Register Now

The Summit will take place on October 30 and 31, 2012
at the Taj Palace Hotel in New Delhi. A number of rooms have been blocked for the summit and can be booked here.


> Regular fee: $ 450 | INR 23,700
> Partners fee: $ 350 | INR 18,124
> Registration is free for members of the PRESS.


Replay the summit highlights here.



His Excellency Kapil Sibal
Minister of Union for Communications and Information Technology
Committee Chairman


Sachin Pilot
Minister of State for Communications and IT

Milind Deora
Minister of State for Communications and IT

R. Chandrashekhar
Secretary of the Department of Telecommunications

J. Satyanarayana
Secretary of the Department of IT

Dr. B. K. Gairola
Director General, NIC

Dr. Gulshan Rai
Director, CERTS India

Som Mittal
President, NASSCOM

Nandan Nilekani
Chairman, UIDAI; Head, TAGUP

Dr. Rajiv Kumar
Secretary General, FICCI

Dr. Kamlesh Bajaj

Dr. Dilip Chenoy
CEO, National Skills Development Corporation


Virat Bhatia
Chairman, FICCI Communication and Digital Economy Committee

Anurag Jain
Chairman, Laurus Edutech

Sanjay Kapoor
CEO India & South Asia, Bharti Airtel

Marten Pieters
CEO, Vodafone India

C.S. Rao
President, Corporate Affairs and Regulatory, Reliance Communications

Udayan Sen
CEO and Managing Partner, Deloitte Haskins & Sells

TATA CommunicationsHuawei IEEE Communications SocietyFICCINASSCOMDSCIReliance Industries Limited MicrosoftVodafoneGoldman SachsKnightsbridge CybersystemsDeloitteAkin Gump Strauss Hauer & Feld AT&TFinancial TimesReliance CommunicationsStroz FriedbergFindelity InvestmentAirtelLaurus EdutechSteria IndiaMIT Technology ReviewTelegeographyFluxonixIdeaDataquest

Call for Papers

The Worldwide Cybersecurity Summit is a unique event that convenes experts, stakeholders and decision-makers from industry, government and academia to advance international policy to promote the security, stability and safety of cyberspace. As with the first two, this 3rd Summit is sponsored by the EastWest Institute, in partnership with its technical co-sponsor, the IEEE.

Consistent with EWI's reputation as a "think-and-do tank," the Summit fosters problem solving and solution recommendations for difficult international and consequential policy gaps in cyberspace, i.e. the internationally-focused Agreements, Standards, Policies and Regulations (ASPR) gaps. Ultimately, the Summit's format tackles the issues of mistrust and the confidence building necessary for global cooperation. The Summit prefers papers focused on ASPR gaps rather than strictly technology focused papers.

Papers are sought for international policy-related aspects of cybersecurity, including:

> Worldwide governance, frameworks and protocols for the day-to-day behavior, in cyberspace, policing cyberspace and the conduct of cyber conflict.

> Worldwide strategies and mechanisms for the reliability and resilience of the supply chain, infrastructure and emerging capabilities (e.g., the mobile ecosystem).

> Worldwide response strategies and mechanisms to cyber crisis (e.g., international priority communications, and trusted information sharing).

> Worldwide issues, awareness and education (e.g., protecting youth, spam and the private public partnerships need to secure the global economy).


> Contents must be original work
> Length of 4-6 pages
> Format per IEEE conference style (see *below for templates and guidelines)
> Cover page should clearly indicate the complete postal and email addresses, as well as phone of the contact author
> Submissions must be made in PDF format here.


Rolling > Full Paper Submissions (Submit early to ensure timely notification)
7 September > Final Acceptance Notifications
24 September > Camera-ready Final Paper Submission Due
8 October > Ready-to-Print Posters Due
30-31 October > Worldwide Cybersecurity Summit

Submission of an abstract implies the willingness of at least one of the authors to present a complete and final version of the paper at the Summit in New Delhi. Authors agree to advance release of papers to selected media outlets. Authors of selected papers, will have the opportunity to present in either a poster or parallel track session, and have their papers published in IEEE XPlore, and EI Index, with the exception that EWI and IEEE reserve the right to exclude any paper from distribution after the conference (e.g., removal from IEEE Xplore) if the paper is not presented at the conference. Papers that are removed from IEEE Xplore will not be available through the EI Index.


Template & guidelines | 2011 Papers | IEEE Xplore


After the previous editions in Dallas and London, the EastWest Institute is proudly bringing the Worldwide Cybersecurity Summit to India.

The Summit will take place on October 30 and 31, 2012 at the Taj Palace Hotel in New Delhi.

Replay the summit highlights HERE.


