Pre 12: Resilience of IoT Ecosystems: Preparing for the Future

12 May 2025 11:00h - 12:15h

Pre 12: Resilience of IoT Ecosystems: Preparing for the Future

Session at a glance

Summary

This discussion focused on the resilience and security challenges of Internet of Things (IoT) ecosystems, co-organized by the Dynamic Coalition for IoT and the Internet Standards Security and Safety Coalition (IS3C). The participants emphasized that IoT devices are becoming integral to society’s fabric, spanning applications from industrial systems to smart city infrastructure, healthcare, and environmental monitoring. However, this widespread adoption brings significant security vulnerabilities, as highlighted by examples like the 2015 Jeep Cherokee hack affecting 1.4 million vehicles and the Mirai botnet attack involving 600,000 devices.


The speakers identified several key challenges distinguishing IoT from traditional IT systems, including the massive attack surface created by billions of connected devices, many shipping with default credentials and weak firmware. The machine-to-machine nature of IoT creates visibility problems, as users rarely interact with or update these devices after installation. The discussion revealed that IoT botnets have evolved from simple disruption tools to sophisticated espionage networks, with recent variants like Rektortrain targeting households, companies, and governments for intelligence gathering.


Emerging threats from artificial intelligence and quantum computing were highlighted as urgent concerns. AI enables both enhanced defense capabilities and more sophisticated attack methods, potentially widening the digital divide between well-resourced and under-served regions. Quantum computing poses an existential threat to current encryption standards, with the “harvest now, decrypt later” risk requiring immediate transition to post-quantum cryptography. The speakers stressed that regulatory frameworks like GDPR and the EU Cyber Resilience Act, while important, face challenges in keeping pace with rapidly evolving technology while maintaining global interoperability and avoiding fragmentation that could disadvantage developing nations.


Keypoints

## Major Discussion Points:


– **Current IoT Security Challenges and Vulnerabilities**: The discussion extensively covered the massive scale of IoT security issues, including 75 billion devices with default credentials, weak firmware, and significant attack surfaces. Examples like the Jeep Cherokee hack, cardiac implant vulnerabilities, and the Mirai botnet demonstrated real-world consequences of poor IoT security.


– **Emerging Technology Threats and Post-Quantum Cryptography**: Speakers emphasized the urgent need to prepare for quantum computing’s impact on current encryption standards, with the “harvest now, decrypt later” threat being particularly concerning. The discussion highlighted how AI both enables better defense capabilities and provides new tools for attackers.


– **Global Governance and Regulatory Fragmentation**: A key theme was the challenge of coordinating IoT security across different jurisdictions, with various frameworks (EU Cyber Resilience Act, NIST guidelines, GDPR) operating in parallel. The need for global cooperation while respecting local values and requirements was emphasized.


– **Digital Divide and Global South Vulnerabilities**: The conversation addressed how under-resourced regions face greater cybersecurity risks due to limited access to AI-enhanced defense capabilities, creating an urgent need for targeted cyber capacity building in developing countries.


– **Lifecycle Management and User Awareness**: Discussion focused on the unique challenges of IoT devices compared to traditional IT systems, including the difficulty of maintaining security updates over device lifespans, user inattention to security after purchase, and the complexity of managing numerous interconnected devices.


## Overall Purpose:


The discussion aimed to examine the current state and future challenges of IoT security and governance, bringing together technical experts and policymakers to identify best practices for ensuring resilient IoT ecosystems. The session was designed to bridge the gap between technical security requirements and policy frameworks while addressing global deployment challenges.


## Overall Tone:


The discussion maintained a serious, urgent tone throughout, with speakers consistently emphasizing the critical nature of IoT security challenges. While technical and policy-focused, the conversation was accessible and collaborative, with participants building on each other’s points. The tone became particularly emphatic when discussing emerging threats like quantum computing and AI-enhanced attacks, reflecting genuine concern about preparedness for future challenges. Despite the gravity of the issues discussed, the overall atmosphere remained constructive and solution-oriented.


Speakers

**Speakers from the provided list:**


– **Maartin Botterman** – Session moderator, co-organizer from Dynamic Coalition for IoT


– **Wout de Natris-van der Borght** – Coordinator of the Internet Standards Security and Safety Coalition (IS3C)


– **Matthias Hudobnik** – Lawyer and engineer focusing on AI and data protection, member of ICANN Security and Stability Advisory Committee (speaking in personal capacity)


– **Chris Buckridge** – Technical expert, MAG member with the Internet Governance Forum, works with the Global Forum on Cyber Expertise


– **Joao Moreno Rodrigues Falcao** – Speaking on behalf of IS3C, presenting research done in collaboration with AFNIC (French registry)


– **Jonathan Cave** – Expert on labeling and certification schemes, privacy and governance issues


– **Audience** – Multiple audience members who asked questions during the session


**Additional speakers:**


– **Frederic Taas** – Cyber security advisor (speaking in personal capacity)


– **Alexander Savchuk** – Institute of International Relations Ukraine


– **Marijana Puljak** – Member of the Croatian Parliament, 25 years experience in IT


– **Mark Revelle** – Senior policy advisor for IS3C (mentioned but did not speak)


Full session report

# Comprehensive Report: IoT Resilience and Security Challenges Discussion


## Executive Summary


This discussion on Internet of Things (IoT) resilience and security challenges brought together technical experts, policymakers, and practitioners to examine current vulnerabilities and future threats facing IoT ecosystems. Co-organised by the Dynamic Coalition for IoT and the Internet Standards Security and Safety Coalition (IS3C), the session was structured around three key blocks: current priorities, future challenges, and global standards and certification approaches.


The discussion highlighted the critical security challenges posed by the widespread deployment of IoT devices across industrial systems, smart cities, healthcare, environmental monitoring, and traffic management systems. With IoT devices becoming increasingly embedded in society’s infrastructure, speakers examined vulnerabilities ranging from basic technical flaws to emerging threats from quantum computing and artificial intelligence integration. The conversation also addressed global governance fragmentation and the disproportionate impact of security challenges on under-resourced regions.


## Session Context and Structure


Maartin Botterman opened the session by establishing the foundational premise that IoT devices span applications from industrial systems to domotics, environmental monitoring, and traffic management systems, connecting these developments to broader Sustainable Development Goals. The discussion was structured around three blocks: examining current priorities in IoT security, exploring future challenges including emerging technologies, and addressing global standards and certification approaches.


Wout de Natris-van der Borght provided context on IS3C’s five-year history of research on education, skills, and procurement in internet security, noting their collaborative work with the Dynamic Coalition for IoT on resilience issues. The session took place in the context of preparations for the European Internet Governance Forum 2025.


## Current IoT Security Landscape and Vulnerabilities


### Scale and Deployment Challenges


Joao Moreno Rodrigues Falcao presented concerning statistics about the current IoT landscape, noting that 75 billion IoT devices currently exist globally, with many shipping with default credentials and weak firmware. He provided historical context with examples such as the 2015 Jeep Cherokee hack affecting 1.4 million vehicles and the Mirai botnet attack involving 600,000 devices.


The discussion revealed that IoT botnets have evolved significantly, with Falcao noting: “We have more than 30 variants of Mirai nowadays, and the recent ones like Rektortrain are not only for disruption but also for espionage, targeting households, companies, and governments for intelligence gathering.”


### Distinguishing IoT from Traditional Systems


A key theme emerged around understanding what makes IoT security challenges unique. Frederic Taas posed the question: “What is really specific to IoT compared to OT and IT because lifecycle management, etc, governance, those are all common cyber security things. What is really specific to IoT?”


Chris Buckridge identified several distinguishing factors: IoT differs from traditional IT through machine-to-machine communication, massive scale of deployment, and significantly reduced user visibility and control. He emphasized that the machine-to-machine nature creates visibility problems, as users rarely interact with or update these devices after installation.


Matthias Hudobnik provided technical distinctions, explaining that operational technology (OT) systems are typically air-gapped with hard real-time requirements, whilst IoT is IP-based and cloud-connected. He noted that attack vectors differ between OT (physical risks, factory shutdowns) and IoT (data theft, privacy loss, botnet exploitation).


### Real-World Attack Vectors


The discussion included compelling real-world examples illustrating IoT vulnerabilities. Falcao shared an incident where attackers gained access to a company’s systems through poorly secured air conditioning equipment, noting: “We invaded the system by its air conditioning equipments because they were very poorly secured and actually they were strong and we had computational power to use it as a bridge to target attacks inside the company and well no one cares about the air conditioning so this is the risk.”


Alexander Savchuk provided a current example from Ukraine: “At the beginning of the full-scale invasion of Russian Federation in Ukraine, in Ukraine there are a lot of Chinese production video cameras set for public security in different places, and the Russian Federation used vulnerabilities in these cameras… these cameras could be a weapon in the war.”


## Future Technology Threats


### Quantum Computing Challenges


Quantum computing emerged as a significant concern for IoT security. Falcao emphasized that quantum computing will break current RSA and elliptic curve cryptography, requiring urgent transition to post-quantum cryptography. The “harvest now, decrypt later” threat was identified as particularly concerning, where encrypted IoT data collected today could be decrypted once quantum computing becomes sufficiently powerful.


Matthias Hudobnik noted that post-quantum cryptography standards from NIST and IETF are being developed, but stressed that harvest now, decrypt later attacks are already a real risk requiring immediate action on cryptographic transitions.


### Artificial Intelligence Integration


The integration of AI into IoT systems was discussed as creating both enhanced capabilities and new vulnerabilities. Hudobnik explained that AI enables enhanced IoT capabilities but also creates new attack vectors, requiring careful governance frameworks that include human oversight, explainability, and compliance with regulations like the EU AI Act and GDPR.


Chris Buckridge highlighted concerns about AI-enhanced attacks and their ability to process vast amounts of IoT data in new ways. He noted that AI-enhanced attacks can be particularly threatening to under-resourced regions that lack defensive AI capabilities.


## Infrastructure Dependencies and DNS Security


Matthias Hudobnik emphasized the critical importance of underlying internet infrastructure for IoT security, particularly DNS security. He detailed specific security measures: “We have DNSSEC for DNS security, we have RPKI for routing security, and we have DANE for TLS certificate validation. These are essential foundations for IoT security.”


The discussion highlighted how IoT security fundamentally depends on the security of underlying internet infrastructure, with DNS security serving as a critical foundation for all connected devices.


## Global Governance and Digital Divide


### Regulatory Fragmentation


Falcao identified challenges with multiple regulatory frameworks existing without global convergence, including the EU Cyber Resilience Act, NIST IoT guidance, and various labelling systems. This fragmentation creates particular challenges for manufacturers and users operating across multiple jurisdictions.


Regarding regulatory updates, Falcao noted that frequent changes could be problematic due to industry development cycles: “I don’t think we need to change GDPR because the regulation cannot change as fast as the technology.”


### Digital Divide Concerns


Chris Buckridge articulated concerns about disproportionate impacts on under-resourced regions: “If we see users of networks in the Global South or in under-resourced areas, under-served areas that don’t have access to the defence capabilities that AI provides, then their vulnerability to AI-enhanced attacks is so much greater.”


Jonathan Cave provided insights into how global power dynamics influence IoT security priorities: “Countries which see themselves primarily as creating the technologies or as providing the services will balance the competing interests in different ways than countries that primarily use the services.”


## Lifecycle Management and User Behavior


### Long-term Security Challenges


Hudobnik emphasized that IoT devices often lack secure update mechanisms throughout their lifecycle, leaving them vulnerable for years. He stressed that software bills of materials and over-the-air update mechanisms are essential for secure IoT deployment.


Jonathan Cave provided crucial insights into user behavior patterns, noting that user attention to IoT security decreases significantly after purchase, unlike the conscious decision-making that occurs at the point of sale. This observation revealed a fundamental challenge in current approaches to IoT security.


