Session
Organizer 1: Ihita Gangavarapu, π
Organizer 2: Yug Desai, South Asian University
Organizer 3: Bolutife Oluyinka Adisa, π
Organizer 4: Phyo Thiri Lwin, DotAsia Organisation
Speaker 1: Ihita Gangavarapu, Technical Community, Asia-Pacific Group
Speaker 2: Nicolas Fiumarelli, Civil Society, Latin American and Caribbean Group (GRULAC)
Speaker 3: Lily Edinam Botsyoe, Technical Community, African Group
Yug Desai, Civil Society, Asia-Pacific Group
Bolutife Oluyinka Adisa, Civil Society, African Group
Phyo Thiri Lwin, Technical Community, Asia-Pacific Group
Roundtable
Duration (minutes): 60
Format description: This session's roundtable structure is perfect because it allows for an active and participatory conversation, which is essential for delving into the complexity of open-source artificial intelligence. Due to the room's design, which encourages a circular or semi-circular setup, participants feel more equal, which encourages active participation and makes eye contact and connection easier. The 60-minute format ensures that important topics are covered without overwhelming participants by striking a balance between the depth of the discussion and the audience's attention span. The format's planned methodology, which includes polls, audience participation, and policy questions, enables a thorough examination of the subject in the allotted time. Because there are many opportunities for both in-person and virtual participation to contribute and add a variety of viewpoints to the conversation, this format also encourages inclusivity.
1. How can secure-by-design principles be effectively embedded throughout the entire lifecycle of IoT products and services, from conceptualization to end-of-life, to mitigate cybersecurity risks and vulnerabilities?
2. What steps can be taken to establish international standards and frameworks for IoT device interoperability and cybersecurity, facilitating cross-border data flows while addressing jurisdictional differences and ensuring consistency in security practices across various regions?
3. What role can labelling and certification schemes play in promoting consumer protections and informed decision-making when purchasing IoT products?
What will participants gain from attending this session? - Comprehensive insights into embedding secure-by-design principles in the entire lifecycle of IoT products and services
- Actionable strategies to mitigate cybersecurity risks from conceptualization to end-of-life
- Understanding the significance of establishing international standards and frameworks for IoT device interoperability and cybersecurity
- Exploring steps to facilitate cross-border data flows and address jurisdictional differences
- Understand the role of labeling and certification schemes in enhancing consumer protections
- Generating actionable recommendations for policymakers, industry leaders, and other stakeholders to enhance cybersecurity in the IoT ecosystem
Description:
The Internet of Things (IoT) landscape has experienced a remarkable transformation, with interconnected devices and services becoming ubiquitous in our daily lives. From smart homes and wearables to industrial automation and smart city infrastructure, IoT technologies have revolutionized various sectors, promising unprecedented efficiency, convenience, and data-driven insights.
However, this rapid proliferation of IoT devices and systems has also exposed significant challenges related to cybersecurity, privacy, and individual rights. The vast amounts of data generated by IoT devices, often containing sensitive personal information, have raised concerns about unauthorized access, data breaches, and potential misuse. Furthermore, the complexity of IoT ecosystems, involving multiple stakeholders such as device manufacturers, data aggregators, and service providers, has made it increasingly difficult to establish clear boundaries for data ownership and control.
The roundtable will focus on the lack of harmonized international standards and frameworks for IoT device interoperability and cybersecurity. Cross-border data flows and jurisdictional differences have created regulatory uncertainties, hindering consistent security practices and data protection measures across regions. The discussion will also take into account high-risk use cases, such as those in national security, healthcare, and critical infrastructure, and underscore the urgent need for robust cybersecurity measures and individual rights safeguards.
Session Structure: Roundtable (60 minutes)
Introduction & Opening Remarks: 5 min
Policy question to speakers: 10min
Audience intervention: 5 min
Policy question discussion: 10 min
Audience intervention: 5 min
Policy question to speakers: 10 min
Audience poll: 5 minutes
Q/A from the hybrid audience: 10 min
1. Highlight the important issues that technical processes like certifications and standardization must address in a manner that respects privacy and digital rights of end-users.
2. Promote a consumer-friendly framework for securing and deploying IoT.
3. Generate awareness about the challenges posed by ubiquity and ease-of-deployment of IoT to digital rights and cybersecurity.
4. Policy brief or report summarizing key findings and actionable recommendations for policymakers, industry leaders, and other stakeholders to enhance cybersecurity in the IoT ecosystem.
5. The outcome of this event will be documented in the official report of Youth IGF India 2024, which is shared with the youth of India and the various bodies supporting the cause.
Hybrid Format: The session is designed such that onsite and online participants get enough opportunities for intervention throughout the session and not just towards the end. Use of polls (tools such as mentimeter) will ensure inputs in a hybrid format. In addition, after every discussion on a policy question by the speakers, participants are given an opportunity to share their interventions on the topic. Towards the end of the session, there is a live Q/A and discussion with everyone. In addition to the chat box, the online moderator will note requests of the online participants and inform the onsite moderator.