Anurag Jain
Arbind Prasad
Armen Sarkissian
Christopher Painter
Erin Nealy Cox
Greg Shannon
Gulshan Rai
Jason Pontin
John Edwin Mroz
John Suffolk
Kapil Sibal
Karl F. Rauscher
Latha Reddy
Maria Livanos Cattaui
Michael Chertoff
Mike St John Green
Mukesh D. Ambani
Philip J. Venables
Punit Renjen
R. Chandrashekhar
Ross Perot, Jr.
Som Mittal
Vartan Sarkissian
Vijay Bhargava
Zhou Yonglin


Like in London and Dallas, the format of the Summit will be highly interactive. This interactive working program gives participants unique opportunities to collaborate with professional peers from around the world. Participants can expect to be able to work on critical issues where international policy is stalled. These issues were identified at the first Summit in Dallas and the second Summit in London. The success of the Summit is measured by the breakthroughs made in these groups both during the meeting and in the followup activities.

The EastWest Institute, in partnership with the National Association of Software and Service Companies (NASSCOM) and the Federation of Indian Chambers of Commerce and Industry (FICCI), is sponsoring three new breakthrough groups. In consultation with the Indian government and private sector leaders, these new issues will be explored for detailed discussion at the Summit:

> ICT Development Supply Chain Integrity;

> ASPR for Globally Distributed Processing and Data Storage;

> Payload Security.

The objective for each of the breakthrough groups is to have actionable recommendations for industry and government that, if implemented, will have significant impact in making cyberspace and the real world more safe, more stable and more secure.


Fighting Spam & Botnets

Originating from our China-U.S. track 2 bilateral on cybersecurity, this breakthrough group utilizes international cooperation to effectively use representatives from countries with the highest-ranking sources of spam and across private and public sectors to develop, share and implement best practices to reduce spam in cyberspace.

Cyber Conflict Policy and Rules of the Road

This Russia-U.S. track 2 bilateral group, in coordination with senior government officials and private sector stakeholders, seeks to develop the most fundamental aspects of military conflict policies for cyberspace in order to avoid unnecessary escalation during situations of perceived aggression. The development of the underpinnings for such policies entails- agreements on terminology related to cyber and information security, and application of existing laws of war or the setting of rules of the road for cyber conflict.

Reliability of Global Undersea Communications Cable Infrastructure (ROGUCCI)

Through cooperation amongst industry subject matter experts, stakeholders and global policy champions, this breakthrough group works to improve the reliability and security of the Global Undersea Communications Infrastructure (GUCCI), which businesses and governments vitally depend on for global connectivity for their ongoing operation.

Priority International Communications (PIC) Policy

Recent tragic experiences have demonstrated the enormous demand and need for communications in the midst of catastrophes. Due to the lack of policies guiding the implementation of international technical standards, this breakthrough group works to create policy solutions, with the aim to champion the mobilization of resources to implement a priority communications capability worldwide.

Collective Action to Improve Global Internet Health

There is currently no global, coordinated approach to protecting people from malware and related threats. The goal of the breakthrough group is to examine how a public health model (PHM) might be used to imagine new approaches to protecting billions of Internet users.

Measuring the Cybersecurity Problem

The best assessments of the frequency and damages of cybersecurity breaches are incomplete. In addition, the most effective practices for promoting cybersecurity are shared to a limited degree. This breakthrough group seeks to develop new models for trusted information sharing including the establishment of a trusted environment in which cybersecurity compromises and best current practices can be shared.

ICT Development Supply Chain Integrity

Globalization has given governments and businesses access to the best-in-class ICT products, transforming the way these actors function. Given the increased dependence on ICT and the failure of existing methods to provide assurances of integrity, this group works to alleviate the doubts about the integrity of these products and the fears that adversaries may introduce malicious codes and functions to do surreptitious surveillance, disrupt services or at worst paralyze a nation.

Emergency Response Coordination for Major Cyber Incident in Financial Services

Financial service firms face an increased frequency, intensity and sophistication of electronic attacks and the industry faces the inability to respond collectively to these attacks. This breakthrough group works to define requirements across the financial services industry to improve the industry's operational ability to respond to cybersecurity incidents through information sharing and effective information security response coordination.

ASPR for Globally Distributed Processing and Data Storage

Distributed architecture optimizes low cost and convenience, with security considerations as a casualty, putting concerns such as privacy, information protection and even reliable access in jeopardy. The popularity of these services is attracting mass markets who are unaware or unable to compete without such services, and those who are aware are powerless to negotiate with the increasingly powerful multinational actors.

Payload Security

This breakthrough group works to address and find ways to break the current impasse surrounding the clash of existing policies and practices for electronic data encryption and interception, individual privacy and identity in cyberspace.

