The “summit” process is designed to catalyze a quantum leap in international efforts to address specific cybersecurity vulnerabilities and threats. The EastWest Institute is working with its partner organizations, its sponsors, its media partners and all participants in the summit to mobilize for international action. This means that the annual summit is part of a process, the "EWI Process," and not an end in itself. We invite all participants to contribute to the post-summit work in several ways: through their ideas for new measures (agreements and policies); through identification of mechanisms to bring those measures into play; and – after the summit – to be a part of the large community of “change agents” working through EWI or independently to achieve our common purposes.
PLENARIES: We have a set of tightly-timed plenary sessions, in which leading figures have been asked to make short, well-crafted oral interventions to their peers. These short interventions can be supported by printed material to the extent that the speakers see that as useful. This summit will be more powerful if the messages delivered in the plenary are sharp, short and innovative in some way.
DALLAS PROCESS (Breakthrough Groups): The bulk of the summit will be a highly interactive format. This interactive working program gives participants unique opportunities to collaborate with professional peers from around the world. Participants can expect to be able to work on five topics identified at the first summit in Dallas as critical international policy needs where progress is stalled. Further information on these can be found in a separate document. The success of the summit is measured by the breakthroughs made by these groups both during the summit, and in the follow-up activities.
LONDON PROCESS: In addition to the breakthrough groups initiated in Dallas, the summit will launch three new breakthrough groups labelled the “London Process.” These breakthrough groups will expand the discussion in international cooperation on cybersecurity in three new fields carefully chosen by the Summit Committee. As with the Dallas process, the success of the summit is measured by the breakthroughs made by these groups both during the summit, and in the follow-up activities.
Click here to download the full program.
Click here to download Second Worldwide Cybersecurity Summit: Mobilizing for International Action
Conference Materials: