Cyberwal in Galaxia

2024 Cyberwal in Galaxia Program

This school is free of charge* (registration below)

02 – 06 December 2024 (end of registrations on 25/11)

This program will take place on the Galaxia site in Transinne which, together with the European Space Agency (ESA) and the ESEC Centre in Redu (5 km away), forms a leading Space center in Europe.

Together for Cybersecurity - Investing in cybersecurity for a secure future -

Together for Cybersecurity - Investing in cybersecurity for a secure future -

The first International School linked to the Cyberwal initiative welcomes its third cohort with more than 200 European participants expected, this December 2nd, in the province of Luxembourg.

To address cybersecurity challenges and cybercrime threats, Wallonia has launched a cybersecurity policy named “Cyberwal by Digital Wallonia.” This initiative, part of the Walloon Recovery Plan, supports specific actions including research, innovation, and education within an “excellence hub”.

This school is the result of the ambition and determination of IDELUX and its partners. The goal is to develop a high-level international training center over the long term, under the authority of a scientific committee chaired by Mr. Axel LEGAY, Professor of Cybersecurity at UC Louvain, in response to the needs of institutions (such as ESA), businesses, public authorities, and more broadly, civil society.

The Cyberwal initiative positions the Wallonia Region as one of the key players in Belgian regional cybersecurity policy. It is notable that the vision of IDELUX and its partners is quickly becoming a reality, evolving quickly to meet current and future cybersecurity challenges at both national and transnational levels.

The goal is indeed to rapidly elevate Wallonia to a position of global excellence in cybersecurity and to ensure future editions of the “Cyberwal in Galaxia Program” achieve a European dimension of excellence by directly linking them with the ever-evolving needs of the international cyber ecosystem.

It is in the ESEC Centre in Redu that ESA has decided to base its cybersecurity center, which will ensure the cyber protection of the Agency’s ground and airborne activities.

Cyberwal in Galaxia

Speakers

The objective of the organizers is to position these courses as a high level of education, on a European scale, and to link them directly to the needs of the cyber ecosystem.

Philippe Massonet
Scientific Coordinator at CETIC
Find out more
Pascal Rogiest
Managing Director of the Cybersecurity Division of RHEA Group, Chief Strategy Officer of RHEA Group, Vice President of RHEA Belux
Find out more
Michele MOSCA
Co-founder and deputy director of the Institute for Quantum Computing at the University of Waterloo, CEO & co-founder of evolutionQ
Find out more
Robert Bedington
Co-Founder & CTO
Find out more
Bart Preneel
Full Professor, KU Leuven
Find out more
Nicolas Noël
Director, Cyber Risk Advisory
Find out more
Etienne Caron
Manager, Cyber Risk Advisory
Find out more
Maxime Cordy
Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT)
Find out more
Previous slide
Next slide

Cyberwal in Galaxia

Speakers

The objective of the organizers is to position these courses as a high level of education, on a European scale, and to link them directly to the needs of the cyber ecosystem.

Philippe Massonet

Scientific Coordinator at CETIC

Nicolas Noël

Director, Cyber Risk Advisory

Etienne Caron

Manager, Cyber Risk Advisory
Rhea groupe logo

Pascal Rogiest

Managing Director of the Cybersecurity Division of RHEA Group, Chief Strategy Officer of RHEA Group, Vice President of RHEA Belux

Bart Preneel

Full Professor, KU Leuven

Maxime Cordy

Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT)
logo_CNR_affiancato

Fabio Martinelli

Research Director
Universite de liege

Benoît Donnet

Professeur

Nicolas Point

Responsable du département IT

Bart Ansot

National Security Officer
Thales_Logo

Adrien Becue

AI & Cybersecurity Expert
SM_logo_ORGNL_POS_baseline

Harold Kinet

CEO
logion noir

David Schmitz

Founder

Didier Stevens

Senior Analyst

Vincent Defrenne

Partner, Cyber Strategy & Architecture

Thierry Draus

Vice President, Business Development
Thales_Logo

Benjamin Dumont

Software engineer

Symeon Chatzinotas

Full Professor and SIGCOM Head

Nicolas Ramponi

Senior Projects Delivery Manager

President of the Scientific Committee

Axel Legay

Professor of Cybersecurity - UCLouvain, Coordinator of Cyberwal

Our Program for the 5 days

The program includes theoretical & practical courses.
A break is scheduled every day in the morning and afternoon.

The program has even more surprises in store for you. Stay tuned for more information coming soon!

The next editions of Cyberwal in Galaxia Program are already planned for 2025.

  • Day 1

    Monday 02/12

  • Day 2

    Tuesday 03/12

  • Day 3

    Wednesday 04/12

  • Day 4

    Thursday 05/12

  • Day 5

    Friday 06/12

Sold out

AI and Cybersecurity day 2024

The rise of artificial intelligence (AI) is having a profound impact on our society. During 2024 AI continues to be rapidly integrated into various sectors, each leveraging the technology to improve efficiency, reduce costs, and provide better services. The use of AI has expanded across industries, but some sectors have seen particularly high levels of adoption and integration such as healthcare (diagnostics, drug discovery, personalized medicine, predictive analytics), finance and banking (fraud detection, algorithmic trading, credit scoring, customer service), retail and e-commerce (personalized recommendations, inventory Management, customer service, pricing optimization), manufacturing and industry 4.0 (predictive maintenance, quality control, supply chain optimization, robotics and automation), automotive and transportation (autonomous vehicles, driver assistance systems, logistics and fleet management, predictive maintenance), energy and utilities (Smart Grid management, predictive maintenance, energy consumption optimization,  renewable energy management), telecommunications (network optimization, predictive maintenance, customer support, fraud detection) and education (personalized learning,  automated Grading, tutoring systems, administrative efficiency). AI is having impact and driving innovation by providing improved efficiency, increased productivity, better decision-making, improved healthcare, or environmental sustainability.

AI research has advanced in 2024 with advancements in Large Language Models (more powerful models, fine-tuning and adaptability, reduced hallucinations), generative AI and multimodal models (image and text integration, video and audio generation, creative applications).

However as AI and machine learning systems become more prevalent and integral to various applications, they also become more attractive targets for cyberattacks. Some of the new and evolving cybersecurity threats to AI and machine learning in 2024 are adversarial attacks, data poisoning, model inference attacks, model evasion attacks, backdoors attacks, membership inference attacks, federated learning Attacks, supply chain attacks and cloud infrastructure attacks. Cybersecurity is important for AI because AI systems are increasingly being used in critical infrastructure, such as power grids and transportation systems. If these systems are hacked, it could have a devastating impact on society.

The objective of the day is to present some key research topics at the intersection of AI and cybersecurity in the form of short tutorials or research presentations. The day will address topics on how AI is being used for threat identification, protection, detection, response and recovery. More specific topics such as Explainable AI for malware analysis, AI based AI-powered anomaly detection, AI-powered malware detection and AI-powered incident response will also be addressed.

8:30 AM – 9:00 AM

REGISTRATIONS

10:00 AM – 10:05 AM

Introduction

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
Philippe Massonet
Philippe Massonet - Scientific Coordinator at CETIC
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

10:05 AM – 11:00 AM

/

In today’s digital economy, where data breaches plague industry and government alike, the fusion of Cybersecurity and Artificial Intelligence (AI) has emerged as a potent defense strategy. This talk explores the symbiotic relationship between AI and cybersecurity, delving into both its promises and perils.

AI has revolutionized cybersecurity, enabling advanced capabilities such as the detection of malware, vulnerabilities and fraud. Yet, as AI empowers defenders, it also empowers attackers. The dark side of AI reveals a landscape where malicious actors harness AI for spear phishing, automated cyberattacks, misinformation, and deepfakes. Moreover, AI itself becomes a target, as shown by adversarial machine learning and model poisoning attacks. Finally, there are concerns about AI creating a dystopia.

The talk further delves into novel technologies such as attribution (watermarking) and computing on encrypted data that can play a role in mitigating some of these risks.

Overall, there is a need for a multidisciplinary approach encompassing technology, regulation, and ethics to effectively address the challenges presented by the intricate relationship between AI, cybersecurity and privacy.

