Cyberwal in Galaxia
Academy

Euro Space Center (Libin) – December 8th to December 12th, 2025

Free of charge

The first International School connected to the Cyberwal initiative proudly welcomes the fourth edition of the Cyberwal in Galaxia Academy.

800+

participants

4th

edition

14

countries represented

The goal is to establish Wallonia as a hub of cybersecurity excellence,
recognized well beyond its borders, and to affirm its role as a strategic center addressing the fast-evolving needs of the international cyber ecosystem.

This program will take place at the Galaxia site in Transinne which, together with the European Space Agency (ESA) and the nearby ESEC Centre in Redu (5 km away), forms one of Europe’s leading space hubs.

At ESEC Redu, ESA has established its Cybersecurity Centre, dedicated to safeguarding the Agency’s ground infrastructures and space operations, ensuring the highest standards of cyber protection.

Located in the heart of Belgium, the Euro Space Center in Transinne is a flagship educational and scientific facility dedicated to space exploration. Each year, it welcomes around 16,000 young participants from 35 nationalities and attracts over 120,000 visitors with its interactive exhibitions and immersive experiences. Combining education, outreach, and innovation, it has become a European benchmark for space awareness.

Speakers

The organizers’ objective is to position these courses as a benchmark in high-level education on a European scale, while ensuring a direct connection with the real and evolving needs of the cyber ecosystem. By inviting renowned speakers and experts from academia, companies, and public institutions, the program guarantees both academic excellence and practical relevance, preparing participants to meet tomorrow’s cybersecurity challenges.

Sarah Ampe

Manager Digital Risk

EY Belgium

La sécurité informatique à l’ère quantique

Georges Ataya

Professor

Solvay Brussels School of Economics and Management

La sécurité informatique à l’ère quantique

Mohamed Boukhebouze

AI Product Manager

EarthLab Luxembourg

La sécurité informatique à l’ère quantique

Werner Coomans

Technology Advisor

Bell Labs DMTS, Nokia

La sécurité informatique à l’ère quantique

Selim Chaabani

PhD Student

ULiege

La sécurité informatique à l’ère quantique

Phédra Clouner

Deputy Director General

Centre for Cybersecurity Belgium

La sécurité informatique à l’ère quantique

Emmanuelle de Foy

First Counsellor
Directorate General for Multilateral Issues

Federal Public Service (FPS) Foreign Affairs

Unit M4 Global Governance

La sécurité informatique à l’ère quantique

Yvan De Mesmaeker

Secretary General

European Corporate Security Association – ECSA

La sécurité informatique à l’ère quantique

Vincent Defrenne

Partner Cyber Strategy & Architecture

NVISO

La sécurité informatique à l’ère quantique

Xavier Devroey

Professor of Software Engineering, NADI

University of Namur

La sécurité informatique à l’ère quantique

Laurens D'hooge

Postdoctoral researcher

IDLab-imec

La sécurité informatique à l’ère quantique

Fatou Diao

Quantum Cybersecurity Researcher

Multitel

La sécurité informatique à l’ère quantique

Alexandre Dulaunoy

Head of CIRCL

Computer Incident Response Center Luxembourg

La sécurité informatique à l’ère quantique

Maxime Gennart

Legal Advisor

Belgian Data Protection Authority

La sécurité informatique à l’ère quantique

Jeremy Grandclaudon

Senior Cybersecurity Expert for Agency for Digital

ADN

La sécurité informatique à l’ère quantique

Vassili Joannidès de Lautour

Consultant in AI for education and affiliate professor at Parma University

Parma University

La sécurité informatique à l’ère quantique

Thomas Kopp

Chief Scientist

LuxTrust

La sécurité informatique à l’ère quantique

Clément Laurens

Co-founder

CRESCO

La sécurité informatique à l’ère quantique

Xavier Lessage

An expert research engineer in the Data Science department

CETIC

La sécurité informatique à l’ère quantique

Christian Mack

COO

Guardis SRL

La sécurité informatique à l’ère quantique

Philippe Massonet

Scientific Coordinator

CETIC

La sécurité informatique à l’ère quantique

Matteo Merialdo

Cybersecurity Principal

Nexova

La sécurité informatique à l’ère quantique

Burcu Özkaptan

Head of Telecommunication and Navigation

Telespazio Belgium

La sécurité informatique à l’ère quantique

Cristel Pelsser

Professor

UCLouvain

La sécurité informatique à l’ère quantique

Jonathan Pisane

Innovation & Product Policy Manager

Thales Belgium

La sécurité informatique à l’ère quantique

Giulia Rinaldi

Cyber Data Engineer Part of the Innovation & Product Policy Secure Communication and Information Systems Thales Belgium

Thales Belgium

La sécurité informatique à l’ère quantique

Patrick Renaux

Senior Cybersecurity Architect

Starion Luxembourg S.A (Starion Group)

La sécurité informatique à l’ère quantique

Pascal Rogiest

General Manager

Clarence 

La sécurité informatique à l’ère quantique

Merlijn Sebrechts

Senior Researcher

Imec – Ghent University

La sécurité informatique à l’ère quantique

Nicolas Sournac

AI Research Engineer

Multitel

La sécurité informatique à l’ère quantique

Pascal Steichen

CEO

Luxembourg House of Cybersecurity

La sécurité informatique à l’ère quantique

Francesco Vedovato

Assistant Professor @ Department of Information Engineering & Co-founder and product developer

University of Padova & ThinkQuantum s.r.l.

La sécurité informatique à l’ère quantique

Bert Verdonck

CEO

LNDS (Luxembourg National Data Service)

La sécurité informatique à l’ère quantique

Martin Vivian

Research Assistant

Université catholique de Louvain

La sécurité informatique à l’ère quantique

Stay tuned. More speakers to be announced soon!

Our Program for the 5 days

Over the course of five days, participants will benefit from a balanced mix of theoretical insights and practical training sessions, designed to combine knowledge acquisition with hands-on experience.

To encourage networking and informal exchanges, morning and afternoon breaks are scheduled each day, providing the opportunity to connect with peers, speakers, and experts.

The program still holds exciting surprises in store for you. Stay tuned further details about the program will be available soon.

  • Day 1

    Monday 08/12

  • Day 2

    Tuesday 09/12

  • Day 3

    Wednesday 10/12

  • Day 4

    Thursday 11/12

  • Day 5

    Friday 12/12

Institutional day

The opening day of the Cyberwal in Galaxia Academy aims to provide a comprehensive and structured panorama of cybersecurity, combining institutional, organizational, European, international, and strategic perspectives. Each contribution will follow a common thread: understanding how cybersecurity, beyond its technical dimension, has become a central issue of governance, sovereignty, and resilience for our societies.

Cybersecurity can no longer be regarded as an isolated field. It now permeates organizational governance, national regulation, European cooperation, international competition, the protection of fundamental rights, and global security.

Starting from regional challenges and extending to national and European perspectives, participants will discover how leading institutions are defining priorities, shaping skills, and establishing the frameworks needed to strengthen collective resilience. Through these complementary perspectives, the opening day will highlight both the challenges to be addressed and the solutions already underway, while outlining the path toward a shared maturity that is essential for building a stronger cybersecurity ecosystem, better prepared to face tomorrow’s threats.

Welcome & Registration

Opening ceremony

Pascal Steichen (Luxembourg House of Cybersecurity)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pascal Steichen
Pascal Steichen - CEO
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Luxembourg Cybersecurity Factory

Pascal Steichen (Luxembourg House of Cybersecurity)

Auditorium

The Luxembourg Cybersecurity Factory (LCF) is set to become a groundbreaking hub for collaboration, enabling the seamless collection, analysis, and sharing of critical cybersecurity data—from threat intelligence and vulnerabilities to the effectiveness of protective measures. Designed as an open cybersecurity data space, the LCF will integrate advanced data tools, a dedicated Open Source Program Office (OSPO), and robust governance frameworks to strengthen risk mitigation across sectors.

This initiative will empower organisations, especially SMEs, to develop innovative, autonomous cybersecurity solutions, fostering a vibrant ecosystem of data, tools, and real-world applications. In a second phase, the LCF will expand its partnership with the Luxembourg AI Factory (L-AIF), integrating AI capabilities to further enhance its impact.

By attracting cybersecurity data providers to contribute their datasets and supporting data curation for AI applications, Luxembourg aims to position the LCF as a global leader in open-source-driven cybersecurity innovation.

This initiative will empower organisations, especially SMEs, to develop innovative, autonomous cybersecurity solutions, fostering a vibrant ecosystem of data, tools, and real-world applications. In a second phase, the LCF will expand its partnership with the Luxembourg AI Factory (L-AIF), integrating AI capabilities to further enhance its impact.

By attracting cybersecurity data providers to contribute their datasets and supporting data curation for AI applications, Luxembourg aims to position the LCF as a global leader in open-source-driven cybersecurity innovation.

Pascal Steichen
Pascal Steichen - CEO

Coffee break

What is the current situation on implementing (international) rules in the cyberspace

Emmanuelle de Foy (Federal Public Service (FPS) Foreign Affairs Unit M4 Global Governance)

Auditorium

We are familiar with the off-line world, our material world, managed by rules and laws. When it comes to the online world (and more and more parts of our lifes go online, work, leisure, information, orders, bookings…), who are the actors and how are they behaving ? What is important or crucial ? What is allowed or not allowed ? How can you react ? These issues have been discussed in the United Nations since 1998. The presentation will deal with 2 sets of negotiations that are actually typifying the state of the world. The negotiations on a international framework on ICT will show the rivalry between democracies and autocracies and the weight of the Global South. The second negotiation will show even more precisely the rivalry about the conceptions of the applicable law and the values such as the protection of human rights). The presentation will quickly deal with other lines of efforts at the level of the European Union, the OSCE and the NATO.

Emmanuelle de Foy
Emmanuelle de Foy - First Counsellor & Directorate General for Multilateral Issues

How to improve cybersecurity ? The Belgian approach!

Phedra Clouner (Centre for Cybersecurity Belgium)

Auditorium

During her presentation, Phédra Clouner will discuss how Belgium has implemented initiatives to make the country one of the least cyber-vulnerable countries in Europe.

She will review the role played by the national cyber security agency, the CCB, in the Belgian landscape.

She will discuss the types of threats facing the country and how these threats have evolved in line with changes in the geopolitical context and the emergence of new technologies.

She will then detail the actions put in place to counter these threats for different target audiences, as well as the governance that supports them, specifying concepts and their implementation, such as Active Cyber Protection, Cyberfundamentals, spearwarning, the involvement of the population in its own protection, etc.

She will also discuss how the various European regulations have been implemented by the CCB.

Phédra Clouner
Phedra Clouner - Deputy Director General

The Digital Wallonia cybersecurity strategy: achievements and next steps

Jeremy Grandclaudon (ADN)

Auditorium

The Walloon Region’s Digital Wallonia strategy is the cornerstone of its digital transformation, aiming to foster innovation, economic growth, and societal resilience through technology. Within this framework, cybersecurity is a major pillar, ensuring trust and security across all digital initiatives. Our cybersecurity projects drive this ambition by supporting SMEs, strengthening private and public infrastructures, and aligning with European directives such as NIS2 or CRA . Its approach combines awareness campaigns, skills development, and practical tools

Jeremy-Grandclaudon-program
Jeremy Grandclaudon - Senior Cybersecurity Expert for Agency for Digital

Lunch

NIS2, Who must act to ensure cybersecurity protections?

Georges Ataya (Solvay Brussels School of Economics and Management)

Auditorium

The rapid evolution of digital threats highlights the persistent weaknesses of many companies, often unprepared to meet the requirements of the NIS2 directive. This new regulation directly engages business leaders, who must integrate cybersecurity into their governance. It also opens new opportunities for experts and students, whose skills are now essential to digital resilience. Finally, it mobilizes digital managers and entrepreneurs as key drivers of lasting change toward a shared culture of security.

