Cyberwal in Galaxia

2023 Cyberwal in Galaxia Program

This school is free of charge* (registration below)

04 – 08 December 2023 (end of registrations on 27/11)

This program will take place on the Galaxia site in Transinne which, together with the European Space Agency (ESA) and the ESEC Centre in Redu (5 km away), forms a leading Space center in Europe.

Together for Cybersecurity - Investing in cybersecurity for a secure future -

Together for Cybersecurity - Investing in cybersecurity for a secure future -

It is in the ESEC Centre in Redu that ESA has decided to base its cybersecurity center, which will ensure the cyber protection of the Agency’s ground and airborne activities.

It is in the ESEC Centre in Redu that ESA has decided to base its cybersecurity center, which will ensure the cyber protection of the Agency’s ground and airborne activities.

euro space center 17 09 20-95

The Euro Space Center is an educational center dedicated to Space, which welcomes 15,000 young people per year, of 35 different nationalities, for 3 to 5 days of courses, as well as 70,000 visitors per year.

The Euro Space Center is an educational center dedicated to Space, which welcomes 15,000 young people per year, of 35 different nationalities, for 3 to 5 days of courses, as well as 70,000 visitors per year.

euro space center 17 09 20-95

The Euro Space Center has an auditorium of 150 seats (including 4 seats for people with reduced mobility).

Its 30:10 screen offers a great flexibility for presentations, as does its Smart Board interactive screen. The recording option definitely makes this room a cutting-edge auditorium!

Cyberwal in Galaxia

Speakers

The objective of the organizers is to position these courses as a high level of education, on a European scale, and to link them directly to the needs of the cyber ecosystem.

Kurt Callewaert
Howest Valorisation Manager Digital Transformation
Find out more
Philippe Massonet
Scientific Coordinator at CETIC
Find out more
Pascal Rogiest
Managing Director of the Cybersecurity Division of RHEA Group, Chief Strategy Officer of RHEA Group, Vice President of RHEA Belux
Find out more
Xavier Lessage
Senior Research Engineer in the Data Science Department at CETIC
Find out more
Gabriele Costa
Find out more
Laurens D'hooge
PhD student at IDLab, Ghent University, in collaboration with imec
Find out more
Michele MOSCA
Co-founder and deputy director of the Institute for Quantum Computing at the University of Waterloo, CEO & co-founder of evolutionQ
Find out more
Robert Bedington
Co-Founder & CTO
Find out more
Xin YIN
Professor at IMEC and University of Ghent, Director of IDlab
Find out more
Mohamed OURDANE
Chief Security Officer of POST
Find out more
Jeremy Grandclaudon
Cybersecurity Expert for l’Agence du Numérique (ADN)
Find out more
David Prada
Cybersecurity IT/OT researcher
Find out more
Bart Preneel
Full Professor, KU Leuven
Find out more
Nicolas Noël
Director, Cyber Risk Advisory
Find out more
Etienne Caron
Manager, Cyber Risk Advisory
Find out more
Jeroen Beckers
Mobile solution lead at NVISO
Find out more
Laurens Singier
Cybersecurity IT/OT researcher, Ethical hacker
Find out more
Pascal PETRY
Deputy General Administrator of State Security (Belgium)
Find out more
Nicky Carlomagno
Head of SATNAV Services
Find out more
Maxime Cordy
Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT)
Find out more
Previous slide
Next slide

Cyberwal in Galaxia

Speakers

The objective of the organizers is to position these courses as a high level of education, on a European scale, and to link them directly to the needs of the cyber ecosystem.

howest_logo

Kurt Callewaert

Howest Valorisation Manager Digital Transformation

Philippe Massonet

Scientific Coordinator at CETIC
Rhea groupe logo

Pascal Rogiest

Managing Director of the Cybersecurity Division of RHEA Group, Chief Strategy Officer of RHEA Group, Vice President of RHEA Belux

Xavier Lessage

Senior Research Engineer in the Data Science Department at CETIC
Logo IMT

Gabriele Costa

Associated professor at IMT
thumbnail_IDLab-transparent

Laurens D'hooge

PhD student at IDLab, Ghent University, in collaboration with imec

Michele MOSCA

Co-founder of the Institute for Quantum Computing at the University of Waterloo, CEO & co-founder of evolutionQ

Robert Bedington

Co-Founder & CTO
thumbnail_IMEC-logo

Xin YIN

Professor at IMEC and University of Ghent, Director of IDlab
Post_Luxembourg_logo.svg

Mohamed OURDANE

Chief Security Officer of POST

Jeremy Grandclaudon

Cybersecurity Expert for l’Agence du Numérique (ADN)
howest_logo

David Prada

Cybersecurity IT/OT researcher

Bart Preneel

Full Professor, KU Leuven

Nicolas Noël

Director, Cyber Risk Advisory

Etienne Caron

Manager, Cyber Risk Advisory

Jeroen Beckers

Mobile solution lead at NVISO
howest_logo

Laurens Singier

Cybersecurity IT/OT researcher, Ethical hacker

Pascal PETRY

Deputy General Administrator of State Security (Belgium)
Logo_Telespazio_HD_red_nobackground_eng

Nicky Carlomagno

Head of SATNAV Services

Maxime Cordy

Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT)
Thales_Logo

Eric Viseur

Ingénieur système

President of the Scientific Committee

Axel Legay

Professor of Cybersecurity - UCLouvain, Coordinator of Cyberwal

Our Program for the 5 days

The program includes theoretical & practical courses.
A break is scheduled every day in the morning and afternoon.

The program has even more surprises in store for you. Stay tuned for more information coming soon!

The next editions of Cyberwal in Galaxia Program are already planned for 2024.

  • Day 1

    Monday 04/12

  • Day 2

    Tuesday 05/12

  • Day 3

    Wednesday 06/12

  • Day 4

    Thursday 07/12

  • Day 5

    Friday 08/12

Sold out

AI and Cybersecurity Day

The rise of artificial intelligence (AI) is having a profound impact on our society. AI is already being used in a variety of key areas such as self-driving cars where AI is being used to develop (1) self-driving cars that can navigate roads and avoid obstacles without human intervention, (2) AI based virtual assistants such as Siri and Alexa that can answer questions, make appointments, and control smart home devices, (3) medical diagnosis where AI is being used to diagnose diseases more accurately than human doctors, (4) financial trading where AI is being used to trade financial assets more efficiently than human traders and (5) customer service where AI is being used to develop chatbots that can answer customer questions and resolve issues without human intervention. AI is driving innovation by providing improved efficiency, increased productivity, better decision-making, improved healthcare, or environmental sustainability.

However the rise of AI is also creating new cybersecurity risks that make AI systems vulnerable to new types of cyberattacks, that could have a significant impact on businesses and organizations. Cybersecurity is important for AI systems because they are becoming more complex and interconnected which makes them more vulnerable to cyberattacks, they are being used to collect and store sensitive data, they are often being used in real-time applications, and they are often used in adversarial environments where attackers are constantly trying to find ways to exploit vulnerabilities in AI systems. Cybersecurity is also important for AI because AI systems are increasingly being used in critical infrastructure, such as power grids and transportation systems. If these systems are hacked, it could have a devastating impact on society.

The objective of the day is to present some key research topics at the intersection of AI and cybersecurity in the form of short tutorials or research presentations. The day will address research topics on the use of AI for improving cybersecurity as well as improving the protection of AI systems. Key research areas at the intersection of AI and cybersecurity that will be covered include AI based identification, protection, detection, response and recovery. More specific topics such as AI based AI-powered anomaly detection, AI-powered malware detection, AI-powered incident response and AI-powered ethical hacking will also be addressed.

8:30 AM – 9:00 AM

REGISTRATIONS

9:00 AM – 9:15 AM

Introduction

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
Philippe Massonet
Philippe Massonet - Scientific Coordinator at CETIC
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

9:15 AM – 10:45 AM

The Intersection of Cybersecurity and AI: Opportunities and Challenges

In today’s digital economy, where data breaches plague industry and government alike, the fusion of Cybersecurity and Artificial Intelligence (AI) has emerged as a potent defense strategy. This talk explores the symbiotic relationship between AI and cybersecurity, delving into both its promises and perils.

AI has revolutionized cybersecurity, enabling advanced capabilities such as the detection of malware, vulnerabilities and fraud. Yet, as AI empowers defenders, it also empowers attackers. The dark side of AI reveals a landscape where malicious actors harness AI for spear phishing, automated cyberattacks, misinformation, and deepfakes. Moreover, AI itself becomes a target, as shown by adversarial machine learning and model poisoning attacks. Finally, there are concerns about AI creating a dystopia.

The talk further delves into novel technologies such as attribution (watermarking) and computing on encrypted data that can play a role in mitigating some of these risks.

Overall, there is a need for a multidisciplinary approach encompassing technology, regulation, and ethics to effectively address the challenges presented by the intricate relationship between AI, cybersecurity and privacy.

Bart Preneel
Bart Preneel - Full Professor, KU Leuven
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

10:45 AM – 11:00 AM

COFFEE BREAK

 11:00 AM – 12:15 AM

Don't date the robots: the bad marriage between ML and Security

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
gabrielecosta
Gabriele Costa - Associated professor at IMT
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

12:30 PM – 01:30 PM

LUNCH TIME

1:30 PM – 2:30 PM

Machine Learning Security in the Real World

Adversarial attacks are considered as one of the most critical security threats for Machine Learning (ML). In order to enable the secure deployment of ML models in the real world, it is essential to properly assess their robustness to adversarial attacks and develop means to make models more robust. Traditional adversarial attacks were mostly designed for image recognition and assume that every image pixel can be modified independently to its full range of values.

