The Summit will take place on October 30 and 31, 2012
at the Taj Palace Hotel in New Delhi. A number of rooms have been blocked for the summit and can be booked here.
> Regular fee: $ 450 | INR 23,700
> Partners fee: $ 350 | INR 18,124
> Registration is free for members of the PRESS.
REGISTRATION IS NOW CLOSED.
His Excellency Kapil Sibal
Minister of Union for Communications and Information Technology
Minister of State for Communications and IT
Minister of State for Communications and IT
Secretary of the Department of Telecommunications
Secretary of the Department of IT
Dr. B. K. Gairola
Director General, NIC
Dr. Gulshan Rai
Director, CERTS India
Chairman, UIDAI; Head, TAGUP
Dr. Rajiv Kumar
Secretary General, FICCI
Dr. Dilip Chenoy
CEO, National Skills Development Corporation
Chairman, FICCI Communication and Digital Economy Committee
Chairman, Laurus Edutech
CEO India & South Asia, Bharti Airtel
CEO, Vodafone India
President, Corporate Affairs and Regulatory, Reliance Communications
CEO and Managing Partner, Deloitte Haskins & Sells
Call for Papers
The Worldwide Cybersecurity Summit is a unique event that convenes experts, stakeholders and decision-makers from industry, government and academia to advance international policy to promote the security, stability and safety of cyberspace. As with the first two, this 3rd Summit is sponsored by the EastWest Institute, in partnership with its technical co-sponsor, the IEEE.
Consistent with EWI's reputation as a "think-and-do tank," the Summit fosters problem solving and solution recommendations for difficult international and consequential policy gaps in cyberspace, i.e. the internationally-focused Agreements, Standards, Policies and Regulations (ASPR) gaps. Ultimately, the Summit's format tackles the issues of mistrust and the confidence building necessary for global cooperation. The Summit prefers papers focused on ASPR gaps rather than strictly technology focused papers.
Papers are sought for international policy-related aspects of cybersecurity, including:
> Worldwide governance, frameworks and protocols for the day-to-day behavior, in cyberspace, policing cyberspace and the conduct of cyber conflict.
> Worldwide strategies and mechanisms for the reliability and resilience of the supply chain, infrastructure and emerging capabilities (e.g., the mobile ecosystem).
> Worldwide response strategies and mechanisms to cyber crisis (e.g., international priority communications, and trusted information sharing).
> Worldwide issues, awareness and education (e.g., protecting youth, spam and the private public partnerships need to secure the global economy).
> Contents must be original work
> Length of 4-6 pages
> Format per IEEE conference style (see *below for templates and guidelines)
> Cover page should clearly indicate the complete postal and email addresses, as well as phone of the contact author
> Submissions must be made in PDF format here.
Rolling > Full Paper Submissions (Submit early to ensure timely notification)
7 September > Final Acceptance Notifications
24 September > Camera-ready Final Paper Submission Due
8 October > Ready-to-Print Posters Due
30-31 October > Worldwide Cybersecurity Summit
Submission of an abstract implies the willingness of at least one of the authors to present a complete and final version of the paper at the Summit in New Delhi. Authors agree to advance release of papers to selected media outlets. Authors of selected papers, will have the opportunity to present in either a poster or parallel track session, and have their papers published in IEEE XPlore, and EI Index, with the exception that EWI and IEEE reserve the right to exclude any paper from distribution after the conference (e.g., removal from IEEE Xplore) if the paper is not presented at the conference. Papers that are removed from IEEE Xplore will not be available through the EI Index.
Like in London and Dallas, the format of the Summit will be highly interactive. This interactive working program gives participants unique opportunities to collaborate with professional peers from around the world. Participants can expect to be able to work on critical issues where international policy is stalled. These issues were identified at the first Summit in Dallas and the second Summit in London. The success of the Summit is measured by the breakthroughs made in these groups both during the meeting and in the followup activities.
The EastWest Institute, in partnership with the National Association of Software and Service Companies (NASSCOM) and the Federation of Indian Chambers of Commerce and Industry (FICCI), is sponsoring three new breakthrough groups. In consultation with the Indian government and private sector leaders, these new issues will be explored for detailed discussion at the Summit:
> ICT Development Supply Chain Integrity;
> ASPR for Globally Distributed Processing and Data Storage;
> Payload Security.
The objective for each of the breakthrough groups is to have actionable recommendations for industry and government that, if implemented, will have significant impact in making cyberspace and the real world more safe, more stable and more secure.
> READ MORE: CYBER CRIME WORKING GROUP
Fighting Spam & Botnets
Originating from our China-U.S. track 2 bilateral on cybersecurity, this breakthrough group utilizes international cooperation to effectively use representatives from countries with the highest-ranking sources of spam and across private and public sectors to develop, share and implement best practices to reduce spam in cyberspace.
