Main Hall
9:00 - 9:30
9:30 - 10:30
11:00 – 11:15
11:15 – 12:15
This panel will bring together cybersecurity experts from various sectors to address the covert cyber tactics, or ‘Shadow Ops’, that China uses in Western countries. The discussion will combine insights from research, policy, and technical defence to reveal how these covert tactics exploit vulnerabilities to infiltrate Western infrastructure and institutions.
Panellists will analyze recent cyber incidents and discuss strategies to uncover and counteract these covert interferences, offering a deeper insight into the unseen risks that threaten our core systems.
12:15 – 13:15
13:15 – 14:30
In a rapidly evolving digital environment where IoT devices have become an integral part of our lives, innovation and cybersecurity must go hand in hand. Integrating security measures into products, from design to deployment, is essential to boost user confidence and to ensure resilience against evolving threats.
This panel brings together experts in cybersecurity and regulatory affairs to provide a comprehensive view of approaches to Security by Design across different regions around the world, such as the EU Cyber Resilience Act, as well as insights into their practical implementation. Panellists will discuss the challenges and strategies for aligning product security measures within these frameworks, given the complexities of cross-border compliance and possible impacts on global markets.
15:00 – 16:00
Satellite systems are an indispensable part of the everyday function of society, including navigation systems, communication systems, agriculture, and military applications. It is essential for users in Europe and elsewhere to be prepared for the possible crisis. One way to ensure continuity particulary at government and critical infrastructure level is to promote the use of robust and encrypted satellite services.
They consist of information systems and operate through cyberspace, ensuring their cyber-security is of paramount importance. The increasing reliance on satellite networks for military, financial, and civilian operations make them high-value targets which is why their protection from cyber threats ensures the continuity of critical infrastructure and national security. Without robust cybersecurity measures, satellites could become vulnerable to interferences that could lead to dire consequences.
How can we improve the cyber resilience of satellite systems to better protect them from cyber attacks? How can international collaboration improve this protection of satellite systems?
16:00 – 17:00
A new era is emerging in which data has become a powerful tool, often used for strategic purposes. The dominance of data is changing the face of global security and national sovereignty, and its importance in the geopolitical stage is increasing growing. The growing rivalry between the West and China is fundamentally driven by technology — and by data itself. Once primarily a matter of national interest, data now influences of national security, trade, global supply chains, and technological dominance, and forms the bases of nation state resilience and strategy.
What challenges do states face in gathering and using data to enhance their military, technological superiority, and strategic influence? How does data affect national security today, and how will it affect the future? What tools does the West have to defend against China’s large-scale data collection, analytics, and AI programs? And how can we counter nation-state and state-sponsored efforts to secure a technological advantage through data collection on critical assets and technologies?