In many domains, however, these attacks fail to consider that only specific perturbations could occur in practice due to the hard domain constraints that delimit the set of valid inputs. Because of this, they almost-always produce examples that are not feasible (i.e. could not exist in the real world). As a result, research has developed real-world adversarial attacks that either manipulate real objects through a series of problem-space transformations (i.e. problem-space attacks) or generate feature perturbations that satisfy predefined domain constraints (i.e. constrained feature space attacks). In this talk, we will review the scientific literature on these attacks and report on our experience in applying them to real-world cases.

Maxime Cordy
Maxime Cordy - Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT)
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

2:30 PM – 3:30 PM

Abstract_img_Laurens D'hooge

Re-envisioning ML's role in cybersecurity - after burning down ML-NIDS

Training

  • Introduction to Industrial Control Systems
  • Basics of PLC Programming
  • Industrial Communication
  • Scanning ICS networks
  • Industrial Network & System enumeration
  • Reversing proprietary industrial protocols
  • Exploiting industrial control systems

 

Workshop

Hands on: Industrial CTF on the Fictile Factory

Laurens D'hooge
Laurens D'hooge - PhD student at IDLab, Ghent University, in collaboration with imec
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

3:30 PM – 3:45 PM

COFFEE BREAK

3:45 PM – 4:30 PM

Secure federated learning applied to medical imaging with fully homomorphic encryption

The course aims to introduce students to the understanding of different Federated Learning concepts with a focus on security vulnerabilities and cybersecurity challenges. The course will introduce the Federated Learning and compare it to other Machine Learning approaches. The main concepts and process of Federated Learning will then be presented. The model aggregation phase will then be presented along with the security threats. 

The concept of differential privacy and its relevance for federated Learning explained. Homomorphic encryption techniques will then be introduced for securing the federated Learning process. The course will then present open-source frameworks for federated learning that will be used in the practical work. The practical work aims at applying Federated Learning concepts with a practical exercise from the medical/hospital domain (classification of medical images (malignant or benign lesions)). 

The practical work will cover the steps required to train a neural network (CNN) with a Federated learning architecture. The practical work will involve adapting the model to meet cybersecurity challenges and performing cybersecurity tests.

Training

  • Introduction to Industrial Control Systems
  • Basics of PLC Programming
  • Industrial Communication
  • Scanning ICS networks
  • Industrial Network & System enumeration
  • Reversing proprietary industrial protocols
  • Exploiting industrial control systems

 

Workshop

Hands on: Industrial CTF on the Fictile Factory

XavierLessage
Xavier Lessage - Senior Research Engineer in the Data Science Department at CETIC
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

4:30 PM – 5:15 PM

Using AI to enhance cybersecurity

In today’s dynamic cybersecurity landscape, the escalating cyber threats demand advanced methodologies for detection and characterization. This talk explores the pivotal role of Artificial Intelligence (AI) as a technological enabler in significantly fortifying cybersecurity measures. Two key applications of AI in this context will be discussed: leveraging AI as a robust threat detector within network environments and harnessing its capabilities to enhance the identification of cyber vulnerabilities.

The first part of the presentation delves into the application of AI techniques for the systematic detection and classification of cyber threats in network environments. This strategic characterization serves as the cornerstone for developing advanced solutions geared towards enhancing the overall cybersecurity posture of networks. Practical insights will be provided, using Operational Technology (OT) networks as a compelling use case to illustrate the effectiveness of AI-driven threat detection.

The second part of the talk explores the transformative potential of AI in automating and elevating penetration testing (pentesting) tools for the identification of system vulnerabilities. This discussion aims to highlight the proactive role of AI in fortifying systems against potential cyber threats, thereby enhancing their overall resilience in an ever-evolving digital landscape.

Eric Viseur
Eric Viseur - Ingénieur système at Thales
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker

5:30 PM – 6:30 PM

The Galileo Integrated Logistics Centre, where Galileo Ground Segment Operations begin.

Galileo’s satellites communicate with 16 ground stations and these, in turn, ensure that the Galileo constellation continues to deliver reliable accurate and secure positioning and timing. To allow these stations to operate to the highest standards, they need to have easy access to highly specialized parts that can be rapidly delivered to where they are needed. The Galileo ILS Centre is the go-to point for those managing ground stations and is staffed with highly qualified engineers specialized in robotics, aeronautics and IT.

From its central location in Transinne, the Galileo ILS Centre is supporting an efficient spare part and repair provisioning service for Galileo ground infrastructure. The Centre is in charge of guaranteeing the proper spare part stock for corrective and preventive maintenance. It is also resetting and updating equipment received from the stations, or shipping it to the manufacturers for more comprehensive retrofits, should this be necessary.

Galileo
Nicky-Carlomagno
Nicky Carlomagno - Head of SATNAV Services
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Sold out

Quantum Day

8:30 AM – 9:00 AM

REGISTRATIONS

09:00 AM – 10:30 AM

Introduction to Quantum Computing & Quantum Cryptography - Key Research Trends

This presentation provides a succinct overview of the foundational principles of quantum computing and quantum cryptography, focusing on current research trends that are shaping these fields. Attendees will gain insights into quantum algorithms, quantum hardware developments, and advancements in cryptographic techniques based on quantum principles. The discussion will highlight key challenges and opportunities in harnessing quantum phenomena for practical applications, emphasizing the interdisciplinary nature of quantum research. Join us to explore the forefront of quantum technologies and their transformative potential in revolutionizing computation and information security.

M-Mosca
Professor Michele MOSCA - Co-founder of the Institute for Quantum Computing at the University of Waterloo, CEO & co-founder of evolutionQ
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

10:30 AM – 11:00 AM

COFFEE BREAK

11:00 AM – 12:30 PM

Quantum Keys Distribution over Satellite – Singapore Initiatives

This presentation unveils Singapore’s groundbreaking initiatives in quantum key distribution (QKD) over satellite communication channels. We delve into the cutting-edge research and development efforts aimed at establishing secure quantum communication links between ground stations and satellites. Explore the technological advancements, key milestones, and the role of Singapore in pioneering quantum-secured satellite communication. Join us to learn about the implications of these initiatives for global secure communication and data encryption in the quantum age.

Robert-Bedington
Robert Bedington - Co-Founder & CTO at SpeQtral
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

12:30 PM – 02:00 PM

LUNCH TIME

2:00 PM – 3:30 PM

High-performance Quantum Technology – Continuous Variable QKD

This presentation introduces continuous variable quantum key distribution (CV-QKD) as a high-performance quantum technology. We explore the principles and applications of CV-QKD, emphasizing its potential for achieving secure and high-speed quantum communication. Through a discussion of recent advancements and practical implementations, attendees will gain insights into the promising future of CV-QKD in enabling robust and efficient quantum-secured communication networks. Join us to uncover the key developments and innovations in this field, paving the way for a more secure digital era.

Xin-YIN
Professor Xin Yin - Professor at IMEC and University of Ghent, Director of IDlab
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

3:30 PM – 4:00 PM  

COFFEE BREAK

4:00 PM – 5:00 PM

International Operational Usecases of QKD to protect existing business applications

This presentation sheds light on the INT-UQKD program, showcasing how Quantum Key Distribution (QKD) is being strategically employed to safeguard existing business applications on a global scale. We delve into practical use cases, highlighting successful implementations of QKD in diverse operational environments. Through real-world examples and case studies, attendees will gain insights into the tangible benefits of integrating QKD into their existing security infrastructure. Join us to explore the transformative potential of QKD in fortifying information security for businesses worldwide.

Pascal-lux
Dr. Pascal Rogiest - Chief Commercial Officer of RHEA Group
Benoit Balliu - Howest Researcher in Industrial Security.

05:15 PM – 08:45 PM

VIP Euro Space Center visit

Join us for a unique experience at the Euro Space Center on Tuesday, 5th of December. 
 
  • Moonwalk/Marswalk XP: Set your foot on the Moon and Mars
  • Multi-axis chair: Test your reactions in a disorientation situation
  • Space Flight Unit: Take control of your spaceship
  • Free Fall Slide: Let yourself go into free fall
  • Space Rotor: Feel the centrifugal force
  • Mars Village: Get ready for life on Mars

In small groups, live a unique experience combining discovery and space simulations!
You will see demonstrations of 5 training simulators and discover the planet Mars as if you were there.

Industry and challenges Day

9:00 AM – 9:30 AM

REGISTRATIONS

9:30 AM – 10:45 AM

Training in Cybersecurity: challenges and next steps

The shortage of people with the right skills, particularly in cybersecurity, is now well established. According to Gartner, over the next few years, there will be a shortfall, worldwide, of 3.4 million experts in this field .
However, it’s never too late to tackle the issue. 
We invite you to discuss this issue, during the 2023 Cyberwal in Galaxia school, with players who are active in the ecosystem and ready to collaborate on this topic.

The workshop will be divided into 2 parts:
1) What challenges were identified by the various players and what are their current concerns?
2) How can we work together to find and implement quick wins but also tackle the underlying issues?

