Encryption Advocates Council Takes a Stand for Privacy: Global Encryption Day 2024 Activities Announced.

ged2024-screen-image

The Encryption Advocates Council (EAC), a non-profit organization under the umbrella of DNS Africa Media and Communications, is gearing up for Global Encryption Day 2024 with a robust lineup of activities. This year’s theme, “End-to-End Encryption: The Need to Protect It,” underscores the importance of safeguarding this critical technology in the digital age.

Prior Registration:

  • Attendees can register for the online webinar via the official website: https://encrypting.africa/ged/
  • Additionally, a select group who have completed the “Internet Society Learning Platform on Encryption” course will receive an exclusive invitation to participate in a physical roadshow event within an academic community.
  • All participants will receive certificates upon completion.

Day One: Setting the Stage for Encryption Advocacy

Global Encryption Day 2024 kicks off with a thought-provoking presentation on “End-to-End Encryption: The Need to Protect It.” This session will delve into the concept of end-to-end encryption, how it works, and its real-world applications. Additionally, the presenter will unveil informative printed materials that will be available online for free distribution.

Day Two: Hitting the Road for Education and Advocacy

The highlight of GED 2024 is a comprehensive roadshow designed to foster dialogue, education, and advocacy around end-to-end encryption. Held within an academic community, this event will bring together students, faculty, and interested individuals to discuss the importance of strong encryption practices.

The Roadshow Agenda:

  • Introduction (10 minutes): Welcoming remarks, an overview of GED, and the webinar’s objectives.
  • Understanding End-to-End Encryption (20 minutes): Defining and explaining the technology, its mechanics, and real-world applications.
  • The Importance of End-to-End Encryption (20 minutes): Exploring how this technology protects individual privacy, data security, online trust, and freedom of expression.
  • Threats to End-to-End Encryption (20 minutes): Discussing government surveillance, cyber threats, and public misconceptions surrounding encryption.
  • Case Studies and Best Practices (20 minutes): Showcasing successful implementations, challenges faced, and recommended practices for individuals and organizations.
  • Panel Discussion (30 minutes): A panel of experts will delve into the future of end-to-end encryption followed by a Q&A session with the audience.
  • Closing Remarks (5 minutes): Recap of key points, a call to action, and information on resources and follow-up.

Beyond the Event:

Following the event, a comprehensive report summarizing the discussions and outcomes will be compiled and published.

This comprehensive approach signifies the EAC’s commitment to raising awareness about the vital role of end-to-end encryption in our digital world. By educating individuals, fostering dialogue within communities, and advocating for strong encryption practices, the EAC strives to create a more secure and private online environment for all.

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

WP Twitter Auto Publish Powered By : XYZScripts.com
Skip to content