Actions

Panel Subject 2019: Cybersecurity and safety

Important Links  Panel Guidelines  Survey Topic  Related Submissions

This page is for coordination among the panel team to openly discuss the topics that will be covered under the subject of the "Cybersecurity and safety" The page includes the relevant survey results, Panel Guidelines and a section for the panel team to discuss in the comments.

Important Links

Important Links
Collaborative Planning Document
Panel Team Committees
Join the Team

Panel Guidelines

Panel teams should use this process to discuss the panel and get as close as possible to consensus on the following items by April 17.

  • Decide on a concrete subject for the panel based upon discussion and rough consensus. The subject and process should take into account:
    • The IGF-USA Principles
    • The working title, working description and related submissions. See Below
  • Assign team leader(s) and a representative to interface with the steering committee and provide ongoing up to date information to the wrangler and secretariat.

Survey Topic

Working Title: How far do we take offensive cybersecurity?

Working Description: This session will discuss the logistics (waiting vs. following an active lead), legalities (law enforcement coordination, knowing when you’ve hit foreign cyber space and what to do, disclosure, reporting) and ethics (should anyone hack- back or does that exacerbate the problem) of who is responsible for cyber investigations: the government, a privatized cyber military, companies with critical infrastructure/public assets (public v. private networks), a hybrid of those, or anyone with a smartphone? Should the government explicitly legalize hacking- back; how so? Are there specific sectors (e.g., utilities, DNS, election infrastructure, mobile) that should permit hacking-back?

Related Submissions

<- Back to All Topics

Submission Number Submission Issue Areas
Submission Number Submission Issue Areas
2019 Submission 13 Protecting Consumers Against Phone Phising Cybersecurity
2019 Submission 17 Cyber Threat Intelligence Capture and Response Cybersecurity
2019 Submission 19 1. Merits and risks of consumer-driven privacy models.

2. Election infrastructure and security.

3. Info/ed session: device security/privacy
Cybersecurity
2019 Submission 2 Network Security Cybersecurity
2019 Submission 25 Unreasonable to have both public and private (Grid, ..) connected on the internet. There should be parallel structures like Intranet. Cybersecurity
2019 Submission 31 Attribution and incontrovertible digital identity Cybersecurity
2019 Submission 42 Principles Underpinning Norms for Cyberstability Cybersecurity
2019 Submission 45 Assume you will cover areas of cybersecurity policy, fake news vs. freedom of expression, GDPR vs. U.S. 'data as product' controversies, net Cybersecurity
2019 Submission 46 Internet of Things Governance Cybersecurity
2019 Submission 49 DNS Hijacking Cybersecurity
2019 Submission 5 1) Impact of Culture & Language on Internet UX, architecture, and business opportunities 2) The need and importance of Authenticationf Cybersecurity
2019 Submission 52 IDN Homographic Attacks Cybersecurity
2019 Submission 67 Weighing Security & Privacy Issues In Debate on DNS over HTTPS Cybersecurity