Jeremy Grandclaudon
Jeremy Grandclaudon - Co-leading the program Cyberwal By Digital Wallonia at ADN.
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

10:45 AM – 11:00 AM

COFFEE BREAK

11:00 AM – 12:30 PM

Training in Cybersecurity: challenges and next steps

The shortage of people with the right skills, particularly in cybersecurity, is now well established. According to Gartner, over the next few years, there will be a shortfall, worldwide, of 3.4 million experts in this field .
However, it’s never too late to tackle the issue. 
We invite you to discuss this issue, during the 2023 Cyberwal in Galaxia school, with players who are active in the ecosystem and ready to collaborate on this topic.

The workshop will be divided into 2 parts:
1) What challenges were identified by the various players and what are their current concerns?
2) How can we work together to find and implement quick wins but also tackle the underlying issues?

Jeremy Grandclaudon
Jeremy Grandclaudon - Co-leading the program Cyberwal By Digital Wallonia at ADN.
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

12:30 PM – 01:45 PM

LUNCH TIME

01:45 PM – 01:50 PM

Introduction

A meticulously designed CTF challenge that pushes the boundaries of conventional cybersecurity knowledge. Attendees will be able to revel in the opportunity to listen to and interact with esteemed experts from the cybersecurity domain, each bringing a wealth of experience and fresh perspectives.

Complementing these, our hands-on demonstrations promise a deep dive into the latest technologies and methodologies, forging a link between academic theories and their tangible, real-world implementations. Join us for a comprehensive exploration of the future of cybersecurity.

Deloitte will invite keynote speakers to develop concise and insightful talks on a relevant cybersecurity topic and allow some time for questions and answers.

01:50 PM – 05:00 PM

Capture The Flag (CTF)

Arthur Testa & Loïc Sicquet - at Deloitte
OR

You are free to move from one room to another according to your interests

01:45 PM – 01:50 PM

Introduction

A meticulously designed CTF challenge that pushes the boundaries of conventional cybersecurity knowledge. Attendees will be able to revel in the opportunity to listen to and interact with esteemed experts from the cybersecurity domain, each bringing a wealth of experience and fresh perspectives.

Complementing these, our hands-on demonstrations promise a deep dive into the latest technologies and methodologies, forging a link between academic theories and their tangible, real-world implementations. Join us for a comprehensive exploration of the future of cybersecurity.

Deloitte will invite keynote speakers to develop concise and insightful talks on a relevant cybersecurity topic and allow some time for questions and answers.

01:50 PM – 02:30 PM

Red Teaming vs. Blue Teaming

A meticulously designed CTF challenge that pushes the boundaries of conventional cybersecurity knowledge. Attendees will be able to revel in the opportunity to listen to and interact with esteemed experts from the cybersecurity domain, each bringing a wealth of experience and fresh perspectives.

Complementing these, our hands-on demonstrations promise a deep dive into the latest technologies and methodologies, forging a link between academic theories and their tangible, real-world implementations. Join us for a comprehensive exploration of the future of cybersecurity.

Deloitte will invite keynote speakers to develop concise and insightful talks on a relevant cybersecurity topic and allow some time for questions and answers.

Arthur Testa - at Deloitte

 02:30 PM – 03:45 PM

Digital Wallet

A meticulously designed CTF challenge that pushes the boundaries of conventional cybersecurity knowledge. Attendees will be able to revel in the opportunity to listen to and interact with esteemed experts from the cybersecurity domain, each bringing a wealth of experience and fresh perspectives.

Complementing these, our hands-on demonstrations promise a deep dive into the latest technologies and methodologies, forging a link between academic theories and their tangible, real-world implementations. Join us for a comprehensive exploration of the future of cybersecurity.

Deloitte will invite keynote speakers to develop concise and insightful talks on a relevant cybersecurity topic and allow some time for questions and answers.

Joran Frik - at Deloitte

03:45 PM – 04:30 PM

Zero Trust

Dhiren Patra - at Deloitte

04:30 PM – 05:00 PM

Cyber Awareness and Social Engineering

Nicolas Noël 
Nicolas Noël  - Director, Cyber Risk Advisory at Deloitte
Etienne Caron
Etienne Caron - Manager, Cyber Risk Advisory at Deloitte

IoT Day

9:00 AM – 9:30 AM

REGISTRATIONS

9:30 AM – 10:30 AM

The future of OT/ICS security: 3 solutions

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0?
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

10:30 AM – 11:00 AM

Introduction to OT/ICS Security

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
DavidPrada-
David Prada - Cybersecurity IT/OT researcher at Howest
Foto_Laurens
Laurens Singier - Cybersecurity IT/OT researcher, Ethical hacker at Howest
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

11:00 AM – 11:15 AM

COFFEE BREAK

11:15 AM – 12:30 PM

Industrial Environment Scanning and Enumeration

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
DavidPrada-
David Prada - Cybersecurity IT/OT researcher at Howest
Foto_Laurens
Laurens Singier - Cybersecurity IT/OT researcher, Ethical hacker at Howest
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

12:30 PM – 02:30 PM

LUNCH TIME

2:30 PM – 3:30 PM

Exploitation in an Industrial Environment

Training

  • Introduction to Industrial Control Systems
  • Basics of PLC Programming
  • Industrial Communication
  • Scanning ICS networks
  • Industrial Network & System enumeration
  • Reversing proprietary industrial protocols
  • Exploiting industrial control systems

 

Workshop

Hands on: Industrial CTF on the Fictile Factory

Fictile is a fast-growing fiction tile-producing company. Under the steady and continuous leadership of J.C, they are the unrivaled market leader in their sector since 2016. Their factory contains three halls. A hall with hydraulic presses, baking installation and a painting hall. To remain brand independent, the lead engineer of the factory decided to equip each hall with different types of industrial controllers. The three market leaders were chosen: Siemens, Beckhoff, and Phoenix Contact.  According to investor K.C., there is no room in the budget for cyber-security. “Production must come first.”

Can you prove them wrong, by capturing all the flags?

DavidPrada-
David Prada - Cybersecurity IT/OT researcher at Howest
Foto_Laurens
Laurens Singier - Cybersecurity IT/OT researcher, Ethical hacker at Howest
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

3:30 PM – 3:45 PM

COFFEE BREAK

3:45 PM – 5:30 PM

Exploitation in an Industrial Environment

Lab work: Hands on – Industrial CTF on the Fictile Factory

DavidPrada-
David Prada - Cybersecurity IT/OT researcher at Howest
Foto_Laurens
Laurens Singier - Cybersecurity IT/OT researcher, Ethical hacker at Howest
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.
Sold out

05:30 PM – 06:30 PM

Aperitif

06:30 PM – 10:00 PM

Gala Dinner at the Euro Space Center

Protection of mobile devices Day

Jeroen Beckers
Jeroen Beckers, mobile solution lead at NVISO, will do us the honor of teaching a whole-day class, divided in 4 talks, 3 sessions of exercices, a workshop, and a Q&A session.

8:30 AM – 9:00 AM

REGISTRATIONS

9:00 AM – 9:45 AM

Intelligence: balancing the human and the digital

The digital solution can contribute to the security and safety of our communications, our writings and our productions, but we must never forget the human element, its share of responsibility and its possible shortcomings. Let’s talk about it together…

French presentation

Pascal-PETRY
Pascal PETRY - Deputy General Administrator of State Security (Belgium).

09:45 AM – 10:45 AM

Introduction to Mobile Day + [Talk] Attack surface of mobile devices / application

Introduction to the principles for attacking mobile devices, specifically Android and iOs. Introduction to reverse engineering principles, which will be applied in the subsequent exercise.

10:45 AM – 11:00 AM

COFFEE BREAK

11:00 AM – 12:00 AM

[Exercises] Mobile Apps reverse engineering, CTF style (Part 1)

Cyber security challenges of the CTF type, focused on mobile security. To be solved in groups or on your own over 1h30. Progressive level of difficulty, from easy to difficult. Will conclude with a review of the challenges and their resolution.

NVISO Coaches

11:30 AM – 12:00 AM

[Exercises] Solution of the reverse engineering exercises

10:45 AM – 11:00 AM

COFFEE BREAK

12:00 PM – 01:00 PM

LUNCH TIME

01:00PM – 02:30PM

[Talk] A review of current mobile malware trends

Review of techniques used by Android mobile malware, as Android is the primary target for mobile

01:00 PM – 02:00 PM

[Exercises] Mobile Apps reverse engineering, CTF style (Part 1)

Cyber security challenges of the CTF type, focused on mobile security. To be solved in groups or on your own over 1h30. Progressive level of difficulty, from easy to difficult. Will conclude with a review of the challenges and their resolution.

02:00 PM – 02:30 PM

[Talk] Solution of the reverse engineering exercises

Review of techniques used by Android mobile malware, as Android is the primary target for mobile

02:30 PM – 03:30 PM

[Talk] Introduction to tampering with Android apps

Review of some the techniques used to reverse engineer (Android) apps. Over one hour, the talk will focus on some of most prominent techniques. 

02:00 PM – 03:00 PM

[Workshop] Mobile malware analysis

In the same spirit as the CTF in the morning, an Android app is provided for analysis in order for participants to identify, analyse and understand malicious components of the app.

03:30 PM – 05:00 PM

[Exercises] Modify Android applications to disable security features or add keyloggers. Note: we will announce the break during the session, which people will be free to join

Sandbox-based analysis guided by the NVISO team.

