18/march/2025
18 March 2025
Main Hall
9:00 – 9:30
Lukáš Kintr
Director, National Cyber and Information Security Agency, Czechia
Lt. Gen. Michelle McGuinness
National Cyber Security Coordinator, Department of Home Affairs, Australia
9:30 – 10:30
Trusted Technology: the Cornerstone of National Security
Len Khodorkovsky
moderator
Senior Advisor to the Chairman, Krach Institute for Tech Diplomacy at Purdue University
Lukáš Kintr
Director, National Cyber and Information Security Agency, Czechia
Nobutaka Takeo
Director of Cybersecurity Division, Ministry of Economy, Trade and Industry, Japan
Łukasz Wojewoda
Director of Cybersecurity Department, Ministry of Digital Affairs, Poland
Jennifer Bachus
Acting Head of Bureau for Cyberspace & Digital Policy, US Department of State, Unites States of America
11:00 – 11:15
Protecting Strategic Infrastructure: Introduction to the New Czech Cybersecurity Act
Tomáš Krejčí
Deputy Director of National Cyber and Security Center Division, National Cyber and Information Security Agency, Czechia
11:15 – 12:15
Invisible Frontlines: Confronting China’s Shadow Ops
This panel will bring together cybersecurity experts from various sectors to address the covert cyber tactics, or ‘Shadow Ops’, that China uses in Western countries. The discussion will combine insights from research, policy, and technical defence to reveal how these covert tactics exploit vulnerabilities to infiltrate Western infrastructure and institutions.
Panellists will analyze recent cyber incidents and discuss strategies to uncover and counteract these covert interferences, offering a deeper insight into the unseen risks that threaten our core systems.
John R. Moolenaar
virtual keynote
US Representative and Chair of the Select Committee on CCP, US Congress, United Sates of America
Didi Kirsten Tatlow
moderator
Senior Reporter for International Affairs, Newsweek, Germany
Lyall King
Director of Risk Mitigation Programs, Canadian Centre for Cyber Security, Canada
Jakub Landovský
Executive Director, Aspen Institute Central Europe, Czechia
Antanas Aleknavičius
Acting Director, National Cyber Security Centre, Lithuania
David Gardáš
sinologist and analyst, project Sinopsis, Czechia
12:15 – 13:15
13:15 – 14:30
From Compliance to Resilience: Harmonizing and Implementing Security by Design Principles
In a rapidly evolving digital environment where IoT devices have become an integral part of our lives, innovation and cybersecurity must go hand in hand. Integrating security measures into products, from design to deployment, is essential to boost user confidence and to ensure resilience against evolving threats.
This panel brings together experts in cybersecurity and regulatory affairs to provide a comprehensive view of approaches to Security by Design across different regions around the world, such as the EU Cyber Resilience Act, as well as insights into their practical implementation. Panellists will discuss the challenges and strategies for aligning product security measures within these frameworks, given the complexities of cross-border compliance and possible impacts on global markets.
Tom Burin
moderator
Co-founder, Delta 6, Belgium
Christian D’Cunha
Head of Cyber Coordination Task Force, DG CONNECT, European Union
Chua Kuan Seah
Deputy Chief Executive, Cyber Security Agency, Singapore
Miguel de Bruycker
Managing Director General, Centre for Cybersecurity Belgium, Belgium
Eva Tělecká
Chief Information Security Office for EMEA, MSD, Czechia
Max Peterson
Vice President, AWS, United States of America
15:00 – 16:00
Disrupting the Skies: from Satellite Spoofing to State-Driven Interference
Satellite systems are an indispensable part of the everyday function of society, including navigation systems, communication systems, agriculture, and military applications. It is essential for users in Europe and elsewhere to be prepared for the possible crisis. One way to ensure continuity particulary at government and critical infrastructure level is to promote the use of robust and encrypted satellite services.
They consist of information systems and operate through cyberspace, ensuring their cyber-security is of paramount importance. The increasing reliance on satellite networks for military, financial, and civilian operations make them high-value targets which is why their protection from cyber threats ensures the continuity of critical infrastructure and national security. Without robust cybersecurity measures, satellites could become vulnerable to interferences that could lead to dire consequences.
How can we improve the cyber resilience of satellite systems to better protect them from cyber attacks? How can international collaboration improve this protection of satellite systems?
Anna Blechová
moderator
Masaryk University, Czechia
Jana Bašistová
Head of Satellite Services Security Unit, National Cyber and Information Security Agency, Czechia
Jerry Javornicky
Co-Founder, SpaceKnow, Czechia
P. J. Blount
Assistant Professor of Space Law, Durham University, United Kingdom
16:15 – 17:15
Data Dominance: Redefining National Security and Defence
A new era is emerging in which data has become a powerful tool, often used for strategic purposes. The dominance of data is changing the face of global security and national sovereignty, and its importance in the geopolitical stage is increasing. The growing rivalry between the West and China is fundamentally driven by technology — and by data itself. Once primarily a matter of national interest, data now influences national security, trade, global supply chains, and technological dominance, and forms the bases of nation state resilience and strategy.
