29 Jan 2018 - 2 Feb 2018 | Vienna, Austria

Agenda

Monday
29 Jan 2018
08:45 – 09:30
Diplomatische Akademie
Coffee & Registration
09:30 – 11:00
Diplomatische Akademie
Official Opening
11:00 – 11:30
Diplomatische Akademie
Coffee Break
11:30 – 13:15
Diplomatische Akademie
Session 1: Implementing the EU Strategy for Safe, Open and Secure Cyberspace

This session will address the progress made by the EU and its member states in achieving cyberresilience,
reducing cyber-crime, developing cyber-defence policy and -capabilities and industrial and
technological resources for cybersecurity as well as establishing a coherent international cyberspace
policy for the European Union and promoting core EU values.

13:15 – 14:45
Diplomatische Akademie
Lunch
14:45 – 15:15
Diplomatische Akademie
Special Session: Austrian Cyber Security Exercise

The topic of this session focuses on enhancing critical infrastructure resilience within a multi-stakeholderenvironment. Specific areas of interest include:

  1. Security challenges that new technologies introduce and possible solutions
  2. National and international strategies and initiatives for protecting critical infrastructure against
  3. cyber-attacks
  4. Experiences in cyber-exercises as an efficient tool to test and improve the resilience of critical
  5. information infrastructure

15:15 – 16:45
Diplomatische Akademie
Session 2: Cyber-Threats to Critical Energy Infrastructure
17:00 – 18:40
Diplomatische Akademie
B2B / B2G Matching Session Monday

Register here to join B2B / B2G meetings after the sessions on Monday, January 29

Matchmaking
Tuesday
30 Jan 2018
08:45 – 09:30
Diplomatische Akademie
Coffee
09:30 – 11:00
Diplomatische Akademie
Session 1: Operational considerations for responding to the threat of cyber-attacks on critical energy infrastructure

The threat of cyber-attacks continues to grow as potential adversaries continue to develop or acquire

new cyber-skills. In this environment, how should States and organizations address a dynamic cyberthreat?
Specifically:

  1. What measures can be taken to reduce or contain the cyber-threat? How can response to the
  2. growing threat be organized and implemented?
  3. What are the roles and responsibilities of national stakeholders and critical infrastructure
  4. owners and operators?
  5. What is the role and capability of international organizations of mitigating such threats?
  6. What additional resources are needed?

11:00 – 11:15
Diplomatische Akademie
Coffee Break
11:15 – 12:45
Diplomatische Akademie
Session 2: Reducing the Risks of Conflict Stemming from the Use of Cyber-Capabilities

Cyberspace and consequently cyber-attacks are not limited by national borders. The cross-border nature

of many attacks and the limited ability to identify the responsible attacker may result in friction between
States. International instruments and measures can assist in promoting uniform and predictable
response that may assist in preventing undesired side effects including conflict escalation.

12:45 – 14:15
Diplomatische Akademie
Lunch break
14:15 – 14:30
Diplomatische Akademie
Special Session: Securing the future together

What does the current trend in threats, attackers and cybercrime tell us? Where would we want to be in

a few years? In a decade? What concrete initiatives could we design today to ensure the knowledge and
the capabilities to protect critical infrastructure from cyber-attacks exist and is available to the relevant
stakeholders?

14:30 – 16:15
Diplomatische Akademie
Session 3: Cyber-Diplomacy: Developing Capacity and Trust Between States

This session examines the need for confidence building and information sharing among States in regards

to cyber-incidents, especially those with cross-border implications. While national interest will always
dictate information-sharing limitations, meaningful discussions and exchanges between States can be
achieved in order to enhance the cybersecurity of the global energy infrastructure

16:15 – 16:30
Diplomatische Akademie
Closing Remarks
16:45 – 18:25
Diplomatische Akademie
B2B / B2G Matching Session Tuesday

Register here to join B2B / B2G meetings after the sessions on Tuesday, January 30

Matchmaking
Wednesday
31 Jan 2018
10:00 – 10:30
Tech Gate
Introduction into the Cyber Range (CR) Concept
10:00 – 12:00
Tech Gate
Policy Table Top Tutorial
10:30 – 10:45
Tech Gate
CR Case Study – Training: CR supporting IAEA programs
10:45 – 11:00
Tech Gate
CR Case Study – Exercises: Austrian cyber exercises
11:00 – 11:15
Tech Gate
CR Case Study - Research (CRP – IAEA): Analysis & response
11:15 – 12:00
Tech Gate
CR Scenario Demonstration: Attacks to energy systems
12:00 – 13:00
Tech Gate
Lunch for the participants of Cyber Range and Policy Table Top Tutorials
13:30 – 17:00
Tech Gate
CSCA Day – Technology Expo 2018
15:00 – 20:00
Tech Gate
Reception
16:30 – 17:00
Tech Gate
Presentation on Offensive Security Testing
17:15 – 18:55
Tech Gate
B2B / B2G Matching Session Wednesday

