Cyberwal in Galaxia
Academy

Euro Space Center (Libin) – December 8th to December 12th, 2025

Free of charge

The first International School connected to the Cyberwal initiative proudly welcomes the fourth edition of the Cyberwal in Galaxia Academy.

800+

participants

4th

edition

14

countries represented

The goal is to establish Wallonia as a hub of cybersecurity excellence,
recognized well beyond its borders, and to affirm its role as a strategic center addressing the fast-evolving needs of the international cyber ecosystem.

This program will take place at the Galaxia site in Transinne which, together with the European Space Agency (ESA) and the nearby ESEC Centre in Redu (5 km away), forms one of Europe’s leading space hubs.

At ESEC Redu, ESA has established its Cybersecurity Centre, dedicated to safeguarding the Agency’s ground infrastructures and space operations, ensuring the highest standards of cyber protection.

Located in the heart of Belgium, the Euro Space Center in Transinne is a flagship educational and scientific facility dedicated to space exploration. Each year, it welcomes around 16,000 young participants from 35 nationalities and attracts over 120,000 visitors with its interactive exhibitions and immersive experiences. Combining education, outreach, and innovation, it has become a European benchmark for space awareness.

Speakers

The organizers’ objective is to position these courses as a benchmark in high-level education on a European scale, while ensuring a direct connection with the real and evolving needs of the cyber ecosystem. By inviting renowned speakers and experts from academia, companies, and public institutions, the program guarantees both academic excellence and practical relevance, preparing participants to meet tomorrow’s cybersecurity challenges.

Georges Ataya

Professor

Solvay Brussels School of Economics and Management

La sécurité informatique à l’ère quantique

Mohamed Boukhebouze

AI Product Manager

EarthLab Luxembourg

La sécurité informatique à l’ère quantique

Selim Chaabani

PhD Student

ULiege

La sécurité informatique à l’ère quantique

Phédra Clouner

Deputy Director general

Centre for cybersecurity Belgium

La sécurité informatique à l’ère quantique

Emmanuelle de Foy

First Counsellor
Directorate General for Multilateral Issues

Federal Public Service (FPS) Foreign Affairs

Unit M4 Global Governance

La sécurité informatique à l’ère quantique

Yvan De Mesmaeker

Secretary General

European Corporate Security Association – ECSA

La sécurité informatique à l’ère quantique

Vincent Defrenne

NVISO

Partner Cyber Strategy & Architecture

La sécurité informatique à l’ère quantique

Laurens D'hooge

Postdoctoral researcher

IDLab-imec

La sécurité informatique à l’ère quantique

Alexandre Dulaunoy

Head of CIRCL

Computer Incident Response Center Luxembourg

La sécurité informatique à l’ère quantique

Maxime Gennart

Legal Advisor

Belgian Data Protection Authority

La sécurité informatique à l’ère quantique

Vassili Joannidès de Lautour

Consultant in AI for education and affiliate professor at Parma University

Parma University

La sécurité informatique à l’ère quantique

Thomas Kopp

Chief Scientist

LuxTrust

La sécurité informatique à l’ère quantique

Clément Laurens

Co-founder

CRESCO

La sécurité informatique à l’ère quantique

Christian Mack

COO

Guardis SRL

La sécurité informatique à l’ère quantique

Philippe Massonet

Scientific Coordinator

CETIC

La sécurité informatique à l’ère quantique

Matteo Merialdo

Cybersecurity Principal

Nexova

La sécurité informatique à l’ère quantique

Burcu Özkaptan

Head of Telecommunication and Navigation

Telespazio Belgium

La sécurité informatique à l’ère quantique

Cristel Pelsser

Professor

UCLouvain

La sécurité informatique à l’ère quantique

Giulia Rinaldi

Cyber Data Engineer Part of the Innovation & Product Policy Secure Communication and Information Systems Thales Belgium

Thales Belgium

La sécurité informatique à l’ère quantique

Pascal Rogiest

General Manager

Clarence 

La sécurité informatique à l’ère quantique

Merlijn Sebrechts

Senior Researcher

Imec – Ghent University

La sécurité informatique à l’ère quantique

Pascal Steichen

CEO

Luxembourg House of Cybersecurity

La sécurité informatique à l’ère quantique

Francesco Vedovato

Assistant Professor @ Department of Information Engineering & Co-founder and product developer

University of Padova & ThinkQuantum s.r.l.

La sécurité informatique à l’ère quantique

Bert Verdonck

CEO

LNDS (Luxembourg National Data Service)

La sécurité informatique à l’ère quantique

Stay tuned. More speakers to be announced soon!

Our Program for the 5 days

Over the course of five days, participants will benefit from a balanced mix of theoretical insights and practical training sessions, designed to combine knowledge acquisition with hands-on experience.

To encourage networking and informal exchanges, morning and afternoon breaks are scheduled each day, providing the opportunity to connect with peers, speakers, and experts.

The program still holds exciting surprises in store for you. Stay tuned further details about the program will be available soon.

  • Day 1

    Monday 08/12

  • Day 2

    Tuesday 09/12

  • Day 3

    Wednesday 10/12

  • Day 4

    Thursday 11/12

  • Day 5

    Friday 12/12

Institutional day

This day of the Cyberwal in Galaxia Academy explores the latest advancements in artificial intelligence (AI) as applied to cybersecurity and secure communications.

The day begins with an introduction to AI’s role in these critical fields, followed by presentations on innovative projects such as AIDE. Then, a session will explore how different types of AI technologies can be used to automatically generate cybersecurity functional and penetration tests, for both black box and white bow testing.

The agenda includes discussions on securing radio frequency (R/F) communications, protecting machine learning models for unmanned vehicles, and the latest developments in homomorphic encryption. Leading experts from institutions and companies—including UCLouvain, UNamur, Cetic, Multitel, imec/IDLab, Thales and Telespazio, will share their expertise and solutions.

The program also features sessions on explainable and trustworthy AI, as well as networking opportunities to encourage collaboration. The event aims to provide a holistic view of the opportunities and challenges in leveraging AI for modern cybersecurity, fostering innovation and knowledge exchange.

Welcome & Registration

Opening ceremony

Général Pierre Ciparisse

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Général Pierre Ciparisse - Cyber Command
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Luxembourg Cybersecurity Factory

Pascal Steichen (Luxembourg House of Cybersecurity)

Auditorium

The Luxembourg Cybersecurity Factory (LCF) is set to become a groundbreaking hub for collaboration, enabling the seamless collection, analysis, and sharing of critical cybersecurity data—from threat intelligence and vulnerabilities to the effectiveness of protective measures. Designed as an open cybersecurity data space, the LCF will integrate advanced data tools, a dedicated Open Source Program Office (OSPO), and robust governance frameworks to strengthen risk mitigation across sectors.

This initiative will empower organisations, especially SMEs, to develop innovative, autonomous cybersecurity solutions, fostering a vibrant ecosystem of data, tools, and real-world applications. In a second phase, the LCF will expand its partnership with the Luxembourg AI Factory (L-AIF), integrating AI capabilities to further enhance its impact.

By attracting cybersecurity data providers to contribute their datasets and supporting data curation for AI applications, Luxembourg aims to position the LCF as a global leader in open-source-driven cybersecurity innovation.