Georges Ataya - Cyberwal in Galaxia Academy 2025
Georges Ataya - Professor

Security and Compliance: Cybersecurity at the Heart of the Right to Data Protection

Maxime Gennart (Belgian Data Protection Authority)

Auditorium

Security is not a mere technical requirement; it is an essential component of responsibility and trust in digital environments.

The fundamental right personal data protection and cybersecurity are two sides of the same coin.

As the authority supervising and enforcing this right, the Data Protection Authority (DPA) plays a central role in promoting safe digital environments.

This presentation will first explore the DPA’s role in cybersecurity. It will then address the obligations arising from the principle of data confidentiality and security (Article 32 of the GDPR), as well as those linked to data protection by design and by default (Article 25).

These concepts will be illustrated with concrete examples drawn from use cases, demonstrating how these legal principles are translated into effective security practices.

Maxime Gennart
Maxime Gennart - Legal Advisor

Coffee break

How Cyber Security fits into Global Corporate Security

Yvan De Mesmaeker (European Corporate Security Association – ECSA )

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Yvan De Mesmaeker - Secretary General

How Cyber Security fits into Global Corporate Security

Général Pierre Ciparisse

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Général Pierre Ciparisse - Cyber Command

Q&A

Général Pierre Ciparisse

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Général Pierre Ciparisse - Cyber Command

Cyber & AI Day

This day of the Cyberwal in Galaxia Academy explores the latest advancements in artificial intelligence (AI) as applied to cybersecurity and secure communications.

The day begins with an introduction to AI’s role in these critical fields, followed by presentations on innovative projects such as AIDE. Then, a session will explore how different types of AI technologies can be used to automatically generate cybersecurity functional and penetration tests, for both black box and white bow testing.

The agenda includes discussions on securing radio frequency (R/F) communications, protecting machine learning models for unmanned vehicles, and the latest developments in homomorphic encryption. Leading experts from institutions and companies—including UCLouvain, UNamur, Cetic, Multitel, imec/IDLab, Thales and Telespazio, will share their expertise and solutions.

The program also features sessions on explainable and trustworthy AI, as well as networking opportunities to encourage collaboration. The event aims to provide a holistic view of the opportunities and challenges in leveraging AI for modern cybersecurity, fostering innovation and knowledge exchange.

Welcome & Registration

Introduction to the 'AI day’

Jonathan Pisane (Thales Belgium) and Philippe Massonet (CETIC)

Auditorium

The introduction to the AI day will, afetr a brief introduction to the topic of AI for Cybersecurity, explain the objectives of the day, introduce the program and the speakers of the day. 

Pisane Jonathan
Jonathan Pisane - Innovation & Product Policy Manager
Philippe Massonet - Scientific Coordinator

Overview of the use of AI in cyber

Laurens D’Hooge (IDLab-imec)

Auditorium

Dr. D’hooge’s presentation will be divided in two parts: a plunge into the current research landscape where AI is applied to cybersecurity and an overview of the AIDE project which aims at a platform for secure, federated machine learning.
The first part will cover the state-of-the-art in topics such as network intrusion detection and malware detection as well as a host of other topics where machine learning (ML) is being leveraged to solve cybersecurity issues. The talk will include guidelines on solid ML experiment design and evaluation to reach more reliable and reproducible results with a key focus on the importance of model generalization.

Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

Presentation of the AIDE project

Laurens D’Hooge (IDLab-imec)

Auditorium

The second part will dive deep into imec’s role as integrator for the AIDE project, financed by FOD Bosa to research and develop secure infrastructure in academia for Belgian companies to jointly train and evaluate machine learning models without sharing data in a federated manner.

Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

AI-powered tools and cybersecurity: the role of prompting

Vassili Joannidès de Lautour (Parma University)

Auditorium

With the development of LLMs, generative AI has been democratised, making prompting the new must-have skill. According to an OpenAI study, 80% or generative AI users believe they know how to prompt but do not. 15% can write decent, yet incomplete and insecure prompts whilst only 5% have a perfect command of prompting. This has caused the occurring of a number of loopholes for cybersecurity, some whereof are covered in this presentation. In the first place, It is no longer needed to have a good command of coding, prompting may suffice. Secured systems may be vulnerable to well-designed prompts, a new generation of hackers. Secondly, prompt amateurs may not be able to discern hallucination and other AI-generated creations whilst engineers would. Thirdly, AI-powered tools may be vulnerable if they are not secured through some basic tools (APIs, tokens, etc.) Fourthly, the prompt at the core of AI-powered tools may be vulnerable, if they are misconceived (loose instructions, no fallback mechanisms, no reflexivity, etc.) 

Vassili JDL - Program - Cyberwal in Galaxia Academy 2025
Vassili Joannidès de Lautour - Consultant in AI for education and affiliate professor

Coffee break

AI-powered tools and cybersecurity: tests generation

Xavier Devroey (Unamur), Martin Vivian (UCLouvain) and Guillaume Ginis (CETIC)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Automated test case generation using search algorithms
Automated test case generation is a powerful technique to improve software quality while reducing validation costs. This talk explores how search-based algorithms can be leveraged to generate effective test suites, drawing on insights from recent research. We begin by introducing the fundamentals of search-based testing, illustrated through tools like EvoSuite and Pynguin, which optimize coverage criteria to produce high-quality tests. We then show how these algorithms can be specialized to detect specific fault types, such as API misuse or integration errors between classes. These approaches combine static analysis with targeted search heuristics to narrow the test space to critical code regions, enhancing fault detection precision and efficiency. Finally, we discuss how search algorithms can be dynamically tuned to focus on particular scenarios, such as Python C-extensions or complex inter-class interactions in Java, opening new avenues for adaptive and context-aware test generation.
Xavier-Devroey-programme
Xavier Devroey - Professor of Software Engineering, NADI
Improving Protocols Fuzzing

For many proprietary systems source code and documentation are not available which makes them hard to test leaving only black-box approaches. In this work, we present an experience of fuzzing a protocol for drone control and the developed tool BinFuzz. BinFuzz is a man-in-the-middle stateful black-box protocol fuzzer. Listening to real communication as a man-in-the-middle, the fuzzer reconstructs states of the protocol as well as detects message types and their variable fields. The collected knowledge is used during the fuzzing to improve the quality of the generated inputs. For the application, we first test BinFuzz on an FTP protocol and then use it to fuzz the protocol for drone control.

Martin-Viviant
Martin Vivian
GuillaumeGinis
Guillaume Ginis

Automating Security Testing for Critical Systems: Insights from CYRUS & CRESCENDO

Christian Mack (Guardis SRL)

Auditorium

Cyber-physical systems in sectors such as defense, energy and transportation must operate under strict safety and availability constraints, while facing growing cyber-threats and regulatory pressure (NIS2, CRA, IEC 62443). Traditional security assessments are often too slow, costly and difficult to reproduce in these contexts.

This presentation introduces a risk-based, automated testing platform developed through the CYRUS (2021–2023) and CRESCENDO (2023–2025) projects. The approach integrates leading standards and frameworks (PTES, NIST SP 800-115, MITRE ATT&CK for ICS) to provide reusable workflows covering asset discovery, protocol fingerprinting (Modbus, CAN, BACnet) and controlled exploit validation. A proof-management process ensures full traceability and auditability.

Applied to representative critical infrastructures, the solution has demonstrated significant business and technical benefits. It reduces audit preparation time, accelerates re-testing cycles, and improves remediation prioritization. At the same time, it expands attack-surface coverage, strengthens vulnerability-to-asset correlation, and produces reproducible reports aligned with ISO/IEC 27001 and IEC 62443.

The talk will also highlight remaining challenges — support for proprietary protocols, SBOM/VEX integration, and enhanced incident-reporting workflows and discuss perspectives for industrial adoption.

Christian Mack
Christian Mack - COO

Lunch break

AI for secure R/F communications: industrial approach

Burcu Özkaptan (Telespazio)

Auditorium

Our project presents a prototype of a Positioning, Navigation, and Timing (PNT) user equipment that integrates 4G and GNSS technologies to deliver highly reliable navigation capabilities for safety-critical applications, even under hostile environmental conditions or signal interference. The hybrid system is designed to enhance the performance and resilience of autonomous vehicles, particularly in urban environments where GNSS reliability is compromised due to superstructures and 4G networks are dense, and in rural environments where the mobile networks are scarce. Key use cases include autonomous docking in ports and autonomous ground vehicles in airports, both of which demand high safety standards and benefit from mobile network deployments. Besides positioning hybridization of GNSS with 4G mobile networks, the prototype uses machine learning techniques on both spectra for interference detection and classification, and signal processing algorithms for interference mitigation and features intelligent sensor switching based on signal quality indicators. A machine learning-based system assesses signal integrity in the spectrum of interest and recommends optimal PNT sources, ensuring robust navigation outputs for vehicle systems. The solution is compact and suitable for integration into UAVs, supporting future applications in urban air mobility and infrastructure monitoring. The PNT solution is reliable, robust and secure in the presence of interferers, and it is suitable for safety critical applications even in case of hostile environment conditions or attacks on the GNSS or mobile bands.

burcu-program - Cyberwal in Galaxia Academy 2025
Burcu Özkaptan - Head of Telecommunication and Navigation

Explainable & Trustworthy AI

Lucas La Fisca (Umons/Trail/ARIAC), Giulia Rinaldi (Thales): Trustworthy AI & Nicolas Sournac (Multitel): Explicability of AI

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Xavier-Devroey-programme
Lucas La Fisca
Giulia Rinaldi
Securing AI Systems: Understanding and Mitigating Adversarial Attacks

As deep learning models are increasingly deployed in safety-critical applications, their vulnerability to adversarial attacks raises major concerns for system security. These attacks exploit the sensitivity of neural networks to input perturbations, leading to severe model failures. This presentation will introduce the fundamental principles behind adversarial example generation, detailing common threat models and attack algorithms. We will also examine their practical impact through illustrative cases in computer vision and natural language processing, highlighting the security implications for real-world AI systems. Finally, the talk will discuss current state-of-the-art defenses, including adversarial training and formal verification techniques.

Nicolas Sournac
Nicolas Sournac - AI Research Engineer

CONFIDENTIAL ML FOR UNMANNED VEHICLES (securing ML models from extraction)

Merlijn Sebrechts (imec/IDLab)

Auditorium

Machine learning models and other software on Unmanned Vehicles (UVs) are not safe. It’s often trivial for adversaries with physical access to extract the models on a device. This risks theft of intellectual property and can even help adversaries develop countermeasures to “fool” or hijack AI models. While confidential computing is a promising technology to protect data and models while they’re in use, the hardware in most UVs does not actually support modern confidential computing solutions. This talk will investigate the confidential computing solutions of commercial off-the-shelf hardware in UVs, show off a demo taking advantage of these features, and take a peek into the future of confidential computing for UVs.

merlijn-sebrechts
Merlijn Sebrechts - Senior Researcher

Coffee break

Secure Federated Learning with Model Compression, Knowledge Distillation and Fully Homomorphic Encryption

Xavier Lessage (Cetic)

Auditorium

Breast cancer remains a major health risk, especially when diagnosed late. The presentation explores innovative techniques to improve detection while keeping patient data secure. By using Federated Learning (FL), hospitals can collaborate without sharing sensitive data directly. To enhance both performance and security, we introduce a two-way knowledge distillation approach, called inverse distillation, where student and teacher models learn from each other. Combined with full homomorphic encryption (HE), this allows compact neural networks to be securely transmitted and trained across institutions. HE is a good countermeasure for several known threats to FL such as Privacy Inference / Data Reconstruction Attacks (Confidentiality), Collusion Attacks (Integrity & Confidentiality) or Tampering / Model Poisoning (When Integrated with Robustness).
 
Experiments with FL and HE on mammography images from a Belgian hospital show better accuracy in distinguishing malignant from benign tumors, while fully protecting patient data and leveraging frugal AI principles, opening new possibilities for secure, collaborative, and resource-efficient AI in healthcare.

