Peadar Callaghan has earned an MA in History, MA in ELT, an MSc in Digital Learning Game design, and is currently a PhD candidate (Cybersecurity Game Design). Peadar runs courses on learning game design, game mechanics and gamification for Tallinn University's Digital Learning Games Masters program. He has also designed games and gamification solutions for both national and international clients in a wide range of fields.
Workshop day
Building Better Exercises through Greater Games
Building Better Exercises through Greater Games
How do you reach your audience with cybersecurity training? Designing practical and engaging training is challenging, but instead of death by powerpoint, flying chalk, or endless lectures, how about trying to gamify your training? A well-designed training exercise or game offers a hands on experience for the participant which engages the learner in a more active learning process. This in turn leads to better retention of lessons learned and application of the skills outside of the training context.
Participants will get the opportunity to design their first game-based learning exercise and leave the workshop with their own game prototype.
This workshop is open to all CyCon attendees no matter their experience with games or exercises.

Peadar Callaghan
PhD Candidate, Tallinn University
CR14:
Can I Try It at Home?
Can I Try It at Home?
Industrial control systems are essential to the safe and efficient operation of industrial processes in different sectors. Legacy control systems were isolated and used proprietary protocols, but modern systems increasingly use open standards and are heavily interconnected. Although this has resulted in improved safety and cost-effectiveness of operation, there is concern that these systems are vulnerable to cyber-attacks. This hands-on workshop will show the weaknIndustrial control systems are essential to the safe and efficient operation of industrial processes in different sectors. Legacy control systems were isolated and used proprietary protocols, but modern systems increasingly use open standards and are heavily interconnected. Although this has resulted in improved safety and cost-effectiveness of operation, there is concern that these systems are vulnerable to cyber-attacks. This 3 hour long, hands-on workshop will show the weaknesses of these systems and introduce how to exploit them. The event is designed for participants with a basic knowledge of network traffic analysis, packet crafting and Python coding. CCDCOE will provide all necessary infrastructure on site. Further information will be communicated to registered participants by email prior to the event.
Please note this workshop takes place at a location different from the main conference venue, at CR14, Rävala tn 14.

Enn Kukk
Technology researcher, NATO CCDCOE
Enn Kukk is a technology researcher at NATO CCDCOE since May 2021. Prior to joining CCDCOE, he worked as leading commissioning engineer at TMV Power OÜ. His main field of expertise is industrial control systems especially electrical power grid protection and automation. He holds a MSc degree from the Tallinn Technical University in Estonia.
Cyber Exercises: A Tool to Build Trust
Cyber Exercises: A Tool to Build Trust
Quick communication is essential in a cyber crisis. It can be incredibly difficult to achieve this at the national level where roles and responsibilities for crisis coordination are often split between government agencies, private sector operators and military bodies. The war in Ukraine has demonstrated that resilience and defence can be achieved when civil and commercial actors are seen as partners, which requires trust and understanding.
This workshop will explore how nations can embrace and enhance cyber exercises to build trust between key stakeholders in cyber defence and national security. This will involve exploring the barriers to effective responses to cyber crises. The first section of the workshop will pilot a strategic-level table-top exercise that allows participants to play out an unfolding cyber crisis scenario and invites them to test their decision-making skills and resource allocation to mitigate a cyber threat successfully. Invited experts will then offer insights on building a trusted ecosystem of actors for national cyber defence, followed by all participants having an opportunity to weigh in on national trust-building.
The workshop is open to all CyCon participants but we advise that registrants have some existing knowledge of or active interest in cyber exercises and national cyber crisis coordination.
Previous workshops in this series have focused on cyber exercises across NATO:
CyCon 2022 workshop summary report NATO Cyberspace Exercises: Moving Ahead
CyCon 2021 workshop summary report Cyber Exercises: A Vision for NATO and interim paper Trust in Cyber Exercises: A Vision for NATO
Facilitated by: Peter Barrett, Carnegie Mellon University; Peadar Charles Callaghan, Tallinn University; Dr Amy Ertan, Emerging Security Challenges Division, NATO Headquarters; Aurimas Kuprys; NATO CCDCOE; Toby Meyer, Carnegie Mellon University and Alan Sewell, Swedish Defence University.
Please note that anonymized notes will be taken throughout the workshop and may be used to inform future workshops, game design and publications. The game as developed will be available to participants and for use in the future.
Building Partner Capabilities for Cyber Operations. Policy Paper from the Cyberspace Solarium Commission
Building Partner Capabilities for Cyber Operations. Policy Paper from the Cyberspace Solarium Commission
The United States works closely with allies and partners in building traditional military warfighting capabilities, such as planes and missile systems that support airpower or tanks and artillery that support land power. We have taken a much more reserved approach to developing cyber capabilities in defensive and especially offensive capabilities.
This session will look at whether and how the US (and others) can improve allies’ and partners’ defensive cyber capabilities (this is more than just ‘hunt-forward ops’), and whether and how one could utilize private-sector partners in this effort. We will also examine how to approach ally/partner offensive cyber support and whether this should be ‘nuclear umbrella’ type of support or whether we should work to build and sustain ally/partner offensive cyber capacity. And if the US (or others) decide to work to build partner offensive capability, how should this be done? Is it a full ‘train-maintain-equip’ effort, or is it more of a legal/policy training effort with an emphasis on understanding unintended consequences and the development of rules of engagement? Finally, how should we integrate and employ offensive cyber forces? Does this provide a framework for response options against future attacks as happened in Albania, and if so, what will coalition command and control look like?

