Registration desk open
Tech Behind the Horizon
This closing session of Technology track will briefly review tech track highlights, but mostly focuses on the future. Distinguished panelists will provide industry, research and military viewpoints on emerging tech issues for CyCon 2025 and beyond.
Cyber Defence and Strategic Competition: Adjusting to Unpeace
With the advent of approaches such as persistent engagement, cyberspace has become a theatre of sub-threshold activity. This panel discusses the consequences of constant tension in cyberspace and what it means for civilian-military cooperation, legislative frameworks, and striking the right balance between national security and individual civil liberties.
Lunch
Closing Remarks and CyCon 2025 Announcement
Closing Keynote
Break
Coffee Break
Keynote: Future-Proofing Data Transmissions with Post-Quantum VPN
The day a cryptographically relevant quantum computer (CRQC) with enough power to crack modern encryption arrives is fast approaching. In anticipation of that threat, governments worldwide are advising agencies and commercial entities to start taking action now. Although these powerful quantum computers are not expected to exist for another 5 to 15 years, malicious actors are already undertaking harvesting attacks – where a copy of the data transmission is kept until a CRQC is available to break the encryption keys.
The US National Institute of Standards and Technology and industry leaders are busy working on post-quantum security solutions to prevent harvesting attacks, and solutions based on open standards are already available, with more on the way. This session will address two ways of future-proofing data transmissions with post-quantum VPNs. Security and network administrators, quantum migration specialists, and key decision makers must become familiar with the options and the benefits they provide to start planning their path to a quantum-resistant world now.
Keynote: Key Questions and Approaches to Building Cyber Resilience
Cyber resilience has become an increasingly prominent topic both in national strategies and internationally. Based on his 40 years of involvement in cybersecurity and strategy creation and implementation, the speaker will focus on questions and approaches that are likely to be important in enhancing both NATO’s cybersecurity and its operational capability. This Keynote will touch upon how and where military requirements can drive innovation, and in which areas it is more productive to leverage existing trends in technology, addressing the opportunities and challenges of AI integration and the over the horizon risks that could limit its use, and the implications of all these factors to NATO’s approach to cybersecurity.
Keynote: ASIC and QUANTUM Technologies serving National Cybersecurity
In the presentation initial focus will be on the security assessment of the risk that our Nations must face in order to protect “cyber borders” and “physical access” (including SCADA, Operational Technology and IoT). This will be followed up by description of interesting technologies that Telsy has developed and which could be applied in several ways (Secure Microchip, Application-Specific Integrated Circuit (ASIC), Quantum Key Distribution, Encryptors and Decision Intelligence).