XavierLessage-hr
Xavier Lessage - An expert research engineer in the Data Science department

Homomorphic ciphering: industrial approach

Mohamed Boukhebouze (Earth Lab Luxembourg)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Mohamed Boukhebouze
Mohamed Boukhebouze - AI Product Manager

Ending session

Jonathan Pisane (Thales Belgium) and Philippe Massonet (CETIC)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pisane Jonathan
Jonathan Pisane - Innovation & Product Policy Manager
Philippe Massonet - Scientific Coordinator

Quantum Technology and Cybersecurity

This session of the Cyber and Quantum Day program explores the transformative impact of quantum technologies on secure communications and their implications for cybersecurity.

The event will begin with a technical exploration of Quantum Key Distribution (QKD), providing attendees with a solid foundation for understanding its critical role in securing communications against quantum threats.

The agenda continues with presentations on the latest breakthroughs in QKD networks, highlighting both theoretical models and practical deployments. Experts will also explore the integration of QKD with Post-Quantum Cryptography (PQC), examining hybrid approaches to achieve robust and scalable quantum-safe solutions.

A panel discussion will convene leading voices from academia, industry, and critical infrastructure sectors to address the challenges and opportunities of building quantum-secure communications.

This exchange will consider technical, economic, and regulatory perspectives, with a focus on the concrete steps required to prepare for a quantum-resilient future. Finally, the day will conclude with an exclusive visit to the Gilles Brassard Quantum Cryptography Lab, an open research platform dedicated to advancing secure communications in the quantum era.

By bringing together experts from institutions and companies—including Università di Padova, Université de Liège, Multitel, Starion, and Thales—the event fosters collaboration, knowledge exchange, and innovation.

The Cyber and Quantum Day aims to provide a holistic view of the opportunities and challenges in leveraging quantum technologies to transform secure communications, paving the way toward a trusted digital future.

Welcome & Registration

Introduction to the 'quantum day'

Serge Habraken (CSL)

Auditorium

This presentation explores the fundamental concepts behind Quantum Key Distribution (QKD) and the challenges arising from its implementation in spatial contexts. The first part introduces the theoretical foundations of QKD, providing an overview of its operating principles. It covers key ideas such as the growing threat posed by quantum computers, the basics of modern cryptography, and the quantum mechanics principles relevant to QKD. The second part adopts a more technological perspective, presenting the hardware and systems required to exchange quantum keys and discussing several approaches to building these resources. Overall, this presentation aims to provide a clear introduction to QKD, accessible to an audience without prior background in the field.

Selim Chaabani
Serge Habraken - CSL

Technical introduction to QKD

Serge Habraken (CSL)

Auditorium

This presentation explores the fundamental concepts behind Quantum Key Distribution (QKD) and the challenges arising from its implementation in spatial contexts. The first part introduces the theoretical foundations of QKD, providing an overview of its operating principles. It covers key ideas such as the growing threat posed by quantum computers, the basics of modern cryptography, and the quantum mechanics principles relevant to QKD. The second part adopts a more technological perspective, presenting the hardware and systems required to exchange quantum keys and discussing several approaches to building these resources. Overall, this presentation aims to provide a clear introduction to QKD, accessible to an audience without prior background in the field.

Selim Chaabani
Serge Habraken - CSL

Coffee break

Space-based Quantum Key Distribution

Francesco Vedovato (University of Padova & ThinkQuantum s.r.l.)

Auditorium

The idea of exploiting satellites to realize a global Quantum Key Distribution (QKD) network took shape in the early 2000s. After the first pioneering demonstrations—showing the feasibility of different encodings over satellite-to-ground channels—the efforts of the Chinese Academy of Sciences culminated in multiple satellites in orbit and the successful realization of space-based QKD. In parallel, Europe—under the coordination of the European Space Agency (ESA)—has advanced mission studies and started several initiatives, including the Eagle-1 satellite and the SAGA constellation, planned for deployment in the coming years.
This talk will present a historical overview of the development of space-based QKD, as well as the goals and challenges of the upcoming ESA missions, and will benefit from the speaker’s direct involvement in R&D across academia and industry since 2015.

Francesco Vedovato - Cyberwal in Galaxia Academy 2025
Francesco Vedovato - Assistant Professor @ Department of Information Engineering & Co-founder and product developer

Thesis in QKD

Selim Chaabani (ULiege), Antoine Groulard (ULiege) & Fatou Diao (multitel)

Auditorium

The PhD thesis of Selim Chaabani focuses on the development of single-photon sources for quantum key distribution (QKD), a key technology for secure communications. This work explores both the theoretical and experimental aspects of designing reliable single-photon emitters, with a long-term vision towards applications in space-based quantum networks. The presentation will outline the main stages of the development of one of these sources — from theory to laboratory implementation — and will include some preliminary experimental results.

Selim Chaabani
Selim Chaabani - PhD Student
Antoine Groulard - ULiege
Fatou Diao
Fatou Diao - Quantum Cybersecurity Researcher

Spontaneous presentation of the public activities

Fatou Diao

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Fatou Diao

Lunch

INT-UQKD: challenges, achievements, and new goals

Patrick Renaux (Starion Luxembourg S.A (Starion Group))

Auditorium

INT-UQKD project started in September 2022, building and operating an interoperable terrestrial and space QKD network, capable of delivering a cost-efficient quantum-safe solution able to support multiple use cases.

In operating the terrestrial link since august 2023 Starion Luxembourg and its partners have gain practical experience paving the way to future development in Europe towards an agnostic quantum-safe service platform capable of operating across multiple QKD system solutions on a global scale.

Patrick Renaux
Patrick Renaux - Senior Cybersecurity Architect

Cybersecurity: the reverse side of the quantum-computing medal

Werner Coomans (Bell Labs DMTS, Nokia)

Auditorium

Quantum computers give rise to tremendous opportunities in terms of scientific discoveries, able to solve problems out of reach of even the most powerful classical supercomputers. However, there is also a downside: quantum computers will also be able to crack a large family of cryptographic algorithms, which today are used all over the internet. This talk will explain why the threat is already real today, and why it’s of paramount importance to start the migration to quantum-safe primitives as soon as possible. It will give an overview of the solution landscape with a focus on networking, introduce core concepts of the migration journey, and address the role of telecommunication networks in the largest cybersecurity migration in human history.

Werner Coomans_2025_small
Werner Coomans - Technology Advisor

Coffee break

Post-quantum cryptography: context and actions

Sarah Ampe (EY)

Auditorium

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against the potential threats posed by quantum computers. Unlike traditional systems based on RSA or ECC, which rely on mathematical problems that quantum algorithms can solve efficiently, PQC is built on hard problems that remain resistant even in the quantum era. As quantum computing advances, the urgency to transition to quantum-safe cryptographic standards grows. This presentation will provide a clear overview of PQC, its foundational principles, and the current landscape of standardization efforts led by organizations like NIST. We will then explore the challenges and strategies involved in migrating existing systems to PQC, including hybrid approachesrisk assessments, and implementation timelines. Attendees will gain insight into how to prepare their infrastructure for a quantum-resilient future.

Sarah Ampe
Sarah Ampe - Manager Digital Risk

Comparison between QKD solutions and quantum-safe alternatives

Jean Lienardy (ERM)

Auditorium

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against the potential threats posed by quantum computers. Unlike traditional systems based on RSA or ECC, which rely on mathematical problems that quantum algorithms can solve efficiently, PQC is built on hard problems that remain resistant even in the quantum era. As quantum computing advances, the urgency to transition to quantum-safe cryptographic standards grows. This presentation will provide a clear overview of PQC, its foundational principles, and the current landscape of standardization efforts led by organizations like NIST. We will then explore the challenges and strategies involved in migrating existing systems to PQC, including hybrid approachesrisk assessments, and implementation timelines. Attendees will gain insight into how to prepare their infrastructure for a quantum-resilient future.

Sarah Ampe
Jean Lienardy - ERM

Panel discussion

Yvan De Mesmaeker (Infras critiques), Joachim Vererfven (Proximus), Francesco Vedovato (University of Padova & ThinkQuantum s.r.l.) & Olivier Croix (Thales Be)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Yvan De Mesmaeker - Infras critiques
Joachim Vererfven - Proximus
Francesco Vedovato - Cyberwal in Galaxia Academy 2025
Francesco Vedovato - Assistant Professor @ Department of Information Engineering & Co-founder and product developer
Olivier Croix - Thales Be

Closing session

Jonathan Pisane (Thales)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pisane Jonathan
Jonathan Pisane - Innovation & Product Policy Manager

Visit of Quantum lab

Antoine Dierick (Thales)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Coffee break

Homomorphic ciphering: academical approach

Xavier Lessage (Cetic)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Homomorphic ciphering: industrial approach

Mohamed Boukhebouze (Earth Lab Luxembourg)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Ending session

Jonathan Pisane and Philippe Massonet

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Cyber protection in practise

This conference day spotlights cybersecurity in action. From threat monitoring, incident management, and workforce training to data securitization, ethical hacking, and the protection of national assets, the focus is on how organizations execute security in practice. We explore Europe’s evolving digital identity under eIDAS II and close with insights on sovereign cloud solutions in Belgium and Luxembourg—where sensitive data meets trusted AI.

Welcome & Registration

Protecting systems by anticipation - ISAC operations

Alexandre Dulaunoy (CIRCL)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

A-Dulaunoy
Alexandre Dulaunoy - Head of CIRCL

Increase resilience by training and deep rehearsal of cyber crises

Vincent Defrenne (NVISO)

Auditorium

What makes the difference between days and weeks of recovery time? Beyond the obvious controls, there is the quality of the response: being prepared; understanding roles, responsibilities and communication flows in the context of a crisis; having plans that not only exist, but are also usable. But beyond plans, there is experience. We will discuss how you build experience without going through the trauma of a cyber attack, through exercises. How you build knowledge of the plans, an intuition of how an incident unravels, what sort of questions you will need to solve, so that you have structure and peace of mind when disaster hits. We’ll discuss how to organize exercises to train your teams, key success criteria, typical scenarios and concrete tips & tricks to run cyber exercises that makes your organization better prepared.

Vincent Defrenne
Vincent Defrenne - Partner Cyber Strategy & Architecture

Ethical Hacking or how to stress test your cyber safety

Clément Laurens (CRESCO)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Clément Laurens - Co-founder

Lunch

Safeguarding national data for better & safely exploiting it

Bert Verdonck (LNDS)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Bert Verdonck
Bert Verdonck - CEO

Managing European digital identity and related attributes under eIDAS2

Thomas Kopp (LuxTrust)

Auditorium

The presentation focuses on the management of identities and trust services under the European eIDAS Regulation in order to enable digital services and to protect users against fraud. It particularly comprises new trust services and aspects originating from the 2024 amendment of the eIDAS Regulation. The speech also highlights compliance obligations from the perspective of a European Qualified Trust Service Provider and specific security measures and provisions put in place by LuxTrust based on its more than 20 year experience in the cybersecurity domain.

Thomas Kopp - Chief Scientist

Use AI on sensitive data through disconnected sovereign cloud

Pascal Rogiest (Clarence)

Auditorium

As AI becomes central to data-driven innovation, organizations face a paradox: how to harness its power while protecting their most sensitive information. Disconnected sovereign clouds offer a unique answer — enabling secure AI processing within fully isolated, jurisdiction-controlled environments. This talk will explore how such infrastructures reconcile data sovereignty, compliance, and operational efficiency without compromising performance. Real-world examples from Clarence, Luxembourg’s operational disconnected sovereign cloud, will illustrate concrete use cases and governance models. Participants will leave with a clear view of how to deploy AI responsibly, even on the most sensitive datasets.