Protecting Youth - Building a Global Culture of Digital Citizenship

Because the evolution of the Internet has led to an increasingly user-driven experience in a constant state of change, early education in media awareness must be considered a huge component of any online safety strategy. This breakthrough group pursues tangible means to promote responsible digital citizenship amongst youth.

New Delhi 2012


> To mobilize new commitments by leading businesses and governments of Cyber40 countries to address cross-border cybersecurity challenges.

> To set in place new models for private sector leadership in addressing inherent vulnerabilities and emerging threats associated with global Internet connectivity and information and communications technology (ICT) development.

> To make advances on the most pressing issues in global management of critical ICT infrastructure with collaborative international breakthroughs.

> To frame an action plan for globally acceptable policies on cyber crime, the associated international investigative procedures and a framework for addressing the related very complex jurisdictional matters.

It is a great pleasure to welcome all of you to the 3rd Worldwide Cybersecurity Summit in New Delhi. We at the EastWest Institute are honored to host this first-of-its-kind meeting with leading thinkers, practitioners, and decision makers from India and around the world.

With its remarkable information technology industry and rapidly developing economy, India will play a key role in the world's efforts to secure our digital economy. Building on the policy progress represented by earlier summits in Dallas and London, the New Delhi Summit Process is breaking new ground in cybersecurity policy.

EWI's cybersecurity work is unique in that it not only encourages the exchange of ideas but facilitates the development and implementation of practical solutions to global challenges.

India's contribution, with the cooperation of government and private sector leaders such as Minister Kapil Sibal, NASSCOM's Som Mittal, and FICCI's Dr. Rajiv Kumar, allows the global community of specialists gathered here to ensure the wide applicability of their efforts. We hope it also helps build strong ties in the international cybersecurity community. After all, virtually everything in the digital era crosses international borders.

We thank you for your participation and look forward to great insights and tangible progress as the process continues.

Ross Perot, Jr.
Chairman of the Board, EastWest Institute
New Delhi 2012 Report, "Building Trust in Cyberspace"
Replay Summit Highlights
Summit Day 2: China and India Pledge to Work Together on Cybersecurity
Summit Day One Features India’s Minister Kapil Sibal and other Top Officials and Experts
A Critical Role for India
Cyber Detente Between the United States and China
Preparing for Times of Crisis
The Failed Cybersecurity Act of 2012
A Reality-Based Model for Cyber Conflict
The Internet Health Model for Cybersecurity




October 30-31, 2012 New Delhi

The Problem

Every day, billions of phishing emails bombard personal computers, carrying malware and viruses. Hackers steal client data from company websites, accusations of cyber espionage fly and countries uneasily wonder whether cyber attacks can be considered acts of war.

At EWI, here's how we understand the global cybersecurity challenge: As technical innovation has skyrocketed, the global economy has become increasingly digitalized.

Every day, we depend more on the worldwide web and its infrastructure, from the undersea cables that carry over 99% of intercontinental Internet traffic to our own mobile web access devices. Cyber crime exploiting these technologies is on the rise, but the agreements, standards, policies and regulations we need to secure cyberspace lag far behind. To track cyber criminals, protect Internet users and secure critical infrastructure, we must address the growing gap between technology and our controls over it - all of us.

Our Solution

Securing cyberspace is a global challenge - one that cannot be solved by a single company or country alone. That is why the EastWest Institute launched the Worldwide Cybersecurity Initiative in 2009, bringing together government and corporate partners to protect our world's digital infrastructure.

Drawing on a thirty-year history of building trust, EWI formed the Cyber40, a coalition of representatives from the world's most digitally-advanced countries. The Cyber40 is working to shape rules of the road for cyber conflict and fighting cyber crime through international cooperation. EWI is also helping to build innovative private-public partnerships on cybersecurity, and working towards an effective global cyberspace emergency response capability.

Since 2010, over 1,000 business, government and technical leaders have been involved in EWI's ongoing cybersecurity initiative. Our government partners include Russia, China, the United States, France, Germany, India and Japan, who are all members of an innovative forum known as EWI's Cyber40 Ambassadors group. Our corporate partners and supporters include Microsoft, Deloitte, Vodafone, Reliance Industries Limited, Goldman Sachs, Knightsbridge Cybersystems, Bharti Airtel, Reliance Communications, Financial Times, Fidelity Investments, AT&T, Akin Gump, Huawei, Stroz Friedberg, IDEA, Laurus Edutech and Steria. EWI and the IEEE Communications Society have established a partnership to support the policy aspects of cybersecurity, and the IEEE Communications Society serves as the technical co-sponsor for EWI annual worldwide summits. EWI's annual cybersecurity summits provide a crucial forum for building international, private-public partnerships and for shaping the agreements, standards, policies and regulations (ASPR) we need to protect cyberspace.

What People Say

Here's a look at how world experts saw the cybersecurity challenge in Dallas 2010 and how they saw it one year later in London 2011.