Mark Montgomery
Executive Director, Cyberspace Solarium Commission 2.0
Mark is the Senior Director of the Center on Cyber and Technology Innovation and a Senior Fellow at the Foundation for Defense of Democracies. He serves as the Executive Director of Cybersolarium.org, a non-profit organization which works to implement the recommendations of the Cyberspace Solarium Commission, where he was Executive Director from 2019 to 2021. Previously, Mark was Policy Director of the Senate Armed Services Committee for Senator John S. McCain.
Mark completed 32 years as a nuclear-trained surface warfare officer in the U.S. Navy, retiring as a Rear Admiral. His flag officer assignments included Director of Operations at U.S. Pacific Command; Commander of Carrier Strike Group 5; and Deputy Director, Plans, Policy and Strategy at U.S. European Command.
Light lunch
Navigating Cyber Conflict Data and Its Discontents: An Interdisciplinary Toolkit for Empirical Insight
Navigating Cyber Conflict Data and Its Discontents: An Interdisciplinary Toolkit for Empirical Insight
In the past, most cyber conflict research relied on individual case studies of prominent incidents. While well-documented, a predominant focus on these outliers limits the public understanding of the overall threat landscape. Covering more than 1,800 effect-generating cyber operations reaching back to the year 2000, the European Repository of Cyber Incidents (EuRepoC) is seeking to narrow this data gap.
Evaluating more than 60 indicators to document the life cycle of cyber operations and the state responses they evoke, EuRepoC regularly contends with challenges involved in the systematic, continuous, and comprehensive classification of cyber incidents, especially posed by open-source reporting. Based on practical examples, the workshop will guide participants through an evaluation of the attack chain and strategic drivers of operations, questions of political responsibility, and efforts to impose costs on threat actors. Workshop discussions will provide a platform for sharing techniques to assess the impact of different cyber operations in light of incomplete and evolving public information.

Jakob Bund
Associate and Senior Researcher, German Institute for International and Security Affairs (SWP), European Cyber Conflict Research Initiative (ECCRI)
Jakob Bund is an Associate at the German Institute for International and Security Affairs (SWP), where he serves as a threat intelligence liaison in the build-up of the European Repository of Cyber Incidents (EuRepoC). Jakob is also a Senior Researcher for Cyber Conflict and Statecraft at the European Cyber Conflict Research Initiative (ECCRI). His research focuses on evolutions in state responses to malicious cyber activity.
Until 2022, he headed the Cyberdefense Project at the Center for Security Studies at ETH Zurich, advising the Office of Cyberdefense Policy in the Swiss Department of Defense. Previously, Jakob worked as a researcher at Oxford University and the EU Institute for Security Studies, assessing the inclusive development of cybersecurity strategies for the British Foreign Office and the World Bank and supporting the EU’s track-two dialogues with strategic partners.

