2014 Summit starts in:

Acts of Aggression in Cyberspace

This Breakthrough Group will seek to identify and close ASPR (Agreements, Standards, Policies and Regulations) gaps in expectations for the unacceptable behaviors of entities when interacting with each other, whether they are humans, machines, governments, businesses or other NGOs.

#cybersummit2013: Privacy & security: core interests and new realities
A Chinese View
A Chinese View
A1: Governing Cyber Conflict
Building Trust in Cyberspace
Call for Papers
Call for Papers

"What we have now learned over the last 10 or 20 years, is that you cannot assume trust. That is why we’re dealing with a persistent problem of criminality, theft of intellectual property and even efforts to sabotage or damage our infrastructure using the Internet.”

Michael Chertoff
Former U.S. Secretary of Homeland Security
Chertoff
Chertoff
Mobilizing for International Action

“One of our prominent speakers told me privately that his major worry is that one day we will cross a really difficult divide, and will confront a situation when people will die as a result of a cybersecurity attack. That could be a game changer of the worst type.”

John Mroz
EWI President and CEO
Mroz
Mroz
Preventing a U.S.-China Cyber War
Preventing a U.S.-China Cyber War
Protecting the Digital Economy

“A small state could be absolutely brought to its knees because everything could be closed down — its life systems, its energy systems, its medical systems."

Sir Michael Rake
Chairman, BT Group plc
Rake
Rake
Shaky Cyber Trigger Fingers
Shaky Cyber Trigger Fingers
Summit Event Report Released
Summit Event Report Released
The Nexus of Cyber Crime, Espionage and Cyber Warfare

“A cyber peace treaty would be one of a kind. It would have to bring together governments, the private sector and even individuals.”

Hamadoun Touré
Secretary-General, IntERNATIONAL Telecommunication Union
Toure
Toure