Pascal Steichen
Pascal Steichen - CEO

Coming soon

Emmanuelle de Foy

Auditorium

We are familiar with the off-line world, our material world, managed by rules and laws. When it comes to the online world (and more and more parts of our lifes go online, work, leisure, information, orders, bookings…), who are the actors and how are they behaving ? What is important or crucial ? What is allowed or not allowed ? How can you react ? These issues have been discussed in the United Nations since 1998. The presentation will deal with 2 sets of negotiations that are actually typifying the state of the world. The negotiations on a international framework on ICT will show the rivalry between democracies and autocracies and the weight of the Global South. The second negotiation will show even more precisely the rivalry about the conceptions of the applicable law and the values such as the protection of human rights). The presentation will quickly deal with other lines of efforts at the level of the European Union, the OSCE and the NATO.

Emmanuelle de Foy
Emmanuelle de Foy - First Counsellor & Directorate General for Multilateral Issues

Coming soon

Phedra Clouner

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Phédra Clouner
Phedra Clouner - First Counsellor & Directorate General for Multilateral Issues

Coming soon

Georges Ataya

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Georges Ataya

Coming soon

Maxime Gennart

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Maxime Gennart
Maxime Gennart - Legal Advisor

How Cyber Security fits into Global Corporate Security

Yvan De Mesmaeker

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Yvan De Mesmaeker - Secretary General

Cyber & AI Day

This day of the Cyberwal in Galaxia Academy explores the latest advancements in artificial intelligence (AI) as applied to cybersecurity and secure communications.

The day begins with an introduction to AI’s role in these critical fields, followed by presentations on innovative projects such as AIDE. Then, a session will explore how different types of AI technologies can be used to automatically generate cybersecurity functional and penetration tests, for both black box and white bow testing.

The agenda includes discussions on securing radio frequency (R/F) communications, protecting machine learning models for unmanned vehicles, and the latest developments in homomorphic encryption. Leading experts from institutions and companies—including UCLouvain, UNamur, Cetic, Multitel, imec/IDLab, Thales and Telespazio, will share their expertise and solutions.

The program also features sessions on explainable and trustworthy AI, as well as networking opportunities to encourage collaboration. The event aims to provide a holistic view of the opportunities and challenges in leveraging AI for modern cybersecurity, fostering innovation and knowledge exchange.

Welcome & Registration

Introduction to the 'AI day’

Jonathan Pisane and Philippe Massonet

Auditorium

The introduction to the AI day will, afetr a brief introduction to the topic of AI for Cybersecurity, explain the objectives of the day, introduce the program and the speakers of the day. 

Pisane Jonathan
Jonathan Pisane
Philippe Massonet - Scientific Coordinator

Overview of the use of AI in cyber

Laurens D’Hooge

Auditorium

Dr. D’hooge’s presentation will be divided in two parts: a plunge into the current research landscape where AI is applied to cybersecurity and an overview of the AIDE project which aims at a platform for secure, federated machine learning.
The first part will cover the state-of-the-art in topics such as network intrusion detection and malware detection as well as a host of other topics where machine learning (ML) is being leveraged to solve cybersecurity issues. The talk will include guidelines on solid ML experiment design and evaluation to reach more reliable and reproducible results with a key focus on the importance of model generalization.

Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

Presentation of the AIDE project

Laurens D’Hooge

Auditorium

The second part will dive deep into imec’s role as integrator for the AIDE project, financed by FOD Bosa to research and develop secure infrastructure in academia for Belgian companies to jointly train and evaluate machine learning models without sharing data in a federated manner.

Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

AI-powered tools and cybersecurity: the role of prompting

Vassili Joannidès de Lautour

Auditorium

With the development of LLMs, generative AI has been democratised, making prompting the new must-have skill. According to an OpenAI study, 80% or generative AI users believe they know how to prompt but do not. 15% can write decent, yet incomplete and insecure prompts whilst only 5% have a perfect command of prompting. This has caused the occurring of a number of loopholes for cybersecurity, some whereof are covered in this presentation. In the first place, It is no longer needed to have a good command of coding, prompting may suffice. Secured systems may be vulnerable to well-designed prompts, a new generation of hackers. Secondly, prompt amateurs may not be able to discern hallucination and other AI-generated creations whilst engineers would. Thirdly, AI-powered tools may be vulnerable if they are not secured through some basic tools (APIs, tokens, etc.) Fourthly, the prompt at the core of AI-powered tools may be vulnerable, if they are misconceived (loose instructions, no fallback mechanisms, no reflexivity, etc.) 

Vassili JDL - Program - Cyberwal in Galaxia Academy 2025
Vassili Joannidès de Lautour - Consultant in AI for education and affiliate professor at Parma University

Coffee break

AI-powered tools and cybersecurity: tests generation

Xavier Devroey (Unamur), Martin Vivian (UCLouvain) and Guillaume Ginis (CETIC)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Xavier Devroey
Martin Vivian
GuillaumeGinis
Guillaume Ginis

AI for secure R/F communications: academical approach

Nicolas Point (Multitel)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Nicolas Point
Nicolas Point

Importance of Spectrum Monitoring for Safety-Critical Autonomous Vehicle PNT Applications

Burcu Özkaptan (Telespazio)

Auditorium

Our project presents a prototype of a Positioning, Navigation, and Timing (PNT) user equipment that integrates 4G and GNSS technologies to deliver highly reliable navigation capabilities for safety-critical applications, even under hostile environmental conditions or signal interference. The hybrid system is designed to enhance the performance and resilience of autonomous vehicles, particularly in urban environments where GNSS reliability is compromised due to superstructures and 4G networks are dense, and in rural environments where the mobile networks are scarce. Key use cases include autonomous docking in ports and autonomous ground vehicles in airports, both of which demand high safety standards and benefit from mobile network deployments. Besides positioning hybridization of GNSS with 4G mobile networks, the prototype uses machine learning techniques on both spectra for interference detection and classification, and signal processing algorithms for interference mitigation and features intelligent sensor switching based on signal quality indicators. A machine learning-based system assesses signal integrity in the spectrum of interest and recommends optimal PNT sources, ensuring robust navigation outputs for vehicle systems. The solution is compact and suitable for integration into UAVs, supporting future applications in urban air mobility and infrastructure monitoring. The PNT solution is reliable, robust and secure in the presence of interferers, and it is suitable for safety critical applications even in case of hostile environment conditions or attacks on the GNSS or mobile bands.

burcu-program - Cyberwal in Galaxia Academy 2025
Burcu Özkaptan - Head of Telecommunication and Navigation

Lunch break

Homomorphic ciphering: academical approach

Xavier Lessage (Cetic)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

XavierLessage
Xavier Lessage

CONFIDENTIAL ML FOR UNMANNED VEHICLES (securing ML models from extraction)

Merlijn Sebrechts (imec/IDLab)

Auditorium

Machine learning models and other software on Unmanned Vehicles (UVs) are not safe. It’s often trivial for adversaries with physical access to extract the models on a device. This risks theft of intellectual property and can even help adversaries develop countermeasures to “fool” or hijack AI models. While confidential computing is a promising technology to protect data and models while they’re in use, the hardware in most UVs does not actually support modern confidential computing solutions. This talk will investigate the confidential computing solutions of commercial off-the-shelf hardware in UVs, show off a demo taking advantage of these features, and take a peek into the future of confidential computing for UVs.

merlijn-sebrechts
Merlijn Sebrechts - Senior Researcher

Coming soon

Coming soon

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Coffee break

Homomorphic ciphering: academical approach

Coming soon

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

XavierLessage
Xavier Lessage

Homomorphic ciphering: industrial approach

Mohamed Boukhebouze (Earth Lab Luxembourg)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Mohamed Boukhebouze
Mohamed Boukhebouze - AI Product Manager

Ending session

Jonathan Pisane and Philippe Massonet

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pisane Jonathan
Jonathan Pisane
Philippe Massonet - Scientific Coordinator

Quantum Technology and Cybersecurity

This session of the Cyber and Quantum Day program explores the transformative impact of quantum technologies on secure communications and their implications for cybersecurity.

