Speaker 1: Radouane MRABET, Civil Society, African Group
Speaker 2: Hossain Md. Jahangir, Technical Community, Asia-Pacific Group
Speaker 3: Hossain Md. Jahangir, Technical Community, Asia-Pacific Group
Speaker 4: Yang Yang, Technical Community, Asia-Pacific Group
Panel - 90 Min
Prof. Mr. Yang YANG will start the session by welcoming all the speakers (including online participants), and audiences and then talk about the current IoT deployments especially in China, addressing the problems and challenges in practical applications;
Ms. Hanane BOUJEMI will address how IoT devices could be also used as a pervasive surveillance tool of consumers’ everyday activity and the security risks of bulk data collection and the role of manufacturers in mitigating these risks;
Ms. Rosa M. DELGADO will talk about the security and privacy challenges related with the Internet, communications and infrastructure systems and their technical and policy setting areas;
Prof. Mr. Radouane MRABET will talk about why the new IoT era will disturb the education sector and what are the security and privacy challenges in this important domain;
Mr. Jahangir HOSSAIN will discuss the Security and Privacy Challenges in service provider point of view.
It is a multi-stakeholder discussion on the challenges of security and privacy in the Internet of Things (IoT). The panel was organized by China Association for Science and Technology (CAST), and attended by expert from industry players, academia, and end-user community for EU, Asia, Africa and Latin American and Caribbean.
The Internet of Things (IoT) presents an opportunity to revolutionize the way we live and work. This session will bring a full view of a various definition of IoT and some key application areas, such as industry 4.0, agriculture, logistics, smart city, connected and autonomous vehicles, smart health etc. With the Large-scale deployment of IoT devices and sensors, we will see a growth in the number of security and privacy issues. According to a survey done by the Economist Intelligence Unit (EIU) in 2018, the majority of IoT end-users around the world do not think their IoT data is safe, and they want something done about it before the problem spirals out of control: 92 percent say they want to control what personal information is automatically collected. 74 percent are concerned that small privacy invasions may eventually lead to a loss of civil rights. The goal of this session is to bring together experts from different nations, departments and stakeholders to discuss the security and privacy issues, propose solutions in different views for these challenges, in order to ensure that the growth adoption of IoT applications can be realized without catastrophic consequences.
The moderator will open the session by welcoming all the participants, including the topic about to be discussed and the speaker onsite and online. (10 minutes)
Speakers make their presentation respectively. After each presentation, the moderator probably makes comments and engage the audiences and online participants in a quick Q&A session. (40 minutes)
Then the moderator will engage the panelist in a lively conversation to get their perspectives on topic related questions. (20 minutes)
The moderator will elicit what panelist find most insightful from the discussion and build on them by asking questions to create active flow of conversation with both panelists and experts in the audience. (10 minutes)
The last ten minutes, the moderator will wrap up the discussion by summarizing the consensus of the facilitated dialogue and pointing out the challenges we are confronting. (10 minutes)
The session keeps to theme of IGF 2018: “Cybersecurity, Trust and Privacy”. With the adoption of IoT-devices, sensors integrated collect, communicate, analyze, and act on information not only to create value, but also generate security and privacy risks. There is no doubt that IoT security and privacy challenges is one of the key issues for the Internet diversified development in the future, therefore, one of the very important topics for the internet governance. We discuss these challenges not only from a technical point of view, but also from the perspective of a wide range of multi-stakeholders.
Tag 1: Internet of Things
Tag 2: Security & Privacy
Tag 3: Multi-stakeholders Cooperation
Online participation will be led by a facilitated dialogue. Online attendee will get involved in the workshop during the whole session and have separate queue and microphone which rotate equally with the mics in the room and is entitled to raise questions after each presentation of the speaker and engage during the panel discussion. Trained online moderator with previous experience will direct the online participation.