Speaker 1: Satish Babu, Civil Society, Asia-Pacific Group
Speaker 2: Sarah Kiden, Civil Society, African Group
Speaker 3: Judith Ann Okite, Civil Society, African Group
Speaker 4: Shah Zahidur Rahman, Technical Community, Asia-Pacific Group
Speaker 5: Syed Muhammed Sajjad, Private Sector, Asia-Pacific Group
Speaker 6: Subhashini Kadurugasyaya, Private Sector, Asia-Pacific Group
Round Table - 90 Min
Speakers have been chosen to ensure geographic, gender, sector, and stakeholder group diversity. Each speaker will share their knowledge and expertise and the challenges faced from their regional and national level.
Dr.N.Sudha Bhuvaneswari, Professor, Dr.G.R Damodaran College of Science, India
Dr.Satish Babu, Asian, Australasian and Pacific Islands Regional At-Large Organization (APRALO)
Ms.Sarah Kiden, African Regional At-Large Organization (AFRALO)
Ms.Judy, African Regional At-Large Organization (AFRALO)
Mr.Shah Zahidhur Rahman,Augere wireless broadband Bangladesh ltd
Mr.Syed Muhammed Sajjad, Senior Lecturer, Riphah Institute of Systems Engineering, Riphah International University Islamabad Pakistan
Ms.Subhashini Kadurugasyaya, Assistant Manager, Prepaid Services, Bharti Airtel Lanka, Srilanka
Mrs.N.Pravina, Director, Hash1 Consultancy, India
Mr.B.Narayanswamy, Proprietor, Vinayak Impex Agencies, India
There will be representations from each stakeholder group and speakers will represent different geographies,cultures the group has a good gender diversity as well. Co-organizers and speakers will include representatives from developing countries.
Gender balance has been encouraged through speaker choices that will add up more valuable additions to the topic. The session will be planned with equal participation from the workshop participants and also working closely with the remote moderator in the planning session to encourage online and remote participation.
Threat Intelligence-Key Characteristics, Need and Impact of Threat Intelligence, Associated Rules and Policies, Implementation Difficulties, Importance and Necessity, Challenges faced, Handling Threats with Intelligence, Region-Wise, Domain-Wise Success of Threat Intelligence and Proactive Measures, Cross Border Collaborative Cyber Security.
The session will start with a five-minute briefing by the moderator which outlines the background and objectives of the workshop introducing the key concepts of cyber security, cyber threats and cyber security intelligence. Then the floor is set open for the speakers. The speakers each are given equal time to share their knowledge and expertise from their perspectives and their countries perspectives. The allocated time for this is 50 minutes. The next part will be the question answering session to the speakers from the audience and that will go for around 30 minutes. Equal timing is given for both online and offline participants. Finally the moderator will wrap up the session that takes around 5 minutes.
The topic that is being discussed as part of the workshop proposal entitled as " Threat Intelligence- its Diligence in handling Cyber Threats" is closely related to the theme Cyber Security and the sub-theme Cyber Security Best Practices. This workshop will be directly related to the IGF 2018 theme as it will provide an important discussion on the effectiveness of handling cyber threats through cyber threat intelligence and its implications.
As Cyber Security has become one of the major issue to all the online community and to all the sectors of development and growth, managing and handling cyber risks and threats is a real challenge and a thrust area of research. The workshop title proposed discusses on the topic of threat intelligence and its applicability in handling cyber threats and is it useful to with applying threat intelligence architecture and is it worth spending on building such costly frameworks.
Cybersecurity is a global problem and hence the solution should also be given globally, but in reality, there are lot of differences in the approaches through which this problem is handled based on the Government, rules and policies region wide hence such workshop proposal can give a great opening to globally deal with the problem of handling the cyber security issues.
The purpose of this workshop is to survey and share experiences from diverse groups and to generate best practices based on the perception of the stakeholders and to initiate new ideas and policies that can boost up and strengthen the security levels of the cyber space.
In order to ensure equal offline and online participation, online attendees will have their own interventions and questions queue and microphone, which will rotate equally with the microphone in the room. The moderator will work closely with the online moderator in order to balance online and offline participation during the workshop.
The moderator in the room will be trained on how to alternate offline contributions and online contributions from the remote public. Online participants will speak to the room when possible, with a backup for text input with online moderator representation to the room when necessary and appropriate. Remote Hubs can be set up in developing countries and the public are encouraged to participate online into the discussion to further enrich on the concept of building the best security policies practices.