The event will begin with a technical exploration of Quantum Key Distribution (QKD), providing attendees with a solid foundation for understanding its critical role in securing communications against quantum threats.

The agenda continues with presentations on the latest breakthroughs in QKD networks, highlighting both theoretical models and practical deployments. Experts will also explore the integration of QKD with Post-Quantum Cryptography (PQC), examining hybrid approaches to achieve robust and scalable quantum-safe solutions.

A panel discussion will convene leading voices from academia, industry, and critical infrastructure sectors to address the challenges and opportunities of building quantum-secure communications.

This exchange will consider technical, economic, and regulatory perspectives, with a focus on the concrete steps required to prepare for a quantum-resilient future. Finally, the day will conclude with an exclusive visit to the Gilles Brassard Quantum Cryptography Lab, an open research platform dedicated to advancing secure communications in the quantum era.

By bringing together experts from institutions and companies—including Università di Padova, Université de Liège, Multitel, Starion, and Thales—the event fosters collaboration, knowledge exchange, and innovation.

The Cyber and Quantum Day aims to provide a holistic view of the opportunities and challenges in leveraging quantum technologies to transform secure communications, paving the way toward a trusted digital future.

Welcome & Registration

Introduction to the 'quantum day'

Serge Habraken (CSL)

Auditorium

This presentation explores the fundamental concepts behind Quantum Key Distribution (QKD) and the challenges arising from its implementation in spatial contexts. The first part introduces the theoretical foundations of QKD, providing an overview of its operating principles. It covers key ideas such as the growing threat posed by quantum computers, the basics of modern cryptography, and the quantum mechanics principles relevant to QKD. The second part adopts a more technological perspective, presenting the hardware and systems required to exchange quantum keys and discussing several approaches to building these resources. Overall, this presentation aims to provide a clear introduction to QKD, accessible to an audience without prior background in the field.

Selim Chaabani
Serge Habraken - CSL

Technical introduction to QKD

Serge Habraken (CSL)

Auditorium

This presentation explores the fundamental concepts behind Quantum Key Distribution (QKD) and the challenges arising from its implementation in spatial contexts. The first part introduces the theoretical foundations of QKD, providing an overview of its operating principles. It covers key ideas such as the growing threat posed by quantum computers, the basics of modern cryptography, and the quantum mechanics principles relevant to QKD. The second part adopts a more technological perspective, presenting the hardware and systems required to exchange quantum keys and discussing several approaches to building these resources. Overall, this presentation aims to provide a clear introduction to QKD, accessible to an audience without prior background in the field.

Selim Chaabani
Serge Habraken - CSL

Coffee break

Advance in QKD related researches

Francesco Vedovato (U. Padua)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Francesco Vedovato - U. Padua

Spontaneous presentation of the public activities

Fatou Diao

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Fatou Diao

Lunch

Thesis in QKD

Selim Chaabani (ULiege), Antoine Groulard (ULiege) & Fatou Diao (multitel)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Selim Chaabani
Selim Chaabani - ULiege
Antoine Groulard - ULiege
Fatou Diao - Multitel

Advance in QKD networks

Patrick Renaux (Starion)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Patrick Renaux
Patrick Renaux - Starion

Coffee break

QKD & PQC

Sarah Ampe (EY) & Jean Lienardy (ERM)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Patrick Renaux
Sarah Ampe - EY
Patrick Renaux
Jean Lienardy - ERM

Panel discussion

Yvan De Mesmaeker (Infras critiques), Joachim Vererfven (Proximus), Francesco Vedovato (Académique) & Olivier Croix (Thales Be)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Yvan De Mesmaeker - Infras critiques
Joachim Vererfven - Proximus
Francesco Vedovato - Académique
Olivier Croix - Thales Be

Closing session

Coming soon

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Visit of Quantum lab

Antoine Dierick (Thales)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Coffee break

Homomorphic ciphering: academical approach

Xavier Lessage (Cetic)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Homomorphic ciphering: industrial approach

Mohamed Boukhebouze (Earth Lab Luxembourg)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Ending session

Jonathan Pisane and Philippe Massonet

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Cyber protection in practise

This day of the Cyberwal in Galaxia Academy explores the latest advancements in artificial intelligence (AI) as applied to cybersecurity and secure communications.

The day begins with an introduction to AI’s role in these critical fields, followed by presentations on innovative projects such as AIDE. Then, a session will explore how different types of AI technologies can be used to automatically generate cybersecurity functional and penetration tests, for both black box and white bow testing.

The agenda includes discussions on securing radio frequency (R/F) communications, protecting machine learning models for unmanned vehicles, and the latest developments in homomorphic encryption. Leading experts from institutions and companies—including UCLouvain, UNamur, Cetic, Multitel, imec/IDLab, Thales and Telespazio, will share their expertise and solutions.

The program also features sessions on explainable and trustworthy AI, as well as networking opportunities to encourage collaboration. The event aims to provide a holistic view of the opportunities and challenges in leveraging AI for modern cybersecurity, fostering innovation and knowledge exchange.

Welcome & Registration

Protecting systems by anticipation - ISAC operations - Coming soon

Alexandre Dulaunoy (CIRCL)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Alexandre Dulaunoy

Increase resilience by training and deep rehearsal of cyber crises

Vincent Defrenne (NVISO)

Auditorium

What makes the difference between days and weeks of recovery time? Beyond the obvious controls, there is the quality of the response: being prepared; understanding roles, responsibilities and communication flows in the context of a crisis; having plans that not only exist, but are also usable. But beyond plans, there is experience. We will discuss how you build experience without going through the trauma of a cyber attack, through exercises. How you build knowledge of the plans, an intuition of how an incident unravels, what sort of questions you will need to solve, so that you have structure and peace of mind when disaster hits. We’ll discuss how to organize exercises to train your teams, key success criteria, typical scenarios and concrete tips & tricks to run cyber exercises that makes your organization better prepared.

