.S. report on Cyber Conflict

First Joint Russian-U.S. report on Cyber Conflict

The EastWest Institute released the first joint Russian-American report aimed at defining the “rules of the road” for cyber conflict.  Prepared by a team of Russian and U.S. experts convened by EWI, Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace explores how to extend the humanitarian principles that govern war to cyberspace.

Protecting the Digital Economy

Protecting the Digital Economy

The EastWest Institute released a report detailing the results of the First Worldwide Cybersecurity Summit: Protecting the Digital Economy, and outlining the cybersecurity initiative’s next steps as it prepares for the Second Worldwide Cybersecurity Summit in London on June 1-2.

Frontpage Slideshow | Copyright © 2006-2010 JoomlaWorks, a business unit of Nuevvo Webware Ltd.
EWI’S Cybersecurity Summit Advances Solutions for Digital Problems

On the second day of the EastWest Institute’s Second Worldwide Cybersecurity Summit in London, 450 private and public sector delegates advanced solutions to the complex problems facing our digital world.

Meeting in smaller “breakthrough groups,” participants hammered out next steps for everything from channeling emergency messages through congested networks, to securing global supply chains, to safeguarding the undersea cables that carry over 97% of Internet traffic.

“The technology is available – it’s not the impediment,” said the U.S. National Security Council’s former Acting Senior Director for Cyberspace Melissa Hathaway. “It's really that we need to move to collective action.”

What would that collective action look like? Several speakers called for business and technical experts to lead collaborative efforts with governments around the world.

EWI’s Chief Technology Officer Karl Rauscher applauded Huawei’s Chief Technology Officer Matt Bross’s personal commitment to champion the exploration of deploying international priority communications on all appropriate network systems.

“This would be one of the most dramatic examples of a proactive private sector initiative to save lives and property in future catastrophes,” said Rauscher.

Scott Charney, Microsoft’s Corporate Vice President for Trustworthy Computer, said to help counter global cyber threats, businesses need to ensure the transparency of IT product development and transport, adding, “We need a sensitive risk-based approach to help governments grapple with supply-chain concerns.”

Speakers on topics ranging from fighting cyber crime to protecting children online pointed out that cybersecurity challenges are borderless challenges.

Lt. General (Ret.) Harry D. Raduege, Jr., Chairman of the Deloitte Center for Cyber Innovation, shared a revelation he had during a trip to India.

“Isn’t our own homeland security dependent on India’s homeland security and their cybersecurity?” said Raduege. “These things are becoming interrelated as we gain more dependence on cyberspace.”

Panelists also discussed plans for EWI’s Third Cybersecurity Summit, to be held in Delhi in October 2012, and ongoing collaborations in between.  

“I’d like to see us create a working group which talks about cybersecurity espionage and cyber conflict in a big way,” said Dr. Kamlesh Bajaj, Chief Executive Officer of the Data Security Council of India. “Cybersecurity is now intertwined with international security, and you can't divorce it from that.”

Recap the summit highlights on cybersummit2011.com/live.

 

 

READ MORE

Open publication