Rectangle-2988
Kim Guldstrand Larsen - Aalborg University, Department of Computer Science, Denmark
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

 11:00 AM – 11:45 AM

Machine Learning Security in the Real World

Adversarial attacks are considered as one of the most critical security threats for Machine Learning (ML). In order to enable the secure deployment of ML models in the real world, it is essential to properly assess their robustness to adversarial attacks and develop means to make models more robust. Traditional adversarial attacks were mostly designed for image recognition and assume that every image pixel can be modified independently to its full range of values.

In many domains, however, these attacks fail to consider that only specific perturbations could occur in practice due to the hard domain constraints that delimit the set of valid inputs. Because of this, they almost-always produce examples that are not feasible (i.e. could not exist in the real world). As a result, research has developed real-world adversarial attacks that either manipulate real objects through a series of problem-space transformations (i.e. problem-space attacks) or generate feature perturbations that satisfy predefined domain constraints (i.e. constrained feature space attacks). In this talk, we will review the scientific literature on these attacks and report on our experience in applying them to real-world cases.

Maxime Cordy
Maxime Cordy - Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT)
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker

11:45 AM – 12:00 AM

COFFEE BREAK

12:00 AM – 1:00 PM

/

Rectangle-2988
Ahmad-Reza Sadeghi -
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker

2:00 PM – 3:30 PM

Explainable ML for malware analysis

The talk addresses the growing complexity of malware by exploring advanced detection and analysis techniques, focusing on both static and dynamic approaches. The lecture highlights the strengths and limitations of each approach and discusses their combination to improve detection accuracy. A  method of representing malware as images is introduced, allowing the application of image processing and machine learning techniques to detect malicious patterns, offering advantages over traditional methods. The importance of explainability in malware detection is advocated by using such approaches.

Fabio Martinelli - Research Director at National Research Council of Italy
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker

3:30 PM – 3:45 PM

COFFEE BREAK

3:45 PM – 4:30 PM

Cybersecurity threat landscape, Microsoft's view on the current and future secure state

During this session, Microsoft will show their view on the threat landscape and how is has evolved throughout the years using geopolitical challenges, technical advancements by integrating cutting-edge technologies into their attacks and how we should prepare, defend and collaborate as one to become more resilient and secure in this ever-changing world

BartAsnot
Bart Asnot - National Security Officer at Microsoft
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker

4:30 PM – 5:15 PM

Artificial Intelligence Deployable Agent (AIDA)

Contemporary combat systems carry an increasing amount of tactical computing and electronics potentially vulnerable to cyber-attacks. While current cyber-defense operations address in non-real time the needs for detection and response to cyber incidents affecting traditional IT systems, securing the fast expanding Internet of Military Things (IoMT) requires very short response times, and accurate decision making under strong operational, computing and energy constraints. The deployment of efficient detection and response capacities on embedded systems requires the design of lightweight resident Artificial Intelligence (AI) agents, trained specifically for these environments and capable of automating the detection and response loop in the absence of timely available human expertise. NATO’s IST-152 Research Task Group (2016-2020) on “Intelligent, Autonomous and Trusted Agents for Cyber Defense and Resilience” (AICA) initiated this concept between 2016 and 2020. The research yielded an AICA Reference Architecture (Kott et al., 2018). Later, an international working group formed to continue work on AICA (see https://www.aica-iwg.org/). Yet this highly conceptual architecture was not yet set into practice. The growing use of Unmanned Vehicles (UxV) in modern conflicts however revives the need for time sensitive autonomous decision at the edge of systems evolving in environments saturated with Cyber-Electromagnetic Threats (CEMA). To reduce UxVs exposure and augment their chances of survival in contested battlefield, remote control is progressively replaced by individual (autonomous) and collective (swarm) intelligent navigation techniques. While AI is seen as an essential capability for the survival of these proliferating objects, adversarial AI discipline unveils targeted evasion techniques to lure and hide from embedded AI. In short we need cyber-defense agents that are altogether frugal, accurate, adaptive, explainable, collaborative, and robust. This is the challenge addressed by AIDA project.

The proposed solution relies on three types of AI agents: a white agent, a red agent, and a blue agent. The white agent is a foundation model that is trained against massive data to develop a broad set of human-like capacities such as threat analysis, detection rule edition, incident qualification and response planning. Cyber-defense analysts prompt a Large Language Model (LLM) upon identification of new threats to produce tailored detection rules and response plans in seconds instead of hours. A Retrieval Augmented Generation (RAG) procedure restricts LLM sources to qualified knowledge bases. A reward system based on human feedback reinforces the model toward good decisions. From this white agent, smaller, more specialized agents will be derived that aim to perform narrow cyber-defense routines at the edge of IoMT. Unlike the white agent, blue agents need to operate in resource-constrained environment in an autonomous manner. We will use pruning and unlearning techniques to minimize the resource requirements of blue agents and obfuscation techniques to reduce their exposure to reverse engineering. Wherever needed, they will be fine-tuned to their environment of destination across land, sea, air, space and cyber domains. Yet as we may lack quantitative attack data, we will craft a third type of agent, whose role will be to generate attacks. The red agent will be trained in a simulated environment placed in adversarial setup with blue agents to develop offensive AI strategies. This Generative Adversarial Networks (GAN) setup will reinforce blue agents’ successful defense strategies, challenge their individual and collaborative defense objectives, and strengthen their robustness towards evasion attacks.

To conclude, the AIDA system involves an LLM (white agent), adversarial generative AI (red agent) and a Multi-Agent System (blue agents) in mission-critical activities landing in 5 military domains. Among other applications, the system aims to protect combat aircraft against CEMA threats with severe safety implications. Continuous improvement and responsible use of AI are enabled by reinforcement learning and RAG techniques. It reduces the exposure of modern military systems to emerging risks such as adversarial AI attacks.

Adrien Becue
Adrien Becue - AI & Cybersecurity Expert at THALES
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Sold out

Quantum Day

8:30 AM – 9:00 AM

REGISTRATIONS

09:00 AM – 10:00 AM

An introduction to quantum and post-quantum cryptography

The quantum threat is one of the cryptographic hot topics of the last few years. This talk will present the security stakes raised by quantum computing and the mitigation offered by quantum and post-quantum cryptography. We will focus on the impacts quantum computing will have on symmetric and asymmetric cryptography and how new PQC primitives offer robust alternatives. We will also see how quantum physics can be the foundation for theoretically perfect security.

Benjamin Dumont
DUMONT Benjamin - Software engineer at THALES Belgium

10:00 AM – 11:00 PM

BeQCI and independence of quantum key management

This presentation unveils Singapore’s groundbreaking initiatives in quantum key distribution (QKD) over satellite communication channels. We delve into the cutting-edge research and development efforts aimed at establishing secure quantum communication links between ground stations and satellites. Explore the technological advancements, key milestones, and the role of Singapore in pioneering quantum-secured satellite communication. Join us to learn about the implications of these initiatives for global secure communication and data encryption in the quantum age.

Rectangle-2988
Prof. Stefano Piriono - ULB

10:00 AM – 11:00 PM

BeQCI and independence of quantum key management

This presentation unveils Singapore’s groundbreaking initiatives in quantum key distribution (QKD) over satellite communication channels. We delve into the cutting-edge research and development efforts aimed at establishing secure quantum communication links between ground stations and satellites. Explore the technological advancements, key milestones, and the role of Singapore in pioneering quantum-secured satellite communication. Join us to learn about the implications of these initiatives for global secure communication and data encryption in the quantum age.

Rectangle-2988
Prof. Stefano Piriono - ULB

11:00 AM – 11:15 PM

COFFEE BREAK

10:00 AM – 11:00 PM

Eagle-1 : QKD in practice and build-up of users communities

The EAGLE-1 mission aims to develop Europe’s first sovereign, end-to-end space-based Quantum Key Distribution (QKD) system. Led by SES in collaboration with the European Space Agency (ESA) and various European space agencies and private partners, the mission will feature a state-of-the-art QKD system comprising a payload aboard the EAGLE-1 Low Earth Orbit (LEO) satellite, optical ground stationsquantum operational networks, and a key management system. EAGLE-1 marks a significant milestone in next-generation quantum communication infrastructure, providing crucial technical insights and mission data while contributing to the EuroQCI program‘s development. It offers a unique opportunity for public and private entities to test and validate end-to-end Quantum Safe solutions through satellite-based QKD.

