Cyberstability Update – May 2019

Global Commission Meeting in The Hague, the Netherlands

This article was published on the GCSC website, 23 May 2019

The Global Commission on the Stability of Cyberspace will hold its third meeting of 2019 in The Hague, the Netherlands, on 16-17 June. The Commission meeting will take place prior to EuroDIG, being held at the World Forum in the Hague from 19-20 June 2019.

Read More


GCSC Represented in Discussion on G20, Japan 2019

This article was published on the GCSC website, 10 May 2019

This year’s G20 Summit will be held in Osaka, Japan. The Global Commission on the Stability in Cyberspace participated in two successive meetings on the digital economy, helping to inform the G20 members on issues pertaining to responsible behavior in cyberspace.

Read More


Global Co-operation on Cyber Security Is Long Overdue

This article was published in the Financial Times, 19 May 2019

For years, hackers have abused the registration process to obtain new domain names which they then use to orchestrate cyber intrusions. Today, if attackers can hijack an existing customer domain at any of these companies, they can also reroute email and web-based communications, obtain confidential information and disrupt communications. And if they are able to compromise administrative infrastructure for DNS service providers themselves, they can cause potentially massive chaos, including for entire government and military domains.

These recent alerts and attacks highlight an under-appreciated cyber security vulnerability in the global domain name system. Two years ago, the Global Commission on the Stability of Cyberspace, which I co-chair, called on both state and non-state actors not to threaten the integrity of the public core of the internet.

We now need concerted international action to address the risk to essential DNS infrastructure and reduce the opportunity for bad actors to disrupt services critical to the way we communicate and trade today.

Read More


Sign up to the weekly newsletter!

This Cyberstability Update is an overview of all articles included in our Weekly Newsletters for the month. Want to receive these updates on a weekly basis? Sign up here to receive our weekly newsletter on the work of the Global Commission on the Stability of Cyberspace (GCSC), its members and developments in the field of international cyber policy.


National Policy


Governments must halt the spread of commercial spyware, Financial Times.

Tags: GCSC Commissioner Marietje Schaake.


Let experts prioritize threats to nation’s critical infrastructure, The Hill.

Tags: GCSC Norm for States to Create a Vulnerability Equities Process, GCSC Norm to Reduce and Mitigate Significant Vulnerabilities, GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Russia’s great firewall: is it meant to keep information in – or out?, The Guardian.

Tags: GCSC Commissioner James Andrew Lewis.


5 Things the Trump Administration Got Right on Cyber security, Cyber Defense Magazine.

Tags: GCSC Norm to Avoid Tampering, GCSC Call to Protect the Electoral InfrastructureGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


American soft power in the age of Trump, Asia Times.

Tags: GCSC Commissioner Joseph Nye.


Cyberattacks are the newest frontier of war and can strike harder than a natural disaster. Here’s why the US could struggle to cope if it got hit, Business Insider.

Tags: GCSC Norm to Create a Vulnerability Equities ProcessGCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


US Congressional Report Highlights Beijing’s Failed Attempts to Address Foreign Investment Concerns, The Epoch Times.

Tags: GCSC Commissioner James Andrew Lewis.


Executive Order on Securing the Information and Communications Technology and Services Supply Chain, White House.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities, GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Poblete’s Resignation Weakens State’s Security Bench, Breaking Defense.

Tags: GCSC Commissioner Christopher Painter.


In rising e-Commerce storm, India protects its ship – Samir Saran & Kanchan Gupta, Medianama.

Tags: GCSC Commissioner Samir Saran.


How Estonia uses Cybersecurity to Strengthen its Position in NATO, International Centre for Defence and Security.

Tags: Global Commission on the Stability of Cyberspace.


Information Assurance: Situation in Switzerland and Internationally, Swiss Confederation.

Tags: Global Commission on the Stability of Cyberspace.


Signaling, Victory, and Strategy in France’s Military Cyber Doctrine, War on the Rocks.

Tags: Global Commission on the Stability of Cyberspace.


New leaks of Iranian cyber-espionage operations hit Telegram and the Dark Web, ZDNet.

Tags: Global Commission on the Stability of Cyberspace.


European Affairs


EU Agrees Powers to Sanction, Freeze Assets Over Cyber-Attacks, Bloomberg.

Tags: Global Commission on the Stability of Cyberspace, GCSC Call to Protect the Electoral Infrastructure.


Software security, trust, and public policy – GitHub Satellite 2019, Github.

