• info@praguecyber.com

The Legal Battlefield: Nations Interpreting International Law in Cyberspace

PANEL The Legal Battlefield: Nations Interpreting International Law in Cyberspace DAY 2 / 13:15 – 14:15 / CONFERENCE ROOM The rapid evolution of the digital age and the rise of new threats have challenged traditional mechanisms for enforcing international law, raising questions about its effectiveness and adaptability. As more states publish national positions on how existing rules apply, critical questions

GNSS Jamming: A Growing Threat to National Critical Infrastructure

PANEL GNSS Jamming: A Growing Threat to National Critical Infrastructure DAY 2 / 9:30 – 10:30 / CONFERENCE ROOM Incidents of intentional and unintentional jamming and spoofing of Global Navigation Satellite Systems (GNSS), which underpin vital sectors such as transportation, energy, telecommunications, and emergency services, are on the rise. Experts on this panel will discuss real-world cases, technical vulnerabilities, and

Women4Cyber: Women Shaping Cyber Innovation in Czech Startups

PANEL Women4Cyber: Women Shaping Cyber Innovation in Czech Startups DAY 2 / 8:00 – 9:00 / CONFERENCE ROOM As cyber threats evolve, the Czech Republic is emerging as a hub of breakthrough cybersecurity innovation. This Women4Cyber panel will bring together women leaders from top Czech cybersecurity startups who are redefining the field—driving advances in threat intelligence, AI defense, and digital

New Technologies: Potential Risk for Information Security

PANEL New Technologies: Potential Risk for Information Security DAY 2 / 13:15 – 14:30 / MAIN HALL As emerging technologies evolve, they introduce new challenges for information security. This panel will examine key risks associated with IoT devices, VTC systems, and air-gapped systems – including surveillance threats and cloud vulnerabilities. We will also explore how standards like SIGINT, TEMPEST, and

Beyond Firewalls: Is Cyber Resilience the Only Real Defence?

PANEL Beyond Firewalls: Is Cyber Resilience the Only Real Defence? DAY 2 / 11:00 – 12:15 / MAIN HALL Traditional perimeter defence cannot withstand geopolitical shocks, hybrid threats, or supply chain disruptions. In today’s complex world, resilience is the new baseline, but it must be part of a broader, layered defence strategy. This panel will convene experts from government, defence,

Beyond Human Speed: How AI Is Transforming Threat Intelligence and Response

PANEL Beyond Human Speed: How AI Is Transforming Threat Intelligence and Response DAY 2 / 9:30 – 10:30 / MAIN HALL The adversary is evolving – and so must our defences. This panel will examine how artificial intelligence is reshaping cyber threat intelligence, enabling faster detection, richer analysis, and more predictive defences. Experts will discuss both the promise and peril

Quantum Dawn: Are We Sleepwalking into a Post-Encryption World?

PANEL Quantum Dawn: Are We Sleepwalking into a Post-Encryption World? DAY 1 / 16:15 – 17:15 / CONFERENCE ROOM Quantum computing is no longer a distant theory – it is rapidly becoming a practical reality with profound implications for cybersecurity. Current cryptographic systems, particularly those based on RSA and ECC, are vulnerable to quantum algorithms like Shor’s, which can break

From Breach to Action: Coordinating Incident Response in Real Time

FIRE – SIDE CHAT From Breach to Action: Coordinating Incident Response in Real Time DAY 1 / 15:00 – 16:15 / CONFERENCE ROOM Modern cyber incidents are complex, rapidly occurring and evolving, and occasionally cross-border. Effective response hinges on trust and collaboration across public and private sectors – not just technical readiness.   This fire-side chat will explore how incident

Different Paths to Cyber Resilience: Perspectives on Capacity Building Across Regions

ROUNDTABLE Different Paths to Cyber Resilience: Perspectives on Capacity Building Across Regions DAY 1 / 13:15 – 14:15 / CONFERENCE ROOM Join an engaging roundtable on how countries are building and strengthening cybersecurity capacities through diverse national and regional strategies. The discussion will focus on the perspectives of receiving countries, exploring how differing political priorities, institutional settings, and partnership models

From Backbone to Backdoor: Who Really Controls our Telco Infrastructure?

PANEL From Backbone to Backdoor: Who Really Controls our Telco Infrastructure? DAY 1 / 11:00 – 12:15 / CONFERENCE ROOM Who owns the network, and who controls it? This panel will expose hidden vulnerabilities in global telecom infrastructure and examines how state actors, such as Salt Typhoon, exploit them. Experts will explore the geopolitics of connectivity, supply-chain risks, and strategies