Vincent Defrenne
Vincent Defrenne - Partner Cyber Strategy & Architecture

Ethical Hacking or how to stress test your cyber safety

Clément Laurens (CRESCO)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Clément Laurens - Co-founder

Lunch

Safeguarding national data for better & safely exploiting it

Bert Verdonck (LNDS)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Bert Verdonck

Managing European digital identity and related attributes under eIDAS2

Thomas Kopp (LuxTrust)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Thomas Kopp

Use AI on sensitive data through disconnected sovereign cloud

Pascal Rogiest (Clarence)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pascal Rogiest
Pascal Rogiest

Training and Cyber Range

In the current European context of digital sovereignty and the implementation of NIS2, cyber ranges are emerging as strategic infrastructures — with Belgium playing a key role. Beyond training, they offer a shared, realistic, and interoperable environment to test and validate technologies, procedures, and IT/OT integrations, while leveraging digital twins to accelerate innovation and compliance (Cyber Resilience Act). This day will be dedicated to exploring cyber ranges and their applications — training, testing, and digital twins — with partners from across the European Union.

Welcome & Registration

Distribution of color-coded badges indicating group and demo order.

The role of cyber ranges in training, testing/validation, and digital twins in the context of NIS2 and CRA

Matteo Merialdo (Nexova)

Auditorium

In a Europe pursuing digital sovereignty and implementing the NIS2 Directive and the Cyber Resilience Act, cyber ranges are moving from “training tools” to national-level strategic infrastructure. This session shows how modern cyber range technology is helping lead that shift. Drawing on real projects in Security Operations Centre operations, critical infrastructures (IT/OT) protection, and space systems, Matteo will illustrate how cyber ranges and digital twins provide shared, realistic, and interoperable environments to train teams, test and validate technologies and procedures, rehearse incident response, and accelerate compliance-by-design.

Matteo-Merialdo-Program
Matteo Merialdo - Cybersecurity Principal

Break & Group Formation

Demo Rotations

Cristel Pelsser , Multitel and Siris

Auditorium

Demo 1 – Cyber Range :

Demonstration of the cyber range and scenarios

Cristel Pelsser
Cristel Pelsser - Professor

Demo 2 – Quantum Lab

Discovering use cases for securing communications

Multitel

Demo 3 – ICS/OT Railway – Robotic Train

Presentation of a digital twin and incident/operations scenarios, with analysis of impacts and potential responsesEach group will rotate through all the demos based on their badge color.

Siris

Technical Break & Room Reset

Cyber Range Group Exercise (IDELUX and NEXOVA)

Auditorium

Participants will follow a simple, guided scenario showcasing the versatility of cyber ranges in decision-making, coordination, and real-time defense.

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Roundtable & Q&A

Auditorium

Lessons learned, interoperability, and practical applications (training, testing, digital twinning)

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Closing

Auditorium

Light refreshments, wrap-up, and next steps.

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Our Program for the 5 days

Over the course of five days, participants will benefit from a balanced mix of theoretical insights and practical training sessions, designed to combine knowledge acquisition with hands-on experience.

To encourage networking and informal exchanges, morning and afternoon breaks are scheduled each day, providing the opportunity to connect with peers, speakers, and experts.

The program still holds exciting surprises in store for you. Stay tuned further details about the program will be available soon.

Previous editions

2024 Cyberwal in Galaxia Program

December 2nd6th, 2024

2023 Cyberwal in Galaxia Program

December 4th8th, 2023

2022 Cyberwal in Galaxia Program

December 12th16th, 2022

2023 Cyberwal in Galaxia Program

0408 December 2023 

2022 Cyberwal in Galaxia Program

1216 December 2022 

Gallery

Register now!

2025 Cyberwal in Galaxia Academy . .. ...

Days
Hours
Minutes
Days
Hours
Minutes
Georges Ataya

Georges Ataya

Professeur et Directeur Académique

Professor Georges Ataya is the founder and academic director of Digital Governance and Trust education at Solvay Lifelong Learning since 2001. He is founder and vice-president of the Belgian cybersecurity coalition.

Georges Ataya contributed to the creation of the framework on digital governance; in 2002 he created the body of knowledge for the certification of security professionals (more than 70,000 certified worldwide). He also contributed to the creation of the “Board Briefing in IT Governance” reference and the “Board briefing in Cybersecurity Governance” as part of the ISACA research foundation (USA).

Professor Ataya regularly participates in meetings with European business leaders to inform them on their responsibilities and their actions in the face of digital challenges.

Professor Ataya is currently involved in, and leading research projects funded by the European Commission with the aim of promoting the maturity of nations, the defence sector, and the creation of hubs in the cybersecurity sector.

In his past career, he acted as CIO of a global group, led “Technology and Security Risk Services” at EY. He currently runs a consulting firm specializing in his areas of expertise, Ataya & Partners.


Mohamed Boukhebouze

AI Product Manager

Mohamed Boukhebouze is an AI Product Manager at EarthLab Luxembourg (https://www.earthlab.lu/), an innovation-driven company operating at the intersection of Earth Observation (EO) and Artificial Intelligence. With a background in data science, project management, and AI strategy, he leads the development of Max-ICS (https://www-max-ics.earthlab.lu/), a cutting-edge MLOps platform tailored to EO applications. Passionate about bridging technology and operational value, Mohamed has contributed to shaping EO data ecosystems across Europe by promoting sovereign, secure, and scalable AI solutions. He is involved in several European programs focused on digital sovereignty, EO digital twins, and AI-powered automation for sustainability and defense-related use cases.

Selim Chaabani

PhD Student

Born in 1999 in Liège, Selim Chaabani earned a bachelor’s degree in Engineering and a master’s in Aerospace Engineering from the University of Liège. His master’s thesis, carried out at the Centre Spatial de Liège (CSL) in collaboration with Multitel in Mons, explored the challenges of implementing Quantum Key Distribution (QKD) in space. In 2023, he began a PhD at CSL and Multitel, focusing on the development of single-photon sources for QKD. His research aims to advance secure quantum communication technologies, with a particular emphasis on their deployment in space.

Phédra Clouner

Deputy Director general

After having obtained a Master’s degree in Ancient History and Master’s degree in Information & Communication Technology at the ULB, Phédra Clouner started her carrier at the Belgian Ministry of Finance as IT Project Manager. Specializing in document management, enterprise content management and records management, she becomes responsible of information management, business intelligence and web content management at the Ministry of Justice. In parallel, she becomes chair of document@work, the belgo-Luxembourg-association for Enterprise Content Management and founds and manages the Belgian antenna of FEDISA international (the federation for information lifecycle management, storage and archiving).


Given her passion for information security, she also took up a CISO function for the Ministry of Justice and evolves further in that area.

She has been Deputy Director general of the Center for Cybersecurity Belgium, the Belgian national cybersecurity agency, since its creation 10 years ago.

Founded in 2014, the Centre for Cybersecurity Belgium (CCB) serves as the national authority for cybersecurity and operates under the authority of the Prime Minister. Its overarching mission is both clear and ambitious: to make Belgium one of the least cyber-vulnerable countries in Europe. The CCB supervises, coordinates and monitors the implementation of the Belgian cybersecurity strategy.Thanks to an optimal exchange of information, businesses, the government, providers of essential services and the general public can protect themselves appropriately.

She’s Vice Chair of the Belgian Cybersecurity Coalition.

She’s one of the Founding Member of the Women4Cyber Initiative, launched by European Cyber Security Organisation (ECSO). She’s founding member of Women4Cyber Belgium and member of the board.

