Against the backdrop of new revelations about cyber attacks and espionage, the EastWest Institute released a report on the Second Worldwide Cybersecurity Summit: Mobilizing for International Action, which drew more than 450 government, industry and technical leaders from 43 countries to craft new cybersecurity solutions.
Read a blog post and two white papers from Microsoft on securing the ICT supply chain. The papers expand on key principles that Microsoft’s corporate vice president of Trustworthy Computing, Scott Charney, outlined in a keynote address at the summit.
On the second day of the EastWest Institute’s Second Worldwide Cybersecurity Summit in London, 450 private and public sector delegates advanced solutions to the complex problems facing our digital world.
Seats were tough to find at the first day of the Eastwest Institute’s Second Worldwide Cybersecurity Summit in London, where more than 450 government, industry and technical leaders from 43 countries gathered to craft new solutions for threats facing our digital world.
On May 31, the EastWest Institute held the International Youth Congress on Digital Citizenship in London, bringing together dozens of young people with government, business and technical leaders to discuss solutions to universal Internet woes.
On May 27, 2011, the EastWest Institute and the Internet Society of China released the first joint China-United States report on cybersecurity, Fighting Spam to Build Trust. Produced by Chinese and U.S. experts convened by EWI and the Internet Society of China, the report marks the first step in an ongoing bilateral process.
John Stewart, Vice President and Chief Security Officer at CISCO Systems, previews the London Cybersecurity summit on CISCO blog. He will join the summit on June 2, as one of the commentators on the results from the breakthrough groups.
On Wednesday April 27, the EastWest Institute and the Information Security Institute released the first joint Russian-American report to define critical terms for cyber and information security.
At a major U.S.-India seminar in New Delhi, senior Indian political leaders push for stronger international cooperation to deal with cyber threats. Franz-Stefan Gady reports.
On April 4, 2011, the EastWest Institute hosted the International Youth and Technology Forum in partnership with Columbia University, where the event was held. It brought together everyone from cybersecurity experts and activists to government representatives and Girl Scouts to lay the groundwork for a new alliance aimed to protect – and empower – kids and teenagers in our digital world.
Speaking at the Messaging Anti-Abuse Working Group 21st General Meeting in Orlando, Fla., on Feb. 23, the EastWest Institute’s Chief Technology Officer Karl Frederick Rauscher previewed a joint China-United States report on cybersecurity to be published next month. Fighting Spam to Build Trust will be the first product of talks between Chinese and United States experts convened by EWI.
The EastWest Institute released the first joint Russian-American report aimed at defining the “rules of the road” for cyber conflict. Prepared by a team of Russian and U.S. experts convened by EWI, Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace explores how to extend the humanitarian principles that govern war to cyberspace.
The EastWest Institute released a report detailing the results of the First Worldwide Cybersecurity Summit: Protecting the Digital Economy, and outlining the cybersecurity initiative’s next steps as it prepares for the Second Worldwide Cybersecurity Summit in London on June 1-2.
|Microsoft on Global Cyber Supply Chain Management|
At the London Cybersecurity summit in June, Scott Charney, Microsoft's Corporate Vice President of Trustworthy Computing, delivered a keynote address titled "Supply Chain Risk Management: Toward a Global Vision of Transparency and Trust." Microsoft has published two white papers expanding on key principles that Charney outlined in his speech.
Toward a Global Vision of Transparency and Trust | Toward a Trusted Supply Chain: A Risk-Based Approach to Managing Software Integrity