Cyber Conflict Policy and Rules of the Road
This Russia-U.S. track 2 bilateral group, in coordination with senior government officials and private sector stakeholders, seeks to develop the most fundamental aspects of military conflict policies for cyberspace in order to avoid unnecessary escalation during situations of perceived aggression. The development of the underpinnings for such policies entails- agreements on terminology related to cyber and information security, and application of existing laws of war or the setting of rules of the road for cyber conflict.
Reliability of Global Undersea Communications Cable Infrastructure (ROGUCCI)
Through cooperation amongst industry subject matter experts, stakeholders and global policy champions, this breakthrough group works to improve the reliability and security of the Global Undersea Communications Infrastructure (GUCCI), which businesses and governments vitally depend on for global connectivity for their ongoing operation.
Priority International Communications (PIC) Policy
Recent tragic experiences have demonstrated the enormous demand and need for communications in the midst of catastrophes. Due to the lack of policies guiding the implementation of international technical standards, this breakthrough group works to create policy solutions, with the aim to champion the mobilization of resources to implement a priority communications capability worldwide.
Collective Action to Improve Global Internet Health
There is currently no global, coordinated approach to protecting people from malware and related threats. The goal of the breakthrough group is to examine how a public health model (PHM) might be used to imagine new approaches to protecting billions of Internet users.
Measuring the Cybersecurity Problem
The best assessments of the frequency and damages of cybersecurity breaches are incomplete. In addition, the most effective practices for promoting cybersecurity are shared to a limited degree. This breakthrough group seeks to develop new models for trusted information sharing including the establishment of a trusted environment in which cybersecurity compromises and best current practices can be shared.
ICT Development Supply Chain Integrity
Globalization has given governments and businesses access to the best-in-class ICT products, transforming the way these actors function. Given the increased dependence on ICT and the failure of existing methods to provide assurances of integrity, this group works to alleviate the doubts about the integrity of these products and the fears that adversaries may introduce malicious codes and functions to do surreptitious surveillance, disrupt services or at worst paralyze a nation.
Emergency Response Coordination for Major Cyber Incident in Financial Services
Financial service firms face an increased frequency, intensity and sophistication of electronic attacks and the industry faces the inability to respond collectively to these attacks. This breakthrough group works to define requirements across the financial services industry to improve the industry's operational ability to respond to cybersecurity incidents through information sharing and effective information security response coordination.
ASPR for Globally Distributed Processing and Data Storage
Distributed architecture optimizes low cost and convenience, with security considerations as a casualty, putting concerns such as privacy, information protection and even reliable access in jeopardy. The popularity of these services is attracting mass markets who are unaware or unable to compete without such services, and those who are aware are powerless to negotiate with the increasingly powerful multinational actors.
This breakthrough group works to address and find ways to break the current impasse surrounding the clash of existing policies and practices for electronic data encryption and interception, individual privacy and identity in cyberspace.
Protecting Youth - Building a Global Culture of Digital Citizenship
Because the evolution of the Internet has led to an increasingly user-driven experience in a constant state of change, early education in media awareness must be considered a huge component of any online safety strategy. This breakthrough group pursues tangible means to promote responsible digital citizenship amongst youth.
New Delhi 2012
2012 SUMMIT AIMS
> To mobilize new commitments by leading businesses and governments of Cyber40 countries to address cross-border cybersecurity challenges.
> To set in place new models for private sector leadership in addressing inherent vulnerabilities and emerging threats associated with global Internet connectivity and information and communications technology (ICT) development.
> To make advances on the most pressing issues in global management of critical ICT infrastructure with collaborative international breakthroughs.
> To frame an action plan for globally acceptable policies on cyber crime, the associated international investigative procedures and a framework for addressing the related very complex jurisdictional matters.
It is a great pleasure to welcome all of you to the 3rd Worldwide Cybersecurity Summit in New Delhi. We at the EastWest Institute are honored to host this first-of-its-kind meeting with leading thinkers, practitioners, and decision makers from India and around the world.
With its remarkable information technology industry and rapidly developing economy, India will play a key role in the world's efforts to secure our digital economy. Building on the policy progress represented by earlier summits in Dallas and London, the New Delhi Summit Process is breaking new ground in cybersecurity policy.
EWI's cybersecurity work is unique in that it not only encourages the exchange of ideas but facilitates the development and implementation of practical solutions to global challenges.
India's contribution, with the cooperation of government and private sector leaders such as Minister Kapil Sibal, NASSCOM's Som Mittal, and FICCI's Dr. Rajiv Kumar, allows the global community of specialists gathered here to ensure the wide applicability of their efforts. We hope it also helps build strong ties in the international cybersecurity community. After all, virtually everything in the digital era crosses international borders.
