Main Hall
9:00 - 9:30
9:30 – 10:30
In this session, cybersecurity leaders and legal experts will explore the full spectrum of tools
and strategies used to confront malicious actors in cyberspace, from attribution techniques to sanctions and criminal indictments.
They will discuss evolving strategies on the invisible frontlines of cybersecurity, where collaborative
efforts between governments, law enforcement, and private entities aim to deter malicious actors.
11:00 – 12:15
In emergency situations, be it man-made crises, wars or natural disasters, the public sector faces
increased challenges in securing sensitive data while maintaining operational availability. In order to ensure digital continuity at all times, especially in the case of critical data, various solutions, such as establishing digital embassies, might be considered by states.
On the other hand, the transfer of data abroad brings additional risks that need to be taken into account. A group of policymakers and technical experts will discuss strategies for resilient architectures, data storage methods, digital maturity as well as the financial, legal and security implications associated with different approaches to ensure uninterrupted access to critical systems and services. The panel discussion will provide insights into different perspectives on cloud security in light of current geopolitical tensions.
12:15 – 13:15
13:15 – 14:30
In emergency situations, be it man-made crises, wars or natural disasters, the public sector faces
increased challenges in securing sensitive data while maintaining operational availability. In order to ensure digital continuity at all times, especially in the case of critical data, various solutions, such as establishing digital embassies, might be considered by states.
On the other hand, the transfer of data abroad brings additional risks that need to be taken into account. A group of policymakers and technical experts will discuss strategies for resilient architectures, data storage methods, digital maturity as well as the financial, legal and security implications associated with different approaches to ensure uninterrupted access to critical systems and services. The panel discussion will provide insights into different perspectives on cloud security in light of current geopolitical tensions
15:00 – 16:15
With increasing global strategic competition, protecting research and innovation has become a critical priority. Foreign threats from intellectual property theft to supply chain vulnerabilities,threaten the integrity of groundbreaking scientific discoveries, technology, and the industry.
This panel will delve into strategies for mitigating the impact of theserisks, both within and outside
of cybersecurity, and explore how nation states and individual organizations can adapt to secure their innovations. By examining the role of governments, businesses, and academia, we will uncover how collaboration can redefine protection mechanisms in this new area of threats.