Cyberwal in Galaxia
Academy

Euro Space Center (Libin) – December 8th to December 12th, 2025

Free of charge

The Academy will take place on the Galaxia site in Transinne which, together with the European Space Agency (ESA) and the ESEC Centre in Redu (5 km away), forms a leading Space center in Europe.

800+

Participants

4th

Edition

14

Countries represented

The goal is to establish Wallonia as a hub of cybersecurity excellence,
recognized well beyond its borders, and to affirm its role as a strategic center addressing the fast-evolving needs of the international cyber ecosystem.

This program will take place at the Galaxia site in Transinne which, together with the European Space Agency (ESA) and the nearby ESEC Centre in Redu (5 km away), forms one of Europe’s leading space hubs.

At ESEC Redu, ESA has established its Cybersecurity Centre, dedicated to safeguarding the Agency’s ground infrastructures and space operations, ensuring the highest standards of cyber protection.

Located in the heart of Belgium, the Euro Space Center in Transinne is a flagship educational and scientific facility dedicated to space exploration. Each year, it welcomes around 16,000 young participants from 35 nationalities and attracts over 120,000 visitors with its interactive exhibitions and immersive experiences. Combining education, outreach, and innovation, it has become a European benchmark for space awareness.

Speakers

The organizers’ objective is to position these courses as a benchmark in high-level education on a European scale, while ensuring a direct connection with the real and evolving needs of the cyber ecosystem. By inviting renowned speakers and experts from academia, companies, and public institutions, the program guarantees both academic excellence and practical relevance, preparing participants to meet tomorrow’s cybersecurity challenges.

Burcu Özkaptan

Head of Telecommunication and Navigation

Telespazio Belgium

La sécurité informatique à l’ère quantique

Christian Mack

Professor of Montreal University

Université de Montréal

La sécurité informatique à l’ère quantique

Cristel Pelsser

Professor

UCLouvain

La sécurité informatique à l’ère quantique

Emmanuelle de Foy

First Counsellor
Directorate General for Multilateral Issues

Federal Public Service (FPS) Foreign Affairs

Unit M4 Global Governance

La sécurité informatique à l’ère quantique

Giulia Rinaldi

Cyber Data Engineer Part of the Innovation & Product Policy Secure Communication and Information Systems Thales Belgium

Thales Belgium

La sécurité informatique à l’ère quantique

Laurens D'hooge

Postdoctoral researcher

IDLab-imec

La sécurité informatique à l’ère quantique

Maxime Gennart

Legal Advisor

Belgian Data Protection Authority

La sécurité informatique à l’ère quantique

Merlijn Sebrechts

Senior Researcher

Imec – Ghent University

La sécurité informatique à l’ère quantique

Mohamed Boukhebouze

AI Product Manager

EarthLab Luxembourg

La sécurité informatique à l’ère quantique

Phédra Clouner

Deputy Director general

Centre for cybersecurity Belgium

La sécurité informatique à l’ère quantique

Philippe Massonet

Scientific Coordinator

CETIC

La sécurité informatique à l’ère quantique

Yvan De Mesmaeker

Secretary General

European Corporate Security Association – ECSA

La sécurité informatique à l’ère quantique

Stay tuned. More speakers to be announced soon!

Our Program for the 5 days

Over the course of five days, participants will benefit from a balanced mix of theoretical insights and practical training sessions, designed to combine knowledge acquisition with hands-on experience.

To encourage networking and informal exchanges, morning and afternoon breaks are scheduled each day, providing the opportunity to connect with peers, speakers, and experts.

The program still holds exciting surprises in store for you. Stay tuned further details about the program will be available soon.

  • Day 1

    Monday 08/12

  • Day 2

    Tuesday 09/12

  • Day 3

    Wednesday 10/12

  • Day 4

    Thursday 11/12

  • Day 5

    Friday 12/12

Institutional day

The opening day of the Cyberwal in Galaxia Academy aims to provide a comprehensive and structured panorama of cybersecurity, combining institutional, organizational, European, international, and strategic perspectives. Each contribution will follow a common thread: understanding how cybersecurity, beyond its technical dimension, has become a central issue of governance, sovereignty, and resilience for our societies.

Cybersecurity can no longer be regarded as an isolated field. It now permeates organizational governance, national regulation, European cooperation, international competition, the protection of fundamental rights, and global security.

Starting from regional challenges and extending to national and European perspectives, participants will discover how leading institutions are defining priorities, shaping skills, and establishing the frameworks needed to strengthen collective resilience. Through these complementary perspectives, the opening day will highlight both the challenges to be addressed and the solutions already underway, while outlining the path toward a shared maturity that is essential for building a stronger cybersecurity ecosystem, better prepared to face tomorrow’s threats.

Welcome & Registration

Luxembourg Cybersecurity Factory

Pascal Steichen (Luxembourg House of Cybersecurity)

Auditorium

The Luxembourg Cybersecurity Factory (LCF) is set to become a groundbreaking hub for collaboration, enabling the seamless collection, analysis, and sharing of critical cybersecurity data—from threat intelligence and vulnerabilities to the effectiveness of protective measures. Designed as an open cybersecurity data space, the LCF will integrate advanced data tools, a dedicated Open Source Program Office (OSPO), and robust governance frameworks to strengthen risk mitigation across sectors.

This initiative will empower organisations, especially SMEs, to develop innovative, autonomous cybersecurity solutions, fostering a vibrant ecosystem of data, tools, and real-world applications. In a second phase, the LCF will expand its partnership with the Luxembourg AI Factory (L-AIF), integrating AI capabilities to further enhance its impact.

By attracting cybersecurity data providers to contribute their datasets and supporting data curation for AI applications, Luxembourg aims to position the LCF as a global leader in open-source-driven cybersecurity innovation.

This initiative will empower organisations, especially SMEs, to develop innovative, autonomous cybersecurity solutions, fostering a vibrant ecosystem of data, tools, and real-world applications. In a second phase, the LCF will expand its partnership with the Luxembourg AI Factory (L-AIF), integrating AI capabilities to further enhance its impact.

By attracting cybersecurity data providers to contribute their datasets and supporting data curation for AI applications, Luxembourg aims to position the LCF as a global leader in open-source-driven cybersecurity innovation.

Pascal Steichen
Pascal Steichen - CEO
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

What is the current situation on implementing (international) rules in the cyberspace

Emmanuelle de Foy (Federal Public Service (FPS) Foreign Affairs

Unit M4 Global Governance)

Auditorium

We are familiar with the off-line world, our material world, managed by rules and laws. When it comes to the online world (and more and more parts of our lifes go online, work, leisure, information, orders, bookings…), who are the actors and how are they behaving ? What is important or crucial ? What is allowed or not allowed ? How can you react ? These issues have been discussed in the United Nations since 1998. The presentation will deal with 2 sets of negotiations that are actually typifying the state of the world. The negotiations on a international framework on ICT will show the rivalry between democracies and autocracies and the weight of the Global South. The second negotiation will show even more precisely the rivalry about the conceptions of the applicable law and the values such as the protection of human rights). The presentation will quickly deal with other lines of efforts at the level of the European Union, the OSCE and the NATO.

Emmanuelle de Foy
Emmanuelle de Foy - First Counsellor & Directorate General for Multilateral Issues
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Coffee break

How to improve cybersecurity ? The Belgian approach!

Phedra Clouner (Centre for Cybersecurity Belgium)

Auditorium

During her presentation, Phédra Clouner will discuss how Belgium has implemented initiatives to make the country one of the least cyber-vulnerable countries in Europe.

She will review the role played by the national cyber security agency, the CCB, in the Belgian landscape.

She will discuss the types of threats facing the country and how these threats have evolved in line with changes in the geopolitical context and the emergence of new technologies.

She will then detail the actions put in place to counter these threats for different target audiences, as well as the governance that supports them, specifying concepts and their implementation, such as Active Cyber Protection, Cyberfundamentals, spearwarning, the involvement of the population in its own protection, etc.

She will also discuss how the various European regulations have been implemented by the CCB.

Phédra Clouner
Phedra Clouner - Deputy Director General

The Digital Wallonia cybersecurity strategy: achievements and next steps

Jeremy Grandclaudon (ADN)

Auditorium

The Walloon Region’s Digital Wallonia strategy is the cornerstone of its digital transformation, aiming to foster innovation, economic growth, and societal resilience through technology. Within this framework, cybersecurity is a major pillar, ensuring trust and security across all digital initiatives. Our cybersecurity projects drive this ambition by supporting SMEs, strengthening private and public infrastructures, and aligning with European directives such as NIS2 or CRA . Its approach combines awareness campaigns, skills development, and practical tools

Jeremy-Grandclaudon-program
Jeremy Grandclaudon - Senior Cybersecurity Expert for Agency for Digital

Lunch

NIS2, Who must act to ensure cybersecurity protections?

Georges Ataya (Solvay Brussels School of Economics and Management)

Auditorium

The rapid evolution of digital threats highlights the persistent weaknesses of many companies, often unprepared to meet the requirements of the NIS2 directive. This new regulation directly engages business leaders, who must integrate cybersecurity into their governance. It also opens new opportunities for experts and students, whose skills are now essential to digital resilience. Finally, it mobilizes digital managers and entrepreneurs as key drivers of lasting change toward a shared culture of security.

Georges Ataya - Cyberwal in Galaxia Academy 2025
Georges Ataya - Professor

Security and Compliance: Cybersecurity at the Heart of the Right to Data Protection

Maxime Gennart (Belgian Data Protection Authority)

Auditorium

Security is not a mere technical requirement; it is an essential component of responsibility and trust in digital environments.

The fundamental right personal data protection and cybersecurity are two sides of the same coin.

As the authority supervising and enforcing this right, the Data Protection Authority (DPA) plays a central role in promoting safe digital environments.

This presentation will first explore the DPA’s role in cybersecurity. It will then address the obligations arising from the principle of data confidentiality and security (Article 32 of the GDPR), as well as those linked to data protection by design and by default (Article 25).

These concepts will be illustrated with concrete examples drawn from use cases, demonstrating how these legal principles are translated into effective security practices.

Maxime Gennart
Maxime Gennart - Legal Advisor

Coffee break

How Cyber Security fits into Global Corporate Security

Yvan De Mesmaeker (European Corporate Security Association – ECSA )

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Yvan De Mesmaeker - Secretary General

Forging resilience: Cyber defense in a shifting hybrid landscape

Général Pierre Ciparisse (Cyber Force)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

GenMaj-CIPARISSE-official
Pierre Ciparisse - Major General

Q&A

Général Pierre Ciparisse

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Général Pierre Ciparisse - Cyber Command

Cyber & AI Day

This day of the Cyberwal in Galaxia Academy explores the latest advancements in artificial intelligence (AI) as applied to cybersecurity and secure communications.