### Supply Chain Vulnerabilities


Falcao highlighted that supply chain attacks affect millions of devices through compromised SDKs and cloud dependencies. The discussion revealed the evolution of IoT botnets from simple disruption tools to sophisticated espionage networks.


## Certification and Trust Mechanisms


Jonathan Cave analyzed existing certification and labelling schemes, noting that whilst these work by enabling rational consumer choice, they face limitations as systems evolve. He observed that different countries implement different approaches reflecting their position in the technology ecosystem.


The discussion revealed that labelling and certification schemes face fundamental limitations in the IoT context due to the dynamic nature of connected systems and decreased user attention to security after purchase.


## Cultural and Values Considerations


Cave raised important points about values being embedded in technologies and the risk of cultural imposition: “The values that are embedded in the technologies, the values that are embedded in the standards, the values that are embedded in the governance frameworks, all of these things can be imposed on people who don’t share those values.”


This observation highlighted how IoT security solutions must account for cultural differences and avoid imposing particular value systems on diverse global users.


## Procurement and Systemic Issues


Wout de Natris-van der Borght highlighted critical gaps in procurement practices, noting that current approaches often fail to require secure-by-design IoT devices, creating systemic vulnerabilities from the point of acquisition. He used an analogy about buying a car to illustrate the disconnect between safety expectations in physical products versus digital systems.


## Key Challenges and Future Directions


The discussion identified several unresolved challenges requiring ongoing attention:


– Achieving global coordination of fragmented IoT security regulatory frameworks while respecting regional differences


– Managing the quantum computing threat to existing encrypted IoT data


– Addressing the fundamental tension between innovation speed and security regulation timing


– Ensuring continuous user engagement with IoT security throughout device lifecycles


– Balancing local customization needs with global standardization requirements


## Conclusion


This comprehensive discussion successfully examined IoT security challenges from multiple perspectives, integrating technical, policy, and social considerations. The conversation revealed broad understanding of fundamental challenges while highlighting the complexity of implementing effective solutions across diverse global contexts.


The session demonstrated the value of collaborative approaches between technical experts and policymakers, with speakers showing alignment on core challenges while acknowledging the complexity of implementation across different technological, cultural, and economic contexts. The discussion’s integration of current vulnerabilities with emerging threats provided a framework for understanding IoT security as a complex socio-technical challenge requiring coordinated responses that account for human behavior, global power dynamics, and the emergent properties of interconnected systems.


Session transcript

Maartin Botterman: which is co-organized by the Dynamic Coalition for IoT and the Dynamic Coalition Internet Standards Security and Safety Coalition, the IS3C, which Wout is coordinating. The focus is really on resilience of IoT ecosystems and preparing for the future. It’s important to understand that IoT is not one thing and this in many different applications ranging from industrial applications to domotics, ranging from natural environment monitoring systems to tracking devices to managing, for instance, dynamic management, dynamic traffic management systems, the whole city infrastructures, how traffic flows are going. These have been around for a while, but they’re increasingly around, so they come to be part of the fabric not only in the world that started adopting those technologies early, but also in other places all around the world. In that, it becomes more and more critical. So IoT devices enable systems that help address specific societal issues. If you think of the sustainable development goals, we can see that IoT has an influence on many of them and plays an important role whether it is on zero hunger, eradicating hunger. We can see that IoT systems such as drones and irrigation systems and analysis will help to increase the return on crops to clean water where the monitoring is clear and systems can be deployed to act when necessary to the city systems we talked about before. Climate action is clearly something where IoT and the whole network of IoT devices plays an important role in ensuring that you actually know what’s going on and can take immediate action or learn from it for the future. So that requires sharing global knowledge about solutions and local action to make things happen, which means that it also cannot all be developed in one part of the world and then deployed everywhere else. The deployment requires the local presence and awareness as well. As well as for the development, it’s important to understand that not every society is structured as the society where the system is built. So hence, very good to do this on a global level here in IGF as a platform. How does this, these technologies, these systems that are built all over the world, that are made to be used all over the world, can be used everywhere in a responsible way? So the key messages that we’ve seen develop over time, and that’s where our two coalitions come together as well, is that new technologies bring us ways to response to these challenges that never existed before and also come with new challenges. So who has access to those technologies, the digital divide, who can afford it, how can we make sure it’s usable where it’s needed? And on the other hand, carbon footprint. If we do these new technologies, they can help reduce the carbon footprint, but they come also with their own. So how can we minimize that? The recognition that technologies are not good or bad in themselves, it’s not only for IoT, but broadly, but it’s how we use them. And a transparency of how these systems work. Are you observed by a camera? Where are the data going from that camera? And do you have… user agency, the ability to influence these systems, for instance, your iPhone, tracking of location devices. You can turn it off, but then you need to think of that. And last but not least, the more we depend on it, the more secure it needs to be today, today, but also towards the future. And this is where we’re going to go deeper in with the panel. From the DC IoT perspective, we’ve been working on developing an insight of what is global practice, how does it look like? And where we are today is that the Internet of Things good practice aims at developing IoT systems, products and services that take ethical considerations into account from the outset, both in the development, deployment and use phases. So also when you get rid of them. And to find an ethical, sustainable way ahead using IoT that helps to create a free, secure and enabling rights-based environment, the future we want, a future that serves the people. All the discussions had these elements in common. And while technology progresses and the intensity of use of IoT systems and services increases, this still stands. Now, the focus of IS3C, maybe you can allude to that, Wout.


Wout de Natris-van der Borght: Yes, thank you, Maartin. My name is Wout de Natris-van der Borght and I’m the coordinator of the Internet Standards Security and Safety Coalition. Mark Revelle, sitting over there, is our senior policy advisor. I’d like to start with a very short analogy. You’re going to buy a car and the salesman is at the top of a mountain. You get in by the car, you drive away and all of a sudden in your back mirror, while you’re driving comfortably down, faster and faster. advocate the deployment of existing security related internet standards and after five years I can still say that the interest in the topic, just look into this room, is scantily low because we should be having this when you never buy a car or a plane or a train without these sort of measures in place that we don’t have on the internet. So that is where we start. Our presentation today will focus on the input and that’s going to be given by Joao from Brazil online, will focus on the opportunity we have today to do things right in quantum computing because how that is going to affect our security is going to be beyond measure and we have been commissioned to do research into the societal implications of quantum computing if it’s not secure when it comes on the market but also when the existing tools that we have will not be secure before that date. So that is where IS3C comes from we have done several researches on education skills, we have done some tooling that is on the market with the most important internet standards that is out there, the arguments that technicians use to convince their bosses to deploy, not only to deploy but to procure secure by design. done a report on procurement. Do governments procure IOT or ICT secure by design? And the answer mostly is no. So in other words, you don’t we don’t even buy secure by design. So let me stop there with my three minutes. I think that that is what it says there, what I see is trying to achieve. And my presentation will have made that a little bit more clear on the practical side. So I’ll hand back to you, Maartin. Thank you very much. And look forward to the rest of the session.


Maartin Botterman: Thank you for explaining what drives IS3C. And as you can see, it’s very complimentary. So with that, I’m very happy that we together have gathered a number of very insightful speakers to kick off a discussion. But the invitation is very much to you online and in the room to come in with your questions, your suggestions, your remarks. And we’ll do so in basically three blocks. We’ll first ask Joao and Matthias to introduce the current priorities. So how does good practice look like today? How do we ensure security stability of IOT systems in which we see that the impact is growing? So that will be the first block of discussion. Second block, then we’ll go deeper. It’s like, so we know where we are today. If you look to the future, we’ll see more quantum computing eventually. We’ll see more AI, we’ll see more deployment of IOT devices. What does that mean? Chris Buckridge has been working on that. And we will introduce that. And again, as Wout already said, IS3C is also working particularly on quantum computing and the impact there. And last but not least, so how do we make sure that this all comes together? And how do we make sure that technologies that are developed everywhere can be used everywhere in a good way. And Jonathan Cave will go into how we can do this with standards going global, how do we use appropriate labels and certifications, and how do we make sure that the different frameworks that emerge come together. So with this little task, we have about an hour to go, and we’ll try to divide it in about three blocks of 20 minutes. Matthias, if you can kick off on the current priorities, then I’ll ask after this Joao to kick off on the emerging priorities, Joao to respond on Matthias, and Chris to respond on Joao, and then we’ll take it from there. Yeah. So, Matthias, please, ensuring security stability of IoT systems. How do we do that? Where are we today?


Matthias Hudobnik: Thanks, Maartin. Hello, everyone. Yeah, it’s a pleasure to be here at the European Internet Governance Forum 2025. Yeah, my name is Matthias Hudobnik and I am excited to contribute to this panel. I speak today in my personal capacity as a lawyer and engineer, focusing on AI and data protection, and also as a member of ICANN Security and Stability Advisory Committee. I’m not necessarily reflecting the opinions and advices of the ICANN Security and Stability Advisory Committee. And for information, the ESSAC advises the ICANN community and the ICANN Board on matters relating to the security and integrity of the naming and address allocation systems of the Internet. As IoT devices connect our hospitals, infrastructures, and homes, Their security depends on the strong foundations of the internet itself. And this includes core principles like decentralization, redundancy, end-to-end design, and especially a secure domain name system. And my short intervention will focus on four points. Firstly, internet security principles and the domain name system. Secondly, IoT security and lifecycle management. Thirdly, AI governance in IoT. And then fourthly, a short future outlook and potential threats. So firstly, internet security principles and the domain name system. The internet’s resilience is built on layers, as we know. And its core lies in the domain name system, DNS. The system that converts domain names to IP addresses and also protecting the DNS is critical because if it fails, IoT services from, let’s say, smart lights to critical medical devices fail as well. And this is reinforced through domain name system security extensions, DNSSEC, which provides integrity by digital signing DNS data and also by adding cryptographical signatures to ensure data authenticity. The second point is resource public key infrastructure, RPKI, which verifies which autonomous systems can announce specific IP prefixes and thereby also preventing border gate protocol BGP hijacking. And the third point I want to mention in this first slot is DNS-based authentication for named entities, which is enhancing transport layer security authentication, TLS, security by binding certificates to domain names for enhancing, again, authentication. And these measures illustrate how these Chris Buckridge, Joao Moreno Rodrigues Falcao, Matthias Hudobnik, Elif Kiesow, Jonathan Cave secure boot hardware routes of trust and also requiring for example software bills of materials. And at the network level we should have encryption and strict network segmentation which are crucial and at the data layer we should have robust encryption, minimal data collection and privacy safeguards are essential. Again lifecycle management is key. Consider smart energy meters that for example once deployed seldom receive firmware updates which leaves them vulnerable for years or implementing secure lifecycle practices such as I mentioned before software bills of materials and also over-the-air update mechanisms are indispensable. Then thirdly AI governance in IoT. Here as you already have heard AI is both an enabler and a risk in IoT. It optimizes operations in areas like traffic control and energy management but yet issues also are here such as for example data poisoning, model drift and opacity can undermine systems trust and here also a regulatory framework such as the EOI Act and data protection laws like the GDPR require that the AI systems are ethical, trustworthy, auditable, transparent but also reliable, secure and accountable. And effective governance means building in human oversight and robust explainability at every stage. Then I’m coming to my fourth point, future outlook and potential threats. Here looking ahead, major challenges loom in relation to quantum computing. We know that current encryption protocols risk obsolete when quantum computers become available. Harvest now, decrypt later is a real risk. So starting the shift to post-quantum cryptography today is critical, already underway as per NIST’s standardization efforts. Another point are supply chain and certification gaps. So many IoT devices lack secure updates or update mechanisms through the lifecycle. There is a regulatory fragmentation with initiatives like for example the EU Cyber Resilience Act and the NIST’s IoT standards. But there are no global mutual recognition frameworks similar to those in the DNS governance which must be promoted. And my last point is then capacity and awareness gaps. So beyond technology there is a human element. Cyber security education and capacity building are essential. To conclude, resilience in IoT isn’t built solely by adding features. It is engineered from the ground up, starting with the secure domain name system, enforcing lifecycle aware security and ensuring that if so AI driven decisions are transparent and auditable. And by aligning our system with core internet principles and international regulatory frameworks, we create a robust, adaptive and also trustworthy digital future. I will stop here to stick to my time and I’m looking forward to the discussion. Thank you.


