addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscontroller-playcrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupshelp-with-circleimageimagesinstagramFill 1light-bulblinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1ShapeoutlookpersonJoin Group on CardStartprice-ribbonprintShapeShapeShapeShapeImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruserwarningyahoo

Strategies for Digital Security in Development Projects

  • May 17, 2014 · 10:30 AM
  • This location is shown only to members

Information and communication technology for development (ICT4D) projects are growing in size and impact while also becoming more susceptible to a broad range of cyber intrusions and security threats. Development workers today are expected to use online tools and implement technology projects on tight budgets, which oftentimes leaves security issues unaddressed.

To fill that gap, Appropriate IT and CommunityRED together with IREX and the ISC Project present a secure technology symposium:

Strategies for Digital Security in Development Projects
Saturday May 17, 2014 | 10:30 am - 2:30 pm
1275 K Street NW, Suite 600, Washington DC | coffee + lunch provided

This ICT4D symposium explores best practices, frameworks, and guidelines to tackle security risks while also addressing the larger funding and training concerns.


10:00 – 10:30 am: Sign in

10:30 – 10:45 am: Keynote
Patrick Settle, ICT Director, IREX

10:45 – 11:30 am: Security Assessment on a Real-World ICT4D Project: Recommendations for Janani, a crowdsourcing and engagement platform
Ian Schuler (Development Seed), Karen Reilly (Tor Project), Kody Leonard  (ISC Project), & Usha Venkatachallam (Appropriate IT) 

11:30 – 11:45 am: Coffee Break 

11:45 am – 12:45 pm: Breakout Session I
Balancing what is possible and what is safe
Karen Reilly (Tor Project) & Oktavía Jónsdóttir (IREX)

Basic security training for partners and staff members of local organizations
Dlshad Othman (ISC Project), Kody Leonard  (ISC Project), Jon Camfield (Internews), & Pablo Arcuri (Internews)

12:45 pm - 1:30 pm: Lunch & Science Fair

1:30 pm - 2:30 pm: Breakout Session II
Security considerations while building “open” systems
Rob Baker (Ushahidi) & Runa Sandvik (Center for Democracy & Technology)

How to make the case for security in ICT4D projects with donors and agencies
Betsy Bramon (DRL) & Katrin Verclas (

2:30 - 2:35 pm: Concluding Remarks
Shauna Dillavou (Community RED)

Join or login to comment.

  • Jim T.

    Enjoyed the morning session. Then went out to plug the parking meter and couldn't get back in.

    Years of Internetworking and hosting and the most vexing issue I have is not really knowing who I am talking to. The most viable means I can think of is my signing others personal certificates. If I get one with my signature I can question my own due diligence.

    Biggest issue I have with Drupal clients is that they often want custom code. With several security updates per month per site, the labor required to keep sites with custom code up to date is enormous.

    Anyone know of a simple Atom wrapper for forms?

    1 · May 17, 2014

  • Iskra P.

    Is there a possibility to follow this online or receive the recorded version?

    1 · May 16, 2014

    • Usha V.

      Hi Moi, yes, the event is free. And your friend is welcome to attend.

      May 16, 2014

    • Moi


      May 17, 2014

  • Demba

    Mankind thus inevitably sets itself only such tasks as it is able to solve, since closer examination will always show that the problem itself arises only when the material conditions for its solution are already present or at least in the course of formation. Dixit Karl Marx 1859 A Contribution to the Critique of Political Economy…

    Technological advances do not only improve capabilities for legit business, they are also tools that can be used too by those with malicious intent. Growing third-party threats then becomes the norm: illegitimate exploitation of computer systems & infrastructures has established its own industry within the matrix, network attacks and security breaches are sold as a service from Hyderabad to Malawi passing by Jordan...

    Speaking both from a liability & accountability standpoint, critical data integrity assessment pave us the way to adoption of first, a mindset & second, an attitude, towards any given strategy for digital security in development projects…

    May 16, 2014

  • chris m.

    wow I am not sure about the security perspective but the opportunity to see usha from ai and someone from usahidi speak -absolutely vaut le voyage -thanks

    1 · May 16, 2014

  • Demba

    Do look forward to attending and sharing my perspectives on ICT and cyber liability...

    May 11, 2014

Our Sponsors

  • Appropriate IT

    ICT4D Washington DC meetup is sponsored by Appropriate IT (AI).

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy