• info@praguecyber.com

18/march/2025

18 March 2025

Main Hall

9:00 – 9:30

Opening Ceremony

Lukáš Kintr

Director, National Cyber and Information Security Agency, Czechia

Lt. Gen. Michelle McGuinness

National Cyber Security Coordinator, Department of Home Affairs, Australia

SpeakersClose

9:30 – 10:30

Trusted Technology: the Cornerstone of National Security

Len Khodorkovsky

moderator

Senior Advisor to the Chairman, Krach Institute for Tech Diplomacy at Purdue University

Lukáš Kintr

Director, National Cyber and Information Security Agency, Czechia

Nobutaka Takeo

Director of Cybersecurity Division, Ministry of Economy, Trade and Industry, Japan

Łukasz Wojewoda

Director of Cybersecurity Department, Ministry of Digital Affairs, Poland

Jennifer Bachus

Acting Head of Bureau for Cyberspace & Digital Policy, US Department of State, Unites States of America

SpeakersClose

11:00 – 11:15

Protecting Strategic Infrastructure: Introduction to the New Czech Cybersecurity Act

Tomáš Krejčí

Deputy Director of National Cyber and Security Center Division, National Cyber and Information Security Agency, Czechia

SpeakerClose

11:15 – 12:15

Invisible Frontlines: Confronting China’s Shadow Ops

This panel will bring together cybersecurity experts from various sectors to address the covert cyber tactics, or ‘Shadow Ops’, that China uses in Western countries. The discussion will combine insights from research, policy, and technical defence to reveal how these covert tactics exploit vulnerabilities to infiltrate Western infrastructure and institutions.

Panellists will analyze recent cyber incidents and discuss strategies to uncover and counteract these covert interferences, offering a deeper insight into the unseen risks that threaten our core systems.

John R. Moolenaar

virtual keynote

US Representative and Chair of the Select Committee on CCP, US Congress, United Sates of America

Didi Kirsten Tatlow

moderator

Senior Reporter for International Affairs, Newsweek, Germany

Lyall King

Director of Risk Mitigation Programs, Canadian Centre for Cyber Security, Canada

Jakub Landovský

Executive Director, Aspen Institute Central Europe, Czechia

Antanas Aleknavičius

Acting Director, National Cyber Security Centre, Lithuania

David Gardáš

sinologist and analyst, project Sinopsis, Czechia

SpeakersClose

12:15 – 13:15

Lunch Break

13:15 – 14:30

From Compliance to Resilience: Harmonizing and Implementing Security by Design Principles

In a rapidly evolving digital environment where IoT devices have become an integral part of our lives, innovation and cybersecurity must go hand in hand. Integrating security measures into products, from design to deployment, is essential to boost user confidence and to ensure resilience against evolving threats.

This panel brings together experts in cybersecurity and regulatory affairs to provide a comprehensive view of approaches to Security by Design across different regions around the world, such as the EU Cyber Resilience Act, as well as insights into their practical implementation. Panellists will discuss the challenges and strategies for aligning product security measures within these frameworks, given the complexities of cross-border compliance and possible impacts on global markets.

Tom Burin

moderator

Co-founder, Delta 6, Belgium

Christian D’Cunha

Head of Cyber Coordination Task Force, DG CONNECT, European Union

Chua Kuan Seah

Deputy Chief Executive, Cyber Security Agency, Singapore

Miguel de Bruycker

Managing Director General, Centre for Cybersecurity Belgium, Belgium

Eva Tělecká

Chief Information Security Office for EMEA, MSD, Czechia

Max Peterson

Vice President, AWS, United States of America

SpeakersClose

15:00 – 16:00

Disrupting the Skies: from Satellite Spoofing to State-Driven Interference

Satellite systems are an indispensable part of the everyday function of society, including navigation systems, communication systems, agriculture, and military applications. It is essential for users in Europe and elsewhere to be prepared for the possible crisis. One way to ensure continuity particulary at government and critical infrastructure level is to promote the use of robust and encrypted satellite services.

They consist of information systems and operate through cyberspace, ensuring their cyber-security is of paramount importance. The increasing reliance on satellite networks for military, financial, and civilian operations make them high-value targets which is why their protection from cyber threats ensures the continuity of critical infrastructure and national security. Without robust cybersecurity measures, satellites could become vulnerable to interferences that could lead to dire consequences.

How can we improve the cyber resilience of satellite systems to better protect them from cyber attacks? How can international collaboration improve this protection of satellite systems?

Anna Blechová

moderator

Masaryk University, Czechia

Jana Bašistová

Head of Satellite Services Security Unit, National Cyber and Information Security Agency, Czechia

Jerry Javornicky

Co-Founder, SpaceKnow, Czechia

P. J. Blount

Assistant Professor of Space Law, Durham University, United Kingdom

SpeakersClose

16:15 – 17:15

Data Dominance: Redefining National Security and Defence

A new era is emerging in which data has become a powerful tool, often used for strategic purposes. The dominance of data is changing the face of global security and national sovereignty, and its importance in the geopolitical stage is increasing. The  growing rivalry between the West and China is fundamentally driven by technology — and by data itself. Once primarily a matter of national interest, data now influences national security, trade, global supply chains, and technological dominance, and forms the bases of nation state resilience and strategy.

What challenges do states face in gathering and using data to enhance their military, technological superiority, and strategic influence? How does data affect national security today, and how will it affect the future? What tools does the West have to defend against China’s large-scale data collection, analytics, and AI programs?  And how can we counter nation-state and state-sponsored efforts to secure a technological advantage through data collection on critical assets and technologies?

Daniel Bagge

moderator

Senior Intelligence Specialist, Strider Technologies

Makoto Kamoshita

Counsellor, National Center of Incident Readiness and Strategy for Cybersecurity, Japan

Dalibor Kačmář

National Technology Officer, Microsoft, Czechia

Staffan Truvé

Co-Founder & Chief Technology Officer, Recorded Future, Sweden

SpeakersClose

Conference Room

10:45 – 12:45

Partners´ stage

Fireside Chat: Andrew Vennekotter/Simona Vyšatová

AWS/NÚKIB

Ctibor Jappel

CETIN

Zuzana Švecová

Cisco

MSD Team

Robert Šefr

Whalebone

ICZ partner

SpeakersClose

12:15 – 13:15

Lunch Break

13:15 – 14:30

Beyond Bandwidth: Building Resilience in the Telecommunications Sector

Cyber threats against the telecommunications sector are on the rise, posing risks to global communication networks. On these ‘invisible frontlines‘, cybersecurity professionals face the challenge of securing complex infrastructure from sustained and increasingly sophisticated attacks.

This session will bring together telecommunications and cybersecurity leaders to explore strategies for identifying and mitigating risks, securing the supply chain, and strengthening the resilience of telecommunications systems against invisible cyber adversaries.

Vilém Veselý

moderator

Head of Department for Electronic Communications, Ministry of Industry and Trade, Czechia

Juraj Šedivý

Chief Executive Officer, CETIN International, Czechia

Mikko Karikytö

Chief Product Security Officer, Ericsson, Finland

Kevin Adams

Deputy Director Telecoms Security & Resilience, Department for Science, Innovation & Technology, United Kingdom

Tomas Jakimavicius

Director, Government Affairs, Microsoft, Lithuania

Alex Leadbeater

Technical Security Director, GSMA, United Kingdom

Agostino Santoni

Vice President, Cisco South Europe, CISCO, Italy

SpeakersClose

15:00 – 15:45

Tech and Terror: Exploring the Digital Operations of Iran and its Proxies in Cyberspace

Join us for an engaging fireside chat featuring speakers with first-hand experience and addressing how Iran and its proxies are using cyberspace for strategic operations. This session will reveal how Iran uses cyber warfare, including espionage, disinformation campaigns, and disruptive attacks and highlight the technology and infrastructure supporting these activities.

Experts will discuss the geopolitical motivations behind these digital threats, the challenges they pose to global security, and strategies for effective defence. Gain unique perspectives from directly affected regions and understand the critical intersection of technology and terror shaping today’s international cybersecurity dynamics.

Amir Sagie

Cyber Coordinator, Ministry of Foreign Affairs, Israel

Era Gjata

Head of Sector, Coordination of International Projects, Strategic Development and Identification, National Cyber Security Authority, Albania

SpeakersClose

15:45 – 17:15

Empowering Regions through Cyber Capacity Building

Join a dynamic roundtable on capacity building in cybersecurity with a variety of experts from different sectors in Latin America, Indo-Pacific, Africa and Europe. This discussion will explore the different strategies and frameworks used to strengthen cybersecurity resilience, from national policy initiatives and regional cooperation to grassroots and community-led efforts.

Speakers will compare approaches tailored to unique regional challenges and highlight successes, lessons learned, and areas for innovation. Gain a deeper understanding of how different regions address the evolving cyber threat landscape and discover opportunities for international cooperation and knowledge sharing to build robust cybersecurity ecosystems.

Merle Maigre

moderator

Senior Cyber Security Expert, e-Governence Academy, Estonia

Gorazd Božič

SI-CERT Team Manager, Academic and Research Network of Slovenia, Slovenia

Claudio Peguero

Ambassador, Advisor on Cyber Affairs, Ministry of Foreign Affairs

Albert Antwi-Boasiako

Director- General, Cyber Security Authority, Ghana

Robert Šefr

Chief Technology Officer, Whalebone, Czechia

SpeakersClose

18:00 – 00:00

Červený Jelen

Welcome reception at Červený Jelen

Join global leaders, representatives and experts from the government and private sector, as well as research and academic institutions from like-minded nations.


See who’s speaking



Read the Prague Proposals

A set of recommendations on both technical and non-technical risks that States should consider when planning, building, launching and operating their infrastructure.

Access the Prague 5G Repository

The Prague 5G Repository is a virtual library dedicated to the exchange of existing approaches, tools, instruments and frameworks in the field of 5G security.
In the case you wish to access the Prague 5G Repository, please contact us at pragueconference@nukib.cz

The access to the Prague 5G Repository is limited to participating States and organizations.

For any inquiries please email us

pragueconference@nukib.gov.cz

Let’s Connect


Facebook-f


X-twitter


Linkedin


Instagram


Youtube