Thematic Tables

Table 1

Artificial Intelligence in Cybersecurity

Theme: How AI is transforming cybersecurity.

Main topics:

  • Use of AI for threat detection and attack prevention.
  • The role of neural networks in behavioral analysis.
  • Challenges related to the use of AI by cyber criminals and assessment of vulnerabilities caused by those using generative AI

Table goals:

  • Identify opportunities to strengthen cyber defenses using AI.
  • Discuss ethical and legislative limitations in implementing AI-based solutions.
  • Analyze real cases of AI applications in cybersecurity.

Table 2

Post-Quantum Cryptography and the Future of Data Protection

Theme: Preparing for a world dominated by quantum computers.

Main topics:

  • Awareness of post-quantum cryptography and its implications. Post-quantum cryptography transition scenarios according to Cyber Agencies and European partners.
  • Crypto Agility. Finding new ways to react promptly by implementing alternative encryption methods.
  • Assessment of current encryption techniques and their future vulnerabilities.
  • “Harvest now, decrypt later.” What to do and how to adopt protocols based on Post-Quantum Cryptography as soon as possible.
  • Standardization of post-quantum technologies: European and international progress and challenges.

Table goals:

  • Create an action framework for the adoption of post-quantum cryptography.
  • Analyze risks and opportunities for key industry sectors.
  • Engage participants in simulations of possible post-quantum scenarios.

Table 3

Cyber Espionage: Between Artificial Intelligence and National Security

Theme: Defending against cyber espionage and informatic dossiers and intelligence operations.

Main topics:

  • Analysis of cyber espionage techniques (APT, targeted phishing, etc.).
  • Role of social engineering and human vulnerabilities.
  • How governments and companies can work together to prevent theft of sensitive data.

Table Goals:

  • Identify effective methods of prevention against espionage and dossier theft.
  • Develop guidelines for employee training and awareness.
  • Exchange experiences on attacks suffered and response strategies.

Table 4

Geopolitics of Cyberspace – Power, Influences, Security

Theme: Exploring how cyberspace has become a crucial dimension of geopolitical power, analyzing the dynamics of influence, security risks, and strategic implications for state and non-state actors.

Main topics:

  • Cyberspace as a new geopolitical domain
  • Cyber-warfare strategies and hybrid operations.
  • Case study examples of significant international attacks.
  • Influence and disinformation in cyberspace.
  • International cooperation and conflict in cyberspace.

Table goals:

  • Identify the main actors and their strategies in cyberspace.
  • Map critical areas of conflict and cooperation.
  • Propose recommendations for improving global governance of cyberspace.
  • Create future scenarios to analyze the evolution of threats and opportunities in the digital geopolitical environment.

Table 5

Strengthening cyber resilience of satellite networks and submarine cables

Theme: Vulnerability assessment, advanced security technologies, laws and regulations, international cooperation, incident preparedness and response.

Main topics:

  • Ensuring business continuity of satellite and submarine networks even in the event of an attack.
  • Study of more sophisticated attacks such as satellite hacking, cable sabotage or attacks on ground stations.
  • Infrastructure design capable of rapidly restoring functionality.
  • Evaluation of the strategic and geopolitical implications of satellite and cables networks security.
  • Ensure that hardware and software components are reliable and not compromised.

Table goals:

  • How to reduce the vulnerability of satellite and submarine cable systems to cyber attacks.
  • Strengthen the dialogue between public institutions, private parties and international partners for a coordinated response.
  • Create shared guidelines for the protection and monitoring of global infrastructure.
  • Implement rapid response centers capable of dealing with incidents in real time.
  • Implement backup and redundancy strategies to avoid disruptions to critical services.