Main Hall
9:00 - 9:30
9:30 – 10:30
In this session, cybersecurity leaders and legal experts will explore the full spectrum of tools and strategies used to confront malicious actors in cyberspace, from attribution techniques to sanctions and criminal indictments.
They will discuss evolving strategies on the invisible frontlines of cybersecurity, where collaborative efforts between governments, law enforcement, and private entities aim to deter malicious actors.
11:00 – 12:15
As connected vehicles redefine mobility, they bring major cybersecurity challenges, including the risks associated with massive collection of sensitive data and potential exploitation of vulnerabilities.
This panel brings together a select group of experts, including states representatives, international organizations, the automotive industry and cybersecurity analysts, to discuss the evolution of connected vehicle cybersecurity and the need to address these risks from a national security perspective. From addressing technical vulnerabilities to considering strategic regulatory frameworks, panellists will explore the balance between innovation, security and protection.
12:15 – 13:15
13:15 – 14:30
With increasing global strategic competition, protecting research and innovation has become a critical priority. Foreign threats from intellectual property theft to supply chain vulnerabilities, threaten the integrity of groundbreaking scientific discoveries, technology, and the industry.
This panel will delve into strategies for mitigating the impact of theserisks, both within and outside of cybersecurity, and explore how nation states and individual organizations can adapt to secure their innovations. By examining the role of governments, businesses and academia, we will uncover how collaboration can redefine protection mechanisms in this new area of threats.
13:15 – 14:30
In emergency situations, be it man-made crises, wars or natural disasters, the public sector faces
increased challenges in securing sensitive data while maintaining operational availability. In order to ensure digital continuity at all times, especially in the case of critical data, various solutions, such as establishing digital embassies, might be considered by states.
On the other hand, the transfer of data abroad brings additional risks that need to be taken into account. A group of policymakers and technical experts will discuss strategies for resilient architectures, data storage methods, digital maturity as well as the financial, legal and security implications associated with different approaches to ensure uninterrupted access to critical systems and services. The panel discussion will provide insights into different perspectives on cloud security in light of current geopolitical tensions
15:00 – 16:15
The energy sector is the backbone of today’s economy and the delivery of essential services, and its cybersecurity is one of the critical components of its operation. With their energy sectors increasingly targeted by Russian, Chinese and Iranian malicious cyber activity, states have developed many initiatives aimed at protect better protecting and defending their energy sectors.
Are energy-specific principles and regulations, such as the new EU Network Code on cybersecurity for the electricity sector, G7’s cybersecurity framework for operational technologies in energy systems, or the Supply Chain Cybersecurity Principles of the US DOE, an emerging trend?