Thierry Draus
Thierry Draus - Vice President, Business Development at SES

12:15 PM – 01:15 PM

LUNCH TIME

1:15 PM – 2:15 PM

Quantum Communications in Luxembourg – Infrastructure and Research Roadmap

The talk provides an overview of Quantum Communication activities led by the University of Luxembourg. The first part focuses on the experimental QKD network which is currently being deployed as well as envisaged cross-border links. The second part captures the research innovations and developments towards QKD network planning and orchestration of a functional multi-vendor end-to-end system. The third and final part captures nascent but promising ideas on the physical quantum communication layer, aiming at exploiting the concepts of multiplexing and diversity to enhance the quantum rate and fidelity respectively.

Symeon Chatzinotas
Prof. Symeon Chatzinotas - Full Professor and SIGCOM Head at Uni.lu
Nicolas Ramponi
Nicolas Ramponi - Senior Projects Delivery Manager at Starion Group

2:15 PM – 3:15 PM

Fast and Practical integrated quantum communications systems

This presentation introduces continuous variable quantum key distribution (CV-QKD) as a high-performance quantum technology. We explore the principles and applications of CV-QKD, emphasizing its potential for achieving secure and high-speed quantum communication. Through a discussion of recent advancements and practical implementations, attendees will gain insights into the promising future of CV-QKD in enabling robust and efficient quantum-secured communication networks. Join us to uncover the key developments and innovations in this field, paving the way for a more secure digital era.

Rectangle-2988
Prof. Hugo Zbinden - University of Geneva

3:15 PM – 3:30 PM  

COFFEE BREAK

3:30 PM – 4:30 PM

 INT-UQKD : cross-border QKD

This presentation sheds light on the INT-UQKD program, showcasing how Quantum Key Distribution (QKD) is being strategically employed to safeguard existing business applications on a global scale. We delve into practical use cases, highlighting successful implementations of QKD in diverse operational environments. Through real-world examples and case studies, attendees will gain insights into the tangible benefits of integrating QKD into their existing security infrastructure. Join us to explore the transformative potential of QKD in fortifying information security for businesses worldwide.

Rectangle-2988
Arne Matthyssen - Starion Group
Rectangle-2988
Nicolas Ramponi - Starion Group

 4:30 PM – 5:15

Round Table : from academic Quantum research to Operational Quantum Safe applications

This presentation sheds light on the INT-UQKD program, showcasing how Quantum Key Distribution (QKD) is being strategically employed to safeguard existing business applications on a global scale. We delve into practical use cases, highlighting successful implementations of QKD in diverse operational environments. Through real-world examples and case studies, attendees will gain insights into the tangible benefits of integrating QKD into their existing security infrastructure. Join us to explore the transformative potential of QKD in fortifying information security for businesses worldwide.

Pascal-lux
Moderator: Pascal Rogiest
Rectangle-2988
Prof. Stefano Piriono - ULB
Rectangle-2988
Prof. Symeon Chatzinotas - Uni.lu
Thierry Draus
Thierry Draus - Vice President, Business Development at SES
Rectangle-2988
Arne Matthyssen - Starion Group

05:15 PM

Presentation of Quantum Demonstrator of GALAXIA in Transinne (Thales Belgium)

9:00 AM – 9:30 AM

REGISTRATIONS

9:30 AM – 12:30 PM

Poster session (Abstract)

The 3rd edition of the Cyberwal in Galaxia Program will feature an exciting poster competition where 30 posters will be showcased. The best poster will be honored with an Award, which will be presented during the ceremony scheduled for Wednesday, 12/04, in the late morning. An expert jury, consisting of 10 professionals renowned in their fields, will select the winner of this Cybersecurity Award.

Beyond the competition, the poster session offers an exceptional opportunity for participants to present their innovative research and hone their scientific communication skills in front of a diverse audience, including business representatives. This session is much more than a mere contest: it is a true exchange platform. It enables participants to connectshare ideas, and enrich the international cybersecurity community.

We warmly invite studentsresearchers, and professionals to participate in this enriching event. Discover the latest innovations, share your expertise, and immerse yourself in an environment of collaboration and innovation. Join us to celebrate excellence in cybersecurity and contribute to a tradition of impact and continuous progress.

12:30 PM – 01:30 PM

LUNCH TIME

01:30 PM – / PM

Introduction

A meticulously designed CTF challenge that push the boundaries of conventional cybersecurity knowledge. Attendees will be able to revel in the opportunity to listen to and interact with esteemed experts from the cybersecurity domain, each bringing a wealth of experience and fresh perspectives.

Complementing these, our hands-on demonstrations promise a deep dive into the latest technologies and methodologies, forging a link between academic theories and their tangible, real-world implementations. Join us for a comprehensive exploration of the future of cybersecurity.

Deloitte will invite keynotes speakers to develop on concise and insightful talk on a relevant cybersecurity topic and allow some time for questions and answers.

Nicolas Noël 
Nicolas Noël  - Director, Cyber Risk Advisory at Deloitte
Etienne Caron
Etienne Caron - Manager, Cyber Risk Advisory at Deloitte

9:00 AM – 9:30 AM

REGISTRATIONS

9:30 AM – / AM

An Introduction to Smart Contracts Security

This session focus on security aspect of modern financial transactions above blockchains: smart contracts. To do so, the first part of the session will review key theoretical concepts, such as cryptography, hashing, signature, fingerprint, merkle tree) before diving into the notion of block chain and smart contracts.  The Solidity programming language will be introduced and well known attacks will be discussed (e.g., reentrancy attack). In the second part of the session, attendees will have the opportunity to learn how to detect security breaches in smart contracts and how to abuse them for performing an attack.

Benoît Donnet
Benoît Donnet - Professeur at Université de Liège

11:00 AM – 11:15 AM

COFFEE BREAK

/

LUNCH TIME

/

The blockchain landscape in Wallonia

Wallonia is active in the field of blockchain, and a number of public and private initiatives are already underway. Before presenting some concrete projects implemented in our region, Nicolas Point will outline the two most important federative programs.

The WalChain initiative, which was born of a grouping of Walloon blockchain start-ups, aims to promote ‘Made In Wallonia’ blockchain as an innovative tool for building collaborative and transparent ecosystems, as well as an opportunity to contribute to sustainable economic redeployment in Wallonia. DigitalWallonia4.Trust is an innovative project led by Agoria, Infopole, Agence du Numérique and WalChain. Supported by the Service Public de Wallonie Economie Emploi et Recherche (SPW EER) and Wallonia, this initiative is part of the Digital Excellence program of Wallonia’s digital strategy, Digital Wallonia. DW4TRUST aims to place Wallonia at the center of digital innovation. By integrating blockchain technology into various sectors, DW4TRUST not only improves efficiency, trust and security across businesses, but also opens up new opportunities for growth and innovation.

Nicolas Point
Nicolas Point - Responsable du département IT at MULTITEL

3:30 PM – 3:45 PM

COFFEE BREAK

/

Seamless Blockchain Integration: Transforming Existing Businesses with Innovative Solutions

This session will explore a proven methodology for integrating blockchain technology into existing business systems. We’ll cover key steps, from assessing business needs and designing a tailored blockchain strategy, to implementing and deploying solutions that align with current infrastructure. Attendees will learn best practices for overcoming common challenges, such as data migration, interoperability, and security, while maximizing the benefits of blockchain, including transparency, efficiency, and trust. Real-world case studies will highlight successful integrations in sectors like supply chain, ESG reporting, and Digital Product Passports (DPP).