NVISO Coaches

04:15 PM – 04:45 PM 

COFFEE BREAK

05:00 PM – 05:30 PM

[Talk] Closing thoughts: mobile security in the coming 10 years

We will among others discuss:

  • Privacy in mobile: key challenges, and the difference in philosophies of Google & Apple.
  • The challengers to Apple & Google’s mobile OS domination, from geopolitical motives to privacy concerns.
  • What lessons have OS designers drawn from advanced nation state attacks.

05:30 PM – 06:00 PM

Q&A

3:30 PM – 3:45 PM

COFFEE BREAK

Our Program for the 5 days

The programme includes theoretical & practical courses 
A break is scheduled every day in the morning and afternoon

The next editions of Cyberwal in Galaxia Program are already planned for 2024.

Hotel

Join us for the Cyberwal in Galaxia Program second edition and enjoy an exclusive room rate at Mecure Hotel, including breakfast! Book now, limited rooms available at this special rate!

The availability and preferential price are not guaranteed after 12/11.

Mercure Han-sur-Lesse

Mercure Han Sur Lesse

Gala dinner

Meat meal

Shrimp tartlet with avocado, grapefruit, and yuzu emulsion

Wine: Bourgogne cave de Viré « Macon Village » White

*** 

Prairie pork square from Majerottes, sautéed and schredded butternut squash, and chestnut parmentier

Wine: Château Tour Lescours Saint Emilion Red

*** 

Crunchy chocolate with mascarpone, coffee, and speculoos

Fish meal

Scallop osso bucco, herb parmentier, lobster béarnaise, snow pea freshness

Wine: Bourgogne cave de Viré « Macon Village » White

*** 

Roasted monkfish fillet, stewed leek, shellfish risotto

Wine: Château Tour Lescours Saint Emilion Red

*** 

Crunchy chocolate with mascarpone, coffee, and speculoos

 

Vegan meal

Sun-dried tomato and grilled bell pepper tartlet, sesame-grilled tofu with sweet and sour vinaigrette, and snow pea freshness

Wine: Bourgogne cave de Viré « Macon Village » White

*** 

Sautéed mini broccoli with soy, edamame beans, pesto, and sweet onion fritters

Wine: Château Tour Lescours Saint Emilion Red

*** 

Fruit tartare and lime sorbet

 

Registration

Register now to be a part of this exclusive event!

End of registrations on 27/11 at 12 PM

I would like to use the shuttle service (sold out!)

*Your registration includes:

  • Courses & practical work
  • Shuttle bus from Mercure hotel to Galaxia
  • Meals (lunch & coffee breaks)
  • VIP visit to Euro Space Center
  • Gala dinner

Not included:

  • Hotel
  • Breakfast
  • Evening meals
For any inquiry, please send an email to contact@cyberwalingalaxia.be

Previous edition

2022 Cyberwal in Galaxia Program

1216 December 2022 

Gallery

Register now!

2023 Cyberwal in Galaxia . .. ...

Days
Hours
Minutes

OUR BEST PARTNERS

This Program, which is financed by the Walloon Region, is organized by IDELUX Development (the Economic Development Agency of Belgian Luxembourg) and under the authority of the scientific committee chaired by Mr Axel Legay, Professor of cybersecurity at the UC Louvain.

cyberexcellence

With the support of

Rhea groupe logo
Logo_Telespazio_HD_red_nobackground_eng
Thales_Logo
Kurt Callewaert

Kurt Callewaert

Former Head of Research Applied Computer Science

Kurt Callewaert is Valorisation Manager Digital Transformation at Howest University collaborating with research groups specializing in AI, AR/VR, Web3 (Blockchain , Solid), Game Technology and Cybersecurity. 

Kurt is a member of the Flemish Cybersecurity Steering Group and the Belgian Cyber Coalition vzw . Kurt has been active in cybersecurity for more than 14 years and project leader of the Living Lab Innovative Cyber Security in Industry and Logistics 4.0 . 

The study programme CS at Howest is internationally well-known.

XavierLessage

Xavier Lessage

A senior research engineer in the Data Science department at CETIC. 

His main interests are artificial intelligence, cloud computing, distributed data processing (high performance computing) and cybersecurity. One of his interests in industry and digital technology is health, and more specifically, the use of artificial intelligence in health care.

Laurens D'hooge

Laurens D'hooge​

PhD student at IDLab, Ghent University, in collaboration with imec

Laurens D’hooge is a freshly graduated PhD student, continuing his work as a postdoctoral researcher affiliated with IDLab-Imec at Ghent University. His dissertation titled: “Discovery and Characterization of Flaws in Machine-Learned Network Intrusion Detection Systems and Data Sets” provides a comprehensive diagnosis to explain the lack of real-world adoption of machine-learning-based network intrusion detection systems (ML-NIDS). 

After discovering the lackluster generalization capabilities of ML-NIDS early on in his PhD research, he has spent several years to uncover the sources of this deficiency. While attempting to bolster ML as a genuine solution to network intrusion detection, he has uncovered more and more fundamental problems with the current classification methods and with the benchmark datasets on which they are all being verified. During his PhD, Laurens has published a mixture of 11 A1 and C1 papers as first author which at the time of writing have garnered more than 175 citations

M-Mosca

Michele MOSCA

Co-founder and deputy director of the Institute for Quantum Computing at the University of Waterloo, CEO & co-founder of evolutionQ

MICHELE MOSCA is co-founder of the Institute for Quantum Computing at the University of Waterloo, a Professor in the Department of Combinatorics & Optimization of the Faculty of Mathematics, and a founding member of Waterloo’s Perimeter Institute for Theoretical Physics. He was the founding Director of CryptoWorks21, a training program in quantum-safe cryptography. He co-founded the ETSI-IQC workshop series in Quantum-Safe Cryptography. He co-founded evolutionQ Inc. to support organizations as they evolve their quantum-vulnerable systems to quantum-safe ones and softwareQ Inc. to provide quantum software tools and services.  

He obtained his doctorate in Mathematics in 1999 from Oxford on the topic of Quantum Computer Algorithms, an MSc in Mathematics and the Foundations of Computer Science in 1996 from Oxford. In 1995 he earned a BMath in Combinatorics & Optimization and Pure Mathematics from Waterloo. His research interests include quantum computation and cryptographic tools designed to be safe against quantum technologies.

He is globally recognized for his drive to help academia, industry and government prepare our cyber systems to be safe in an era with quantum computers. Dr. Mosca’s awards and honours include Fellow of the Institute for Combinatorics and its Applications (since 2000), 2010 Canada’s Top 40 Under 40, Queen Elizabeth II Diamond Jubilee Medal (2013), SJU Fr. Norm Choate Lifetime Achievement Award (2017), and a Knighthood (Cavaliere) in the Order of Merit of the Italian Republic (2018).

Robert-Bedington

Robert Bedington

Co-Founder & CTO

Rob is CTO at SpeQtral (formerly known as S15 Space Systems) where they are developing commercial quantum secure communication from space, and laying the foundations for a global quantum internet. At Singapore Center for Quantum technology, he was coordinating the development of NanoSatellites with Quantum technology demonstrator payloads which will enable future QKD missions. These include the SpooQy-1 mission to demonstrate an entangled photon pair source in a 3U CubeSat and the QubeSat mission, joint with RAL Space in the UK, to demonstrate entanglement-based QKD between a CubeSat and an optical ground station.

Xin-YIN

Xin YIN

Professor at IMEC and University of Ghent, Director of IDlab

Xin (Scott) Yin received the M.Sc. degree in Electronics Engineering from Fudan University, China in 2002 and Ph.D. degree in Electronic Engineering from Ghent University, Belgium in 2009. Since 2007, he has worked as a staff researcher in IMEC-INTEC and since 2013 he has been a professor in the INTEC department at Ghent University. He was and is active in European and International projects such as PIEMAN, EUROFOS, MARISE, C3PO, DISCUS, Phoxtrot, MIRAGE, SPIRIT, WIPE, Teraboard, STREAMS, 5G-PHOS and GreenTouch consortium. 

His research interests include high-speed opto-electronic circuits and transmitter/receiver subsystems, with emphasis on burst-mode receivers and clock data recovery ICs for optical access networks, and low power mixed-signal integrated circuit design for datacom/telecom/5G applications. He has authored and co-authored more than 150 journal and conference publications in the field of high-speed electronics and fiber-optic communication. In 2014, he led a team including researchers from imec, Bell Labs USA/Alcatel-Lucent and Orange Labs, which won the GreenTouch 1000x award in recognition of the invention of the Bi-PON protocol and sustained leadership. He has become a member of the ECOC technical program committee (TPC) since 2015.

M-Ourdane

Dr. Mohamed Ourdane

Chief Security Officer of POST

Holder of a PhD in atomic physics, Mohamed Ourdane, 51 years, is the Chief Security Officer of POST Luxembourg. Knowing that the overall digitalization will put information in the heart of the economy, he sets up a global cybersecurity strategy and organization (POST CyberForce) aiming at playing a key role in that domain.

After an experience as researcher at the Stockholm Institute of Physics and as MPLS, OSS/BSS & Security specialist at Cisco Systems Belgium, Mohamed joined POST Luxembourg in 2002. His previous mission was to lead the transformation of the infrastructure service of the Telecom Division in order to prepare the bases of both all IP core business transformation and cloud services.

