Like in London and Dallas, the format of the Summit will be highly interactive. This interactive working program gives participants unique opportunities to collaborate with professional peers from around the world. Participants can expect to be able to work on critical issues where international policy is stalled. These issues were identified at the first Summit in Dallas and the second Summit in London. The success of the Summit is measured by the breakthroughs made in these groups both during the meeting and in the followup activities.
The EastWest Institute, in partnership with the National Association of Software and Service Companies (NASSCOM) and the Federation of Indian Chambers of Commerce and Industry (FICCI), is sponsoring three new breakthrough groups. In consultation with the Indian government and private sector leaders, these new issues will be explored for detailed discussion at the Summit:
> ICT Development Supply Chain Integrity;
> ASPR for Globally Distributed Processing and Data Storage;
> Payload Security.
The objective for each of the breakthrough groups is to have actionable recommendations for industry and government that, if implemented, will have significant impact in making cyberspace and the real world more safe, more stable and more secure.
> READ MORE: CYBER CRIME WORKING GROUP
Fighting Spam & Botnets
Originating from our China-U.S. track 2 bilateral on cybersecurity, this breakthrough group utilizes international cooperation to effectively use representatives from countries with the highest-ranking sources of spam and across private and public sectors to develop, share and implement best practices to reduce spam in cyberspace.
Cyber Conflict Policy and Rules of the Road
This Russia-U.S. track 2 bilateral group, in coordination with senior government officials and private sector stakeholders, seeks to develop the most fundamental aspects of military conflict policies for cyberspace in order to avoid unnecessary escalation during situations of perceived aggression. The development of the underpinnings for such policies entails- agreements on terminology related to cyber and information security, and application of existing laws of war or the setting of rules of the road for cyber conflict.
Reliability of Global Undersea Communications Cable Infrastructure (ROGUCCI)
Through cooperation amongst industry subject matter experts, stakeholders and global policy champions, this breakthrough group works to improve the reliability and security of the Global Undersea Communications Infrastructure (GUCCI), which businesses and governments vitally depend on for global connectivity for their ongoing operation.
Priority International Communications (PIC) Policy
Recent tragic experiences have demonstrated the enormous demand and need for communications in the midst of catastrophes. Due to the lack of policies guiding the implementation of international technical standards, this breakthrough group works to create policy solutions, with the aim to champion the mobilization of resources to implement a priority communications capability worldwide.
Collective Action to Improve Global Internet Health
There is currently no global, coordinated approach to protecting people from malware and related threats. The goal of the breakthrough group is to examine how a public health model (PHM) might be used to imagine new approaches to protecting billions of Internet users.
Measuring the Cybersecurity Problem
The best assessments of the frequency and damages of cybersecurity breaches are incomplete. In addition, the most effective practices for promoting cybersecurity are shared to a limited degree. This breakthrough group seeks to develop new models for trusted information sharing including the establishment of a trusted environment in which cybersecurity compromises and best current practices can be shared.
ICT Development Supply Chain Integrity
Globalization has given governments and businesses access to the best-in-class ICT products, transforming the way these actors function. Given the increased dependence on ICT and the failure of existing methods to provide assurances of integrity, this group works to alleviate the doubts about the integrity of these products and the fears that adversaries may introduce malicious codes and functions to do surreptitious surveillance, disrupt services or at worst paralyze a nation.
Emergency Response Coordination for Major Cyber Incident in Financial Services
Financial service firms face an increased frequency, intensity and sophistication of electronic attacks and the industry faces the inability to respond collectively to these attacks. This breakthrough group works to define requirements across the financial services industry to improve the industry's operational ability to respond to cybersecurity incidents through information sharing and effective information security response coordination.
ASPR for Globally Distributed Processing and Data Storage
Distributed architecture optimizes low cost and convenience, with security considerations as a casualty, putting concerns such as privacy, information protection and even reliable access in jeopardy. The popularity of these services is attracting mass markets who are unaware or unable to compete without such services, and those who are aware are powerless to negotiate with the increasingly powerful multinational actors.
This breakthrough group works to address and find ways to break the current impasse surrounding the clash of existing policies and practices for electronic data encryption and interception, individual privacy and identity in cyberspace.
Protecting Youth - Building a Global Culture of Digital Citizenship
Because the evolution of the Internet has led to an increasingly user-driven experience in a constant state of change, early education in media awareness must be considered a huge component of any online safety strategy. This breakthrough group pursues tangible means to promote responsible digital citizenship amongst youth.