Maartin Botterman: Thank you for that, Matthias. Very insightful and also a bit beyond what’s here today with a look through to tomorrow. So in a way that makes sense and changing things on the spot, I would say Joao, please come in and go from your earlier research on this towards your insights, just go over. At any point in time, I open the floor for questions, remarks and after Joao, we’ll just move to Chris and we’ll change the flow but we’ll keep the same subject. Is that okay for you? Good. So with that, Joao, as you were back to back on this, I think you will be able to deal with this too. So Matthias, thanks and please again raise your one question in the room, two questions in the room. Let’s take those first.


Audience: Yeah, the back. Is it working? Yeah. Yes, thank you. Frederic Taas speaking. I have different functions. I speak here on my own but I’m notably a cyber security advisor and my question is about what is specific to IoT compared to OT and IT because lifecycle management, etc, governance, those are all common cyber security things. What is really specific to IoT? Thank you.


Maartin Botterman: Thank you. Let’s keep that question and we’ll make sure it gets answered either through the presentations or later on in further discussion. Very good question. Please, sir.


Audience: Thank you so much. My name is Alexander Savchuk, Institute of International Relations Ukraine and I would like to ask you in 2018 GDPR, General Data Protection Regulation, make a revolution in European Union and its direct application act for the all European European Union countries. It’s the most, as for me, powerful act, not only in Europe but also all over the world, according to the amount of population that I apply and the scope. The GDPR has also extraterritorial application, but the time is going on, and we have now the Artificial Intelligence Act, we have now the development of Internet of Things, and how is in your mind, should GDPR be developed, maybe make some amendments, changes, according to the development of the informational technologies?


Maartin Botterman: Thank you very much for that question. Indeed, guidance for that is not explicitly given yet, and it’s under development, but I’m sure we’ll come back to this discussion as well between Joao and also later on, Jonathan has a clear view on that. So how does that further develop? So I’ve got two questions from the room. One is, what is different with IoT than with IT? And the other one is, so how would data privacy develop with the upcoming of new technologies, basically, more IoT devices? And I think the combination in AI transforms also the way IoT devices deal with that. So with that, Joao, the floor is yours.


Joao Moreno Rodrigues Falcao: Okay, thank you. So should I answer these questions now, or can I go with the results of the research? What you feel is most appropriate, but I know that between us, we’ll go a long way on this. Okay. Good, then. So, well, I’m speaking here on behalf of I3C and I’m here to present the work we’ve been doing for this year in collaboration with AFNIC, the French registry. So, well, IoT, we have around 75 billion devices and many of them ship with default credentials and weak formers. So, we have a huge challenge to overcome. And what we see is that attacks already disrupt healthcare, transport, and DNS, as Matthias also noted. And, well, we have quantum computing that will soon break RSA and elliptic curve cryptography. So, we need to execute an urgent crypto overhaul. And, well, the first part of our research is focused on the current challenge that we have on IoT. So, we did a literature reveal, we evaluated policy frameworks from the past few years, and we assessed the readiness for quantum cryptography, for post-quantum cryptography. And, well, so what is the threat landscape snapshot that we have? Well, we are talking about resource-constrained devices and using fragmented protocols. We have, for several IoT systems, a cloud dependence. So, even though the device is in your home, you need to communicate with a cloud service to send a message to your device. And also, we have low user awareness and a patch inertia that widens the attack surface for these devices. So, to understand better this picture, we did a case study focusing on the Jeep Cherokee hack that, in 2015, forced a recall of 1.4 million vehicles. And we had also the St. Jude cardiac implants, so the base keepers for heart had a very serious flaw that could discharge the device. And well, FDA made a recall for half a million devices because of this. And also, we have the notorious Mirai botnet that recorded a huge attack against Zyn, the DNS service, and involved 600,000 devices. So we see a clear picture of the difficulties that we have. And when we talked about Mirai botnet, we saw that we had a botnet evolution in the past 10 years focusing on IoT devices. So we had the Mirai botnet, the source code leaked in a forum, and we saw more than 30 active variants targeting different brands, different sets of devices. And this is, well, this is frightening because we know that we have now a couple of devices in our homes. The city relies a lot on these devices to function. It’s really the texture of… our society. These devices working correctly. And I also brought a specific brand of botnets called Rektortrain that was discovered in 2024 and it’s linked to active spionage. So we saw in the past they using the devices to cause disruptions in the internet because it’s like the most simple way to use a huge number of devices for malicious activities. And then they started, wait, we have access to thousands of households and companies and countries, governments. Why we don’t use this as an initial step to do higher damage to these groups. And we are starting to see this now. So the Department of Justice from the U.S. cleaned 200,000 devices that were infected with Rektortrain. And when we focus on the devices itself, we lack also the supply chain and cloud risks of these devices. Because, well, as I said, we have a single point of failure when we have thousands of devices badly configured, connecting to a badly configured cloud system. So we had the Vercado Bridge, which infected 100,000 cameras across hospitals, schools, households. We also had a SDK, which means a a library used for several brands also infected with Rektortrain. very serious vulnerability, which made 100 million cameras exposed. So, we see a challenging scale issue. So, they are with millions of users and usually all of them need to actively connect to the device and protect them and configure them to fix a vulnerability related to these devices. And this is very serious because when we talked about security of computers, we had a single computer to take care of. And we also connected to them, well, we also connect to them daily. And when we speak about IoT, when did you connect it to your washing machine to guarantee that it has its firmware patched or configured correctly? We don’t do. And this creates loads of vulnerabilities that could be used for these kinds of hacks. And also, now, when we go to a bigger picture and think about the policy implications of it, we have a being enriched policy landscape. We have ISO, ISC, and also ETSI creating baselines for security of IoT devices, the EU Cyber Resilience Act, the US NIST IoT guidance. We have APAC labeling system as a Singaporean one, the Korean. We have the UK PQC roadmap for 2035. All this work focusing on trying to protect these devices, but we have a global reach. So it would be very important to converge this effort into a common work. And well, what are the social implications of these vulnerabilities that I’m speaking of? Well, it erodes public trust and disrupts essential systems that we have around us. Well, we have privacy breaches via cameras, via wearables. This creates a huge surveillance risk that is starting to be exploited in the world. And also, when we talk about the need for innovative solutions, we also need to think about the digital divide, because we have a huge set of devices, some vulnerable, some not, and how we can guarantee that we could protect the whole ecosystem. And well, I think that’s it for my first contribution.


Maartin Botterman: Thank you very much, Joao, and the passion sparks off the screen. Really appreciate it. I think we’ll get into the questions that have been asked now. Chris, if you want to go into it from the perspective of the governance, you may be able to allude and push a little bit bigger context. As soon as I kill my microphone, yours will work.


Chris Buckridge: I’m a technical expert. No, thank you, Maartin Botterman, and thank you, Joao. and Matthias for the input so far. I’m speaking really today just on my own behalf, I’ve got a few relevant hats in this, one of which is certainly as a MAG member with the Internet Governance Forum and I think these kind of issues and particularly the governance aspects of it are coming through very strongly in the global internet governance discussion and I think Val’s point, I actually don’t think there is a lack of interest in this topic, I think there is perhaps some problematic fragmentation in the discussion around this topic, so when we look at cyber security and the concerns around that, we see very active governance discussions in the UN, it’s something like the Open Ended Working Group, we see very active private sector discussions, I just have to look at my LinkedIn feed to see how much is coming through on that. I don’t know that it necessarily makes its way into these internet governance discussions, particularly the sort of multi-stakeholder description and that’s a problem and I think something that we need to work on. The other hat that is relevant here today I think is the work I’m doing with the Global Forum on Cyber Expertise and so this is a body that was launched actually ten years ago, I think in the coming days they have a ten year anniversary, with the goal of strengthening cyber capacity building around the world but particularly with some focus on the global south and part of the work I’ve been doing with them has been to foster some new discussions on emerging technologies and what they mean for cyber security, what they mean for cyber capacity building needs and opportunities. Obviously, with that definition of emerging technologies is a very broad one, AI very much at the forefront there, quantum similarly something that is, there is a lot of concern about although obviously it’s at a different phase in its adoption and impact than AI. But then also looking more broadly at things like LEO satellite networks and what they mean for security at blockchain applications and what they mean for security. So it’s quite a broad field. I think when we look at IoT, for one thing I think that’s often an area that’s a bit overlooked in the AI discussions and I think that’s certainly problematic as well. To the question about how IoT is different from IT generally, I think Joao probably had a couple of good responses to that. I think the sheer attack surface that’s available, some of the manufacturing processes that lead to those devices, distinct on a spectrum rather than categorically distinct, but I think that’s a really, it is important because it leads to the visibility overall of the IoT. Too often these devices and these applications are not visible to the user, not visible to many people at various stages of the value chain. And the scale, the scale currently but also the scale potentially of these networks, these devices, the reach that they have into our everyday actions is different. It’s new and it creates new levels of vulnerability and of criticality, I think, for these networks and these applications. So when we look at what AI means for that, there’s been a lot of work that has started to be done on AI and Cybersecurity. UNIDEA, which is the UN’s Institute for Disarmament Research, has done a really useful starting study on the AI-ICT security nexus. They look at both what AI can offer in terms of defence against attacks, but also what AI offers attackers, essentially. The new tools that it offers, the new malware, the new skills and understanding, and the abilities that they have to process the huge amounts of data that come from something like an IoT network in new ways and to new degrees. They talk about this in concept of outside the perimeter, so looking at really the development of new malware processes on the perimeter, so actually breaching the networks, and then once inside the perimeter, and how the attacks can look different when they’re AI-enabled in that sense. That study itself actually doesn’t mention IoT, which I was just going back and checking that in my copy of it, but I think IoT is really the use case that it is aimed at because that’s where the real vulnerability is going to be going forward. I think the other point that I would want to make, and this actually links both to the GFCE work and the focus on the Global South, and also to IGF and its very global and inclusive mission, is the potential for this in relation to digital divides. Because what we see in the UNIDIR work that comes through is that, yes, AI It provides the potential for attackers, but it also provides the potential for defence. But that potential for defence is something that requires resources, it requires expertise, it requires investment. So if we see users of networks in the Global South or in under-resourced areas, under-served areas that don’t have access to the defence capabilities that AI provides, then their vulnerability to AI-enhanced attacks is so much greater. So we really do see the potential, and the potential which is right now growing and evolving for even greater vulnerability in Global South, under-served areas, to cyber attacks. And so that need for cyber capacity building, particularly cyber capacity building with a focus on Global South, is more urgent and required than ever. And I think that’s a really important issue to consider as we talk about IoT networks, IoT applications, and security in relation to them. I’ll stop there.


Maartin Botterman: Thank you very much for that, Chris. I think that helps. The IoT and IT is clearly different in that way that IoT is machine to machine or machine to people. And if you see how AI will influence that, is that the whole area where IoT will make a difference will become bigger, and it will become more integrative. So in a way, IoT is also IT, but it’s specifically those things that are activators and sensors that make the big difference, the hands and feet. We haven’t gone very deep into the privacy issue, but I know that… Our next speaker knows a bit about that too. And Jonathan, knowing that your focus would be on labeling and certification schemes in that privacy plays a role too, right? Floor is yours.