EWI's Global Effort

All around the world, companies, governments and nonprofits are working independently on cybersecurity. EWI's cybersecurity initiative is distinguished by our truly global scope - and our ability to bring experts from different countries and sectors together to forge solutions. The first step to creating collective solutions is building trust - a method that has been at the heart of EWI's activities for the past thirty years.

Established during the Cold War, EWI's original mission was to build trust between what was then called the East and West: The Soviet Union and the Warsaw Pact countries, and the United States and its NATO allies.

Forging a unique "Track 2" diplomatic approach, EWI encouraged business, government and civil society leaders from both sides of the Iron Curtain to work together on some of the era's most divisive issues. Thanks to our legacy, EWI has earned a reputation as a trusted convener and honest broker. In this capacity, EWI has launched cutting-edge cybersecurity collaborations between the United States and Russia, and the United States and China. Looking to the future, EWI is also reaching out to leaders in India and other rising cyber powers.
Tackling Cyber Crime


EWI's Cyber Crime Working Group examines existing and potential legal measures to combat cyber crime. The group consists of experts from Norway, India, Russia, the United Kingdom, the United States, France, Switzerland, Sri Lanka, Italy and Belgium.

They work toward a set of recommendations for harmonized legal frameworks to fight cyber crime through increased international cooperation. At their February 2011 meeting, participants agreed that regional approaches incorporating government and private sector actors will be a precursor to successful global policy.



Reliability of Global Undersea Cable Communications Infrastructure (ROGUCCI) is an advocacy program EWI developed with the IEEE to protect the vital undersea cables that carry over 99% of intercontinental Internet messages. The ongoing implementation of ROGUCCI recommendations is an example of a key objective of the EWI Worldwide Cybersecurity Initiative: unleashing private sector leadership in global cybersecurity policy.

Summit Series


EWI's annual cybersecurity summits provide a crucial forum for building international, private-public partnerships and for shaping the agreements, standards, policies and regulations (ASPR) we need to protect cyberspace. The 1st Worldwide Cybersecurity Summit: Protecting the Digital Economy was held in Dallas in May 2010, the 2nd Worldwide Cybersecurity Summit: Mobilizing for International Action was held June 1-2 2011 in London and brought together more than 450 government, industry and technical leaders from 43 countries to craft new solutions for threats facing our digital world. The 3rd Worldwide Cybersecurity Summit will be held in New Delhi, October 30-31, 2012.

International Collaborations


In our capacity as an experienced Track 2 convener, EWI has launched cutting-edge international cybersecurity collaborations. In February of 2011, EWI released the first ever joint U.S.-Russia publication on cyberspace, Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace. Produced by a team of U.S. and Russian experts, the report explores how to extend the humanitarian principles that govern war to cyberspace. This groundbreaking report grabbed worldwide attention because it modeled the kind of international cooperation that is possible - and necessary - in cyberspace. Partnering with the Internet Society of China, EWI regularly brings together Chinese and U.S. experts to confront some of the toughest threats to cyberspace. In June 2011, EWI released the first joint U.S.-China report to address a major cybersecurity challenge, Fighting Spam to Build Trust - the first product of the team's ongoing collaboration. EWI is now reaching out to an emerging cyber power: India.



EWI's Cyber40 entered its third year in 2012. The Cyber40 helps senior diplomats from the most critical powers in cyberspace communicate in frank and constructive ways with U.S. officials, members of Congress and private sector leaders on cybersecurity issues. The forum is deliberately low-profile and only engages ambassador- and deputy chief of mission-level officials of the Cyber40 nations based in Washington. Recently events were held at the Kazakh and Swiss embassies on subjects including "rules of the road" in cyber conflict and new legal mechanisms to enhance international cooperation in cyberspace.

Our Experts

EWI's Worldwide Cybersecurity Initiative is made up of a diverse group of professionals, ranging from top government and military advisors to business and technical consultants. If you are interested in contacting one of our cybersecurity experts, please contact us.

Franz-Stefan Gady
Greg Austin
Karl F. Rauscher
Lt. General (Ret.) Harry D. Raduege, Jr.
Michael Chertoff
Stein Schjolberg
Stuart Goldman
Vartan Sarkissian

Contact Us

India Representative
Franz-Stefan Gady
+91 8879263679

EWI New York
11 East 26th Street
20th Floor
New York, NY 10010
Tel: +1-212-824-4100

EWI Brussels
59-61 Rue de Treves
1040 Brussels
Tel: +32-2-743-4610

EWI Moscow
7/5 Bolshaya Dmitrovka Str
Bldg. 1, 6th Floor
Moscow 125009
Tel: +7-495-234-7797


Enter the characters shown in the image.

Website developed by makeyour-point