2014 Summit starts in:

Economic Espionage

This session will feature subject matter experts and stakeholders who will outline the viable options going forward to solve this growing source of mistrust and economic instability.

#cybersummit2013: Privacy & security: core interests and new realities
#cybersummit2013: The economic dimensions of securing cyberspace
A Chinese View
A Chinese View
Building Trust in Cyberspace
Call for Papers
Call for Papers
Chertoff
Chertoff

“Cyber industrial espionage: we know very little about this area. It is not yet compulsory in most territories to report breaches and companies are reluctant to do so for fear of damage to their image and their shareholders’ dividends."

Misha Glenny
Author
Glenny
Glenny
Mobilizing for International Action
Protecting the Digital Economy
Summit Event Report Released
Summit Event Report Released

"Cybersecurity is often delegated to IT departments which may put in place generic defenses that are not aimed at specific advanced threats. A more holistic, business-led approach to assessing impact and managing risk is required.”

Martin Sutherland
managing director, BAE Systems Detica
Sutherland
Sutherland
The Nexus of Cyber Crime, Espionage and Cyber Warfare
What's Needed for Business to Secure and Succeed in Cyberspace