Jonathan Cave: Thank you. Thank you, Maartin. Yes, privacy. To me, privacy is an indicator of a set of concerns that got, let’s say, fetishized in terms of privacy, where some of the boundaries, like the boundary between data privacy and personal privacy or autonomy of action, got obscured. And it was an inevitable consequence with the way the law had to be written, because laws could only talk about certain things, not necessarily about whether people feel free to act, for example, or free in a way that allows them usefully to be held responsible for the actions that they undertake. And so what I was going to say about this is perhaps slightly oblique, but we’ll come back to these things. When I think about the IoT, with and without things like AI and quantum added on top of it, what occurs to me is that in the global context, different countries, different actors, different spheres of influence, business, civil society, and formal government, respond to emerging problems in different ways. And they put in place institutions like laws or like labeling schemes or certification schemes, each of which is an attempt to address these problems. And each of which tells us something about the problems. But they do so in different ways. The law acts, as it were, by sending a signal to people that these are things that you should and shouldn’t do. But whether the law is effectively implementable or whether it changes people’s behavior is another question. And in the global context where jurisdictions are not universal, that’s by no means obvious. Things like labeling and certification should work. by harnessing the autonomous rational choice of individuals. In other words, the reason for certifying something is so that I can trust it and allow it to come into my system. But that certification is only relative to the system at one moment in time, with a particular generation of devices, and particular assumptions about how people use the elements inside the system. So once those things change, the certificate no longer does what it used to do, but it is something that allows something to come inside the system. With things like labels, it’s even stronger, because the label works on, or is predicated on, the idea that people care about those labels, and that therefore they will buy the things that have labels that reflect their own preferences, and that therefore those preferences will become incentives for innovators, for system providers, and so on. So, in that sense, the mechanisms that people use are, let’s say, different in the way in which they operate. The second point I wanted to make was that since we have these differences of perspective, I’m considering mostly the global perspective. Things like GDPR, for example, reflect a certain set of values and understandings which the EU was eager to advance on the world stage in the hopes that they would become more broadly adopted. That was one of the hopes. Another one was so that they could be protected at home in what is a global ecosystem. So, in other words, we need to protect our citizens so that the rights that they’ve come to rely on are guaranteed, but hopefully also that these will then recommend them to other people. And things like ethical interoperability will become strengthened. But when we have these differences of perspective, they also reflect different positions in that ecosystem. that countries think they have. Countries which see themselves primarily as creating the technologies or as providing the services will balance the competing interests in different ways than countries that primarily use the services. And which is why I was particularly interested to hear about what happens in the Global South. Because the needs of the Global South and the way the Global South adopts these devices, and even the drivers of that adoption, which might have to do with things like, are they cheap? Are they reliable? Can they operate when the power fails or when the network fails? And things like that may be very different. And we’ve seen with a lot of other devices, well, like Raspberry Pi or mobile phones, you know, just feature phones, that they’re used in fundamentally different ways. But the technologies are global and the functions are global. So that there are conflicts between countries, between layers of the value chain, and in that sense, the globalization adds something unique that merely transitioning to the IoT doesn’t. So the other two things I wanted to say before addressing my final point is that from the ethical perspective, values, the thing that defines good and bad, are embedded in the technologies. Technologies are not good and bad, but we said before that they’re good or bad depending on how they’re used, but that applies to their design and provisioning as well. They make it easier or harder to do certain things, and that can allow a system or a society to drift into problems that it might not even have perceived. So what we might want to do is think about a way of proceeding where through our use of soft law techniques like labeling and certification, market-enabled techniques, multi-stakeholder agreements, international agreements, how we can identify and re-enforce enforce those values we think are universal, while protecting the particularity of values that different cultures and individuals need to have in order to play a useful role in this. Because what we saw with a lot of previous technologies was that the cultural image, the social image of the country or region that developed the technologies was then imposed on the rest of the world without the kind of social evolution that enabled them to manage those problems. We saw that when the market economy was imposed on former Soviet Russia and it produced not the kind of economy we look forward to, but a kind of capitalist gangsterism. Quite reasonable when you think about the fact that it hadn’t grown up naturally, but was kind of imposed. So the ability to have appropriate localization without too much fragmentation is, I think, one of the essential elements of this. Now, mutual recognition is important, and that means that we’re not thinking just about soft law things, but we’re also thinking about, well, what’s very much in the news at the moment, trade agreements. How do we handle these things when we say that my regulations have to be aligned to yours in some sense, have to recognize yours? That has an economic consequence. It has a power consequence. We may need to use other tools as well, such as self-regulatory activities or competition regulation. Then the final thing I wanted to mention was I’ve been reflecting during the discussion about what it was that was IOT specific in all of this. And from what I’ve heard, scale is one element of this. Our illusions of control and design are sort of tied to a particular scope of our activities in variation and in numbers of devices. Once we cross those lines, that quantitative change becomes a qualitative change, and we don’t always keep pace with it. Another thing that Joao mentioned was attention. Sorry, I see that I’m past time and my computer is complaining at me for that. So I’ll just say that among the things… No, go away. Sorry, it’s not dismissing. Okay, yeah, so the attention that we pay to these devices, the extent to which we rely on them, and the complexity of the ecosystem and its emergent behaviors, all of these things are different. So merely patching the things that we’ve done before will not allow us accurately to move into this. And in this sense, the global context is our friend because it allows us to pursue natural experiments in ways that no single nation could. Okay, let’s see if I can shut this thing up. In the meantime, I’ll shut it up for everyone else.


Maartin Botterman: Thank you so much, Jonathan, and thanks for not automating the shut off immediately as the time was planned, but to allow it to finish your contribution. So we got a couple of answers. We got some insights of what this world is and what we need to do to make sure and why we need to keep it secure. So any specific input from anybody in the room? Please, sir.


Audience: Remarks? Today… Yes, yes, Alexander Shevchuk. Today was some very important remarks about the video surveillance and the cameras. At the beginning of the full-scale invasion of Russian Federation in Ukraine, in Ukraine there are a lot of Chinese production video cameras set for public security in different places, and the Russian Federation used vulnerabilities in these cameras, making such… And it was only one point. The second point is the CCTV cameras with biometric recognition that is used to find some specific persons with the technology of recognizing faces. And also these cameras are used in defense, like gathering some facts about the crimes and after that put it to the court. And in the attacks, because these cameras could be a weapon in the war. And it’s very important, the vulnerability and security confidentiality is one of the most important points in the usage of the Internet of Things up to time.


Maartin Botterman: Yes, thank you very much. If one of the speakers wants to, please also just raise your hand. But you’re making a very good point, because anything that can serve us can be weaponized against us too. And the more dependent we become on it, the more important it is that we make sure that it’s not used in unauthorized ways or accessed in unauthorized ways, either to use the devices, the actuators, the things that do things with the digital information they get, or in that way really can do something we need to address. We become dependent on them and they become critical in our infrastructures. I see two hands up. Joaol, please. And then Matthias.


Joao Moreno Rodrigues Falcao: Okay, hello. Well, I would like to verify. briefly answer the question about the difference between operational technology and IoT. One of them is the objective. Like when I did some assessments in industries, when we think about the cybersecurity FRIAD, which is confidentiality, integrity and availability, when we speak about an industrial site, you are speaking about availability, availability and availability. You need to keep the machines running. And this requirement really changes the way we handle these kinds of systems. So about the change in the GDPR, I don’t think it’s needed because, well, technology evolves really fast, but we cannot change the regulations as fast as this, because developing products takes time. So when you are developing an IoT system, it would take like three years to develop one. If this regulation changes very fast, like erasing parts and not just adding new features, in the reality, in the end, you make that they will not comply with the regulation. And well, about the risk of attacks, I have a story to tell. Like I worked as a cybersecurity tester, like active tester, and we had one of the security tests we did. We invaded the system by its air conditioning. equipments because they were very poorly secured and actually they were strong and we had computational power to use it as a bridge to target attacks inside the company and well no one cares about the air conditioning so this is the risk.


Maartin Botterman: Thank you very much and just saying that we’re progressing as well with the initial devices now to many devices. I remember when I had my first camera in my home and I hadn’t done a good great job of securing it. In a certain moment I’m there in the room and the camera turns to me and I hear voices. I pulled out the electricity cord and it was fortunately sufficient but we are also beyond the time where admin.admin as user and password is no longer used and things like that so we do progress but we need to do more in particular when technologies further develop. Matthias please and then Wout and then Jonathan.


Matthias Hudobnik: So no actually I also wanted to contribute and complement a bit like to the questions. So first of all thanks Frederik. It’s a very good question OT versus IoT. So in general what is maybe also interesting thing is that I mean OT is always or most of the time used in industrial equipment and processes like manufacturing, energy utilities and IoT is really more like let’s say smart devices. that collect data, send data via the internet, and also the OT, operational technology, is very often isolated in an air-gapped system, so now also sometimes increasingly connected via industrial networks, but normally it’s air-gapped, also due to the critical infrastructure which is like facilitating it. And IoT, again, is more IP-based, cloud-connected via Wi-Fi or sometimes Bluetooth, and also let’s say the real-time requirements are also different, like OT is often hard real-time strict latency and timing constraints, and for IoT it’s more like often soft real-time or none, more, let’s say, tolerant in terms of delays. And also maybe a bit like to the attacks, there are some attack vectors which are very similar, some of them, let’s say cyber attacks, legacy system, interconnectivity risks, supply chain attacks, then you have also AI and automation, so there are various, let’s say the most key difference in future risk, I would say OT, as I said, risk is physical, shutdown of a factory, explosion, IoT more, the risk is more digital, data-focused, privacy loss, data theft, and also like systems are high value targets like OT, IoT can be, but devices more like mass target or exploitation and the botnet or something like that. To the data protection question per se, it’s also a very good question, indeed the Commission thought about like amending, there are plans to amend the GDPR, it was like I think in February this year where they had a first set of like changes, and especially it was like in relation to medium-sized enterprises and compliance and how the GDPR addresses AI so we have in the GDPR automated decision making and profiling in article 22 which let’s say restricts a decision based solely on automated processing that significantly affects individuals unless let’s say specific conditions are met and this is important also in terms of AI then you have also data protection impact assessments which are also for high-risk AI applications necessary and you have some principles which are similar to the IACT and very often when we talk about data processing the IACT is referring to the GDPR in certain let’s say articles and then a last point to the let’s say biometric identification and surveillance a big thing is also emotional facial recognition where you really assess emotions based on the facial recognition per se and that’s also quite a problem in terms of bias which is a big thing where already now companies are using this in for example hiring people and we know there are various articles about it and I can also recommend you to watch the movie Coded Bias which is quite good you can find it on Netflix and there you can see also the problems in terms of bias and facial recognition. Thanks.


Wout de Natris-van der Borght: Yes thank you Maartin Botterman and come back to you to your comment there what it shows is that there are so many levels of security and safety in these devices that for an individual it’s almost impossible to deal with it who thinks when you buy a fax machine or a coffee machine in your purity in your company that it automatically connects to your to your system And I know from a factory where I used to work a long time ago that our sysadmin found that the printer and the fax machine, and we’re talking about a long time ago here, that they were automatically connecting to the company that sold it to us and that there was no form of security inside. And we dealt with some pretty, well, sensitive information, also industry-sensitive information. Another step in there is when you talk about these cameras and that they come from China or whatever other country, who controls these cameras really? Is it you who bought them? Or is security your problem? Or can they do danger to you with these cameras as well by sending out whatever is on those cameras to other people or selling it to other people? So I think that there are levels of security that really need to be dealt with. And when we look into the future with all the options that are coming, with everything becoming faster and let alone with quantum computing, then if we do not deal with it now, and I’m repeating my message, I think that we’re really going to be lost. And we’re not going to be running down the mountain with the brake in our hand, but we’ll never see the mountain in the car again. Thanks.


Maartin Botterman: I see about running down the mountain now with a brake. I’m a very visual person. Please ask your question and then we continue to Jonathan. And can you introduce yourself?


Audience: Hi, I’m Marijana Puljak, a member of the Croatian Parliament. But after 25 years in IT, I ended up somehow in Parliament. And I like to come to these kind of sessions and pose some questions. For example, we talked here about the safety, security… Security, especially IOT devices that collect and store vast amounts of personal sensitive data and much of it is encrypted using current standards. But once quantum computing becomes powerful enough, those encrypted data could be decrypted. Today we still don’t know what quantum computing is capable of, but in the near future, as you said, and that could be, I don’t know, next week maybe. So how are we prepared or how do we prepare ourselves for these risks? I know that legislation and regulation is always slow in comparison of new technologies, but how can we prevent this future from happening?


