Untitled « All Events This event has passed. 18th Asian Security Conference – Securing Cyberspace: Asian and International Perspectives February 9, 2016 - February 11, 2016 « Talk by T V Paul on Accommodating Rising Powers Keynote address by Dr Arvind Gupta, Deputy National Security Advisor at the 18th Asian Security Conference on “Securing Cyberspace: Asian and International Perspectives” » Concept Note The Asian Security Conference (ASC) is a major calendar event of the Institute for Defence Studies and Analyses (IDSA), New Delhi. Since 1999, when the conference was first held, the ASC has emerged as an important platform for debating issues relating to Asian Security. For the last ten years, the ASC has been providing a forum for security analysts, practitioners and policy makers from around the world to share their views on the challenges facing the Asian continent. The eighteenth conference in this series is being held on the topic “Securing Cyberspace: Asian and International Perspectives”. Cybersecurity is increasingly drawing attention from policy makers as the world becomes increasingly interlinked and dependent on digital pathways. Use of cyber space by governments, businesses and individuals has provided economic benefits and helped connect the world in beneficial ways. Simultaneously, however, there are attempts being made by state and non-state actors to deny its legitimate use by others. Use of cyber space for espionage, both commercial and security-related, are common. Its use by criminals and extremists is no less dangerous. Managing this nascent and rapidly developing threat has proved to be problematic given that it now touches almost every aspect of human existence, from communication to commerce. It equally impact on a variety of stakeholders, individuals, corporations and states, all with differing priorities and perspectives. The large number of users and actors involved, and their varying perceptions of the threats and responses to emanating from cyber space have led to conflicting voices on how best to mitigate and overcome them. Even as the connected systems and networks have grown more intertwined and complex, Cyberspace is being used for a variety of malicious activities, from crime to state-sponsored attacks on critical infrastructure. The interconnectedness of cyber networks means that even the most basic responses end up having a ripple effect or unintended consequences. Maintaining a balance between security and benefitting from the many opportunities provided by the deployment of new cyber technologies is proving to be one of the most vexatious issues of the 21st century. The risk from cyber threats to government agencies, private enterprises, public sector undertakings and research institutions of strategic importance can manifest in many forms. A Distributed Denial of Service (DDoS) attack can disrupt business operations or it may cause severe outages, thereby having a direct impact on their revenue and reputation. Companies also face the risk of losing trade secrets or intellectual property rights. Moreover, a massive data breach for companies or governance portals storing data of customers or citizens can compromise personal information. A cyber-attack on entities that are part of critical infrastructure can have a debilitating impact on national security. The risk increases manifold for electricity grids, nuclear installations, and telemetry/command and control network of space assets. Surprisingly, social media, as a threat vector, has become a channel of least resistance for threat actors to conduct reconnaissance, identity thefts and gather information on employees, projects, systems and infrastructure, besides spreading hateful propaganda and enticing impressionable youth to follow extremist ideologies. Cyberspace has become an intricate constituent of national power. The strategies for the development of Cyberspace are not just restricted to civilian purposes; rather, this domain now falls well under the ambit of the armed forces. With the advent of Network Centricity in military operations and Revolution in Military Affairs, armed forces are at elevated risk of cyber incidents. The integrated use of land, air, maritime and space assets for enhanced domain awareness or real-time information access warrants the armed forces to build expertise in both defensive and offensive cyber operations. Nation states have documented their Cyber Strategies and executed them in the form of Cyber Commands, both overt and covert. With the military dimension, Cyberspace is witnessing a race for development and deployment of cyber weapons. An arms control regime, the Wassenaar Arrangement has enlarged its controls list in consonance with the way Cyberspace has altered present day security landscape. The development of cyber weapons and their potential usage against high value targets has been one of the major security concerns for nation states. The threats in Cyberspace are varying in nature and intensity. Leading companies operating in the domains of energy, telecommunications, finance, and transportation sectors are targets of Advanced Persistent Threats (APT). Non-state actors, such as terrorist organizations and criminal syndicates have become tech-savvy, thereby employing human resources to develop malware. These tools are used extensively in committing Cybercrime. Terrorist organizations leverage the benefits of Cyberspace, harnessing it for ideology propagation, recruitment and communication. The terrorist organization, the Islamic State in Iraq and Syria (ISIS) has been a prime case study. It has tremendous presence on social media helps spread its propaganda and recruit sympathizers across the globe. Al-Qaeda is also reported to have developed encryption software to secure their communication in Cyberspace. As the extent of commerce transacted over Cyberspace grows, along with increasing reliance on information technology to drive cost-efficiencies, the risk exposure to enterprises have increased. According to the 2013 