WPML Test 5
Earlier this month, the fourth India School on Internet Governance (inSIG2019) was held in Kolkata on 15-17 November, expanding its network of leaders and professionals active in shaping the Internet’s future.
With support from sponsors, 50 fellows from various academic, cultural, and regional backgrounds participated in inSIG2019. Through panel discussions, workshops, role plays, and group activities the three-day school covered a myriad of topics related to the Internet, boosting participants’ understanding of the complexity of Internet Governance and its importance in the future of the Internet.
The sessions covered fundamental topics like the history, principles, and status of the Internet. The hurdles around online safety, human rights, online radicalization, and cybersecurity were extensively examined and many perspectives were brought out which were thought-provoking and ingenious. Status and challenges of emerging technologies, content regulation, and the multilingual Internet were also discussed widely, and valuable feedback and inputs were provided by the participants.
The importance of the multistakeholder model of Internet Governance was stressed upon, and the Dutch approach to Internet Governance was presented in which Arnold van Rhijn spoke about how a collaborative consultation with multiple stakeholders reduces future friction in policymaking.
The event had global experts from Internet-related organizations such as APNIC, CISCO, ICANN, IETF, the Internet Society, and SFLC, representing various stakeholders such as academia, law, civil society, government, technical groups, and the private sector. The multiple outlooks from these varied organizations gave this event a holistic view of Internet Governance issues.
This year, inSIG2019 was a part of the India Internet Week, and had two Day 0 events: the Second YouthIGF India and the Global Forum on Cyber Expertise Triple-I Workshop. The YouthIGF India brought together about 150 young people from all across India to deliberate on various Internet Governance challenges and plan for enhanced youth engagement in policy discussions. The Triple-I Workshop, facilitated by the Dutch Ministry of Economic Affairs and Climate, brought together top experts in security with participants from industry, civil society, government organizations, and the technical community to examine ways to improve the security of the Internet and the trust of its users.
Overall, inSIG2019 was well structured and rendered a great balance between the technology and policy aspects of Internet Governance. The well-rounded knowledge and insights provided the foundation for establishing a strong alumni network of Internet leaders and practitioners who will leverage the inSIG platform for further contribution and collaboration.
InSIG was established in 2016 and previous schools events were held in Hyderabad (2016), Trivandrum (2017), and New Delhi (2018). inSIG2019 was organized through a partnership of four Internet Society Chapters of New Delhi, Kolkata, Mumbai, and Trivandrum. The event was supported and sponsored by NIXI, Facebook, the Internet Society, APNIC, ICANN, Neustar, APASA, and MediaNama.
The fifth inSIG, is scheduled to be organized during October-November 2020 in Mumbai.
The 10th African Peering and Interconnection Forum (AfPIF-10) has selected twenty fellows to participate in the meeting next month.
The fellows are drawn from various fields such as interconnection, content, infrastructure, and policy. They represent Kenya, Lesotho, Somalia, Nigeria, Gabon, Burkina Faso, Mozambique, Tanzania, Madagascar, Democratic Republic of Congo (DR Congo), Egypt, Uganda, South Africa, Republic of the Congo (Congo), Ethiopian Cameroon, Benin, and Gambia.
Among the chosen fellows are six women sponsored by the Women in Tech partners. The women are drawn from Kenya, South Africa, Gambia, and Congo.
Representing DR Congo in this year’s AfPIF forum is Eric Nsilu Moanda. Eric works as a Senior Core Data Network Architect for Vodacom DR Congo. He has held the position at the Vodafone Group subsidiary for 12 years now, designing all IP Integration Solutions for the company.
“I look forward to learning how to produce attractive local content in Africa, for Africans, obtaining a fresh technical and marketing perspective, and gaining awareness in the evolution of continental interconnection projects,” Eric said.
In the past, Eric has peered on integrating Vodacom to KINIX (Kinshasa Exchange point) and he also worked on the Internet update link for the CDN of Kinix via Vodacom. He is a member of the Technical committee of ISPA in DR Congo and is part of the team that worked on Integration of the CDN of Google and Facebook to KINIX.
Stephanie Achieng is one of the Women in Tech fellows, representing Kenya at AfPIF-10. She currently works at Technology Service Providers of Kenya (TESPOK) as a Technical officer at the company which runs the Kenya Internet Exchange Point (KIXP).
