{"id":3399,"date":"2025-02-10T13:56:33","date_gmt":"2025-02-10T13:56:33","guid":{"rendered":"https:\/\/www.icegov.org\/2025\/?page_id=3399"},"modified":"2026-03-19T10:14:41","modified_gmt":"2026-03-19T10:14:41","slug":"track-2","status":"publish","type":"page","link":"https:\/\/www.icegov.org\/2026\/track-2\/","title":{"rendered":"Track 2"},"content":{"rendered":"\n<h2 class=\"wp-block-heading container\">Track 2: Securing Digital Governance: Privacy, Cybersecurity, and Sovereignty for the Future<\/h2>\n\n\n\n<p class=\"container\">Privacy, cybersecurity, and digital sovereignty are increasingly important topics in digital governance. With more affordable technologies for handling significant volumes of data being available, government organisations worldwide are striving for more data-driven operations. Data from various types of digital infrastructure (such as IoTs), as well as data on citizens and their behaviours, is sometimes described as the &#8220;new oil&#8221; in society. With this kind of data, new and improved public services can potentially be created. However, increased use and manipulation of various data types also bring critical challenges, including ethics-related questions regarding citizens&#8217; right to privacy, national and regional control over critical data infrastructure, systems resilience, and information security, as well as governance mechanisms for operational resilience, crisis response, and continuity of digital public services. <\/p>\n\n\n\n<p class=\"container\">This Track invites empirical studies, conceptual papers, and case-based evidence that address privacy, sovereignty, security, and digital governance. Contributions may examine the ethical use and safeguarding of data, as well as technical and operational approaches to protecting privacy and ensuring cyber resilience. We encourage submissions that explore cybersecurity issues, such as protecting critical infrastructure, mitigating data breach risks, and addressing vulnerabilities in IoT systems. Additionally, papers investigating how privacy, cybersecurity, and\/or digital sovereignty considerations can be embedded into operational digital governance frameworks and translated into real-world regulatory and institutional practices are particularly welcome.<\/p>\n\n\n\n<div class=\"wp-block-group container\" style=\"margin-top:0;margin-bottom:0;padding-bottom:0px\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:600px\"><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Track Chairs<\/h2>\n\n\n\n<div class=\"wp-block-group container\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\" style=\"padding-bottom:36px\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n    <a class=\"link_no_decoration\" href=\"https:\/\/www.icegov.org\/2026\/person\/anees-ara\/\">\n        <div class=\"avatar vertical round\">\n            <div class=\"placeholder\">\n                <img decoding=\"async\" alt=\"avatar\" src=\"https:\/\/www.icegov.org\/2026\/wp-content\/uploads\/sites\/22\/2026\/03\/Anees-Ara.png\">\n            <\/div>\n            <div class=\"main_description\">\n                                <h4>Anees Ara<\/h4>\n                <p class=\"xsmall regular\">Assistant Professor<\/p>\n                <p class=\"medium regular\">Prince Sultan University<\/p>\n                <p class=\"medium regular\">Saudi Arabia<\/p>\n                                    <p class=\"xsmall regular\"><\/p>\n                            <\/div>\n        <\/div>\n    <\/a>\n    \n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n    <a class=\"link_no_decoration\" href=\"https:\/\/www.icegov.org\/2026\/person\/meeyoung-cha\/\">\n        <div class=\"avatar vertical round\">\n            <div class=\"placeholder\">\n                <img decoding=\"async\" alt=\"avatar\" src=\"https:\/\/www.icegov.org\/2026\/wp-content\/uploads\/sites\/22\/2026\/03\/Meeyoung-Cha.png\">\n            <\/div>\n            <div class=\"main_description\">\n                                <h4>Meeyoung Cha<\/h4>\n                <p class=\"xsmall regular\">Scientific Director<\/p>\n                <p class=\"medium regular\">Max Planck Institute for Security and Privacy (MPI-SP)<\/p>\n                <p class=\"medium regular\">Germany<\/p>\n                                    <p class=\"xsmall regular\"><\/p>\n                            <\/div>\n        <\/div>\n    <\/a>\n    \n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n    <a class=\"link_no_decoration\" href=\"https:\/\/www.icegov.org\/2026\/person\/suliman-mohamed-fati\/\">\n        <div class=\"avatar vertical round\">\n            <div class=\"placeholder\">\n                <img decoding=\"async\" alt=\"avatar\" src=\"https:\/\/www.icegov.org\/2026\/wp-content\/uploads\/sites\/22\/2026\/02\/Suliman-Fati.png\">\n            <\/div>\n            <div class=\"main_description\">\n                                <h4>Suliman Mohamed Fati<\/h4>\n                <p class=\"xsmall regular\">Associate Professor<\/p>\n                <p class=\"medium regular\">Prince Sultan University<\/p>\n                <p class=\"medium regular\">Saudi Arabia<\/p>\n                                    <p class=\"xsmall regular\"><\/p>\n                            <\/div>\n        <\/div>\n    <\/a>\n    \n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Track 2: Securing Digital Governance: Privacy, Cybersecurity, and Sovereignty for the Future Privacy, cybersecurity, and digital sovereignty are increasingly important topics in digital governance. With more affordable technologies for handling significant volumes of data being available, government organisations worldwide are striving for more data-driven operations. Data from various types of digital infrastructure (such as IoTs), [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3399","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.icegov.org\/2026\/wp-json\/wp\/v2\/pages\/3399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icegov.org\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.icegov.org\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.icegov.org\/2026\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icegov.org\/2026\/wp-json\/wp\/v2\/comments?post=3399"}],"version-history":[{"count":9,"href":"https:\/\/www.icegov.org\/2026\/wp-json\/wp\/v2\/pages\/3399\/revisions"}],"predecessor-version":[{"id":6728,"href":"https:\/\/www.icegov.org\/2026\/wp-json\/wp\/v2\/pages\/3399\/revisions\/6728"}],"wp:attachment":[{"href":"https:\/\/www.icegov.org\/2026\/wp-json\/wp\/v2\/media?parent=3399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}