Maartin Botterman: Yes, that’s always a balancing act, right? If legislation is too early and stifles progress. So I think we have to turn sandboxes for that nowadays, but it’s an important question. I think Jonathan will be able to even refer to this, although that was not why you raised your hand. Then Chris, then Joao, and then we need to round off.


Jonathan Cave: Indeed it wasn’t, but I will respond briefly to it. I think it’s certainly true that new technologies raise new challenges and there’s a certain extent to which through, let’s say, active regtech or something like that, we need to get ahead of these challenges. In the case of quantum-enabled encryption, of course, encryption and decryption are in a continual tension, and so it is quite possible, of course, that quantum encryption may offer the same level of functionality in relation to the threat of quantum decryption. However, there is also a vast amount of stored data. Much of these data are stored in encrypted form on devices which remain accessible, and it will not be possible to decrypt and re-encrypt those devices with it to a new stronger standard, so that that historical trove of data, which is built into the training of our algorithms and everything else in intimate ways, will be exposed. And this is something, this legacy is something I think we need to be aware of. The thing I mostly wanted to talk about is the consequences of complexity in attention. Now, I won’t beat the complexity drum too hard, except to say that there are strongly emergent things that happen in complex systems, things that cannot be understood by looking at the behavior of individual elements of this system. And if you look at how the laws and regulations and the conventions and individual device designs are predicated, it is on the basis of individual systems. They will, even leaving aside the generational problem of systems which have different iterations or levels of maturity of devices in them, how they function, even leaving that aside, it will be very difficult to know where regulatory surveillance and responsibility should lie. The other thing I wanted to talk about was in relation to the attention that we pay to these things. With many of these devices, where we do interact with the device, it’s on the basis of biometrics, which for reasons of human practicality, we have simplified. We’ve simplified to the use of things like biometrics, for example. Once you have begun to use your device by simply speaking to it, and being recognized as it, you cease to notice that you’re going through a layer of security. And because your voice is just your voice, that voice then becomes, it’s like having one password for all of your systems. And it creates a collective risk in relation to all these devices that we know you don’t think of distinctly, that is part of a system that you interact with. But beyond that, if they are using your voice, they could begin to learn who you are through learning how you respond, how your voice responds. And what you can do with voices, you can recognize patterns, you can recognize emotional states, as has already been said. And these emotional states can not only be recognized, but they can be manipulated through the nature of your interaction with the system. And just as we do, if you do sentiment tagging on texts that people write, you know how to write texts that will influence their sentiments. These things are not impossible. They’re not science fiction. They’re happening right now all the time. Once you move beyond a brute force capturing of people’s attention to trying to use the attention in particular ways, then new things become possible, new forms of bias. And the privacy related solution to this is something like synthetic data, that we don’t use your data, but we use data that are kind of modeled on you and people like you. But the reasons why we have privacy are not protected by transition to sin data types of modeling, because they can control you, they can influence your behavior, subvert your autonomy, just as easily using the synthetic data. And then the final point I want to make came out of something that Val mentioned, which is when people buy these devices, they may be informed, they may have labels, they may think about them in a particular way. But when they subsequently come to use those devices, They’re thinking about it in a very different way, lower down the brainstem, not as consciously. We know that from the studies that were done in the Netherlands on things like pricing and energy efficiency. When you buy a car, you think about these things in a very overt way, and thanks to labeling regulations, you put price and features and environment together with each other. When it comes to deciding, do I drive here or drive there, all of that goes out of the window. And so the incentives operate only at point of purchase, but during the lifetime of the device or the system, those incentives on which we rely cease to operate. So, okay, that’s enough. Thanks.


Maartin Botterman: Rebound effect. Yeah. So thanks very much for that. Time is gone, but we still have three hands up. So I would really like to ask you to do one minute remark for Chris, Joao and Matthias, please.


Chris Buckridge: Okay, I’ll jump in and I will keep it brief because it’s somewhat of an advertisement. I think in response to Val’s point and really the broader question in terms of governance, one of the sessions we’re currently planning for the Oslo Internet Governance Forum, which is taking place next month, is looking at emerging technologies. And one of the really key areas there is anticipatory governance, which is a phrase that seems to have emerged a lot in the last couple of years. The OECD has developed a framework for anticipatory governance, which is looking at ways in which policymakers, regulators, parliamentarians can develop agile responses to these technologies, which are really coming in very quickly but having very significant social, economic impacts. And actually one other point, and our colleague from Croatia. reminded me, the International Parliamentarian Union actually has also done a lot of work on this anticipatory governance with their World Summit of the Committee of the Future work. So it’s something that is being looked at, but I think it’s something that needs to be done very consciously.


Maartin Botterman: Thanks, Joao.


Joao Moreno Rodrigues Falcao: Okay, good. So I only speak here about the results that we will have in our report published during the IGF. So we’ll talk a lot about IoT and also the quantum challenges. Unfortunately, I couldn’t have time to speak about this future, but we have a wonderful work on the PQC part. So yeah, please stay tuned.


Maartin Botterman: Thank you. And I think we’ll hear a little bit for people in the room tomorrow morning as well. Last but not least, Matthias.


Matthias Hudobnik: Thanks a lot. Just very quickly answer to the question. So really in relation to post-quantum, first of all, you need to ask yourself decryption for what purpose? Confidentiality, authenticity or integrity. And there are standards from NIST and also ITF, which are looking into that, just that you are aware. And then, yeah, from my side, resilience in IoT, I would say it’s not just a technical challenge, it’s really a governance imperative. So as said, from the DNS up through AI governance and also lifecycle management, our system must be, let’s say, secure by design and continuously updated for emergency threats. And here again, we need to strengthen foundational protocols and international cooperation. And so we can build an, let’s say, internet that remains trustworthy and also robust for the future.


Maartin Botterman: Thank you so much. And we’re committed to that, many of us. Thank you all for your attention and the interaction. Thank you, speakers, for the insightful sharing. It’s clear that IoT is becoming part of the fabric and increasingly important there that we do that consciously and make sure that these extensions of the systems we know will not hurt us but help us, being aware that they can also hurt us and consciously deal with that, both in terms of protection and how we design the systems, certification, telling people what they can count on, what Wout also said, crucial, so that citizens don’t blindly put something in their home or their hand that they don’t know how to use, building it to be safe, secure, and private will be crucial, too, because we can’t count on the user to take all decisions and all measures themselves. So this balance needs to be found, too. My last conclusion is the digital footprint, a digital divide. How do you make sure that people who need it get it within reason? And last but not least, this all comes with a carbon footprint. The first devices had batteries, and they may still be hanging there, out there somewhere, leaking, et cetera. When it becomes so prevalent and so part of the fabric, let’s make sure that we also do that in a conscious way. So with that, thank you all for attending and for an excellent discussion. Wout, thanks for joining, and we’ll see you in the next session. Thank you.


M

Maartin Botterman

Speech speed

125 words per minute

Speech length

2281 words

Speech time

1087 seconds

IoT devices are becoming critical infrastructure across various applications from industrial to domestic use, requiring robust security measures

Explanation

IoT encompasses diverse applications ranging from industrial systems to home automation, environmental monitoring, and city infrastructure management. As these technologies become part of the fabric of society globally, their security becomes increasingly critical for societal functioning.


Evidence

Examples include drones and irrigation systems for agriculture, water monitoring systems, dynamic traffic management systems, and city infrastructure management


Major discussion point

IoT Security Challenges and Current State


Topics

Infrastructure | Cybersecurity


Agreed with

– Matthias Hudobnik
– Joao Moreno Rodrigues Falcao

Agreed on

IoT security requires foundational internet infrastructure security


Digital divide affects who has access to IoT technologies and protective measures

Explanation

There are concerns about who has access to IoT technologies, affordability issues, and ensuring usability where needed. The digital divide creates disparities in both access to beneficial IoT technologies and the ability to implement protective security measures.


Evidence

Questions raised about who can afford IoT technologies and how to ensure they’re usable where needed


Major discussion point

Global Digital Divide and Capacity Building


Topics

Development | Human rights


Agreed with

– Chris Buckridge
– Jonathan Cave

Agreed on

Global South faces disproportionate IoT security risks


J

Joao Moreno Rodrigues Falcao

Speech speed

103 words per minute

Speech length

1282 words

Speech time

741 seconds

75 billion IoT devices exist with many shipping with default credentials and weak firmware, creating massive attack surfaces

Explanation

The scale of IoT deployment has reached approximately 75 billion devices globally, with many having fundamental security flaws from manufacturing. These devices often ship with default credentials and weak firmware, creating extensive vulnerabilities that attackers can exploit.


Evidence

Specific examples include the 2015 Jeep Cherokee hack forcing recall of 1.4 million vehicles, St. Jude cardiac implants with flaws affecting 500,000 devices, and the Mirai botnet attack involving 600,000 devices


Major discussion point

IoT Security Challenges and Current State


Topics

Cybersecurity | Infrastructure


Agreed with

– Maartin Botterman
– Matthias Hudobnik

Agreed on

IoT security requires foundational internet infrastructure security


Quantum computing will break current RSA and elliptic curve cryptography, requiring urgent transition to post-quantum cryptography

Explanation

The advent of quantum computing poses an existential threat to current encryption methods used in IoT devices. RSA and elliptic curve cryptography will become obsolete, necessitating an immediate and comprehensive overhaul of cryptographic systems.


Evidence

Research conducted with AFNIC on quantum computing implications and the urgent need for crypto overhaul


Major discussion point

Emerging Technology Threats and Quantum Computing Impact


Topics

Cybersecurity | Infrastructure


Agreed with

– Matthias Hudobnik
– Audience

Agreed on

Quantum computing poses urgent threat to current IoT encryption


Multiple regulatory frameworks exist (EU Cyber Resilience Act, NIST IoT guidance, various labeling systems) but lack global convergence

Explanation

While numerous security frameworks and standards have been developed by different organizations and regions, there is insufficient coordination between them. This fragmentation creates challenges for global IoT deployment and security management.


Evidence

Examples include ISO, ISC, ETSI baselines, EU Cyber Resilience Act, US NIST IoT guidance, APAC labeling systems, Singaporean and Korean systems, UK PQC roadmap for 2035


Major discussion point

Regulatory Frameworks and Standards Harmonization


Topics

Legal and regulatory | Infrastructure


Supply chain attacks affect millions of devices through compromised SDKs and cloud dependencies

Explanation

IoT security vulnerabilities often originate from compromised software development kits and cloud infrastructure that serve multiple device manufacturers. These supply chain attacks can simultaneously affect millions of devices across different brands and applications.


Evidence

Vercado Bridge infected 100,000 cameras across hospitals, schools, and households; compromised SDK affected 100 million cameras; Rektortrain botnet discovered in 2024 with 200,000 infected devices cleaned by US Department of Justice


Major discussion point

Lifecycle Management and Supply Chain Security


Topics

Cybersecurity | Infrastructure


Agreed with

– Matthias Hudobnik
– Jonathan Cave

Agreed on

Lifecycle management and secure updates are critical IoT security gaps


Operational Technology (OT) prioritizes availability above all else, while IoT focuses more on connectivity and data collection

Explanation

In industrial settings, operational technology systems prioritize keeping machines running above all other considerations, including security. This differs from IoT systems which are primarily designed for data collection and connectivity, creating different security paradigms and requirements.


Evidence

Experience from cybersecurity assessments in industries where availability is the primary concern in the CIA triad (confidentiality, integrity, availability)


Major discussion point

Operational vs Consumer IoT Distinctions


Topics

Infrastructure | Cybersecurity


GDPR may need amendments to address AI and IoT developments, though frequent regulatory changes could harm compliance

Explanation

While there may be pressure to update GDPR for new technologies, frequent regulatory changes could be counterproductive. Product development cycles take approximately three years, and constantly changing regulations would make compliance impossible for manufacturers.