Jeremy Grandclaudon

Jeremy Grandclaudon

Cybersecurity Expert for l’Agence du Numérique (ADN)

Jeremy Grandclaudon has been working in the field since 2010. He started in the private sector (banking, consultancy…), switching later to a more research-oriented path (European SPARTA Project and other cybersecurity programs). He is now dealing with cybersecurity matters for the Walloon region, Co-leading the program Cyberwal By Digital Wallonia at ADN.

DavidPrada-

David Prada

Cybersecurity IT/OT researcher

Cybersecurity professional with over 4 years of experience in information security, risk management, incident response, computer forensics and web development. 

He specializes in vulnerability assessments and penetration testing. He worked with diverse clients across industries, including small businesses and large corporations, particularly in the oil & gas, military, and police sectors, in various countries.

Bart Preneel

Bart Preneel

Full Professor, KU Leuven

Prof. Bart Preneel is a full professor at the KU Leuven, where he leads the renowned COSIC research group, which has 100 members. With an extensive academic career, he has held visiting professor positions at five universities across Europe. His primary areas of expertise encompass cryptography, cybersecurity, and privacy.

Prof. Preneel has been invited speaker at more than 150 conferences in 50 countries. He received the prestigious RSA Award for Excellence in the Field of Mathematics (2014), the ESORICS Outstanding Research Award (2017) and the Kristian Beckman award from IFIP TC11 (2016). He has served as president of the IACR (International Association for Cryptologic Research) and he is a fellow and Director of the IACR. Bart Preneel frequently consults for industry and government about cybersecurity and privacy technologies. His commitment to innovation extends to his roles as a co-founder and Board Member of the start-up nextAuth, a Board Member of the scale-up Approach Belgium, and an Advisory Board Member for Tioga Capital Partners and Nym Technologies. Additionally, Professor Preneel has actively participated in cybersecurity policy discussions, and is offering his expertise as a member of the Advisory Group for the European Union Agency for Cybersecurity (ENISA).

Nicolas Noël 

Nicolas Noël 

Director, Cyber Risk Advisory

icolas pursued his whole career in the cybersecurity field, bridging the gap between technical security controls and business drivers.

Using his technical background and his business affinity, Nicolas is supporting his customers in tailoring their technical security controls based on their risks, regulatory landscape and business objectives.

He has a broad area of expertise from financial institutions to manufacturing companies.

Etienne Caron

Etienne Caron

Manager, Cyber Risk Advisory

Etienne Caron (M.Sc) is a Consultant in Deloitte’s Cybersecurity team in Montreal since January 2019. At Deloitte, Etienne has specialized in engagements related to Cyber Governance by developing policies, standards and processes across several industries. Etienne has conducted multiples IT/OT and 3rd party assessment and developed strong expertise for clients in multiples industries. Finally, he participated in several trainings and incident response preparation mandates by organizing a phishing campaign or developing simulation exercises on ransomware to test the efficiency of response and the resilience of companies in the event of an incident.

Jeroen Beckers

Jeroen Beckers

Mobile solution lead at NVISO

Jeroen Beckers is the mobile solution lead at NVISO, where he is responsible for quality delivery, innovation, and methodology for all mobile assessments. Jeroen Beckers is actively involved in the mobile security community, and he tries to share his knowledge through open-source tools, blogposts, trainings, and presentations. He is the lead author and instructor of the SANS 575 course: Mobile device security and ethical hacking and a co-author of the OWASP Mobile Application Security Testing Guide (MSTG) and OWASP Mobile Application Security Verification Standard (MASVS).

Foto_Laurens

Laurens Singier

Cybersecurity IT/OT researcher, Ethical hacker

Laurens is a young Cybersecurity expert with experience in Red Team and Blue Team. Laurens further specialises in OT/ICS security.

Pascal-PETRY

Pascal PETRY

Deputy General Administrator of State Security (Belgium)

Since 1 June 2014, Mr Pascal PETRY (53 years old) has been Deputy Director General of State Security (Belgium). He has been in office for a second 5-year term since June 1, 2019.

He holds a degree in criminology from the University of LIEGE (Ecole Jean Constant – 1994). He is a member of the federal police. Previously, he held various positions in ministerial cabinets of the Belgian federal government: security advisor to the Prime Minister (2011-2014) and to the Deputy Prime Minister and Minister of Justice (2003-2007), head of cabinet of the Secretary of State for Social Affairs, in charge of disabled people (2009-2011). Mr PETRY was President of the College of Intelligence and Security, and was also coordinator of the Belgian cybersecurity policy. He has actively participated in several important reforms of the Belgian police and security landscape, including the merger of police services (Octopus) and the reform of the fire services.

Nicky-Carlomagno

Nicky Carlomagno

Head of SATNAV Services

Nicky Carlogmano, with 39 years of career at Telespazio Belgium, is surely the most interesting witness of the development of the Galileo history and the development of the current ground segment on which he is still working. By visiting the Galileo Integrated Logistics Centre with him, you will not only discover an amazing place but certainly feel the proudness to have such activities in Wallonia.

Maxime Cordy

Maxime Cordy

Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT)

Maxime Cordy is a Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg, in the domain of Artificial Intelligence (AI) and Software Engineering (SE), with a focus on security and quality assurance for machine learning, software verification and testing, and the engineering of data-intensive systems. He has published 120+ peer-reviewed papers in these areas. He is one of the three permanent scientists of the SnT’s SerVal group (SEcurity, Reasoning and VALidation). His research is inspired from and applies to several industry partners, mostly from the financial technology and smart energy sectors. He is deeply engaged in making Society benefit from results and technologies produced by research through the founding of a spin-off company and the leadership of private-public partnership projects at SnT. He has worked as a program committee member and reviewer for top-tier AI and SE conferences incl. IJCAI, ICCV, NeurIPS, ICLR, ESEC/FSE, PLDI, ISSTA,  etc. He is distinguished reviewer board member of TOSEM and regular reviewer for other top-tier SE journals.

Eric Viseur

Eric Viseur

Ingénieur système

Eric has been working at Thales Belgium for the best part of the last decade on the design, implementation and validation of cybersecurity solutions and critical communication systems.  His expertise centers around systems modelling, risk analysis, IP networks and classified information handling.  As a System Architect & Technical Authority, he leads these activities and focuses on keeping the solutions in line with the end-users needs and threats to be addressed.

He obtained in Master’s Degree in Telecommunications Engineering in 2014 from Mons.  Leveraging both his academical knowledge and his strong IT knowledge, he has since then specialized in the cybersecurity of critical systems, both from a networking and embedded systems perspective.

Eric is also involved in several initiatives around STEM and cybersecurity education awareness, strongly convinced that a sustainable Belgian cybersecurity ecosystem can only be achieved through preparing today the way for the engineers of tomorrow.

Sold out

AI and Cybersecurity Day

The rise of artificial intelligence (AI) is having a profound impact on our society. AI is already being used in a variety of key areas such as self-driving cars where AI is being used to develop (1) self-driving cars that can navigate roads and avoid obstacles without human intervention, (2) AI based virtual assistants such as Siri and Alexa that can answer questions, make appointments, and control smart home devices, (3) medical diagnosis where AI is being used to diagnose diseases more accurately than human doctors, (4) financial trading where AI is being used to trade financial assets more efficiently than human traders and (5) customer service where AI is being used to develop chatbots that can answer customer questions and resolve issues without human intervention. AI is driving innovation by providing improved efficiency, increased productivity, better decision-making, improved healthcare, or environmental sustainability.

However the rise of AI is also creating new cybersecurity risks that make AI systems vulnerable to new types of cyberattacks, that could have a significant impact on businesses and organizations. Cybersecurity is important for AI systems because they are becoming more complex and interconnected which makes them more vulnerable to cyberattacks, they are being used to collect and store sensitive data, they are often being used in real-time applications, and they are often used in adversarial environments where attackers are constantly trying to find ways to exploit vulnerabilities in AI systems. Cybersecurity is also important for AI because AI systems are increasingly being used in critical infrastructure, such as power grids and transportation systems. If these systems are hacked, it could have a devastating impact on society.

The objective of the day is to present some key research topics at the intersection of AI and cybersecurity in the form of short tutorials or research presentations. The day will address research topics on the use of AI for improving cybersecurity as well as improving the protection of AI systems. Key research areas at the intersection of AI and cybersecurity that will be covered include AI based identification, protection, detection, response and recovery. More specific topics such as AI based AI-powered anomaly detection, AI-powered malware detection, AI-powered incident response and AI-powered ethical hacking will also be addressed.

8:30 AM – 9:00 AM

REGISTRATIONS

9:00 AM – 9:15 AM

Introduction

Philippe Massonet
Philippe Massonet - Scientific Coordinator at CETIC

9:00 AM – 9:15 AM

Introduction

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
Philippe Massonet
Philippe Massonet - Scientific Coordinator at CETIC
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

9:15 AM – 10:45 AM

The Intersection of Cybersecurity and AI: Opportunities and Challenges

In today’s digital economy, where data breaches plague industry and government alike, the fusion of Cybersecurity and Artificial Intelligence (AI) has emerged as a potent defense strategy. This talk explores the symbiotic relationship between AI and cybersecurity, delving into both its promises and perils.