She’s also chair of the Advisory board of The FIC (Forum International de la Cybersécurité) .

She was recognized in 2019 as one of the 50 women of influence in Cyber-security Europe by SC Magazine and as a privacy and security professionals across Europe by Data Protection World Forum-PrivSec,

She is the winner of « trophée European Cyberwomenday catégorie “DIrection exécutive ou entrepreneure” Europe (organised by CEFCYS) « in 2022.

she was in the top 5 of the DataNews IT personality of the Year in 2025.

Emmanuelle de Foy​

First Counsellor & Directorate General for Multilateral Issues

With a degree in Public and International Affairs (UCL) and International and European Law (VUB), Emmanuelle joined the Ministry for Foreign Affairs in November 2000. She has been posted in different regions. Her first posting was Kuala Lumpur, where she got acquainted with Asia, political and economical issues. She was involved in a Princes visit to Malaysia. Her second posting was Jerusalem. The issues were mainly political but also involved cooperation. Her third posting was in Mexico, where she dealt with political and economic issues but also academic and cultural topics. She was also involved in a Princes visit to Mexico. She was then assigned to Headquarters in Brussels where she followed UN issues (Security Council, UNESCO). She has been detached to a Deputy Prime Minister Office between 2012 and 2014. Her fourth posting was The Hague, where she dealt with bilateral (King’s visit) and European issues. Her fifth posting was Luxembourg, where she dealt with bilateral (King’s visit) and European issues. She was assigned to Headquarters again, in charge of cyber issues, since September 2022. Her mother tongue is French. She also speaks Dutch, English, Spanish and a fair German. She is married.

Yvan De Mesmaeker

Secretary General

ir. Yvan De Mesmaeker (M.Sc.Eng.) is Secretary General of the European Corporate
Security Association – ECSA and of ATHENA, the Alumni of the High Studies in
Security & Defense. Through his professional practice Omega Risk, he advises leading
corporations and institutions on Security, Resilience and Anticipation. He also directs
the High Studies in Police, Justice & Corporate Security and serves on boards
including the Royal Higher Institute for Defence – RHID and the Royal Institute for
International Relations – Egmont. With over 30 years of international experience, he has
worked extensively across Europe, the United States and Asia. His achievements in
corporate security and geopolitics have been recognized by HM the King of the Belgians,
who awarded him the honorary distinctions of ONicer in the Order of the Crown (2017)
and ONicer in the Order of Leopold (2023).

Vincent Defrenne

Partner Cyber Strategy & Architecture

Vincent is one of the founders of NVISO, one of Europe’s leading cyber security firms. He specializes into cyber strategy, and the last few years
has helped customers’ middle and top management to prepare or handle cyber incidents. His experience comes from the field, helping factories
or hospitals recover from cyber attacks, while helping executives of medium-size international businesses make threat-based choices for their
cyber plans. Vincent also initiated Belgium’s national student CTF, the Cyber Security Challenge Belgium, 10 years ago. He sits on the Resilience Board of Digital Europe, the European digital trade association, and speaks and writes frequently on the matters of cyber resilience
and cyber defense

Laurens D'hooge

Postdoctoral researcher

Laurens D’hooge is a postdoctoral researcher with imec, working at the Internet and Data Science Lab (IDLab), located at Ghent University’s technology campus. He obtained his PhD in October 2023 on the discovery and characterization of flaws in machine-learned network intrusion detection systems and data sets. More broadly, his expertise is tied to all topics where data science intersects with cybersecurity. He is a staunch advocate for reliable, reproducible ML. On kaggle.com under the moniker dhoogla, he still actively contributes to improving academic security datasets.

Alexandre Dulaunoy

Head of CIRCL

Alexandre Dulaunoy is the head of the Computer Incident Response Center Luxembourg (CIRCL). He is a leading figure in the cybersecurity community, known for his work in incident response and threat intelligence.

He is the driving force behind the open-source MISP Project (Malware Information Sharing Platform), a key initiative for cybersecurity collaboration globally. Dulaunoy is a respected researcher, a lecturer at the University of Luxembourg, and co-founder of the popular hack.lu security conference. His work focuses on developing open-source tools and sharing knowledge to help the community combat cyber threats effectively.

Maxime Gennart

Legal Advisor

Maxime is a legal advisor at the Litigation Chamber of the Belgian Data Protection Authority where he contributes to drafting binding decisions on complex data protection cases. He is also a member of the Authority’s AI Task Force for which he contributes to setting up the national AI governance framework. Moreover, he represents the DPA in European and international cross-sectoral discussions on privacy, data governance, artificial intelligence, and cybersecurity.  

Vassili Joannidès de Lautour

Consultant in AI for education and affiliate professor

Dr. Vassili Joannidès de Lautour holds a PhD in management from Université Paris Dauphine and Manchester Business School. He is an alum from Ecole Normale Supérieure and Sciences-Po. Since 2004, he has been interested in security, developing and teaching one of the first Internet economics courses 20 years ago where he identified the weaknesses of next economy’s business models. He has worked as a professor at Grenoble École de Management, Queensland University of Technology in Australia, the University of Parma and as a visiting professor and guest lecturer at Columbia University. Since 2023, he has introduced AI into his teaching as a reflexive tool for his students. Concurrently, he has developed an expertise as a cognitive architect and senior prompt engineer and brought this into the development of AI-powered tools for education. In parallel, he has been approached by the French Airforce to serve as a reserve officer in the Cybersecurity unit (ERCY). He embraces a holistic and no-technical approach to AI-related matters: linguistics, humanities, geopolitics.

Thomas Kopp

Chief Scientist

Thomas Kopp is the Chief Scientist at LuxTrust, a leading European provider of trust services and digital identity solutions. He specializes in cryptography, secure electronic signatures, and the development of open standards for digital trust.

In his role, he leads the research and development of cutting-edge security solutions to ensure the integrity and authenticity of digital transactions. His work is crucial for maintaining the trustworthiness of services like e-signatures and digital identities, and he is known for his contributions to the OASIS community, where he has helped develop key protocols for qualified electronic signatures. His expertise ensures that LuxTrust remains at the forefront of digital trust innovation.

Clément Laurens

Co-founder

Clément Laurens is the co-founder of CRESCO, a cybersecurity company based in Belgium. He is a specialist in penetration testing, security auditing, and offensive security, helping organizations identify and fix vulnerabilities before they can be exploited by malicious actors.

With a background in information technology, Clément Laurens co-founded CRESCO to provide high-end cybersecurity services. He is known for his technical expertise and for his deep understanding of the tactics and tools used by cybercriminals. He works with a variety of clients to enhance their security posture and build resilient defense strategies. His career is dedicated to ethical hacking and helping businesses navigate the complex and evolving threat landscape.