Tags: GCSC Commissioner Marietje Schaake.


Here come the European Parliament tech hawks, POLITICO.

Tags: Global Commission on the Stability of CyberspaceGCSC Commissioner Marina Kaljurand, GCSC Commissioner Marietje Schaake.


Digital Brief: ‘No letting down the guard’, Euractiv.

Tags: GCSC Commissioner Marina Kaljurand.


Global Governance


Global co-operation on cyber security is long overdue, Financial Times.

Tags: GCSC Co-Chair Michael Chertoff, GCSC Call to Protect the Public Core of the Internet.


One year later: A cybersecurity commitment shared by more than 100 companies, Tech Accord.

Tags: Global Commission on the Stability of Cyberspace.


G7 countries to simulate cross-border cyber attack next month: France, Reuters.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Cyberhedge Launches First-Ever Cyber Governance Indexes, CISION.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


The End of Cyberspace, The Atlantic.

Tags: Global Commission on the Stability of Cyberspace.


The Global Internet Is Disintegrating. What Comes Next?, BBC.

Tags: Global Commission on the Stability of Cyberspace.


Four Challenges for International Law and Cyberspace: Sartre, Baby Carriages, Horses, and Simon & Garfunkel Part 2, Council on Foreign Relations.

Tags: Global Commission on the Stability of Cyberspace.


Solarium panel delves into international ‘norms’ with former State Dept. official Painter, Inside Cybersecurity.

Tags: GCSC Commissioner Christopher Painter.


5 Questions for ‘The Father of the Internet’, UVA Today.

Tags: GCSC Special Advisor Vinton Cerf.


Threats and Risk Mitigation


Progress in Cybersecurity: Toward a System of Measurement, Lawfare.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational DefenseGCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


New research: How effective is basic account hygiene at preventing hijacking, Google Security Blog.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Security Experts Unite Over the Right to Repair, WIRED.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


Cyber Risks to Exceed Natural Disasters for Insurers: Scor CEO, Bloomberg.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


From drone swarms to modified E. Coli: say hello to a new wave of cyberattacks, World Economic Forum.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational Defense, GCSC Norm to Reduce and Mitigate Significant Vulnerabilites, GCSC Norm to Avoid Tampering.


Rattled by Cyberattacks, Hospitals Push Device Makers to Improve Security, The Wall Street Journal.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Chemical Safety Board Needs to Consistently Follow Its Cyber Rules, Watchdog Says, Nextgov.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Neustar Research Shows Large Attacks Growing as Multi-Vector Exploits Increasingly Become the Norm, CircleID.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


WannaCry Lives On in 145K Infected Devices, DarkReading.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities, GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


New security flaws have been found in Intel chips—this is what you need to do right now, MIT Technology Review.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


It’s not just WhatsApp, most messaging apps likely have security vulnerabilities, CNBC.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


WhatsApp: How a Bug Relates to the G7, Internet Society.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities, GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Cyber Espionage Targeting Public Sector Rose 168% In 2018, Nextgov.

Tags: GCSC Norm for States to Create a Vulnerability Equities ProcessGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Technology And Terror: A New Era Of Threat In A Borderless Online World – Analysis, Eurasia Review.

Tags: GCSC Commissioner Samir Saran.


All Hands On The Deck, Please!, CIO&Leader.

Tags: Global Commission on the Stability of Cyberspace, GCSC Norm to Reduce and Mitigate Significant Vulnerabilites.


Cyber conflict


Bad Actors Want To Target the Internet’s Infrastructure. If That Happens, We’re in Trouble, BRINK News.

Tags: GCSC Call to Protect the Public Core of the Internet, GCSC Commissioner Wolfgang Kleinwächter.


Managing New Style Warfare, CSIS.

Tags: GCSC Commissioner James Andrew Lewis.


The new technology cold war, BBC.

Tags: GCSC Commissioner Nigel Inkster.


The potential human cost of cyber operations, ICRC.

Tags: Global Commission on the Stability of Cyberspace.


Potential human costs of cyber operations – Key ICRC takeaways from discussion with tech experts, ICRC Humanitarian Law & Policy Blog.

Tags: Global Commission on the Stability of Cyberspace.


Time to Pursue an International Cyber Treaty?, The Nation.

Tags: GCSC Commissioner Joseph Nye, GCSC Call to Protect the Electoral Infrastructure.


Plumbing the depths of the seas in the hidden battle for the internet, The Telegraph.