Martin Müller
PhD Researcher, University of Innsbruck
Martin Müller is PhD Researcher (pre-doc) at the University of Innsbruck, Austria. In this capacity, his work involves the build-up of the European Repository of Cyber Incidents (EuRepoC) from a legal dimension. His research focuses on International and European Law, particularly in matters of digitality and cyber security.
Prior to this, Martin obtained his law degree from Goethe University of Frankfurt, specializing in European and International law matters. At the same time, he gained practical experience working in the “Digital Law” department at Ernst & Young Law.

Kerstin Zettl-Schabath
Research Associate, Institute for Political Science at Heidelberg University
Kerstin Zettl-Schabath is a research associate at the Institute for Political Science at Heidelberg University, where she works on the political dimension of cyber conflicts within the research consortium “European Repository of Cyber Incidents” (EuRepoC). Until the official launch of EuRepoC, Kerstin was engaged in a project funded by the German Foundation for Peace Research, which developed the Heidelberg Cyber Conflict Dataset HD-CY.CON which serves as the basis of today`s EuRepoC database. At this time, she also completed her doctoral thesis on the topic of autocratic and democratic proxies in cyberspace, by comparing state-proxy interactions and strategies for China, Russia, the US and Israel from 2000 until 2021.
Lessons from Cyber Capacity Building: How to Make a Difference in Preventing and Combating Cyberattacks
Lessons from Cyber Capacity Building: How to Make a Difference in Preventing and Combating Cyberattacks
Over the past years and months, the world has seen ransomware attacks with serious consequences targeting not only large companies but entire countries. In May 2022, Costa Rica declared a national emergency amid a series of attacks affecting nearly 30 public institutions and services, including tax collection, social security and customs. Is such a shift in scale becoming the new norm, and what is the reason for these escalations? How can the EU support partner countries through cyber capacity-building initiatives?
A ransomware attack against a country requires knowledge, skills and intelligence, which are usually possessed by operators with government background. This is a game with a lot at stake for both parties – the victim nation will do everything it can to catch the attackers, but if it fails, confidentiality, integrity, and availability are at risk. In the panel discussion, we will explore the possible motivation of attackers operating in the LAC region and address the options for nations to build resilience. The panellists will explain how the EU-funded Cyber Capacity Building projects and International Counter Ransomware Initiative can help countries to better combat cyberattacks and protect their digital societies.
Organized and moderated by EU CyberNet, the one-hour panel consists of cyber security specialists from Latin America, North America and Europe, who lift the lid on state-sponsored ransomware attacks and coordinated CCB potential.

Eduardo Izycki
Research Lead, Brazilian Research Institute (IDP), University of Brasilia
Eduardo Izycki worked for 12 years for the Brazilian Federal Government in the Risk and Threat Assessment during mega events in Brazil (Rio+20 Conference, 2014 World Cup, and 2016 Olympics). Afterwards, he worked at the Brazilian Critical Infrastructure Protection Program. He holds a master's degree in International Relations from the University of Brasília (UnB). In addition, he was a Chevening Alumnus at King's College London during his second master's in International Peace and Security. Furthermore, he is a Cyber Conflict and International Law professor at Brazilian Research Institute (IDP) and teaches Cybersecurity Planning at Impacta University MBA. Eduardo is a seasoned researcher and professional at the crossroads of international law, international relations and cyber security.

