Safeguarding Against Data Misuses in Modern Conflicts (Law)

Cyber operations can leverage various techniques to deliver effects, that could involve the use of personal data, the influencing of individuals’ perceptions and attitudes, or potentially both. The availability of personal data collected in military cyber operations can be exploited to intimidate adversaries, undermine their morale, spread disinformation, etc.,. It can also be used to manipulate or even cause harm to civilians. Arguably, such uses of personal data cannot be unrestricted, even in the context of modern conflicts. Against this background, this panel will focus on the legal framework for military psychological operations in cyberspace and data protection in times of armed conflict.

Security from the Field (Tech)

This session is dedicated to contributions from practitioners in the cyber security industry. Industry experts will share their experience on the topics of hacktivism, the use of cyber crime resources for national goals, and harnessing natural language processing for intelligence analysis.

Capacity Building: Cyber Security of Ports and Maritime Transport (Strat)

Robust port and maritime cybersecurity is essential for national and international security, military readiness, and efficient supply chains. During this session, the EU CyberNet will share experiences from research carried out in cooperation with the CRIMSON project on maritime cybersecurity in African ports and with other EU-funded projects on port security in Latin America. The session describes deficiencies identified in the cybersecurity of ports and the root causes of these deficiencies, which arise from the specific nature of their infrastructure. The experts participating in the panel will share their perspectives on port infrastructure from the points of view of port operators, state supervision, development aid providers, and military planning. The session also introduces the lessons learned from large-scale training organised for West African ports.

Keeping Peace in Outer Space (Law)

Outer space is an area of growing economic and technological importance. It is also a developing theatre of military activity and warfare, which includes the proliferation of counterspace, or antisatellite, capabilities. Against this backdrop, the development of a legal framework for military activities in outer space is of critical urgency. The panel will discuss the principal developments in the relevant areas of international law, as well as assessing the effectiveness of the current legal framework.

Tech Across the Horizon (Tech)

This session will present selected topics on cyber security – from implementing post-quantum cryptography in national infrastructure to cyber security as it pertains to unmanned marine vessels.

Future Foresight: Visions of Cyberspace, Methodologies, and Applications (Strat)

Niels Bohr said that ‘Prediction is very difficult, especially if it’s about the future’. Nevertheless, we all need to plan for the future. Strategic forecasting and foresight can help policy planners better define the significant and likelihood of future risks and opportunities and offer better responses to them. This panel discusses how strategic forecasting and foresight can be applied to the future of cyber conflict, as well as innovative methods of how to do that.

Bus Transfer from Dinner Venue to City Centre and the Hilton Tallinn Park Hotel

CyCon Dinner at PROTO Invention Factory

Venue: PROTO Invention Factory – Peetri 10, Tallinn

Location on the map:

This year we are taking you to the PROTO Invention Factory to enjoy good food, music, and the excellent company of your old and new colleagues at the CyCon dinner.

The PROTO Invention Factory is located in the former foundry of the Noblessner submarine factory. It features dozens of attractions that make use of innovative technology to convey the exciting atmosphere of Jules Vernes’ era of fabulous inventions. PROTO’s uniqueness lies in its combination of novel virtual reality technology with technological prototypes from over a hundred years ago to produce an entertaining experimentation lab.

Buses to the CyCon dinner leave at 19:00 from Hilton Tallinn Park Hotel. Buses from the dinner back to the city centre leave at 22:30.

Bus Tranfers from Hilton Tallinn Park Hotel to CyCon Dinner

Coffee Break


Compute to Compete: Cloud, AI, and Strategic Competition over Digital Infrastructure 

There is little about the current era of strategic competition that does not tie back, in some way, to the digital infrastructure powering nations and multi-national companies. Be it the planetary scale cloud computing or the emerging bubble of AI services, everything from modern banking to contemporary weapon systems rely heavily on backbone digital infrastructure. The competition for access, control over, and restriction of that infrastructure is carving battle lines even amidst close allies and partners. Within this landscape, access to technologies such as sophisticated semiconductors, AI-enabled large-scale data processing, and cloud computing infrastructure creates both economic and strategic advantages for states and companies.

Computing power will only become more central to core public and national security functions. Thus, states have increasingly sought to respond to this competition over computing power through statecraft, building their own capacity through investing in onshoring (or friend-shoring) key technology manufacturing processes, supporting the development of domestic cloud computing businesses, and allocating government resources to accelerate AI development while seeking to restrict those same resources to others.

This session seeks to update the vital conversation about computing power as a strategic resource.

Coffee Break


Keynote: Maximizing Efficiency in CERT and CDC: Bridging the Gap Between Theory and Practice

The evolving landscape of cyber defence, characterized by the pivotal roles of cyber defence centres (CDCs) and computer emergency response teams (CERTs), presents a complex challenge to safeguarding the defence sector and nation-states against sophisticated cyber threats. This session will delve into the intricacies of automation in cyber defence, the strategic shift towards orchestration, the transformative impact of machine learning, and the art of translating potential threats into actionable intelligence through Natural Language Processing (NLP). Attendees will gain insights directly from field experiences, exploring how these technological advancements are applied in real-world scenarios to enhance cyber resilience.

Automation in Cyber Defence: How do experts balance the efficiency of automated cyber defence mechanisms with the necessity for human intuition in interpreting complex threat patterns? This question will guide our exploration of the current state of automation, shedding light on the successes and challenges faced by practitioners in leveraging automation to streamline threat detection and incident response efforts.

Orchestration as a Strategic Shift: In what ways has the transition from big data analytics to orchestration changed the game for cyber defence operations? Attendees will learn from practitioners about the integration of various cybersecurity tools through orchestration platforms, illustrating how this approach facilitates a more coordinated and agile response to cyber incidents.

Machine Learning’s Transformative Impact: How are CDCs and CERTs utilizing machine learning to proactively detect and mitigate new and evolving cyber threats, such as those posed by connected vehicles? This discussion will provide concrete examples of machine learning in action, demonstrating its capability to analyse vast datasets for pattern recognition and anomaly detection, thereby enhancing predictive cyber defence strategies. Injecting Intelligence into the Decision Process: How can the application of NLP transform unstructured threat information into structured, actionable threat-hunting strategies? The session will reveal how cyber analysts use NLP to interpret human language, extract relevant cybersecurity information, and map it onto known threat behaviours, enriching the proactive hunting capabilities of cyber defence entities and enabling leadership decision cycles concerning defence measures and/or strategies.

Keynote: Algorithms to Armies: How AI Shapes National Security and Cyber Defence


Keynote: Cybersecurity and Securing your Critical Infrastructure and Defense Sector

A review of the cybersecurity landscape, mapping standards, Zero Trust and how cybersecurity can be used for the defense sector.

Registration desk open