MENU

Registration desk open

Diamond Sponsor Keynote*

New Technology and Bold Mindsets.

As the global cybersecurity threat landscape continues to evolve, new challenges are emerging for NATO. Efficient technology accelerators are helping high risk organizations progress every day, globally. Lessons can be drawn from the best practice seen by Fortinet when securing international organizations globally across high cyber risk sectors such as Financial, Government and Critical Infrastructure. Bold progress is being made not only in technology but also in management processes. This all helps to reduce risk and secure people, data and devices everywhere. With the advent of rising threat complexity, there has never been a better time to pause and examine global best practice in technology and organizational efficiencies. 

Cybersecurity Threats in Transportation Industry

Transport industry, an important part of critical infrastructure, is taking a leap forward with implementing new communications system technologies. This session explores the security concerns of communication services used in transportation industry, addressing the modern aviation and railway sectors.  

Securing Supply Chains and Next Generation Networks 

Supply chain security and resilience has gained attention of national security decision-makers. The recent significant compromises and vulnerabilities of software supply chain demonstrate the fragility, complexity and opaqueness of digital supply chains, and challenges in securing them. Similarly, the emerging ecosystem of business verticals enabled by next generation networks brings new cybersecurity and supply chain concerns for national security and technology communities.

How to bridge the gap between political and strategic perspectives of national security policy and decision-makers, and the existing and future prevention and mitigation approaches at the operational and technical levels? A conversation on strategic approaches to 5G and supply chain security, critical information infrastructure and the opportunities and challenges of international cooperation.

Fair and Proportionate Data Processing in the Military Context

The increasing data-dependency of the militaries calls for a clear understanding of the type, quantity and origin of the relevant data, the laws regulating the processing of it and the limits of national security exceptionalism. The military environment and national security interests challenge the rules designed for peacetime civilian context. However, given the continuous merging of the civilian and military spheres and the lack of specific guidelines on data protection during military operations, human rights treaties and data protection laws remain the legal sources that address related problematics in the most specific and detailed manner. This panel will ask how the rules contained therein can be adapted to reflect the needs of the security sector. In search of common features and distinguishing lines, the speakers will discuss the privacy and data protection issues raised by multinational operations, autonomous systems and satellite reconnaissance. 

Keynotes Session*

Sail Safe

The cyber-attack surface in the maritime environment is constantly growing. More current information and computer technologies are being used on cargo and passenger ships and ports to save on operational costs and increase navigational safety. This panel will discuss the cyber aspects of the sector, sheds light on the potential land-based attacks, and introduces the response from the industry to this challenge.  

War in Ukraine – Cyber Dimension of Contemporary Conflicts

The Promise and Perils of Emerging Technologies

The implications of emerging technologies are a highly publicised yet often poorly understood field. The adoption of artificial intelligence capabilities alongside greater autonomy is poised to have profound strategic effects on the way warfare is conducted and will have implications that reach far beyond an immediate technical effect. This session explores the cognitive aspects of emerging and disruptive technologies, exploring themes such as public perceptions of offensive cyber operations, the way humans relate to artificial intelligence-enabled decision-support systems in conflict, and the associated potential risks of lethal autonomous weapons systems. Examining the implications of these technologies allows for discussion and policy recommendations to effectively innovative techniques into military contexts in ways that aim to mitigate operational and strategic challenges. 

Tallinn Manual 3.0: Achievements, Shortcomings, Prospects

With the Tallinn Manual 3.0 project now underway, this session will examine the influence of the first two editions on the development, interpretation and application of international law as applied in cyberspace. It will explore the appropriateness, benefits and risks of expert-driven processes like the Tallinn Manual project from the perspectives of the experts themselves, those involved in the international dialogue among States on the identification of cyber norms, and legal advisers of States and international organizations involved in cyber operations. The panelists will offer their prognosis for Tallinn Manual 3.0.

Countering Nation State Threats – Mobilizing the Legal Arsenal

The following division of tasks and responsibilities in the field of security is generally accepted: internal security is civilian authorities’ responsibility, while external security is a responsibility of the Armed Forces. Nowadays, however, the interdependence between internal and external security is constantly growing, particularly in the cyber domain.  

In the light of the above, the panel will present the following best practices:  

  • criminal prosecution of foreign military/intelligence officials accused of cyber-crimes; 
  • criminal investigation on on-line recruitment of people fighting alongside militia or terrorist group; 
  • administrative measures banning on information networks carrying war propaganda. 

Coffee break

Lunch

Coffee break

Bus transfers from dinner venue back to the city centre

Bus transfers from Swissotel Tallinn to CyCon Dinner

CyCon Dinner – Proto Invention Factory, Noblessneri

Venue:
PROTO Invention Factory – Peetri 10, Tallinn
www.prototehas.ee/en/home/

This year we are taking you to PROTO Invention factory to enjoy the CyCon dinner with good food, music and the great company of your old and new fellows.

Come and Iimmerse yourself in an interactive fantasy world. Experience the great scientific discoveries of centuries past through unique prototypes brought to life by cutting-edge technology. The wondrous machines that await you here are like something out of Jules Verne’s laboratory.

PROTO Invention Factory is situated in the historic Noblessner Foundry. The history of the Noblessner shipyard goes back to 1912, when two Saint Petersburg businessmen built Tsarist Russia’s most important submarine factory here.

Buses to the CyCon dinner leave at 19:00 from Swissôtel Tallinn.
Buses from the dinner back to the city centre leave at 22:30.