The day begins with an introduction to AI’s role in these critical fields, followed by presentations on innovative projects such as AIDE. Then, a session will explore how different types of AI technologies can be used to automatically generate cybersecurity functional and penetration tests, for both black box and white bow testing.

The agenda includes discussions on securing radio frequency (R/F) communications, protecting machine learning models for unmanned vehicles, and the latest developments in homomorphic encryption. Leading experts from institutions and companies—including UCLouvain, UNamur, Cetic, Multitel, imec/IDLab, Thales and Telespazio, will share their expertise and solutions.

The program also features sessions on explainable and trustworthy AI, as well as networking opportunities to encourage collaboration. The event aims to provide a holistic view of the opportunities and challenges in leveraging AI for modern cybersecurity, fostering innovation and knowledge exchange.

Welcome & Registration

Introduction to the 'AI day’

Jonathan Pisane (Thales Belgium) and Philippe Massonet (CETIC)

Auditorium

The introduction to the AI day will, afetr a brief introduction to the topic of AI for Cybersecurity, explain the objectives of the day, introduce the program and the speakers of the day. 

Pisane Jonathan
Jonathan Pisane - Innovation & Product Policy Manager
Philippe Massonet - Scientific Coordinator

Overview of the use of AI in cyber

Laurens D’Hooge (IDLab-imec)

Auditorium

Dr. D’hooge’s presentation will be divided in two parts: a plunge into the current research landscape where AI is applied to cybersecurity and an overview of the AIDE project which aims at a platform for secure, federated machine learning.
The first part will cover the state-of-the-art in topics such as network intrusion detection and malware detection as well as a host of other topics where machine learning (ML) is being leveraged to solve cybersecurity issues. The talk will include guidelines on solid ML experiment design and evaluation to reach more reliable and reproducible results with a key focus on the importance of model generalization.

Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

Presentation of the AIDE project

Laurens D’Hooge (IDLab-imec)

Auditorium

The second part will dive deep into imec’s role as integrator for the AIDE project, financed by FOD Bosa to research and develop secure infrastructure in academia for Belgian companies to jointly train and evaluate machine learning models without sharing data in a federated manner.

Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

AI-powered tools and cybersecurity: the role of prompting

Vassili Joannidès de Lautour (Parma University)

Auditorium

With the development of LLMs, generative AI has been democratised, making prompting the new must-have skill. According to an OpenAI study, 80% or generative AI users believe they know how to prompt but do not. 15% can write decent, yet incomplete and insecure prompts whilst only 5% have a perfect command of prompting. This has caused the occurring of a number of loopholes for cybersecurity, some whereof are covered in this presentation. In the first place, It is no longer needed to have a good command of coding, prompting may suffice. Secured systems may be vulnerable to well-designed prompts, a new generation of hackers. Secondly, prompt amateurs may not be able to discern hallucination and other AI-generated creations whilst engineers would. Thirdly, AI-powered tools may be vulnerable if they are not secured through some basic tools (APIs, tokens, etc.) Fourthly, the prompt at the core of AI-powered tools may be vulnerable, if they are misconceived (loose instructions, no fallback mechanisms, no reflexivity, etc.) 

Vassili JDL - Program - Cyberwal in Galaxia Academy 2025
Vassili Joannidès de Lautour - Consultant in AI for education and affiliate professor

Coffee break

AI-powered tools and cybersecurity: tests generation

Xavier Devroey (Unamur), Martin Vivian (UCLouvain) and Guillaume Ginis (CETIC)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Automated test case generation using search algorithms
Automated test case generation is a powerful technique to improve software quality while reducing validation costs. This talk explores how search-based algorithms can be leveraged to generate effective test suites, drawing on insights from recent research. We begin by introducing the fundamentals of search-based testing, illustrated through tools like EvoSuite and Pynguin, which optimize coverage criteria to produce high-quality tests. We then show how these algorithms can be specialized to detect specific fault types, such as API misuse or integration errors between classes. These approaches combine static analysis with targeted search heuristics to narrow the test space to critical code regions, enhancing fault detection precision and efficiency. Finally, we discuss how search algorithms can be dynamically tuned to focus on particular scenarios, such as Python C-extensions or complex inter-class interactions in Java, opening new avenues for adaptive and context-aware test generation.
Xavier-Devroey-programme
Xavier Devroey - Professor of Software Engineering, NADI
Improving Protocols Fuzzing

For many proprietary systems source code and documentation are not available which makes them hard to test leaving only black-box approaches. In this work, we present an experience of fuzzing a protocol for drone control and the developed tool BinFuzz. BinFuzz is a man-in-the-middle stateful black-box protocol fuzzer. Listening to real communication as a man-in-the-middle, the fuzzer reconstructs states of the protocol as well as detects message types and their variable fields. The collected knowledge is used during the fuzzing to improve the quality of the generated inputs. For the application, we first test BinFuzz on an FTP protocol and then use it to fuzz the protocol for drone control.

Martin-Viviant
Martin Vivian - Research Assistant
LLMs White Hat Hacker
This study explores the potential use of Large Language Models (LLMs) in supporting the development of penetration test scripts. The research was conducted in two phases: exploration and comparison. In the exploration phase, we gained insights into the strengths and weaknesses of LLMs and learned how to develop prompts for satisfying results. In the comparison phase, a rigorous comparaison was made between various online and local LLMs and various use cases.
Guillaume Ginis - Cyberwal in Galaxia Academy
Guillaume Ginis - Senior Researcher in Cybersecurity

Automating Security Testing for Critical Systems: Insights from CYRUS & CRESCENDO

Christian Mack (Guardis SRL)

Auditorium

Cyber-physical systems in sectors such as defense, energy and transportation must operate under strict safety and availability constraints, while facing growing cyber-threats and regulatory pressure (NIS2, CRA, IEC 62443). Traditional security assessments are often too slow, costly and difficult to reproduce in these contexts.

This presentation introduces a risk-based, automated testing platform developed through the CYRUS (2021–2023) and CRESCENDO (2023–2025) projects. The approach integrates leading standards and frameworks (PTES, NIST SP 800-115, MITRE ATT&CK for ICS) to provide reusable workflows covering asset discovery, protocol fingerprinting (Modbus, CAN, BACnet) and controlled exploit validation. A proof-management process ensures full traceability and auditability.

Applied to representative critical infrastructures, the solution has demonstrated significant business and technical benefits. It reduces audit preparation time, accelerates re-testing cycles, and improves remediation prioritization. At the same time, it expands attack-surface coverage, strengthens vulnerability-to-asset correlation, and produces reproducible reports aligned with ISO/IEC 27001 and IEC 62443.

The talk will also highlight remaining challenges — support for proprietary protocols, SBOM/VEX integration, and enhanced incident-reporting workflows and discuss perspectives for industrial adoption.

Christian Mack
Christian Mack - COO

Lunch break

AI for secure R/F communications: industrial approach

Burcu Özkaptan (Telespazio)

Auditorium

Our project presents a prototype of a Positioning, Navigation, and Timing (PNT) user equipment that integrates 4G and GNSS technologies to deliver highly reliable navigation capabilities for safety-critical applications, even under hostile environmental conditions or signal interference. The hybrid system is designed to enhance the performance and resilience of autonomous vehicles, particularly in urban environments where GNSS reliability is compromised due to superstructures and 4G networks are dense, and in rural environments where the mobile networks are scarce. Key use cases include autonomous docking in ports and autonomous ground vehicles in airports, both of which demand high safety standards and benefit from mobile network deployments. Besides positioning hybridization of GNSS with 4G mobile networks, the prototype uses machine learning techniques on both spectra for interference detection and classification, and signal processing algorithms for interference mitigation and features intelligent sensor switching based on signal quality indicators. A machine learning-based system assesses signal integrity in the spectrum of interest and recommends optimal PNT sources, ensuring robust navigation outputs for vehicle systems. The solution is compact and suitable for integration into UAVs, supporting future applications in urban air mobility and infrastructure monitoring. The PNT solution is reliable, robust and secure in the presence of interferers, and it is suitable for safety critical applications even in case of hostile environment conditions or attacks on the GNSS or mobile bands.

burcu-program - Cyberwal in Galaxia Academy 2025
Burcu Özkaptan - Head of Telecommunication and Navigation

Explainable & Trustworthy AI

Luca La Fisca (Umons/Trail/ARIAC), Giulia Rinaldi (Thales): Trustworthy AI & Nicolas Sournac (Multitel): Explicability of AI, TRAIL (Trusted AI Labs)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Advancing Trusted AI Through Collaborative Research: The TRAIL Ecosystem
 
TRAIL (Trusted AI Labs) is the French-speaking Belgium research ecosystem that brings together universities, research centers and industry partners to foster excellence and innovation in Artificial Intelligence. This presentation will offer an overview of TRAIL’s mission, structure and impact, with a specific focus on research topics related to Trusted AI. These include explainable AI (XAI)privacy-preserving machine learningrobustness, and human-centric AI design.
This talk will outline how TRAIL supports collaborative, interdisciplinary projects that address real-world challenges across sectors such as healthcare, industry, energy, and digital transformation. Special attention will be given to the role of the TRAIL Summer Workshop, a flagship two-week program where researchers co-develop AI solutions in mixed teams.
By strengthening cooperation between Belgian institutions and international partners, TRAIL aims to accelerate the development of reliable, transparent and responsible AI systems while building a vibrant community of researchers dedicated to shaping the future of trustworthy AI.
Keywords: Trusted AIExplainable AIFederated LearningRobustnessHuman-AI Interaction.

