<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto">Dear All, <div> </div><div><a href="https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-2018-contributions">https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-2018-contributions</a> </div><div><br></div><div>Please share with your respective networks or group and feel free to add your contributions. </div><div><br><div id="AppleMailSignature">Best, Adama Jallow </div><div id="AppleMailSignature"><br></div><div id="AppleMailSignature"><span style="background-color: rgba(255, 255, 255, 0);">Dear All, <br>Please find below the Call for contributions to the IGF2018 BPF on Cybersecurity - Cybersecurity Culture, Norms and Values. <br>This call is also published on the IGF website at <a href="https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-2018-contributions" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="0">https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-2018-contributions</a> <<a href="https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-2018-contributions" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="1">https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-2018-contributions</a>> .<br>Feel free to forward to any relevant contacts or networks. <br><br>*** Call for Contributions BPF Cybersecurity ***<br><br>All stakeholders are invited to submit written contributions addressing the below questions and issues to the 2018 IGF BPF on Cybersecurity. <br><br>The initial drafting of the output document will begin <a href="x-apple-data-detectors://2" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="calendar-event" x-apple-data-detectors-result="2" style="-webkit-text-decoration-color: rgba(0, 0, 0, 0.258824);">on September 1st.</a> This should be considered a soft deadline as contributions will be welcome on a rolling basis, particularly from IGF National and Regional Initiatives (NRIs <<a href="http://www.intgovforum.org/multilingualbakbis/lexicon/8#NRIs" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="3">http://www.intgovforum.org/multilingualbakbis/lexicon/8#NRIs</a>>) and from other relevant entities or organisations who may be holding meetings relating to cybersecurity prior to the IGF annual meeting in November. Contributions received past <a href="x-apple-data-detectors://4" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="calendar-event" x-apple-data-detectors-result="4" style="-webkit-text-decoration-color: rgba(0, 0, 0, 0.258824);">15 September</a>are not guaranteed for inclusion in the BPF's output document. <br><br>Contributions will be listed on the IGF website, then be compiled and synthesized by the Secretariat, and further circulated on the BPF mailing list and to the community for comment and further work towards an output document for the BPF to be presented at the 13th IGF in Paris, France <a href="x-apple-data-detectors://5" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="calendar-event" x-apple-data-detectors-result="5" style="-webkit-text-decoration-color: rgba(0, 0, 0, 0.258824);">from 12-14 November</a>.<br><br>All individuals and organizations are asked to kindly try to keep their contributions to no more than 2-3 pages, and are encouraged to include URLs/Links to relevant information/examples/best practices as applicable. When including specific examples or detailed proposals, those may be included as an Appendix to the document. Please attach contributions as Word Documents (or other applicable non-PDF text) and send to <a href="mailto:bpf-cybersecurity-contribution@intgovforum.org" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="7">bpf-cybersecurity-contribution@intgovforum.org</a> <<a href="mailto:bpf-cybersecurity-contribution@intgovforum.org" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="8">mailto:bpf-cybersecurity-contribution@intgovforum.org</a>> .<br><br>Overview:<br>The 2018 IGF Best Practices Forum on Cybersecurity is a multistakeholder group focusing on the development of culture, norms and values in cybersecurity. <br><br>Norms have become a very important mechanism for states and non-state actors to agree on responsible behaviour in cyberspace. There are numerous initiatives under way in this regard, but with limited exceptions, such as the Global Conference on Cyberspace (GCCS) and the Global Commission on the Stability of Cyberspace (GCSC), most of these norms discussions happen in inter-state forums, and they do not always provide an open and inclusive mechanism for non-state actors to participate and to contribute. The Best Practices Forum is taking a multi-stakeholder view on the development of norms, both within and between participants of each IGF stakeholder community.<br><br>We are issuing this Call for Contributions to gain perspectives from all interested stakeholders on existing norms development efforts, how those norms are being implemented and whether they are successful. We’re also trying to understand whether differences in design and implementation may result in a “digital security divide”: a group of “haves” and “have-nots” in terms of the protection the norms offer.<br><br>To provide additional background, the Best Practices Forum has developed and released a Background paper on these issues (<a href="http://www.intgovforum.org/multilingual/filedepot_download/3405/1294" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="9">http://www.intgovforum.org/multilingual/filedepot_download/3405/1294</a><<a href="http://www.intgovforum.org/multilingual/filedepot_download/3405/1294" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="10">http://www.intgovforum.org/multilingual/filedepot_download/3405/1294</a>> ). <br><br>Your contributions will help develop our final outcome document, and enrich discussion on cyber norms within the group and within the IGF.<br><br>subscribe to the BPF mailing list <a href="https://intgovforum.org/mailman/listinfo/bpf-cybersecurity_intgovforum.org" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="11">https://intgovforum.org/mailman/listinfo/bpf-cybersecurity_intgovforum.org</a> <<a href="https://intgovforum.org/mailman/listinfo/bpf-cybersecurity_intgovforum.org" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="12">https://intgovforum.org/mailman/listinfo/bpf-cybersecurity_intgovforum.org</a>> <br><br>Relevant reading:<br>Background on the BPF on Cybersecurity<br><a href="https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-1" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="13">https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-1</a> <<a href="https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-1" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="14">https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-1</a>> <br><br>Cybersecurity: Culture, Norms and Values<br>Background paper to the topic of this year’s Best Practices Forum<br><a href="http://www.intgovforum.org/multilingual/filedepot_download/3405/1294" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="15">http://www.intgovforum.org/multilingual/filedepot_download/3405/1294</a> <<a href="http://www.intgovforum.org/multilingual/filedepot_download/3405/1294" dir="ltr" x-apple-data-detectors="true" x-apple-data-detectors-type="link" x-apple-data-detectors-result="16">http://www.intgovforum.org/multilingual/filedepot_download/3405/1294</a>> <br><br><br>Questions<br><br>How do you define a culture of cybersecurity? <br><br>What are typical values and norms that are important to you or your constituents?<br><br>Within your field of work, do you see organizations stand up and promote specific cybersecurity norms? This can be either norms at an inter-state level, or norms that only apply within your community or sector.<br><br>Are there examples of norms that have worked particularly well? Do you have case studies of norms that you have seen be effective at improving security?<br><br>Do you have examples of norms that have failed (they have not seen widespread adherence), or have had adverse effects (living up to the norm led to other issues)? <br><br>What effective methods do you know of implementing cybersecurity norms? Are there specific examples you have seen, or have had experience with?<br><br>Within your community, do you see a Digital Security Divide in which a set of users have better cyber security than others? Is this a divide between people or countries? What is the main driver of the divide?<br><br>Publication <br><br>Contributions will be published on the BPF webpage and included in the BPF’s output document. Please inform us, should there be any limitations on the publication of your contribution, and indicate what title, organisation or contact person could be used to identify your contribution.<br><br><br>*** end of questionnaire ***<br><br>_________________________<br><br>Wim Degezelle<br>Consultant IGF Secretariat - BPF Cybersecurity</span></div><div id="AppleMailSignature"><br></div><div><br>On Aug 16, 2018, at 5:23 PM, adama jallow <<a href="mailto:adamajallow0896@gmail.com">adamajallow0896@gmail.com</a>> wrote:<br><br></div><blockquote type="cite"><div><span> Dear </span><br><span></span><br><span></span><br><span></span><br><span></span><br><span></span><br><span>Best, Adama Jallow </span><br></div></blockquote></div></body></html>