Pascal-lux
Pascal Rogiest - General Manager

Training and Cyber Range

In the current European context of digital sovereignty and the implementation of NIS2, cyber ranges are emerging as strategic infrastructures — with Belgium playing a key role. Beyond training, they offer a shared, realistic, and interoperable environment to test and validate technologies, procedures, and IT/OT integrations, while leveraging digital twins to accelerate innovation and compliance (Cyber Resilience Act). This day will be dedicated to exploring cyber ranges and their applications — training, testing, and digital twins — with partners from across the European Union.

Welcome & Registration

Distribution of color-coded badges indicating group and demo order.

The role of cyber ranges in training, testing/validation, and digital twins in the context of NIS2 and CRA

Matteo Merialdo (Nexova)

Auditorium

In a Europe pursuing digital sovereignty and implementing the NIS2 Directive and the Cyber Resilience Act, cyber ranges are moving from “training tools” to national-level strategic infrastructure. This session shows how modern cyber range technology is helping lead that shift. Drawing on real projects in Security Operations Centre operations, critical infrastructures (IT/OT) protection, and space systems, Matteo will illustrate how cyber ranges and digital twins provide shared, realistic, and interoperable environments to train teams, test and validate technologies and procedures, rehearse incident response, and accelerate compliance-by-design.

Matteo-Merialdo-Program
Matteo Merialdo - Cybersecurity Principal

Break & Group Formation

Demo Rotations

Cristel Pelsser , Multitel and Siris

Auditorium

Demo 1 – Cyber Range :

Demonstration of the cyber range and scenarios

Cristel Pelsser
Cristel Pelsser - Professor

Demo 2 – Quantum Lab

Discovering use cases for securing communications

Multitel

Demo 3 – ICS/OT Railway – Robotic Train

Presentation of a digital twin and incident/operations scenarios, with analysis of impacts and potential responses. Each group will rotate through all the demos based on their badge color.

Siris

Technical Break & Room Reset

Cyber Range Group Exercise (IDELUX and NEXOVA)

Auditorium

Participants will follow a simple, guided scenario showcasing the versatility of cyber ranges in decision-making, coordination, and real-time defense.

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Roundtable & Q&A

Auditorium

Lessons learned, interoperability, and practical applications (training, testing, digital twinning)

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Closing

Auditorium

Light refreshments, wrap-up, and next steps.

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Our Program for the 5 days

Over the course of five days, participants will benefit from a balanced mix of theoretical insights and practical training sessions, designed to combine knowledge acquisition with hands-on experience.

To encourage networking and informal exchanges, morning and afternoon breaks are scheduled each day, providing the opportunity to connect with peers, speakers, and experts.

The program still holds exciting surprises in store for you. Stay tuned further details about the program will be available soon.

Previous editions

2024 Cyberwal in Galaxia Program

December 2nd6th, 2024

2023 Cyberwal in Galaxia Program

December 4th8th, 2023

2022 Cyberwal in Galaxia Program

December 12th16th, 2022

2023 Cyberwal in Galaxia Program

0408 December 2023 

2022 Cyberwal in Galaxia Program

1216 December 2022 

Gallery

Register now!

2025 Cyberwal in Galaxia Academy . .. ...

Days
Hours
Minutes
Days
Hours
Minutes

Sarah Ampe

Manager Digital Risk

Sarah has built an expertise in cryptography and public key infrastructure (PKI) through numerous projects focused on secure digital identity, certificate lifecycle management, and cryptographic modernization across both public and private sectors. She is actively involved in post-quantum cryptography (PQC) readiness initiatives. Sarah also leads the Quantum Circle newsletter, a key communication channel that keeps stakeholders informed on the latest developments in quantum risk and cryptographic strategy.

Georges Ataya

Professor

Georges Ataya is Professor at the Solvay Brussels School of Economics and Management, where he teaches IT governance and cybersecurity governance and management. Recognized as a leading authority in digital strategyinformation security, and IT governance, he has become a key reference in Europe in these fields.

In 2002, he designed the body of knowledge that forms the basis of the international information security certification, now held by more than 70,000 professionals worldwide. He is also the author of the reference publications Board Briefing on IT Governance and Board Briefing on Cybersecurity Governance, developed in collaboration with the ISACA Research Foundation (USA).

He has held senior executive positions, including Global Head of IT for a major international group and General Manager of the EY Technology and Security Risk Services division at EY.

His expertise and leadership are internationally recognized. He has served as Vice President of ISACA Internationalco-founded the Belgian Cybersecurity Coalitionled European research projects on cyber maturity for governments and the defense sector, and is a member of the Federal Audit Committee attached to the Office of the Belgian Prime Minister. Georges Ataya is involved in three EU funded projects in the domain of Cybersecurity.

Mohamed Boukhebouze

AI Product Manager

Mohamed Boukhebouze is an AI Product Manager at EarthLab Luxembourg (https://www.earthlab.lu/), an innovation-driven company operating at the intersection of Earth Observation (EO) and Artificial Intelligence. With a background in data science, project management, and AI strategy, he leads the development of Max-ICS (https://www-max-ics.earthlab.lu/), a cutting-edge MLOps platform tailored to EO applications. Passionate about bridging technology and operational value, Mohamed has contributed to shaping EO data ecosystems across Europe by promoting sovereign, secure, and scalable AI solutions. He is involved in several European programs focused on digital sovereignty, EO digital twins, and AI-powered automation for sustainability and defense-related use cases.

Werner Coomans

Technology Advisor

Werner Coomans is a Technology Advisor at Nokia, advising senior corporate management on topics related to network infrastructure. Before that, he was the department head of Fixed Networks research at Nokia Bell Labs, which he joined as a researcher in 2013 after obtaining a Ph.D. degree in electrical engineering/photonics from the Vrije Universiteit Brussel. His activities in Bell Labs focused on next-generation copper-based and optical fixed network technologies. He was the recipient of the 2019 Edison Patent Award and is a Bell Labs Distinguished Member of Technical Staff.

Selim Chaabani

PhD Student

Born in 1999 in Liège, Selim Chaabani earned a bachelor’s degree in Engineering and a master’s in Aerospace Engineering from the University of Liège. His master’s thesis, carried out at the Centre Spatial de Liège (CSL) in collaboration with Multitel in Mons, explored the challenges of implementing Quantum Key Distribution (QKD) in space. In 2023, he began a PhD at CSL and Multitel, focusing on the development of single-photon sources for QKD. His research aims to advance secure quantum communication technologies, with a particular emphasis on their deployment in space.

Phédra Clouner

Deputy Director General

Phedra Clouner spend all her career in the public sector, and began her career as IT project manager. Then,  She specialised in enterprise content management and records management, becoming interested in information security, which naturally led her to cybersecurity.

Since its creation, 10 years ago, Phedra Clouner is the Deputy Director General of the Center for Cybersecurity Belgium (CCB), the national authority for cybersecurity, who oversees the definition and implementation of Belgium’s cybersecurity strategy and works to make the country one of the least cyber-vulnerable in Europe.

In addition to her work at CCB, she holds leadership roles in national and European cybersecurity initiatives, including serving as Vice Chair of the Belgian Cybersecurity Coalition, chair of the Advisory board of the Forum In Cyber,  and one of the founding member of Women4Cyber and Women4cyber Belgium.

Emmanuelle de Foy​

First Counsellor & Directorate General for Multilateral Issues

With a degree in Public and International Affairs (UCL) and International and European Law (VUB), Emmanuelle joined the Ministry for Foreign Affairs in November 2000. She has been posted in different regions. Her first posting was Kuala Lumpur, where she got acquainted with Asia, political and economical issues. She was involved in a Princes visit to Malaysia. Her second posting was Jerusalem. The issues were mainly political but also involved cooperation. Her third posting was in Mexico, where she dealt with political and economic issues but also academic and cultural topics. She was also involved in a Princes visit to Mexico. She was then assigned to Headquarters in Brussels where she followed UN issues (Security Council, UNESCO). She has been detached to a Deputy Prime Minister Office between 2012 and 2014. Her fourth posting was The Hague, where she dealt with bilateral (King’s visit) and European issues. Her fifth posting was Luxembourg, where she dealt with bilateral (King’s visit) and European issues. She was assigned to Headquarters again, in charge of cyber issues, since September 2022. Her mother tongue is French. She also speaks Dutch, English, Spanish and a fair German. She is married.

Yvan De Mesmaeker

Secretary General

ir. Yvan De Mesmaeker (M.Sc.Eng.) is Secretary General of the European Corporate
Security Association – ECSA and of ATHENA, the Alumni of the High Studies in
Security & Defense. Through his professional practice Omega Risk, he advises leading
corporations and institutions on Security, Resilience and Anticipation. He also directs
the High Studies in Police, Justice & Corporate Security and serves on boards
including the Royal Higher Institute for Defence – RHID and the Royal Institute for
International Relations – Egmont. With over 30 years of international experience, he has
worked extensively across Europe, the United States and Asia. His achievements in
corporate security and geopolitics have been recognized by HM the King of the Belgians,
who awarded him the honorary distinctions of ONicer in the Order of the Crown (2017)
and ONicer in the Order of Leopold (2023).

Vincent Defrenne

Partner Cyber Strategy & Architecture

Vincent is one of the founders of NVISO, one of Europe’s leading cyber security firms. He specializes into cyber strategy, and the last few years
has helped customers’ middle and top management to prepare or handle cyber incidents. His experience comes from the field, helping factories
or hospitals recover from cyber attacks, while helping executives of medium-size international businesses make threat-based choices for their
cyber plans. Vincent also initiated Belgium’s national student CTF, the Cyber Security Challenge Belgium, 10 years ago. He sits on the Resilience Board of Digital Europe, the European digital trade association, and speaks and writes frequently on the matters of cyber resilience
and cyber defense

Xavier Devroey

Professor of Software Engineering

Xavier Devroey is a professor of software engineering at the Namur Digital Institute (NADI) of the University of Namur in Belgium. He received his PhD from the University of Namur in 2017 and worked as a postdoctoral researcher at the TUDelft until 2021. The goal of his research is to ease software testing by exploring new paths to achieve a high level of automation for test case designgeneration, and prioritization. In 2022, Xavier co-founded the SNAIL lab (https://snail.info.unamur.be) with Prof. Benoît Vanderose to leverage contemporary development practices to enhance the dependability and robustness of software systems.

Laurens D'hooge

Postdoctoral researcher

Laurens D’hooge is a postdoctoral researcher with imec, working at the Internet and Data Science Lab (IDLab), located at Ghent University’s technology campus. He obtained his PhD in October 2023 on the discovery and characterization of flaws in machine-learned network intrusion detection systems and data sets. More broadly, his expertise is tied to all topics where data science intersects with cybersecurity. He is a staunch advocate for reliable, reproducible ML. On kaggle.com under the moniker dhoogla, he still actively contributes to improving academic security datasets.

Fatou Diao

Quantum Cybersecurity Researcher

Fatou Diao holds a Master’s degree in Cybersecurity and Cryptography from the University of Rennes 1 in France. She also earned two Bachelor’s degrees from Cheikh Anta Diop University in Dakar, one in Mathematics and one in Data Transmission and Information Security. She is currently working at Multitel as a Quantum Cybersecurity Researcher. Her work focuses on the development of a Quantum Key Distribution (QKD) demonstrator based on the BB84 protocol using attenuated lasers. The proposed configuration relies on a compact optical scheme for polarization encoding and decoding across all fibers, using LiNbO₃ phase modulators.

Alexandre Dulaunoy

Head of CIRCL

Alexandre Dulaunoy is the head of the Computer Incident Response Center Luxembourg (CIRCL). He is a leading figure in the cybersecurity community, known for his work in incident response and threat intelligence.

He is the driving force behind the open-source MISP Project (Malware Information Sharing Platform), a key initiative for cybersecurity collaboration globally. Dulaunoy is a respected researcher, a lecturer at the University of Luxembourg, and co-founder of the popular hack.lu security conference. His work focuses on developing open-source tools and sharing knowledge to help the community combat cyber threats effectively.