Christian Mack​

COO

Christian Mack is co-founder and COO of Guardis SRL, a Belgian company specialized in cybersecurity, DevSecOps, infrastructure and multicloud environments. Since the company’s inception, he has overseen security solution deployment, project management and assessments, Guardis’s historical core business. He actively contributed to the design and launch of ComodIT, a SaaS orchestration platform.
Christian coordinated the CYRUS research project (2021–2023), dedicated to automating security testing for cyber-physical systems with partners such as ALSTOM, AISIN, and UCLouvain. He is now involved in the defense-focused CRESCENDO project (2023–2025), where he works with CETIC on industrializing CYRUS outcomes into a portable operational platform.
Certified NIS2 Lead Implementer, CISM, and STIL, Christian is recognized for combining strategic vision and operational expertise, delivering effective solutions for both SMEs and large organizations under strict compliance and resilience requirements.

Philippe Massonet

Scientific Coordinator

Philippe Massonet is scientific coordinator at CETIC, a Belgian ICT applied research center. His research interest cover the areas of software, service and security engineering, as well as the applicaiotn of artificial intelligence to these areas. He was coordinator of the GridTrust IST European project (Strep) dealing with trust and security in next generation grids, and is responsible for dissemination and security in the RESERVOIR IST European project (Integrated project) led by IBM research. He was also the coordinator of the PONTE eHealth project that looked into using semantic web technologies to build decision support systems for the design clinical trials.  He has experience in the prototyping and commercial development of advanced requirements engineering tools. Previously he was manager of the requirements engineering team at CETIC. He has experience in the management of international R&D projects (Eurescom MESSAGE, IST FP6 GridTrust, and FP7 PONTE) and is or has been involved in several IST FP6/FP7/H2020/HEU research projects (RESERVOIR, HPC4U, AssessGrid, CoreGrid, GridTrust, Oldes, …).

Matteo Merialdo

Cybersecurity Principal

Matteo Merialdo is Cybersecurity Principal for the Nexova | Starion Group, bringing more than 23 years of experience in telecommunication, systems engineering and cyber security. During his career, Matteo lead very large, multidisciplinary teams of security engineers and researchers covering many security domains, with a specific focus on the application of cyber security to the space sector. Matteo heads the group that conceived and built CITEF, Nexova’s cyber-range and digital-twin platform, and has been at the forefront of the cyber-range ecosystem since 2014, driving the design of multiple solutions and co-authoring numerous peer-reviewed papers.

A recognised technical leader in European cybersecurity, Matteo has steered flagship initiatives such as the H2020 ECHO and the EDF ACTING projects, guiding their vision and execution.

Furthermore, Matteo is expert in space-sector security, having overseen and delivered several technologies for European Space Agency programmes, including the Agency’s Space Cyber Centre of Excellence.

Burcu Özkaptan

Head of Telecommunication and Navigation

Burcu Özkaptan is an electrical and electronics engineer, specializing in RF Design engineering, control systems theory, and machine learning. She earned her engineering degree from Bilkent University, Ankara/Türkiye in 2004. With a wealth of experience in different industries, including defence, maritime, and aerospace, Burcu has held roles as modelling and simulation engineer, RF system design engineer, project manager, and most recently, a machine learning engineer. Currently, Burcu is working as a Systems Engineer, Machine Learning Engineer, and Project Manager at Telespazio Belgium where she is an integral part of a dynamic team working on the development of a hybrid PNT receiver. This innovative device combines GNSS technology with LTE/5G sensors, paving the way for cutting-edge advancements in the field.

Cristel Pelsser

Professor

Cristel Pelsser holds a chair in critical embedded systems at UCLouvain. From 2015 to 2022 she was a full professor at the University of Strasbourg (France) where she led a team of researchers focusing on core Internet technologies.
She spent nine years as a researcher working for ISPs in Japan. Her aim is to facilitate network operations, to avoid network disruptions and, when they occur, pinpoint the failures precisely in order to quickly fix the issues, understand them in order to design solutions to prevent recurrence.

Her research spans multiple areas including BGP security and routing protocols, Internet measurement infrastructure, machine learning for network anomaly detection, and critical embedded systems for IoT applications. She actively contributes to developing next-generation tools for Internet monitoring, including advanced BGP data collection platforms and systems for detecting routing attacks.

Cristel received the PhD degree from the Université catholique de Louvain (UCLouvain), Belgium.

Giulia Rinaldi

Cyber Data Engineer Part of the Innovation & Product Policy Secure Communication and Information Systems Thales Belgium

Giulia Rinaldi was born in Rome, Italy, and earned a Bachelor’s degree in Software Engineering and a Master’s in Data Science from La Sapienza University. She later moved to Belgium, where she completed her PhD at KU Leuven in June 2025. During her academic journey, she worked as a teaching assistant and master’s thesis supervisor. With experience as a data scientist, she now works as a Cyber Data Engineer at Thales, where she merges her passions for AI and cybersecurity to develop innovative solutions for protecting critical infrastructure.

Pascal Rogiest

General Manager

Pascal Rogiest is the General Manager of Clarence, a joint venture between LuxConnect and Proximus Luxembourg that provides a disconnected sovereign cloud solution. He is an expert in digital trust, data sovereignty, and cloud infrastructure.

With a Ph.D. in electromechanical aerospace engineering, his career has spanned various leadership roles, including former CEO of LuxTrust and Vice President at satellite operator SES. At Clarence, he is focused on delivering highly secure and autonomous cloud services, particularly for government and regulated organizations, to meet the growing demand for data sovereignty in Europe.

Merlijn Sebrechts

Senior Researcher

Dr. ing. Merlijn Sebrechts is a senior researcher at imec and teaches at Ghent University in Belgium. He leads a number of research tracks focused on secure and robust systems in the cloud and on devices. He is currently serving on the Ubuntu Community Council and is standardizing WebAssembly System Interfaces for IoT devices as part of the W3C and the Bytecode Alliance. He teaches topics such as Distributed Systems Design, Open Source ecosystems and Computer Security. His work has been published in over 20 scientific publications and has received four awards.

Pascal Steichen

CEO

Founder and CEO of the Luxembourg House of Cybersecurity. Since 20 years, Pascal is involved in the main cybersecurity initiatives of the Luxembourg Government, CYBERSECURITY Luxembourg, the national platform to foster and empower the Luxembourg Ecosystem in the field of cybersecurity, being his latest achievement. Laureate of the Information Security Personality of the Year award in 2017, Pascal Steichen has dedicated his professional career to cybersecurity. In 2022 he was elected as the first chairman of the ECCC (European Cybersecurity Competence Centre).

Pascal holds a master degree in astrophysics and, in parallel of starting his career as a software engineer, he graduated in applied information technology.

In 2002 he joined the Luxembourg Government, as advisor and project manager in the area of network and information security for the Ministry of the Economy. Where he participated in the creation of LuxTrust (www.luxtrust.com), CASES (www.cases.lu) and CIRCL (www.circl.lu) as part of his activities.

From 2003 to 2014, he was representing Luxembourg as an alternate member of the management board of ENISA.

In 2017, Pascal lead and contributed to the creation of the Cybersecurity Competence Center a unique facility to strengthen the resilience of the Luxembourg economy by helping organisations to test and improve their cybersecurity competence, which evolved into the National Cybersecurity Competence Center (NC3 – www.nc3.lu).

Building on his huge experience in cybersecurity, today, Pascal is involved in key communities in Luxembourg and Europe. Member of the Luxembourg Cybersecurity Board, lecturer in information security at the University of Luxembourg, member of WomenCyberForce, and involved in the curricular board of the BTS cybersecurity.