Luca La Fisca
Luca La Fisca - Project Liaison Officer
From Black-Box to Trust: Designing Explainable AI Pipelines with EX-DSS
Artificial Intelligence is increasingly embedded in Decision Support Systems, yet many organizations still struggle to adopt these tools due to limited transparency, inconsistent data reliability, and insufficient user trust. Traditional solutions often provide powerful automation but offer little visibility into how models are built, evaluated, or selected—leaving decision makers uncertain about the validity of AI-driven recommendations.
This dissertation presents EX-DSS, a trustworthyuser-centered framework for designing and deploying AI pipelines in time series forecasting, with applications in the energy domain. EX-DSS integrates transparent model selectionexplainable pipeline configuration, and traceable decision steps within an intuitive interface. Through its modular structure, the system empowers both practitioners and technical users to explore alternatives, understand model behavior, and collaborate effectively.
By emphasizing explainabilitytraceability, and human-in-the-loop interaction, EX-DSS enhances confidence in AI-supported decisions and improves operational efficiency in real-world forecasting tasks. The framework is flexible enough to be extended to other domains where trustworthy AI is essential, such as healthcare and finance.
Future work will focus on integrating real-time data capabilitiesprivacy-preserving mechanisms, and educational modules to further strengthen trust and usability.
Giulia Rinaldi
Giulia Rinaldi - Cyber Data Engineer Part of the Innovation & Product Policy Secure Communication and Information Systems Thales Belgium
Securing AI Systems: Understanding and Mitigating Adversarial Attacks

As deep learning models are increasingly deployed in safety-critical applications, their vulnerability to adversarial attacks raises major concerns for system security. These attacks exploit the sensitivity of neural networks to input perturbations, leading to severe model failures. This presentation will introduce the fundamental principles behind adversarial example generation, detailing common threat models and attack algorithms. We will also examine their practical impact through illustrative cases in computer vision and natural language processing, highlighting the security implications for real-world AI systems. Finally, the talk will discuss current state-of-the-art defenses, including adversarial training and formal verification techniques.

Nicolas Sournac
Nicolas Sournac - AI Research Engineer

Confidential ML for unmanned vehicles (securing ML models from extraction)

Merlijn Sebrechts (imec/IDLab) & Laurens D’Hooge (IDLab-imec)

Auditorium

Machine learning models and other software on Unmanned Vehicles (UVs) are not safe. It’s often trivial for adversaries with physical access to extract the models on a device. This risks theft of intellectual property and can even help adversaries develop countermeasures to “fool” or hijack AI models. While confidential computing is a promising technology to protect data and models while they’re in use, the hardware in most UVs does not actually support modern confidential computing solutions. This talk will investigate the confidential computing solutions of commercial off-the-shelf hardware in UVs, show off a demo taking advantage of these features, and take a peek into the future of confidential computing for UVs.

merlijn-sebrechts
Merlijn Sebrechts - Senior Researcher
Laurens Dhooge
Laurens D'hooge - Postdoctoral researcher

Coffee break

Secure Federated Learning with Model Compression, Knowledge Distillation and Fully Homomorphic Encryption

Xavier Lessage (Cetic)

Auditorium

Breast cancer remains a major health risk, especially when diagnosed late. The presentation explores innovative techniques to improve detection while keeping patient data secure. By using Federated Learning (FL), hospitals can collaborate without sharing sensitive data directly. To enhance both performance and security, we introduce a two-way knowledge distillation approach, called inverse distillation, where student and teacher models learn from each other. Combined with full homomorphic encryption (HE), this allows compact neural networks to be securely transmitted and trained across institutions. HE is a good countermeasure for several known threats to FL such as Privacy Inference / Data Reconstruction Attacks (Confidentiality), Collusion Attacks (Integrity & Confidentiality) or Tampering / Model Poisoning (When Integrated with Robustness).
 
Experiments with FL and HE on mammography images from a Belgian hospital show better accuracy in distinguishing malignant from benign tumors, while fully protecting patient data and leveraging frugal AI principles, opening new possibilities for secure, collaborative, and resource-efficient AI in healthcare.

XavierLessage-hr
Xavier Lessage - An expert research engineer in the Data Science department

Homomorphic ciphering: industrial approach

Mohamed Boukhebouze (Earth Lab Luxembourg)

Auditorium

Earth Observation (EO) data are increasingly critical in sensitive domains such as defense, border surveillance, and critical infrastructure monitoring. These datasets are not only voluminous (e.g., multispectral to hyperspectral and SAR imagery) but also frequently classified, sovereign, and geographically dispersed across satellites, ground stations, cloud, edge, and HPC infrastructures. This fragmentation introduces significant cybersecurity risks: data interception, unauthorized access through API vulnerabilities, AI model attacks (e.g., backdoors, gradient inversion), and leakage via insecure multi-tier storage or misconfigured services. To address these challenges, this talk presents the design and practical implementation of Federated Learning (FL) within EarthLab’s Max-ICS platform (https://www-max-ics.earthlab.lu/), enabling secure, distributed EO data processing in sensitive environments. FL allows multiple stakeholders, such as defense ministries, space agencies, and interoperable coalitions (e.g., NATO, EU), to collaboratively train AI models without centralizing sensitive data, preserving sovereignty and reinforcing trust across organizations. Beyond data decentralization, we also explore how Homomorphic Encryption (HE) can be integrated into the FL workflow to ensure end-to-end confidentiality of exchanged model parameters and gradients. By allowing computations directly on encrypted data, HE strengthens privacy guarantees, preventing information leakage during model aggregation or communication phases. The presentation will discuss the architectural integration of HE into Max-ICS, the trade-offs between performance and security, and lessons learned from practical testing. We will conclude with a roadmap toward resilient, scalable, and trustworthy AI architectures for secure Earth Observation ecosystems.

Mohamed Boukhebouze
Mohamed Boukhebouze - AI Product Manager

Ending session

Jonathan Pisane (Thales Belgium) and Philippe Massonet (CETIC)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pisane Jonathan
Jonathan Pisane - Innovation & Product Policy Manager
Philippe Massonet - Scientific Coordinator

Quantum Technology and Cybersecurity

This session of the Cyber and Quantum Day program explores the transformative impact of quantum technologies on secure communications and their implications for cybersecurity.

The event will begin with a technical exploration of Quantum Key Distribution (QKD), providing attendees with a solid foundation for understanding its critical role in securing communications against quantum threats.

The agenda continues with presentations on the latest breakthroughs in QKD networks, highlighting both theoretical models and practical deployments. Experts will also explore the integration of QKD with Post-Quantum Cryptography (PQC), examining hybrid approaches to achieve robust and scalable quantum-safe solutions.

A panel discussion will convene leading voices from academia, industry, and critical infrastructure sectors to address the challenges and opportunities of building quantum-secure communications.

This exchange will consider technical, economic, and regulatory perspectives, with a focus on the concrete steps required to prepare for a quantum-resilient future. Finally, the day will conclude with an exclusive visit to the Gilles Brassard Quantum Cryptography Lab, an open research platform dedicated to advancing secure communications in the quantum era.

By bringing together experts from institutions and companies—including Università di Padova, Université de Liège, Multitel, Starion, and Thales—the event fosters collaboration, knowledge exchange, and innovation.

The Cyber and Quantum Day aims to provide a holistic view of the opportunities and challenges in leveraging quantum technologies to transform secure communications, paving the way toward a trusted digital future.

Welcome & Registration

Introduction to the 'quantum day'

Serge Habraken (CSL)

Auditorium

This presentation explores the fundamental concepts behind Quantum Key Distribution (QKD) and the challenges arising from its implementation in spatial contexts. The first part introduces the theoretical foundations of QKD, providing an overview of its operating principles. It covers key ideas such as the growing threat posed by quantum computers, the basics of modern cryptography, and the quantum mechanics principles relevant to QKD. The second part adopts a more technological perspective, presenting the hardware and systems required to exchange quantum keys and discussing several approaches to building these resources. Overall, this presentation aims to provide a clear introduction to QKD, accessible to an audience without prior background in the field.

Serge-Habraken
Serge Habraken - President of the Board of Directors

Technical introduction to QKD

Serge Habraken (CSL)

Auditorium

This presentation explores the fundamental concepts behind Quantum Key Distribution (QKD) and the challenges arising from its implementation in spatial contexts. The first part introduces the theoretical foundations of QKD, providing an overview of its operating principles. It covers key ideas such as the growing threat posed by quantum computers, the basics of modern cryptography, and the quantum mechanics principles relevant to QKD. The second part adopts a more technological perspective, presenting the hardware and systems required to exchange quantum keys and discussing several approaches to building these resources. Overall, this presentation aims to provide a clear introduction to QKD, accessible to an audience without prior background in the field.

Serge-Habraken
Serge Habraken - President of the Board of Directors

Coffee break

Space-based Quantum Key Distribution

Francesco Vedovato (University of Padova & ThinkQuantum s.r.l.)

Auditorium

The idea of exploiting satellites to realize a global Quantum Key Distribution (QKD) network took shape in the early 2000s. After the first pioneering demonstrations—showing the feasibility of different encodings over satellite-to-ground channels—the efforts of the Chinese Academy of Sciences culminated in multiple satellites in orbit and the successful realization of space-based QKD. In parallel, Europe—under the coordination of the European Space Agency (ESA)—has advanced mission studies and started several initiatives, including the Eagle-1 satellite and the SAGA constellation, planned for deployment in the coming years.
This talk will present a historical overview of the development of space-based QKD, as well as the goals and challenges of the upcoming ESA missions, and will benefit from the speaker’s direct involvement in R&D across academia and industry since 2015.

Francesco Vedovato - Cyberwal in Galaxia Academy 2025
Francesco Vedovato - Assistant Professor @ Department of Information Engineering & Co-founder and product developer

Thesis in QKD

Selim Chaabani (ULiege), Antoine Groulard (ULiège and CSL) & Fatou Diao (multitel)

Auditorium

The PhD thesis of Selim Chaabani focuses on the development of single-photon sources for quantum key distribution (QKD), a key technology for secure communications. This work explores both the theoretical and experimental aspects of designing reliable single-photon emitters, with a long-term vision towards applications in space-based quantum networks. The presentation will outline the main stages of the development of one of these sources — from theory to laboratory implementation — and will include some preliminary experimental results.

Selim Chaabani
Selim Chaabani - PhD Student

Antoine Groulard’s PhD thesis focuses on the interaction between laser photons and the atmosphere of the Earth to enable space Quantum Key Distribution (QKD). Currently limited to theoretical studies, Antoine aims to test his atmospheric interaction model in a large-scale experiment in the following years. This presentation will focus on the description of the model and how it can help to implement space Quantum Key Distribution.

Antoine Groulard
Antoine Groulard - PhD Student

This presentation introduces the practical implementation of a Quantum Key Distribution (QKD) system based on the BB84 protocol, designed as a compact and robust demonstrator. The setup establishes a secure key exchange between Alice and Bob using attenuated laser pulses and polarization encoding transmitted through optical fibers equipped with LiNbO₃ phase modulators. The system currently achieves a quantum bit error rate of 2–5% and a secure key rate ranging from 1 to 10 kbit/s, reflecting both its stability and operational constraints. Once generated, the quantum keys are securely stored and can be integrated into classical infrastructures for various applications—for example, enabling encrypted communication over a VPN channel.

