• pragueconference@nukib.gov.cz

19 March 2025

Main Hall

9:00 - 9:30

9:30 – 10:30

In this session, cybersecurity leaders and legal experts will explore the full spectrum of tools and strategies used to confront malicious actors in cyberspace, from attribution techniques to sanctions and criminal indictments.

 

They will discuss evolving strategies on the invisible frontlines of cybersecurity, where collaborative efforts between governments, law enforcement, and private entities aim to deter malicious actors.

11:00 – 12:15

As connected vehicles redefine mobility, they bring major cybersecurity challenges, including the risks associated with massive collection of sensitive data and potential exploitation of vulnerabilities.

 

This panel brings together a select group of experts, including states representatives, international organizations, the automotive industry and cybersecurity analysts, to discuss the evolution of connected vehicle cybersecurity and the need to address these risks from a national security perspective. From addressing technical vulnerabilities to considering strategic regulatory frameworks, panellists will explore the balance between innovation, security and protection.

12:15 – 13:15

13:15 – 14:30

With increasing global strategic competition, protecting research and innovation has become a critical priority. Foreign threats from intellectual property theft to supply chain vulnerabilities, threaten the integrity of groundbreaking scientific discoveries, technology, and the industry.

 

This panel will delve into strategies for mitigating the impact of theserisks, both within and outside of cybersecurity, and explore how nation states and individual organizations can adapt to secure their innovations. By examining the role of governments, businesses and academia, we will uncover how collaboration can redefine protection mechanisms in this new area of threats.

13:15 – 14:30

In emergency situations, be it man-made crises, wars or natural disasters, the public sector faces
increased challenges in securing sensitive data while maintaining operational availability. In order to ensure digital continuity at all times, especially in the case of critical data, various solutions, such as establishing digital embassies, might be considered by states.

On the other hand, the transfer of data abroad brings additional risks that need to be taken into account. A group of policymakers and technical experts will discuss strategies for resilient architectures, data storage methods, digital maturity as well as the financial, legal and security implications associated with different approaches to ensure uninterrupted access to critical systems and services. The panel discussion will provide insights into different perspectives on cloud security in light of current geopolitical tensions

15:00 – 16:15

The energy sector is the backbone of today’s economy and the delivery of essential services, and its cybersecurity is one of the critical components of its operation. With their energy sectors increasingly targeted by Russian, Chinese and Iranian malicious cyber activity, states have developed many initiatives aimed at protect better protecting and defending their energy sectors.

 

Are energy-specific principles and regulations, such as the new EU Network Code on cybersecurity for the electricity sector, G7’s cybersecurity framework for operational technologies in energy systems, or the Supply Chain Cybersecurity Principles of the US DOE, an emerging trend?

16:15 – 16:45

Conference Room

8:00 - 8:45

From protecting data to leading cyber innovations, women are key to the future of cybersecurity. Join leading women in cybersecurity as they share their insights on breaking into the field, overcoming obstacles, and inspiring the next generation.

 

This roundtable explores the skills, opportunities, and diverse perspectives women bring to cybersecurity, and offers practical advice on how to foster inclusivity and empowering more women to pursue cyber careers.

9:30 – 10:30

In the cybersecurity ecosystem, people tend to be referred to as the weakest link. While this perception is somewhat correct, the question of who or what this weakest link is much more complex.

 

This points to another category that poses a major risk if handled properly from the security perspective: the ICT supply chains. Henceforth, how will states deal with this security challenge? How do they address third-party risks? What policies can be taken as an example, and where does the place of the envisaged EU Toolbox for ICT supply chain security fit into this debate?

11:00 – 12:15

How is artificial intelligence shaping the future of cyber security and defence? This session explores the powerful role AI plays in securing digital landscapes, focusing on practical innovations that are changing the face of cybersecurity.

 

From monitoring network traffic and detecting phishing and SPAM patterns to identifying deepfakes, AI offers a new level of vigilance against evolving threats. Other key applications, such as user behaviour anomaly detection, automated threat response, fraud detection, and endpoint protection, provide robust tools for pre-empting cyber risks.

 

Join us for the latest advancements, challenges, and potentials of AI to protect us from cyber threats.

12:15 – 13:15

13:15 – 14:00

Partners´ stage 2

14:00 – 14:30

As quantum computing advances, the urgency of protecting today’s data from future threats of decryption threats increase. This debate will address the urgent need to prepare for security threats based on quantum technologies and will be focusing on the implementation of post-quantum cryptography (PQC) which protects sensitive data against, among pother things, the ‘store now, decrypt later’ method. Experts will discuss the establishment of minimum requirements for PQC, technical measures and safeguards, appropriate timelines for PQC deployment, and the question of where PQC should be deployed within infrastructures to properly maximize protection.

 

The discussion will also touch on the NIST Post-Quantum Cryptography Standardization program and provide insights into global readiness, collaborative strategies, and challenges related to safeguarding data the post-quantum era.

15:00 – 16:15

This fireside chat will bring together representatives from Ukraine and its supporters to discuss key lessons learned from the ongoing conflict in Ukraine, with a focus on cybersecurity.

 

Panellists will explore how Ukraine has strengthened its cyber resilience in response to ongoing threats and discuss how countries not directly involved in the conflict, but still affected by its cyber impacts, have adapted their security strategies.

Join global leaders, representatives and experts from the government and private sector, as well as research and academic institutions from like-minded nations.

A set of recommendations on both technical and non-technical risks that States should consider when planning, building, launching and operating their infrastructure.
The Prague 5G Repository is a virtual library dedicated to the exchange of existing approaches, tools, instruments and frameworks in the field of 5G security.
In the case you wish to access the Prague 5G Repository, please contact us at pragueconference@nukib.cz

The access to the Prague 5G Repository is limited to participating States and organizations.

For any inquiries please email us

pragueconference@nukib.gov.cz

Let's Connect