Want to create interactive content? It’s easy in Genially!

Get started free

Round Table 5

Татьяна Яблокова

Created on July 7, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Business vision deck

Economic Presentation

Tech Presentation Mobile

Geniaflix Presentation

Vintage Mosaic Presentation

Shadow Presentation

Newspaper Presentation

Transcript

Cyber InSecurity?

Round Table

In
OVERVIEW
STAGE 1
STAGE 2
STAGE 3
STAGE 4

OVERVIEW

Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this Round Table, academics, practitioners from both private sector and government, along with service members come together to highlight the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this Round Table will offer views greater awareness of the cyber threats — and serve to inform public debate into the next information age.

STAGE 1

CASES

STAGE 1

Choose the case you would like to use in the lead-in as an introduction into the matter. These could be the most daring cyber attacks, notorious data thefts, sensational leaks. The lead-in is down to the moderator, but the discussion stage is to be done as a group. Google Docs will come in handy when you need to share your findings with the other team members.

study

Open Letter to GCHQ

GCHQ - Government Communications Headquarters is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the government and armed forces of the United Kingdom. Based in "The Doughnut" in the suburbs of Cheltenham, GCHQ is the responsibility of the country's Secretary of State for Foreign and Commonwealth Affairs, but it is not a part of the Foreign Office and its director ranks as a Permanent Secretary

STAGE 2

LANGUAGE LAB

STAGE 2

While preparing for the round table, you will be reading articles on the subject and watching related videos. Whenever you come across a word or a collocation pertaining to the topic (within the topic of cyber security these could be words and phrases like firewall, large-scale targeted intrusion, pwn, E2EE (end-to-end encryption), etc.), write it down in your topic vocabulary list.

This is best done at Google Docs, where you group all of your findings in a table, You can also share your findings employing different interactive and engaging formats, such as presentations, quzzes, tests, mnemonics as shown in the presentation.

STAGE 3

OUTLINE & PERSPECTIVES

STAGE 3

Make an outline of the Round Table with the perspectives for the discussionAt this stage, students do not assume roles yet, they rather speculate on the variety of opinions that could be voiced on the subject and do Internet and other media research.It is better if the number of perspectives equals the number of attendees, which does not exclude the possibility of some of the speakers having points of convergence.

TRT Round Table with the subheads may serve as an example of constructing the route for discussion. Here are some examples of the perspectives on on Cyber security and Cyber Threat: • Cyber security is not only the matter of concern for businesses and states; the safety of regular citizens is at stake.• Individuals had better forgo their right to privacy to safety.• Cyber war can be as detrimental to the economy of a country as a traditional one. Report on your progress in class.

STAGE 4

ASSUME ROLES

STAGE 4

Chairperson

Klon Kitchen, leads tech policy at the Heritage Foundation

Edward Snowden

Sarah Stephens, cyber, media and technology leader in the UK

Crispin Robbins, GCHQ’s technical director for cryptanalysis
Ian Levy, technical director for GCHQ’s National Cyber Security Centre
Mark Zuckerberg
Megyn Kelly, American journalist
Oleg Demidov, consultant on legal regulation in cyber security

HOLD A ROUND TABLE

Crispin Robbins, GCHQ’s technical director for cryptanalysis

Privacy and security protections are critical to public confidence. Therefore, we will only seek exceptional access to data where there’s a legitimate need, that access is the least intrusive way of proceeding and there is appropriate legal authorisation.

GCHQ - Government Communications Headquarters is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the government and armed forces of the United Kingdom. Based in "The Doughnut" in the suburbs of Cheltenham, GCHQ is the responsibility of the country's Secretary of State for Foreign and Commonwealth Affairs, but it is not a part of the Foreign Office and its director ranks as a Permanent Secretary

Megyn Kelly, American journalist, interviewed Vladimir Putin in 2017

persists with the claims that Russian hackers meddled in the US 2016 elections

Chairperson

makes an opening statement and offers a lead-in, sets the tone of the discussion focusing on the questions: • How can cyber security be promoted at different levels - that of individuals, businesses, states, the whole world?• Does weakening encryption* entail infringement on personal freedoms?• What could be the consequences of cyber war and how can it be prevented?

The list of questions and points for discussion is to be continued by the student that assumes this role. It is important to study the profiles of the speekers to conduct the discussion professionally. Making a presentation with the background and subheads/ questions may facilitate the procedure of conducting the Round Table.

Mark Zuckerberg, Facebook CEO

defends the decision to encrypt the company’s messaging services despite the concerns that such encryption may facilitate criminal activity online, such as child exploitation, terrorism, etc

Edward Snowden, American whistleblower, former NSA officer

claims that without encryption we will lose all privacy

Without encryption, we will lose all privacy. This is our new battleground

Sarah Stephens, cyber, media and technology leader in the UK financial and professional practice at Marsh JLT Specialty

Cyber attacks could be more costly than natural disasters, such as Sandy Storm, so a suitable insurance policy should be tailored for each and every enterprise

How cyber insurance can still leave you vulnerable to risks

Ian Levy, technical director for GCHQ’s National Cyber Security Centre

co-author of the proposal to provide ‘back doors’ for the law enforcement agencies

Claims that their aim is not to weaken encryption as such, but to add ‘a secret eavesdropper’ to chats and conversations. The proposal was met with criticism from the major tech giants and human rights activists as the one which undermines credibility in social media.

Klon Kitchen, leads tech policy at the Heritage Foundation

Cyber threat is underestimated, especially economy-wise

Oleg Demidov, consultant on legal regulation in cyber security in the UN Institute for Disarmament Research

Despite the mutual accusations of cyber attacks, U.S.-Russia cyber negotiations could still be successful.