Harold Kinet
Harold Kinet - CEO at BE Blockchain

/

Logion: Blockchain and IPFS to Secure and Certify Sensitive Data

In a world where digital threats are rapidly evolving, the need for advanced solutions to secure sensitive data is paramount. Logion offers an innovative approach by combining blockchain technology with IPFS (InterPlanetary File System). This combination not only ensures the integrity and traceability of data but also guarantees its availability and immutability. Blockchain, with its decentralized nature, provides an unalterable and transparent ledger, while IPFS enables distributed and resilient file storage. Together, these technologies offer a robust alternative to traditional storage solutions, meeting the increasing demands for security in cyberspace. This session will explore how Logion leverages these technologies to provide superior protection for sensitive data, particularly in sectors where confidentiality and security are crucial. Participants will learn how the combination of blockchain and IPFS can not only enhance data security but also facilitate certification and traceability, all while adhering to the strictest privacy standards.

David Schmitz
David Schmitz - Founder of Logion

/

Logion: Blockchain and IPFS to Secure and Certify Sensitive Data

In a world where digital threats are rapidly evolving, the need for advanced solutions to secure sensitive data is paramount. Logion offers an innovative approach by combining blockchain technology with IPFS (InterPlanetary File System). This combination not only ensures the integrity and traceability of data but also guarantees its availability and immutability. Blockchain, with its decentralized nature, provides an unalterable and transparent ledger, while IPFS enables distributed and resilient file storage. Together, these technologies offer a robust alternative to traditional storage solutions, meeting the increasing demands for security in cyberspace. This session will explore how Logion leverages these technologies to provide superior protection for sensitive data, particularly in sectors where confidentiality and security are crucial. Participants will learn how the combination of blockchain and IPFS can not only enhance data security but also facilitate certification and traceability, all while adhering to the strictest privacy standards.

Rectangle-2988
Gérard Dethier - CTO at Logion

/

Table Ronde sur la blockchain en Wallonie

In a world where digital threats are rapidly evolving, the need for advanced solutions to secure sensitive data is paramount. Logion offers an innovative approach by combining blockchain technology with IPFS (InterPlanetary File System). This combination not only ensures the integrity and traceability of data but also guarantees its availability and immutability. Blockchain, with its decentralized nature, provides an unalterable and transparent ledger, while IPFS enables distributed and resilient file storage. Together, these technologies offer a robust alternative to traditional storage solutions, meeting the increasing demands for security in cyberspace. This session will explore how Logion leverages these technologies to provide superior protection for sensitive data, particularly in sectors where confidentiality and security are crucial. Participants will learn how the combination of blockchain and IPFS can not only enhance data security but also facilitate certification and traceability, all while adhering to the strictest privacy standards.

David Schmitz
David Schmitz - Founder of Logion
Rectangle-2988
Gérard Dethier - CTO at Logion
Rectangle-2988
Aloïs Moubax

/

Session // Sovereign Cloud

In a world where digital threats are rapidly evolving, the need for advanced solutions to secure sensitive data is paramount. Logion offers an innovative approach by combining blockchain technology with IPFS (InterPlanetary File System). This combination not only ensures the integrity and traceability of data but also guarantees its availability and immutability. Blockchain, with its decentralized nature, provides an unalterable and transparent ledger, while IPFS enables distributed and resilient file storage. Together, these technologies offer a robust alternative to traditional storage solutions, meeting the increasing demands for security in cyberspace. This session will explore how Logion leverages these technologies to provide superior protection for sensitive data, particularly in sectors where confidentiality and security are crucial. Participants will learn how the combination of blockchain and IPFS can not only enhance data security but also facilitate certification and traceability, all while adhering to the strictest privacy standards.

Rectangle-2988
Peter Braem - Quantum-safe integrated Sovereign Cloud solutions at Proximus NXT IT
Pascal-lux
Pascal Rogiest - AI-enabled disconnected sovereign cloud in Luxembourg for Europe at Clarence S.A.
Sold out

05:30 PM – 06:30 PM

Aperitif

06:30 PM – 10:00 PM

Gala Dinner at the Euro Space Center

8:30 AM – 9:00 AM

REGISTRATIONS

9:00 AM – 10:00 AM

Introduction – The hack of the city of Antwerp and lessons learned (Amphi)

After a brief introduction to the current ransomware landscape, we review the case of the City of Antwerp based on information that was published by the city and in the press over the course of the attack and the months that followed – looking at the IT, operational, communication, reputation and financial impacts of the attack. The presentation is organized as a timeline of events, supported with press clippings and public facts brought ttogether into an exciting story that unravels over time

Didier Stevens
Didier Stevens - Senior Analyst at NVISO
Vincent Defrenne
Vincent Defrenne - Partner, Cyber Strategy & Architecture at NVISO

9:00 AM – 12:30 AM

Crisis response exercise: the enemy from within (2 rooms)

Participants take the helm of the crisis management team of a fictitious energy producer running its operations across Eastern Europe, and are confronted with a rapidly evolving incident involving the compromission of some of their systems and the potential involvement of an internal system administrator in these activities. The exercise is organized as a succession of briefings from the incident response team and analysis in group to define together a course of action that responds to the events and the questions raised. The response of course consists of technical actions to analyse, isolate, contain and eradicate the threat, but also involves organizational measures and measures in terms of internal and external communication. The exercise is facilitated by seasoned crisis and incident responders Vincent Defrenne and Didier Stevens.

Didier Stevens
Didier Stevens - Senior Analyst at NVISO
Vincent Defrenne
Vincent Defrenne - Partner, Cyber Strategy & Architecture at NVISO

12:30 PM – 01:30 PM

LUNCH TIME

1:30 PM – 4:30 PM

Ransomware Workshop (2 rooms)

During the workshop, participants will learn how to deal with this situation step-by-step by challenging them in their knowledge of various infosecurity topics. The goal of this workshop is to provide the participants with a structured approach on how to spot malware and how to deal with incidents caused by modern adversaries. Instructors will be assisting the students towards the full mapping of the incident and will provide a typical solution at the end of the workshop. The situation that the students will have to handle is as follows: “You are part of your company’s Incident Response team. On some idle Friday afternoon, your manager barges in. He has just been notified by the authorities that they have compromised a Commandand-Control server and that they have found systems communicating to that server originating from your company. The board of directors is breathing down his neck to find out what has happened and has asked him to contain this problem as soon as possible. How come we haven’t noticed this? What systems have been compromised? What data is exfiltrated?
Are there still active connections? You immediately coordinate with the authorities and receive an extract of the information they have pulled from the compromised server. And so you quest begins…” The students will work in teams of 2 and will have 4 hours to find out what has happened and to verify if there is still any active connections. During the workshop, the instructors will switch between guiding the participants and challenging them by assuming various positions in the company. The workshop will start with the set up of the participants machines with the tools required. For those participants that may not install such tools on their machine, a Linux-based virtual machine will be available for download or on USB sticks.

Didier Stevens
Didier Stevens - Senior Analyst at NVISO
Vincent Defrenne
Vincent Defrenne - Partner, Cyber Strategy & Architecture at NVISO

4:30 PM – 4:40 PM

Closing words from Cyberwal in Galaxia team

4:40 PM

The end

Our Program for the 5 days

The programme includes theoretical & practical courses 
A break is scheduled every day in the morning and afternoon

The next editions of Cyberwal in Galaxia Program are already planned for 2025.

Previous edition

2023 Cyberwal in Galaxia Program

0408 December 2023 

2022 Cyberwal in Galaxia Program

1216 December 2022 

Gallery

Register now!

2024 Cyberwal in Galaxia . .. ...

Days
Hours
Minutes
M-Mosca

Michele MOSCA

Co-founder and deputy director of the Institute for Quantum Computing at the University of Waterloo, CEO & co-founder of evolutionQ

MICHELE MOSCA is co-founder of the Institute for Quantum Computing at the University of Waterloo, a Professor in the Department of Combinatorics & Optimization of the Faculty of Mathematics, and a founding member of Waterloo’s Perimeter Institute for Theoretical Physics. He was the founding Director of CryptoWorks21, a training program in quantum-safe cryptography. He co-founded the ETSI-IQC workshop series in Quantum-Safe Cryptography. He co-founded evolutionQ Inc. to support organizations as they evolve their quantum-vulnerable systems to quantum-safe ones and softwareQ Inc. to provide quantum software tools and services.  

He obtained his doctorate in Mathematics in 1999 from Oxford on the topic of Quantum Computer Algorithms, an MSc in Mathematics and the Foundations of Computer Science in 1996 from Oxford. In 1995 he earned a BMath in Combinatorics & Optimization and Pure Mathematics from Waterloo. His research interests include quantum computation and cryptographic tools designed to be safe against quantum technologies.

