International Cyber Operations Symposium No. 4 (10th October 2018, Bonn, Germany)

Breakout Session
Breakout Session

 

 

 

Breakout Session "Cyber Law, Hiding in the Shadows - Is Attribution even Possible?"

Breakout Session

Dr. Christoph SCHEUREN, Senior Civil Servant and Legal Advisor Cyberlaw

 

Breakout Session

Ms. Tina RODEGRO, Legal Adviser at the German CIDS HQ

 

In a Nutshell: The breakout session “law” deals with the problem of attribution one of the hot topics in international law in cyber context. Top class international experts from various fields will discuss the problem from a legal, political and technical perspective. The audience will also get the opportunity to participate with questions, as well.

Teaser

 

 

 

 

Breakout Session "Weapon Systems and Cyber Security"

In a Nutshell: This session will discuss the endangerments of today's weapon systems and present new techniques to identify and mitigate vulnerabilities in legacy systems. New approaches for the design and construction of resilient systems and prerequisites for the procurement will be highlighted.

Breakout Session

CDR Dr. Robert KOCH

Teaser

 

Publications:

  • Koch, Robert, and Mario Golling. "The cyber decade: Cyber defence at a X-ing point." 2018 10th International Conference on Cyber Conflict (CyCon). IEEE, 2018
  • Koch, Robert, and Teo Kühn. "Defending the grid: Backfitting non-expandable control systems." Cyber Conflict (CyCon), 2017 9th International Conference on. IEEE, 2017
  • Koch, Robert. "On the Future of Cybersecurity." ICCWS2017 12th International Conference on Cyber Warfare and Security. Academic Conferences and publishing limited, 2017
  • Koch, Robert, et al. "Dr. WATTson: Lightweight Current-Based Intrusion Detection (CBID)." Privacy, Security and Trust (PST), 2016 14th Annual Conference on. IEEE, 2016.
  • Koch, Robert, and Mario Golling. "Weapons Systems and Cyber Security - A Challenging Union." Cyber Conflict (CyCon), 2016 8th International Conference on. IEEE, 2016.
  • Koch, Robert, and Mario Golling. "Blackout and now? Network Centric Warfare in an Anti-Access Area-Denial Theatre." Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 7th International Conference on. IEEE, 2015.


Co-Speakers:


- Dr. Sandro GAYCKEN, Cofounder of Hensoldt Cyber and Director of the Digital Society Institute Berlin at ESMT

- Dr. Armin BRANDSTETTER, Head of Business Development Hensoldt Cyber

 

 

 

 

Breakout Session "Information Environment Assessment"

In a Nutshell: This session will focus on Semantic Footprint Analysis and Information Environment Assessment. Environment Assessment (IEA) through the use of artificial intelligence and web crawler technology, allows the detection of communication activities, such as narratives, BOTs and trolls. Semantic Footprint Analysis provides answers to the following questions: What are relevant topics? How are they expressed? Who is the target? We will demonstrate, how Information Environment Assessment contributes to military advice on hostile narratives and propaganda.

Breakout Session

Col Dr. Stefan GRUHL

Teaser

 

 

 

 

Breakout Session "Artificial Intelligence for Military Applications"

In a Nutshell: From the Smart Sensor at the frontline of the battle field to the Decision Support System at the backward HQ – Artificial Intelligence is top notch of the hot topics in military technology today.

Breakout Session

Prof. Dr. Michael LAUSTER

Teaser

 

Session's Chair: Dr. Stefan BRÜGGENWIRTH (Fraunhofer FHR)

Session's Co-Chair: Prof. Dr. Michael LAUSTER (Fraunhofer INT)

Lectures:


- Development of a NATO AI Vision on strategy / policy / doctrine (Dr. Michael WUNDER, Fraunhofer FKIE)
- Artificial Intelligence for Military Applications (Dr. Wilmuth MÜLLER, Fraunhofer IOSB)
- Cognitive Radar (Dr. Stefan BRÜGGENWIRTH, Fraunhofer FHR)
- Smart Sensors (Prof. Dr. Albert HEUBERGER, Fraunhofer IIS)

Note:

- All lectures: 30 min (incl. Q&A)
- Open discussion with the audience and the speakers of the session (30 min)

 

 

 

Breakout Session "Resilient IT-Networks - Moving Target Defence"

In a Nutshell: Traditionally, IT systems and networks have more or less static configurations. Such an approach was adequate when malicious exploitation of system vulnerabilities was not that major risk as it is today. To overcome the static nature of the attack surface, Moving Target Defence (MTD) is a cyber defence strategy that constantly changes the target surface with respect to different layers (system, application, network). In this breakout session different MTD techniques, their applicability and impact will be discussed.

Breakout Session

Prof Dr. Gabrijela DREO RODOSEK

Teaser