Fatou Diao - Quantum Cybersecurity Researcher
Fatou Diao

Spontaneous presentation of the public activities

Fatou Diao

Auditorium

The activity involves a spontaneous presentation of public activities, allowing participants to volunteer and present their activities related to quantum-resilient communications or, more generally, to cybersecurity in a friendly atmosphere. The organizers hope this will encourage networking among participants during the lunch break scheduled afterward.”

Fatou Diao

Lunch

INT-UQKD: challenges, achievements, and new goals

Patrick Renaux (Starion Luxembourg S.A (Starion Group))

Auditorium

INT-UQKD project started in September 2022, building and operating an interoperable terrestrial and space QKD network, capable of delivering a cost-efficient quantum-safe solution able to support multiple use cases.

In operating the terrestrial link since august 2023 Starion Luxembourg and its partners have gain practical experience paving the way to future development in Europe towards an agnostic quantum-safe service platform capable of operating across multiple QKD system solutions on a global scale.

Patrick Renaux
Patrick Renaux - Senior Cybersecurity Architect

Cybersecurity: the reverse side of the quantum-computing medal

Werner Coomans (Bell Labs DMTS, Nokia)

Auditorium

Quantum computers give rise to tremendous opportunities in terms of scientific discoveries, able to solve problems out of reach of even the most powerful classical supercomputers. However, there is also a downside: quantum computers will also be able to crack a large family of cryptographic algorithms, which today are used all over the internet. This talk will explain why the threat is already real today, and why it’s of paramount importance to start the migration to quantum-safe primitives as soon as possible. It will give an overview of the solution landscape with a focus on networking, introduce core concepts of the migration journey, and address the role of telecommunication networks in the largest cybersecurity migration in human history.

Werner Coomans_2025_small
Werner Coomans - Technology Advisor

Coffee break

Post-quantum cryptography: context and actions

Sarah Ampe (EY)

Auditorium

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against the potential threats posed by quantum computers. Unlike traditional systems based on RSA or ECC, which rely on mathematical problems that quantum algorithms can solve efficiently, PQC is built on hard problems that remain resistant even in the quantum era. As quantum computing advances, the urgency to transition to quantum-safe cryptographic standards grows. This presentation will provide a clear overview of PQC, its foundational principles, and the current landscape of standardization efforts led by organizations like NIST. We will then explore the challenges and strategies involved in migrating existing systems to PQC, including hybrid approachesrisk assessments, and implementation timelines. Attendees will gain insight into how to prepare their infrastructure for a quantum-resilient future.

Sarah Ampe
Sarah Ampe - Manager Digital Risk

QKD solutions and quantum-safe alternatives: Comparison or Combination?  

Jean Lienardy (the Royal Military Academy)

Auditorium

As quantum computing capabilities advance, two complementary approaches are emerging for protecting communications: post-quantum cryptography (PQC), which relies on new mathematical hardness assumptions and runs on classical devices, and quantum key distribution (QKD), whose security is rooted in quantum physics – hence promising information-theoretic security – yet requiring specific hardware. These solutions are based on substantially different paradigms and offer various levels of assurance. Between the ends of this spectrum lie additional classical quantum-safe techniques, which trade usability features for stronger security guarantees.

We critically compare these paradigms from the point of view of security claims (assumptions, provable-security models), performance (latency, throughput), cost and maturity (standards, hardware, operations), and deployment constraints (distance, infrastructure, interoperability).

We clarify where each approach excels and where limitations hinder their global adoption, such as the long-term cryptanalytic uncertainty for PQC (harvest-now-decrypt-later risk) or the authentication problem for QKD.

Finally, we will discuss if and how QKD could interact with PQC solutions in a secure cryptosystem, addressing multiple challenges including the end-to-end security chain, trust assumptions, and ways to achieve hybridisation.

Jean-Liénardy-Speaker
Jean Lienardy - Researcher in Cryptography

Panel discussion

Joachim Vererfven (Proximus), Francesco Vedovato (University of Padova & ThinkQuantum s.r.l.), Olivier Croix (Thales Be) & Werner Coomans (Bell Labs DMTS, Nokia)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Joachim Vererfven
Joachim Vererfven - Solution Engineer
Francesco Vedovato - Cyberwal in Galaxia Academy 2025
Francesco Vedovato - Assistant Professor @ Department of Information Engineering & Co-founder and product developer
Olivier Croix - bio 2025
Olivier Croix - Cyber Product Line Manager
Werner Coomans_2025_small
Werner Coomans - Technology Advisor

Closing session

Jonathan Pisane (Thales)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Pisane Jonathan
Jonathan Pisane - Innovation & Product Policy Manager

Visit of Quantum lab

Antoine Dierick (Thales)

Auditorium

The activity involves a spontaneous presentation of public activities, allowing participants to volunteer and present their activities related to quantum-resilient communications or, more generally, to cybersecurity in a friendly atmosphere. The organizers hope this will encourage networking among participants during the lunch break scheduled afterward.”

Cyber protection in practise

This conference day spotlights cybersecurity in action. From threat monitoring, incident management, and workforce training to data securitization, ethical hacking, and the protection of national assets, the focus is on how organizations execute security in practice. We explore Europe’s evolving digital identity under eIDAS II and close with insights on sovereign cloud solutions in Belgium and Luxembourg—where sensitive data meets trusted AI.

Welcome & Registration

Protecting systems by anticipation - ISAC operations

Alexandre Dulaunoy (CIRCL)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

A-Dulaunoy
Alexandre Dulaunoy - Head of CIRCL

Increase resilience by training and deep rehearsal of cyber crises

Vincent Defrenne (NVISO)

Auditorium

What makes the difference between days and weeks of recovery time? Beyond the obvious controls, there is the quality of the response: being prepared; understanding roles, responsibilities and communication flows in the context of a crisis; having plans that not only exist, but are also usable. But beyond plans, there is experience. We will discuss how you build experience without going through the trauma of a cyber attack, through exercises. How you build knowledge of the plans, an intuition of how an incident unravels, what sort of questions you will need to solve, so that you have structure and peace of mind when disaster hits. We’ll discuss how to organize exercises to train your teams, key success criteria, typical scenarios and concrete tips & tricks to run cyber exercises that makes your organization better prepared.

Vincent Defrenne
Vincent Defrenne - Partner Cyber Strategy & Architecture

Coffee break 

Ethical Hacking or how to stress test your cyber safety

Clément Laurens (CRESCO)

Auditorium

During this presentation, we will explore the world of cybersecurity through a live hacking demonstration, aimed at illustrating the methods used by hackers to infiltrate a system and the means of protecting against them. This demonstration will provide a better understanding of attack mechanisms, but above all, best practices for defence. We will then present the current figures and trends in the sector: the explosion in the number of cyberattacks, the rise of phishing and ransomware, and the boom in the global cybersecurity market, estimated to be worth several hundred billion pounds. We will also highlight the growing demand for specialists capable of anticipating and countering these threats. This presentation aims to raise awareness of the importance of digital security and to show that vigilance and prevention are the best defences against IT risks.

Clément Laurens - Co-founder

Lunch

Safeguarding national data for better & safely exploiting it

Bert Verdonck (LNDS)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

Bert Verdonck
Bert Verdonck - CEO

Managing European digital identity and related attributes under eIDAS2

Thomas Kopp (LuxTrust)

Auditorium

The presentation focuses on the management of identities and trust services under the European eIDAS Regulation in order to enable digital services and to protect users against fraud. It particularly comprises new trust services and aspects originating from the 2024 amendment of the eIDAS Regulation. The speech also highlights compliance obligations from the perspective of a European Qualified Trust Service Provider and specific security measures and provisions put in place by LuxTrust based on its more than 20 year experience in the cybersecurity domain.

Thomas Kopp - Chief Scientist

Coffee break 

Using AI on sensitive data through disconnected sovereign cloud

Pascal Rogiest (Clarence)

Auditorium

As AI becomes central to data-driven innovation, organizations face a paradox: how to harness its power while protecting their most sensitive information. Disconnected sovereign clouds offer a unique answer — enabling secure AI processing within fully isolated, jurisdiction-controlled environments. This talk will explore how such infrastructures reconcile data sovereignty, compliance, and operational efficiency without compromising performance. Real-world examples from Clarence, Luxembourg’s operational disconnected sovereign cloud, will illustrate concrete use cases and governance models. Participants will leave with a clear view of how to deploy AI responsibly, even on the most sensitive datasets.

Pascal-lux
Pascal Rogiest - General Manager

Sold out

Training and Cyber Range

In the current European context of digital sovereignty and the implementation of NIS2, cyber ranges are emerging as strategic infrastructures — with Belgium playing a key role. Beyond training, they offer a shared, realistic, and interoperable environment to test and validate technologies, procedures, and IT/OT integrations, while leveraging digital twins to accelerate innovation and compliance (Cyber Resilience Act). This day will be dedicated to exploring cyber ranges and their applications — training, testing, and digital twins — with partners from across the European Union.

Welcome & Registration

The role of cyber ranges in training, testing/validation, and digital twins in the context of NIS2 and CRA

Matteo Merialdo (Nexova)

Auditorium

In a Europe pursuing digital sovereignty and implementing the NIS2 Directive and the Cyber Resilience Act, cyber ranges are moving from “training tools” to national-level strategic infrastructure. This session shows how modern cyber range technology is helping lead that shift. Drawing on real projects in Security Operations Centre operations, critical infrastructures (IT/OT) protection, and space systems, Matteo will illustrate how cyber ranges and digital twins provide shared, realistic, and interoperable environments to train teams, test and validate technologies and procedures, rehearse incident response, and accelerate compliance-by-design.

Matteo-Merialdo-Program
Matteo Merialdo - Cybersecurity Principal

Break & Group Formation

Demo Rotations

Cristel Pelsser (UCLouvain) , Fatou Diao (Multitel), Sirris, CETIC

The address of the “Centre de Cybersécurité IDELUX” is:
Parc d’activités Galaxia
Allée de la Comète 80
B-6890 Libin

Demo 1 – Introduction to Space Protocols and their Vulnerabilities


Through a virtualized space mission command center powered by IDELUX’s Cyber Range, participants will interactively explore the different elements that enable space communications. The various services and functions of the CCSDS protocols, used by ESA, NASA, and other agencies, will be demystified. Participants will have the opportunity to discover the mechanisms behind communications — from the sending to the receiving of a message. This will also be an opportunity to identify vulnerabilities in protocol implementations and explore the potential attack vectors that can exploit them.