He is globally recognized for his drive to help academia, industry and government prepare our cyber systems to be safe in an era with quantum computers. Dr. Mosca’s awards and honours include Fellow of the Institute for Combinatorics and its Applications (since 2000), 2010 Canada’s Top 40 Under 40, Queen Elizabeth II Diamond Jubilee Medal (2013), SJU Fr. Norm Choate Lifetime Achievement Award (2017), and a Knighthood (Cavaliere) in the Order of Merit of the Italian Republic (2018).

Robert-Bedington

Robert Bedington

Co-Founder & CTO

Rob is CTO at SpeQtral (formerly known as S15 Space Systems) where they are developing commercial quantum secure communication from space, and laying the foundations for a global quantum internet. At Singapore Center for Quantum technology, he was coordinating the development of NanoSatellites with Quantum technology demonstrator payloads which will enable future QKD missions. These include the SpooQy-1 mission to demonstrate an entangled photon pair source in a 3U CubeSat and the QubeSat mission, joint with RAL Space in the UK, to demonstrate entanglement-based QKD between a CubeSat and an optical ground station.

Bart Preneel

Bart Preneel

Full Professor, KU Leuven

Prof. Bart Preneel is a full professor at the KU Leuven, where he leads the renowned COSIC research group, which has 100 members. With an extensive academic career, he has held visiting professor positions at five universities across Europe. His primary areas of expertise encompass cryptography, cybersecurity, and privacy.

Prof. Preneel has been invited speaker at more than 150 conferences in 50 countries. He received the prestigious RSA Award for Excellence in the Field of Mathematics (2014), the ESORICS Outstanding Research Award (2017) and the Kristian Beckman award from IFIP TC11 (2016). He has served as president of the IACR (International Association for Cryptologic Research) and he is a fellow and Director of the IACR. Bart Preneel frequently consults for industry and government about cybersecurity and privacy technologies. His commitment to innovation extends to his roles as a co-founder and Board Member of the start-up nextAuth, a Board Member of the scale-up Approach Belgium, and an Advisory Board Member for Tioga Capital Partners and Nym Technologies. Additionally, Professor Preneel has actively participated in cybersecurity policy discussions, and is offering his expertise as a member of the Advisory Group for the European Union Agency for Cybersecurity (ENISA).

Nicolas Noël 

Nicolas Noël 

Director, Cyber Risk Advisory

icolas pursued his whole career in the cybersecurity field, bridging the gap between technical security controls and business drivers.

Using his technical background and his business affinity, Nicolas is supporting his customers in tailoring their technical security controls based on their risks, regulatory landscape and business objectives.

He has a broad area of expertise from financial institutions to manufacturing companies.

Etienne Caron

Etienne Caron

Manager, Cyber Risk Advisory

Etienne Caron (M.Sc) is a Consultant in Deloitte’s Cybersecurity team in Montreal since January 2019. At Deloitte, Etienne has specialized in engagements related to Cyber Governance by developing policies, standards and processes across several industries. Etienne has conducted multiples IT/OT and 3rd party assessment and developed strong expertise for clients in multiples industries. Finally, he participated in several trainings and incident response preparation mandates by organizing a phishing campaign or developing simulation exercises on ransomware to test the efficiency of response and the resilience of companies in the event of an incident.

Maxime Cordy

Maxime Cordy

Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT)

Maxime Cordy is a Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg, in the domain of Artificial Intelligence (AI) and Software Engineering (SE), with a focus on security and quality assurance for machine learning, software verification and testing, and the engineering of data-intensive systems. He has published 120+ peer-reviewed papers in these areas. He is one of the three permanent scientists of the SnT’s SerVal group (SEcurity, Reasoning and VALidation). His research is inspired from and applies to several industry partners, mostly from the financial technology and smart energy sectors. He is deeply engaged in making Society benefit from results and technologies produced by research through the founding of a spin-off company and the leadership of private-public partnership projects at SnT. He has worked as a program committee member and reviewer for top-tier AI and SE conferences incl. IJCAI, ICCV, NeurIPS, ICLR, ESEC/FSE, PLDI, ISSTA,  etc. He is distinguished reviewer board member of TOSEM and regular reviewer for other top-tier SE journals.

Fabio Martinelli

Research Director

Fabio Martinelli is a research director of the Italian National Research Council (CNR) where he leads the virtual lab in cybersecurity. He is co-author of more than four hundreds of papers on international journals and conference/workshop proceedings.  His main research interests involve security and privacy in distributed and mobile systems and foundations of security, privacy and trust. He founded and chaired the WG on Security and Trust management (STM) of the European Research Consortium in Informatics and Mathematics (ERCIM) and the WG 11.14 in secure engineering of the International Federation of Information Processing (IFIP).  He coordinated the EU NESSoS Network of Excellence in Future internet Security and the EU Training Network on Cyber Security (NeCS). He also served as expert in the EU H2020 Protection and Security Advisory Group (PASAG) and is vice-chairman of the Board of the European Cyber Security Organization (ECSO) and co-chairs ECSO WG6 on strategic research and innovation agenda (SRIA).

Benoît Donnet

Benoît Donnet

Professeur

Benoit Donnet received his Ph.D. degree in Computer Science from the Université Pierre et Marie Curie in 2006 and has been a PostDoc until 2011 at the Université catholique de Louvain (Belgium). Mr. Donnet joined the Montefiore Institute at the Université de Liège since 2011 where he was appointed successively as Assistant Professor and Associate Professor. His research interests are about Internet measurements (measurements scalability, Internet topology discovery, measurements applied to security), network modeling, middleboxes, new Internet architectures (LISP, Segment Routing), and Computer Science Education.

Nicolas Point

Nicolas Point

Responsable du département IT

Nicolas Point is head of the Network Engineering Department at the Multitel Research Centre. In addition to his activities relating to data transmission in general, Nicolas is increasingly active in two complementary fields: cybersecurity and blockchain. In the latter context, he is actively involved in various projects linked to the DW4TRUST and Walchain initiatives.

BartAsnot

Bart Ansot

National Security Officer

As an industry-focused security expert, Bart has supported companies and organizations across the world to adopt to a modern way of work where cybersecurity is an essential cornerstone. Starting his career as a technical consultant in IT, Bart transitioned into cybersecurity several years ago by combining deep tech knowledge with strategy as cybersecurity is as much a tech play as it has its place in the board room. Today, Bart is National Security Officer in Microsoft Belgium and Luxembourg and leading the Cybersecurity architects supporting the organizations in Belgium and Luxembourg.

Adrien Becue

Adrien Becue

AI & Cybersecurity Expert

Adrien Bécue (M) is AI & Cybersecurity Expert at Thales. He graduated from Toulouse Business School in 2003 with a Master in Aerospace Management. In 2004, he joined the French defense procurement agency (DGA) as a Program Purchaser for Land Weapon systems. In this position he managed a portfolio of industrial and research projects about Network-Centric Warfare and Digital Battlefield transformations. He joined EADS group in 2008 to manage acquisition programs in Tactical Communication systems for the French Navy and the International Security Assistance Force (ISAF) deployed in Afghanistan. In 2010 he became Research & Technology Project Manager for border security and maritime surveillance projects. In 2013 he became Head of Innovation of Airbus Cybersecurity. In this role, he won several Awards of Innovation with projects in fields of cryptography, cyber-defense, and security of industrial control systems. In December 2022 he has joined Thales to take the role of AI and Cybersecurity Expert. He is involved in strategic projects in field of 5G security, AI-based intrusion detection, adversarial AI and generative AI. He is Technical Coordinator of the European defense project AIDA that deals with Artificial Intelligence Deployable Agent for cyber-defense operations. He is member of serveral cybersecurity and AI expert groups supporting organizations such as ANR (French National Research Agency), EC (the European Commission), ECSO (the European Cyber-Security Organization), ENISA (European Cybersecurity Agency), EDA (the European Defense Agency) and NATO (The North Atlantic Treaty Organization).

