• pragueconference@nukib.gov.cz

19 March 2025

Main Hall

9:00 - 9:30

9:30 – 10:30

In this session, cybersecurity leaders and legal experts will explore the full spectrum of tools and strategies used to confront malicious actors in cyberspace, from attribution techniques to sanctions and criminal indictments.

 

They will discuss evolving strategies on the invisible frontlines of cybersecurity, where collaborative efforts between governments, law enforcement, and private entities aim to deter malicious actors.

11:00 – 12:15

As connected vehicles redefine mobility, they introduce critical cybersecurity challenges, including the risks associated with massive collection of sensitive data and potential exploitation of vulnerabilities.

 

This panel brings together a select group of experts, including representatives from states, international organizations, the automotive industry and cybersecurity analysts, to discuss the evolving landscape of connected vehicle cybersecurity and the need to address these risks from a national security standpoint. From addressing technical vulnerabilities to considering strategic regulatory frameworks, panellists will explore the balance between innovation, safety, and security.

12:15 – 13:15

13:15 – 14:30

In extraordinary situations, be it man-made crises,
wars or natural disasters, public sector faces height-
ened challenges in securing sensitive data while
maintaining operational availability. To ensure digital
continuity at any time, especially for critical data,
various solutions, such as establishing digital
embassies, might be taken into consideration by
states. On the other hand, transferring data outside
the country brings additional risks to account for.

A group of policymakers and technical experts will
discuss strategies for resilient architectures, storage
methods, digital maturity as well as financial, legal and
security implications connected to different approach-
es to securing uninterrupted access to the most impor-
tant systems and services. The panel discussion will
provide insights into diverse perspectives on cloud
security in the light of current geopolitical tensions.

15:00 – 16:15

As global strategic competition intensifies, protecting
research and innovation has become a critical
priority. Foreign threats, ranging from intellectual
property theft to supply chain vulnerabilities,
jeopardize the integrity of breakthroughs in science,
technology, and industry.


This panel will delve into strategies for mitigating
these risks, both within and beyond the cyber
domain, and explore how nation-states and individual
organizations can adapt to secure their innovations.
By examining the role of governments, businesses,
and academia, we will uncover how collaboration
can redefine protection mechanisms in this new
threat landscape.

16:15 – 16:45

Conference Room

8:00 - 8:45

From defending data to leading cyber innovations, women are crucial to cybersecurity’s future. Join leading women in cybersecurity as they share insights on breaking into the field, overcoming obstacles, and inspiring the next generation.

 

This roundtable dives into the skills, opportunities, and diverse perspectives women bring to cybersecurity, offering practical advice for fostering inclusivity and empowering more women to pursue cyber careers.

9:30 – 10:30

In the cybersecurity ecosystem, humans tend to be called the weakest link. While this perception is right to some extent, the question of who or what this weakest link truly is becomes much more complex. This points out a different category posing great risk if handled insufficiently from the security perspective: the ICT supply chains.

 

Henceforth, how do States deal with this security challenge? How do they address third-party risks? What policies can be taken as examples, and what is the place of the envisaged EU Toolbox for ICT supply chain security in this debate?

11:00 – 12:15

12:15 – 13:15

13:15 – 14:00

How is artificial intelligence shaping the future
of cyber security and defence? This sessio dives
into the powerful role AI plays in securing digital
landscapes, focusing on practical innovations that
are reshaping cybersecurity.

From monitoring network traffic and detecting
phishing and SPAM patterns to identifying deepfakes,
AI offers a new layer of vigilance against evolving
threats. Other key applications, such as anomaly
detection in user behaviour, automated threat
response, fraud detection, and endpoint protection,
provide robust tools for pre-empting cyber risks.

 

Join us as experts explore the latest advancements,
challenges, and potentials of AI keeping us safe
from cyber threats.

14:00 – 14:30

As quantum computing advances, the urgency
to protect today’s data from future decryption threats
intensifies. This debate will address the pressing
need to prepare for quantum-enabled security threats,
focusing on the implementation of post-quantum
cryptography (PQC) to protect sensitive data, inter
alia, against the “store now, decrypt later” method.
Experts will discuss establishing minimum PQC
requirements, technical measures and safeguards,
relevant timelines for PQC deployment, and the
question of where PQC should be deployed within
infrastructures to appropriately maximize protection.

 


The discussion will also touch upon the NIST
Post-Quantum Cryptography Standardization
program and provide insights into global readiness,
collaborative strategies, and challenges related
to safeguarding data in the post-quantum era.

15:00 – 16:15

This panel will convene cybersecurity experts
from various sectors to address the covert cyber
tactics, or “Shadow Ops,” deployed by China
within Western nations. Through a cross-sector
lens, the discussion will integrate insights from
research, policy, and technical defence, revealing
how these hidden tactics exploit vulnerabilities
to infiltrate Western infrastructure and institutions.


Panelists will analyze recent cyber incidents
and discuss strategies to uncover and counteract
these covert interferences, offering a deeper look
into the unseen risks that challenge our most
essential systems.

Join global leaders, representatives and experts from the government and private sector, as well as research and academic institutions from like-minded nations.

A set of recommendations on both technical and non-technical risks that States should consider when planning, building, launching and operating their infrastructure.
The Prague 5G Repository is a virtual library dedicated to the exchange of existing approaches, tools, instruments and frameworks in the field of 5G security.
In the case you wish to access the Prague 5G Repository, please contact us at pragueconference@nukib.cz

The access to the Prague 5G Repository is limited to participating States and organizations.

For any inquiries please email us

pragueconference@nukib.cz

Let's Connect