FOUR THEMATIC STREAMS

STATE
STREAM

Facilitating strategic cross-stakeholder co-operation, the development and implementation of the most important public policies for digitisation and cybersecurity.

MILITARY
STREAM

Addressing the evolving dimensions of cyberconflicts in Europe, the role of NATO and the need for comprehensive military co-operation.

FUTURE
STREAM

Providing structured support in the process of identifying challenges and opportunities for both the ICT sector and the global information society and contributing to cybersecurity innovations.

BUSINESS
STREAM

Exploring the various roles of the private sector in crafting regulatory frameworks and developing mature cybersecurity markets.

STATE
STREAM

The notion of increased connectivity and the growing, technological complexity of our daily lives, translate directly to specific challenges for the state. Therefore, it is essential for individual states to seek to adopt public policies that reflect these new realities. Arguably, states and international institutions should define a new approach to cyberspace at large. Merely redefining the current policies will not be enough. A responsible approach to cybersecurity demands a new, solid foundation that will continuously strengthen cyber resilience, both under the current and the future conditions.

Close international and private-public co-operation must be propagated. In the twenty-first century, governments will increasingly seek to harness the power of cyberspace to implement their internal and external policies. Hence, there is a great need for strengthening international relations, credibility and co-operative networks.

CO-OPERATION IN THE CEE TOWARDS SUB-REGIONAL CYBERSECURITY – DEVELOPING CONFIDENCE BUILDING MEASURES

DISCUSSION OBJECTIVES:

  • To disseminate the concept of CBMs for cyberspace
  • To identify and promote measures that could complement international/regional CBM processes from the perspective of the CEE region and for the benefit of the countries from the region
  • To identify additional instruments for the CEE region designed to enhance co-operation and transparency in the field of cybersecurity on the national and sub-regional level

 

NIS DIRECTIVE – HOW TO IMPLEMENT THE FIRST EU LEGISLATION ON CYBERSECURITY?

DISCUSSION OBJECTIVES:

  • To identify the main challenges of NIS Directive implementation
  • To develop recommendations for NIS Directive with reference to implementation roadmap
  • To harmonise Member States strategies and actions in the field of cybersecurity

MILITARY
STREAM

Cyberspace is an immanent dimension of today’s military conflicts. Governments and international organisations are currently facing the challenge of developing new, end-to-end strategies and defence doctrines that take into account this new perspective.

Given that military cyber-operations are very different from conventional warfare, the principles governing them must be carefully considered, while taking into account the experience of entities operating in various areas of cyberspace. The modern digital battlefield not only opens up new possibilities for carrying out military operations but also presents challenges from new security threats.

NATO CYBERDEFENCE POLICY AFTER THE WARSAW SUMMIT

DISCUSSION OBJECTIVES:

  • To discuss and promote conclusions of the NATO Warsaw Summit
  • To explore the untapped opportunities for the enhanced NATO-EU cyber co-operation
  • To identify the next steps for NATO’s cyberdefence policies

 

FIGHTING TERRORISTS WITH TARGETED CYBER-TOOLS

DISCUSSION OBJECTIVES:

  • To analyse different strategies for utilising cyberspace for achieving planned goals
  • To identify and discuss the various activities conducted in cyberspace that can help to fight terrorist groups (with a special focus on cyber intelligence activities)
  • To discuss the possible controversies related to cyber operations aimed against terrorists.

FUTURE
STREAM

The dynamic development of cyberspace has an increasingly powerful influence on societies, political developments and economic prospects. An effective global network would not only benefit from information-sharing, new products and services, but would also help highlights the real security threats for new communication technologies, privacy and data protection.

In order to embrace future challenges, the international community should speak in one voice during the process of identifying and addressing the various, complex and diverse trends of the evolving cyberspace. This will allow for creating strategies, designing concepts and ideas that are instrumental in the context of the expected challenges, especially in cyber and IT education, establishing centres of cyber excellence as well as cybersecurity hubs. The functioning of states, societies and economic entities will depend on the results of these findings and actions.

PREPARING THE WORKFORCE FOR THE UPCOMING CYBER CHALLENGES

DISCUSSION OBJECTIVES:

  • To identify specific areas of expertise where cyber specialists are most in demand
  • To create strategies for education and training (the human resources gap).
  • To identify the role of states, EU, NATO, the private sector and the academia

CYBERSECURITY INNOVATIONS – FOSTERING DEVELOPMENT  AND CO-OPERATION

DISCUSSION OBJECTIVES:

  • To explore the best practices in building multi-stakeholder communities where the most creative ideas and the most innovative R&D projects are given proportionate emphasis
  • To identify the factors that boost innovation in the field of cybersecurity
  • To enhance co-operation and networking opportunities between various cyber communities

BUSINESS
STREAM

The dynamic development of cyberspace has created completely new opportunities for businesses. At the same time, companies become targets of cyberattacks launched from anywhere across the globe. Cyberattacks may result in the disruption of various business processes and services. They may also lead to the physical destruction of infrastructure, loss of confidential information, financial resources and, last but not least, damage to business reputation. It means that cybersecurity must be treated as an intrinsic aspect of the overall business strategy.

Furthermore, the private sector is constantly engaged in the development of mature cybersecurity solutions. The role of the private-sector companies in enhancing the overall level of national security grows every day. Private-public co-operation is the key foundation for all successful actions, projects and initiatives. Hence, it must be treated as the central component of national cybersecurity strategies.

CYBERSECURITY OF INDUSTRIAL CONTROL SYSTEMS

DISCUSSION OBJECTIVES:

  • To understand the importance of industrial control systems (ICSs) and specific conditions that impact cybersecurity
  • To identify the main cyberthreats that potentially threaten the security of ICSs
  • To develop security recommendations for ICS (in different sectors)

GLOBAL, REGIONAL AND NATIONAL PUBLIC-PRIVATE CO-OPERATION – SUCCESS STORIES

DISCUSSION OBJECTIVES:

  • To identify the common denominators of successful private-public initiative
  • To explore the various strategies aimed at bringing together both the public and the private sector in the process of designing cybersecurity eco-systems and jointly responding to cyberthreats
  • To promote valuable initiatives and enhance co-operation between stakeholders.