Program Agenda - Tuesday, 15 September

 
8:30-9:00 Arrival Coffee & Registration

9:00-9:15

Opening Plenary Session:  Welcome remarks

  • Jamie Clark, General Counsel, OASIS
  • Pierre Guislain, Senior Director, The World Bank

9:15-9:45

Our Cyber Security Landscape:  The need to prioritize today & tomorrow

  • Jonathan Litchman, Co-Founder and CEO, The Providence Group

With recent data breaches, emerging security threats, and a constantly evolving risk landscape, the importance of having leaders who understand, support and advance security is paramount.  Our cyberspace is a dynamic environment with challenges and threats constantly changing. Addressing cybersecurity requirements calls for a balanced approach, including the adoption of innovative technologies that work in harmony to establish an ecosystem to immediately address the threat landscape as it changes. Frank discussions need to start happening and should include how innovation needs to be built into our cybersecurity strategies, as well as how needs can be proactively identified. This presentation will address today's landscape, priorities, and the need to integrate best practices that create real tangible value.

9:45-10:15

Cyber Security in a Borderless World

  • Adnan Amjad, Partner | Cyber Threat Risk Management, Deloitte & Touche LLP

In a world increasingly driven by digital technologies and information, cyber-threat management is more than just a strategic imperative. It’s a fundamental part of doing business domestically and internationally. Yet for many leaders and C-suite executives, cybersecurity remains vague and complex. Although it's on your strategic agenda, what does it really mean? And what can you do to shore up its defenses and protect against cyber-threats? Attacks that happen most frequently are completely indiscriminate – using scripted, automated tools that identify and exploit whatever weaknesses they happen to find. Compliance, although essential, does not always equal security, and simply reacting to events reported in the media may cause a loss of focus.  This presentation will address how government regulatory activities and corporate risk management activities are continuing to reach extremely high levels. Their attention to information security and sensitive data protection has never been greater. Coupled with the pervasive role of IT, the high value of IT assets, and the rapid rise of cyber crime, this is an ideal time to press the case for maintaining, or increasing, an investment in cyber security.

 10:15-10:45

Keynote Address:  Digital Dignity in an Era of Cyber Insecurity

  • Nuala O'Connor, President & CEO, Center for Democracy & Technology

As all aspects of our lives become more connected, people are sharing more of their most personal information and private thoughts digitally. This ubiquity of data has led to a surge in cyber attacks that require real action. However, tackling cybersecurity challenges does not require one to give up their privacy rights. Cybersecurity can be achieved while still maintaining our rights online and promoting digital dignity for everyone.

10:45-11:15 Refreshment Break

11:15-12:45

[Interactive Roundtable Discussion] Cybersecurity: A global issue fostering collaboration  

Session Facilitator: Sandra Sargent, Senior Operations Officer, The World Bank

  • Belisario Contreras, Program Manager, Organization of American States (OAS)
  • Fernando Nikitin, Principal Auditor, Inter-American Development Bank (IADB)
  • Amir Becker, Director of Cyber Cooperation, Embassy of Israel
  • Giulio Busulini, Scientific Attache' at the Embassy of Italy

International and regional cooperation among stakeholders is vital in the advancement of the Information Society for supporting sustainable development beyond 2015. The World Bank works collectively to advance information communication technologies (ICTs) for development through agreed indicators and data, enhanced inter-regional and cross-sectoral cooperation, knowledge exchange and transfer, and increased accountability of development aid and access by developing countries (including the least developed countries, small island developing states, landlocked developing countries and countries with economies in transition).  This interactive panel session of key stakeholders will open up about the work they are doing on cybersecurity, the importance of promoting international collaboration efforts and the activities they've been promoting with The World Bank in this area.

12:45-14:00 Luncheon
14.00-14:30

Building an Information Sharing Environment:  Moving forward based on what we've learned

  • Kshemendra Paul, Program Manager for the Information Sharing Environment (PM-ISE)

The Information Sharing Environment (ISE) is broadly responsible for the people, projects, systems, and agencies that enable responsible information sharing for U.S. national security.  ISE's Building Blocks tool is a knowledge resource for lessons learned and best practices from the office of the PM-ISE.  It was developed around five foundational Blocks of success:  Governance, Budget & Performance, Acquisition, Standards & Interoperability, and Communications & Partnerships. The Blocks are organized by major topic areas and then divided into the questions asked when building information sharing. They also showcase PM-ISE mission partners' success stories as real-world examples to help users understand how this all works.  This session also will provide an update on standards coordination and other PM-ISE activities.

14:30-16:00

[Interactive Roundtable Discussion] International Cooperation:  Opportunities & obstacles of sharing of information across borders

Session Facilitator:  Jamie Clark, General Counsel, OASIS

  • Ken Ducatel, Chief Information Security Officer, European Commission
  • Barend Taute, Chair National Cybersecurity Advisory Council, CSIR South Africa (invited)
  • Ryuichi Hirano, Counsellor, National center of Incident readiness and Strategy for Cybersecurity (NISC), Cabinet Secretariat, Government of Japan
  • Adam Sedgewick, Senior Information Technology Policy Advisor, National Institute of Standards and Technology

New cyber threat techniques are constantly being developed that target governments and their citizens.  With geographic borders exploited in many ways, policymakers are left with many questions on how to best design policies to help combat the threat landscape. During this panel session, leaders from around the world will weigh-in on the obstacles faced while trying to navigate in this environment, and what remains to be done to enable better cross-border resolutions. Institutional and governance arrangements for shared problem-solving will be discussed, as well as disparities between the legal regimens of nations (what is considered a crime in one country may not be in another) and other obstacles to collaboration.

16:00-16:30 Refreshment Break
16:30-17:30

[Interactive Roundtable Discussion]  Cyberthreat Spawns New Era Of Public-Private Collaboration

Session Facilitator: Alexander Howard, Senior Editor, Technology and Society, Huffington Post

  • Marco Obiso, Cybersecurity Coordinator, ITU
  • Eric Hibbard, CTO Security & Privacy, Hitachi Data Systems, INCITS, IEEE
  • Scott Algeier, Founder, President & CEO, homeland security consulting firm, Conrad, Inc. & Executive Director, IT-Information Sharing & Analysis Centers (IT-ISAC)

Today’s security climate is encouraging more companies and industries to engage in active information sharing. Environments now also call for common data exchange and risk allocation standards so government and industry can share threat information more easily. It is generally understood that the public and private sectors need to collaborate to address cybersecurity challenges, yet there remain significant work to be done in defining the scope of those relationships. Legal, strategic and pragmatic obstacles often impede effective cooperation. Compounding it further are the competing roles and interests that may be held by different government agencies within single jurisdictions. In some cases the government serves dual roles as both partner and enforcer, influencing how companies facing cyberthreats view public authority.  Cybersecurity challenges also are complicated by cross-border issues, including inconsistent laws and perspectives regarding privacy norms and restrictions, data transferability, and divergent political interests in combating cyberthreats.  During this panel discussion, the guest speakers from several different collaborative initiatives will talk about how they are working through obstacles and fostering more effective public /private partnership.

17:30

Reception

 

Conference sponsors