The 16th International Information Security Research Consortium Conference
Timing of meeting: 16-19 April 2018
Venue: Garmisch-Partenkirchen, Munich, Germany
The next IISRC Conference is scheduled to be held in the course of the
Twelfth International Forum "State, Civil Society and Business Partnership
on International Information Security"
Information message №1
Timetable of the meetings
Draft Agenda Garmish 2018
International Information Security Research Consortium (IISRC) established - April 25, 2010
Ceremony of signing the Declaration (Germany, Garmisch-Partenkirchen)
Consortium List of priorities and research projects:
Escalatory Models: Development of shared models of escalation in cyber conflict, including definitions of hostility levels;
Civilian Infrastructures: International legal status of civilian cyber infrastructures in the context of peace or war;
Cyber Definitions: Definitions of information warfare and cyber defense topics;
Cyber Law: International legal frameworks to increase stability of intergovernmental relations and promote orderly international economic processes;
Codes of Conduct: Development of shared norms for behavior in cyber space for individuals, countries and non-state actors;
Cyber Terrorism: International agreements to counter non-state actors seeking to launch cyber attacks on countries or provoke conflicts among countries using cyber means;
Cyber Crime: Legal and technical coordination against cyber crime;
Technical Cooperation: International mutual assistance across public and private spheres to improve cyber situational awareness, enhance protection of critical infrastructures and respond to significant cyber failures or attacks;
Protection of the Commons: Framework to separate technical architectures and operation of cyber space from economic and political issues and provide separate mechanisms on the technical plane or the political economic level for resolving differences or marshalling international cooperation;
Industrial Espionage: International legal framework for industrial espionage whether sponsored by states or whether its fruits are purchased on criminal black markets by states.
Adaptation of International Law to Conflicts in the Information Space;
Information Security of Critical Infrastructure.