• pragueconference@nukib.gov.cz

18 March 2025

Main Hall

9:00 - 9:30

9:30 - 10:30

11:00 – 11:15

11:15 – 12:15

This panel will bring together cybersecurity experts from various sectors to address the covert cyber tactics, or ‘Shadow Ops’, that China uses in Western countries. The discussion will combine insights from research, policy, and technical defence to reveal how these covert tactics exploit vulnerabilities to infiltrate Western infrastructure and institutions.

 

Panellists will analyze recent cyber incidents and discuss strategies to uncover and counteract these covert interferences, offering a deeper insight into the unseen risks that threaten our core systems.

12:15 – 13:15

13:15 – 14:30

In a rapidly evolving digital environment where IoT devices have become an integral part of our lives, innovation and cybersecurity must go hand in hand. Integrating security measures into products, from design to deployment, is essential to boost user confidence and to ensure resilience against evolving threats.

 

This panel brings together experts in cybersecurity and regulatory affairs to provide a comprehensive view of approaches to Security by Design across different regions around the world, such as the EU Cyber Resilience Act, as well as insights into their practical implementation. Panellists will discuss the challenges and strategies for aligning product security measures within these frameworks, given the complexities of cross-border compliance and possible impacts on global markets.

15:00 – 16:00

Satellite systems are an indispensable part of the everyday function of society, including navigation systems, communication systems, agriculture, and military applications. It is essential for users in Europe and elsewhere to be prepared for the possible crisis. One way to ensure continuity particulary at government and critical infrastructure level is to promote the use of robust and encrypted satellite services.

 

They consist of information systems and operate through cyberspace, ensuring their cyber-security is of paramount importance. The increasing reliance on satellite networks for military, financial, and civilian operations make them high-value targets which is why their protection from cyber threats ensures the continuity of critical infrastructure and national security. Without robust cybersecurity measures, satellites could become vulnerable to interferences that could lead to dire consequences.

 

How can we improve the cyber resilience of satellite systems to better protect them from cyber attacks? How can international collaboration improve this protection of satellite systems?

16:00 – 17:00

A new era is emerging in which data has become a powerful tool, often used for strategic purposes. The dominance of data is changing the face of global security and national sovereignty, and its importance in the geopolitical stage is increasing growing. The  growing rivalry between the West and China is fundamentally driven by technology — and by data itself. Once primarily a matter of national interest, data now influences of national security, trade, global supply chains, and technological dominance, and forms the bases of nation state resilience and strategy.

 

What challenges do states face in gathering and using data to enhance their military, technological superiority, and strategic influence? How does data affect national security today, and how will it affect the future? What tools does the West have to defend against China’s large-scale data collection, analytics, and AI programs?  And how can we counter nation-state and state-sponsored efforts to secure a technological advantage through data collection on critical assets and technologies?

Conference Room

11:00 - 12:15

Partners´ stage

12:15 – 13:15

13:15 – 14:30

Cyber threats against the telecommunications sector are on the rise, posing risks to global communication networks. On these ‘invisible frontlines‘, cybersecurity professionals face the challenge of securing complex infrastructure from sustained and increasingly sophisticated attacks.

 

This session will bring together telecommunications and cybersecurity leaders to explore strategies for identifying and mitigating risks, securing the supply chain, and strengthening the resilience of telecommunications systems against invisible cyber adversaries.

15:00 – 15:45

Join us for an engaging fireside chat featuring speakers with first-hand experience and addressing how Iran and its proxies are using cyberspace for strategic operations. This session will reveal how Iran uses cyber warfare, including espionage, disinformation campaigns, and disruptive attacks and highlight the technology and infrastructure supporting these activities.

 

Experts will discuss the geopolitical motivations behind these digital threats, the challenges they pose to global security, and strategies for effective defence. Gain unique perspectives from directly affected regions and understand the critical intersection of technology and terror shaping today’s international cybersecurity dynamics.

15:45 – 17:00

Join a dynamic roundtable on capacity building in cybersecurity with a variety of experts from different sectors in Latin America, Indo-Pacific, Africa and Europe. This discussion will explore the different strategies and frameworks used to strengthen cybersecurity resilience, from national policy initiatives and regional cooperation to grassroots and community-led efforts.

 

Speakers will compare approaches tailored to unique regional challenges and highlight successes, lessons learned, and areas for innovation. Gain a deeper understanding of how different regions address the evolving cyber threat landscape and discover opportunities for international cooperation and knowledge sharing to build robust cybersecurity ecosystems.

18:00 - 00:00

Červený Jelen

Join global leaders, representatives and experts from the government and private sector, as well as research and academic institutions from like-minded nations.

A set of recommendations on both technical and non-technical risks that States should consider when planning, building, launching and operating their infrastructure.
The Prague 5G Repository is a virtual library dedicated to the exchange of existing approaches, tools, instruments and frameworks in the field of 5G security.
In the case you wish to access the Prague 5G Repository, please contact us at pragueconference@nukib.cz

The access to the Prague 5G Repository is limited to participating States and organizations.

For any inquiries please email us

pragueconference@nukib.gov.cz

Let's Connect