BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Geneva Dialogue - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Geneva Dialogue
X-ORIGINAL-URL:https://genevadialogue.ch
X-WR-CALDESC:Events for Geneva Dialogue
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Zurich
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20241027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Zurich:20251021T070000
DTEND;TZID=Europe/Zurich:20251021T090000
DTSTAMP:20260425T115154
CREATED:20250910T113340Z
LAST-MODIFIED:20251027T145259Z
UID:2714-1761030000-1761037200@genevadialogue.ch
SUMMARY:Cyber Norms on the Ground: Who Is Responsible for Securing Critical Infrastructure?
DESCRIPTION:When everything is critical\, who protects it? What do cyber norms actually tell us to do? And how\, and by whom? \nDependence on digital infrastructures is continuously increasing\, from energy grids to healthcare systems\, making them an ever more attractive target for malicious cyber operations. As these risks intensify\, the urgency grows to move beyond political declarations toward meaningful\, coordinated action. \nStates have endorsed the UN framework for responsible State behaviour in cyberspace – including norms and CBMs that call for the protection of critical infrastructure. Regional organisations such as the OSCE and ASEAN have agreed to similar CBMs. But who implements these norms and CBMs? Who ensures they are upheld not only by governments\, but also by the operators\, engineers\, developers\, and researchers behind the world’s most essential systems? \nThese questions were discussed at the Geneva Dialogue’s session at the Singapore International Cyber Week (SICW) on 21 October. The session presented the Geneva Manual on Responsible Behaviour in Cyberspace exploring the evolving roles and responsibilities of all stakeholders in implementing cyber norms and confidence-building measures for critical infrastructure protection. \nThrough a multistakeholder interactive conversation\, the session highlighted challenges\, shared emerging good practices\, and examined how diplomatic agreements are being interpreted\, operationalised\, and embedded into real-world decisions. \nThe session was opened by Mr Daniel Klingele\, Senior Advisor\, International Security Division\, Swiss Federal Department of Foreign Affairs (FDFA)\, and Mr Christopher Anthony\, Director\, Critical Information Infrastructure (CII) Division\, Cyber Security Agency of Singapore (CSA). They framed the discussion on critical infrastructure protection and challenges for international cooperation. \n \n \nMs Anastasiya Kazakova\, Cyber Diplomacy Knowledge Fellow and Geneva Dialogue Project Coordinator\, DiploFoundation\, presented the newly launched Chapter 2 of the Geneva Manual (May 2025)\, which conveys seven key messages from non-state stakeholders on the protection of critical infrastructure. The chapter highlights: \n\nThe need to broaden the definition of damage in UN Norm F beyond physical destruction to include service disruptions\, collateral effects\, and other non-physical harms.\nCalls for states to provide clear legal and policy guidance to private entities and CI operators.\nThe importance of harmonised\, risk-based baseline cybersecurity requirements across jurisdictions.\nProtection of responsible vulnerability disclosure and the preservation of trusted cross-border technical collaboration\, even amid rising geopolitical tensions.\n\n \nParticipants then engaged in a scenario exercise on a hospital cyberattack\, later revealed as a supply chain compromise requiring international cooperation. \n \nThe exercise was led by Mr Tan E Guang Eugene\, Research Fellow\, S. Rajaratnam School of International Studies (RSIS)\, Nanyang Technological University\, Singapore\, with contributions from: \n\nMr Teo Xiang Zheng\, Vice President\, Head of Advisory\, Ensign Infosecurity\n\nMs Shariffah Rashidah Syed Othman\, Deputy Director General\, Personal Data Protection Department\, Ministry of Digital\, Malaysia\nMr Christopher Anthony\, Director\, Critical Information Infrastructure (CII) Division\, Cyber Security Agency of Singapore (CSA)\n\n \n \n \nThe session concluded with a fireside chat moderated by Mr Vladimir Radunović\, Director of Cybersecurity & E-diplomacy\, DiploFoundation\, featuring Mr Marc Henauer\, Senior Political and International Affairs Officer\, Swiss National Cyber Security Centre (NCSC)\, and Dr Bushra Al Blooshi\, Director of Governance and Risk Management for Cybersecurity\, Dubai Electronic Security Center. The experts discussed the implications of geopolitical fragmentation: the risks of competing digital ecosystems undermining global cybersecurity\, but also the potential for resilience and innovation in a more diverse digital landscape.