Her past achievements include having successfully led initiatives such as partnering with Google and Hurricane Electric to drive KIXP data with over 60,000 routes exchanged. She also participated in the launching of a new Internet Exchange Point at the Mombasa ICOLO data center, targeting tier 1 and 2 service providers and onboarding members such as Facebook, MTN, and Lyca Digital.
The Internet Society and AFRINIC collaborated to organize the 3rd Hackathon@AIS in Kampala, Uganda, which took place alongside the 2019 Africa Internet Summit. The event attracted more than one hundred participants who took part in five different tracks at the event. The event has grown from three tracks and 39 participants in 2017 and three tracks with 75 participants in 2018, to five tracks with 100 participants this year. Cisco DevNet has been helping organize the event since the first edition, and this year, they sponsored t-shirts for the Hackathon.
The goals of the Hackathon@AIS and other open standards promotion activities in the African region are to identify, encourage, and expose engineers from Africa to open Internet Standards development, so that they can contribute to the work at organizations such as the Internet Engineering Task Force (IETF).
The event ran for two days, organized as follows:
- Day 1, June 19th, Morning
- Opening session covering the goals of the meeting and the overall structure
- Registration formalities of participants – using information gathered during the registration process earlier in the year, participants were added into corresponding tracks with each track having its own meeting room and facilitators
- Room and lab setup – connectivity was provided via the Africa Internet Summit connectivity provider (SEACOM)
- Day 1, June 19th, Afternoon
- Hackathon activities in each track
- Day 2, June 20th, Morning
- Hackathon activities in each track
- Day 2, June 20th, Afternoon
- Presentation of results from each track (available on the event website)
- Closing ceremony with awarding of t-shirts.
This year, there were five tracks:
In this track, participants were introduced to network programmability concepts and components, including IETF standards such as YANG, NETCONF, and RESTCONF. They then applied what they learned using tools such as pyang, ncclient, and Postman, programming languages such as Python, and sandboxes from Cisco DevNet that provided access to network devices.
In this track, participants were taken through Network Time and the work going on at the IETF on how to secure NTP. It started with an introduction on plain NTP, and its basic packet format. The participants learned about wireshark and compiling from source. Later NTS (Secure Network Time) was explained and how it is finally heading to becoming an RFC. This part of the track was challenging due to the mathematics involved. Participants got to work with Chrony and presented their findings at the closing ceremony.
In this track, participants were taken through IPv6 and given a breakdown of the IETF IPv6 working groups (6MAN and v6OPS) and the role of the Working Group chairs at the IETF. Participants were challenged with enabling IPv6 in several IPv4 only open source tools, some of which were completed successfully.
The facilitators proposed that a follow up be made to keep the flame burning, by helping the participants get more familiar with current drafts that are being discussed in the various IPv6 related working groups.
This track covered testing an implementation of a draft being discussed at the IETF under the IPWAVE working group. The author of the track, Professor Nabil Benamar, lead the group in testing some implementations proposed in the draft.
This track covered DNS over TLS (DoT) and DNS over HTTPS (DoH) setups and measuring the performance of caching resolvers against locally-setup DoT and DoH servers against publicly available DNS resolvers. The purpose was to find out the performance differences and the requirements for running a local DoT or DoH server. Some of the results indicated that of the publicly available DNS resolvers, Quad9 (220.127.116.11) returned responses the quickest in Africa, but local resolvers (installed in the local lab) were still quicker. Do read a more conclusive report from Willem Toorop from NLnet Labs, who was one of the lead facilitators at the Measurement Track.
Presentations and Materials
Presentations and other content from the event can be found at https://hackathon.internetsummitafrica.org.
Feedback from participants has been positive with almost all participants indicating that the event got them interested in Open Internet Standards and the work going on at the IETF. On what could be improved, the most common feedback from participants has been to increase the number of days for the event which currently stands at 2 days. Participants said more days would allow for more in-depth coverage of document lifecycles (from drafts to RFC) and more time to get into the technical content covered in each track.
Moderator feedback was similar with more time available noted as being key to covering more content in depth.
Participants from some of the tracks such as the IPWAVE went on to update the IPWAVE Working Group at the IETF with the results of their findings from the event. Several participants have also indicated interest in organizing similar activities in their localities or organizing remote viewing hubs for meetings such as the IETF.
The organizers would like to thank the expert facilitators who lead the tracks, the AFNOG tech team for providing the required connectivity, and AFNOG and AFRINIC for sharing the venue during the 2019 Africa Internet Summit.