Evidence

Product development timelines of three years for IoT systems make frequent regulatory changes impractical


Major discussion point

Regulatory Frameworks and Standards Harmonization


Topics

Legal and regulatory | Human rights


Disagreed with

– Chris Buckridge

Disagreed on

Frequency of regulatory updates for emerging technologies


Industrial IoT assessments reveal vulnerabilities through unexpected entry points like air conditioning systems

Explanation

Security assessments often discover that attackers can penetrate industrial systems through seemingly innocuous IoT devices like air conditioning equipment. These devices are typically poorly secured and overlooked, providing computational resources and network access for further attacks.


Evidence

Personal experience as a cybersecurity tester where air conditioning equipment was used as a bridge to target attacks inside a company


Major discussion point

Operational vs Consumer IoT Distinctions


Topics

Cybersecurity | Infrastructure


M

Matthias Hudobnik

Speech speed

131 words per minute

Speech length

1458 words

Speech time

666 seconds

IoT security depends on strong internet foundations including DNS security, DNSSEC, and proper lifecycle management

Explanation

The security of IoT devices is fundamentally dependent on the underlying internet infrastructure, particularly the Domain Name System. When DNS fails, IoT services from smart home devices to critical medical equipment also fail, making DNS security through technologies like DNSSEC essential.


Evidence

Examples of foundational technologies include DNSSEC for DNS integrity, RPKI for preventing BGP hijacking, and DANE for enhancing TLS authentication


Major discussion point

IoT Security Challenges and Current State


Topics

Infrastructure | Cybersecurity


Agreed with

– Maartin Botterman
– Joao Moreno Rodrigues Falcao

Agreed on

IoT security requires foundational internet infrastructure security


AI governance must include human oversight, explainability, and compliance with regulations like the EU AI Act and GDPR

Explanation

As AI becomes integrated into IoT systems, proper governance frameworks are essential to ensure ethical and trustworthy operation. This includes building in human oversight, robust explainability mechanisms, and compliance with emerging regulatory frameworks at every stage of development and deployment.


Evidence

Reference to EU AI Act and GDPR requirements for AI systems to be ethical, trustworthy, auditable, transparent, reliable, secure and accountable


Major discussion point

AI Integration and Governance in IoT Systems


Topics

Legal and regulatory | Human rights


Post-quantum cryptography standards from NIST and IETF are being developed to address quantum threats

Explanation

Recognizing the quantum threat to current encryption, standardization bodies are actively developing post-quantum cryptographic solutions. These standards are essential for protecting different aspects of security including confidentiality, authenticity, and integrity.


Evidence

NIST’s standardization efforts for post-quantum cryptography and IETF standards development


Major discussion point

Emerging Technology Threats and Quantum Computing Impact


Topics

Cybersecurity | Infrastructure


Harvest now, decrypt later attacks are already a real risk requiring immediate action on cryptographic transitions

Explanation

Adversaries are currently collecting encrypted data with the intention of decrypting it once quantum computers become available. This makes the transition to post-quantum cryptography urgent, as data encrypted today may be vulnerable in the future.


Evidence

Reference to NIST’s standardization efforts and the concept of harvest now, decrypt later as a real risk


Major discussion point

Emerging Technology Threats and Quantum Computing Impact


Topics

Cybersecurity | Infrastructure


Agreed with

– Joao Moreno Rodrigues Falcao
– Audience

Agreed on

Quantum computing poses urgent threat to current IoT encryption


IoT devices often lack secure update mechanisms throughout their lifecycle, leaving them vulnerable for years

Explanation

Many IoT devices, particularly those like smart energy meters, are deployed without adequate mechanisms for receiving security updates. Once installed, they may operate for years without firmware updates, accumulating vulnerabilities over time.


Evidence

Example of smart energy meters that seldom receive firmware updates after deployment, leaving them vulnerable for years


Major discussion point

Lifecycle Management and Supply Chain Security


Topics

Cybersecurity | Infrastructure


Agreed with

– Joao Moreno Rodrigues Falcao
– Jonathan Cave

Agreed on

Lifecycle management and secure updates are critical IoT security gaps


Software bills of materials and over-the-air update mechanisms are essential for secure IoT deployment

Explanation

Proper IoT security requires implementing secure lifecycle practices including comprehensive documentation of software components and reliable methods for delivering security updates. These mechanisms are indispensable for maintaining security throughout the device lifecycle.


Evidence

Reference to secure boot, hardware roots of trust, and over-the-air update mechanisms as essential practices


Major discussion point

Lifecycle Management and Supply Chain Security


Topics

Cybersecurity | Infrastructure


Mutual recognition frameworks similar to DNS governance should be promoted for IoT security standards

Explanation

The fragmented regulatory landscape for IoT security lacks the kind of global mutual recognition frameworks that exist in DNS governance. Promoting similar frameworks for IoT security standards would help address regulatory fragmentation and enable better global coordination.


Evidence

Comparison with DNS governance frameworks and mention of initiatives like EU Cyber Resilience Act and NIST IoT standards lacking mutual recognition


Major discussion point

Certification, Labeling and Trust Mechanisms


Topics

Legal and regulatory | Infrastructure


OT systems are typically air-gapped with hard real-time requirements, while IoT is IP-based and cloud-connected

Explanation

Operational Technology systems are designed for industrial environments with strict isolation and timing requirements, while IoT systems are inherently connected and more tolerant of delays. This fundamental difference affects their security models and vulnerability profiles.


Evidence

Distinction between OT’s air-gapped, hard real-time systems versus IoT’s IP-based, cloud-connected, soft real-time systems


Major discussion point

Operational vs Consumer IoT Distinctions


Topics

Infrastructure | Cybersecurity


Disagreed with

– Chris Buckridge

Disagreed on

Scope of IoT-specific security challenges


Attack vectors differ between OT (physical risks, factory shutdowns) and IoT (data theft, privacy loss, botnet exploitation)

Explanation

The consequences of successful attacks vary significantly between operational technology and IoT systems. OT attacks typically result in physical damage or operational shutdowns, while IoT attacks focus more on data compromise and using devices for further malicious activities.


Evidence

Comparison of OT risks (physical shutdown, explosions) versus IoT risks (data theft, privacy loss, mass exploitation for botnets)


Major discussion point

Operational vs Consumer IoT Distinctions


Topics

Cybersecurity | Infrastructure


C

Chris Buckridge

Speech speed

134 words per minute

Speech length

1149 words

Speech time

512 seconds

IoT differs from traditional IT through machine-to-machine communication, scale of deployment, and reduced user visibility and control

Explanation

IoT systems create fundamentally different security challenges compared to traditional IT through their massive scale, automated interactions, and lack of user oversight. The sheer attack surface and the invisibility of many IoT devices to users creates new levels of vulnerability and criticality.


Evidence

Examples of manufacturing processes leading to distinct device characteristics and the scale of IoT networks reaching into everyday actions


Major discussion point

IoT Security Challenges and Current State


Topics

Infrastructure | Cybersecurity


Disagreed with

– Matthias Hudobnik

Disagreed on

Scope of IoT-specific security challenges


Global South and under-resourced areas face greater vulnerability to AI-enhanced attacks due to lack of defensive resources

Explanation

While AI provides both offensive and defensive capabilities in cybersecurity, the defensive applications require significant resources and expertise. This creates a disparity where under-resourced regions become more vulnerable to AI-enhanced attacks while lacking access to AI-powered defenses.


Evidence

Reference to UNIDIR work on AI-ICT security nexus and the resource requirements for AI-powered defense capabilities


Major discussion point

Global Digital Divide and Capacity Building


Topics

Development | Cybersecurity


Agreed with

– Maartin Botterman
– Jonathan Cave

Agreed on

Global South faces disproportionate IoT security risks


AI-enhanced attacks can process vast amounts of IoT data in new ways, creating unprecedented security challenges

Explanation

AI enables attackers to analyze and exploit the massive data streams generated by IoT networks in ways that were previously impossible. This creates new attack vectors both at the network perimeter and once attackers have gained access to systems.


Evidence

UNIDIR study on AI-ICT security nexus describing attacks outside the perimeter, on the perimeter, and inside the perimeter


Major discussion point

AI Integration and Governance in IoT Systems


Topics

Cybersecurity | Infrastructure


Cyber capacity building with focus on Global South is more urgent than ever given emerging technology threats

Explanation

The emergence of AI-enhanced cyber threats makes capacity building in under-served regions critically important. The Global Forum on Cyber Expertise has been working on this issue, recognizing that emerging technologies create both new vulnerabilities and new opportunities for defense.


Evidence

Work with Global Forum on Cyber Expertise on emerging technologies and cyber capacity building, particularly focused on Global South


Major discussion point

Global Digital Divide and Capacity Building


Topics

Development | Cybersecurity


Anticipatory governance frameworks are needed to develop agile responses to rapidly emerging technologies

Explanation

Traditional regulatory approaches are too slow to address the rapid pace of technological change in areas like IoT and AI. Anticipatory governance frameworks, being developed by organizations like the OECD, aim to create more agile policy responses to emerging technologies.


Evidence

OECD framework for anticipatory governance and International Parliamentary Union’s World Summit of the Committee of the Future work


Major discussion point

Regulatory Frameworks and Standards Harmonization


Topics

Legal and regulatory | Infrastructure


Disagreed with

– Joao Moreno Rodrigues Falcao

Disagreed on

Frequency of regulatory updates for emerging technologies


J

Jonathan Cave

Speech speed

157 words per minute

Speech length

2151 words

Speech time

818 seconds

Labeling and certification schemes work by enabling rational consumer choice but become obsolete as systems evolve

Explanation

Certification and labeling systems are designed to harness consumer rational choice by providing trust signals, but they are only valid for specific system configurations at particular moments in time. As technology and usage patterns evolve, these certifications lose their relevance while still providing access credentials.


Evidence

Explanation of how certification works relative to specific system generations and assumptions about user behavior


Major discussion point

Certification, Labeling and Trust Mechanisms


Topics

Legal and regulatory | Economic


Different countries implement different approaches reflecting their position in the technology ecosystem

Explanation

Countries that primarily create technologies versus those that primarily consume them will balance competing interests differently in their regulatory approaches. This reflects their different positions in the global technology ecosystem and their varying needs for protection versus innovation.


Evidence

Example of GDPR as reflecting EU values and desire to advance them globally while protecting citizens at home


Major discussion point

Certification, Labeling and Trust Mechanisms


Topics

Legal and regulatory | Infrastructure


Different regions adopt IoT technologies differently based on local needs like reliability during power failures

Explanation

The Global South and other regions may adopt IoT technologies based on different criteria than developed markets, such as affordability, reliability during infrastructure failures, and local operational requirements. This creates different usage patterns that may not align with original design assumptions.


Evidence

Examples of different adoption patterns seen with Raspberry Pi and mobile phones, and considerations like power failure resilience


Major discussion point

Global Digital Divide and Capacity Building


Topics

Development | Infrastructure


Agreed with

– Maartin Botterman
– Chris Buckridge

Agreed on

Global South faces disproportionate IoT security risks


Values are embedded in technology design, requiring universal principles while protecting cultural particularity

Explanation

Technologies are not value-neutral but embed the values and assumptions of their designers, which can be imposed on users in different cultural contexts. The challenge is to identify universal values while allowing for cultural adaptation without excessive fragmentation.


Evidence

Historical example of market economy imposition on former Soviet Russia leading to unintended consequences


Major discussion point

Certification, Labeling and Trust Mechanisms


Topics

Sociocultural | Legal and regulatory


Biometric authentication in IoT creates single points of failure and enables emotional manipulation through voice recognition

Explanation

The convenience of biometric authentication, particularly voice recognition, creates security risks by essentially using one password across all systems. Additionally, voice recognition systems can detect and potentially manipulate emotional states, creating new forms of user manipulation and bias.