Tags: GCSC Call to Protect the Public Core of the Internet.


How military leaders got a clearer view of the cyber environment, Fifth Domain.

Tags: Global Commission on the Stability of Cyberspace.


Cyber Command’s latest VirusTotal upload has been linked to an active attack, CyberScoop.

Tags: Global Commission on the Stability of Cyberspace.


How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks, New York Times.

Tags: Global Commission on the Stability of Cyberspace.


In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc, The New York Times.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational Defense, GCSC Norm to Reduce and Mitigate Significant Vulnerabilties.


The Future Is Here, and It Features Hackers Getting Bombed, Foreign Policy.

Tags: Global Commission on the Stability of Cyberspace, GCSC Norm Against Offensive Cyber Operations by Non-State Actors.


Crossing a Cyber Rubicon? Overreactions to the IDF’s Strike on the Hamas Cyber Facility, Lawfare.

Tags: Global Commission on the Stability of Cyberspace, GCSC Norm Against Offensive Cyber Operations by Non-State Actors.


What Israel’s Strike on Hamas Hackers Means for Cyberwar, WIRED.

Tags: Global Commission on the Stability of Cyberspace.


Remarks by NATO Secretary General Jens Stoltenberg at the Cyber Defence Pledge Conference, London, NATO.

Tags: Global Commission on the Stability of Cyberspace.


NATO Getting More Aggressive on Offensive Cyber, Defense One.

Tags: Global Commission on the Stability of Cyberspace.


Toward an Information Operations Kill Chain, Lawfare.

Tags: Global Commission on the Stability of Cyberspace.


Naming and shaming nations that launch cyberattacks does work, say intel chiefs, ZDNet.

Tags: Global Commisson on the Stability of Cyberspace.


Military plans to counter Iran include possible 120,000 troop deployment, cyber attack ‘Nitro Zeus’, Military Times.

Tags: Global Commission on the Stability of Cyberspace.


Non-state Actors and Private Stakeholders


Going Toe-to-Toe With Ukraine’s Separatist Hackers, Foreign Policy.

Tags: GCSC Norm Against Offensive Cyber Operations by Non-State Actors.


When “Customers” Attack DNS, Security Boulevard.

Tags: GCSC Call to Protect the Public Core of the Internet, GCSC Norm Against Commandeering of ICT Devices into Botnets, GCSC Norm to Reduce and Mitigate Significant Vulnerabilities, GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


A New Tool for Tech Companies: International Law, Lawfare.

Tags: Global Commission on the Stability of Cyberspace.


The Cybersecurity 202: Top cybersecurity companies are pooling their intel to stop cyberattacks, The Washington Post.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Most businesses vulnerable to supply chain cyber attacks, ComputerWeekly.

Tags: GCSC Norm to Avoid TamperingGCSC Norm to Reduce and Mitigate Significant Vulnerabilities, GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


The Manufacturer’s Dilemma, Foreign Policy.

Tags: GCSC Norm to Avoid Tampering, GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


Equifax just became the first company to have its outlook downgraded for a cyber attack, CNBC.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


3 Ways Norsk Hydro Kept its Reputation During LockerGoga Cyberattack, Nozomi Networks.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities, GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Are Companies Doing Enough to Secure PII? I Spoke With Security Expert Frank Abagnale to Find Out, Security Intelligence.

Tags: GCSC Co-Chair Michael Chertoff, GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Microsoft Joins MANRS to Improve Routing Security, Internet Society.

Tags: GCSC Commissioner Olaf Kolkman.


Microsoft Joins Internet Society Initiative To Improve Routing Security, Express Computer.

Tags: GCSC Commissioner Olaf Kolkman.


Facebook and Twitter removed thousands of Iran-linked fake accounts, Vox.

Tags: GCSC Commissioner James Andrew Lewis.


Vulnerabilities, Hacks and Data Breaches


Nation state actors, affiliates behind increasing amount of data breaches, ZDNet.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities, GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


What’s the Point of Charging Foreign State-Linked Hackers?, Lawfare.

Tags: Global Commission on the Stability of Cyberspace.


Indictment Alleges Who Hacked Anthem, But not Why, WIRED.

Tags: Global Commission on the Stability of Cyberspace.


Fancy Bear improves weapon in its hacking arsenal, Verdict.

Tags: GCSC Norm to Avoid Tampering.


Russian Nation-State Group Employs Custom Backdoor for Microsoft Exchange Server, DarkReading.