TheHackathon@AIS 2019 Facilitators were:
- Charles Eckel
- Isabel Odida
- Michelle Opiyo
- Loganaden Velvindron
- Christer Weinigel
- Jeremie Daniel
- Willem Toorop
- Jasper van Hertog
- Nabil Benamar
- Manhal Mohammed
- Fred Baker
- Stephen Honlue
- Brice Abba
- Marsema Tariku (ISOC)
- Stephen Honlue (AFRINIC)
- Charles Eckel (Cisco)
- Nabil Benamar (Morocco – School of Technology Meknes, University of Moulay Ismail)
- Willem Toorop (NLNET Labs)
- Fred Baker
- Kevin G. Chege (ISOC)
Report Compiled by:
- Stephen Honlue
- Charles Eckel
- Nabil Benamar
- Willem Toorop
- Kevin G. Chege
- Loganaden Velvindron
What is Hackathon@AIS?
The Internet, with its endless supply of knowledge and information, has become a strategic element in nearly all economic endeavors in Africa. To build tactical awareness among primary stakeholders as well as resiliency and robustness into Internet-enabled grids, the Internet Society and AFRINIC have organized the third Hackathon@AIS event, which is taking place in Kampala, Uganda, from 19-20 June 2019.
Network engineers, software developers, and computer science students from across Africa are gearing up for another round of collaborative computer programming aimed at introducing participants to existing and evolving Internet standards development that can help further their careers through shared skillsets.
The first Hackathon@AIS was held in 2017 in Nairobi and attracted 39 participants from 12 countries. The second event, held in 2018 in Dakar, attracted 75 participants from 15 countries. Both events consisted of three different tracks led by expert facilitators from across the globe. This year, the event consists of five tracks spanning different fields, and again we’ve called on expert facilitators from around the world to share their expertise and guidance.
The Hackathon is a breeding ground for talent that can change the world through innovation and create productivity and efficiency in business. Participants will meet new people with different talents, forming “super teams” – with skilled mentors to guide participants down the right path of on-demand service delivery.
Why Are We Doing It?
The goals of the Hackathon@AIS are to expose engineers to the development process of open Internet standards and to identify strong individuals who can contribute to open Internet standards in the region. Historically, participation from the African region has been low and this event aims to encourage engineers to contribute to open Internet standards. This year, approximately 400 participants applied and more than 100 are attending the event. Please visit the event web page: https://hackathon.internetsummitafrica.org
Testimonials from the Trainers
Fred Baker has been working in data communications since 1978, including 22 years at Cisco and 30 years in the IETF. He now co-chairs IPv6 Operations in the IETF and the Root Server System Advisory Committee in ICANN. “This is my first Hackathon as a trainer,” Fred said. “I’m learning as I prepare, and hope to be a benefit to those I work with.”
Loganaden Velvindron, currently working at AFRINIC and the Regional Internet Registry, said, “During the Hackathon@AIS event, I will be working on network time security with Jeremie Daniel, a brilliant student from the University of Mauritius and member on cyberstorm.mu, as well as Christer Weinigel. So far I have attended two Hackathon@AIS events as a trainer. During the first hackathon, students were able to implement part of a spec in FreeBSD, DragonflyBSD, and NetBSD. In the last Hackathon, students were able to implement privacy in a Python NTP implementation, and a single line was added to that draft in the NTP working group to make the draft better. We hope that participants will prepare before they come so that we can move faster during the training sessions.”
Charles Eckel, a developer advocate with a passion for open source and standards, and recognized champion of open source, standards, and interoperability, runs DevNet’s Open Source Dev Center at Cisco, which focuses on Cisco’s major open source contributions, use, and community engagements. He also runs Code Exchange, which helps developers discover, learn, build, and collaborate on curated GitHub projects to jumpstart work with Cisco platforms, products, APIs, and SDKs. Charles introduced open source hackathons into IETF, revolutionizing the way IETF operates and uniting open source software with standards to maximize the pace and relevance of both. The first Hackathon@AIS was modeled after the IETF hackathon as a way to increase IETF awareness and involvement in Africa. At the 2018 Hackathon@AIS, Charles led a successful project focused on network programmability, and for 2019, he is leading a new and improved version of this project. According to Charles, “the Hackathon is a great way for developers and network engineers to learn new skills while actively contributing to the deployment and improvement of IETF standards.”