AI has revolutionized cybersecurity, enabling advanced capabilities such as the detection of malware, vulnerabilities and fraud. Yet, as AI empowers defenders, it also empowers attackers. The dark side of AI reveals a landscape where malicious actors harness AI for spear phishing, automated cyberattacks, misinformation, and deepfakes. Moreover, AI itself becomes a target, as shown by adversarial machine learning and model poisoning attacks. Finally, there are concerns about AI creating a dystopia.

The talk further delves into novel technologies such as attribution (watermarking) and computing on encrypted data that can play a role in mitigating some of these risks.

Overall, there is a need for a multidisciplinary approach encompassing technology, regulation, and ethics to effectively address the challenges presented by the intricate relationship between AI, cybersecurity and privacy.

Bart Preneel
Bart Preneel - Full Professor, KU Leuven

9:15 AM – 10:45 AM

Invited talk

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

10:45 AM – 11:00 AM

COFFEE BREAK

 11:00 AM – 12:15 AM

Don't date the robots: the bad marriage between ML and Security

gabrielecosta
Gabriele Costa - Associated professor at IMT

 11:00 AM – 12:15 AM

Don't date the robots: the bad marriage between ML and Security

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
gabrielecosta
Gabriele Costa - IMT School for Advanced Studies
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

12:30 PM – 01:30 PM

LUNCH TIME

1:30 PM – 2:30 PM

Machine Learning Security in the Real World

Adversarial attacks are considered as one of the most critical security threats for Machine Learning (ML). In order to enable the secure deployment of ML models in the real world, it is essential to properly assess their robustness to adversarial attacks and develop means to make models more robust. Traditional adversarial attacks were mostly designed for image recognition and assume that every image pixel can be modified independently to its full range of values.

In many domains, however, these attacks fail to consider that only specific perturbations could occur in practice due to the hard domain constraints that delimit the set of valid inputs. Because of this, they almost-always produce examples that are not feasible (i.e. could not exist in the real world). As a result, research has developed real-world adversarial attacks that either manipulate real objects through a series of problem-space transformations (i.e. problem-space attacks) or generate feature perturbations that satisfy predefined domain constraints (i.e. constrained feature space attacks). In this talk, we will review the scientific literature on these attacks and report on our experience in applying them to real-world cases.

Maxime Cordy
Maxime Cordy - Research Scientist at the Interdisciplinary Center for Security, Reliability and Trust (SnT)

1:30 PM – 2:15 PM

Artificial Intelligence for Malware Analysis

Training

  • Introduction to Industrial Control Systems
  • Basics of PLC Programming
  • Industrial Communication
  • Scanning ICS networks
  • Industrial Network & System enumeration
  • Reversing proprietary industrial protocols
  • Exploiting industrial control systems

 

Workshop

Hands on: Industrial CTF on the Fictile Factory

Francesco mercaldo
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

2:30 PM – 3:30 PM

Abstract_img_Laurens D'hooge

Re-envisioning ML's role in cyber security - after burning down ML-NIDS

Laurens D'hooge
Laurens D'hooge - PhD student at IDLab, Ghent University, in collaboration with imec

2:15 PM – 3:00 PM

Abstract_img_Laurens D'hooge

Re-envisioning ML's role in cyber security - after burning down ML-NIDS

Laurens D'hooge
Laurens D'hooge - PhD student at IDLab, Ghent University, in collaboration with imec
Laurens D'hooge - PhD student at IDLab, Ghent University, in collaboration with imec

3:30 PM – 3:45 PM

COFFEE BREAK

3:30 PM – 4:15 PM

Secure federated learning applied to medical imaging with fully homomorphic encryption

The course aims to introduce students to the understanding of different Federated Learning concepts with a focus on security vulnerabilities and cybersecurity challenges. The course will introduce the Federated Learning and compare it to other Machine Learning approaches. The main concepts and process of Federated Learning will then be presented. The model aggregation phase will then be presented along with the security threats. 

The concept of differential privacy and its relevance for federated Learning explained. Homomorphic encryption techniques will then be introduced for securing the federated Learning process. The course will then present open-source frameworks for federated learning that will be used in the practical work. The practical work aims at applying Federated Learning concepts with a practical exercise from the medical/hospital domain (classification of medical images (malignant or benign lesions)). 

The practical work will cover the steps required to train a neural network (CNN) with a Federated learning architecture. The practical work will involve adapting the model to meet cybersecurity challenges and performing cybersecurity tests.

Training

  • Introduction to Industrial Control Systems
  • Basics of PLC Programming
  • Industrial Communication
  • Scanning ICS networks
  • Industrial Network & System enumeration
  • Reversing proprietary industrial protocols
  • Exploiting industrial control systems

 

Workshop

Hands on: Industrial CTF on the Fictile Factory

XavierLessage
Xavier Lessage - Expert researcher in the Data Science department at CETIC
XavierLessage
Xavier Lessage - Expert researcher in the Data Science department at CETIC

3:45 PM – 4:30 PM

Secure federated learning applied to medical imaging with fully homomorphic encryption

The course aims to introduce students to the understanding of different Federated Learning concepts with a focus on security vulnerabilities and cybersecurity challenges. The course will introduce the Federated Learning and compare it to other Machine Learning approaches. The main concepts and process of Federated Learning will then be presented. The model aggregation phase will then be presented along with the security threats. 

The concept of differential privacy and its relevance for federated Learning explained. Homomorphic encryption techniques will then be introduced for securing the federated Learning process. The course will then present open-source frameworks for federated learning that will be used in the practical work. The practical work aims at applying Federated Learning concepts with a practical exercise from the medical/hospital domain (classification of medical images (malignant or benign lesions)). 

The practical work will cover the steps required to train a neural network (CNN) with a Federated learning architecture. The practical work will involve adapting the model to meet cybersecurity challenges and performing cybersecurity tests.

XavierLessage
Xavier Lessage - Expert researcher in the Data Science department at CETIC

4:30 PM – 5:15 PM

Using AI to enhance cybersecurity

In today’s dynamic cybersecurity landscape, the escalating cyber threats demand advanced methodologies for detection and characterization. This talk explores the pivotal role of Artificial Intelligence (AI) as a technological enabler in significantly fortifying cybersecurity measures. Two key applications of AI in this context will be discussed: leveraging AI as a robust threat detector within network environments and harnessing its capabilities to enhance the identification of cyber vulnerabilities.

The first part of the presentation delves into the application of AI techniques for the systematic detection and classification of cyber threats in network environments. This strategic characterization serves as the cornerstone for developing advanced solutions geared towards enhancing the overall cybersecurity posture of networks. Practical insights will be provided, using Operational Technology (OT) networks as a compelling use case to illustrate the effectiveness of AI-driven threat detection.

The second part of the talk explores the transformative potential of AI in automating and elevating penetration testing (pentesting) tools for the identification of system vulnerabilities. This discussion aims to highlight the proactive role of AI in fortifying systems against potential cyber threats, thereby enhancing their overall resilience in an ever-evolving digital landscape.

Eric Viseur
Eric Viseur - Ingénieur système at Thales

5:30 PM – 6:30 PM

The Galileo Integrated Logistics Centre, where Galileo Ground Segment Operations begin.

Galileo’s satellites communicate with 16 ground stations and these, in turn, ensure that the Galileo constellation continues to deliver reliable accurate and secure positioning and timing. To allow these stations to operate to the highest standards, they need to have easy access to highly specialized parts that can be rapidly delivered to where they are needed. The Galileo ILS Centre is the go-to point for those managing ground stations and is staffed with highly qualified engineers specialized in robotics, aeronautics and IT.

From its central location in Transinne, the Galileo ILS Centre is supporting an efficient spare part and repair provisioning service for Galileo ground infrastructure. The Centre is in charge of guaranteeing the proper spare part stock for corrective and preventive maintenance. It is also resetting and updating equipment received from the stations, or shipping it to the manufacturers for more comprehensive retrofits, should this be necessary.

Galileo
Nicky-Carlomagno
Nicky Carlomagno - Head of SATNAV Services
Sold out

Quantum Day

8:30 AM – 9:00AM

REGISTRATIONS

09:00 AM – 10:30 AM

Introduction to Quantum Computing & Quantum Cryptography - Key Research Trends

This presentation provides a succinct overview of the foundational principles of quantum computing and quantum cryptography, focusing on current research trends that are shaping these fields. Attendees will gain insights into quantum algorithms, quantum hardware developments, and advancements in cryptographic techniques based on quantum principles. The discussion will highlight key challenges and opportunities in harnessing quantum phenomena for practical applications, emphasizing the interdisciplinary nature of quantum research. Join us to explore the forefront of quantum technologies and their transformative potential in revolutionizing computation and information security.

M-Mosca
Professor Michele MOSCA - Co-founder of the Institute for Quantum Computing at the University of Waterloo, CEO & co-founder of evolutionQ

09:00 AM – 10:30 AM

Introduction to Quantum Computing & Quantum Cryptography - Key Research Trends

This presentation provides a succinct overview of the foundational principles of quantum computing and quantum cryptography, focusing on current research trends that are shaping these fields. Attendees will gain insights into quantum algorithms, quantum hardware developments, and advancements in cryptographic techniques based on quantum principles. The discussion will highlight key challenges and opportunities in harnessing quantum phenomena for practical applications, emphasizing the interdisciplinary nature of quantum research. Join us to explore the forefront of quantum technologies and their transformative potential in revolutionizing computation and information security.