Jorge Mora-Flores
Digital Transformation Consultant and LATAM Manager at DeepSeas
Jorge Mora-Flores is the former Digital Governance Director of the MICITT (Ministry of Science, Innovation, Technology and Telecommunication) and former Chief of Cabinet of the Ministry of the Presidency of Costa Rica. Jorge led the response to the national cybersecurity crisis in Costa Rica in the spring of 2022.
He has also served as the President of the CyberSec Cluster of Costa Rica, President of the Electronic Government Network of Latin America and the Caribbean (Red GEALC), and President Pro Tempore of the Ad Hoc Group in charge of implementing the Digital Regional Strategy of the Central American and the Dominican Republic Integration System (SICA).
He is the co-author of the book “Digital Public Transformation in Latin America” with the chapter “A comprehensive vision of Cybersecurity to support digital transformation.

César Moliné Rodríguez
Director of Cybersecurity, Electronic Commerce and Digital Signature, Dominican Institute of Telecommunicatons (NDOTEL)
César is a lawyer specialised in business law and new technologies with more than 20 years of experience of e-commerce and digital signatures, privacy and cybersecurity. Among his functions, he represents the Dominican Republic in the Cybercrime Convention Committee of the Council of Europe, serves as the Regional Director of the Latin America and Caribbean Cyber Competence Centre (LAC4) and has been a Working Group Coordinator of the Global Forum of Cyber Expertise (GFCE).

Tomáš Minárik
Deputy Director, Department of International Cooperation and the European Union at the National Cyber and Information Security Agency (NÚKIB)
Tomáš Minárik is the Deputy Director of the Department of International Cooperation and the European Union at the National Cyber and Information Security Agency (NÚKIB) since January 2023; he works at NÚKIB since 2019. In 2014-2019, he worked as a researcher in the NATO CCDCOE Law Branch, focusing on the legal aspects of cyberspace operations (the International Cyber Law: Interactive Toolkit project), activities of international organisations regarding cyberspace (the INCYDER project), and cyber defence exercises (Locked Shields, Crossed Swords). Prior to that, he worked as a legal adviser at the International Law Department of the Czech Ministry of Defence and the National Security Authority. He holds a law degree from the Charles University in Prague.

Ian T. Brown
Senior Policy Advisor, Bureau of Cyberspace and Digital Policy, U.S. Department of State
Ian T. Brown is a career member of the United States Foreign Service currently serving as Senior Advisor for Cyber Policy in the Bureau of Cyberspace and Digital Policy in Washington, DC. In his current role, Ian leads cyber policy engagement with Europe and Eurasia. As a diplomat in Latin America and Africa, Ian has served as lead observer for a historic presidential election as well as managed efforts to strengthen trade and energy ties, to combat immigration fraud, and to broker security dialogues with Brazil and China.
Prior to joining the Bureau Ian worked for Gallup Inc, where he helped lead Gallup’s entry into the civic sector consulting market. While at Gallup, Ian published over 70 works on public opinion issues related to the economy, community development, and foreign affairs. He has also been a featured speaker on issues of urban sustainability and development, including at the New York Academy of Sciences.
Ian holds a BA in both History and Italian from the University of Texas at Austin and received a Fulbright Fellowship following his undergraduate studies to conduct research in Naples, Italy. He later went on to earn his M.P. Aff. from the LBJ School of Public Affairs at the University of Texas, where he specialized in international affairs.