Maxime Gennart

Legal Advisor

Maxime is a legal advisor at the Litigation Chamber of the Belgian Data Protection Authority where he contributes to drafting binding decisions on complex data protection cases. He is also a member of the Authority’s AI Task Force for which he contributes to setting up the national AI governance framework. Moreover, he represents the DPA in European and international cross-sectoral discussions on privacy, data governance, artificial intelligence, and cybersecurity.  

Jeremy Grandclaudon

Senior Cybersecurity Expert for Agency for Digital

Jeremy Grandclaudon is a senior cybersecurity expert for Agency for Digital (ADN). He has held various positions (project manager, program manager, incident manager, etc.) in cybersecurity since 2010. Having started out in the private sector, notably in banking at ING but also for various consulting firms, he then turned to research. Among other things, he contributed to the European SPARTA project for the implementation of NCCs and certification schemes. He is now responsible for the cybersecurity strategy of the Walloon Region (Digital Wallonia).

Vassili Joannidès de Lautour

Consultant in AI for education and affiliate professor

Dr. Vassili Joannidès de Lautour holds a PhD in management from Université Paris Dauphine and Manchester Business School. He is an alum from Ecole Normale Supérieure and Sciences-Po. Since 2004, he has been interested in security, developing and teaching one of the first Internet economics courses 20 years ago where he identified the weaknesses of next economy’s business models. He has worked as a professor at Grenoble École de Management, Queensland University of Technology in Australia, the University of Parma and as a visiting professor and guest lecturer at Columbia University. Since 2023, he has introduced AI into his teaching as a reflexive tool for his students. Concurrently, he has developed an expertise as a cognitive architect and senior prompt engineer and brought this into the development of AI-powered tools for education. In parallel, he has been approached by the French Airforce to serve as a reserve officer in the Cybersecurity unit (ERCY). He embraces a holistic and no-technical approach to AI-related matters: linguistics, humanities, geopolitics.

Thomas Kopp

Chief Scientist

Thomas Kopp is the Chief Scientist at LuxTrust, a leading European provider of trust services and digital identity solutions. He specializes in cryptography, secure electronic signatures, and the development of open standards for digital trust.

In his role, he leads the research and development of cutting-edge security solutions to ensure the integrity and authenticity of digital transactions. His work is crucial for maintaining the trustworthiness of services like e-signatures and digital identities, and he is known for his contributions to the OASIS community, where he has helped develop key protocols for qualified electronic signatures. His expertise ensures that LuxTrust remains at the forefront of digital trust innovation.

Clément Laurens

Co-founder

Clément Laurens is the co-founder of CRESCO, a cybersecurity company based in Belgium. He is a specialist in penetration testing, security auditing, and offensive security, helping organizations identify and fix vulnerabilities before they can be exploited by malicious actors.

With a background in information technology, Clément Laurens co-founded CRESCO to provide high-end cybersecurity services. He is known for his technical expertise and for his deep understanding of the tactics and tools used by cybercriminals. He works with a variety of clients to enhance their security posture and build resilient defense strategies. His career is dedicated to ethical hacking and helping businesses navigate the complex and evolving threat landscape.

Xavier Lessage

An expert research engineer in the Data Science department

Xavier Lessage is a computer and management engineer and holds a PhD in Applied Sciences (IA & Cybersecurity) from the Faculty of Engineering at UMONS. He has built a career that bridges academia, consulting, and technological innovation, combining expertise in systems and network architecture, digital engineering and artificial intelligence. His areas of specialization include AI, cloud computing, and cybersecurity, with a strong focus on their real-world applications in healthcare.
 
His research is dedicated to leveraging artificial intelligence to improve clinical decision-making, while ensuring data protection, privacy preservation, and ethical compliance. Xavier has led collaborative projects in breast imaging and cardiology, working closely with medical experts to develop AI-based tools tailored to clinical needs.
 
In his most recent work, Xavier focuses on FLHEknowledge distillation and frugal AI, applied specifically to the health sector. These projects aim to create secure, efficient, and privacy-preserving AI solutions for medical data analysis, advancing the effectiveness of AI in clinical practice.
 
He is also the author of Artificial Intelligence Applied to Medical Imaging (UMONS University Press), to be released in November, which explores AI support in medical imaging, with a focus on privacy-preserving approaches including HE.

Christian Mack​

COO

Christian Mack is co-founder and COO of Guardis SRL, a Belgian company specialized in cybersecurity, DevSecOps, infrastructure and multicloud environments. Since the company’s inception, he has overseen security solution deployment, project management and assessments, Guardis’s historical core business. He actively contributed to the design and launch of ComodIT, a SaaS orchestration platform.
Christian coordinated the CYRUS research project (2021–2023), dedicated to automating security testing for cyber-physical systems with partners such as ALSTOM, AISIN, and UCLouvain. He is now involved in the defense-focused CRESCENDO project (2023–2025), where he works with CETIC on industrializing CYRUS outcomes into a portable operational platform.
Certified NIS2 Lead Implementer, CISM, and STIL, Christian is recognized for combining strategic vision and operational expertise, delivering effective solutions for both SMEs and large organizations under strict compliance and resilience requirements.

Philippe Massonet

Scientific Coordinator

Philippe Massonet is scientific coordinator at CETIC, a Belgian ICT applied research center. His research interest cover the areas of software, service and security engineering, as well as the applicaiotn of artificial intelligence to these areas. He was coordinator of the GridTrust IST European project (Strep) dealing with trust and security in next generation grids, and is responsible for dissemination and security in the RESERVOIR IST European project (Integrated project) led by IBM research. He was also the coordinator of the PONTE eHealth project that looked into using semantic web technologies to build decision support systems for the design clinical trials.  He has experience in the prototyping and commercial development of advanced requirements engineering tools. Previously he was manager of the requirements engineering team at CETIC. He has experience in the management of international R&D projects (Eurescom MESSAGE, IST FP6 GridTrust, and FP7 PONTE) and is or has been involved in several IST FP6/FP7/H2020/HEU research projects (RESERVOIR, HPC4U, AssessGrid, CoreGrid, GridTrust, Oldes, …).

Matteo Merialdo

Cybersecurity Principal

Matteo Merialdo is Cybersecurity Principal for the Nexova | Starion Group, bringing more than 23 years of experience in telecommunication, systems engineering and cyber security. During his career, Matteo lead very large, multidisciplinary teams of security engineers and researchers covering many security domains, with a specific focus on the application of cyber security to the space sector. Matteo heads the group that conceived and built CITEF, Nexova’s cyber-range and digital-twin platform, and has been at the forefront of the cyber-range ecosystem since 2014, driving the design of multiple solutions and co-authoring numerous peer-reviewed papers.

A recognised technical leader in European cybersecurity, Matteo has steered flagship initiatives such as the H2020 ECHO and the EDF ACTING projects, guiding their vision and execution.

Furthermore, Matteo is expert in space-sector security, having overseen and delivered several technologies for European Space Agency programmes, including the Agency’s Space Cyber Centre of Excellence.

Burcu Özkaptan

Head of Telecommunication and Navigation

Burcu Özkaptan is an electrical and electronics engineer, specializing in RF Design engineering, control systems theory, and machine learning. She earned her engineering degree from Bilkent University, Ankara/Türkiye in 2004. With a wealth of experience in different industries, including defence, maritime, and aerospace, Burcu has held roles as modelling and simulation engineer, RF system design engineer, project manager, and most recently, a machine learning engineer. Currently, Burcu is working as a Systems Engineer, Machine Learning Engineer, and Project Manager at Telespazio Belgium where she is an integral part of a dynamic team working on the development of a hybrid PNT receiver. This innovative device combines GNSS technology with LTE/5G sensors, paving the way for cutting-edge advancements in the field.

Cristel Pelsser

Professor

Cristel Pelsser holds a chair in critical embedded systems at UCLouvain. From 2015 to 2022 she was a full professor at the University of Strasbourg (France) where she led a team of researchers focusing on core Internet technologies.
She spent nine years as a researcher working for ISPs in Japan. Her aim is to facilitate network operations, to avoid network disruptions and, when they occur, pinpoint the failures precisely in order to quickly fix the issues, understand them in order to design solutions to prevent recurrence.

Her research spans multiple areas including BGP security and routing protocols, Internet measurement infrastructure, machine learning for network anomaly detection, and critical embedded systems for IoT applications. She actively contributes to developing next-generation tools for Internet monitoring, including advanced BGP data collection platforms and systems for detecting routing attacks.

Cristel received the PhD degree from the Université catholique de Louvain (UCLouvain), Belgium.

Jonathan Pisane

Innovation & Product Policy Manager

Jonathan Pisane received his M.Sc. degree in electrical engineering from the University of Liège (ULg), Belgium, in 2008. He holds a joint Ph.D. degree in electrical engineering from ULg and Supélec, France, in 2013. His Ph.D. degree dealt with the classification of air targets using passive BS radar signals and was funded by a Belgian Fonds de la Recherche Scientifique-Fonds pour la Formation à la Recherche dans l’Industrie et dans l’Agriculture scholarship (FRIA). He then joined the Temasek Laboratories of the Nanyang Technological University (NTU) of Singapore as research scientist. His research work focused on ATR using multistatic, low-frequency radar signals. Since 2024, Jonathan joined several companies as product and innovation manager in the field of critical communications, mobility, and Defense. He now acts as innovation and product policy manager for Thales Belgium, focusing on the development of new capabilities and their integration into future products. As such, he is member of various working groups focusing on the various domains of Defense, sensing, cybersecurity, and AI, and is deeply involved in the corresponding R&D ecosystems.  

Giulia Rinaldi

Cyber Data Engineer Part of the Innovation & Product Policy Secure Communication and Information Systems Thales Belgium

Giulia Rinaldi was born in Rome, Italy, and earned a Bachelor’s degree in Software Engineering and a Master’s in Data Science from La Sapienza University. She later moved to Belgium, where she completed her PhD at KU Leuven in June 2025. During her academic journey, she worked as a teaching assistant and master’s thesis supervisor. With experience as a data scientist, she now works as a Cyber Data Engineer at Thales, where she merges her passions for AI and cybersecurity to develop innovative solutions for protecting critical infrastructure.

Patrick Renaux

Senior Cybersecurity Architect

I have received my engineering degree in optronics in 1998.

After spending one year in Antarctica operating a LIDAR experiment to measure the ozone layer,  I started my carrier in Alcatel developing Passive optical networks.

A few years later I operated a strategic move towards Thales Alenia Space to perform dependability engineering on various space programs,  including Galileo.  Adding wings to my carrier I worked 13 years at Pilatus aircraft developing air to ground connectivity solutions and performing Cybersecurity analyses aiming at aircraft certification.  Since 2023 I am working with Starion defining the security architecture of INT-UQKD framework and assessing its resilience against a quite hostile environment….

Pascal Rogiest

General Manager

Pascal Rogiest is the General Manager of Clarence, a joint venture between LuxConnect and Proximus Luxembourg that provides a disconnected sovereign cloud solution. He is an expert in digital trust, data sovereignty, and cloud infrastructure.

With a Ph.D. in electromechanical aerospace engineering, his career has spanned various leadership roles, including former CEO of LuxTrust and Vice President at satellite operator SES. At Clarence, he is focused on delivering highly secure and autonomous cloud services, particularly for government and regulated organizations, to meet the growing demand for data sovereignty in Europe.

Merlijn Sebrechts

Senior Researcher

Dr. ing. Merlijn Sebrechts is a senior researcher at imec and teaches at Ghent University in Belgium. He leads a number of research tracks focused on secure and robust systems in the cloud and on devices. He is currently serving on the Ubuntu Community Council and is standardizing WebAssembly System Interfaces for IoT devices as part of the W3C and the Bytecode Alliance. He teaches topics such as Distributed Systems Design, Open Source ecosystems and Computer Security. His work has been published in over 20 scientific publications and has received four awards.