 

M-Mosca
Professor Michele MOSCA - co-founder and deputy director of the Institute for Quantum Computing at the University of Waterloo, CEO & co-founder of evolutionQ.
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

10:30 AM – 11:00 AM

COFFEE BREAK

11:00 AM – 12:30 AM

Quantum Keys Distribution over Satellite – Singapore Initiatives

This presentation unveils Singapore’s groundbreaking initiatives in quantum key distribution (QKD) over satellite communication channels. We delve into the cutting-edge research and development efforts aimed at establishing secure quantum communication links between ground stations and satellites. Explore the technological advancements, key milestones, and the role of Singapore in pioneering quantum-secured satellite communication. Join us to learn about the implications of these initiatives for global secure communication and data encryption in the quantum age.

Robert-Bedington
Robert Bedington - Co-Founder & CTO at SpeQtral

11:00 AM – 12:30 AM

Quantum Keys Distribution over Satellite – Singapore Initiatives

This presentation unveils Singapore’s groundbreaking initiatives in quantum key distribution (QKD) over satellite communication channels. We delve into the cutting-edge research and development efforts aimed at establishing secure quantum communication links between ground stations and satellites. Explore the technological advancements, key milestones, and the role of Singapore in pioneering quantum-secured satellite communication. Join us to learn about the implications of these initiatives for global secure communication and data encryption in the quantum age.

 

CY-LAM
Chune Yang Lam - CEO and co-founder of SpeQtral, spin-off company from the Singapore Center for Quantum Technology
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

12:30 AM – 02:00 PM

LUNCH TIME

02:00 PM – 03:30 PM

High-performance Quantum Technology – Continuous Variable QKD

This presentation introduces continuous variable quantum key distribution (CV-QKD) as a high-performance quantum technology. We explore the principles and applications of CV-QKD, emphasizing its potential for achieving secure and high-speed quantum communication. Through a discussion of recent advancements and practical implementations, attendees will gain insights into the promising future of CV-QKD in enabling robust and efficient quantum-secured communication networks. Join us to uncover the key developments and innovations in this field, paving the way for a more secure digital era.

 

Xin-YIN
Professor Xin Yin - Professor at IMEC and University of Ghent, Director of IDlab

02:00 PM – 03:30 PM

High-performance Quantum Technology – Continuous Variable QKD

This presentation introduces continuous variable quantum key distribution (CV-QKD) as a high-performance quantum technology. We explore the principles and applications of CV-QKD, emphasizing its potential for achieving secure and high-speed quantum communication. Through a discussion of recent advancements and practical implementations, attendees will gain insights into the promising future of CV-QKD in enabling robust and efficient quantum-secured communication networks. Join us to uncover the key developments and innovations in this field, paving the way for a more secure digital era.

 

Xin-YIN
Professor Xin Yin - Professor at IMEC and University of Ghent, Director of IDlab
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
Benoit Balliu - Howest Researcher in Industrial Security.

03:30 PM – 04:00 PM  

COFFEE BREAK

04:00 PM – 05:00 PM

International Operational Usecases of QKD to protect existing business applications

This presentation sheds light on the INT-UQKD program, showcasing how Quantum Key Distribution (QKD) is being strategically employed to safeguard existing business applications on a global scale. We delve into practical use cases, highlighting successful implementations of QKD in diverse operational environments. Through real-world examples and case studies, attendees will gain insights into the tangible benefits of integrating QKD into their existing security infrastructure. Join us to explore the transformative potential of QKD in fortifying information security for businesses worldwide.

Pascal-lux
Dr. Pascal Rogiest - Chief Commercial Officer of RHEA Group

04:00 PM – 05:00 PM

International Operational Usecases of QKD to protect existing business applications

This presentation sheds light on the INT-UQKD program, showcasing how Quantum Key Distribution (QKD) is being strategically employed to safeguard existing business applications on a global scale. We delve into practical use cases, highlighting successful implementations of QKD in diverse operational environments. Through real-world examples and case studies, attendees will gain insights into the tangible benefits of integrating QKD into their existing security infrastructure. Join us to explore the transformative potential of QKD in fortifying information security for businesses worldwide.

Pascal-lux
Dr. Pascal Rogiest - Chief Commercial Officer of RHEA Group
Benoit Balliu - Howest Researcher in Industrial Security.

05:15 PM – 08:45 PM

VIP Eurospace Center visit

Join us for an unique experience at the Euro Space Center on Tuesday, 5th of December. 
 
  • Moonwalk/Marswalk XP: Set your foot on the Moon and Mars
  • Multi-axis chair: Test your reactions in a disorientation situation
  • Space Flight Unit: Take control of your spaceship
  • Free Fall Slide: Let yourself go into free fall
  • Space Rotor: Feel the centrifugal force
  • Mars Village: Get ready for life on Mars

In small groups, live a unique experience combining discovery and space simulations!
You will see demonstrations of 5 training simulators and discover the planet Mars as if you were there.

6:00 PM – 8:00 PM

VIP Eurospace Center visit

Join us for an unique experience at the Euro Space Center on Tuesday, 13th of December. 
 
  • Moonwalk/Marswalk XP: Set your foot on the Moon and Mars
  • Multi-axis chair: Test your reactions in a disorientation situation
  • Space Flight Unit: Take control of your spaceship
  • Free Fall Slide: Let yourself go into free fall
  • Space Rotor: Feel the centrifugal force
  • Mars Village: Get ready for life on Mars


In small groups, live a unique experience combining discovery and space simulations!
You will see demonstrations of 5 training simulators and discover the planet Mars as if you were there.

Industry and challenges Day

9:00 AM – 9:30 AM

REGISTRATIONS

9:30 AM – 10:45 AM

Training in Cybersecurity: challenges and next steps

The shortage of people with the right skills, particularly in cybersecurity, is now well established. According to Gartner, over the next few years, there will be a shortfall, worldwide, of 3.4 million experts in this field .
However, it’s never too late to tackle the issue. 
We invite you to discuss this issue, during the 2023 Cyberwal in Galaxia school, with players who are active in the ecosystem and ready to collaborate on this topic.

The workshop will be divided into 2 parts:
1) What challenges were identified by the various players and what are their current concerns?
2) How can we work together to find and implement quick wins but also tackle the underlying issues?

Jeremy Grandclaudon
Jeremy Grandclaudon - Co-leading the program Cyberwal By Digital Wallonia at ADN.

10:45 AM – 11:00 AM

COFFEE BREAK

11:00 AM – 12:30 AM

Training in Cybersecurity: challenges and next steps

The shortage of people with the right skills, particularly in cybersecurity, is now well established. According to Gartner, over the next few years, there will be a shortfall, worldwide, of 3.4 million experts in this field .
However, it’s never too late to tackle the issue. 
We invite you to discuss this issue, during the 2023 Cyberwal in Galaxia school, with players who are active in the ecosystem and ready to collaborate on this topic.

The workshop will be divided into 2 parts:
1) What challenges were identified by the various players and what are their current concerns?
2) How can we work together to find and implement quick wins but also tackle the underlying issues?

Jeremy Grandclaudon
Jeremy Grandclaudon - Co-leading the program Cyberwal By Digital Wallonia at ADN.

12:30 AM – 01:45 PM

LUNCH TIME

01:45 PM – 01:50 PM

Introduction

A meticulously designed CTF challenge that pushes the boundaries of conventional cybersecurity knowledge. Attendees will be able to revel in the opportunity to listen to and interact with esteemed experts from the cybersecurity domain, each bringing a wealth of experience and fresh perspectives.

Complementing these, our hands-on demonstrations promise a deep dive into the latest technologies and methodologies, forging a link between academic theories and their tangible, real-world implementations. Join us for a comprehensive exploration of the future of cybersecurity.

Deloitte will invite keynote speakers to develop concise and insightful talks on a relevant cybersecurity topic and allow some time for questions and answers.

01:50 PM – 05:00 PM

Capture The Flag (CTF)

Arthur Testa & Loïc Sicquet - at Deloitte
OR

You are free to move from one room to another according to your interests

01:45 PM – 01:50 PM

Introduction

A meticulously designed CTF challenge that pushes the boundaries of conventional cybersecurity knowledge. Attendees will be able to revel in the opportunity to listen to and interact with esteemed experts from the cybersecurity domain, each bringing a wealth of experience and fresh perspectives.

Complementing these, our hands-on demonstrations promise a deep dive into the latest technologies and methodologies, forging a link between academic theories and their tangible, real-world implementations. Join us for a comprehensive exploration of the future of cybersecurity.

Deloitte will invite keynote speakers to develop concise and insightful talks on a relevant cybersecurity topic and allow some time for questions and answers.

01:50 PM – 02:30 PM

Red Teaming vs. Blue Teaming

Arthur Testa - at Deloitte

 02:30 PM – 03:45 PM

Digital Wallet

Joran Frik - at Deloitte

03:45 PM – 04:30 PM

Zero Trust

Dhiren Patra - at Deloitte

04:30 PM – 05:00 PM

Cyber Awareness and Social Engineering

Nicolas Noël 
Nicolas Noël  - Director, Cyber Risk Advisory at Deloitte
Etienne Caron
Etienne Caron - Manager, Cyber Risk Advisory at Deloitte

IoT Day

9:00 AM – 9:30 AM

REGISTRATIONS

9:30 AM – 10:30 AM

The future of OT/ICS security : 3 solutions

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0?
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

9:30 AM – 10:30 AM

The future of OT/ICS security: 3 solutions

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0?
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.
TijlAtoui
Tijl Atoui - Howest Cybersecurity Teacher and Researcher in Industrial Security and Fictile Factory maintaining
David Prada

10:30 AM – 11:00 AM

Introduction to OT/ICS Security

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?

