Table 1
Artificial Intelligence in Cybersecurity
Theme: How AI is transforming cybersecurity.
Main topics:
- Use of AI for threat detection and attack prevention.
- The role of neural networks in behavioral analysis.
- Challenges related to the use of AI by cyber criminals and assessment of vulnerabilities caused by those using generative AI
Table goals:
- Identify opportunities to strengthen cyber defenses using AI.
- Discuss ethical and legislative limitations in implementing AI-based solutions.
- Analyze real cases of AI applications in cybersecurity.
Table 2
Post-Quantum Cryptography and the Future of Data Protection
Theme: Preparing for a world dominated by quantum computers.
Main topics:
- Awareness of post-quantum cryptography and its implications. Post-quantum cryptography transition scenarios according to Cyber Agencies and European partners.
- Crypto Agility. Finding new ways to react promptly by implementing alternative encryption methods.
- Assessment of current encryption techniques and their future vulnerabilities.
- “Harvest now, decrypt later.” What to do and how to adopt protocols based on Post-Quantum Cryptography as soon as possible.
- Standardization of post-quantum technologies: European and international progress and challenges.
Table goals:
- Create an action framework for the adoption of post-quantum cryptography.
- Analyze risks and opportunities for key industry sectors.
- Engage participants in simulations of possible post-quantum scenarios.
Table 3
Cyber Espionage: Between Artificial Intelligence and National Security
Theme: Defending against cyber espionage and informatic dossiers and intelligence operations.
Main topics:
- Analysis of cyber espionage techniques (APT, targeted phishing, etc.).
- Role of social engineering and human vulnerabilities.
- How governments and companies can work together to prevent theft of sensitive data.
Table Goals:
- Identify effective methods of prevention against espionage and dossier theft.
- Develop guidelines for employee training and awareness.
- Exchange experiences on attacks suffered and response strategies.
Table 4
Geopolitics of Cyberspace – Power, Influences, Security
Theme: Exploring how cyberspace has become a crucial dimension of geopolitical power, analyzing the dynamics of influence, security risks, and strategic implications for state and non-state actors.
Main topics:
- Cyberspace as a new geopolitical domain
- Cyber-warfare strategies and hybrid operations.
- Case study examples of significant international attacks.
- Influence and disinformation in cyberspace.
- International cooperation and conflict in cyberspace.
Table goals:
- Identify the main actors and their strategies in cyberspace.
- Map critical areas of conflict and cooperation.
- Propose recommendations for improving global governance of cyberspace.
- Create future scenarios to analyze the evolution of threats and opportunities in the digital geopolitical environment.
Table 5
Strengthening cyber resilience of satellite networks and submarine cables
Theme: Vulnerability assessment, advanced security technologies, laws and regulations, international cooperation, incident preparedness and response.
Main topics:
- Ensuring business continuity of satellite and submarine networks even in the event of an attack.
- Study of more sophisticated attacks such as satellite hacking, cable sabotage or attacks on ground stations.
- Infrastructure design capable of rapidly restoring functionality.
- Evaluation of the strategic and geopolitical implications of satellite and cables networks security.
- Ensure that hardware and software components are reliable and not compromised.
Table goals:
- How to reduce the vulnerability of satellite and submarine cable systems to cyber attacks.
- Strengthen the dialogue between public institutions, private parties and international partners for a coordinated response.
- Create shared guidelines for the protection and monitoring of global infrastructure.
- Implement rapid response centers capable of dealing with incidents in real time.
- Implement backup and redundancy strategies to avoid disruptions to critical services.