Harold Kinet

Harold Kinet

CEO

Formerly a journalist in the defense & security sector and then a marketing manager in the theme park sector, Harold has a rich international background. In 2017, he fully immersed himself in the blockchain and Web3 sector. Initially working as a consultant, he later became the Head of Communications at Daneel.io, a French startup that raised $2M in ICO in early 2018 for developing an AI capable of creating new market indicators for traders in the crypto markets. Harold gained valuable experience during his time at Paris’ Station F and the first European blockchain project incubator, Chain Accelerator, before returning to Belgium to establish BE Blockchain SRL in late 2019—a blockchain consulting and development company. BE Blockchain quickly became a prominent player in Belgium, leading to the launch of WalChain, the official business network of the Walloon region. WalChain brings together the government, universities, clusters, and private players. Harold is also a reviewer at LN24 (Belgian livenews channel) and is invited to numerous conferences and workshops, including the European Interreg programme. For more information, visit: https://www.linkedin.com/in/haroldkinet/

David Schmitz

Founder

David Schmitz is the founder of Logion, a groundbreaking blockchain platform that integrates advanced technology with a legal framework to secure digital operations. With over 20 years of experience in management, legal practice, and IT development, David has been a strong advocate for open-source initiatives, particularly within the Linux and the Blockchain community. His expertise extends to his role as a police officer in Belgium, where he leads the development of AI-driven tools to enhance cybersecurity and public safety.

Didier Stevens

Didier Stevens

Senior Analyst

Didier Stevens (Microsoft MVP, SANS ISC Handler, …) is a Senior Analyst working at NVISO. He is an expert in malicious documents (PDF and Microsoft Office), pioneering research into maldocs and authoring free, open-source analysis tools and private red team tools. Next to his professional activities, Didier is also a Microsoft MVP (2011-2016 awarded MVP Consumer Security, 2016-2023 awarded MVP Windows Insider) and a SANS Internet Storm Center Senior Handler.

Vincent Defrenne

Vincent Defrenne

Partner, Cyber Strategy & Architecture

Vincent is one of the founders of NVISO, one of Europe’s leading cyber security firms. He specializes into cyber strategy, and the last few years has helped customers’ middle and top management to prepare or handle cyber incidents. His experience comes from the field, helping factories or hospitals recover from cyber attacks, while helping executives of medium-size international businesses make threat-based choices for their cyber plans. Vincent also initiated Belgium’s national student CTF, the Cyber Security Challenge Belgium, 10 years ago. He sits on the Resilience Board of Digital Europe, the European digital trade association, and speaks and writes frequently on the matters of cyber resilience and cyber defense. 

Thierry Draus

Thierry Draus

Vice President, Business Development

With 25 years of experience in the space industry and a solid foundation in telecommunications engineering, Thierry Draus is a business development leader with a strong track record in strategic innovation and growth. As Vice President of Business Development at SES, he focuses on cutting-edge sectors, including Quantum Safe NetworksGovernment Satcom solutionsNavigation, and 5G/6G technologies, driving advancements in these critical areas.

Benjamin Dumont

Software engineer

Benjamin Dumont obtained his M.Sc. in biomedical engineering in 2019 form the ULB (Belgium). After his diploma he participated in a research program on medical imaging analysis with AI technologies in the same university. He worked in software development for medical physics applications before joining Thales Belgium in 2023. In Thales he works as a software developer for secure applications and works on quantum related projects.

Symeon Chatzinotas

Full Professor and SIGCOM Head

Symeon Chatzinotas (MEng, MSc, PhD, FIEEE) is currently Full Professor / Chief Scientist I and Head of the research group **SIGCOM** in the Interdisciplinary Centre for Security, Reliability and TrustUniversity of Luxembourg. In parallel, he is an Adjunct Professor in the Department of Electronic SystemsNorwegian University of Science and Technology and a Collaborating Scholar of the Institute of Informatics & TelecommunicationsNational Center for Scientific Research “Demokritos”.

In the past, he has lectured as Visiting Professor at the University of Parma, Italy and contributed in numerous R&D projects for the Institute of Telematics and Informatics, Center of Research and Technology Hellas and Mobile Communications Research Group, Center of Communication Systems Research, University of Surrey.

He has received the M.Eng. in Telecommunications from Aristotle University of Thessaloniki, Greece and the M.Sc. and Ph.D. in Electronic Engineering from University of Surrey, UK in 2003, 2006 and 2009 respectively.

He has authored more than 800 technical papers in refereed international journals, conferences and scientific books and has received numerous awards and recognitions, including the IEEE Fellowship and an IEEE Distinguished Contributions Award. He is currently in the editorial board of the IEEE Transactions on Communications, IEEE Open Journal of Vehicular Technology and the International Journal of Satellite Communications and Networking.

Nicolas Ramponi

Senior Projects Delivery Manager

Nicolas Ramponi joined his current role in June 2022, where he brings his strong experience in project management. He is responsible for the leadership and management of the operations for Starion Group’s Luxembourg and Belgium business unit. His role is to ensure the successful delivery of Starion’s full portfolio of services and solutions, managing closely the relationships with clients, partners and employees throughout the business lifecycle. Prior to joining Starion he spent most of his career at SES TechCom a wholly owned subsidiary of SES, one of the leading satellite operators with more than 70 satellites (GEO and MEO). In his last position at SES TechCom, Nicolas was leading the Project Management team as well as managing complex projects in the domains of quantum communications and navigation. Nicolas holds a project management certification, PMI-PMP, from the Project Management Institute since 2015.

Sold out

AI and Cybersecurity Day

The rise of artificial intelligence (AI) is having a profound impact on our society. AI is already being used in a variety of key areas such as self-driving cars where AI is being used to develop (1) self-driving cars that can navigate roads and avoid obstacles without human intervention, (2) AI based virtual assistants such as Siri and Alexa that can answer questions, make appointments, and control smart home devices, (3) medical diagnosis where AI is being used to diagnose diseases more accurately than human doctors, (4) financial trading where AI is being used to trade financial assets more efficiently than human traders and (5) customer service where AI is being used to develop chatbots that can answer customer questions and resolve issues without human intervention. AI is driving innovation by providing improved efficiency, increased productivity, better decision-making, improved healthcare, or environmental sustainability.

However the rise of AI is also creating new cybersecurity risks that make AI systems vulnerable to new types of cyberattacks, that could have a significant impact on businesses and organizations. Cybersecurity is important for AI systems because they are becoming more complex and interconnected which makes them more vulnerable to cyberattacks, they are being used to collect and store sensitive data, they are often being used in real-time applications, and they are often used in adversarial environments where attackers are constantly trying to find ways to exploit vulnerabilities in AI systems. Cybersecurity is also important for AI because AI systems are increasingly being used in critical infrastructure, such as power grids and transportation systems. If these systems are hacked, it could have a devastating impact on society.

The objective of the day is to present some key research topics at the intersection of AI and cybersecurity in the form of short tutorials or research presentations. The day will address research topics on the use of AI for improving cybersecurity as well as improving the protection of AI systems. Key research areas at the intersection of AI and cybersecurity that will be covered include AI based identification, protection, detection, response and recovery. More specific topics such as AI based AI-powered anomaly detection, AI-powered malware detection, AI-powered incident response and AI-powered ethical hacking will also be addressed.

8:30 AM – 9:00 AM

REGISTRATIONS

9:00 AM – 9:15 AM

Introduction

Philippe Massonet
Philippe Massonet - Scientific Coordinator at CETIC

9:00 AM – 9:15 AM

Introduction

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
Philippe Massonet
Philippe Massonet - Scientific Coordinator at CETIC
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

9:15 AM – 10:45 AM

The Intersection of Cybersecurity and AI: Opportunities and Challenges

In today’s digital economy, where data breaches plague industry and government alike, the fusion of Cybersecurity and Artificial Intelligence (AI) has emerged as a potent defense strategy. This talk explores the symbiotic relationship between AI and cybersecurity, delving into both its promises and perils.

AI has revolutionized cybersecurity, enabling advanced capabilities such as the detection of malware, vulnerabilities and fraud. Yet, as AI empowers defenders, it also empowers attackers. The dark side of AI reveals a landscape where malicious actors harness AI for spear phishing, automated cyberattacks, misinformation, and deepfakes. Moreover, AI itself becomes a target, as shown by adversarial machine learning and model poisoning attacks. Finally, there are concerns about AI creating a dystopia.

