Marcos Vinicius Mazoni
President of SERPRO. Main Brazilian IT public agency, delegated by President Roussef to develop state-surveillance-proof email systems for government officials.
John "Maddog" Hall
World renowned free software pioneer and evangelist. Founder of Linux International, board member of the USENIX association.
CHALLENGE A: Is it feasible to provide ordinary citizens access to affordable and user-friendly end-2-end IT services with constitutionally-meaningful (1) levels of user-trustworthiness, as a supplement to their every-day computing devices? If so, how?
CHALLENGE B: Provided that Challenge A can be met, can new voluntary, independent and international IT certifications – within some nations’ current legislative frameworks – provide safeguards that are sufficiently-extreme to reconcile meaningful personal privacy, effective lawful access and prevention of malevolent use? If so, what are the core paradigms?
The current EU Cyber Security Strategy calls for "EU consultations with international partners on cyber issues should be designed, coordinated and implemented to add value to existing bilateral dialogues between the EU's Member States and third countries. The EU will place a renewed emphasis on dialogue with third countries, with a special focus on like-minded partners that share EU values".
How can Brazil and Europe work together towards meaningful and transparent IT assurance by filling each other technological and expertise gaps and gather critical mass for legitimation and wide global adoption of new standards and certification bodies?
10:00 – Opening Arguments
10:10 – Roberto Gallo
10:30 – Rufo Guerreschi (video conference)
10:50 – Senior Technical official of the Cyber Defence Center of the Brazilian Army.
11:10 – Panel 1 – Discussions about Challenge A
11:50 – John Maddog Hall
12:10 – Rogério Winter
12:30 – Alberto J. Azevedo
12:50 – Panel 2 – Discussions about Challenge B
13:30 – Jovan Golic (video conference).
Abstract: In order to foster business in the area of privacy, security, and trust in digital world, we need to understand that there is no conflict between cyber security and cyber privacy and that the tradeoff between cyber privacy and lawful cyber investigation can be achieved by transparent organizational processes and trustworthy technologies, based on cryptography.
13:50 – Marcos Mazoni
14:00 – Closing Arguments
(1) By constitutionally-meaningful, we mean IT services that are resistant to attacks of tens of millions of euros to the life-cycle or supply-chain of a given service class, by actors with very low liability and high access to plausible deniability.