Liina Areng
Operation Lead, Latin America and Caribbean Cyber Competence Centre LAC4, EU CyberNet project
Liina Areng leads the operation of the Latin America and Caribbean Cyber Competence Centre LAC4 in the Dominican Republic established by EU CyberNet, a project implemented by the Estonian Information System Authority (RIA) and focused on coordination and strengthening European Union’s external capacity building in cybersecurity
She has previously worked as a diplomat in NATO, cybersecurity adviser at the Estonian Ministry of Defence, Director of International Relations at the NATO CCDCOE and Head of International Relations at RIA since 2007. She has also worked as the Director of Tallinn Digital Summit, and held various policy roles at the Estonian Ministry of Defence. For her work, Ms Areng was awarded the Order of the White Star by Estonia's president in 2023.
Navigating the Challenges and Opportunities of Generative AI in the Social Media Landscape
Navigating the Challenges and Opportunities of Generative AI in the Social Media Landscape
Over the past decade, social media platforms have become hotbeds for misinformation and propaganda. Various actors, including state and non-state entities, exploit these platforms to further their political, military, or economic agendas. The advent of generative AI has greatly exacerbated the scale, personalization, and targeting of these attacks.
In this session, we will confront the challenges posed by sophisticated generative AI applications that enable deception at scale through information attacks, fake personas, and large-scale tailored influence operations. For years, safety in obscurity shielded smaller language communities from the worst information attacks. However, the multilingual capabilities of large language models now render this safety-in-obscurity strategy ineffective. By 2023, these technologies have slipped through regulatory oversight, making it possible to run sophisticated models on individual desktop computers without ethical or safety constraints. This unchecked development has enabled the generation of manipulative and unethical material on an unprecedented scale, leaving us ill-equipped to confront the burgeoning challenges. Simultaneously, generative AI technology also presents vast opportunities. We will explore the possibilities for tracking adversaries’ actions online, summarizing extensive volumes of multimodal data, detecting anomalies, customizing communication strategies, and accelerating content production and dissemination.
More specifically, this session addresses: 1) the potential of the technology as it exists today; 2) the role of generative AI in creating and propagating fake content and manipulating public opinion; 3) the scope and impact of misinformation, propaganda, and fake personas on social media platforms; 4) the operational, privacy, and security concerns related to AI technologies in NATO communication strategies; 5) opportunities and potential applications for AI systems to counter misinformation and track adversaries’ actions online.

Rolf Fredheim
Director, Markolo Research
Dr Rolf Fredheim is the director of Markolo Research, a data science consultancy offering bespoke monitoring systems using AI to provide insight into own and adversary communication. Previously he worked as a Principal Scientist at the Technical and Scientific Development Branch of the NATO Strategic Communications Centre of Excellence in Riga, Latvia. While there, he led the Centre's research into bots and trolls on social media, which was published quarterly under the title "Robotrolling".
He holds degrees from the University of Cambridge, the University of Oxford, and Trinity College Dublin. With his expertise in data science and AI, he is committed to helping organizations better understand and address the challenges posed by social media manipulation in today's digital landscape.
Follow the White Rabbit… if You Can…
Follow the White Rabbit… if You Can…
CY4GATE – Cyber Threat Hunting
When the cyber protections don’t work, Cyber Threat Hunting seems the only solution able to mintain the cyber resiliency of a critical asset, starting from an hypotesis (something bad could be in place), followed by an investigation (this is what is going bad), up to the definition of an effective detection and response strategy (I know how to find it and then run the right response). This process must be continously applied in an increasingly evolving borderless context, where also the lifecycle of a threat hunting process must be continuously aligned with the attacker’s timeframe.
A batch-processing oriented Data-lake approach for patterns identification can solve partially the need, but still remains the issue related to the huge computational power needed to remain on-time, that cannot be solved only by unlimitedly increasing resources.
We’ll then introduce a novel approach to Cyber Threat Hunting, supported by some on-field experimented use cases, based on a full behavioral approach powered by statistical and AI models that can be combined with dynamic CoAs (Course of Actions), that can be redefined in relationship with the received feedbacks, and deceptive approaches able to support further validations and recover the required timings.