Cristel Pelsser
Cristel Pelsser - Professor
Demo 2 – A test bench generating single photons and showcasing their use in quantum cybersecurity (Multitel & CETIC)
 
The demonstrator is a practical implementation of a Quantum Key Distribution (QKD) system based on the BB84 protocol, designed as a compact and robust demonstrator. The setup establishes a secure key exchange between Alice and Bob using attenuated laser pulses and polarization encoding transmitted through optical fibers equipped with LiNbO₃ phase modulators. The system currently achieves a quantum bit error rate of 2–5% and a secure key rate of 1 kbit/s, reflecting both its stability and operational constraints. Once generated, the quantum keys are securely stored and can be integrated into classical infrastructures for various applications—for example, enabling encrypted communication over a VPN channel. An example of use will also be presented. The DMWay multi-protocol gateway, enabling a direct and authenticated connection to the Key Management System (KMS) for automated key generation, exchange, and renewal. All gateway communications are secured using these cryptographic keys and benefit from a built-in traffic classification and filtering mechanism. This ensures controlled and differentiated handling of secure and non-secure data flows.

Fatou Diao
Fatou Diao - Quantum Cybersecurity Researcher
Amel Achour
Amel Achour - Senior Researcher

Demo 3 – Industrial CyberForge and Verification (SIRRIS, CETIC)

Demonstration of attacks linked to different vulnerabilites in a manufacturing environment with a mix of IT and ICS/OT. Illustration through different cs maturity levels that demonstrate a way to mitigate the risk. Discover attacks on common industrial protocols and how to secure your networks to avoid the propagation of the attack when a vulnerability is exploited. Verification of attacks will also be demonstrated to show how testing can be carried out to verify that appropriate copuntermeasures have been implemented to reduce the risk of the attack.

Thierry Coutelier
Thierry Coutelier - Sirris
Firas Belkarioui - Sirris
Malik Bouhou - Senior Researcher

Technical Break & Room Reset

Experience Briefing: “Designing a Tailor-Made Cybersecurity Course Using the Idelux Cyberrange”

Yves Ausloos

Auditorium

Participants will follow a simple, guided scenario showcasing the versatility of cyber ranges in decision-making, coordination, and real-time defense.

Thierry Coutelier
Yves Ausloos - Current Operations Data Link Officer

Roundtable & Q&A

Auditorium

Lessons learned, interoperability, and practical applications (training, testing, digital twinning)

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Closing

Auditorium

Light refreshments, wrap-up, and next steps.

Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

Our Program for the 5 days

Over the course of five days, participants will benefit from a balanced mix of theoretical insights and practical training sessions, designed to combine knowledge acquisition with hands-on experience.

To encourage networking and informal exchanges, morning and afternoon breaks are scheduled each day, providing the opportunity to connect with peers, speakers, and experts.

The program still holds exciting surprises in store for you. Stay tuned further details about the program will be available soon.

Previous edition

2023 Cyberwal in Galaxia Program

0408 December 2023 

2022 Cyberwal in Galaxia Program

1216 December 2022 

Gallery

Register now!

2025 Cyberwal in Galaxia . .. ...

Days
Hours
Minutes
Days
Hours
Minutes

Burcu Özkaptan

Head of Telecommunication and Navigation

Burcu Özkaptan is an electrical and electronics engineer, specializing in RF Design engineering, control systems theory, and machine learning. She earned her engineering degree from Bilkent University, Ankara/Türkiye in 2004. With a wealth of experience in different industries, including defence, maritime, and aerospace, Burcu has held roles as modelling and simulation engineer, RF system design engineer, project manager, and most recently, a machine learning engineer. Currently, Burcu is working as a Systems Engineer, Machine Learning Engineer, and Project Manager at Telespazio Belgium where she is an integral part of a dynamic team working on the development of a hybrid PNT receiver. This innovative device combines GNSS technology with LTE/5G sensors, paving the way for cutting-edge advancements in the field.

Christian Mack​

COO

Christian Mack is co-founder and COO of Guardis SRL, a Belgian company specialized in cybersecurity, DevSecOps, infrastructure and multicloud environments. Since the company’s inception, he has overseen security solution deployment, project management and assessments, Guardis’s historical core business. He actively contributed to the design and launch of ComodIT, a SaaS orchestration platform.
Christian coordinated the CYRUS research project (2021–2023), dedicated to automating security testing for cyber-physical systems with partners such as ALSTOM, AISIN, and UCLouvain. He is now involved in the defense-focused CRESCENDO project (2023–2025), where he works with CETIC on industrializing CYRUS outcomes into a portable operational platform.
Certified NIS2 Lead Implementer, CISM, and STIL, Christian is recognized for combining strategic vision and operational expertise, delivering effective solutions for both SMEs and large organizations under strict compliance and resilience requirements.

Cristel Pelsser

Professor

Cristel Pelsser holds a chair in critical embedded systems at UCLouvain. From 2015 to 2022 she was a full professor at the University of Strasbourg (France) where she led a team of researchers focusing on core Internet technologies.
She spent nine years as a researcher working for ISPs in Japan. Her aim is to facilitate network operations, to avoid network disruptions and, when they occur, pinpoint the failures precisely in order to quickly fix the issues, understand them in order to design solutions to prevent recurrence.

Her research spans multiple areas including BGP security and routing protocols, Internet measurement infrastructure, machine learning for network anomaly detection, and critical embedded systems for IoT applications. She actively contributes to developing next-generation tools for Internet monitoring, including advanced BGP data collection platforms and systems for detecting routing attacks.

Cristel received the PhD degree from the Université catholique de Louvain (UCLouvain), Belgium.

Emmanuelle de Foy​

First Counsellor & Directorate General for Multilateral Issues

With a degree in Public and International Affairs (UCL) and International and European Law (VUB), Emmanuelle joined the Ministry for Foreign Affairs in November 2000. She has been posted in different regions. Her first posting was Kuala Lumpur, where she got acquainted with Asia, political and economical issues. She was involved in a Princes visit to Malaysia. Her second posting was Jerusalem. The issues were mainly political but also involved cooperation. Her third posting was in Mexico, where she dealt with political and economic issues but also academic and cultural topics. She was also involved in a Princes visit to Mexico. She was then assigned to Headquarters in Brussels where she followed UN issues (Security Council, UNESCO). She has been detached to a Deputy Prime Minister Office between 2012 and 2014. Her fourth posting was The Hague, where she dealt with bilateral (King’s visit) and European issues. Her fifth posting was Luxembourg, where she dealt with bilateral (King’s visit) and European issues. She was assigned to Headquarters again, in charge of cyber issues, since September 2022. Her mother tongue is French. She also speaks Dutch, English, Spanish and a fair German. She is married.

Giulia Rinaldi

Cyber Data Engineer Part of the Innovation & Product Policy Secure Communication and Information Systems Thales Belgium

Giulia Rinaldi was born in Rome, Italy, and earned a Bachelor’s degree in Software Engineering and a Master’s in Data Science from La Sapienza University. She later moved to Belgium, where she completed her PhD at KU Leuven in June 2025. During her academic journey, she worked as a teaching assistant and master’s thesis supervisor. With experience as a data scientist, she now works as a Cyber Data Engineer at Thales, where she merges her passions for AI and cybersecurity to develop innovative solutions for protecting critical infrastructure.

Laurens D'hooge

Postdoctoral researcher

Laurens D’hooge is a postdoctoral researcher with imec, working at the Internet and Data Science Lab (IDLab), located at Ghent University’s technology campus. He obtained his PhD in October 2023 on the discovery and characterization of flaws in machine-learned network intrusion detection systems and data sets. More broadly, his expertise is tied to all topics where data science intersects with cybersecurity. He is a staunch advocate for reliable, reproducible ML. On kaggle.com under the moniker dhoogla, he still actively contributes to improving academic security datasets.

Maxime Gennart

Legal Advisor

Maxime is a legal advisor at the Litigation Chamber of the Belgian Data Protection Authority where he contributes to drafting binding decisions on complex data protection cases. He is also a member of the Authority’s AI Task Force for which he contributes to setting up the national AI governance framework. Moreover, he represents the DPA in European and international cross-sectoral discussions on privacy, data governance, artificial intelligence, and cybersecurity.  

Merlijn Sebrechts

Senior Researcher

Dr. ing. Merlijn Sebrechts is a senior researcher at imec and teaches at Ghent University in Belgium. He leads a number of research tracks focused on secure and robust systems in the cloud and on devices. He is currently serving on the Ubuntu Community Council and is standardizing WebAssembly System Interfaces for IoT devices as part of the W3C and the Bytecode Alliance. He teaches topics such as Distributed Systems Design, Open Source ecosystems and Computer Security. His work has been published in over 20 scientific publications and has received four awards.

Mohamed Boukhebouze

AI Product Manager

Mohamed Boukhebouze is an AI Product Manager at EarthLab Luxembourg (https://www.earthlab.lu/), an innovation-driven company operating at the intersection of Earth Observation (EO) and Artificial Intelligence. With a background in data science, project management, and AI strategy, he leads the development of Max-ICS (https://www-max-ics.earthlab.lu/), a cutting-edge MLOps platform tailored to EO applications. Passionate about bridging technology and operational value, Mohamed has contributed to shaping EO data ecosystems across Europe by promoting sovereign, secure, and scalable AI solutions. He is involved in several European programs focused on digital sovereignty, EO digital twins, and AI-powered automation for sustainability and defense-related use cases.

Phédra Clouner

Deputy Director General

Phedra Clouner spend all her career in the public sector, and began her career as IT project manager. Then,  She specialised in enterprise content management and records management, becoming interested in information security, which naturally led her to cybersecurity.

Since its creation, 10 years ago, Phedra Clouner is the Deputy Director General of the Center for Cybersecurity Belgium (CCB), the national authority for cybersecurity, who oversees the definition and implementation of Belgium’s cybersecurity strategy and works to make the country one of the least cyber-vulnerable in Europe.

In addition to her work at CCB, she holds leadership roles in national and European cybersecurity initiatives, including serving as Vice Chair of the Belgian Cybersecurity Coalition, chair of the Advisory board of the Forum In Cyber,  and one of the founding member of Women4Cyber and Women4cyber Belgium.

Philippe Massonet

Scientific Coordinator

Philippe Massonet is scientific coordinator at CETIC, a Belgian ICT applied research center. His research interest cover the areas of software, service and security engineering, as well as the applicaiotn of artificial intelligence to these areas. He was coordinator of the GridTrust IST European project (Strep) dealing with trust and security in next generation grids, and is responsible for dissemination and security in the RESERVOIR IST European project (Integrated project) led by IBM research. He was also the coordinator of the PONTE eHealth project that looked into using semantic web technologies to build decision support systems for the design clinical trials.  He has experience in the prototyping and commercial development of advanced requirements engineering tools. Previously he was manager of the requirements engineering team at CETIC. He has experience in the management of international R&D projects (Eurescom MESSAGE, IST FP6 GridTrust, and FP7 PONTE) and is or has been involved in several IST FP6/FP7/H2020/HEU research projects (RESERVOIR, HPC4U, AssessGrid, CoreGrid, GridTrust, Oldes, …).

ir. Yvan De Mesmaeker (M.Sc.Eng.)