Tags: GCSC Norm to Avoid TamperingGCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


Immigration Cops Just Spent A Record $1 Million On The World’s Most Advanced iPhone Hacking Tech, Forbes.

Tags: GCSC Norm to Avoid Tampering.


DEF CON and Baidu Security Nurturing China’s Hacker Community, Pandaily.

Tags: GCSC Commissioner Jeff Moss.


The Cybersecurity 202: Trump administration raises pressure on China with more hacking indictments, The Washington Post.

Tags: GCSC Commissioner Christopher Painter, GCSC Commissioner James Andrew Lewis.


Researchers Are Liberating Thousands of Pages of Forgotten Hacking History From the Government, Motherboard.

Tags: GCSC Norm for States to Create a Vulnerability Equities Process.


Recently released records show how NASA investigated the 1989 WANK worm infection, Muckrock.

Tags: GCSC Norm for States to Create a Vulnerability Equities Process.


Mysterious hacker has been selling Windows 0-days to APT groups for three years, ZDNet.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


Meltdown Redux: Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs, WIRED.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


WhatsApp voice calls used to inject Israeli spyware on phones, Financial Times.

Tags: GCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


A Mysterious Hacker Group Is on a Supply Chain Hijacking Spree, WIRED.

Tags: GCSC Norm to Avoid TamperingGCSC Norm to Reduce and Mitigate Significant VulnerabilitiesGCSC Norm on Basic Cyber Hygiene as Foundational Defense.


The Marriott Breach Shows Just How Inadequate Cyber Risk Disclosures Are, Harvard Business Review.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Hackers Steal and Ransom Financial Data Related to Some of the World’s Largest Companies, Motherboard.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities, GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


UK universities warn on theft of research in foreign cyberattacks, The Telegraph.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


Chinese database exposes 42.5 million records compiled from multiple dating apps, CyberScoop.

Tags: GCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


What’s the Deal with Huawei and This African Union Headquarters Hack?, New America.

Tags: GCSC Norm to Avoid TamperingGCSC Norm to Reduce and Mitigate Significant Vulnerabilities.


Elections and Electoral Infrastructure


DeSantis: Russians accessed 2 Florida voting databases, Associated Press.

Tags: GCSC Call to Protect the Electoral Infrastructure.


At nations’ request, U.S. Cyber Command probes foreign networks to hunt election security threats, The Washington Post.

Tags: GCSC Call to Protect the Electoral Infrastructure.


Can Cyber Policy Protect the 2020 Elections?, Data Breach Today.

Tags: GCSC Commissioner Christopher Painter.


Intelligence agencies brief 2020 campaigns on cybersecurity, espionage issues, CNN.

Tags: GCSC Norm on Basic Cyber Hygiene as Foundational DefenseGCSC Call to Protect the Electoral Infrastructure.


Democrats introduce an election security bill that proposes paper trails and mandatory audits, TechCrunch.

Tags: GCSC Call to Protect the Electoral Infrastructure.


We’re asking candidates to pledge not to accept help from malign foreign powers, CNN.

Tags: GCSC Co-Chair Michael Chertoff, GCSC Call to Protect the Electoral Infrastructure.


Securing Electoral Infrastructure: How Alert is India’s Election Chowkidaar, Medianama.

Tags: GCSC Call to Protect the Electoral Infrastructure.


Human Rights


Open Letter to GCHQ on the Threats Posed by the Ghost Proposal, Lawfare.

Tags: GCSC Norm to Avoid Tampering.


Digital rights and inclusion advocacy is making impact despite challenges, The Guardian.

Tags: GCSC Commissioner Anriette Esterhuysen.


The APC community’s work on digital rights in 2018: Advocating for rights-based policy and practices in local, regional and global contexts, Association for Progressive Communications.

Tags: Global Commission on the Stability of Cyberspace, GCSC Call to Protect the Public Core of the Internet.


#DRIF19: Delegates Call For Renewed Action To Protect Digital Rights In Africa, Leadership.

Tags: GCSC Commissioner Anriette Esterhuysen.


Others


Malware: A selection of essential cyber notions and concepts, ICRC.

Tags: Global Commission on the Stability of Cyberspace.


Lawyers for Navy SEAL say prosecutors in the war-crimes case spied, Los Angeles Times.

Tags: Global Commission on the Stability of Cyberspace.


Your 5G Phone Won’t Hurt You. But Russia Wants You to Think Otherwise, The New York Times.