Andrea Pompili
Chief Scientist Officer, CY4Gate
Andrea Pompili is a Cyber Security specialist that has 20 years’ experience in this world. Andrea started working in the computer world very young as one of the most famous Italian programmer of C64 and Amiga computer games.
Once graduated, he started working on enterprise software development, and then on computer security, following security threats and security solutions on strategic projects firstly for Wind Telecommunication and then for Telecom Italia, coordinating national and international cyber security projects, and then delivering innovation services and architectures for complex and critical infrastructures. During this period, he started working inside multiple Telecommunication standardization groups (GSM Association, 3GPP, etc.) for what regards security aspects.
In the last decade Andrea worked mainly on malware and attack reverse engineering, incident response and application vulnerability research and development leading one of the first team specialized on this kind of new threats. The scope of the activities included research and security analysis of embedded systems used in IoT (Internet of Things) environments including ICS/SCADA networks.
From 2013 and 2018 Andrea was part of the core team of the OWASP ZAP project development.
Andrea entered in CY4Gate in 2016, after an experience as strategic cyber security advisor for Large Enterprises and for Government Institutions, with the role of responsible of the Cyber Security Unit. During this period he designed and defined all the cyber security solution architectures and technical directives and followed all the cyber security initiatives for the Military and Government market.
Since the beginning Andrea has been part of multiple international working group (EDA, ECSO and NATO) and has coordinated the activities related to the Italian and European research project proposals.
In 2019 Andrea became CY4Gate’s Chief Scientist Officer, extending his innovation and coordination role to all the cyber topics covered by the Company, including Cyber Intelligence and integrated Cyber/EW activities
CR14:
Can I Try It at Home?
Can I Try It at Home?
Industrial control systems are essential to the safe and efficient operation of industrial processes in different sectors. Legacy control systems were isolated and used proprietary protocols, but modern systems increasingly use open standards and are heavily interconnected. Although this has resulted in improved safety and cost-effectiveness of operation, there is concern that these systems are vulnerable to cyber-attacks. This 3 hour long, hands-on workshop will show the weaknesses of these systems and introduce how to exploit them. The event is designed for participants with a basic knowledge of network traffic analysis, packet crafting and Python coding. CCDCOE will provide all necessary infrastructure on site. Further information will be communicated to registered participants by email prior to the event.
Please note this workshop takes place at a location different from the main conference venue, at CR14, Rävala tn 14.

Enn Kukk
Technology researcher, NATO CCDCOE
Enn Kukk is a technology researcher at NATO CCDCOE since May 2021. Prior to joining CCDCOE, he worked as leading commissioning engineer at TMV Power OÜ. His main field of expertise is industrial control systems especially electrical power grid protection and automation. He holds a MSc degree from the Tallinn Technical University in Estonia.
Bridging the Theory and Practice: Cyber Law Toolkit for the Future
Bridging the Theory and Practice: Cyber Law Toolkit for the Future
Since its launch at CyCon 2019, the Cyber Law Toolkit has grown to become a go-to online resource for international law and cyber operations. Several States and international organizations have expressly relied on the Toolkit in developing their views and, in addition, it is used by thousands of users per month who access it to consult its comprehensive database of national positions on international law in cyberspace, its growing catalogue of hypothetical scenarios, or to learn more about the fundamental concepts of international law and how these apply in the cyber context.
For the project to remain relevant and sustainable, the Toolkit team seeks to obtain, in an interactive session, feedback and input from those who have contributed to the Toolkit in the past (for example, as authors or peer reviewers), as well as from those who have used or use the Toolkit in their professional or academic work, and wish to be involved in its further development. The session will focus, namely, on (i) topics for new scenarios, (ii) improvement of user experience, and (iii) new features to include in the Toolkit.
Meet and network in person with other members of the Cyber Law Toolkit community and have your say in the future of the Toolkit. The session will be run in an informal manner in accordance with the Chatham House rule.
MS Threat Intel Briefing for NATO Nations Government Officials (By invitation only)
CyCon Icebreaker at Tammsaare Park Glass Pavilion
CyCon Icebreaker at Tammsaare Park Glass Pavilion
Venue:
Tammsaare Park Glass Pavilion – Pärnu mnt. 3, Tallinn
Location on the map: https://goo.gl/maps/JU45f8yKzydkaAsp6
The CyCon icebreaker serves as a social kick-off for the conference, where the participants, speakers and organizers can meet each other again (or for the first time) and get into the CyCon spirit in a relaxed and informal atmosphere accompanied by good food and good music.
This year we invite you to Tammsaare Park Glass Pavilion, a venue where the relaxed vibes meet the good food provided by Pomo and Kompu restaurants. Make sure you also stop by the mysterious Club Vatican located downstairs.
As the venue is located in the centre of Tallinn and within walking distance of all centrally located hotels, no transport is provided by the organizers.