Register here to join B2B / B2G meetings after the sessions on Wednesday, January 30

Matchmaking
Thursday
1 Feb 2018
08:30 – 09:00
Tech Gate
Coffee & Registration
09:00 – 10:30
Tech Gate
Session 1: Emerging and Future Threats to Digitalized Energy Systems

We are in the process of digitalizing our energy systems, be those nuclear facilities, oil refineries, or

electrical distribution systems. Digitalization introduces several operational benefits and efficiencies;
however, it introduces a much larger cyber-attack surface. Cyber-attacks to critical infrastructures are
becoming more targeted and sophisticated and they are targeting operational and safety-critical
systems, using a range of attack techniques. In this session, we will talk about the nature of the emerging
threat landscape, identifying broad trends that are being seen across the energy sector and elsewhere. 

10:30 – 11:00
Tech Gate
Coffee break
11:00 – 12:30
Tech Gate
Session 2: Cyber Security Standards in Critical Energy Infrastructure

In this session, the cyber security standards landscape will be explored, with the aim of addressing
questions, such as are further standards required and in what area; are standards being correctly applied
by operators and vendors; in which ways could certification schemes be useful to ensure standards
compliance? The aim of the session is to inform session participants about current standards, their state
of application in the field, and to identify gaps that need to be addressed in the future.

12:30 – 13:30
Tech Gate
Lunch
13:30 – 14:30
Session 3: Public Sector, Industry, and Research Cooperation in Cyber Security

This session focuses on the interrelations between European, international and national research

programs and efforts, and how they are intertwined with the interactions of industries and the publicsector
stakeholders in critical infrastructure cyberspace security. 

14:30 – 15:00
Tech Gate
Coffee break
15:00 – 16:45
Tech Gate
Session 4: Securing Critical Energy Infrastructures by Understanding Global Energy Markets

In order to understand how to implement the necessary cyber policies and cyber technologies to protect

critical energy infrastructures, it is key to understand how the global energy markets work. In this session,
energy experts give a short overview on the stakeholders and the markets of global energy.

16:45 – 17:00
Tech Gate
Closing Remarks
17:15 – 18:55
Tech Gate
B2B / B2G Matching Session Thursday

Register here to join B2B / B2G meetings after the sessions on Thursday, February 1

Matchmaking
Friday
2 Feb 2018
09:15 – 09:45
Tech Gate
Welcome speeches
09:45 – 11:00
Tech Gate
Session 1: Making Smart Cities Cyber Secure

Smart cities integrate numerous technologies to create advanced and more efficient processes for

accomplishing everyday tasks. At the same time, this creates a target rich environment for cyber-attacks.
This session examines the challenges and strategies for building resilient smart cities. Topics of interest
include:


  1. Threats and vulnerabilities of smart cities
  2. Engineering security – how to build more resilient systems
  3. Detection and response – what to do when under attack

11:00 – 11:30
Tech Gate
Coffee break
11:30 – 12:30
Tech Gate
Session 2: Austrian & International IoT Safety & Security Light house initiatives

Austrian industry and research institutions are on the technological forefront in cyberspace. This session

offers an insight in some national best practice topics and projects in theses terrains. 

12:30 – 13:30
Tech Gate
Lunch
13:30 – 15:30
Tech Gate
Session 3: The Promise and Challenge of New Technologies

The development and integration of new digital technologies and software continues at a rapid pace.

This session examines the value and impact of new technology trends from a cybersecurity prospective.
Discussion in this session will focus on:
  1. Projected trends and emerging areas of technology
  2. Approaches and methods for verifying and securing new technologies
  3. state of the art and future security designs, methods, and tools
  4. The future of the cyber threat 

15:30 – 16:00
Tech Gate
Closing Statements
16:15 – 17:55
Tech Gate
B2B / B2G Matching Session Friday

Register here to join B2B / B2G meetings after the sessions on Friday, February 2

Matchmaking
The event agenda's time zone is CET.