Evidence

Explanation of how voice becomes like having one password for all systems, and capabilities for emotional state recognition and manipulation


Major discussion point

AI Integration and Governance in IoT Systems


Topics

Human rights | Cybersecurity


User attention to IoT security decreases after purchase, unlike the conscious decision-making at point of sale

Explanation

While consumers may consider security factors when purchasing IoT devices, their attention to security concerns diminishes significantly during actual usage. This means that market-based security incentives only operate at the point of purchase, not throughout the device lifecycle.


Evidence

Reference to Dutch studies on pricing and energy efficiency showing different decision-making patterns at purchase versus usage


Major discussion point

Lifecycle Management and Supply Chain Security


Topics

Economic | Human rights


Agreed with

– Matthias Hudobnik
– Joao Moreno Rodrigues Falcao

Agreed on

Lifecycle management and secure updates are critical IoT security gaps


W

Wout de Natris-van der Borght

Speech speed

157 words per minute

Speech length

688 words

Speech time

262 seconds

Procurement practices often fail to require secure-by-design IoT devices, creating systemic vulnerabilities

Explanation

Government and organizational procurement processes typically do not mandate secure-by-design principles when purchasing IoT or ICT equipment. This creates systemic vulnerabilities as insecure devices are systematically introduced into critical systems through institutional purchasing decisions.


Evidence

IS3C research on procurement showing that governments mostly do not procure IoT or ICT secure by design


Major discussion point

Regulatory Frameworks and Standards Harmonization


Topics

Legal and regulatory | Cybersecurity


A

Audience

Speech speed

109 words per minute

Speech length

494 words

Speech time

269 seconds

Security vulnerabilities in IoT devices can be exploited as weapons in warfare, as demonstrated by compromised Chinese cameras in Ukraine

Explanation

IoT devices, particularly surveillance cameras, can be weaponized during conflicts by exploiting their vulnerabilities. The example from Ukraine shows how Chinese-manufactured cameras with security flaws were exploited by Russian forces, demonstrating the dual-use nature of IoT security vulnerabilities.


Evidence

Specific example of Chinese production video cameras used for public security in Ukraine being exploited by Russian Federation during full-scale invasion


Major discussion point

IoT Security Challenges and Current State


Topics

Cybersecurity | Infrastructure


Current encrypted IoT data could be decrypted once quantum computing becomes powerful enough, creating legacy security risks

Explanation

IoT devices currently collect and store vast amounts of personal and sensitive data using current encryption standards. When quantum computing becomes sufficiently powerful, this historically encrypted data could be retroactively decrypted, creating significant privacy and security risks.


Evidence

Recognition that quantum computing capabilities are unknown but could emerge suddenly, potentially next week


Major discussion point

Emerging Technology Threats and Quantum Computing Impact


Topics

Cybersecurity | Human rights


Agreed with

– Joao Moreno Rodrigues Falcao
– Matthias Hudobnik

Agreed on

Quantum computing poses urgent threat to current IoT encryption


Agreements

Agreement points

IoT security requires foundational internet infrastructure security

Speakers

– Maartin Botterman
– Matthias Hudobnik
– Joao Moreno Rodrigues Falcao

Arguments

IoT devices are becoming critical infrastructure across various applications from industrial to domestic use, requiring robust security measures


IoT security depends on strong internet foundations including DNS security, DNSSEC, and proper lifecycle management


75 billion IoT devices exist with many shipping with default credentials and weak firmware, creating massive attack surfaces


Summary

All speakers agree that IoT security is fundamentally dependent on strong underlying internet infrastructure, particularly DNS security, and that the massive scale of deployment creates unprecedented security challenges requiring robust foundational measures.


Topics

Infrastructure | Cybersecurity


Quantum computing poses urgent threat to current IoT encryption

Speakers

– Joao Moreno Rodrigues Falcao
– Matthias Hudobnik
– Audience

Arguments

Quantum computing will break current RSA and elliptic curve cryptography, requiring urgent transition to post-quantum cryptography


Harvest now, decrypt later attacks are already a real risk requiring immediate action on cryptographic transitions


Current encrypted IoT data could be decrypted once quantum computing becomes powerful enough, creating legacy security risks


Summary

There is strong consensus that quantum computing represents an existential threat to current encryption methods used in IoT, requiring immediate transition to post-quantum cryptography to protect both current and historical data.


Topics

Cybersecurity | Infrastructure


Lifecycle management and secure updates are critical IoT security gaps

Speakers

– Matthias Hudobnik
– Joao Moreno Rodrigues Falcao
– Jonathan Cave

Arguments

IoT devices often lack secure update mechanisms throughout their lifecycle, leaving them vulnerable for years


Supply chain attacks affect millions of devices through compromised SDKs and cloud dependencies


User attention to IoT security decreases after purchase, unlike the conscious decision-making at point of sale


Summary

Speakers agree that IoT devices suffer from poor lifecycle security management, with inadequate update mechanisms and decreasing user attention after purchase creating long-term vulnerabilities.


Topics

Cybersecurity | Infrastructure


Global South faces disproportionate IoT security risks

Speakers

– Maartin Botterman
– Chris Buckridge
– Jonathan Cave

Arguments

Digital divide affects who has access to IoT technologies and protective measures


Global South and under-resourced areas face greater vulnerability to AI-enhanced attacks due to lack of defensive resources


Different regions adopt IoT technologies differently based on local needs like reliability during power failures


Summary

There is consensus that the Global South and under-resourced regions face disproportionate IoT security risks due to limited access to protective technologies and different adoption patterns based on local constraints.


Topics

Development | Cybersecurity


Similar viewpoints

Both speakers recognize the fragmentation in IoT security standards and the need for better global coordination, with Matthias specifically advocating for DNS-like mutual recognition frameworks.

Speakers

– Joao Moreno Rodrigues Falcao
– Matthias Hudobnik

Arguments

Multiple regulatory frameworks exist (EU Cyber Resilience Act, NIST IoT guidance, various labeling systems) but lack global convergence


Mutual recognition frameworks similar to DNS governance should be promoted for IoT security standards


Topics

Legal and regulatory | Infrastructure


Both speakers distinguish between OT and IoT systems, emphasizing that OT prioritizes availability and operates in isolated environments, while IoT is inherently connected and data-focused.

Speakers

– Matthias Hudobnik
– Joao Moreno Rodrigues Falcao

Arguments

Operational Technology (OT) prioritizes availability above all else, while IoT focuses more on connectivity and data collection


OT systems are typically air-gapped with hard real-time requirements, while IoT is IP-based and cloud-connected


Topics

Infrastructure | Cybersecurity


Both speakers recognize that governance approaches vary based on national contexts and that new, more agile governance frameworks are needed to address rapidly evolving technologies.

Speakers

– Jonathan Cave
– Chris Buckridge

Arguments

Different countries implement different approaches reflecting their position in the technology ecosystem


Anticipatory governance frameworks are needed to develop agile responses to rapidly emerging technologies


Topics

Legal and regulatory | Infrastructure


Unexpected consensus

Regulatory stability versus technological adaptation

Speakers

– Joao Moreno Rodrigues Falcao
– Chris Buckridge

Arguments

GDPR may need amendments to address AI and IoT developments, though frequent regulatory changes could harm compliance


Anticipatory governance frameworks are needed to develop agile responses to rapidly emerging technologies


Explanation

Unexpectedly, there is consensus on balancing regulatory stability with technological adaptation. While Joao argues against frequent regulatory changes due to long development cycles, Chris advocates for anticipatory governance – both recognize the need for regulatory approaches that can adapt without creating compliance chaos.


Topics

Legal and regulatory | Infrastructure


IoT devices as unexpected attack vectors in critical systems

Speakers

– Joao Moreno Rodrigues Falcao
– Audience
– Wout de Natris-van der Borght

Arguments

Industrial IoT assessments reveal vulnerabilities through unexpected entry points like air conditioning systems


Security vulnerabilities in IoT devices can be exploited as weapons in warfare, as demonstrated by compromised Chinese cameras in Ukraine


Procurement practices often fail to require secure-by-design IoT devices, creating systemic vulnerabilities


Explanation

There is unexpected consensus that seemingly innocuous IoT devices (air conditioning, cameras, office equipment) represent serious security vulnerabilities that can be exploited for industrial espionage, warfare, and system infiltration – highlighting how everyday devices become critical security concerns.


Topics

Cybersecurity | Infrastructure


Overall assessment

Summary

Strong consensus exists on fundamental IoT security challenges including the quantum threat, lifecycle management gaps, foundational infrastructure dependencies, and disproportionate risks to the Global South. Speakers also agree on the need for better global coordination of standards while recognizing the complexity of balancing regulatory stability with technological adaptation.


Consensus level

High level of consensus on technical security challenges and their global implications, with broad agreement on the urgency of addressing quantum threats and the need for secure-by-design approaches. This strong consensus suggests that the IoT security community has a clear understanding of the primary challenges and can focus efforts on coordinated solutions rather than debating fundamental issues.


Differences

Different viewpoints

Frequency of regulatory updates for emerging technologies

Speakers

– Joao Moreno Rodrigues Falcao
– Chris Buckridge

Arguments

GDPR may need amendments to address AI and IoT developments, though frequent regulatory changes could harm compliance


Anticipatory governance frameworks are needed to develop agile responses to rapidly emerging technologies


Summary

Joao argues against frequent regulatory changes due to 3-year product development cycles making compliance impossible, while Chris advocates for agile anticipatory governance frameworks that can respond quickly to emerging technologies


Topics

Legal and regulatory | Infrastructure


Scope of IoT-specific security challenges

Speakers

– Matthias Hudobnik
– Chris Buckridge

Arguments

OT systems are typically air-gapped with hard real-time requirements, while IoT is IP-based and cloud-connected


IoT differs from traditional IT through machine-to-machine communication, scale of deployment, and reduced user visibility and control


Summary

Matthias focuses on technical distinctions between OT and IoT systems (air-gapped vs connected, timing requirements), while Chris emphasizes the broader systemic differences of IoT from all traditional IT (scale, visibility, user control)


Topics

Infrastructure | Cybersecurity


Unexpected differences

Approach to addressing quantum computing threats

Speakers

– Joao Moreno Rodrigues Falcao
– Matthias Hudobnik

Arguments

Quantum computing will break current RSA and elliptic curve cryptography, requiring urgent transition to post-quantum cryptography


Post-quantum cryptography standards from NIST and IETF are being developed to address quantum threats


Explanation

While both acknowledge the quantum threat, Joao emphasizes the urgency and catastrophic nature of the problem requiring immediate action, while Matthias takes a more measured approach focusing on existing standardization efforts and asking what specific aspects need protection


Topics

Cybersecurity | Infrastructure


Overall assessment

Summary

The discussion showed remarkable consensus on identifying IoT security challenges, with disagreements primarily focused on implementation approaches rather than fundamental problems. Main areas of disagreement centered on regulatory agility versus stability, and the scope of IoT-specific versus general IT security challenges.


Disagreement level

Low to moderate disagreement level. The speakers largely agreed on the fundamental challenges facing IoT security but differed on solutions and approaches. This suggests a mature understanding of the problem space with healthy debate on implementation strategies, which is constructive for developing comprehensive solutions.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers recognize the fragmentation in IoT security standards and the need for better global coordination, with Matthias specifically advocating for DNS-like mutual recognition frameworks.

Speakers

– Joao Moreno Rodrigues Falcao
– Matthias Hudobnik

Arguments

Multiple regulatory frameworks exist (EU Cyber Resilience Act, NIST IoT guidance, various labeling systems) but lack global convergence


Mutual recognition frameworks similar to DNS governance should be promoted for IoT security standards


Topics

Legal and regulatory | Infrastructure


Both speakers distinguish between OT and IoT systems, emphasizing that OT prioritizes availability and operates in isolated environments, while IoT is inherently connected and data-focused.

Speakers

– Matthias Hudobnik
– Joao Moreno Rodrigues Falcao

Arguments

Operational Technology (OT) prioritizes availability above all else, while IoT focuses more on connectivity and data collection


OT systems are typically air-gapped with hard real-time requirements, while IoT is IP-based and cloud-connected


Topics

Infrastructure | Cybersecurity


Both speakers recognize that governance approaches vary based on national contexts and that new, more agile governance frameworks are needed to address rapidly evolving technologies.

Speakers

– Jonathan Cave
– Chris Buckridge

Arguments

Different countries implement different approaches reflecting their position in the technology ecosystem


Anticipatory governance frameworks are needed to develop agile responses to rapidly emerging technologies


Topics

Legal and regulatory | Infrastructure


Takeaways

Key takeaways

IoT devices are becoming critical infrastructure fabric requiring urgent security attention, with 75 billion devices currently deployed, many with default credentials and weak firmware


Quantum computing poses an imminent threat to current encryption standards, requiring immediate transition to post-quantum cryptography to prevent ‘harvest now, decrypt later’ attacks


AI integration in IoT creates both defensive opportunities and new attack vectors, with AI-enhanced attacks particularly threatening under-resourced regions in the Global South


IoT differs fundamentally from traditional IT through machine-to-machine communication, massive scale, reduced user visibility, and lifecycle management challenges


Multiple regulatory frameworks exist globally (EU Cyber Resilience Act, NIST guidance, various labeling systems) but lack convergence and mutual recognition


Supply chain vulnerabilities affect millions of devices through compromised SDKs and cloud dependencies, with attacks evolving from disruption to espionage


Procurement practices often fail to require secure-by-design devices, creating systemic vulnerabilities from the point of acquisition


User attention to IoT security decreases significantly after purchase, making point-of-sale labeling and certification insufficient for long-term security


Digital divide creates unequal vulnerability to cyber attacks, with Global South regions lacking defensive AI capabilities while facing AI-enhanced threats


Resolutions and action items

IS3C to publish comprehensive report on IoT and quantum challenges during the Internet Governance Forum


Continue collaborative work between Dynamic Coalition for IoT and IS3C on resilience of IoT ecosystems


Plan session on emerging technologies and anticipatory governance for Oslo Internet Governance Forum


Promote development of global mutual recognition frameworks similar to DNS governance for IoT security standards


Advance cyber capacity building initiatives with specific focus on Global South regions


Unresolved issues

How to achieve global convergence of fragmented IoT security regulatory frameworks while respecting cultural and regional differences


How to maintain effective security governance as IoT systems become increasingly complex with emergent behaviors that cannot be understood by examining individual components


How to address the legacy problem of vast amounts of encrypted data stored on accessible devices that will become vulnerable to quantum decryption


How to balance innovation with security regulation timing – avoiding both premature stifling of progress and reactive responses to threats


How to ensure continuous user attention and engagement with IoT security throughout device lifecycle, not just at point of purchase


How to manage the carbon footprint and environmental impact of massive IoT deployment while maintaining security and functionality


How to address the fundamental tension between local customization needs and global standardization requirements for IoT security


Suggested compromises

Develop anticipatory governance frameworks that allow agile regulatory responses to emerging technologies without frequent disruptive changes


Create sandbox environments for testing new IoT security approaches while legislation develops at appropriate pace


Implement soft law techniques (labeling, certification, multi-stakeholder agreements) alongside formal regulation to balance flexibility with protection


Pursue natural experiments across different global regions to test various approaches while maintaining interoperability


Focus on universal security principles while allowing cultural and regional particularity in implementation details


Combine secure-by-design requirements with user education and capacity building rather than relying solely on either approach


Thought provoking comments

You’re going to buy a car and the salesman is at the top of a mountain. You get in by the car, you drive away and all of a sudden in your back mirror, while you’re driving comfortably down, faster and faster… we should be having this when you never buy a car or a plane or a train without these sort of measures in place that we don’t have on the internet.

Speaker

Wout de Natris-van der Borght


Reason

This vivid analogy powerfully illustrates the fundamental disconnect between safety expectations in physical products versus digital systems. It challenges the audience to question why we accept lower security standards for internet-connected devices when we wouldn’t accept unsafe vehicles.


Impact

This metaphor set the tone for the entire discussion by establishing the urgency and absurdity of current IoT security practices. It provided a memorable framework that other speakers referenced throughout, with Wout later extending the metaphor about ‘running down the mountain with the brake in our hand’ and eventually ‘never seeing the mountain again.’


What is really specific to IoT compared to OT and IT because lifecycle management, etc, governance, those are all common cyber security things. What is really specific to IoT?

Speaker

Frederic Taas


Reason

This question cut through the technical jargon to demand clarity on what makes IoT uniquely challenging. It forced speakers to move beyond generic cybersecurity discussions to identify the specific vulnerabilities and characteristics that distinguish IoT from other technologies.


Impact

This question became a recurring theme that multiple speakers addressed throughout the session. It led to detailed explanations about scale, attention gaps, machine-to-machine communication, and the ‘fabric’ nature of IoT integration into society. The question elevated the discussion from general security concerns to IoT-specific challenges.


We invaded the system by its air conditioning equipments because they were very poorly secured and actually they were strong and we had computational power to use it as a bridge to target attacks inside the company and well no one cares about the air conditioning so this is the risk.

Speaker

Joao Moreno Rodrigues Falcao


Reason

This real-world example perfectly encapsulates the ‘invisible IoT’ problem – devices that are connected but forgotten, creating unexpected attack vectors. It demonstrates how mundane, overlooked devices can become sophisticated entry points for cybercriminals.


Impact

This anecdote provided concrete evidence for the theoretical concerns discussed earlier. It reinforced the attention gap problem that Jonathan Cave later elaborated on, showing how devices we don’t think about daily become our greatest vulnerabilities. The story made the abstract security concerns tangible and memorable.


The attention that we pay to these devices, the extent to which we rely on them, and the complexity of the ecosystem and its emergent behaviors, all of these things are different… When you buy a car, you think about these things in a very overt way… When it comes to deciding, do I drive here or drive there, all of that goes out of the window.

Speaker

Jonathan Cave


Reason

This insight reveals a fundamental flaw in how we approach IoT security – the disconnect between purchase-time security consciousness and usage-time security negligence. It introduces the concept of ’emergent behaviors’ in complex IoT ecosystems that cannot be predicted from individual device analysis.


Impact

This comment shifted the discussion from technical solutions to human behavioral factors and system complexity. It introduced the critical concept that security measures effective at point-of-sale become irrelevant during actual device usage, challenging the entire premise of current labeling and certification approaches.


Countries which see themselves primarily as creating the technologies or as providing the services will balance the competing interests in different ways than countries that primarily use the services… the needs of the Global South and the way the Global South adopts these devices… may be very different.

Speaker

Jonathan Cave


Reason

This observation highlights how global power dynamics and economic positions influence IoT security priorities. It challenges the assumption that one-size-fits-all security solutions can work globally, introducing the critical dimension of technological colonialism and adaptation needs.


Impact

This comment broadened the discussion beyond technical and regulatory issues to include geopolitical and socioeconomic factors. It connected with Chris Buckridge’s points about digital divides and led to deeper consideration of how IoT security solutions must account for different global contexts and capabilities.


At the beginning of the full-scale invasion of Russian Federation in Ukraine, in Ukraine there are a lot of Chinese production video cameras set for public security in different places, and the Russian Federation used vulnerabilities in these cameras… these cameras could be a weapon in the war.

Speaker

Alexander Savchuk


Reason

This real-world example of IoT devices being weaponized in warfare demonstrates the most extreme consequences of IoT vulnerabilities. It shows how civilian infrastructure IoT devices can become military assets for hostile actors, elevating the discussion from privacy concerns to national security threats.


Impact

This comment dramatically escalated the stakes of the IoT security discussion, moving it from individual privacy and corporate security to matters of national defense and warfare. It provided stark evidence for Maartin’s earlier point that ‘anything that can serve us can be weaponized against us too.’


If we see users of networks in the Global South or in under-resourced areas, under-served areas that don’t have access to the defence capabilities that AI provides, then their vulnerability to AI-enhanced attacks is so much greater.

Speaker

Chris Buckridge


Reason

This insight reveals how AI creates a ‘security arms race’ where defensive AI capabilities become essential for protection against AI-enhanced attacks, but these defenses require resources that create new forms of digital inequality.


Impact

This comment introduced a new dimension to the digital divide discussion – not just access to technology, but access to AI-powered security defenses. It connected the IoT security discussion to broader themes of global equity and highlighted how emerging technologies can exacerbate existing inequalities.


Overall assessment

These key comments transformed what could have been a routine technical discussion into a multifaceted exploration of IoT security challenges. The discussion evolved from basic security concerns to encompass human behavioral factors, geopolitical implications, warfare applications, and global equity issues. The most impactful comments used vivid analogies and real-world examples to make abstract concepts tangible, while others challenged fundamental assumptions about how we approach IoT security. Together, they created a comprehensive picture of IoT security as not just a technical problem, but a complex socio-technical challenge requiring solutions that account for human psychology, global power dynamics, economic disparities, and the emergent properties of complex systems. The discussion successfully moved beyond the typical ‘patch and pray’ approach to IoT security toward a more nuanced understanding of the systemic changes needed to address these challenges.


Follow-up questions

What is specific to IoT compared to OT (Operational Technology) and IT in terms of cybersecurity challenges?

Speaker

Frederic Taas


Explanation

This question seeks to understand the unique security characteristics and vulnerabilities that distinguish IoT devices from traditional IT systems and operational technology, which is important for developing targeted security approaches.


Should GDPR be developed or amended according to the development of new information technologies like AI and IoT?

Speaker

Alexander Savchuk


Explanation

This addresses the need to evaluate whether current data protection regulations are adequate for emerging technologies or require updates to remain effective and relevant.


How are we prepared for quantum computing risks that could decrypt currently encrypted IoT data, and how can we prevent this future threat?

Speaker

Marijana Puljak


Explanation

This highlights the urgent need to understand and prepare for post-quantum cryptography challenges, especially given the ‘harvest now, decrypt later’ threat where encrypted data collected today could be vulnerable to future quantum attacks.


How can global convergence of IoT security policy frameworks be achieved given the fragmented landscape of standards (ISO, ETSI, EU Cyber Resilience Act, US NIST, APAC labeling systems)?

Speaker

Joao Moreno Rodrigues Falcao


Explanation

This addresses the critical need for international coordination and harmonization of IoT security standards to ensure global interoperability and consistent protection levels.


How can we ensure IoT security solutions don’t exacerbate the digital divide, particularly affecting Global South and under-resourced areas?

Speaker

Chris Buckridge


Explanation

This explores the equity implications of cybersecurity measures, ensuring that security solutions are accessible and don’t create additional barriers for underserved populations.


How can anticipatory governance frameworks be developed to address rapidly emerging IoT and AI technologies?

Speaker

Chris Buckridge


Explanation

This focuses on developing agile regulatory and policy responses that can keep pace with technological advancement without stifling innovation.


How can we address the attention and complexity challenges in IoT systems where users interact with devices through simplified interfaces like biometrics?

Speaker

Jonathan Cave


Explanation

This examines the human factors in IoT security, particularly how simplified user interactions may create new vulnerabilities and reduce security awareness.


How can we ensure secure lifecycle management for IoT devices that may remain deployed for years without updates?

Speaker

Matthias Hudobnik


Explanation

This addresses the long-term security maintenance challenge for IoT devices that often lack proper update mechanisms and may become vulnerable over their extended operational lifespans.


How can we address the carbon footprint implications of widespread IoT deployment while maintaining security and functionality?

Speaker

Maartin Botterman


Explanation

This explores the environmental sustainability aspects of IoT systems, balancing security needs with environmental responsibility in device manufacturing, deployment, and disposal.


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.