This presentation unveils Singapore’s groundbreaking initiatives in quantum key distribution (QKD) over satellite communication channels. We delve into the cutting-edge research and development efforts aimed at establishing secure quantum communication links between ground stations and satellites. Explore the technological advancements, key milestones, and the role of Singapore in pioneering quantum-secured satellite communication. Join us to learn about the implications of these initiatives for global secure communication and data encryption in the quantum age.

DavidPrada-
David Prada - Cybersecurity IT/OT researcher at Howest
Foto_Laurens
Laurens Singier - Cybersecurity IT/OT researcher, Ethical hacker at Howest
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

10:30 AM – 11:00 AM

Introduction to OT/ICS Security

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
DavidPrada-
David Prada - Cybersecurity IT/OT researcher
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

11:00 AM – 11:15 AM

COFFEE BREAK

11:15 AM – 12:30 AM

Industrial Environment Scanning and Enumeration

DavidPrada-
David Prada - Cybersecurity IT/OT researcher at Howest
Foto_Laurens
Laurens Singier - Cybersecurity IT/OT researcher, Ethical hacker at Howest
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

11:15 AM – 12:30 AM

Industrial Environment Scanning and Enumeration

  • AI in Cyber Security leverages the industrial cyber security  power of machine learning and data analysis to augment traditional security measures.
  • Zero Trust Architecture brings a new security level in OT/ICS environment.
  • How can the Industrial Metaverse help to secure our Industry 4.0 ?
DavidPrada-
David Prada - Cybersecurity IT/OT researcher
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

12:30 AM- 02:30 PM

LUNCH TIME

2:30 PM – 3:30 PM

Exploitation in an Industrial Environment

Fictile is a fast-growing fiction tile-producing company. Under the steady and continuous leadership of J.C, they are the unrivaled market leader in their sector since 2016. Their factory contains three halls. A hall with hydraulic presses, baking installation and a painting hall. To remain brand independent, the lead engineer of the factory decided to equip each hall with different types of industrial controllers. The three market leaders were chosen: Siemens, Beckhoff, and Phoenix Contact.  According to investor K.C., there is no room in the budget for cyber-security. “Production must come first.”

Can you prove them wrong, by capturing all the flags?

DavidPrada-
David Prada - Cybersecurity IT/OT researcher at Howest
Foto_Laurens
Laurens Singier - Cybersecurity IT/OT researcher, Ethical hacker at Howest
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

2:30 PM – 3:30 PM

Exploitation in an Industrial Environment

Training

  • Introduction to Industrial Control Systems
  • Basics of PLC Programming
  • Industrial Communication
  • Scanning ICS networks
  • Industrial Network & System enumeration
  • Reversing proprietary industrial protocols
  • Exploiting industrial control systems

 

Workshop

Hands on: Industrial CTF on the Fictile Factory

Fictile is a fast-growing fiction tile-producing company. Under the steady and continuous leadership of J.C, they are the unrivaled market leader in their sector since 2016. Their factory contains three halls. A hall with hydraulic presses, baking installation and a painting hall. To remain brand independent, the lead engineer of the factory decided to equip each hall with different types of industrial controllers. The three market leaders were chosen: Siemens, Beckhoff, and Phoenix Contact.  According to investor K.C., there is no room in the budget for cyber-security. “Production must come first.”

Can you prove them wrong, by capturing all the flags?

DavidPrada-
David Prada - Cybersecurity IT/OT researcher
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

03:30 PM – 03:45 PM

COFFEE BREAK

3:45 PM – 5:30 PM

Exploitation in an Industrial Environment

Lab work: Hands on – Industrial CTF on the Fictile Factory

DavidPrada-
David Prada - Cybersecurity IT/OT researcher at Howest
Foto_Laurens
Laurens Singier - Cybersecurity IT/OT researcher, Ethical hacker at Howest
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.

3:45 PM – 5:30 PM

Exploitation in an Industrial Environment

Lab work: Hands on – Industrial CTF on the Fictile Factory

DavidPrada-
David Prada - Cybersecurity IT/OT researcher
LaurensS
Laurens Singier - Cybersecurity IT/OT researcher , Ethical hacker
Kurt-c
Kurt Callewaert - Howest Valorisation Manager Digital Transformation, Former Head of Research Applied Computer Science.
Sold out

05:30 PM – 06:30 PM

Aperitif

06:30 PM – 10:00 PM

Gala Dinner at the Euro Space Center

Protection of mobile devices Day

Jeroen Beckers
Jeroen Beckers, mobile solution lead at NVISO, will do us the honor of teaching a whole-day class, divided in 4 talks, 3 sessions of exercices, a workshop, and a Q&A session.

8:30 AM – 9:00 AM

REGISTRATIONS

9:00 AM – 9:45 AM

Intelligence: balancing the human and the digital

The digital solution can contribute to the security and safety of our communications, our writings and our productions, but we must never forget the human element, its share of responsibility and its possible shortcomings. Let’s talk about it together…

French presentation

Pascal-PETRY
Pascal PETRY - Deputy General Administrator of State Security (Belgium).

09:45 AM – 10:45 AM

Introduction + [Talk] Attack surface of mobile devices / application + instructions for CTF

Introduction to the principles for attacking mobile devices, specifically Android and iOs. Introduction to reverse engineering principles, which will be applied in the subsequent exercise.

10:00 AM – 11:00 AM

[Talk] Attack surface of mobile devices / application

10:45 AM – 11:00 AM

COFFEE BREAK

11:00 AM – 12:00 AM

[Exercises] Mobile Apps reverse engineering, CTF style (Part I)

Cyber security challenges of the CTF type, focused on mobile security. To be solved in groups or on your own over 1h30. Progressive level of difficulty, from easy to difficult. Will conclude with a review of the challenges and their resolution.

NVISO Coaches

11:30 AM – 12:00 AM

[Exercises] Solution of the reverse engineering exercises

12:00 PM – 01:00 PM

LUNCH TIME

note: we expect some people will keep it short & prepare to continue play, so we’ll probably keep one NVISO person in ISS

01:00 PM – 02:00 PM

[Exercises] Mobile Apps reverse engineering, CTF style (Part I)

Cyber security challenges of the CTF type, focused on mobile security. To be solved in groups or on your own over 1h30. Progressive level of difficulty, from easy to difficult. Will conclude with a review of the challenges and their resolution.

02:00 PM – 02:30 PM

[Talk] Solution of the reverse engineering exercises

Review of techniques used by Android mobile malware, as Android is the primary target for mobile malware.

02:30 PM – 03:30 PM

[Talk] Introduction to tampering with Android apps

Review of some the techniques used to reverse engineer (Android) apps. Over one hour, the talk will focus on some of most prominent techniques. 

03:30 PM – 05:00 PM

[Exercises] Modify Android applications to disable security features or add keyloggers. Note: we will announce the break during the session, which people will be free to join

Sandbox-based analysis guided by the NVISO team.

NVISO Coaches

04:15 PM – 04:45 PM 

COFFEE BREAK

05:00 PM – 05:30 PM

[Talk] Closing thoughts: mobile security in the coming 10 years

We will among others discuss:

  • Privacy in mobile: key challenges, and the difference in philosophies of Google & Apple.
  • The challengers to Apple & Google’s mobile OS domination, from geopolitical motives to privacy concerns.
  • What lessons have OS designers drawn from advanced nation state attacks.

05:30 PM – 06:00 PM

Q&A

3:30 PM – 3:45 PM

COFFEE BREAK

Monday 04/12

08:15 AM: departure from the Mercure Hotel in Han-sur-Lesse to the Euro Space Center

08:30 AM: arrival at the Euro Space Center


05:40 PM: departure from the Euro Space Center to the Mercure Hotel in Han-sur-Lesse

06:55 PM: departure from the Euro Space Center to the Mercure Hotel in Han-sur-Lesse

Tuesday 05/12

08:25 AM: departure from the Mercure Hotel in Han-sur-Lesse to the Euro Space Center

08:40 AM: arrival at the Euro Space Center


05:20 PM: departure from the Euro Space Center to the Mercure Hotel in Han-sur-Lesse

09:05 PM: departure from the Euro Space Center to the Mercure Hotel in Han-sur-Lesse

Wednesday 06/12

08:55 AM: departure from the Mercure Hotel in Han-sur-Lesse to the Euro Space Center

09:10 AM: arrival at the Euro Space Center


05:20 PM: departure from the Euro Space Center to the Mercure Hotel in Han-sur-Lesse

Thursday 07/12

08:55 AM: departure from the Mercure Hotel in Han-sur-Lesse to the Euro Space Center

09:10 AM: arrival at the Euro Space Center


10:20 PM: departure from the Euro Space Center to the Mercure Hotel in Han-sur-Lesse

Friday 08/12

08:25 AM: departure from the Mercure Hotel in Han-sur-Lesse to the Euro Space Center

08:40 AM: arrival at the Euro Space Center