2014 Summit starts in:

"Central Nervous System" of Cyberspace
#cybersummit2013: Opening Remarks

Measuring the Cybersecurity Problem

The best assessments of the frequency and damages of cybersecurity compromises are very incomplete. The simple truth is that we do not even know the order of magnitude of the number of compromises or of the personal records accessed. No one knows how bad the impact really is, yet the trends—increased complexity, increased connectivity, and increased criticality—are all forces that will make the problem worse in the foreseeable future. This initiative is driving voluntary private sector cooperation to produce the first worldwide, high level benchmarks for cybersecurity.

#cybersummit2013: Privacy & security: core interests and new realities
Bajaj
Bajaj
Building Trust in Cyberspace
Call for Papers
Call for Papers
Cox
Cox
Cybersecurity -- the Right to Privacy and Law Reform

“Cyber industrial espionage: we know very little about this area. It is not yet compulsory in most territories to report breaches and companies are reluctant to do so for fear of damage to their image and their shareholders’ dividends."

Misha Glenny
Author
Glenny
Glenny

“In the past year, we have identified more than 100,000 threats deployed in social media networks, most aimed at gathering information by cyber criminals for largely unknown purposes."

Natalya Kaspersky
Chair of the Board, Kaspersky Lab
Kaspersky
Kaspersky
Measuring the Cybersecurity Program
Mobilizing for International Action

“Technologically we are losing the battle.”

Jason Pontin
Editor, Technology Review (MIT)
Pontin
Pontin
Protecting the Digital Economy
Shaky Cyber Trigger Fingers
Shaky Cyber Trigger Fingers
Summit Event Report Released
Summit Event Report Released
The Nexus of Cyber Crime, Espionage and Cyber Warfare
What's Needed for Business to Secure and Succeed in Cyberspace