Overview
Explore the unique information security challenges faced by humanitarian organizations in this 23-minute IEEE conference talk. Delve into a qualitative analysis of the International Committee of the Red Cross's computer security needs and practices, examining operational, technical, legal, and managerial perspectives. Gain insights into the trade-offs between operational security and stakeholder requirements, legal barriers for data sharing across jurisdictions, and the importance of complementing privileges and immunities with robust technological safeguards. Learn about the sensitivity of collected data, data flow processes, and lessons learned from existing communication technologies. Understand the organizational structure and practical factors affecting digital immunity in humanitarian action, and discover key takeaways for enhancing security measures in large-scale humanitarian operations.
Syllabus
Intro
Digital immunity
Characteristics of the ICRC
Privileges and Immunities (P&I) 1/2
Methodology
Summary of interviews
Sensitivity of Collected Data
Overview of data flows
Lessons learnt
Problems with existing communication technology
Organizational structure and practical factors
Take home messages
Taught by
IEEE Symposium on Security and Privacy