What challenges do states face in gathering and using data to enhance their military, technological superiority, and strategic influence? How does data affect national security today, and how will it affect the future? What tools does the West have to defend against China’s large-scale data collection, analytics, and AI programs? And how can we counter nation-state and state-sponsored efforts to secure a technological advantage through data collection on critical assets and technologies?
Daniel Bagge
moderator
Senior Intelligence Specialist, Strider Technologies
Makoto Kamoshita
Counsellor, National Center of Incident Readiness and Strategy for Cybersecurity, Japan
Dalibor Kačmář
National Technology Officer, Microsoft, Czechia
Staffan Truvé
Co-Founder & Chief Technology Officer, Recorded Future, Sweden
Conference Room
10:45 – 12:45
Partners´ stage
Fireside Chat: Andrew Vennekotter/Simona Vyšatová
AWS/NÚKIB
Ctibor Jappel
CETIN
Zuzana Švecová
Cisco
MSD Team
Robert Šefr
Whalebone
ICZ partner
12:15 – 13:15
13:15 – 14:30
Beyond Bandwidth: Building Resilience in the Telecommunications Sector
Cyber threats against the telecommunications sector are on the rise, posing risks to global communication networks. On these ‘invisible frontlines‘, cybersecurity professionals face the challenge of securing complex infrastructure from sustained and increasingly sophisticated attacks.
This session will bring together telecommunications and cybersecurity leaders to explore strategies for identifying and mitigating risks, securing the supply chain, and strengthening the resilience of telecommunications systems against invisible cyber adversaries.
Vilém Veselý
moderator
Head of Department for Electronic Communications, Ministry of Industry and Trade, Czechia
Juraj Šedivý
Chief Executive Officer, CETIN International, Czechia
Mikko Karikytö
Chief Product Security Officer, Ericsson, Finland
Kevin Adams
Deputy Director Telecoms Security & Resilience, Department for Science, Innovation & Technology, United Kingdom
Tomas Jakimavicius
Director, Government Affairs, Microsoft, Lithuania
Alex Leadbeater
Technical Security Director, GSMA, United Kingdom
Agostino Santoni
Vice President, Cisco South Europe, CISCO, Italy
15:00 – 15:45
Tech and Terror: Exploring the Digital Operations of Iran and its Proxies in Cyberspace
Join us for an engaging fireside chat featuring speakers with first-hand experience and addressing how Iran and its proxies are using cyberspace for strategic operations. This session will reveal how Iran uses cyber warfare, including espionage, disinformation campaigns, and disruptive attacks and highlight the technology and infrastructure supporting these activities.
Experts will discuss the geopolitical motivations behind these digital threats, the challenges they pose to global security, and strategies for effective defence. Gain unique perspectives from directly affected regions and understand the critical intersection of technology and terror shaping today’s international cybersecurity dynamics.
Amir Sagie
Cyber Coordinator, Ministry of Foreign Affairs, Israel
Era Gjata
Head of Sector, Coordination of International Projects, Strategic Development and Identification, National Cyber Security Authority, Albania
15:45 – 17:15
Empowering Regions through Cyber Capacity Building
Join a dynamic roundtable on capacity building in cybersecurity with a variety of experts from different sectors in Latin America, Indo-Pacific, Africa and Europe. This discussion will explore the different strategies and frameworks used to strengthen cybersecurity resilience, from national policy initiatives and regional cooperation to grassroots and community-led efforts.
Speakers will compare approaches tailored to unique regional challenges and highlight successes, lessons learned, and areas for innovation. Gain a deeper understanding of how different regions address the evolving cyber threat landscape and discover opportunities for international cooperation and knowledge sharing to build robust cybersecurity ecosystems.
Merle Maigre
moderator
Senior Cyber Security Expert, e-Governence Academy, Estonia
Gorazd Božič
SI-CERT Team Manager, Academic and Research Network of Slovenia, Slovenia
Claudio Peguero
Ambassador, Advisor on Cyber Affairs, Ministry of Foreign Affairs
Albert Antwi-Boasiako
Director- General, Cyber Security Authority, Ghana
Robert Šefr
Chief Technology Officer, Whalebone, Czechia
18:00 – 00:00
Červený Jelen
Welcome reception at Červený Jelen
Join global leaders, representatives and experts from the government and private sector, as well as research and academic institutions from like-minded nations.
See who’s speaking
Read the Prague Proposals
A set of recommendations on both technical and non-technical risks that States should consider when planning, building, launching and operating their infrastructure.
Access the Prague 5G Repository
The Prague 5G Repository is a virtual library dedicated to the exchange of existing approaches, tools, instruments and frameworks in the field of 5G security.
In the case you wish to access the Prague 5G Repository, please contact us at pragueconference@nukib.cz
The access to the Prague 5G Repository is limited to participating States and organizations.
Recent Comments