Secretary General

ir. Yvan De Mesmaeker (M.Sc.Eng.) is Secretary General of the European Corporate
Security Association – ECSA and of ATHENA, the Alumni of the High Studies in
Security & Defense. Through his professional practice Omega Risk, he advises leading
corporations and institutions on Security, Resilience and Anticipation. He also directs
the High Studies in Police, Justice & Corporate Security and serves on boards
including the Royal Higher Institute for Defence – RHID and the Royal Institute for
International Relations – Egmont. With over 30 years of international experience, he has
worked extensively across Europe, the United States and Asia. His achievements in
corporate security and geopolitics have been recognized by HM the King of the Belgians,
who awarded him the honorary distinctions of ONicer in the Order of the Crown (2017)
and ONicer in the Order of Leopold (2023).

Institutional day

The opening day of the Cyberwal in Galaxia Academy aims to provide a comprehensive and structured panorama of cybersecurity, combining institutional, organizational, European, international, and strategic perspectives. Each contribution will follow a common thread: understanding how cybersecurity, beyond its technical dimension, has become a central issue of governance, sovereignty, and resilience for our societies.

Cybersecurity can no longer be regarded as an isolated field. It now permeates organizational governance, national regulation, European cooperation, international competition, the protection of fundamental rights, and global security.

Starting from regional challenges and extending to national and European perspectives, participants will discover how leading institutions are defining priorities, shaping skills, and establishing the frameworks needed to strengthen collective resilience. Through these complementary perspectives, the opening day will highlight both the challenges to be addressed and the solutions already underway, while outlining the path toward a shared maturity that is essential for building a stronger cybersecurity ecosystem, better prepared to face tomorrow’s threats.

Welcome & Registration

Luxembourg Cybersecurity Factory

Pascal Steichen (Luxembourg House of Cybersecurity)

Auditorium

The Luxembourg Cybersecurity Factory (LCF) is set to become a groundbreaking hub for collaboration, enabling the seamless collection, analysis, and sharing of critical cybersecurity data—from threat intelligence and vulnerabilities to the effectiveness of protective measures. Designed as an open cybersecurity data space, the LCF will integrate advanced data tools, a dedicated Open Source Program Office (OSPO), and robust governance frameworks to strengthen risk mitigation across sectors.

This initiative will empower organisations, especially SMEs, to develop innovative, autonomous cybersecurity solutions, fostering a vibrant ecosystem of data, tools, and real-world applications. In a second phase, the LCF will expand its partnership with the Luxembourg AI Factory (L-AIF), integrating AI capabilities to further enhance its impact.

By attracting cybersecurity data providers to contribute their datasets and supporting data curation for AI applications, Luxembourg aims to position the LCF as a global leader in open-source-driven cybersecurity innovation.

This initiative will empower organisations, especially SMEs, to develop innovative, autonomous cybersecurity solutions, fostering a vibrant ecosystem of data, tools, and real-world applications. In a second phase, the LCF will expand its partnership with the Luxembourg AI Factory (L-AIF), integrating AI capabilities to further enhance its impact.

By attracting cybersecurity data providers to contribute their datasets and supporting data curation for AI applications, Luxembourg aims to position the LCF as a global leader in open-source-driven cybersecurity innovation.

Pascal Steichen
Pascal Steichen - CEO
Philippe Massonet
Kim Guldstrand Larsen - Professor at Aalborg University, Department of Computer Science, Denmark

What is the current situation on implementing (international) rules in the cyberspace

Emmanuelle de Foy (Federal Public Service (FPS) Foreign Affairs

Unit M4 Global Governance)

Auditorium

We are familiar with the off-line world, our material world, managed by rules and laws. When it comes to the online world (and more and more parts of our lifes go online, work, leisure, information, orders, bookings…), who are the actors and how are they behaving ? What is important or crucial ? What is allowed or not allowed ? How can you react ? These issues have been discussed in the United Nations since 1998. The presentation will deal with 2 sets of negotiations that are actually typifying the state of the world. The negotiations on a international framework on ICT will show the rivalry between democracies and autocracies and the weight of the Global South. The second negotiation will show even more precisely the rivalry about the conceptions of the applicable law and the values such as the protection of human rights). The presentation will quickly deal with other lines of efforts at the level of the European Union, the OSCE and the NATO.

Emmanuelle de Foy
Emmanuelle de Foy - First Counsellor & Directorate General for Multilateral Issues

Coffee break

How to improve cybersecurity ? The Belgian approach!

Phedra Clouner (Centre for Cybersecurity Belgium)

Auditorium

During her presentation, Phédra Clouner will discuss how Belgium has implemented initiatives to make the country one of the least cyber-vulnerable countries in Europe.

She will review the role played by the national cyber security agency, the CCB, in the Belgian landscape.

She will discuss the types of threats facing the country and how these threats have evolved in line with changes in the geopolitical context and the emergence of new technologies.

She will then detail the actions put in place to counter these threats for different target audiences, as well as the governance that supports them, specifying concepts and their implementation, such as Active Cyber Protection, Cyberfundamentals, spearwarning, the involvement of the population in its own protection, etc.

She will also discuss how the various European regulations have been implemented by the CCB.

Phédra Clouner
Phedra Clouner - Deputy Director General

The Digital Wallonia cybersecurity strategy: achievements and next steps

Jeremy Grandclaudon (ADN)

Auditorium

The Walloon Region’s Digital Wallonia strategy is the cornerstone of its digital transformation, aiming to foster innovation, economic growth, and societal resilience through technology. Within this framework, cybersecurity is a major pillar, ensuring trust and security across all digital initiatives. Our cybersecurity projects drive this ambition by supporting SMEs, strengthening private and public infrastructures, and aligning with European directives such as NIS2 or CRA . Its approach combines awareness campaigns, skills development, and practical tools

Jeremy-Grandclaudon-program
Jeremy Grandclaudon - Senior Cybersecurity Expert for Agency for Digital

Lunch

NIS2, Who must act to ensure cybersecurity protections?

Georges Ataya (Solvay Brussels School of Economics and Management)

Auditorium

The rapid evolution of digital threats highlights the persistent weaknesses of many companies, often unprepared to meet the requirements of the NIS2 directive. This new regulation directly engages business leaders, who must integrate cybersecurity into their governance. It also opens new opportunities for experts and students, whose skills are now essential to digital resilience. Finally, it mobilizes digital managers and entrepreneurs as key drivers of lasting change toward a shared culture of security.

Georges Ataya - Cyberwal in Galaxia Academy 2025
Georges Ataya - Professor

Security and Compliance: Cybersecurity at the Heart of the Right to Data Protection

Maxime Gennart (Belgian Data Protection Authority)

Auditorium

Security is not a mere technical requirement; it is an essential component of responsibility and trust in digital environments.

The fundamental right personal data protection and cybersecurity are two sides of the same coin.

As the authority supervising and enforcing this right, the Data Protection Authority (DPA) plays a central role in promoting safe digital environments.

This presentation will first explore the DPA’s role in cybersecurity. It will then address the obligations arising from the principle of data confidentiality and security (Article 32 of the GDPR), as well as those linked to data protection by design and by default (Article 25).

These concepts will be illustrated with concrete examples drawn from use cases, demonstrating how these legal principles are translated into effective security practices.

Maxime Gennart
Maxime Gennart - Legal Advisor

Coffee break

How Cyber Security fits into Global Corporate Security

Yvan De Mesmaeker (European Corporate Security Association – ECSA )

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Yvan De Mesmaeker - Secretary General

Forging resilience: Cyber defense in a shifting hybrid landscape

Général Pierre Ciparisse (Cyber Force)

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

GenMaj-CIPARISSE-official
Pierre Ciparisse - Major General

Q&A

Général Pierre Ciparisse

Auditorium

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 

ir Yvan De Mesmaeker
Général Pierre Ciparisse - Cyber Command
Sold out

Quantum Day

08:30 AM – 09:00 AM

REGISTRATIONS

09:00 AM – 10:30 AM

Cybersecurity in our quantum age

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 


Gilles Brassard - Professor of Montreal University

10:30 AM – 10:45 AM

COFFEE BREAK

10:45 AM – 12:15 PM

Cybersecurity in our quantum age

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century for Claude Shannon to endow it with a rigorous mathematical foundation. However, Shannon’s approach was rooted in his own information theory, itself inspired by the classical physics of Newton and Einstein. Yet, the world in which we live is subject to the laws of quantum theory, no matter how bewildering, whose experimental verification half a century ago was rewarded in 2022 by the Nobel Prize in Physics. When quantum theory is taken into account, new vistas open up both for codemakers and codebreakers. Is this a blessing or a curse for cybersecurity? Quantum computers will soon be capable of computations that would be unthinkable for a conventional computer, which will seriously undermine the so-called security of Internet communications as we practise them today. Nevertheless, the same quantum theory gives rise to new cryptographic paradigms that are in principle invulnerable to arbitrary attacks, even by an adversary capable of harnessing unlimited computing power and technology. However, this unconditional security requires quantum cryptography to be implemented according to the theory, which is very challenging. Will the cat-and-mouse game between codebreakers and codemakers soon reach a decisive outcome? As we shall see, the jury is still out! 

No prior knowledge in cryptography or quantum theory will be assumed. Please note that this talk will be given in French, with slides written in English. 


Gilles Brassard - Professor of Montreal University

12:15 PM – 01:15 PM

LUNCH TIME

01:15 PM – 02:00 PM

BeQCI and device-independent quantum key distribution

This presentation provides a brief introduction to the Belgian Quantum Communication Infrastructure (BeQCI) project, part of the European EuroQCI initiative aimed at advancing secure quantum communication networks across Europe. In addition to building infrastructure, BeQCI is driving research into future-proof quantum key distribution (QKD) protocols. Specifically, we will explore Device-Independent (DI) QKD, a cutting-edge approach to quantum cryptography that leverages Bell inequalities, recognized with the 2022 Nobel Prize in Physics. By eliminating certain security assumptions, DI QKD offers unprecedented levels of security beyond current QKD protocols. Attendees will gain insights into the future potential of DI and semi-DI QKD to enhance information security in the quantum era. Join us to discover how these advancements are pushing the boundaries of secure communication.

pironio
Prof. Stefano Pironio - FRS-FNRS Research Director at ULB

02:00 PM – 02:45 PM

Eagle-1 : QKD in practice and build-up of users communities

The EAGLE-1 mission aims to develop Europe’s first sovereign, end-to-end space-based Quantum Key Distribution (QKD) system. Led by SES in collaboration with the European Space Agency (ESA) and various European space agencies and private partners, the mission will feature a state-of-the-art QKD system comprising a payload aboard the EAGLE-1 Low Earth Orbit (LEO) satellite, optical ground stationsquantum operational networks, and a key management system. EAGLE-1 marks a significant milestone in next-generation quantum communication infrastructure, providing crucial technical insights and mission data while contributing to the EuroQCI program‘s development. It offers a unique opportunity for public and private entities to test and validate end-to-end Quantum Safe solutions through satellite-based QKD.