Security Threat Report published by the cyber security company, Sophos, Asia accounted for eight of the top-10 countries most vulnerable to Cybercrime. Asia, the largest continent on earth, represents 60 percent of the world’s population. It is the fastest growing economic region globally. On the other hand, the unprecedented growth of rising economies, rapid industrialisation, rising demand for energy, expanding markets and, depleting natural resources have led to competition and confrontation with respect to the access and control of resources. As Asia continues to grow its share of the global trade and commerce, the threats from cyber-attacks are expected to increase in tandem. Cyber-attacks, like many of the new security challenges, are transnational in origin and nature, and no nation can combat them alone. Despite variations in ethnic, economic and government systems, Asian countries need robust security architecture to resolve the issues specific to the geographical region as well as international issues detrimental to Asia’s economic and societal growth. With the shift of power towards Asia, its representation in the rule-making mechanisms and inputs towards creating a secure cyberspace is critical to international politics, the world economy, and the credibility of international institutions and cybersecurity regimes. Within Asia, cyber threats have altered the security perceptions of institutions and government systems. Against this backdrop, the Institute for Defence Studies and Analyses, New Delhi will organise the 18th Asian Security Conference focusing on the emerging threats and challenges from cyber domain to national and regional security. The two-and-a-half-day conference will consider international and regional responses to cyber security and the scope for cooperation amidst varying national policy frameworks and legislations. The major themes to be discussed include the following: The Global Cybersecurity Environment International and Regional Responses to issues in Cybersecurity Non-State Actors and Cyberspace Securing Strategic Critical Infrastructure Cybersecurity and the Digital Economy Role of Military in Cybersecurity Disruptive Technologies and Cybersecurity Programme Schedule Tuesday, February 9, 2016 (DAY ONE) 09:15-09:40 Registration 09:45-10:15 Inaugural Address Welcome Remarks: Shri Jayant Prasad, Director General, IDSA Key Note Address: Air Marshal PP Reddy VM, ADC, Chief of Integrated Defence Staff Vote of Thanks: Brig. Rumel Dahiya (Retd), Deputy Director General, IDSA 10:15-10:45 Tea 10:45-13:00 Session 1: The Global Cybersecurity Environment Chairperson: Nitin Desai Ammar Jaffri – Cyber Security Challenges & Opportunities in the Fast Changing World Today Varun Sahni – Cyber Redefinitions and the Challenged State: Security Implications Greg Austin – Mutual Restraint in the Cyberspace Diplomacy of Great Powers Cuihong Cai – Global Cybersecurity Environment: Perspectives of the US and China in Comparison Yasuaki Hashimoto – Present Situation of Japanese Cyber Security 13:00-14:00 Lunch 14:00-15:30 Session 2: International and Regional Responses to Cybersecurity Challenges Chairperson: Latha Reddy Alexandra Kulikova – Working out the Rules of Global Cyberspace Governance Nandkumar Saravade – International and Regional Responses to Cybersecurity Challenges Candice Tran Dai – Economic Dimensions of National Cybersecurity Strategies in the Asia-Pacific Region Munish Sharma and Cherian Samuel – A South Asian Regional Cybersecurity Cooperation (SARCC) Forum: Prospects and Challenges 15:30-16:00 Tea 16:00-17:30 Session 3: Non-State Actors and Cyberspace Chairperson: Ravi Kant Alok Vijayant – Asymmetrism in the Cyberspace: State vs. Non-state Actors Sanjeev Relia – Non-State Actors and Cyberspace: An Overview Arun Mohan Sukumar – State and Non-State: Residual Actors in Cyberspace Gillane Allam – Non-State Actors & Cyberspace- A North African Perspective Wednesday, February 10, 2016 (DAY TWO) 10:00-11:00 Keynote Address by Dr. Arvind Gupta, Deputy National Security Advisor 11:00-11:30 Tea 11:30-13:00 Session 4: Securing Strategic Critical Infrastructure Chairperson: Alhad G. Apte Ted Lewis – Challenges of Cybersecurity: Malware and AS-level Structure Kah-Kin Ho – Evolving Role of Government in Critical Infrastructure Protection Jana Robinson – Governance Challenges at the Intersection of Space and Cybersecurity Caroline Baylon – Cyber Security Threats to Critical Infrastructure: A Case Study of Nuclear Facilities A. Vinod Kumar – Securing Critical Infrastructure from Cyber Threats: Developing Defence, Deterrence and Norms 13:00-14:00 Lunch 14:00-15:30 Session 5: Cybersecurity and the Digital Economy Chairperson: V. K. Saraswat Liam Nevill – Challenging Opportunities for Asia-Pacific’s Digital Economy Madan M. Oberoi – New Technologies and New Forms of Crime: Need to Recalibrate Law Enforcement Strategy / Procedures / Law IL Seok, OH – Korean Legal Initiatives to Combat Cybercrime and Enhance Digital Economy Uchenna Jerome Orji – Regionalizing the Cybersecurity Governance in Africa: An Assessment of Responses 15:30-16:00 Tea 16:00-17:30 Session 6: Role of Military in Cybersecurity Chairperson: Prakash Menon Liina Areng – Role of Military in Cybersecurity Amit Sharma – The Triad Theory of Cyber Warfare: A Framework for Strategic Cyber Warfare Caitriona Heinl – International Military Cyber Cooperation in Asia Li-Chung Yuan – Role of Military in Cyberspace: Case of Republic of China (Taiwan) Thursday, February 11, 2016 (DAY THREE) 10:00-11:30 Session 7: Cybersecurity Futures Chairperson: K. Santhanam Tobby Simon – Cybersecurity Futures Sico van der Meer – Defence, Deterrence, and Diplomacy: Foreign Policy Instruments to Increase Future Cybersecurity John Ellis – Disruptive Technologies and the Trusted Cyber Future Jonathan Reiber – Cybersecurity Futures and the U.S.-India Strategic Partnership 11:30-12:00 Tea 12:00-14:00 Session 8 – Panel Discussion on Way Forward Vote of Thanks 14:00-15:00 Lunch Conference Booklet Rapporteurs Report