IGF 2018 WS #125
Threat Intelligence- its Diligence in handling Cyber Threats

    Organizer 1: Sudha Bhuvaneswari Narayanaswamy, Dr.G.R Damodaran College of Science
    Organizer 2: Pravina Narayanaswamy, Hash1 Consultancy
    Organizer 3: Narayanaswamy Baluswamy, Vinayak Impex Agencies

    Speaker 1: Satish Babu, Civil Society, Asia-Pacific Group
    Speaker 2: Sarah Kiden, Civil Society, African Group
    Speaker 3: Judith Ann Okite, Civil Society, African Group
    Speaker 4: Shah Zahidur Rahman, Technical Community, Asia-Pacific Group
    Speaker 5: Syed Muhammed Sajjad, Private Sector, Asia-Pacific Group
    Speaker 6: Subhashini Kadurugasyaya, Private Sector, Asia-Pacific Group

    Moderator

    Dr.N.Sudha Bhuvaneswari

    Online Moderator

    Mrs.N.Pravina

    Rapporteur

    Mr.B.Narayanaswamy

    Format

    Round Table - 90 Min

    Interventions

    Speakers have been chosen to ensure geographic, gender, sector, and stakeholder group diversity. Each speaker will share their knowledge and expertise and the challenges faced from their regional and national level.

    Onsite Moderator
    Dr.N.Sudha Bhuvaneswari, Professor, Dr.G.R Damodaran College of Science, India

    Speakers
    Dr.Satish Babu, Asian, Australasian and Pacific Islands Regional At-Large Organization (APRALO)
    Ms.Sarah Kiden, African Regional At-Large Organization (AFRALO)
    Ms.Judy, African Regional At-Large Organization (AFRALO)
    Mr.Shah Zahidhur Rahman,Augere wireless broadband Bangladesh ltd
    Mr.Syed Muhammed Sajjad, Senior Lecturer, Riphah Institute of Systems Engineering, Riphah International University Islamabad Pakistan
    Ms.Subhashini Kadurugasyaya, Assistant Manager, Prepaid Services, Bharti Airtel Lanka, Srilanka

    Online Moderator
    Mrs.N.Pravina, Director, Hash1 Consultancy, India

    Rapporteur
    Mr.B.Narayanswamy, Proprietor, Vinayak Impex Agencies, India

    Diversity

    There will be representations from each stakeholder group and speakers will represent different geographies,cultures the group has a good gender diversity as well. Co-organizers and speakers will include representatives from developing countries.

    Gender balance has been encouraged through speaker choices that will add up more valuable additions to the topic. The session will be planned with equal participation from the workshop participants and also working closely with the remote moderator in the planning session to encourage online and remote participation.

    Threat Intelligence-Key Characteristics, Need and Impact of Threat Intelligence, Associated Rules and Policies, Implementation Difficulties, Importance and Necessity, Challenges faced, Handling Threats with Intelligence, Region-Wise, Domain-Wise Success of Threat Intelligence and Proactive Measures, Cross Border Collaborative Cyber Security.

    The session will start with a five-minute briefing by the moderator which outlines the background and objectives of the workshop introducing the key concepts of cyber security, cyber threats and cyber security intelligence. Then the floor is set open for the speakers. The speakers each are given equal time to share their knowledge and expertise from their perspectives and their countries perspectives. The allocated time for this is 50 minutes. The next part will be the question answering session to the speakers from the audience and that will go for around 30 minutes. Equal timing is given for both online and offline participants. Finally the moderator will wrap up the session that takes around 5 minutes.

    The topic that is being discussed as part of the workshop proposal entitled as " Threat Intelligence- its Diligence in handling Cyber Threats" is closely related to the theme Cyber Security and the sub-theme Cyber Security Best Practices. This workshop will be directly related to the IGF 2018 theme as it will provide an important discussion on the effectiveness of handling cyber threats through cyber threat intelligence and its implications.

    As Cyber Security has become one of the major issue to all the online community and to all the sectors of development and growth, managing and handling cyber risks and threats is a real challenge and a thrust area of research. The workshop title proposed discusses on the topic of threat intelligence and its applicability in handling cyber threats and is it useful to with applying threat intelligence architecture and is it worth spending on building such costly frameworks.

    Cybersecurity is a global problem and hence the solution should also be given globally, but in reality, there are lot of differences in the approaches through which this problem is handled based on the Government, rules and policies region wide hence such workshop proposal can give a great opening to globally deal with the problem of handling the cyber security issues.

    The purpose of this workshop is to survey and share experiences from diverse groups and to generate best practices based on the perception of the stakeholders and to initiate new ideas and policies that can boost up and strengthen the security levels of the cyber space.

    Online Participation

    In order to ensure equal offline and online participation, online attendees will have their own interventions and questions queue and microphone, which will rotate equally with the microphone in the room. The moderator will work closely with the online moderator in order to balance online and offline participation during the workshop.

    The moderator in the room will be trained on how to alternate offline contributions and online contributions from the remote public. Online participants will speak to the room when possible, with a backup for text input with online moderator representation to the room when necessary and appropriate. Remote Hubs can be set up in developing countries and the public are encouraged to participate online into the discussion to further enrich on the concept of building the best security policies practices.