Tags: Global Commission on the Stability of Cyberspace.


5G: National Security Concerns, Intellectual Property Issues, and the Impact on Competition and Innovation, CSIS.

Tags: GCSC Commissioner James Andrew Lewis.


Huawei: what’s bugging the West, The Australian.

Tags: GCSC Commissioner James Andrew Lewis, GCSC Norm to Avoid Tampering, GCSC Norm to Reduce and Mitigate Significant Vulnerabilities, GCSC Norm on Basic Cyber Hygiene as Foundational Defense.


This is why there’s been a decade-long disconnect between Huawei and the US, and it’s unlikely to be fixed soon, CNBC.

Tags: GCSC Co-Chair Michael Chertoff.


Trump Aims to Prevent Chinese Companies from Building 5G Network in U.S., The Jerusalem Post.

Tags: GCSC Commissioner James Andrew Lewis.


Trump set to block Huawei operations in US, ABN.

Tags: GCSC Commissioner Christopher Painter.


Exclusive: Google suspends some business with Huawei after Trump blacklist – source, Reuters.

Tags: GCSC Norm to Avoid Tampering.


U.S. pushes hard for a ban on Huawei in Europe, but the firm’s 5G prices are nearly irresistible, The Washington Post.

Tags: GCSC Commissioner James Andrew Lewis.


The Cybersecurity 202: China’s big weapon in the Huawei fight: Money, The Washington Post.

Tags: GCSC Commissioner James Andrew Lewis.


Huawei willing to sign ‘no-spy’ pacts with governments: chairman, Reuters.

Tags: GCSC Norm to Avoid Tampering.


No sign that Beijing will offer a no-spy deal: Germany, Reuters.

Tags: GCSC Norm to Avoid Tampering.


Huawei deal could give China ‘enormous leverage,’ warns former U.S. Homeland Security secretary, CBC.

Tags: GCSC Co-Chair Michael Chertoff.


US takes aim at Chinese surveillance as the trade war becomes a tech war, CNBC.

Tags: GCSC Commissioner James Andrew Lewis.


China to bid on D.C. Metro rail deal as national security hawks circle, Reuters.

Tags: GCSC Commissioner James Andrew Lewis.


The Week That Will Be, Lawfare.

Tags: Global Commission on the Stability of Cyberspace.


Mountain Money – May 6, 2019 Michael Chertoff, KPCW.

Tags: GCSC Co-Chair Michael Chertoff.


A Report on the ICANN DNS Symposium, CircleID.

Tags: GCSC Commissioner Bill Woodcock.


Israel Defense Award Winner Prof. Ben-Israel Joins Cyber 2.0, The Jerusalem Post.

Tags: GCSC Commissioner Isaac Ben-Israel.


The TEISS Amsterdam 2019 slides, TEISS.

Tags: GCSC Commissioner Uri Rosenthal.


Michael Chertoff presenting Democracy & Disconnect Stream, GLOBSEC 2019.

Tags: GCSC Co-Chair Michael Chertoff.


Observations from the Roundtable: The Information Challenge to Democracy, Hoover Institution.

Tags: GCSC Commissioner Joseph Nye


Events


2-3 May 2019: Prague 5G Security Conference, Government of the Czech Republic.


17 May 2019: Uniting Women in Cyber Symposium 2019: Creating a Fearless Workforce, Uniting Women in Cyber.


3-5 June 2019: 3rd Global Conference of the Internet & Jurisdiction Policy Network, I&J Policy Network.


4 June 2019: Data & Great Power Competition, New America.


6 June 2019: Cyber Stability Conference, United Nations Institute for Disarmament Research.


6 June 2019: Securing Our Cyber Future: Innovative Approaches to Digital Threats, Stanford Cyber Policy Center.


7-9 June 2019: CyFy Africa, ORF.


11-14 June 2019: RightsCon Tunis 2019, Access Now.


16-17 June 2019: Global Commission Meeting in The Hague, GCSC.


16-21 June 2019: Consolidated Programme 2019, EuroDIG.


19 June 2019: Tech Talk Series: How DevOps and Automation Can Accelerate Warfighting Readiness, DreamPort.


20-21 June 2019: Cyber 2019, Chatham House.


23-27 June 2019: Cyber Week, Tel Aviv University.


8 August 2019: Cyber Games, Wicked6.


2-3 October 2019: CyberCrimeCon/19, Group-IB.


21-25 October 2019: Cyberweek, CyberScoop.