• pragueconference@nukib.gov.cz

18 March 2025

Main Hall

9:00 - 9:30

9:30 - 10:30

11:00 – 11:15

11:15 – 12:15

This panel will bring together cybersecurity experts from various sectors to address the covert cyber
tactics, or ‘Shadow Ops’, that China uses in Western countries. The discussion will combine insights from research, policy, and technical defence to reveal how these covert tactics exploit vulnerabilities to infiltrate Western infrastructure and institutions.

 

Panelists will analyze recent cyber incidents and discuss strategies to uncover and counteract these covert interferences, offering a deeper insight into the unseen risks that threaten our core systems.

12:15 – 13:15

13:15 – 14:30

In a rapidly evolving digital environment where IoT devices have become an integral part of our lives, innovation and cybersecurity must go hand in hand. Integrating security measures into products, from design to deployment, is essential to boost user confidence and to ensure resilience against evolving threats.

This panel brings together experts in cybersecurity and regulatory affairs to provide a comprehensive view of approaches to Security by Design across different regions around the world, such as the EU Cyber Resilience Act, as well as insights into their practical implementation. Panelists will discuss the challenges and strategies for aligning product security measures within these frameworks, given the complex- ities of cross-border compliance and possible impacts on global markets.

15:00 – 16:00

Satellite systems are an indispensable part of the everyday function of society, including navigation systems, communication systems, agriculture, and military applications It is essential for users in Europe and elsewhere else to be prepared for the possible crisis. One way to ensure continuity particulary at government and critical infrastructure level is to promote the use of robust and encrypted satellite services.

They consist of information systems and operate through cyberspace, ensuring their cyber-security is of paramount importance. The increasing reliance on satellite networks for military, financial, and civilian operations make them high-value target which is why their protection from cyber threats ensures the continuity of critical infrastructure and national security. Without robust cyber-security measures, satellites could become vulnerable to interferences that could lead to dire consequences.

How can we improve the cyber resilience of satellite systems to better protect them from cyber attacks? How can international collaboration improve this protection of satellite systems?

16:00 – 17:00

A new era is emerging in which data has become a powerful tool, often used for strategic purposes. The dominance of data is changing the face of global security and national sovereignty, and its importance in the geopolitical stage is increasing growing. The growing rivalry between the West and China is fundamentally driven by technology — and by data itself. Once primarily a matter of national interest, data now influences of national security, trade, global supply chains, and technological dominance, and forms the bases of nation state resilience and strategy.

 

What challenges do states face in gathering and using data to enhance their military, technological superiority, and strategic influence? How does data affect national security today, and how will it affect the future? What tools does the West have to defend against China’s large-scale data collection, analytics, and AI programs?  And how can we counter nation-state and state-sponsored efforts to secure a technological advantage through data collection on critical assets and technologies?

Conference Room

11:00 - 12:15

The energy sector is the backbone of today’s economy and the delivery of essential services, and its cybersecurity is one of the critical components of its operation. With their energy sectors increasingly targeted by Russian, Chinese and Iranian malicious cyber activity, states have developed many initiatives aimed at protect better protecting and defending their energy sectors.


Are energy-specific principles and regulations, such as the new EU Network Code on cybersecurity for the electricity sector, G7’s cybersecurity framework for operational technologies in energy systems, or the Supply Chain Cybersecurity Principles of the US DOE, an emerging trend?

12:15 – 13:15

13:15 – 14:30

Cyber threats against the telecommunications sector are on the rise, posing risks to global
communication networks. On these ‘invisible frontlines‘, cybersecurity professionals face the
challenge of securing complex infrastructure from sustained and increasingly sophisticated attacks.

This session will bring together telecommunications and cybersecurity leaders to explore strategies
for identifying and mitigating risks, securing the supply chain, and strengthening the resilience of telecommunications systems against invisible cyber adversaries.

15:00 – 15:45

Join us for an engaging fireside chat featuring speakers with first-hand experience and addressing how Iran and its proxies are using cyberspace for strategic operations. This session will reveal
how Iran uses cyber warfare, including espionage, disinformation campaigns, and disruptive attacks and highlight the technology and infrastructure supporting these activities.

Experts will discuss the geopolitical motivations behind these digital threats, the challenges they pose to global security, and strategies for effective defence. Gain unique perspectives from
directly affectted regions and understand the critical intersection of technology and terror shaping today’s international cybersecurity dynamics.

15:45 – 17:00

Join a dynamic roundtable on capacity building in cybersecurity with a variety of experts from differ-
ent sectors in Latin America, Indo-Pacific, Africa and Europe. This discussion will explore the different strategies and frameworks used to strengthen cybersecurity resilience, from national policy initiatives and regional cooperration to grassroots and community-led efforts.

Speakers will compare approaches tailored to unique regional challenges and highlight successes,
lessons learned, and areas for innovation. Gain a deeper understanding of how different regions
address the evolving cyber threat landscape and discover opportunities for international cooperation and knowledge sharing to build robust cybersecurity ecosystems.

18:00 - 00:00

Červený Jelen

Join global leaders, representatives and experts from the government and private sector, as well as research and academic institutions from like-minded nations.

A set of recommendations on both technical and non-technical risks that States should consider when planning, building, launching and operating their infrastructure.
The Prague 5G Repository is a virtual library dedicated to the exchange of existing approaches, tools, instruments and frameworks in the field of 5G security.
In the case you wish to access the Prague 5G Repository, please contact us at pragueconference@nukib.cz

The access to the Prague 5G Repository is limited to participating States and organizations.

For any inquiries please email us

pragueconference@nukib.cz

Let's Connect