Willem Toorop, a developer/researcher at the NLnet Labs, works on open standards and open source software for core Internet protocols. Willem is especially interested in delivering first class security and privacy (with DNSSEC and DNS-over-TLS) to end-users at the edges of the Internet. “Since the whole world is now using, and increasingly also dependent upon the Internet, every area in the whole world MUST be involved in the development of open standards that is taking place in the IETF,” Willem said. “Topics currently being discussed at the IETF, like consolidation of core infrastructure (like DNS), have far reaching performance and privacy consequences that might be and mean different things in different areas of the world. However, this might not be immediately apparent as the dominance of the central cloud services on the Internet overshadow the underlying infrastructure that enables them. The best way to get intimately acquainted and involved with the open network of networks that is the Internet, is to get your hands dirty and actively participate in one of the topics which are now at the heart of the debate at the IETF.”
“The Hackathons I have supervised have led to a few interesting projects,” added Willem. “Like DNSSEC name and shame, A DNSSEC secured OTR-key lookup to the Python-based Gajim XMPP client. This was also later presented at ICANN50 in London, an emoji-based identification of DNSSEC key.” Willem further noted that the Hackathons in which he has participated were all used to make implementations of drafts he was working on (many for DNS-over-TLS, authenticating upstream with DANE, etc.). The RIPE DNS measurement has also led to the DNS Thought project.
Nabil Benamar, Associate Professor of Computer Networks at Moulay Ismail University, researches topics such as IPv6, vehicular networks, DTNs, IoT, and IDNs. Author of several journal papers and IETF Internet drafts, Nabil is an IPv6 expert (he.net certified) and IPv6 trainer with many international organizations (RIPE/MENOG, AFRINIC, and Agence universitaire de la Francophonie), as well as a reviewer for Computer Communications (Elsevier), Adhoc Networks (Elsevier), Future Generation Computer Systems (Elsevier), JKSUCS (Elsevier), International Journal of Wireless Information Networks (Springer), AJSE (Springer), and IEEE Access. Nabil is a TPC member of different IEEE flagship conferences (Globecom, ICC, PIMRC, WCNC, etc.), and a member of the organizing committee for WCNC’2019.
Nabil became an expert in Internet Governance after completing the Internet Society’s Next Generation Leaders e-learning program, acting as an Internet Society Ambassador for the 2012 and 2013 Internet Governance Forums, a Google panelist at the first Arab-IGF, and an Internet Society Fellow (IETF 89, 92, 95, 99, and 103), and a Fellow to ICANN 50 and 54.
“The Hackathon is a must for the African community to increase its participation in IETF working groups, and thus participate in shaping the Internet by co-authoring drafts, RFCs, and producing standards,” Nabil said. “Such activities will also lead to hosting an IETF meeting in Africa, which has never been done so far! I think that we need to encourage such an initiative and try to organize at least two hackathons per year.” Nabil further added that the Hackathon held for the African community is an enabler of the possible production of future IETF documents co-authored by African participants. According to Nabil, it is a good idea to lead different tracks in the same hackathon. Each track demands different and specific skills: programming languages, Linux Kernel, Networking, etc.
How can the brightest minds help transform the Middle East for the better? The MIT SciTech Conference hoped to find answers. The annual three-day conference, which took place 19-21 April in Boston, Massachusetts, brought together students and professionals from across North America and the MENA Region. This year’s theme was “Envisioning the Future: Cities of MENA,” and included an IDEAthon on Energy, Innovation, and Infrastructure.
Many people from all over the globe attended the conference, mainly Arabs who were also successful tech entrepreneurs, leveraging the Internet to reach communities across the world. They also spoke about their innovations and inspired the young participants, who included MIT students, through panels, keynotes, ideation processes, and SciTech talks.
The first day started with a tour of MIT Labs and the launch of the IDEAthon. After initial sessions and introductions, participants were left for the night to work on their ideas. Those ended up being presented at the end of the third day to judges, with cash prizes awarded to winners so that they could turn them into reality by implementing them throughout the Arab world.
Infrastructure is a challenge in the MENA region, especially with a rapidly growing population, and the conference showcased projects that use the Internet to address this. For instance, Swivl is a bus ride sharing app that’s making people’s lives easier in Egypt. The platform Womena enables women’s empowerment by showcasing success stories, mentoring women, and helping ideas to fruition.
The Internet Society was a sponsor of the event and fielded many questions about Internet infrastructure. People were keen to learn. For instance, the more the history of the Internet was shared, the more questions arose. To my surprise, many people don’t know much about the beginnings of the Internet, as well as how the Internet works. To some peoples’ awe, it’s not fully connected by satellites, but also by marine cables.
The Internet Society’s participation in the MITSciTech conference resulted in the following:
- Establishing a connection between leading organizations in the Arab world and Arabs at the Massachusetts Institute of Technology.
- Sharing our vision for an open, globally-connected, secure, and trustworthy Internet for everyone.
The event had a huge turnout, with more than 300 people attending. MIT SciTech was a platform for over 20 accomplished speakers and panelists and featured keynote speeches from the dean of the MIT School of Architecture and Urban Planning as well as high-level executive attendees, such as the chairman of Orascom.
An innovation exhibition followed day three of the event that showcased 15 organizations from the Arab world as well as our very own booth for the Internet Society. Next year, we hope to see that the ideas incubated at this year’s MIT SciTech Conference have made a positive impact on the Internet.
This week, 8-9 May, we’ll be at IoT613 in Ottawa, Canada, talking about our work on “Trust by Design” – the idea that privacy and security should be built into Internet-connected products, and not just an afterthought. We have been working with manufacturers to embrace the Online Trust Alliance’s IoT Trust Framework, which identifies the core requirements manufacturers, service providers, distributors/purchasers and policymakers need to understand, assess and embrace for effective IoT security and privacy. We also work to encourage consumers to demand security and privacy and to help policymakers create a policy environment that strengthens trust and enables innovation.
This week in Ottawa, we’ll have an Internet Society booth at the event both days, and on 9 May, Mark Buell, North American Bureau Director, will be part of an “IoT in Canada” panel that will “explore current IoT trends in Canada, identify the benefits of IoT for businesses and citizens and find out how Canada’s IoT ecosystem stacks up compared to the rest of the world.” Mark will speak about the Canadian Multistakeholder Process: Enhancing IoT Security, an Internet Society-led initiative to develop a broad-reaching policy to govern the security of the IoT for Canada.
From its website, IoT613 “fosters a culture of knowledge, sharing, and growth within the local and global IoT community. Through our varied programs, we provide a platform for technology, business, and policy professionals to learn, connect, and interact for the advancement of technology and economic development in the National Capital Region.”
Join us in Ottawa, come chat with us about IoT, privacy, and security, and read more about our work on the Internet of Things.
Privacy has become a major issue around the world. Hopeful presidential candidates, such as Elizabeth Warren, have proposed privacy legislation and European countries are beginning to issue their first judgements based on GDPR violations. Given this evolving environment, the Internet Society participated in a panel on data privacy at the ISC-West conference on 11 April 2019.
The conference was sponsored by ADT, one of the largest home security companies and an Internet Society organizational member. The panel included Frank Cona from ADT, Dylan Gilbert from Public Knowledge, Brandon Board from Resideo, and Kenneth Olmstead from the Internet Society.
The discussion focused on two main themes. The first was that in the data-driven economy, user agency is more important than ever. Users must be able to ask companies what data they have about them and be able to update or delete that data. The second was that companies must put privacy at the forefront of their business practices. Privacy cannot be an afterthought, but must be the starting point.
There was not consensus among panelists regarding whether there will be Federal privacy legislation at some point, but it was clear that the security industry should do its best to implement privacy practices, regardless of regulation. All panelists agreed that privacy can be a market differentiator – it is in companies’ interest to protect their users’ data.
Home security companies, like ADT, are in an interesting position given that the data they can collect is unique. Security systems can monitor who is in the home, when they come and go, and even where they are in the home (among many other data points). The panelists from the industry made it clear that their companies are keenly aware of this and that protecting user privacy given the sensitivity of this data is paramount.
An interesting question from the audience was whether there is a company or organization that offers a “trustmark” of sorts to help companies show that their privacy practices are robust. Here again the consensus of the panel was that no such mark exists at the moment, but it would be helpful to both consumers and companies if it did. It would, in effect, give users information about which companies to trust with their data and help companies communicate to their users that their data privacy practices are effective.
The Internet Society’s position on these issues is clear. Data privacy is extremely important to ensuring trust in the Internet itself. The home security industry relies on the Internet to provide service, and as a result has a vested interest in protecting user data and ensuring that users can be confident their data is safe.