Thierry Draus
Thierry Draus - Vice President Business Development at SES

02:45 PM – 03:30 PM

Quantum Technologies for Communications Systems

In this talk, we will explore the exciting advancements in quantum technologies and their transformative impact on communication systems. Starting with an introduction to the Second Quantum Revolution, we will delve into key developments, such as Quantum Communications Infrastructure and Quantum Key Distribution (QKD), which are poised to enhance data security and revolutionize the way we exchange information. Next, we will discuss the concept of the Quantum Internet, a futuristic network leveraging quantum principles for unprecedented communication capabilities. We will also cover Quantum Optimization techniques and their application to solving complex communication challenges, especially within large-scale and evolving networks like 6G.  Finally, we will conclude with prespectives and open research problems offering a roadmap for the development and integration of quantum technologies in the years ahead.

seid koudia
Seid Koudia - Research Associate at University of Luxembourg

03:30 PM – 04:15 PM

Fast and Practical integrated quantum communications systems

FranceQCI and its challenges

We discuss current efforts towards the deployment of a national quantum communication infrastructure in France. These include technologies under development in our academic laboratories as well as benchmark demonstrations at the testbeds in operation in the Paris and Nice regions involving industrial actors spanning the telecom operator, cybersecurity, QKD system provider, photonics and space sectors. We also discuss current challenges in the field of quantum communication and future perspectives.

Eleni Diamanti
Professor Eleni Diamanti - CNRS Research Director at Sorbonne University
Prof. Hugo Zbinden - University of Geneva

04:15 PM – 04:30 PM  

COFFEE BREAK

04:30 PM – 05:15 PM

INT-UQKD : cross-border QKD

Through a set of business-driven use cases, INT-UQKD (“International Use cases for Operational QKD Applications & Services”) will provide global quantum safe communication services upon a hybrid space-terrestrial quantum key distribution (QKD) backbone. By leveraging the QKD technology, together with other classical and post-quantum cryptographic protocols to deliver a practical environment that can be used in the current commercial context, INT-UQKD safeguards the secure exchange of information, the long-term protection of stored data, and the protection of critical infrastructure in the post quantum age.

Thanks to its hybrid space and terrestrial network, INT-UQKD will demonstrate a global quantum safe communication between Redu (Belgium), Windhof (Luxembourg) and Singapore. As INT-UQKD architecture is designed with scalability and interoperability mind, it allows the incorporation of future extensions. These extensions will expend both INT-UQKD geographical reach and operational capabilities, aiming at implementing a resilient, flexible and manageable ecosystem with global coverage enabling quantum secure communication and cryptographic services for private and governmental users.

Patrick Renaux
Patrick Renaux - Senior cybersecurity architect

05:15 PM – 06:15 PM

Presentation of Quantum Demonstrator of GALAXIA in Transinne (Thales Belgium)

Presentation of Quantum Demonstrator of GALAXIA in Transinne (Thales Belgium)

Pisane Jonathan
Jonathan Pisane - Innovation & Product Policy Manager at Thales Belgium

9:00 AM – 9:30 AM

REGISTRATIONS

09:30 AM – 12:30 PM

Poster session (Abstract)

The 3rd edition of the Cyberwal in Galaxia Program will feature an exciting poster competition where 30 posters will be showcased. The best poster will be honored with an Award, which will be presented during the ceremony scheduled for Wednesday, 12/04, in the late morning. An expert jury, consisting of 10 professionals renowned in their fields, will select the winner of this Cybersecurity Award.

Beyond the competition, the poster session offers an exceptional opportunity for participants to present their innovative research and hone their scientific communication skills in front of a diverse audience, including business representatives. This session is much more than a mere contest: it is a true exchange platform. It enables participants to connectshare ideas, and enrich the international cybersecurity community.

We warmly invite studentsresearchers, and professionals to participate in this enriching event. Discover the latest innovations, share your expertise, and immerse yourself in an environment of collaboration and innovation. Join us to celebrate excellence in cybersecurity and contribute to a tradition of impact and continuous progress.

09:30 AM – 12:30 PM

Introduction of the Poster session (overview, objectives, connecting of researchers with industries)

09:45 AM – 10:30 AM
Elevator Pitch for 30 posters (1 minute per poster)

10:30 AM – 12:00 PM

Poster session

12:00 PM – 12:15 PM

Presentation of CyberActive

CyberActive offers free training, videos and learning resources to increase the cyber resilience of the manufacturing and digital services (SaaS) sectors. The subjects covered cover the main challenges facing these companies, for different types of profiles within the organisations.

This project is led by cybersecurity experts from Sirris, Howest, UCLouvain and VUB, and is funded by the FPS Economy and the European Commission.

Discover our offer on www.cyberactive.be.

Thierry Coutelier
Thierry Coutelier - Senior Expert at Sirris
12:15 PM – 12:30 PM

 Awarding of the Best Poster & presentation by the winner

12:30 PM

End 

12:30 PM – 01:30 PM

LUNCH TIME

01:30 PM – 03:00 PM

Introduction

A meticulously designed CTF challenge that push the boundaries of conventional cybersecurity knowledge. Attendees will be able to revel in the opportunity to listen to and interact with esteemed experts from the cybersecurity domain, each bringing a wealth of experience and fresh perspectives.

Complementing these, our hands-on demonstrations promise a deep dive into the latest technologies and methodologies, forging a link between academic theories and their tangible, real-world implementations. Join us for a comprehensive exploration of the future of cybersecurity.

Deloitte will invite keynotes speakers to develop on concise and insightful talk on a relevant cybersecurity topic and allow some time for questions and answers.

Nicolas Noël 
Nicolas Noël  - Director, Cyber Risk Advisory at Deloitte
Etienne Caron
Etienne Caron - Manager, Cyber Risk Advisory at Deloitte

03:00 PM – 03:15 PM

coffee break

03:15 PM – 04:45 PM

A meticulously designed CTF challenge that push the boundaries of conventional cybersecurity knowledge. Attendees will be able to revel in the opportunity to listen to and interact with esteemed experts from the cybersecurity domain, each bringing a wealth of experience and fresh perspectives.

Complementing these, our hands-on demonstrations promise a deep dive into the latest technologies and methodologies, forging a link between academic theories and their tangible, real-world implementations. Join us for a comprehensive exploration of the future of cybersecurity.

Deloitte will invite keynotes speakers to develop on concise and insightful talk on a relevant cybersecurity topic and allow some time for questions and answers.

Nicolas Noël 
Nicolas Noël  - Director, Cyber Risk Advisory at Deloitte
Etienne Caron
Etienne Caron - Manager, Cyber Risk Advisory at Deloitte

08:30 AM – 09:00 AM

REGISTRATIONS

09:00 AM – 12:15 PM

An Introduction to Smart Contracts Security

This session focus on security aspect of modern financial transactions above blockchains: smart contracts. To do so, the first part of the session will review key theoretical concepts, such as cryptography, hashing, signature, fingerprint, merkle tree) before diving into the notion of block chain and smart contracts.  The Solidity programming language will be introduced and well known attacks will be discussed (e.g., reentrancy attack). In the second part of the session, attendees will have the opportunity to learn how to detect security breaches in smart contracts and how to abuse them for performing an attack.

Benoît Donnet
Benoît Donnet - Professeur at Université de Liège

OR

09:00 AM – 09:45 AM

The blockchain landscape in Wallonia

Wallonia is active in the field of blockchain, and a number of public and private initiatives are already underway. Before presenting some concrete projects implemented in our region, Nicolas Point will outline the two most important federative programs.

The WalChain initiative, which was born of a grouping of Walloon blockchain start-ups, aims to promote ‘Made In Wallonia’ blockchain as an innovative tool for building collaborative and transparent ecosystems, as well as an opportunity to contribute to sustainable economic redeployment in Wallonia. DigitalWallonia4.Trust is an innovative project led by Agoria, Infopole, Agence du Numérique and WalChain. Supported by the Service Public de Wallonie Economie Emploi et Recherche (SPW EER) and Wallonia, this initiative is part of the Digital Excellence program of Wallonia’s digital strategy, Digital Wallonia. DW4TRUST aims to place Wallonia at the center of digital innovation. By integrating blockchain technology into various sectors, DW4TRUST not only improves efficiency, trust and security across businesses, but also opens up new opportunities for growth and innovation.

Nicolas Point
Nicolas Point - Responsable du département IT at MULTITEL
alois
Aloïs Moubax - Program Manager at DigitalWallonia4.Trust

09:45 AM – 10:30 AM

Seamless Blockchain Integration: Transforming Existing Businesses with Innovative Solutions

This session will explore a proven methodology for integrating blockchain technology into existing business systems. We’ll cover key steps, from assessing business needs and designing a tailored blockchain strategy, to implementing and deploying solutions that align with current infrastructure. Attendees will learn best practices for overcoming common challenges, such as data migration, interoperability, and security, while maximizing the benefits of blockchain, including transparency, efficiency, and trust. Real-world case studies will highlight successful integrations in sectors like supply chain, ESG reporting, and Digital Product Passports (DPP).

Harold Kinet
Harold Kinet - CEO at BE Blockchain

10:30 AM – 10:45 AM

COFFEE BREAK

10:45 AM – 11:45 AM

Logion: Blockchain and IPFS to Secure and Certify Sensitive Data

In a world where digital threats are rapidly evolving, the need for advanced solutions to secure sensitive data is paramount. Logion offers an innovative approach by combining blockchain technology with IPFS (InterPlanetary File System). This combination not only ensures the integrity and traceability of data but also guarantees its availability and immutability. Blockchain, with its decentralized nature, provides an unalterable and transparent ledger, while IPFS enables distributed and resilient file storage. Together, these technologies offer a robust alternative to traditional storage solutions, meeting the increasing demands for security in cyberspace. This session will explore how Logion leverages these technologies to provide superior protection for sensitive data, particularly in sectors where confidentiality and security are crucial. Participants will learn how the combination of blockchain and IPFS can not only enhance data security but also facilitate certification and traceability, all while adhering to the strictest privacy standards.

