Welcome to the Official Schedule for RightsCon Toronto 2018. This year’s program, built by our global community, is our most ambitious one yet. Within the program, you will find 18 thematic tracks to help you navigate our 450+ sessions.
Build your own customized RightsCon schedule by logging into Sched (or creating an account), and selecting the sessions that you wish to attend. Be sure to get your ticket to RightsCon first. You can visit rightscon.org for more information.
To createIf you’ve created a profile with a picture and bio, please allow a few hours for the RightsCon team to merge it with your existing speaker profile.
Last updated: Version 2.3 (Updated May 15, 2018).
Increasingly, sophisticated spyware is used to target activists, journalist and human rights defenders around the globe. What happens from that first encounter with a malicious link or suspicious code? There are organizations and helplines which can assist in regaining control and security, and there are those who can help analyze where the code came from, archive it… and then there are those who publish comprehensive analytical reports, and those who hold the companies and vendors behind the technology accountable.
This roundtable session aims to bring together some of the experts behind this work, and really bring RightsCon attendees a closer look at the reporting chain, and how they can contribute. From the frontlines to the world’s capitals – we will look at what is available to civil society and its many actors in holding businesses and governments accountable for their actions.