Read this quarter’s Intermedia here
In IT sector, the common approach to achieve cybersecurity is improving the design of cyber networks by embedding security features in software design, adding cascaded layers of encryptions, and installing firewalls. In the face of evolving technology, these layers do not guarantee cybersecurity from all kinds of cyber threats. Incidents of data breaches for individuals, small businesses, municipalities, and organizations are continuously rising. Achieving cybersecurity only by design is not a sufficient solution in the face of changing dynamics of cyberspace due to the imminent AI revolution and advanced computing algorithms. In contrast, the applicable regulations hold a plenty of room for revisions to control the origins of cyber threats. The regulations can improve cybersecurity by regulating evolving technology, revising Cybersecurity Engineering standards, restraining users’ data collection, sharing, and selling. This essay appreciates the limitations of secure-by-design approach and recognizes the need for tailored regulations and standards to mitigate cybersecurity challenges.
DownloadTop 10 highly commended finalist - IIC 2023 Future Leaders Competition
We give innovators and regulators a forum in which to explore, debate and agree the best policies and regulatory frameworks for widest societal benefit.
Insight: Exchange: Influence
We give members a voice through conferences, symposiums and private meetings, as well as broad exposure of their differing viewpoints through articles, reports and interviews.
The new website will make it easier for you to gather fresh insights, exchange views with others and have a voice in the debate
Take a look Learn more about our updatesYou are seeing this because you are using a browser that is not supported. The International Institute of Communications website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:
Windows MacPlease note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.