Loading…
Welcome to the Global Forum 2015’s session registration page! Please login using your email address and the password that was emailed to you. Questions? Email us at globalforum2015@icnl.org.
Back To Schedule
Monday, May 11 • 14:00 - 16:00
2A: Cybersecurity for Civil Society
Limited Capacity seats available

Do you know how to diminish the risk of your emails being intercepted, your accounts being hacked, or your computer catching a virus? During this session, participants will be led through a “personal cybersecurity audit” to learn about the major threats to cybersecurity and how to mitigate them. The training will be interactive and hands-on.  Participants should bring their laptops and be prepared to practice the techniques presented during the session.


Speakers
avatar for Eric Johnson

Eric Johnson

Independent Cybersecurity Consultant
Johnson has 25 years’ experience implementing donor-supported projects to strengthen civil rights in developing countries. He was born in Africa and educated in Russia; his passport is American; his kids were born in France; and he lives in China. He has taught digital security... Read More →


Monday May 11, 2015 14:00 - 16:00 CEST
Room C1 Clarion Sign Hotel
  Breakout Session
  • More Information Cybersecurity experts informally classify civil society activists into the following categories of cybersecurity awareness: 1) Clueless about cybersecurity—unaware that most of their data are unprotected most of the time, still using an unsafe mail server, no password on either computer or phone, helpless against the simplest attack; 2) A little aware—using Gmail and Skype because they heard they’re safer, using a regularly-self-updating antivirus, maybe heard about encryption but not sure how to use it (and afraid to do something wrong), password on the phone/computer but no auto-timeout set; 3) A lot aware—fully updated/patched software, encrypted hard drive, using unique passwords for each service; 4) A pro—not using a mobile for e-mail, even backup is encrypted, can circumvent any filter; and 5) A nutjob—doesn’t have a mobile phone or use credit cards, runs own mail server, won’t communicate except through open-source encryption tools, uses a pseudonym The objective of the session will be to ensure that all participants leave the session being “a lot aware,” with the knowledge of what it takes to be prepared for all but the best-resourced adversaries.
  • Tags Fundamental Freedoms: Defending Civil Society Space, The Freedom to Communicate and Connect