Nicolas Sournac

AI Research Engineer

Nicolas Sournac holds a B.S. in Computer Science and an M.S. in Artificial Intelligence and Data Analytics from the University of Mons. He is currently a Researcher in Artificial Intelligence at Multitel, where his work focuses on Trustworthy AI. His research interests include adversarial machine and deep learning, with a particular emphasis on adversarial attacks and the formal verification of AI systems. He is currently dedicated to advancing adversarial training methods to strengthen the robustness, safety, and reliability of deep networks deployed in critical systems.

Pascal Steichen

CEO

Founder and CEO of the Luxembourg House of Cybersecurity. Since 20 years, Pascal is involved in the main cybersecurity initiatives of the Luxembourg Government, CYBERSECURITY Luxembourg, the national platform to foster and empower the Luxembourg Ecosystem in the field of cybersecurity, being his latest achievement. Laureate of the Information Security Personality of the Year award in 2017, Pascal Steichen has dedicated his professional career to cybersecurity. In 2022 he was elected as the first chairman of the ECCC (European Cybersecurity Competence Centre).

Pascal holds a master degree in astrophysics and, in parallel of starting his career as a software engineer, he graduated in applied information technology.

In 2002 he joined the Luxembourg Government, as advisor and project manager in the area of network and information security for the Ministry of the Economy. Where he participated in the creation of LuxTrust (www.luxtrust.com), CASES (www.cases.lu) and CIRCL (www.circl.lu) as part of his activities.

From 2003 to 2014, he was representing Luxembourg as an alternate member of the management board of ENISA.

In 2017, Pascal lead and contributed to the creation of the Cybersecurity Competence Center a unique facility to strengthen the resilience of the Luxembourg economy by helping organisations to test and improve their cybersecurity competence, which evolved into the National Cybersecurity Competence Center (NC3 – www.nc3.lu).

Building on his huge experience in cybersecurity, today, Pascal is involved in key communities in Luxembourg and Europe. Member of the Luxembourg Cybersecurity Board, lecturer in information security at the University of Luxembourg, member of WomenCyberForce, and involved in the curricular board of the BTS cybersecurity.

At an international level, Pascal was involved in the founding of ECSO, was part of the 2021 judging panel of the IFSEC Global Influencers in Security and Fire Award, and was active of the European Advisory Board of the Forum InCyber, since 2020. In 2022 Pascal, represents Luxembourg in the Governing Board of the ECCC, where he was elected as its first Chairperson.

Francesco Vedovato

Assistant Professor @ Department of Information Engineering, University of Padova and Co-founder and product developer @ ThinkQuantum s.r.l.

Francesco Vedovato got his MSc in Physics in 2015 and a Ph.D. degree in Space Science and Technology at the University of Padova in 2019. During his PhD, he focused on the realization of quantum communication experiments in Space collaborating with the Matera Laser Ranging Observatory of the Italian Space Agency. His expertise is quantum communication over free-space and satellite channels, including Adaptive Optics technology. He has various peer- review publications in international journals in experimental quantum communication and quantum key distribution. He is fixed-term Assistant Professor at the Department of Information Engineering of the University of Padova. He is co-founder of ThinkQuantum, a SME commercializing QKD systems, and serves as product developer for free-space-optical quantum communication systems.

Bert Verdonck

CEO

Bert Verdonck is the CEO of the Luxembourg National Data Service (LNDS), a governmental organization focused on building secure data spaces for the public sector. He leads the development of governance structures and technical frameworks to facilitate data sharing and re-use.

His career is distinguished by his work in healthcare informatics and data management, with over 26 years at Philips where he focused on health data sharing and AI strategy. Verdonck holds a PhD in medical image processing and is an expert in the adoption of the Gaia-X framework, a European initiative for sovereign data infrastructure. His work is crucial for enabling a data-driven economy and accelerating economic and societal transitions through responsible use of data.

Martin Vivian

Research Assistant

Martin Vivian is a researcher in cybersecurity at the Université catholique de Louvain (UCLouvain), Belgium, where he is currently pursuing a doctoral degree.
He obtained his Bachelor’s and Master’s degrees in Computer Science from the same university.

His research focuses on protocol fuzzing, particularly on the development of new fuzzing techniques for communication protocols. He initially explored the fuzzing of a proprietary drone protocol before extending his work to methods applicable to routing protocols.

Institutional day

The opening day of the Cyberwal in Galaxia Academy aims to provide a comprehensive and structured panorama of cybersecurity, combining institutional, organizational, European, international, and strategic perspectives. Each contribution will follow a common thread: understanding how cybersecurity, beyond its technical dimension, has become a central issue of governance, sovereignty, and resilience for our societies.

Cybersecurity can no longer be regarded as an isolated field. It now permeates organizational governance, national regulation, European cooperation, international competition, the protection of fundamental rights, and global security.

Starting from regional challenges and extending to national and European perspectives, participants will discover how leading institutions are defining priorities, shaping skills, and establishing the frameworks needed to strengthen collective resilience. Through these complementary perspectives, the opening day will highlight both the challenges to be addressed and the solutions already underway, while outlining the path toward a shared maturity that is essential for building a stronger cybersecurity ecosystem, better prepared to face tomorrow’s threats.

Welcome & Registration

Opening ceremony

Pascal Steichen (Luxembourg House of Cybersecurity)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pascal Steichen
Pascal Steichen - CEO
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Luxembourg Cybersecurity Factory

Pascal Steichen (Luxembourg House of Cybersecurity)

Auditorium

The Luxembourg Cybersecurity Factory (LCF) is set to become a groundbreaking hub for collaboration, enabling the seamless collection, analysis, and sharing of critical cybersecurity data—from threat intelligence and vulnerabilities to the effectiveness of protective measures. Designed as an open cybersecurity data space, the LCF will integrate advanced data tools, a dedicated Open Source Program Office (OSPO), and robust governance frameworks to strengthen risk mitigation across sectors.

This initiative will empower organisations, especially SMEs, to develop innovative, autonomous cybersecurity solutions, fostering a vibrant ecosystem of data, tools, and real-world applications. In a second phase, the LCF will expand its partnership with the Luxembourg AI Factory (L-AIF), integrating AI capabilities to further enhance its impact.

By attracting cybersecurity data providers to contribute their datasets and supporting data curation for AI applications, Luxembourg aims to position the LCF as a global leader in open-source-driven cybersecurity innovation.

This initiative will empower organisations, especially SMEs, to develop innovative, autonomous cybersecurity solutions, fostering a vibrant ecosystem of data, tools, and real-world applications. In a second phase, the LCF will expand its partnership with the Luxembourg AI Factory (L-AIF), integrating AI capabilities to further enhance its impact.

By attracting cybersecurity data providers to contribute their datasets and supporting data curation for AI applications, Luxembourg aims to position the LCF as a global leader in open-source-driven cybersecurity innovation.

Pascal Steichen
Pascal Steichen - CEO

Coffee break

What is the current situation on implementing (international) rules in the cyberspace

Emmanuelle de Foy (Federal Public Service (FPS) Foreign Affairs Unit M4 Global Governance)

Auditorium

We are familiar with the off-line world, our material world, managed by rules and laws. When it comes to the online world (and more and more parts of our lifes go online, work, leisure, information, orders, bookings…), who are the actors and how are they behaving ? What is important or crucial ? What is allowed or not allowed ? How can you react ? These issues have been discussed in the United Nations since 1998. The presentation will deal with 2 sets of negotiations that are actually typifying the state of the world. The negotiations on a international framework on ICT will show the rivalry between democracies and autocracies and the weight of the Global South. The second negotiation will show even more precisely the rivalry about the conceptions of the applicable law and the values such as the protection of human rights). The presentation will quickly deal with other lines of efforts at the level of the European Union, the OSCE and the NATO.

Emmanuelle de Foy
Emmanuelle de Foy - First Counsellor & Directorate General for Multilateral Issues

How to improve cybersecurity ? The Belgian approach!

Phedra Clouner (Centre for Cybersecurity Belgium)

Auditorium

During her presentation, Phédra Clouner will discuss how Belgium has implemented initiatives to make the country one of the least cyber-vulnerable countries in Europe.

She will review the role played by the national cyber security agency, the CCB, in the Belgian landscape.

She will discuss the types of threats facing the country and how these threats have evolved in line with changes in the geopolitical context and the emergence of new technologies.

She will then detail the actions put in place to counter these threats for different target audiences, as well as the governance that supports them, specifying concepts and their implementation, such as Active Cyber Protection, Cyberfundamentals, spearwarning, the involvement of the population in its own protection, etc.

She will also discuss how the various European regulations have been implemented by the CCB.

Phédra Clouner
Phedra Clouner - Deputy Director General

The Digital Wallonia cybersecurity strategy: achievements and next steps

Jeremy Grandclaudon (ADN)

Auditorium

The Walloon Region’s Digital Wallonia strategy is the cornerstone of its digital transformation, aiming to foster innovation, economic growth, and societal resilience through technology. Within this framework, cybersecurity is a major pillar, ensuring trust and security across all digital initiatives. Our cybersecurity projects drive this ambition by supporting SMEs, strengthening private and public infrastructures, and aligning with European directives such as NIS2 or CRA . Its approach combines awareness campaigns, skills development, and practical tools

Jeremy-Grandclaudon-program
Jeremy Grandclaudon - Senior Cybersecurity Expert for Agency for Digital

Lunch

NIS2, Who must act to ensure cybersecurity protections?

Georges Ataya (Solvay Brussels School of Economics and Management)

Auditorium

The rapid evolution of digital threats highlights the persistent weaknesses of many companies, often unprepared to meet the requirements of the NIS2 directive. This new regulation directly engages business leaders, who must integrate cybersecurity into their governance. It also opens new opportunities for experts and students, whose skills are now essential to digital resilience. Finally, it mobilizes digital managers and entrepreneurs as key drivers of lasting change toward a shared culture of security.

Georges Ataya - Cyberwal in Galaxia Academy 2025
Georges Ataya - Professor

Security and Compliance: Cybersecurity at the Heart of the Right to Data Protection

Maxime Gennart (Belgian Data Protection Authority)

Auditorium

Security is not a mere technical requirement; it is an essential component of responsibility and trust in digital environments.

The fundamental right personal data protection and cybersecurity are two sides of the same coin.

As the authority supervising and enforcing this right, the Data Protection Authority (DPA) plays a central role in promoting safe digital environments.

This presentation will first explore the DPA’s role in cybersecurity. It will then address the obligations arising from the principle of data confidentiality and security (Article 32 of the GDPR), as well as those linked to data protection by design and by default (Article 25).

These concepts will be illustrated with concrete examples drawn from use cases, demonstrating how these legal principles are translated into effective security practices.

Maxime Gennart
Maxime Gennart - Legal Advisor

Coffee break

How Cyber Security fits into Global Corporate Security

Yvan De Mesmaeker (European Corporate Security Association – ECSA )

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Yvan De Mesmaeker - Secretary General

How Cyber Security fits into Global Corporate Security

Général Pierre Ciparisse

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Général Pierre Ciparisse - Cyber Command

Q&A

Général Pierre Ciparisse

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Général Pierre Ciparisse - Cyber Command

Cyber & AI Day

This day of the Cyberwal in Galaxia Academy explores the latest advancements in artificial intelligence (AI) as applied to cybersecurity and secure communications.

The day begins with an introduction to AI’s role in these critical fields, followed by presentations on innovative projects such as AIDE. Then, a session will explore how different types of AI technologies can be used to automatically generate cybersecurity functional and penetration tests, for both black box and white bow testing.

The agenda includes discussions on securing radio frequency (R/F) communications, protecting machine learning models for unmanned vehicles, and the latest developments in homomorphic encryption. Leading experts from institutions and companies—including UCLouvain, UNamur, Cetic, Multitel, imec/IDLab, Thales and Telespazio, will share their expertise and solutions.

The program also features sessions on explainable and trustworthy AI, as well as networking opportunities to encourage collaboration. The event aims to provide a holistic view of the opportunities and challenges in leveraging AI for modern cybersecurity, fostering innovation and knowledge exchange.

