INTRODUCTION and INSTRUCTIONS

The Best Practice Forum on Cybersecurity aims to be  bottom-up, open and inclusive and therefore invites all interested to comment and contribute on its draft outputs.

The BPF output consists of a Background document (part I) and a Summary report of public contributions (part II)

General comments as well as comments on specific parts of the report are welcome. In the later case, please  indicate clearly what section, page or paragraph of the text your comment relates to.

Comments can be submitted by clicking on 'Add new comment' below and will be shown in the column on the right. 

Received public feedback will be taken into account in the final version of the BPF output, which will be published shortly after the IGF meeting.

 

 

Part I : Background paper to the IGF BPF on Cybersecurity

Cybersecurity culture, norms and values

  • Introduction to the BPF on Cybersecurity
  • Culture, norms and values
  • Background on norms development
  • The case for cyber norms
  • Norms development processes
  • State of existing  norms development and implementation
  • Digital security divide

Download the background paper  & click below to comment 

View and Add Comments for Paragraph
or to post comments for this paragraph

Part II: Summary report of the public contributions to the IGF BPF on Cybersecurity

  • Defining a culture of cybersecurity
  • Typical values and norms of importance to the contributors
  • Organisations promoting specific cybersecurity norms
  • Norms that have been effective at improving security
  • Norms that have failed or had adverse effects
  • Methods of implementing cybersecurity norms
  • A Digital Security Divide

Download the Summary report   & click below to comment

View and Add Comments for Paragraph
or to post comments for this paragraph