{"id":274,"date":"2015-04-03T08:39:01","date_gmt":"2015-04-03T16:39:01","guid":{"rendered":"http:\/\/blog.mozilla.org\/netpolicy\/?p=274"},"modified":"2015-04-03T08:39:01","modified_gmt":"2015-04-03T16:39:01","slug":"promoting-international-norm-development-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/","title":{"rendered":"Promoting international norm development in cybersecurity"},"content":{"rendered":"<p dir=\"ltr\">From hacks of some of the world\u2019s largest corporations (think Target, Home Depot), to critical vulnerabilities in widely used open source software like<a href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2014\/04\/14\/heartbleed-is-about-to-get-worse-and-it-will-slow-the-internet-to-a-crawl\" target=\"_blank\"> Heartbleed<\/a> and<a href=\"http:\/\/krebsonsecurity.com\/2014\/09\/shellshock-bug-spells-trouble-for-web-security\/\" target=\"_blank\"> Shellshock<\/a>, to connected<a href=\"http:\/\/mashable.com\/2015\/02\/09\/car-manufacturers-unprepared\/\" target=\"_blank\"> carmakers being woefully unprepared<\/a> to identify and mitigate attacks, to companies like Sony<a href=\"https:\/\/www.accessnow.org\/blog\/2014\/12\/23\/sony-pictures-hack-shows-weak-security-but-no-reason-to-violate-privacy-sta\" target=\"_blank\"> exercising bad security hygiene even after previously suffering a major attack<\/a>, the challenges to securing the internet and those who use it have never seemed greater.<\/p>\n<p dir=\"ltr\">Yet, none of these examples or many of the other exploits that have dominated the public imagination in recent years align with traditional government cyber security paradigms. To contribute to developing a more informed public debate in this arena, the <a href=\"https:\/\/www.freedomonlinecoalition.com\/\" target=\"_blank\">Freedom Online Coalition<\/a>, a group of 26 countries publicly committed to supporting global internet freedom, set up a multistakeholder working group on an \u201cInternet Free and Secure,\u201d of which I\u2019m a member.<\/p>\n<p dir=\"ltr\">In addition to ongoing efforts to map where cybersecurity policy discussions are happening (with an eye to facilitating greater multistakeholder involvement) and developing normative recommendations, the working group also publishes long-form blogs on pertinent issues. Click\u00a0<a title=\"WG 1 \u2013 An Internet Free and Secure: Blog Series\" href=\"https:\/\/www.freedomonlinecoalition.com\/how-we-work\/working-groups\/working-group-1\/wg-1-blog-3\/\" target=\"_blank\">here<\/a> to see the latest edition co-authored by Senior Policy Officer for Internet Freedom at the Dutch Ministry of Foreign Affairs Simone Halink and me. In the post, we discuss the Global Conference on Cyber Space (GCCS), the world\u2019s largest interministerial meeting on cybersecurity, and explore how international policy debates on cybersecurity need to evolve and improve in order to meet today\u2019s challenges. The GCCS is taking place April 16 and 17 in the Hague, and Senior Vice President for Business and Legal Affairs <span class=\"il\">Denelle<\/span> Dixon-Thayer and I will be there to represent Mozilla.<\/p>\n<p dir=\"ltr\">Read the full post <a title=\"WG 1 \u2013 An Internet Free and Secure: Blog Series\" href=\"https:\/\/www.freedomonlinecoalition.com\/how-we-work\/working-groups\/working-group-1\/wg-1-blog-3\/\" target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From hacks of some of the world\u2019s largest corporations (think Target, Home Depot), to critical vulnerabilities in widely used open source software like Heartbleed and Shellshock, to connected carmakers being &hellip; <a class=\"go\" href=\"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/\">Read more<\/a><\/p>\n","protected":false},"author":1138,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"coauthors":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Promoting international norm development in cybersecurity - Open Policy &amp; Advocacy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jochai Ben-Avie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/\",\"url\":\"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/\",\"name\":\"Promoting international norm development in cybersecurity - Open Policy &amp; Advocacy\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mozilla.org\/netpolicy\/#website\"},\"datePublished\":\"2015-04-03T16:39:01+00:00\",\"dateModified\":\"2015-04-03T16:39:01+00:00\",\"author\":{\"@id\":\"https:\/\/blog.mozilla.org\/netpolicy\/#\/schema\/person\/a395fd3aefaa3e67aa7f86da1763b5ac\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.mozilla.org\/netpolicy\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Promoting international norm development in cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mozilla.org\/netpolicy\/#website\",\"url\":\"https:\/\/blog.mozilla.org\/netpolicy\/\",\"name\":\"Open Policy &amp; Advocacy\",\"description\":\"Mozilla&#039;s official blog on open Internet policy initiatives and developments\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mozilla.org\/netpolicy\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mozilla.org\/netpolicy\/#\/schema\/person\/a395fd3aefaa3e67aa7f86da1763b5ac\",\"name\":\"Jochai Ben-Avie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/netpolicy\/#\/schema\/person\/image\/67fc7caaeaface9c3805055361fb9bb6\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/21e143a706b700b1ba58339b18512056?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/21e143a706b700b1ba58339b18512056?s=96&d=mm&r=g\",\"caption\":\"Jochai Ben-Avie\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Promoting international norm development in cybersecurity - Open Policy &amp; Advocacy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/","twitter_misc":{"Written by":"Jochai Ben-Avie","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/","url":"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/","name":"Promoting international norm development in cybersecurity - Open Policy &amp; Advocacy","isPartOf":{"@id":"https:\/\/blog.mozilla.org\/netpolicy\/#website"},"datePublished":"2015-04-03T16:39:01+00:00","dateModified":"2015-04-03T16:39:01+00:00","author":{"@id":"https:\/\/blog.mozilla.org\/netpolicy\/#\/schema\/person\/a395fd3aefaa3e67aa7f86da1763b5ac"},"breadcrumb":{"@id":"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mozilla.org\/netpolicy\/2015\/04\/03\/promoting-international-norm-development-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mozilla.org\/netpolicy\/"},{"@type":"ListItem","position":2,"name":"Promoting international norm development in cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/blog.mozilla.org\/netpolicy\/#website","url":"https:\/\/blog.mozilla.org\/netpolicy\/","name":"Open Policy &amp; Advocacy","description":"Mozilla&#039;s official blog on open Internet policy initiatives and developments","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mozilla.org\/netpolicy\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.mozilla.org\/netpolicy\/#\/schema\/person\/a395fd3aefaa3e67aa7f86da1763b5ac","name":"Jochai Ben-Avie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/netpolicy\/#\/schema\/person\/image\/67fc7caaeaface9c3805055361fb9bb6","url":"https:\/\/secure.gravatar.com\/avatar\/21e143a706b700b1ba58339b18512056?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21e143a706b700b1ba58339b18512056?s=96&d=mm&r=g","caption":"Jochai Ben-Avie"}}]}},"_links":{"self":[{"href":"https:\/\/blog.mozilla.org\/netpolicy\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/blog.mozilla.org\/netpolicy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mozilla.org\/netpolicy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/netpolicy\/wp-json\/wp\/v2\/users\/1138"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/netpolicy\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":0,"href":"https:\/\/blog.mozilla.org\/netpolicy\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.mozilla.org\/netpolicy\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mozilla.org\/netpolicy\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mozilla.org\/netpolicy\/wp-json\/wp\/v2\/tags?post=274"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mozilla.org\/netpolicy\/wp-json\/wp\/v2\/coauthors?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}