We encourage manufacturers and service providers in the home security industry to follow the principles in our IoT Trust Framework, which outlines security and privacy best practices for devices, mobile apps, and backend services comprising today’s IoT solutions. Working with Consumers International and Mozilla, we recently called on big retailers in the US like Target, Walmart, Best Buy, and Amazon to publicly endorse and apply our minimum security and privacy guidelines and stop selling insecure connected devices. In addition, tomorrow (16 April), we’re releasing our 10th annual Online Trust Audit & Honor Roll, which assesses 1,200 organizations and recognizes excellence in consumer protection, data security and responsible privacy practices. Read more about it tomorrow.
The third Hackathon@AIS will take place in Kampala, Uganda on the 19th and 20th of June 2019. The Hackathon@AIS is an event aimed at exposing engineers from the African region to Internet Standards development and usage. This will be the third event in the series following successful events held in Nairobi (2017) and Dakar (2018), each alongside the Africa Internet Summit (AIS).
The event is targeted at network/system engineers, software developers, and/or computer science students to introduce them to existing and evolving Internet standards development that can help further their careers.
Applications for the event will open in April 2019.
Fellowships will be awarded to strong applicants where possible.
Applications will close on 12 May 2019.
For more information please contact Kevin Chege: Chege@isoc.org.
How do we coordinate responses to attacks against Internet infrastructure and users? Internet technology has to scale or it won’t survive for long as the network of networks grows ever larger. But it’s not just the technology, it’s also the people, processes and organisations involved in developing, operating and evolving the Internet that need ways to scale up to the challenges that a growing global network can create.
One such challenge is unwanted traffic, ranging from spam and other forms of messaging-related abuse to multi-gigabit distributed denial of service attacks. Numerous incident response efforts exist to mitigate the effects of these attacks. Some are focused on specific attack types, while others are closed analysis and sharing groups spanning many attack types.
We are helping to bring together operators, researchers, CSIRT team members, service providers, vendors, information sharing and analysis centre members to discuss approaches to coordinating attack response at Internet scale. The Internet Society is sponsoring a two-day “Coordinating Attack Response at Internet Scale (CARIS) Workshop” intended to help build bridges between the many communities working on attack response on the Internet and to foster dialogue about how we can better collaborate.
The workshop will take place on February 28 to March 1, 2019. Full details including submission instructions are available. The submission deadline for two-page position papers is December 16, 2018.
The end of the year has been very busy, with Internet Society staff members speaking at many events on data protection, security-by-design, and the Internet of Things (IoT). First, to recap the last month, you might want to read the Rough Guide to IETF 103, especially Steve Olshansky’s Internet of Things post. Dan York also talked about DNSSEC and the Root KSK Rollover at ICANN 63, and there were several staff members involved in security, privacy, and access discussions at the Internet Governance Forum. In addition, we submitted comments on NIST’s white paper on Internet of Things (IoT) Trust Concerns; the NTIA RFC on Developing the Administration’s Approach to Consumer Privacy; and the NIST draft “Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks”.
We also have several speaking engagements coming up in the next few weeks. Here’s a quick rundown of the events.
6th National Cybersecurity Conference
The Mona ICT Policy Centre at CARIMAC, University of the West Indies is hosting the 6th National Cyber Security Conference. The Conference theme this year is “Data Protection – Securing Big Data, Understanding Biometrics and Protecting National ID Systems.” Jeff Wilbur will be speaking on 27 November, during Session 1, on Data Protection: Issues and Approaches.
Cybersecurity & Cloud Expo North America 2018
Santa Clara, CA
The Cyber Security & Cloud Expo North America 2018 hosts discussion around cyber security and cloud, and the impact they are having on industries including government, energy, financial services, healthcare and more. Jeff Wilbur will be speaking on 29 November at 9:50AM on a panel titled “The role of regulations & standards for enterprise cybersecurity.”
ASAE Technology Conference & Expo
National Harbor, MD
The American Society of Association Executives (ASAE) is hosting its Technology Conference & Expo on 4-5 December. Jeff Wilbur will speak on 4 December at 3PM in a Learning Lab titled “Internet of Things (IoT) – How Associations can Help Create a Safer Connected World.”
Governance of Digital Security in Organisations and Security of Digital Technologies
The OECD is hosting the inaugural Governance of Digital Security in Organisations and Security of Digital Technologies on 13-14 December in Paris. Jeff Wilbur will speak in session 4 at 4PM on 13 December on “How to Achieve Security By Design?”
While it doesn’t look like any of these upcoming events will be livestreamed, if you’ll be attending any of these events in person, please let us know!