David Schmitz
David Schmitz - Founder of Logion
Gérard 2
Gérard Dethier - CTO at Logion

11:45 AM – 12:15 PM

The Future of Blockchain and Web3 in Wallonia

In a world where digital threats are rapidly evolving, the need for advanced solutions to secure sensitive data is paramount. Logion offers an innovative approach by combining blockchain technology with IPFS (InterPlanetary File System). This combination not only ensures the integrity and traceability of data but also guarantees its availability and immutability. Blockchain, with its decentralized nature, provides an unalterable and transparent ledger, while IPFS enables distributed and resilient file storage. Together, these technologies offer a robust alternative to traditional storage solutions, meeting the increasing demands for security in cyberspace. This session will explore how Logion leverages these technologies to provide superior protection for sensitive data, particularly in sectors where confidentiality and security are crucial. Participants will learn how the combination of blockchain and IPFS can not only enhance data security but also facilitate certification and traceability, all while adhering to the strictest privacy standards.

alois
Moderator: Aloïs Moubax - Program Manager at DigitalWallonia4.Trust
Nicolas Point
Moderator: Nicolas Point - Head of the IT Department
David Schmitz
David Schmitz - Founder of Logion
Gérard 2
Gérard Dethier - CTO at Logion
Harold Kinet
Harold Kinet - CEO at BE Blockchain

12:15 PM – 01:15 PM

LUNCH TIME

01:15 PM – 04:15 PM

An Introduction to Smart Contracts Security

This session focus on security aspect of modern financial transactions above blockchains: smart contracts. To do so, the first part of the session will review key theoretical concepts, such as cryptography, hashing, signature, fingerprint, merkle tree) before diving into the notion of block chain and smart contracts.  The Solidity programming language will be introduced and well known attacks will be discussed (e.g., reentrancy attack). In the second part of the session, attendees will have the opportunity to learn how to detect security breaches in smart contracts and how to abuse them for performing an attack.

Benoît Donnet
Benoît Donnet - Professeur at Université de Liège

OR

01:15 PM – 02:30 PM

Emerging ICT trends: the need for secure and quantum-safe networks

We will highlight the increasing need to have strong network security resulting from the adoption of new technologies like AI, 5G, IoT and quantum. We will review the different network security technologies available on offer today. And we will explore the impact of crypto-relevant quantum computers on organisations, and how you can already prepare today.

Wim Van Vossel
Wim Van Vossel - Technology Strategy & Innovation Manager
kristof Spriet
Kristof Spriet - Product Owner Smart & Secure Networks

02:30 PM – 03:30 PM

AI-enabled disconnected sovereign cloud in Luxembourg for Europe

Clarence’s core mission is to offer a cutting-edge, disconnected sovereign cloud solution. Based on Google Cloud technology, this unique proposition guarantees the confidentiality and security of the most sensitive information, giving control over data, and offering total autonomy of operation. Clarence respects the highest ethical standards in data protection, confidentiality, transparency and regulatory compliance.

Clarence is the result of a joint venture between Proximus and LuxConnect. A joint venture born of the desire to create a disconnected sovereign cloud, designed to meet the needs of companies wishing to retain control over the integrity of their data and access to it, but also, operationally, to ensure that their operations are carried out on our soil and subject only to European jurisdictions.

The origins of Clarence lie in a shared ambition: to offer users the most advanced Cloud functionalities, while guaranteeing them total control over where their data resides and who has access to it.

What We Do : Combining Innovation and Sovereignty in Cloud Computing

The sovereign cloud solves the dilemma between innovation and compliance. By combining the best of both worlds, it facilitates access to technological innovations while ensuring compliance and protection of sensitive data.

Jean-François TERMINAUX
Moderator: Jean-François Terminaux​ - Head of Product Management - Disconnected Cloud​ at Proximus

03:30 PM – 03:45 PM

COFFEE BREAK

03:45 PM – 04:45 PM

Cloud Continuum Security Challenges

EU IPCEI on Next Generation Cloud Infrastructure and Services

Cloud & edge computing are crucial for an interconnected and resilient Digital Europe, as well as for the EU’s geostrategic position and competitiveness in the global economy. IPCEI CIS is the first IPCEI in the cloud and edge computing domain. It concerns the development of the first interoperable and openly accessible European data processing ecosystem, the multi-provider cloud to edge continuum. It will develop data processing capabilities, and software and data sharing tools that enable federated, energy-efficient and trustworthy cloud and edge distributed data processing technologies and related services. The innovation provided by IPCEI CIS will enable a new spectrum of possibilities for European businesses and citizens, advancing the Digital and Green transition in Europe.The main aim of the session is to introduce the main cloud continuum security challenges focusing on relevant topics like Confidential Computing, ultra-high resilience, cloud certification, etc.

photo_jguijarro
Jordi Guijarro - Principal Technologist at Cloud-Edge Innovation

04:45 PM – 05:30 PM

A Tale of Vulnerability Prediction

Over the past years, automated vulnerability prediction research, mainly supported by AI techniques, has grown in popularity. While a large number of studies have been proposed, they often make simplification assumptions, which limit their applicability and adoption. This talk will provide a historical view of the vulnerability prediction approaches and will focus on the challenges and limitation that they face through the lens of three different research communities, i.e., AI, SE and Security. The talk will conclude with a discussion on the links between vulnerability prediction and testing, showing potential applications and cross-fertilization between the two research fields.

Mike papadakis
Mike Papadakis - Associate Professor at SnT

05:30 PM – 06:00 PM

How sovereign cloud solutions contribute to European digital autonomy?

Round table on Blockchain in Wallonia

In a world where digital threats are rapidly evolving, the need for advanced solutions to secure sensitive data is paramount. Logion offers an innovative approach by combining blockchain technology with IPFS (InterPlanetary File System). This combination not only ensures the integrity and traceability of data but also guarantees its availability and immutability. Blockchain, with its decentralized nature, provides an unalterable and transparent ledger, while IPFS enables distributed and resilient file storage. Together, these technologies offer a robust alternative to traditional storage solutions, meeting the increasing demands for security in cyberspace. This session will explore how Logion leverages these technologies to provide superior protection for sensitive data, particularly in sectors where confidentiality and security are crucial. Participants will learn how the combination of blockchain and IPFS can not only enhance data security but also facilitate certification and traceability, all while adhering to the strictest privacy standards.

Jean-François TERMINAUX
Moderator: Jean-François Terminaux​ - Head of Product Management - Disconnected Cloud​ at Proximus
Wim Van Vossel
Wim Van Vossel - Technology Strategy & Innovation Manager
photo_jguijarro
Jordi Guijarro - Principal Technologist at Cloud-Edge Innovation
Mike papadakis
Mike Papadakis - Associate Professor at SnT
Sold out

06:00 PM – 07:00 PM

Aperitif

07:30 PM

Gala Dinner at the Euro Space Center

08:30 AM – 09:00 AM

REGISTRATIONS

09:00 AM – 10:00 AM

Innovation and judicial police: a winning combination in the fight against crime

The Federal Judicial Police will present its overall vision and the role of technology in achieving it.

The main drivers of our strategy will be outlined to explain their use in our digital transformation and the disruption of our operational processes.

We will provide concrete examples of technological achievements in operations where an inclusive approach has been a key factor in success.

We will then discuss the challenges of operational Big Data and the contribution of AI to our complex processes.

David JAROSZEWSKI - Senior advisor on digital transformation and innovation

10:00 AM – 11:15 AM  

Introduction – The hack of the city of Antwerp and lessons learned (Amphi)

After a brief introduction to the current ransomware landscape, we review the case of the City of Antwerp based on information that was published by the city and in the press over the course of the attack and the months that followed – looking at the IT, operational, communication, reputation and financial impacts of the attack. The presentation is organized as a timeline of events, supported with press clippings and public facts brought ttogether into an exciting story that unravels over time

Didier Stevens
Didier Stevens - Senior Analyst at NVISO
Vincent Defrenne
Vincent Defrenne - Partner, Cyber Strategy & Architecture at NVISO

11:15 AM – 11:30 AM

coffee break

11:30 AM – 01:00 PM

Crisis response exercise: the enemy from within (2 rooms)

Participants take the helm of the crisis management team of a fictitious energy producer running its operations across Eastern Europe, and are confronted with a rapidly evolving incident involving the compromission of some of their systems and the potential involvement of an internal system administrator in these activities. The exercise is organized as a succession of briefings from the incident response team and analysis in group to define together a course of action that responds to the events and the questions raised. The response of course consists of technical actions to analyse, isolate, contain and eradicate the threat, but also involves organizational measures and measures in terms of internal and external communication. The exercise is facilitated by seasoned crisis and incident responders Vincent Defrenne and Didier Stevens.

Didier Stevens
Didier Stevens - Senior Analyst at NVISO
Vincent Defrenne
Vincent Defrenne - Partner, Cyber Strategy & Architecture at NVISO

01:00 PM – 02:00 PM

LUNCH TIME

02:00 PM – 05:00 PM

Ransomware Workshop (2 rooms)

During the workshop, participants will learn how to deal with this situation step-by-step by challenging them in their knowledge of various infosecurity topics. The goal of this workshop is to provide the participants with a structured approach on how to spot malware and how to deal with incidents caused by modern adversaries. Instructors will be assisting the students towards the full mapping of the incident and will provide a typical solution at the end of the workshop. The situation that the students will have to handle is as follows: “You are part of your company’s Incident Response team. On some idle Friday afternoon, your manager barges in. He has just been notified by the authorities that they have compromised a Commandand-Control server and that they have found systems communicating to that server originating from your company. The board of directors is breathing down his neck to find out what has happened and has asked him to contain this problem as soon as possible. How come we haven’t noticed this? What systems have been compromised? What data is exfiltrated?
Are there still active connections? You immediately coordinate with the authorities and receive an extract of the information they have pulled from the compromised server. And so you quest begins…” The students will work in teams of 2 and will have 4 hours to find out what has happened and to verify if there is still any active connections. During the workshop, the instructors will switch between guiding the participants and challenging them by assuming various positions in the company. The workshop will start with the set up of the participants machines with the tools required. For those participants that may not install such tools on their machine, a Linux-based virtual machine will be available for download or on USB sticks.

Didier Stevens
Didier Stevens - Senior Analyst at NVISO
Vincent Defrenne
Vincent Defrenne - Partner, Cyber Strategy & Architecture at NVISO

05:00 PM – 05:10 PM

Closing words from Cyberwal in Galaxia team

05:00 PM

The end