The talk further delves into novel technologies such as attribution (watermarking) and computing on encrypted data that can play a role in mitigating some of these risks.

Overall, there is a need for a multidisciplinary approach encompassing technology, regulation, and ethics to effectively address the challenges presented by the intricate relationship between AI, cybersecurity and privacy.

Bart Preneel
Bart Preneel - Full Professor, KU Leuven

9:15 AM – 10:45 AM

Invited talk

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

10:45 AM – 11:00 AM

COFFEE BREAK

 11:00 AM – 12:15 AM

Don't date the robots: the bad marriage between ML and Security

gabrielecosta
Gabriele Costa - Associated professor at IMT

 11:00 AM – 12:15 AM

Don't date the robots: the bad marriage between ML and Security

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
gabrielecosta
Gabriele Costa - IMT School for Advanced Studies
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

12:30 PM – 01:30 PM

LUNCH TIME

1:30 PM – 2:30 PM

Machine Learning Security in the Real World

Adversarial attacks are considered as one of the most critical security threats for Machine Learning (ML). In order to enable the secure deployment of ML models in the real world, it is essential to properly assess their robustness to adversarial attacks and develop means to make models more robust. Traditional adversarial attacks were mostly designed for image recognition and assume that every image pixel can be modified independently to its full range of values.

In many domains, however, these attacks fail to consider that only specific perturbations could occur in practice due to the hard domain constraints that delimit the set of valid inputs. Because of this, they almost-always produce examples that are not feasible (i.e. could not exist in the real world). As a result, research has developed real-world adversarial attacks that either manipulate real objects through a series of problem-space transformations (i.e. problem-space attacks) or generate feature perturbations that satisfy predefined domain constraints (i.e. constrained feature space attacks). In this talk, we will review the scientific literature on these attacks and report on our experience in applying them to real-world cases.

Maxime Cordy
Maxime Cordy - Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT)

1:30 PM – 2:15 PM

Artificial Intelligence for Malware Analysis

Training

  • Introduction to Industrial Control Systems
  • Basics of PLC Programming
  • Industrial Communication
  • Scanning ICS networks
  • Industrial Network & System enumeration
  • Reversing proprietary industrial protocols
  • Exploiting industrial control systems

 

Workshop

Hands on: Industrial CTF on the Fictile Factory

Francesco mercaldo
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

2:30 PM – 3:30 PM

Abstract_img_Laurens D'hooge

Re-envisioning ML's role in cyber security - after burning down ML-NIDS

Laurens D'hooge
Laurens D'hooge - PhD student at IDLab, Ghent University, in collaboration with imec

2:15 PM – 3:00 PM

Abstract_img_Laurens D'hooge

Re-envisioning ML's role in cyber security - after burning down ML-NIDS

Laurens D'hooge
Laurens D'hooge - PhD student at IDLab, Ghent University, in collaboration with imec
Laurens D'hooge - PhD student at IDLab, Ghent University, in collaboration with imec

3:30 PM – 3:45 PM

COFFEE BREAK

3:30 PM – 4:15 PM

Secure federated learning applied to medical imaging with fully homomorphic encryption

The course aims to introduce students to the understanding of different Federated Learning concepts with a focus on security vulnerabilities and cybersecurity challenges. The course will introduce the Federated Learning and compare it to other Machine Learning approaches. The main concepts and process of Federated Learning will then be presented. The model aggregation phase will then be presented along with the security threats. 

The concept of differential privacy and its relevance for federated Learning explained. Homomorphic encryption techniques will then be introduced for securing the federated Learning process. The course will then present open-source frameworks for federated learning that will be used in the practical work. The practical work aims at applying Federated Learning concepts with a practical exercise from the medical/hospital domain (classification of medical images (malignant or benign lesions)). 

The practical work will cover the steps required to train a neural network (CNN) with a Federated learning architecture. The practical work will involve adapting the model to meet cybersecurity challenges and performing cybersecurity tests.

Training

  • Introduction to Industrial Control Systems
  • Basics of PLC Programming
  • Industrial Communication
  • Scanning ICS networks
  • Industrial Network & System enumeration
  • Reversing proprietary industrial protocols
  • Exploiting industrial control systems

 

Workshop

Hands on: Industrial CTF on the Fictile Factory

XavierLessage
Xavier Lessage - Expert researcher in the Data Science department at CETIC
XavierLessage
Xavier Lessage - Expert researcher in the Data Science department at CETIC

3:45 PM – 4:30 PM

Secure federated learning applied to medical imaging with fully homomorphic encryption

The course aims to introduce students to the understanding of different Federated Learning concepts with a focus on security vulnerabilities and cybersecurity challenges. The course will introduce the Federated Learning and compare it to other Machine Learning approaches. The main concepts and process of Federated Learning will then be presented. The model aggregation phase will then be presented along with the security threats. 

The concept of differential privacy and its relevance for federated Learning explained. Homomorphic encryption techniques will then be introduced for securing the federated Learning process. The course will then present open-source frameworks for federated learning that will be used in the practical work. The practical work aims at applying Federated Learning concepts with a practical exercise from the medical/hospital domain (classification of medical images (malignant or benign lesions)). 

The practical work will cover the steps required to train a neural network (CNN) with a Federated learning architecture. The practical work will involve adapting the model to meet cybersecurity challenges and performing cybersecurity tests.

XavierLessage
Xavier Lessage - Expert researcher in the Data Science department at CETIC

4:30 PM – 5:15 PM

Using AI to enhance cybersecurity

In today’s dynamic cybersecurity landscape, the escalating cyber threats demand advanced methodologies for detection and characterization. This talk explores the pivotal role of Artificial Intelligence (AI) as a technological enabler in significantly fortifying cybersecurity measures. Two key applications of AI in this context will be discussed: leveraging AI as a robust threat detector within network environments and harnessing its capabilities to enhance the identification of cyber vulnerabilities.

The first part of the presentation delves into the application of AI techniques for the systematic detection and classification of cyber threats in network environments. This strategic characterization serves as the cornerstone for developing advanced solutions geared towards enhancing the overall cybersecurity posture of networks. Practical insights will be provided, using Operational Technology (OT) networks as a compelling use case to illustrate the effectiveness of AI-driven threat detection.

The second part of the talk explores the transformative potential of AI in automating and elevating penetration testing (pentesting) tools for the identification of system vulnerabilities. This discussion aims to highlight the proactive role of AI in fortifying systems against potential cyber threats, thereby enhancing their overall resilience in an ever-evolving digital landscape.

Eric Viseur
Eric Viseur - Ingénieur système at Thales

5:30 PM – 6:30 PM

The Galileo Integrated Logistics Centre, where Galileo Ground Segment Operations begin.

Galileo’s satellites communicate with 16 ground stations and these, in turn, ensure that the Galileo constellation continues to deliver reliable accurate and secure positioning and timing. To allow these stations to operate to the highest standards, they need to have easy access to highly specialized parts that can be rapidly delivered to where they are needed. The Galileo ILS Centre is the go-to point for those managing ground stations and is staffed with highly qualified engineers specialized in robotics, aeronautics and IT.

From its central location in Transinne, the Galileo ILS Centre is supporting an efficient spare part and repair provisioning service for Galileo ground infrastructure. The Centre is in charge of guaranteeing the proper spare part stock for corrective and preventive maintenance. It is also resetting and updating equipment received from the stations, or shipping it to the manufacturers for more comprehensive retrofits, should this be necessary.

Galileo
Nicky-Carlomagno
Nicky Carlomagno - Head of SATNAV Services
Sold out

Quantum Day

8:30 AM – 9:00AM

REGISTRATIONS

09:00 AM – 10:30 AM

Introduction to Quantum Computing & Quantum Cryptography - Key Research Trends

This presentation provides a succinct overview of the foundational principles of quantum computing and quantum cryptography, focusing on current research trends that are shaping these fields. Attendees will gain insights into quantum algorithms, quantum hardware developments, and advancements in cryptographic techniques based on quantum principles. The discussion will highlight key challenges and opportunities in harnessing quantum phenomena for practical applications, emphasizing the interdisciplinary nature of quantum research. Join us to explore the forefront of quantum technologies and their transformative potential in revolutionizing computation and information security.