Welcome & Registration

Introduction to the 'AI day’

Jonathan Pisane (Thales Belgium) and Philippe Massonet (CETIC)

Auditorium

The introduction to the AI day will, afetr a brief introduction to the topic of AI for Cybersecurity, explain the objectives of the day, introduce the program and the speakers of the day. 

Pisane Jonathan
Jonathan Pisane - Innovation & Product Policy Manager
Philippe Massonet - Scientific Coordinator

Overview of the use of AI in cyber

Laurens D’Hooge (IDLab-imec)

Auditorium

Dr. D’hooge’s presentation will be divided in two parts: a plunge into the current research landscape where AI is applied to cybersecurity and an overview of the AIDE project which aims at a platform for secure, federated machine learning.
The first part will cover the state-of-the-art in topics such as network intrusion detection and malware detection as well as a host of other topics where machine learning (ML) is being leveraged to solve cybersecurity issues. The talk will include guidelines on solid ML experiment design and evaluation to reach more reliable and reproducible results with a key focus on the importance of model generalization.

Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

Presentation of the AIDE project

Laurens D’Hooge (IDLab-imec)

Auditorium

The second part will dive deep into imec’s role as integrator for the AIDE project, financed by FOD Bosa to research and develop secure infrastructure in academia for Belgian companies to jointly train and evaluate machine learning models without sharing data in a federated manner.

Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

AI-powered tools and cybersecurity: the role of prompting

Vassili Joannidès de Lautour (Parma University)

Auditorium

With the development of LLMs, generative AI has been democratised, making prompting the new must-have skill. According to an OpenAI study, 80% or generative AI users believe they know how to prompt but do not. 15% can write decent, yet incomplete and insecure prompts whilst only 5% have a perfect command of prompting. This has caused the occurring of a number of loopholes for cybersecurity, some whereof are covered in this presentation. In the first place, It is no longer needed to have a good command of coding, prompting may suffice. Secured systems may be vulnerable to well-designed prompts, a new generation of hackers. Secondly, prompt amateurs may not be able to discern hallucination and other AI-generated creations whilst engineers would. Thirdly, AI-powered tools may be vulnerable if they are not secured through some basic tools (APIs, tokens, etc.) Fourthly, the prompt at the core of AI-powered tools may be vulnerable, if they are misconceived (loose instructions, no fallback mechanisms, no reflexivity, etc.) 

Vassili JDL - Program - Cyberwal in Galaxia Academy 2025
Vassili Joannidès de Lautour - Consultant in AI for education and affiliate professor

Coffee break

AI-powered tools and cybersecurity: tests generation

Xavier Devroey (Unamur), Martin Vivian (UCLouvain) and Guillaume Ginis (CETIC)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Automated test case generation using search algorithms
Automated test case generation is a powerful technique to improve software quality while reducing validation costs. This talk explores how search-based algorithms can be leveraged to generate effective test suites, drawing on insights from recent research. We begin by introducing the fundamentals of search-based testing, illustrated through tools like EvoSuite and Pynguin, which optimize coverage criteria to produce high-quality tests. We then show how these algorithms can be specialized to detect specific fault types, such as API misuse or integration errors between classes. These approaches combine static analysis with targeted search heuristics to narrow the test space to critical code regions, enhancing fault detection precision and efficiency. Finally, we discuss how search algorithms can be dynamically tuned to focus on particular scenarios, such as Python C-extensions or complex inter-class interactions in Java, opening new avenues for adaptive and context-aware test generation.
Xavier-Devroey-programme
Xavier Devroey - Professor of Software Engineering, NADI
Improving Protocols Fuzzing

For many proprietary systems source code and documentation are not available which makes them hard to test leaving only black-box approaches. In this work, we present an experience of fuzzing a protocol for drone control and the developed tool BinFuzz. BinFuzz is a man-in-the-middle stateful black-box protocol fuzzer. Listening to real communication as a man-in-the-middle, the fuzzer reconstructs states of the protocol as well as detects message types and their variable fields. The collected knowledge is used during the fuzzing to improve the quality of the generated inputs. For the application, we first test BinFuzz on an FTP protocol and then use it to fuzz the protocol for drone control.

Martin-Viviant
Martin Vivian
GuillaumeGinis
Guillaume Ginis

Automating Security Testing for Critical Systems: Insights from CYRUS & CRESCENDO

Christian Mack (Guardis SRL)

Auditorium

Cyber-physical systems in sectors such as defense, energy and transportation must operate under strict safety and availability constraints, while facing growing cyber-threats and regulatory pressure (NIS2, CRA, IEC 62443). Traditional security assessments are often too slow, costly and difficult to reproduce in these contexts.

This presentation introduces a risk-based, automated testing platform developed through the CYRUS (2021–2023) and CRESCENDO (2023–2025) projects. The approach integrates leading standards and frameworks (PTES, NIST SP 800-115, MITRE ATT&CK for ICS) to provide reusable workflows covering asset discovery, protocol fingerprinting (Modbus, CAN, BACnet) and controlled exploit validation. A proof-management process ensures full traceability and auditability.

Applied to representative critical infrastructures, the solution has demonstrated significant business and technical benefits. It reduces audit preparation time, accelerates re-testing cycles, and improves remediation prioritization. At the same time, it expands attack-surface coverage, strengthens vulnerability-to-asset correlation, and produces reproducible reports aligned with ISO/IEC 27001 and IEC 62443.

The talk will also highlight remaining challenges — support for proprietary protocols, SBOM/VEX integration, and enhanced incident-reporting workflows and discuss perspectives for industrial adoption.

Christian Mack
Christian Mack - COO

Lunch break

AI for secure R/F communications: industrial approach

Burcu Özkaptan (Telespazio)

Auditorium

Our project presents a prototype of a Positioning, Navigation, and Timing (PNT) user equipment that integrates 4G and GNSS technologies to deliver highly reliable navigation capabilities for safety-critical applications, even under hostile environmental conditions or signal interference. The hybrid system is designed to enhance the performance and resilience of autonomous vehicles, particularly in urban environments where GNSS reliability is compromised due to superstructures and 4G networks are dense, and in rural environments where the mobile networks are scarce. Key use cases include autonomous docking in ports and autonomous ground vehicles in airports, both of which demand high safety standards and benefit from mobile network deployments. Besides positioning hybridization of GNSS with 4G mobile networks, the prototype uses machine learning techniques on both spectra for interference detection and classification, and signal processing algorithms for interference mitigation and features intelligent sensor switching based on signal quality indicators. A machine learning-based system assesses signal integrity in the spectrum of interest and recommends optimal PNT sources, ensuring robust navigation outputs for vehicle systems. The solution is compact and suitable for integration into UAVs, supporting future applications in urban air mobility and infrastructure monitoring. The PNT solution is reliable, robust and secure in the presence of interferers, and it is suitable for safety critical applications even in case of hostile environment conditions or attacks on the GNSS or mobile bands.

burcu-program - Cyberwal in Galaxia Academy 2025
Burcu Özkaptan - Head of Telecommunication and Navigation

Explainable & Trustworthy AI

Lucas La Fisca (Umons/Trail/ARIAC), Giulia Rinaldi (Thales): Trustworthy AI & Nicolas Sournac (Multitel): Explicability of AI

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Xavier-Devroey-programme
Lucas La Fisca
Giulia Rinaldi
Securing AI Systems: Understanding and Mitigating Adversarial Attacks

As deep learning models are increasingly deployed in safety-critical applications, their vulnerability to adversarial attacks raises major concerns for system security. These attacks exploit the sensitivity of neural networks to input perturbations, leading to severe model failures. This presentation will introduce the fundamental principles behind adversarial example generation, detailing common threat models and attack algorithms. We will also examine their practical impact through illustrative cases in computer vision and natural language processing, highlighting the security implications for real-world AI systems. Finally, the talk will discuss current state-of-the-art defenses, including adversarial training and formal verification techniques.

Nicolas Sournac
Nicolas Sournac - AI Research Engineer

CONFIDENTIAL ML FOR UNMANNED VEHICLES (securing ML models from extraction)

Merlijn Sebrechts (imec/IDLab)

Auditorium

Machine learning models and other software on Unmanned Vehicles (UVs) are not safe. It’s often trivial for adversaries with physical access to extract the models on a device. This risks theft of intellectual property and can even help adversaries develop countermeasures to “fool” or hijack AI models. While confidential computing is a promising technology to protect data and models while they’re in use, the hardware in most UVs does not actually support modern confidential computing solutions. This talk will investigate the confidential computing solutions of commercial off-the-shelf hardware in UVs, show off a demo taking advantage of these features, and take a peek into the future of confidential computing for UVs.

merlijn-sebrechts
Merlijn Sebrechts - Senior Researcher

Coffee break

Secure Federated Learning with Model Compression, Knowledge Distillation and Fully Homomorphic Encryption

Xavier Lessage (Cetic)

Auditorium

Breast cancer remains a major health risk, especially when diagnosed late. The presentation explores innovative techniques to improve detection while keeping patient data secure. By using Federated Learning (FL), hospitals can collaborate without sharing sensitive data directly. To enhance both performance and security, we introduce a two-way knowledge distillation approach, called inverse distillation, where student and teacher models learn from each other. Combined with full homomorphic encryption (HE), this allows compact neural networks to be securely transmitted and trained across institutions. HE is a good countermeasure for several known threats to FL such as Privacy Inference / Data Reconstruction Attacks (Confidentiality), Collusion Attacks (Integrity & Confidentiality) or Tampering / Model Poisoning (When Integrated with Robustness).
 
Experiments with FL and HE on mammography images from a Belgian hospital show better accuracy in distinguishing malignant from benign tumors, while fully protecting patient data and leveraging frugal AI principles, opening new possibilities for secure, collaborative, and resource-efficient AI in healthcare.

XavierLessage-hr
Xavier Lessage - An expert research engineer in the Data Science department

Homomorphic ciphering: industrial approach

Mohamed Boukhebouze (Earth Lab Luxembourg)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Mohamed Boukhebouze
Mohamed Boukhebouze - AI Product Manager

Ending session

Jonathan Pisane (Thales Belgium) and Philippe Massonet (CETIC)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pisane Jonathan
Jonathan Pisane - Innovation & Product Policy Manager
Philippe Massonet - Scientific Coordinator

Quantum Technology and Cybersecurity

This session of the Cyber and Quantum Day program explores the transformative impact of quantum technologies on secure communications and their implications for cybersecurity.

The event will begin with a technical exploration of Quantum Key Distribution (QKD), providing attendees with a solid foundation for understanding its critical role in securing communications against quantum threats.

The agenda continues with presentations on the latest breakthroughs in QKD networks, highlighting both theoretical models and practical deployments. Experts will also explore the integration of QKD with Post-Quantum Cryptography (PQC), examining hybrid approaches to achieve robust and scalable quantum-safe solutions.

A panel discussion will convene leading voices from academia, industry, and critical infrastructure sectors to address the challenges and opportunities of building quantum-secure communications.

This exchange will consider technical, economic, and regulatory perspectives, with a focus on the concrete steps required to prepare for a quantum-resilient future. Finally, the day will conclude with an exclusive visit to the Gilles Brassard Quantum Cryptography Lab, an open research platform dedicated to advancing secure communications in the quantum era.

By bringing together experts from institutions and companies—including Università di Padova, Université de Liège, Multitel, Starion, and Thales—the event fosters collaboration, knowledge exchange, and innovation.

The Cyber and Quantum Day aims to provide a holistic view of the opportunities and challenges in leveraging quantum technologies to transform secure communications, paving the way toward a trusted digital future.

