We believe that (commonly agreed) norms should govern the new cyber domain and that they should be prepared by the policymakers and the public and private sector technologists who create and manage networks and critical systems.”
Anne C Bader and Richard Stiennon
Welcome to the International Cybersecurity Dialogue. The 21st century cyber agenda was created by technologists for one purpose and by policymakers for another. Both need to work together to manage its threats and opportunities.
The International Cybersecurity Dialogue (ICD) was founded in 2012 to promote dialogue and a working relationship between these two separate cultures. Our International Advisory Board are public, private sector and academic policy and technology leaders whose perspective guides us as we build this community.
The ICD is designed for active engagement; for those leaders who seek peer level debate and exchange. Our goal is to add value while convening informal networks to enhance understanding and “bridge the gap.”
Our core activity is the ICD roundtable – small (under 25), by invitation and off the record as appropriate to allow participants – all current public and private sector experts – the freedom to voice their individual ideas and opinions.
Our ICD program includes the ICD Brief, our weekly newsletter, roundtables, expert briefings and supporting new networks and partnerships. Meetings and interviews will be off the record as appropriate. Reports, commentary and assessments will be presented through the ICD Forum and on our website.
Six ICD Cyber Challenges
- Information Sharing
- Norms, Best Practices and Law
- Critical Infrastructure Resilience
- Responsibility and Accountability
- Supply Chain Assurance
- Threats: anticipation, deterrence, mitigation, response
Seven Basic Questions
- What are the most important principles of governance for the cyber sphere?
- What law and what body governs cyber crimes and cyber attacks?
- Who ensures responsibility and accountability?What are the rules for response?
- How should information be shared to ensure privacy and security?
- What is needed to strengthen existing cyber vulnerable critical infrastructures?
- What specific ways can business support government actions? How can it be done cost effectively?
- What are the key concepts and terminology for the cyber sphere?
The International Cybersecurity Dialogue All rights reserved 2012-2020