M-Mosca
Professor Michele MOSCA - Co-founder of the Institute for Quantum Computing at the University of Waterloo, CEO & co-founder of evolutionQ

09:00 AM – 10:30 AM

Introduction to Quantum Computing & Quantum Cryptography - Key Research Trends

This presentation provides a succinct overview of the foundational principles of quantum computing and quantum cryptography, focusing on current research trends that are shaping these fields. Attendees will gain insights into quantum algorithms, quantum hardware developments, and advancements in cryptographic techniques based on quantum principles. The discussion will highlight key challenges and opportunities in harnessing quantum phenomena for practical applications, emphasizing the interdisciplinary nature of quantum research. Join us to explore the forefront of quantum technologies and their transformative potential in revolutionizing computation and information security.

 

M-Mosca
Professor Michele MOSCA - co-founder and deputy director of the Institute for Quantum Computing at the University of Waterloo, CEO & co-founder of evolutionQ.
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

10:30 AM – 11:00 AM

COFFEE BREAK

11:00 AM – 12:30 AM

Quantum Keys Distribution over Satellite – Singapore Initiatives

This presentation unveils Singapore’s groundbreaking initiatives in quantum key distribution (QKD) over satellite communication channels. We delve into the cutting-edge research and development efforts aimed at establishing secure quantum communication links between ground stations and satellites. Explore the technological advancements, key milestones, and the role of Singapore in pioneering quantum-secured satellite communication. Join us to learn about the implications of these initiatives for global secure communication and data encryption in the quantum age.

Robert-Bedington
Robert Bedington - Co-Founder & CTO at SpeQtral

11:00 AM – 12:30 AM

Quantum Keys Distribution over Satellite – Singapore Initiatives

This presentation unveils Singapore’s groundbreaking initiatives in quantum key distribution (QKD) over satellite communication channels. We delve into the cutting-edge research and development efforts aimed at establishing secure quantum communication links between ground stations and satellites. Explore the technological advancements, key milestones, and the role of Singapore in pioneering quantum-secured satellite communication. Join us to learn about the implications of these initiatives for global secure communication and data encryption in the quantum age.

 

CY-LAM
Chune Yang Lam - CEO and co-founder of SpeQtral, spin-off company from the Singapore Center for Quantum Technology
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

12:30 AM – 02:00 PM

LUNCH TIME

02:00 PM – 03:30 PM

High-performance Quantum Technology – Continuous Variable QKD

This presentation introduces continuous variable quantum key distribution (CV-QKD) as a high-performance quantum technology. We explore the principles and applications of CV-QKD, emphasizing its potential for achieving secure and high-speed quantum communication. Through a discussion of recent advancements and practical implementations, attendees will gain insights into the promising future of CV-QKD in enabling robust and efficient quantum-secured communication networks. Join us to uncover the key developments and innovations in this field, paving the way for a more secure digital era.

 

Xin-YIN
Professor Xin Yin - Professor at IMEC and University of Ghent, Director of IDlab

02:00 PM – 03:30 PM

High-performance Quantum Technology – Continuous Variable QKD

This presentation introduces continuous variable quantum key distribution (CV-QKD) as a high-performance quantum technology. We explore the principles and applications of CV-QKD, emphasizing its potential for achieving secure and high-speed quantum communication. Through a discussion of recent advancements and practical implementations, attendees will gain insights into the promising future of CV-QKD in enabling robust and efficient quantum-secured communication networks. Join us to uncover the key developments and innovations in this field, paving the way for a more secure digital era.

 

Xin-YIN
Professor Xin Yin - Professor at IMEC and University of Ghent, Director of IDlab
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

03:30 PM – 04:00 PM  

COFFEE BREAK

04:00 PM – 05:00 PM

International Operational Usecases of QKD to protect existing business applications

This presentation sheds light on the INT-UQKD program, showcasing how Quantum Key Distribution (QKD) is being strategically employed to safeguard existing business applications on a global scale. We delve into practical use cases, highlighting successful implementations of QKD in diverse operational environments. Through real-world examples and case studies, attendees will gain insights into the tangible benefits of integrating QKD into their existing security infrastructure. Join us to explore the transformative potential of QKD in fortifying information security for businesses worldwide.

Pascal-lux
Dr. Pascal Rogiest - Chief Commercial Officer of RHEA Group

04:00 PM – 05:00 PM

International Operational Usecases of QKD to protect existing business applications

This presentation sheds light on the INT-UQKD program, showcasing how Quantum Key Distribution (QKD) is being strategically employed to safeguard existing business applications on a global scale. We delve into practical use cases, highlighting successful implementations of QKD in diverse operational environments. Through real-world examples and case studies, attendees will gain insights into the tangible benefits of integrating QKD into their existing security infrastructure. Join us to explore the transformative potential of QKD in fortifying information security for businesses worldwide.

Pascal-lux
Dr. Pascal Rogiest - Chief Commercial Officer of RHEA Group
Benoit Balliu - Howest Researcher in Industrial Security.

05:15 PM – 08:45 PM

VIP Eurospace Center visit

21_AS_Galaxia_Chemin_luminescent_02
Join us for an unique experience at the Euro Space Center on Tuesday, 5th of December. 
 
  • Moonwalk/Marswalk XP: Set your foot on the Moon and Mars
  • Multi-axis chair: Test your reactions in a disorientation situation
  • Space Flight Unit: Take control of your spaceship
  • Free Fall Slide: Let yourself go into free fall
  • Space Rotor: Feel the centrifugal force
  • Mars Village: Get ready for life on Mars

In small groups, live a unique experience combining discovery and space simulations!
You will see demonstrations of 5 training simulators and discover the planet Mars as if you were there.

6:00 PM – 8:00 PM

VIP Eurospace Center visit

21_AS_Galaxia_Chemin_luminescent_02
Join us for an unique experience at the Euro Space Center on Tuesday, 13th of December. 
 
  • Moonwalk/Marswalk XP: Set your foot on the Moon and Mars
  • Multi-axis chair: Test your reactions in a disorientation situation
  • Space Flight Unit: Take control of your spaceship
  • Free Fall Slide: Let yourself go into free fall
  • Space Rotor: Feel the centrifugal force
  • Mars Village: Get ready for life on Mars


In small groups, live a unique experience combining discovery and space simulations!
You will see demonstrations of 5 training simulators and discover the planet Mars as if you were there.

Industry and challenges Day

9:00 AM – 9:30 AM

REGISTRATIONS

9:30 AM – 10:45 AM

Training in Cybersecurity: challenges and next steps

The shortage of people with the right skills, particularly in cybersecurity, is now well established. According to Gartner, over the next few years, there will be a shortfall, worldwide, of 3.4 million experts in this field .
However, it’s never too late to tackle the issue. 
We invite you to discuss this issue, during the 2023 Cyberwal in Galaxia school, with players who are active in the ecosystem and ready to collaborate on this topic.

The workshop will be divided into 2 parts:
1) What challenges were identified by the various players and what are their current concerns?
2) How can we work together to find and implement quick wins but also tackle the underlying issues?

Jeremy Grandclaudon
Jeremy Grandclaudon - Co-leading the program Cyberwal By Digital Wallonia at ADN.

10:45 AM – 11:00 AM

COFFEE BREAK

11:00 AM – 12:30 AM

Training in Cybersecurity: challenges and next steps

The shortage of people with the right skills, particularly in cybersecurity, is now well established. According to Gartner, over the next few years, there will be a shortfall, worldwide, of 3.4 million experts in this field .
However, it’s never too late to tackle the issue. 
We invite you to discuss this issue, during the 2023 Cyberwal in Galaxia school, with players who are active in the ecosystem and ready to collaborate on this topic.

The workshop will be divided into 2 parts:
1) What challenges were identified by the various players and what are their current concerns?
2) How can we work together to find and implement quick wins but also tackle the underlying issues?

Jeremy Grandclaudon
Jeremy Grandclaudon - Co-leading the program Cyberwal By Digital Wallonia at ADN.