URL:https://genevadialogue.ch/event/cyber-norms-on-the-ground-who-is-responsible-for-securing-critical-infrastructure/
ATTACH;FMTTYPE=image/jpeg:https://genevadialogue.ch/wp-content/uploads/sicw2025.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Zurich:20251125T083000
DTEND;TZID=Europe/Zurich:20251125T171500
DTSTAMP:20260425T115154
CREATED:20251128T141213Z
LAST-MODIFIED:20251128T144023Z
UID:2741-1764059400-1764090900@genevadialogue.ch
SUMMARY:From cooperation to fragmentation: Can technology and cybersecurity governance survive the age of geopolitical tension?
DESCRIPTION:On 25 November\, Imad Aad\, Technical Project Manager at C4DT – EPFL and member of the Geneva Dialogue Core Group\, spoke on the challenges facing international cooperation in cybersecurity amid a rapidly evolving global order and intensifying geopolitical turbulence. The discussion took place during the 30th International Humanitarian & Security Conference\, dedicated to “The New World (Dis)order: Global Governance\, Institutions and Norms in an Age of Uncertainty.” \nToday’s international environment is marked by rising geopolitical tensions\, strategic rivalries\, and growing fragmentation\, all of which erode trust and complicate cooperation across regions. In this context\, cyberspace has become increasingly complex and contested\, with sophisticated threat actors\, accelerated attack cycles\, and emerging risks driven by artificial intelligence—ranging from hyper-realistic phishing to deepfake-enabled fraud. \nAnother significant development is the shift towards framing cybersecurity through the lens of national sovereignty. This trend is driving the emergence of governance models that blend security\, economic\, and strategic imperatives. It is reflected in regulatory practices focused on data governance\, supply-chain resilience\, and technology standards that now extend across physical\, digital\, and economic domains\, reshaping how states and industries interact. \nAs part of his intervention\, Imad highlighted the Geneva Dialogue as a concrete and effective case study of cross-regional\, multistakeholder cooperation during a time of geopolitical volatility. He underscored how the Dialogue brings together governments\, industry leaders\, academia\,civil society\, and technical communities\, including experts from open-source community\, to build shared understanding\, exchange practical experiences\, and develop principled guidance for responsible behaviour in cyberspace. In an era where formal political channels are often strained\, the Geneva Dialogue demonstrates that inclusive\, trust-building platforms can still advance cooperation and create space for constructive engagement across geopolitical divides. \nStephanie Borg Psaila\, Director of Digital Policy\, Diplo also contributed to the panel discussion\, emphasising the vital role of civil society in sustaining and strengthening collaboration among states\, the private sector\, academia\, and other stakeholders despite deepening global uncertainties.
URL:https://genevadialogue.ch/event/from-cooperation-to-fragmentation-can-technology-and-cybersecurity-governance-survive-the-age-of-geopolitical-tension/
LOCATION:Centre International de Conférences Genève\, Switzerland
ATTACH;FMTTYPE=image/jpeg:https://genevadialogue.ch/wp-content/uploads/2025-Nov-25-photo-3.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Zurich:20251127T151500
DTEND;TZID=Europe/Zurich:20251127T151500
DTSTAMP:20260425T115154
CREATED:20251128T143917Z
LAST-MODIFIED:20251215T095845Z
UID:2747-1764256500-1764256500@genevadialogue.ch
SUMMARY:FIRST Good Practice Webinar Series Session 4 - Cyber Diplomacy: Strengthening Collaboration Among National CSIRTs Confirmation