Welcome & Registration

Introduction to the 'quantum day'

Serge Habraken (CSL)

Auditorium

This presentation explores the fundamental concepts behind Quantum Key Distribution (QKD) and the challenges arising from its implementation in spatial contexts. The first part introduces the theoretical foundations of QKD, providing an overview of its operating principles. It covers key ideas such as the growing threat posed by quantum computers, the basics of modern cryptography, and the quantum mechanics principles relevant to QKD. The second part adopts a more technological perspective, presenting the hardware and systems required to exchange quantum keys and discussing several approaches to building these resources. Overall, this presentation aims to provide a clear introduction to QKD, accessible to an audience without prior background in the field.

Selim Chaabani
Serge Habraken - CSL

Technical introduction to QKD

Serge Habraken (CSL)

Auditorium

This presentation explores the fundamental concepts behind Quantum Key Distribution (QKD) and the challenges arising from its implementation in spatial contexts. The first part introduces the theoretical foundations of QKD, providing an overview of its operating principles. It covers key ideas such as the growing threat posed by quantum computers, the basics of modern cryptography, and the quantum mechanics principles relevant to QKD. The second part adopts a more technological perspective, presenting the hardware and systems required to exchange quantum keys and discussing several approaches to building these resources. Overall, this presentation aims to provide a clear introduction to QKD, accessible to an audience without prior background in the field.

Selim Chaabani
Serge Habraken - CSL

Coffee break

Space-based Quantum Key Distribution

Francesco Vedovato (University of Padova & ThinkQuantum s.r.l.)

Auditorium

The idea of exploiting satellites to realize a global Quantum Key Distribution (QKD) network took shape in the early 2000s. After the first pioneering demonstrations—showing the feasibility of different encodings over satellite-to-ground channels—the efforts of the Chinese Academy of Sciences culminated in multiple satellites in orbit and the successful realization of space-based QKD. In parallel, Europe—under the coordination of the European Space Agency (ESA)—has advanced mission studies and started several initiatives, including the Eagle-1 satellite and the SAGA constellation, planned for deployment in the coming years.
This talk will present a historical overview of the development of space-based QKD, as well as the goals and challenges of the upcoming ESA missions, and will benefit from the speaker’s direct involvement in R&D across academia and industry since 2015.

Francesco Vedovato - Cyberwal in Galaxia Academy 2025
Francesco Vedovato - Assistant Professor @ Department of Information Engineering & Co-founder and product developer

Thesis in QKD

Selim Chaabani (ULiege), Antoine Groulard (ULiege) & Fatou Diao (multitel)

Auditorium

The PhD thesis of Selim Chaabani focuses on the development of single-photon sources for quantum key distribution (QKD), a key technology for secure communications. This work explores both the theoretical and experimental aspects of designing reliable single-photon emitters, with a long-term vision towards applications in space-based quantum networks. The presentation will outline the main stages of the development of one of these sources — from theory to laboratory implementation — and will include some preliminary experimental results.

Selim Chaabani
Selim Chaabani - PhD Student
Antoine Groulard - ULiege
Fatou Diao
Fatou Diao - Quantum Cybersecurity Researcher

Spontaneous presentation of the public activities

Fatou Diao

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Fatou Diao

Lunch

INT-UQKD: challenges, achievements, and new goals

Patrick Renaux (Starion Luxembourg S.A (Starion Group))

Auditorium

INT-UQKD project started in September 2022, building and operating an interoperable terrestrial and space QKD network, capable of delivering a cost-efficient quantum-safe solution able to support multiple use cases.

In operating the terrestrial link since august 2023 Starion Luxembourg and its partners have gain practical experience paving the way to future development in Europe towards an agnostic quantum-safe service platform capable of operating across multiple QKD system solutions on a global scale.

Patrick Renaux
Patrick Renaux - Senior Cybersecurity Architect

Cybersecurity: the reverse side of the quantum-computing medal

Werner Coomans (Bell Labs DMTS, Nokia)

Auditorium

Quantum computers give rise to tremendous opportunities in terms of scientific discoveries, able to solve problems out of reach of even the most powerful classical supercomputers. However, there is also a downside: quantum computers will also be able to crack a large family of cryptographic algorithms, which today are used all over the internet. This talk will explain why the threat is already real today, and why it’s of paramount importance to start the migration to quantum-safe primitives as soon as possible. It will give an overview of the solution landscape with a focus on networking, introduce core concepts of the migration journey, and address the role of telecommunication networks in the largest cybersecurity migration in human history.

Werner Coomans_2025_small
Werner Coomans - Technology Advisor

Coffee break

Post-quantum cryptography: context and actions

Sarah Ampe (EY)

Auditorium

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against the potential threats posed by quantum computers. Unlike traditional systems based on RSA or ECC, which rely on mathematical problems that quantum algorithms can solve efficiently, PQC is built on hard problems that remain resistant even in the quantum era. As quantum computing advances, the urgency to transition to quantum-safe cryptographic standards grows. This presentation will provide a clear overview of PQC, its foundational principles, and the current landscape of standardization efforts led by organizations like NIST. We will then explore the challenges and strategies involved in migrating existing systems to PQC, including hybrid approachesrisk assessments, and implementation timelines. Attendees will gain insight into how to prepare their infrastructure for a quantum-resilient future.

Sarah Ampe
Sarah Ampe - Manager Digital Risk

Comparison between QKD solutions and quantum-safe alternatives

Jean Lienardy (ERM)

Auditorium

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against the potential threats posed by quantum computers. Unlike traditional systems based on RSA or ECC, which rely on mathematical problems that quantum algorithms can solve efficiently, PQC is built on hard problems that remain resistant even in the quantum era. As quantum computing advances, the urgency to transition to quantum-safe cryptographic standards grows. This presentation will provide a clear overview of PQC, its foundational principles, and the current landscape of standardization efforts led by organizations like NIST. We will then explore the challenges and strategies involved in migrating existing systems to PQC, including hybrid approachesrisk assessments, and implementation timelines. Attendees will gain insight into how to prepare their infrastructure for a quantum-resilient future.

Sarah Ampe
Jean Lienardy - ERM

Panel discussion

Yvan De Mesmaeker (Infras critiques), Joachim Vererfven (Proximus), Francesco Vedovato (University of Padova & ThinkQuantum s.r.l.) & Olivier Croix (Thales Be)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Yvan De Mesmaeker - Infras critiques
Joachim Vererfven - Proximus
Francesco Vedovato - Cyberwal in Galaxia Academy 2025
Francesco Vedovato - Assistant Professor @ Department of Information Engineering & Co-founder and product developer
Olivier Croix - Thales Be

Closing session

Jonathan Pisane (Thales)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pisane Jonathan
Jonathan Pisane - Innovation & Product Policy Manager

Visit of Quantum lab

Antoine Dierick (Thales)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Coffee break

Homomorphic ciphering: academical approach

Xavier Lessage (Cetic)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Homomorphic ciphering: industrial approach

Mohamed Boukhebouze (Earth Lab Luxembourg)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Ending session

Jonathan Pisane and Philippe Massonet

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Cyber protection in practise

This conference day spotlights cybersecurity in action. From threat monitoring, incident management, and workforce training to data securitization, ethical hacking, and the protection of national assets, the focus is on how organizations execute security in practice. We explore Europe’s evolving digital identity under eIDAS II and close with insights on sovereign cloud solutions in Belgium and Luxembourg—where sensitive data meets trusted AI.

Welcome & Registration

Protecting systems by anticipation - ISAC operations

Alexandre Dulaunoy (CIRCL)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

A-Dulaunoy
Alexandre Dulaunoy - Head of CIRCL

Increase resilience by training and deep rehearsal of cyber crises

Vincent Defrenne (NVISO)

Auditorium

What makes the difference between days and weeks of recovery time? Beyond the obvious controls, there is the quality of the response: being prepared; understanding roles, responsibilities and communication flows in the context of a crisis; having plans that not only exist, but are also usable. But beyond plans, there is experience. We will discuss how you build experience without going through the trauma of a cyber attack, through exercises. How you build knowledge of the plans, an intuition of how an incident unravels, what sort of questions you will need to solve, so that you have structure and peace of mind when disaster hits. We’ll discuss how to organize exercises to train your teams, key success criteria, typical scenarios and concrete tips & tricks to run cyber exercises that makes your organization better prepared.

Vincent Defrenne
Vincent Defrenne - Partner Cyber Strategy & Architecture

Ethical Hacking or how to stress test your cyber safety

Clément Laurens (CRESCO)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Clément Laurens - Co-founder

Lunch

Safeguarding national data for better & safely exploiting it

Bert Verdonck (LNDS)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Bert Verdonck
Bert Verdonck - CEO

Managing European digital identity and related attributes under eIDAS2

Thomas Kopp (LuxTrust)

Auditorium

The presentation focuses on the management of identities and trust services under the European eIDAS Regulation in order to enable digital services and to protect users against fraud. It particularly comprises new trust services and aspects originating from the 2024 amendment of the eIDAS Regulation. The speech also highlights compliance obligations from the perspective of a European Qualified Trust Service Provider and specific security measures and provisions put in place by LuxTrust based on its more than 20 year experience in the cybersecurity domain.

Thomas Kopp - Chief Scientist

Use AI on sensitive data through disconnected sovereign cloud

Pascal Rogiest (Clarence)

Auditorium

As AI becomes central to data-driven innovation, organizations face a paradox: how to harness its power while protecting their most sensitive information. Disconnected sovereign clouds offer a unique answer — enabling secure AI processing within fully isolated, jurisdiction-controlled environments. This talk will explore how such infrastructures reconcile data sovereignty, compliance, and operational efficiency without compromising performance. Real-world examples from Clarence, Luxembourg’s operational disconnected sovereign cloud, will illustrate concrete use cases and governance models. Participants will leave with a clear view of how to deploy AI responsibly, even on the most sensitive datasets.

Pascal-lux
Pascal Rogiest - General Manager

Training and Cyber Range

In the current European context of digital sovereignty and the implementation of NIS2, cyber ranges are emerging as strategic infrastructures — with Belgium playing a key role. Beyond training, they offer a shared, realistic, and interoperable environment to test and validate technologies, procedures, and IT/OT integrations, while leveraging digital twins to accelerate innovation and compliance (Cyber Resilience Act). This day will be dedicated to exploring cyber ranges and their applications — training, testing, and digital twins — with partners from across the European Union.

Welcome & Registration

Distribution of color-coded badges indicating group and demo order.

The role of cyber ranges in training, testing/validation, and digital twins in the context of NIS2 and CRA

Matteo Merialdo (Nexova)

Auditorium

In a Europe pursuing digital sovereignty and implementing the NIS2 Directive and the Cyber Resilience Act, cyber ranges are moving from “training tools” to national-level strategic infrastructure. This session shows how modern cyber range technology is helping lead that shift. Drawing on real projects in Security Operations Centre operations, critical infrastructures (IT/OT) protection, and space systems, Matteo will illustrate how cyber ranges and digital twins provide shared, realistic, and interoperable environments to train teams, test and validate technologies and procedures, rehearse incident response, and accelerate compliance-by-design.

Matteo-Merialdo-Program
Matteo Merialdo - Cybersecurity Principal

Break & Group Formation

Demo Rotations

Cristel Pelsser , Multitel and Siris

Auditorium

Demo 1 – Cyber Range :

Demonstration of the cyber range and scenarios

Cristel Pelsser
Cristel Pelsser - Professor

Demo 2 – Quantum Lab

Discovering use cases for securing communications

Multitel

Demo 3 – ICS/OT Railway – Robotic Train

Presentation of a digital twin and incident/operations scenarios, with analysis of impacts and potential responses. Each group will rotate through all the demos based on their badge color.

Siris

Technical Break & Room Reset

Cyber Range Group Exercise (IDELUX and NEXOVA)

Auditorium

Participants will follow a simple, guided scenario showcasing the versatility of cyber ranges in decision-making, coordination, and real-time defense.

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Roundtable & Q&A

Auditorium

Lessons learned, interoperability, and practical applications (training, testing, digital twinning)

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Closing

Auditorium

Light refreshments, wrap-up, and next steps.

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark