Institute of Information Security Issues, Lomonosov Moscow State University


Digital Report


Agenda of the 16th Scientific Conference of the International Information Security Research Consortium and the 12th International Forum «Partnership of State Authorities, Civil Society and the Business Community in Ensuring International Information Security» (Garmisch-2018), dated April 11, 2018.

On April 10, 2018, the National Association for International Information Security (NAIIS) was established in Russia. The Constituent Assembly of the Association was held in the Main Building of the Lomonosov Moscow State University (TASS News Agency).

Draft Agenda of the 16th International Information Security Research Consortium Conference.

Information message №1 of the 16th International Information Security Research Consortium Conference.

Timetable of the meetings of the 16th International Information Security Research Consortium Conference.

Go to All news


The 16th International Information Security Research Consortium Conference

Timing of meeting: 16-19 April 2018
Venue: Garmisch-Partenkirchen, Munich, Germany

  The next IISRC Conference is scheduled to be held in the course of the Twelfth International Forum "State, Civil Society and Business Partnership on International Information Security"
Information message №1
Timetable of the meetings
Draft Agenda Garmish 2018

About Consortium

  International Information Security Research Consortium (IISRC) established - April 25, 2010 in Germany

Ceremony of signing the Declaration (Germany, Garmisch-Partenkirchen)

Consortium List of priorities and research projects:

Escalatory Models: Development of shared models of escalation in cyber conflict, including definitions of hostility levels;

Civilian Infrastructures: International legal status of civilian cyber infrastructures in the context of peace or war;

Cyber Definitions: Definitions of information warfare and cyber defense topics;

Cyber Law: International legal frameworks to increase stability of intergovernmental relations and promote orderly international economic processes;

Codes of Conduct: Development of shared norms for behavior in cyber space for individuals, countries and non-state actors;

Cyber Terrorism: International agreements to counter non-state actors seeking to launch cyber attacks on countries or provoke conflicts among countries using cyber means;

Cyber Crime: Legal and technical coordination against cyber crime;

Technical Cooperation: International mutual assistance across public and private spheres to improve cyber situational awareness, enhance protection of critical infrastructures and respond to significant cyber failures or attacks;

Protection of the Commons: Framework to separate technical architectures and operation of cyber space from economic and political issues and provide separate mechanisms on the technical plane or the political economic level for resolving differences or marshalling international cooperation;

Industrial Espionage: International legal framework for industrial espionage whether sponsored by states or whether its fruits are purchased on criminal black markets by states.

Adaptation of International Law to Conflicts in the Information Space;

Information Security of Critical Infrastructure.


Интервью с директором НИИ информационной безопасности и криптологии ЕНУ им. Л.Н.Гумилева, Членом общественного совета МОАП РК Ержаном Сейткуловым.

20 лет поиска государственной границы в виртуальной реальности.

Стратегия кибервойны: главные цели атак (о кибератаках на объекты критичной информационной инфраструктуры).

Руководитель группы Проблем информационной безопасности ЦМБ ИМЭМО РАН им. Е.М. Примакова Н.П. Ромашкина о роли России в процессе обеспечения международной информационной безопасности.

Краткий комментарий и предложения к п.13 Доклада Группы правительственных экспертов по достижениям в сфере информатизации и телекоммуникаций в контексте международной безопасности (70-я сессия Генеральной Ассамблеи ООН, 22 июля 2015 года, A/70/174).

Discussion paper "Recurring questions pertaining to the possible military dimensions of cyber warfare" Maurizio Martellini, Sandro Gaycken, Clay Wilson

"Internet Sovereignty" Sanjay Goel

Go to All publications