The Second Worldwide Cybersecurity Summit

OVERVIEW

Against the backdrop of new revelations about cyber attacks and espionage, the EastWest Institute released a report on the Second Worldwide Cybersecurity Summit: Mobilizing for International Action, which drew more than 450 government, industry and technical leaders from 43 countries to craft new cybersecurity solutions.

BACKGROUND

EWI is working with leading corporations, specialists and governments around the world to mobilize cooperative approaches to cybersecurity. EWI’s Worldwide Cybersecurity Initiative is made up of a diverse group of professionals, ranging from top government and military advisors to business and technical consultants.

PROGRAM OVERVIEW

Working for:

  • Improved international standards and agreements for supply chain integrity;
  • A harmonized global framework for fighting cyber crime, with case studies from the financial services sector;
  • A 24/7 emergency response system tying together all countries and territories connected to the internet;
  • International arrangements for priority communications in crisis or emergency;
  • Multilateral agreements on cyber conflict and rules of engagement;
  • Transparency and international information sharing on cyber attacks;
  • Protection of youth.

Showcasing:

  • Private sector leadership in problem solving for sector interests;
  • Best-in-class research and analysis from China, Russia and India on building trust and other political aspects of cybersecurity policy;
  • New examples of cross-border youth engagement in personal protection and privacy issues.

Featuring:

  • Results of a scenario exercise testing multilateral crisis-response mechanisms.

AGENDA

The “summit” process is designed to catalyze a quantum leap in international efforts to address specific cybersecurity vulnerabilities and threats. The EastWest Institute is working with its partner organizations, its sponsors, its media partners and all participants in the summit to mobilize for international action. This means that the annual summit is part of a process, the “EWI Process,” and not an end in itself. We invite all participants to contribute to the post-summit work in several ways: through their ideas for new measures (agreements and policies); through identification of mechanisms to bring those measures into play; and – after the summit – to be a part of the large community of “change agents” working through EWI or independently to achieve our common purposes.

PLENARIES: We have a set of tightly-timed plenary sessions, in which leading figures have been asked to make short, well-crafted oral interventions to their peers. These short interventions can be supported by printed material to the extent that the speakers see that as useful. This summit will be more powerful if the messages delivered in the plenary are sharp, short and innovative in some way.

DALLAS PROCESS (Breakthrough Groups): The bulk of the summit will be a highly interactive format. This interactive working program gives participants unique opportunities to collaborate with professional peers from around the world. Participants can expect to be able to work on five topics identified at the first summit in Dallas as critical international policy needs where progress is stalled. Further information on these can be found in a separate document. The success of the summit is measured by the breakthroughs made by these groups both during the summit, and in the follow-up activities.

LONDON PROCESS: In addition to the breakthrough groups initiated in Dallas, the summit will launch three new breakthrough groups labelled the “London Process.” These breakthrough groups will expand the discussion in international cooperation on cybersecurity in three new fields carefully chosen by the Summit Committee. As with the Dallas process, the success of the summit is measured by the breakthroughs made by these groups both during the summit, and in the follow-up activities.