... principal multilateral venue for information security talks, which in 2017 found itself at an impasse due to disagreements among its members. Now, though, there will be two groups…
A/RES/73/27 and A/RES/73/266
Maria Smekalova:
Close Your Eyes and Do It: Cybersecurity in 2018
Today, we can confidently state that the global discussion on international information security has been resumed. In November 2018, the United Nations General Assembly First Committee adopted two draft resolutions at once on the ...
... Oversight Board is assured that the Ernst & Young Audit Report provides important, external reassurance that the arrangements for HCSEC’s operational independence from Huawei Headquarters is operating robustly and effectively.
Ilona Stadnik:
A New Cybersecurity Diplomacy: Are States Losing Ground in Norm-making?
5.3 Overall therefore, the Oversight Board has concluded that in the year 2017-2018, HCSEC fulfilled its obligations in respect of the provision of security and engineering assurance artefacts ...
The Evolution of the Doctrinal Foundations of U.S. Cybersecurity Policy
The United States was one of the first countries to treat cybersecurity as a matter of strategic importance. The terrorist attacks on September 11, 2001, as well as the growing threat to the economy, which was becoming increasingly ...
... characteristics of cyberspace that present challenges for its future regulation. There are also legal and political issues.
Igor Ivanov:
International Security and «Turbid Waters» of Cyberspace
Firstly, there are different discourses of understanding cybersecurity: the interpretation of what is actually “secure” in cyberspace/information space is different among “Eastern” and “Western” countries. There is also a considerable variation in the perception of threats emanating from cyberspace....
... machine learning is unrealistic. There will be some biases. Can we understand these biases? I do not know. It would make me happy if they could be identified.
However, there is also a good potential: you can get solutions, identify things faster. In cybersecurity field, one of my companies has built a capability of machine learning of behaviors inside computer networks. It can give you a confidence factor, whether your machine is infected or not, that’s a simple example. It will say 95%, which ...
... sanctions on the country's economy. David Holloway, Professor of International History at Stanford University, talked in depth about the demographic aspects of Russia's development. Russian papers were presented by Maria Smekalova, RIAC Coordinator of Cybersecurity Program.
Video
... Economic Forum (WEF), Berkeley’s Center for Long-Term Cyber Security Futures hosted a roundtable "Cyber Security Futures 2025."
Berkeley’s Center for Long-Term Cyber Security has developed a
set of scenarios
that portray a landscape of ‘cybersecurity futures’ designed to stress and stretch trade-offs in objectives and values that will appear in the near future. The scenarios are not exclusively focused on cybersecurity issues themselves, but rather look at the wider impact that game-changing ...
Discussing leading counter-extremism experts at Vox-Pol conference in Amsterdam
Extremist and terrorist groups make heavy use of the existing online platforms and services (or create their own) in order to recruit new followers around the world. Easy access to the Internet contributes to the growth of security threats, which are becoming increasingly unpredictable. Why are these online platforms so persuasive to certain audiences? To answer this question, one needs to better understand the nature...
How DPRK Created World's Most Effective Cyber Forces
In 2016, when a spelling error stopped North Korean hackers from stealing USD 1 billion from the Federal Reserve Bank of New York, Internet users made fun of the programmers. However, experts involved in the investigation of cybercrimes are not laughing: as of today, Pyongyang has one of the most effective and dangerous hacker armies in the world, comparable in number to the cyber forces of the United States.
In recent months, the discussions...
... on, (ostensibly) protecting these programs from piracy.
Maria Gurova:
How to Tame the Cyber Beast?
However, more than two decades after the Russian Federation joined the Berne Convention, piracy rates remain abnormally high and have become a major cybersecurity challenge for the country. While piracy was originally engaged in by the government as the most expedient
way of meeting the national objective
of modernization (in the form of public computer use), today it’s private piracy networks ...