DESCRIPTION:On 27 November\, Anastasiya Kazakova\, Cyber Diplomacy Knowledge Fellow at Diplo and Geneva Dialogue Project Coordinator\, delivered a presentation on recent developments in the UN cyber negotiations and discussed practical avenues for African security teams to strengthen their engagement in cyber diplomacy. The session took place as part of the FIRST Good Practice Webinar Series (Season 4)\, a programme designed to explore how technical cooperation\, information sharing\, and diplomatic engagement can reinforce trust and operational collaboration among national and sectoral CSIRTs. \nThe series was delivered courtesy of the FIRST Africa Regional Liaison initiative\, made possible through the generous support of UK International Development as part of the Africa Cyber Programme. \nThe Webinar Series\, led by Lawrence Muchilwa\, Africa Regional Liaison at FIRST\, aimed to examine how cyber diplomacy is increasingly shaping effective CSIRT-to-CSIRT cooperation\, as well as to identify the diplomatic and operational factors that enable trust\, interoperability\, and coordination among national CSIRTs. In doing so\, the series also works to generate practical recommendations for strengthening regional and international partnerships in cyber incident management. \nIn her intervention\, Anastasiya highlighted the key outcomes of the current UN Open-Ended Working Group negotiations and explained how African security teams can contribute more actively to cyber diplomacy processes. She emphasised the importance of bringing technical expertise into national deliberations on cyber norms\, participating in international dialogue platforms\, and using multistakeholder initiatives to support capacity-building and regional resilience. \nThe webinar also featured presentations from two additional speakers. Ellah Hamwaka\, Incident Response Officer and former representative of Malawi to the UN OEWG on ICT security\, shared insights from her involvement in shaping national positions on cyber stability\, norms\, and cooperation. Emmanuella Darkwah\, Senior Manager for International Cooperation\, drew on her experience participating in the UN OEWG on Developments in ICTs in the Context of International Security\, highlighting the value of CSIRT perspectives in multilateral cybersecurity discussions. Together\, the speakers underscored the growing need for stronger engagement between technical and diplomatic communities and stressed the potential for African CSIRTs to play a more influential role in shaping responsible state behaviour in cyberspace.
URL:https://genevadialogue.ch/event/first-good-practice-webinar-series-session-4/
LOCATION:Online Zoom
ATTACH;FMTTYPE=image/png:https://genevadialogue.ch/wp-content/uploads/cybersecurity-first-partner.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Zurich:20260304T130000
DTEND;TZID=Europe/Zurich:20260304T150000
DTSTAMP:20260425T115154
CREATED:20260317T141205Z
LAST-MODIFIED:20260424T140126Z
UID:2927-1772629200-1772636400@genevadialogue.ch
SUMMARY:Shared code\, shared risk: How are security responsibilities allocated?Security and governance of open source software: Geneva Dialogue Masterclass #1
DESCRIPTION:Cyber stability is increasingly tested by geopolitical fragmentation\, rapid technological change\, and tightly coupled digital supply chains. Open source software sits at the centre of these dynamics: widely embedded in critical digital infrastructure\, globally developed\, and governed through models that were not designed for today’s security\, policy\, and geopolitical pressures. \nIn 2026\, the Geneva Dialogue will focus on stress-testing cybersecurity practices and agreed cyber norms under real-world conditions. Through a scenario-based engagement framework\, the Dialogue brings together policymakers\, private sector actors\, technical communities\, and civil society to examine how responsibilities\, incentives\, and governance arrangements hold up when systems are under strain\, with insights from Costin G. Raiu\, Mika Lauhde\, and Roman Zhukov. \nThis masterclass opens the first thematic cycle of 2026\, dedicated to the security and governance of open source software. Its purpose is to establish a shared analytical baseline: how OSS functions as a systemic dependency; how security responsibilities are distributed across maintainers\, vendors\, users\, and public authorities; and where current governance approaches struggle to manage risk\, accountability\, and resilience at scale. The session is designed to bridge policy and technical perspectives and to frame the key questions that will be explored in depth during the subsequent scenario-based consultation.
URL:https://genevadialogue.ch/event/shared-code-shared-risk-how-are-security-responsibilities-allocated/
LOCATION:Online Zoom
ATTACH;FMTTYPE=image/jpeg:https://genevadialogue.ch/wp-content/uploads/Diplo-NEWS26_Insta_Geneva-Dialogue-MASTERCLASS-1_539x417px.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Zurich:20260504T140000
DTEND;TZID=Europe/Zurich:20260504T160000
DTSTAMP:20260425T115154
CREATED:20260424T131834Z
LAST-MODIFIED:20260424T134917Z
UID:2971-1777903200-1777910400@genevadialogue.ch
SUMMARY:Emerging technologies and cybersecurity: Can governance adapt to speed\, scale\, and uncertainty? Geneva Dialogue Masterclass #2
DESCRIPTION:Cyber stability faces growing pressure from geopolitical fragmentation\, rapid technological change\, and interconnected digital supply chains. Emerging technologies — AI\, advanced automation\, and quantum computing — are accelerating cyber capabilities\, reshaping how vulnerabilities are discovered\, defences are built\, and operations conducted. Some compress decision timelines; others challenge foundational assumptions about encryption and systemic risk. As capabilities evolve\, responsibilities across developers\, deployers\, infrastructure operators\, and states become harder to delineate\, and existing governance frameworks struggle to keep pace. \nIn 2026\, the Geneva Dialogue stress-tests cybersecurity practices and agreed cyber norms under real-world conditions\, bringing together policymakers\, the private sector\, technical communities\, and civil society through a scenario-based engagement framework. \nThis masterclass is part of a series under the 2026 Geneva Dialogue work programme to stress-test cyber norms. It aims to establish a shared analytical baseline: how technological acceleration is reshaping capabilities and redistributing risk — and where existing governance approaches may fall short under conditions of systemic transformation. \nIt follows the first masterclass in the series\, Shared Code\, Shared Risk: How Are Security Responsibilities Allocated?\, which examined security responsibilities in open-source software supply chains.  \nThe session requires registration.\nIts findings will directly inform the third chapter of the Geneva Manual on Responsible Behaviour in Cyberspace.
URL:https://genevadialogue.ch/event/emerging-technologies-and-cybersecurity-can-governance-adapt-to-speed-scale-and-uncertainty-geneva-dialogue-masterclass-2/
LOCATION:Online Zoom
ATTACH;FMTTYPE=image/jpeg:https://genevadialogue.ch/wp-content/uploads/Diplo-NEWS26_Insta_Geneva-Dialogue-MASTERCLASS-2_539x417px.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Zurich:20260508T100000
DTEND;TZID=Europe/Zurich:20260508T123000
DTSTAMP:20260425T115154
CREATED:20260424T133540Z
LAST-MODIFIED:20260424T134900Z
UID:2976-1778234400-1778243400@genevadialogue.ch
SUMMARY:Cyber stability under pressure: A reality check for cyber norms in an era of AI-driven cyber risks
DESCRIPTION:Time: 08:00-10:30 UTC / 10:00–12:30 CEST \nOn-site registration: RSVP to genevadialogue@diplomacy.edu\, and also register for the Geneva Cyber Week\, before 30 April \n2026 Geneva Cyber Week\nCyber stability is under increasing strain — not only from more sophisticated attacks\, but from the rapid integration of artificial intelligence into both the tools used to carry them out and those used to defend against them. The same technology that makes defenders faster also makes attackers faster. The same AI model that helps a security team identify weaknesses in their own systems can help an adversary find them first. \nAt the same time\, several major AI providers  have revised the terms governing how their models may be used\, including in some cases terms that previously restricted military and national security applications. Governments in a number of jurisdictions have actively sought to expand their access to commercial AI capabilities for defence and intelligence purposes. There is evidence that criminal and APT groups — including those allegedly affiliated with states — are increasingly adopting commercial AI tools to automate cyber attacks at greater scale\, while reducing the investment in time and human resources required. Commercial AI security products\, including those being procured by critical infrastructure operators\, are built on underlying models whose permitted uses and governance terms may not be fully visible to the organisations deploying them. \nThis raises fundamental questions: when the same AI tools serve both attack and defence\, what does “responsible use” actually mean in practice? Who sets the boundaries\, and what happens when those boundaries are moved? How do existing cyber norms hold up when the technology they are supposed to govern has changed faster than the norms themselves?This scenario-based session takes place during the Geneva Cyber Week and is open to both onsite and online participants. It brings together experts and decision-makers from across stakeholder groups — including public policymakers\, critical infrastructure operators\, technology providers\, cybersecurity practitioners\, AI governance specialists\, compliance and risk professionals\, and civil society and academic experts. \nThe session will be held under the Chatham House Rule. \nIts findings will directly inform the third chapter of the Geneva Manual on Responsible Behaviour in Cyberspace. To join online\, please RSVP at genevadialogue@diplomacy.edu.
URL:https://genevadialogue.ch/event/cyber-stability-under-pressure-a-reality-check-for-cyber-norms-in-an-era-of-ai-driven-cyber-risks/
LOCATION:Online and Geneva
ATTACH;FMTTYPE=image/jpeg:https://genevadialogue.ch/wp-content/uploads/Diplo-NEWS26_Insta_Geneva-Cyber-Week-2026_539x417px.jpg
END:VEVENT
END:VCALENDAR