At an international level, Pascal was involved in the founding of ECSO, was part of the 2021 judging panel of the IFSEC Global Influencers in Security and Fire Award, and was active of the European Advisory Board of the Forum InCyber, since 2020. In 2022 Pascal, represents Luxembourg in the Governing Board of the ECCC, where he was elected as its first Chairperson.

Francesco Vedovato

Assistant Professor @ Department of Information Engineering, University of Padova and Co-founder and product developer @ ThinkQuantum s.r.l.

Francesco Vedovato got his MSc in Physics in 2015 and a Ph.D. degree in Space Science and Technology at the University of Padova in 2019. During his PhD, he focused on the realization of quantum communication experiments in Space collaborating with the Matera Laser Ranging Observatory of the Italian Space Agency. His expertise is quantum communication over free-space and satellite channels, including Adaptive Optics technology. He has various peer- review publications in international journals in experimental quantum communication and quantum key distribution. He is fixed-term Assistant Professor at the Department of Information Engineering of the University of Padova. He is co-founder of ThinkQuantum, a SME commercializing QKD systems, and serves as product developer for free-space-optical quantum communication systems.

Bert Verdonck

CEO

Bert Verdonck is the CEO of the Luxembourg National Data Service (LNDS), a governmental organization focused on building secure data spaces for the public sector. He leads the development of governance structures and technical frameworks to facilitate data sharing and re-use.

His career is distinguished by his work in healthcare informatics and data management, with over 26 years at Philips where he focused on health data sharing and AI strategy. Verdonck holds a PhD in medical image processing and is an expert in the adoption of the Gaia-X framework, a European initiative for sovereign data infrastructure. His work is crucial for enabling a data-driven economy and accelerating economic and societal transitions through responsible use of data.

Institutional day

This day of the Cyberwal in Galaxia Academy explores the latest advancements in artificial intelligence (AI) as applied to cybersecurity and secure communications.

The day begins with an introduction to AI’s role in these critical fields, followed by presentations on innovative projects such as AIDE. Then, a session will explore how different types of AI technologies can be used to automatically generate cybersecurity functional and penetration tests, for both black box and white bow testing.

The agenda includes discussions on securing radio frequency (R/F) communications, protecting machine learning models for unmanned vehicles, and the latest developments in homomorphic encryption. Leading experts from institutions and companies—including UCLouvain, UNamur, Cetic, Multitel, imec/IDLab, Thales and Telespazio, will share their expertise and solutions.

The program also features sessions on explainable and trustworthy AI, as well as networking opportunities to encourage collaboration. The event aims to provide a holistic view of the opportunities and challenges in leveraging AI for modern cybersecurity, fostering innovation and knowledge exchange.

Welcome & Registration

Open

Général Pierre Ciparisse

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Général Pierre Ciparisse - Cyber Command
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Coming soon

Pascal Steichen

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pascal Steichen

Coming soon

Emmanuelle de Foy

Auditorium

We are familiar with the off-line world, our material world, managed by rules and laws. When it comes to the online world (and more and more parts of our lifes go online, work, leisure, information, orders, bookings…), who are the actors and how are they behaving ? What is important or crucial ? What is allowed or not allowed ? How can you react ? These issues have been discussed in the United Nations since 1998. The presentation will deal with 2 sets of negotiations that are actually typifying the state of the world. The negotiations on a international framework on ICT will show the rivalry between democracies and autocracies and the weight of the Global South. The second negotiation will show even more precisely the rivalry about the conceptions of the applicable law and the values such as the protection of human rights). The presentation will quickly deal with other lines of efforts at the level of the European Union, the OSCE and the NATO.

Emmanuelle de Foy
Emmanuelle de Foy - First Counsellor & Directorate General for Multilateral Issues

Coming soon

Phedra Clouner

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Phédra Clouner
Phedra Clouner - First Counsellor & Directorate General for Multilateral Issues

Coming soon

Georges Ataya

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Georges Ataya

Coming soon

Maxime Gennart

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Maxime Gennart
Maxime Gennart - Legal Advisor

How Cyber Security fits into Global Corporate Security

Yvan De Mesmaeker

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Yvan De Mesmaeker - Secretary General

Cyber & AI Day

This day of the Cyberwal in Galaxia Academy explores the latest advancements in artificial intelligence (AI) as applied to cybersecurity and secure communications.

The day begins with an introduction to AI’s role in these critical fields, followed by presentations on innovative projects such as AIDE. Then, a session will explore how different types of AI technologies can be used to automatically generate cybersecurity functional and penetration tests, for both black box and white bow testing.

The agenda includes discussions on securing radio frequency (R/F) communications, protecting machine learning models for unmanned vehicles, and the latest developments in homomorphic encryption. Leading experts from institutions and companies—including UCLouvain, UNamur, Cetic, Multitel, imec/IDLab, Thales and Telespazio, will share their expertise and solutions.

The program also features sessions on explainable and trustworthy AI, as well as networking opportunities to encourage collaboration. The event aims to provide a holistic view of the opportunities and challenges in leveraging AI for modern cybersecurity, fostering innovation and knowledge exchange.

Welcome & Registration

Introduction to the 'AI day’

Jonathan Pisane and Philippe Massonet

Auditorium

The introduction to the AI day will, afetr a brief introduction to the topic of AI for Cybersecurity, explain the objectives of the day, introduce the program and the speakers of the day. 

Pisane Jonathan
Jonathan Pisane
Philippe Massonet
Philippe Massonet - Scientific Coordinator

Overview of the use of AI in cyber

Laurens D’Hooge

Auditorium

Dr. D’hooge’s presentation will be divided in two parts: a plunge into the current research landscape where AI is applied to cybersecurity and an overview of the AIDE project which aims at a platform for secure, federated machine learning.
The first part will cover the state-of-the-art in topics such as network intrusion detection and malware detection as well as a host of other topics where machine learning (ML) is being leveraged to solve cybersecurity issues. The talk will include guidelines on solid ML experiment design and evaluation to reach more reliable and reproducible results with a key focus on the importance of model generalization.

Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

Presentation of the AIDE project

Laurens D’Hooge

Auditorium

The second part will dive deep into imec’s role as integrator for the AIDE project, financed by FOD Bosa to research and develop secure infrastructure in academia for Belgian companies to jointly train and evaluate machine learning models without sharing data in a federated manner.

Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

AI-powered tools and cybersecurity: the role of prompting

Vassili Joannidès de Lautour

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Vassili Joannidès de Lautour

Coffee break

AI-powered tools and cybersecurity: tests generation

Xavier Devroey (Unamur), Martin Vivian (UCLouvain) and Guillaume Ginis (CETIC)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Xavier Devroey
Martin Vivian
GuillaumeGinis
Guillaume Ginis

AI for secure R/F communications: academical approach

Nicolas Point (Multitel)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Nicolas Point
Nicolas Point

AI for secure R/F communications: industrial approach

Burcu Özkaptan (Telespazio)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Burcu Ozkaptan
Burcu Özkaptan - Head of Telecommunication and Navigation

Lunch break

Homomorphic ciphering: academical approach

Xavier Lessage (Cetic)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

XavierLessage
Xavier Lessage

CONFIDENTIAL ML FOR UNMANNED VEHICLES (securing ML models from extraction)

Merlijn Sebrechts (imec/IDLab)

Auditorium

Machine learning models and other software on Unmanned Vehicles (UVs) are not safe. It’s often trivial for adversaries with physical access to extract the models on a device. This risks theft of intellectual property and can even help adversaries develop countermeasures to “fool” or hijack AI models. While confidential computing is a promising technology to protect data and models while they’re in use, the hardware in most UVs does not actually support modern confidential computing solutions. This talk will investigate the confidential computing solutions of commercial off-the-shelf hardware in UVs, show off a demo taking advantage of these features, and take a peek into the future of confidential computing for UVs.

merlijn-sebrechts
Merlijn Sebrechts - Senior Researcher

Coming soon

Coming soon

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Coffee break

Homomorphic ciphering: academical approach

Coming soon

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

XavierLessage
Xavier Lessage

Homomorphic ciphering: industrial approach

Mohamed Boukhebouze (Earth Lab Luxembourg)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Mohamed Boukhebouze
Mohamed Boukhebouze - AI Product Manager

Ending session

Jonathan Pisane and Philippe Massonet

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pisane Jonathan
Jonathan Pisane
Philippe Massonet
Philippe Massonet - Scientific Coordinator

Quantum Technology and Cybersecurity

This session of the Cyber and Quantum Day program explores the transformative impact of quantum technologies on secure communications and their implications for cybersecurity.

The event will begin with a technical exploration of Quantum Key Distribution (QKD), providing attendees with a solid foundation for understanding its critical role in securing communications against quantum threats.

The agenda continues with presentations on the latest breakthroughs in QKD networks, highlighting both theoretical models and practical deployments. Experts will also explore the integration of QKD with Post-Quantum Cryptography (PQC), examining hybrid approaches to achieve robust and scalable quantum-safe solutions.

A panel discussion will convene leading voices from academia, industry, and critical infrastructure sectors to address the challenges and opportunities of building quantum-secure communications.

This exchange will consider technical, economic, and regulatory perspectives, with a focus on the concrete steps required to prepare for a quantum-resilient future. Finally, the day will conclude with an exclusive visit to the Gilles Brassard Quantum Cryptography Lab, an open research platform dedicated to advancing secure communications in the quantum era.

By bringing together experts from institutions and companies—including Università di Padova, Université de Liège, Multitel, Starion, and Thales—the event fosters collaboration, knowledge exchange, and innovation.

The Cyber and Quantum Day aims to provide a holistic view of the opportunities and challenges in leveraging quantum technologies to transform secure communications, paving the way toward a trusted digital future.

Welcome & Registration

Coming soon

Selim Chaabani

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Selim Chaabani

Coming soon

Antoine Groulard

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Antoine Groulard

Coming soon

Fatou Diao

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Fatou Diao

Coming soon

Coming soon

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Lunch - Networking time

Coming soon

Francesco Vedovato (Université de Padoue)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Francesco Vedovato

Coming soon

Nicolas Point (Multitel)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Nicolas Point
Nicolas Point

Coming soon

Coming soon

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Lunch break

Coming soon

Patrick Renaux (Starion)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Patrick Renaux
Patrick Renaux

Table ronde

Patrick Renaux (Starion) and Francesco Vedovato (Université de Padoue)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Patrick Renaux
Patrick Renaux
Yvan De Mesmaeker
Francesco Vedovato

Coming soon

Coming soon

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Coffee break

Homomorphic ciphering: academical approach

Xavier Lessage (Cetic)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Homomorphic ciphering: industrial approach

Mohamed Boukhebouze (Earth Lab Luxembourg)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Ending session

Jonathan Pisane and Philippe Massonet

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Cyber protection in practise

This day of the Cyberwal in Galaxia Academy explores the latest advancements in artificial intelligence (AI) as applied to cybersecurity and secure communications.

The day begins with an introduction to AI’s role in these critical fields, followed by presentations on innovative projects such as AIDE. Then, a session will explore how different types of AI technologies can be used to automatically generate cybersecurity functional and penetration tests, for both black box and white bow testing.

The agenda includes discussions on securing radio frequency (R/F) communications, protecting machine learning models for unmanned vehicles, and the latest developments in homomorphic encryption. Leading experts from institutions and companies—including UCLouvain, UNamur, Cetic, Multitel, imec/IDLab, Thales and Telespazio, will share their expertise and solutions.

The program also features sessions on explainable and trustworthy AI, as well as networking opportunities to encourage collaboration. The event aims to provide a holistic view of the opportunities and challenges in leveraging AI for modern cybersecurity, fostering innovation and knowledge exchange.

Welcome & Registration

Protecting systems by anticipation - ISAC operations - Coming soon

Alexandre Dulaunoy (CIRCL)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Alexandre Dulaunoy

Increase resilience by training and deep rehearsal of cyber crises

Vincent Defrenne (NVISO)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Vincent Defrenne
Vincent Defrenne

Ethical Hacking or how to stress test your cyber safety

Clément Laurens (CRESCO)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Clément Laurens

Lunch

Safeguarding national data for better & safely exploiting it

Bert Verdonck (LNDS)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Bert Verdonck

Managing European digital identity and related attributes under eIDAS2

Thomas Kopp (LuxTrust)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Thomas Kopp

Use AI on sensitive data through disconnected sovereign cloud

Pascal Rogiest (Clarence)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pascal Rogiest
Pascal Rogiest

Training and Cyber Range

In the current European context of digital sovereignty and the implementation of NIS2, cyber ranges are emerging as strategic infrastructures — with Belgium playing a key role. Beyond training, they offer a shared, realistic, and interoperable environment to test and validate technologies, procedures, and IT/OT integrations, while leveraging digital twins to accelerate innovation and compliance (Cyber Resilience Act). This day will be dedicated to exploring cyber ranges and their applications — training, testing, and digital twins — with partners from across the European Union.

Welcome & Registration

Distribution of color-coded badges indicating group and demo order.

Plenary Session

Jonathan Pisane and Philippe Massonet

Auditorium

EU context (NIS2, CRA), the role of cyber ranges in training, testing/validation, and digital twins – use cases.

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Break & Group Formation

Demo Rotations

Cristel Pelsser , Multitel and Siris

Auditorium

Demo 1 – Cyber Range :

Demonstration of the cyber range and scenarios

Cristel Pelsser
Cristel Pelsser - Professor

Demo 2 – Quantum Lab

Discovering use cases for securing communications

Multitel

Demo 3 – ICS/OT Railway – Robotic Train

Presentation of a digital twin and incident/operations scenarios, with analysis of impacts and potential responsesEach group will rotate through all the demos based on their badge color.

Siris

Technical Break & Room Reset

Cyber Range Group Exercise (IDELUX and NEXOVA)

Auditorium

Participants will follow a simple, guided scenario showcasing the versatility of cyber ranges in decision-making, coordination, and real-time defense.

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Roundtable & Q&A

Auditorium

Lessons learned, interoperability, and practical applications (training, testing, digital twinning)

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Closing

Auditorium

Light refreshments, wrap-up, and next steps.

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark