ICT vulnerabilities: Who is responsible for minimising risks?

12 Oct 2023 00:45h - 01:45h UTC

Event report

Speakers

  • Anastasiya Kazakova, Cyber Diplomacy Knowledge Fellow, DiploFoundation
  • Pavlina Ittelson, Executive Director, Diplo US
  • Vladimir Radunović, Director of Cybersecurity & E-diplomacy, DiploFoundation

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Anastasiya Kazakova, Cyber Diplomacy Knowledge Fellow, DiploFoundation

The Geneva Dialogue focused on the implementation of cyber norms, specifically regarding non-state actors and relevant stakeholders. Initiated by the Swiss Federal Department of Foreign Affairs and implemented by Diplo since 2018, this initiative aims to enhance security and stability in cyberspace by defining clear roles and responsibilities. The Center of Digital Trust, EPFL Lausanne, and UBS are partnering in this effort.

An important outcome of the dialogue is the development of the Geneva Manual, which will provide comprehensive guidance for non-state actors on implementing cyber norms. Scheduled for publication at the end of the year, the manual will play a crucial role in enhancing cybersecurity and ensuring responsible behavior in cyberspace. Insights for the manual are being gathered through consultations with stakeholders.

Supply chain security and responsible reporting of ICT vulnerabilities were highlighted as two specific norms deserving attention. These norms play a critical role in safeguarding digital systems, addressing supply chain vulnerabilities, and promoting responsible reporting of vulnerabilities in information and communication technologies.

The complexity of the term “technical community” was also discussed, recognizing that it encompasses various actors and roles within different contexts. This underscores the need for a more nuanced understanding of the technical community and its contributions to cybersecurity.

Further categorization of digital products was considered necessary to understand their criticality and define appropriate roles and responsibilities. This categorization would aid in effective risk management and accountability.

The dialogue also addressed the labeling of products and its relationship to security. It was acknowledged that a label does not guarantee superior security, emphasizing the importance of user diligence and caution when evaluating product security.

The ongoing question of defining digital products was also explored, reviewing different approaches from various industry communities. A clear and common understanding of digital products is crucial for developing effective cybersecurity strategies and frameworks.

The participants expressed gratitude for feedback and contributions received during the dialogue and encouraged ongoing contributions, particularly in relation to the Geneva manual. The zero draft of the manual is undergoing final development and will be published soon.

In summary, the Geneva Dialogue focused on the implementation of cyber norms involving non-state actors and stakeholders. The outcomes include the development of the Geneva Manual, emphasis on supply chain security and responsible reporting of vulnerabilities related norms, and the role of various stakeholders – the private sector, academia, civil society, and technical community in this regard. However, during the Dialogue, participants in particular cautioned about the complexities in defining the technical community and stressed on the importance of defining clear roles within such a community. The dialogue also highlighted the need for further categorization of digital products and cautioned against relying solely on product labels for security assurance. The ongoing effort in defining digital products and the call for continued contributions demonstrate the commitment to a secure and resilient cyberspace.

Vladimir Radunović, Director of Cybersecurity & E-diplomacy, DiploFoundation

The analysis provides a detailed examination of the implementation of cyber norms for ICT security and the security of digital products. One of the key findings is the crucial role of non-state actors, such as civil society, industry, and users, in effectively implementing these norms. It is noted that the integrity of the supply chain and responsible reporting of ICT vulnerabilities are two important UN norms that cannot be implemented without the involvement of various stakeholders. This involvement ensures transparency, accountability, and collective responsibility in addressing cybersecurity issues.

The analysis also highlights the significance of the Geneva Dialogue, a global initiative that focuses on the security of digital products. This platform brings together vendors, researchers, civil society, and academia to exchange views and contribute to discussions related to roles and responsibilities in ensuring digital product security. The dialogue has been in place for five years and emphasizes the need for collaboration among diverse stakeholders.

Furthermore, the analysis indicates that the security of digital products requires the involvement of multiple stakeholder entities. It explains that no single entity has complete control over supply chain security, and trust is a key issue in vulnerability reporting and information sharing. This highlights the importance of building trust and fostering cooperation among stakeholders to enhance digital product security.

However, the analysis also highlights concerns and trust issues across stakeholders when it comes to vulnerability handling by national authorities, especially by those who have advanced cyber capabilities. Furthermore, there is often a lack of transparency over procedures and institutions involved in such government vulnerability treatment. This observation raises the question of how to strike the right balance between state involvement and safeguarding against potential abuses of power.

Moreover, the analysis sheds light on the broad pool of actors responsible for software and system vulnerabilities. It emphasizes that it is not limited to software developers alone, but also includes system integrators, consumers, operators, and distributors. This expands the accountability and highlights the shared responsibility among various market players in addressing vulnerabilities effectively.

The use of advanced emerging technologies, such as artificial intelligence (AI), is identified as a potential tool to assist with the verification of software traceability. This underscores the importance of leveraging technological advancements to strengthen cybersecurity measures.

Additionally, the analysis emphasizes that software and system vulnerabilities are not limited to specific jurisdictions and require a global system in a global jurisdiction to effectively address them. This observation highlights the need for international collaboration and a coordinated approach to tackling cybersecurity challenges.

Lastly, the analysis underlines the need for a regulatory framework to address vulnerabilities. It stresses the importance of considering the territorial effect of regulations and jurisdictions when formulating such frameworks. The analysis recognizes the complexity of distinguishing and addressing different types of vulnerabilities, emphasizing the need for tailored approaches to tackle specific challenges effectively.

In conclusion, this analysis provides a comprehensive overview of the key factors and considerations in implementing cyber norms for ICT security and the security of digital products. It underscores the importance of involving non-state actors, fostering trust and cooperation, and recognizing the shared responsibility among diverse stakeholders. It also highlights the potential of emerging technologies, the importance of global collaboration, and the need for a regulatory framework to address vulnerabilities. By integrating these insights and recommendations, stakeholders can work towards strengthening cybersecurity measures and promoting a safer digital environment.

Audience

The analysis explores two key topics. The first topic focuses on the security of digital products, highlighting the need for further categorisation to determine their level of criticality. This categorisation helps address potential vulnerabilities and mitigate security risks. The analysis dispels the notion that labelling products enhances security, emphasising instead the shared responsibility of producers and users in exercising due diligence. This highlights the significance of user awareness and responsibility in ensuring the security of digital products.

The second topic commends the Geneva dialogue for its role in facilitating collaboration among industry stakeholders. This dialogue serves as a platform for engagement, fostering innovation, and addressing challenges collectively. The analysis recognizes the important role of GitHub in promoting industry involvement and enabling knowledge sharing among developers. By providing feedback to the UN system, the Geneva dialogue ensures industry perspectives are incorporated into sustainable development policies.

In conclusion, the analysis underscores the importance of robust security measures for digital products and emphasizes the need for a collaborative approach towards addressing security challenges. It also highlights the positive impact of the Geneva dialogue in promoting industry cohesiveness and leveraging platforms like GitHub to contribute to the UN system’s goals. Understanding these key arguments equips stakeholders with knowledge to navigate digital product security complexities and contribute to sustainable development efforts.

Speakers

&

’Anastasiya

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Vladimir

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more