We thank you for your participation and look forward to great insights and tangible progress as the process continues.
Chairman of the Board, EastWest Institute
Every day, billions of phishing emails bombard personal computers, carrying malware and viruses. Hackers steal client data from company websites, accusations of cyber espionage fly and countries uneasily wonder whether cyber attacks can be considered acts of war.
At EWI, here's how we understand the global cybersecurity challenge: As technical innovation has skyrocketed, the global economy has become increasingly digitalized.
Securing cyberspace is a global challenge - one that cannot be solved by a single company or country alone. That is why the EastWest Institute launched the Worldwide Cybersecurity Initiative in 2009, bringing together government and corporate partners to protect our world's digital infrastructure.
Drawing on a thirty-year history of building trust, EWI formed the Cyber40, a coalition of representatives from the world's most digitally-advanced countries. The Cyber40 is working to shape rules of the road for cyber conflict and fighting cyber crime through international cooperation. EWI is also helping to build innovative private-public partnerships on cybersecurity, and working towards an effective global cyberspace emergency response capability.
EWI's Global Effort
All around the world, companies, governments and nonprofits are working independently on cybersecurity. EWI's cybersecurity initiative is distinguished by our truly global scope - and our ability to bring experts from different countries and sectors together to forge solutions. The first step to creating collective solutions is building trust - a method that has been at the heart of EWI's activities for the past thirty years.
Established during the Cold War, EWI's original mission was to build trust between what was then called the East and West: The Soviet Union and the Warsaw Pact countries, and the United States and its NATO allies.
TACKLING CYBER CRIME
EWI's Cyber Crime Working Group examines existing and potential legal measures to combat cyber crime. The group consists of experts from Norway, India, Russia, the United Kingdom, the United States, France, Switzerland, Sri Lanka, Italy and Belgium.
They work toward a set of recommendations for harmonized legal frameworks to fight cyber crime through increased international cooperation. At their February 2011 meeting, participants agreed that regional approaches incorporating government and private sector actors will be a precursor to successful global policy.
Reliability of Global Undersea Cable Communications Infrastructure (ROGUCCI) is an advocacy program EWI developed with the IEEE to protect the vital undersea cables that carry over 99% of intercontinental Internet messages. The ongoing implementation of ROGUCCI recommendations is an example of a key objective of the EWI Worldwide Cybersecurity Initiative: unleashing private sector leadership in global cybersecurity policy.
OUR SUMMIT PROCESS
EWI's annual cybersecurity summits provide a crucial forum for building international, private-public partnerships and for shaping the agreements, standards, policies and regulations (ASPR) we need to protect cyberspace. The 1st Worldwide Cybersecurity Summit: Protecting the Digital Economy was held in Dallas in May 2010, the 2nd Worldwide Cybersecurity Summit: Mobilizing for International Action was held June 1-2 2011 in London and brought together more than 450 government, industry and technical leaders from 43 countries to craft new solutions for threats facing our digital world. The 3rd Worldwide Cybersecurity Summit will be held in New Delhi, October 30-31, 2012.
In our capacity as an experienced Track 2 convener, EWI has launched cutting-edge international cybersecurity collaborations. In February of 2011, EWI released the first ever joint U.S.-Russia publication on cyberspace, Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace. Produced by a team of U.S. and Russian experts, the report explores how to extend the humanitarian principles that govern war to cyberspace. This groundbreaking report grabbed worldwide attention because it modeled the kind of international cooperation that is possible - and necessary - in cyberspace. Partnering with the Internet Society of China, EWI regularly brings together Chinese and U.S. experts to confront some of the toughest threats to cyberspace. In June 2011, EWI released the first joint U.S.-China report to address a major cybersecurity challenge, Fighting Spam to Build Trust - the first product of the team's ongoing collaboration. EWI is now reaching out to an emerging cyber power: India.
EWI's Cyber40 entered its third year in 2012. The Cyber40 helps senior diplomats from the most critical powers in cyberspace communicate in frank and constructive ways with U.S. officials, members of Congress and private sector leaders on cybersecurity issues. The forum is deliberately low-profile and only engages ambassador- and deputy chief of mission-level officials of the Cyber40 nations based in Washington. Recently events were held at the Kazakh and Swiss embassies on subjects including "rules of the road" in cyber conflict and new legal mechanisms to enhance international cooperation in cyberspace.
EWI New York
11 East 26th Street
New York, NY 10010
59-61 Rue de Treves
7/5 Bolshaya Dmitrovka Str
Bldg. 1, 6th Floor