• pragueconference@nukib.gov.cz

18 March 2025

Main Hall

9:00 - 9:30

9:30 - 10:30

11:00 – 11:15

11:15 – 12:15

This fireside chat will bring together representatives
from Ukraine and its backers to discuss keylessons
learned from the ongoing conflict in Ukraine,
focusingon cybersecurity.

 

Panelists will explore how Ukraine has strengthened
its cyber resilience in response to ongoing threats
and discuss how countries not directly involved
in the conflict, but still impacted by its cyber fallout,
have adapted their security strategies.

12:15 – 13:15

13:15 – 14:30

In a rapidly evolving digital landscape where IoT
devices have become an integral part of our lives,
innovation and cybersecurity must go hand in hand.
To foster user trust as well as to ensure resilience
against evolving threats, embedding security
measures in products from design to deployment
is essential.


This panel brings together experts in cybersecurity
and regulatory affairs to provide a comprehensive
look at approaches to Security by Design across
different regions worldwide, such as the EU Cyber
Resilience Act, as well as insights into their practical
implementation.

 

Panelists will examine the challenges
and strategies for aligning product security measures
within these frameworks, considering the complexities
of cross-border compliance and possible impacts on
global markets.

15:00 – 16:00

Satellite systems are now an indispensable part of the everyday
function of society, among others navigation systems,
communication systems, agriculture, and military usage.

 

It is essential for the users either in Europe or anywhere else to be
prepared for the possible crisis. One way to ensure continuity
especially on the governmental and critical infrastructure level is
to support the use of the robust and encrypted satellite services.
For they consist of information systems and operate through
cyberspace, ensuring their cyber security is of paramount
importance. The increasing reliance on satellite networks
for military, financial, and civilian operations make them
high-value targets which is why their protection from cyber
threats ensures the continuity of critical infrastructure and
national security. Without robust cyber security measures,
satellites could become vulnerable to interferences leading
to dire consequences.


How can we improve cyber resilience of satellite systems
to better protect them from cyberattacks? How can
international collaboration improve such protection
of satellite systems?

16:00 – 17:00

A new era is unfolding in which data has become a powerful tool, often weaponized for strategic
gain. Data dominance is reshaping the landscape of global security and national sovereignty, with its importance in the geopolitical arena continually growing. The intensifying rivalry between the Westand China is fundamentally driven by technology — and by data itself. Once primarily a matter ofnational interest, data now influences of national security, business, global supply chains, and technological supremacy, forming the foundation of resilience and strategy for nation-states.

 

What challenges do nations face in gathering and leveraging data to enhance their military, technological edge, and strategic influence?

 

How does data inform national security today, and how will it shape the future? What tools does
the West have to defend against China’s large-scale programs in data collection, analytics, and AI?

 

And how can we counter nation-state and state-sponsored efforts to secure a technological advantage through data collection on critical assets and technologies?

Conference Room

11:00 - 12:15

The energy sector creates the backbone of today’s economy and
delivery of essential services, andits cybersecurity stands as one
of the critical parts of its functionality. Having their energy
sectorsincreasingly targeted by Russian, Chinese and Iranian
malicious cyber activity, states have developed many initiatives
aiming to protect better and defend their energy sectors.

 


Are energy-specific principles and regulations, such as the new
EU Network Code on cybersecurity for the electricity sector,
G7’s cybersecurity frameworkfor operational technologies in
energy systems, or the Supply Chain Cybersecurity Principles
of the US DOE, an upcoming trend?

12:15 – 13:15

13:15 – 14:30

Cyber threats against the telecommunications
sector are on the rise, posing risks to global
communication networks. On these “invisible
frontlines,” cybersecurity professionals face the
challenge of securing complex infrastructure from
persistent and increasingly sophisticated attacks.

This session brings together telecom and cyberse-
curity leaders to explore strategies for identifying
and mitigating risks, securing the supply chain,
and strengthening the resilience of telecom
systems against unseen cyber adversaries.

15:00 – 15:45

Join us for a compelling fireside chat featuring speakers with
first-hand experience, exploring how Iran and its proxies leverage
cyberspace for strategic operations. This session will unpack
Iran’s use of cyber warfare, including espionage, disinformation
campaigns, and disruptive attacks, highlighting the technology
and infrastructure driving these activities.

Experts will discuss the geopolitical motivations behind these
digital threats, the challenges they pose to global security, and
strategies for effective defence. Gain unique perspectives from
regions directly impacted and understand the critical intersection
of technology and terror shaping today’s international cybersecu-
rity dynamics.

15:45 – 17:00

Engage with a diverse panel of experts from
different sectors across Latin America,
the Indo-Pacific, Africa, and Europe for a dynamic
roundtable on cybersecurity capacity building.
This discussion will explore various strategies
and frameworks used to strengthen cybersecurity
resilience, from national policy initiatives
and regional collaboration to grassroots
and community-led efforts.

Speakers will compare approaches tailored to
unique regional challenges, highlighting successes,
lessons learned, and areas for innovation. Gain
a deeper understanding of how different regions
address the evolving cyber threat landscape
and discover opportunities for international
cooperation and knowledge sharing in building
robust cybersecurity ecosystems.

18:00 - 00:00

Červený Jelen

Join global leaders, representatives and experts from the government and private sector, as well as research and academic institutions from like-minded nations.

A set of recommendations on both technical and non-technical risks that States should consider when planning, building, launching and operating their infrastructure.
The Prague 5G Repository is a virtual library dedicated to the exchange of existing approaches, tools, instruments and frameworks in the field of 5G security.
In the case you wish to access the Prague 5G Repository, please contact us at pragueconference@nukib.cz

The access to the Prague 5G Repository is limited to participating States and organizations.

For any inquiries please email us

pragueconference@nukib.cz

Let's Connect