Difference between revisions of "Panel Subject 2019: Inclusion"

From IGF-USA Wiki
Jump to: navigation, search
Line 31: Line 31:
  |fields=Timestamp,_pageName=Submission Number,Submission,Issue_Areas,Comments,SG
  |fields=Timestamp,_pageName=Submission Number,Submission,Issue_Areas,Comments,SG
  |where=Issue_Areas HOLDS 'Access' OR Issue_Areas HOLDS 'Cybersecurity'
  |where=Issue_Areas HOLDS 'Cybersecurity'
  |order by=_pageName ASC
  |order by=_pageName ASC
  |format=dynamic table
  |format=dynamic table

Revision as of 13:50, 29 March 2019

{{#invoke:Clickable button 2|main}}  {{#invoke:Clickable button 2|main}}  {{#invoke:Clickable button 2|main}}  {{#invoke:Clickable button 2|main}}

This page is for coordination among the panel team to openly discuss the topics that will be covered under the subject of the "Inclusion" The page includes the relevant survey results, Panel Guidelines and a section for the panel team to discuss in the comments.

Important Links

Important Links
Collaborative Planning Document
Panel Team Committees
Join the Team

Panel Guidelines

Panel teams should use this process to discuss the panel and get as close as possible to consensus on the following items by April 17.

  • Decide on a concrete subject for the panel based upon discussion and rough consensus. The subject and process should take into account:
    • The IGF-USA Principles
    • The working title, working description and related submissions. See Below
  • Assign team leader(s) and a representative to interface with the steering committee and provide ongoing up to date information to the wrangler and secretariat.

Survey Topic

Working Title: How far do we take offensive cybersecurity?

Working Description: This session will discuss the logistics (waiting vs. following an active lead), legalities (law enforcement coordination, knowing when you’ve hit foreign cyber space and what to do, disclosure, reporting) and ethics (should anyone hack- back or does that exacerbate the problem) of who is responsible for cyber investigations: the government, a privatized cyber military, companies with critical infrastructure/public assets (public v. private networks), a hybrid of those, or anyone with a smartphone? Should the government explicitly legalize hacking- back; how so? Are there specific sectors (e.g., utilities, DNS, election infrastructure, mobile) that should permit hacking-back?

Related Submissions

<- Back to All Topics

Timestamp Submission Number Submission Issue Areas Comments SG
Timestamp Submission Number Submission Issue Areas Comments SG
2019-02-03 2:15:23 PM 2019 Submission 13 Protecting Consumers Against Phone Phising Cybersecurity As people have more information about themselves available online, with more data breaches occurring, it is simple for scammers to use credible information to build trust and initiate spear phasing attacks, leaving the victim with their personal identity information compromised and or financially distressed. Social engineering attacks are difficult to combat, and especially difficult to recover from in terms of financially, psychologically, and more. How might we help people protect themselves from theses phasing scams, particularly when they use social engineering tactics? This project will explore potential solutions to better protect consumers based on data collected on “VISHING’ (VOICE PHISING) attacks. The first phase will entail information gathering through in-depth interviews and scraping online sources, and the second phase will include designing a prototype of a tool for consumers to protect themselves against social engineering tactics and testing its plausibility with users. Source-Michelle Chen,, Master of Information Management and System (MIMS), School of Information, UC Berkeley Private Sector
2019-02-04 11:41:15 AM 2019 Submission 17 Cyber Threat Intelligence Capture and Response Cybersecurity I think the IGF might like to consider the current state of play on threat intelligence and how this critical area of WWW development might be developed to make the internet a safer place for everyone to interact with. Technical Community
2019-02-04 12:15:39 PM 2019 Submission 19 1. Merits and risks of consumer-driven privacy models.

2. Election infrastructure and security.

3. Info/ed session: device security/privacy
Cybersecurity Private Sector
2019-01-28 10:48:09 AM 2019 Submission 2 Network Security Cybersecurity Intrusion Prevention System Civil Society / Academia
2019-02-04 8:55:13 PM 2019 Submission 25 Unreasonable to have both public and private (Grid, ..) connected on the internet. There should be parallel structures like Intranet. Cybersecurity Private structures like the Grid, Power Plants and Banks should have its own and not provide access to their secure information and controls online. Civil Society / Academia
2019-02-06 9:33:51 AM 2019 Submission 31 Attribution and incontrovertible digital identity Cybersecurity Digital Identity to counter identity theft. Attribution, and provenance of sources and facts, to counter "fake news" and public opinion manipulation. Private Sector
2019-02-08 5:30:37 PM 2019 Submission 42 Principles Underpinning Norms for Cyberstability Cybersecurity As part of its mission the Global Commission on the Stability of Cyberspace (GCSC, https://cyberstability.org) is documenting a set of principles that guide stakeholders in achieving cyber stability and that are the foundation for norms proposed by the commission. Norms such as "the Call to Protect the Public Core of the Internet" (https://cyberstability.org/research/call-to-protect/), and those published in the 'Singapore Norm Package"(https://cyberstability.org/wp-content/uploads/2018/11/GCSC-Singapore-Norm-Package-3MB.pdf) . During this session, members of the GCSC want to engage in a conversation with the US IGF community in order to inform their work. Technical Community
2019-02-11 8:44:39 AM 2019 Submission 45 Assume you will cover areas of cybersecurity policy, fake news vs. freedom of expression, GDPR vs. U.S. 'data as product' controversies, net Cybersecurity neutrality status. Note: I am moving to Washington end February, interested in participating in committee once the chaos of the move is over. Technical Community
2019-02-11 9:05:55 AM 2019 Submission 46 Internet of Things Governance Cybersecurity Norms of Internet governance (open standards, multistakeholder coordination, immunity from intermediary liability) are being challenged by cyber- physical systems. At the same time, these systems are creating unprecedented security and privacy problems with cascading effects on the entire Internet. What needs to happen now? Civil Society / Academia
2019-02-11 9:16:08 AM 2019 Submission 49 DNS Hijacking Cybersecurity Consider the following: https://cyber.dhs.gov/ed/19-01/. The bottom line here is that it's time for an upgrade of security employed to protect domain name registrations. Even DNSSEC is weakened by this category of failure. At least "important" domain names should consider registration security requirements. Technical Community
2019-01-28 7:54:02 PM 2019 Submission 5 1) Impact of Culture & Language on Internet UX, architecture, and business opportunities 2) The need and importance of Authenticationf Cybersecurity 1) Culture and Language: How do these things impact what people want from the Internet and how Internet-centered businesses best deliver Internet experiences to the end-user? (Submitted last year resubmitting this year.) 2) Last year, trust was spoken about as a problem throughout the panel sessions, but the best possible solution is authentication. Can authentication (i.e., handshakes, access management, identities, verification of information, etc.) How can authentication be improved to provide better cybersecurity, functionality, data persistence, and help fight social problems (i.e., crime, fake news, psychological disorders etc.) arriving from the lack Authenticity. Civil Society / Academia
2019-02-11 9:25:40 AM 2019 Submission 52 IDN Homographic Attacks Cybersecurity Consider the following: https://static.ptbl.co/static/attachments/191691/1540208800.pdf?1540208800. That presentation is somewhat technical but the concern is easily motivated and described. We need better user tools and applications that account for this directly, and they are possible. This is a universal acceptance issue. Technical Community
2019-02-11 3:00:45 PM 2019 Submission 67 Weighing Security & Privacy Issues In Debate on DNS over HTTPS Cybersecurity Mozilla, CloudFlare, Tucows, British Telecom, and PowerDNS would be examples of great candidates to discuss this important issue, and I'd be happy to help pull something like this together. Private Sector