{"id":186,"date":"2024-07-16T23:46:01","date_gmt":"2024-07-16T14:46:01","guid":{"rendered":"https:\/\/cydef2024.cydef.net\/?page_id=186"},"modified":"2024-12-28T14:24:02","modified_gmt":"2024-12-28T05:24:02","slug":"program","status":"publish","type":"page","link":"https:\/\/cydef2024.cydef.net\/en\/program\/","title":{"rendered":"Program"},"content":{"rendered":"<p><!--\n\n\n<style>\n.program th, .program td.event {\nvertical-align: top;\npadding-top: 2.0em;\nwidth: 10em;\n}\n.program .event {\nfont-size: 1.1em !important;\nwidth: 14em !important;\n}\n.program .report {\nfont-size: 1.1em;\ntext-shadow: 1px 1px 5px #03B0EC;\n}\n.program .title {\nfont-size: 1.15em;\nfont-weight: 500;\nline-height: 1.4em;\n\/* text-shadow: 1px 1px 5px #03B0EC; *\/\nmargin: 1.0em 0;\ncolor: #0394ec;\n}\n.program p {\npadding-left: 0;\nmargin-bottom: 1.0em;\n}\n.program .speaker {\nfont-size: 1.05em;\nline-height: 1.5em;\nmargin: 1.0em 0;\n}\n.program .speaker span {\nfont-weight: 600;\nfont-size: 1.05em;\nletter-spacing: 0.02em;\ncolor: #0394ec;\n}\n.program .speaker a {\ntext-shadow: 2px 2px 6px #0340ec;\n}\n@media screen and (max-width: 799px) {\n.program th {\npadding-top: 1.0em;\n}\n.program td.event {\npadding-top: 0em;\n}\n.program .title {\nmargin-top: 0em !important;\n}\n.panel-members li {\nline-height: 1.4em;\nmargin-bottom: 1.0em;\n}\n}\nhtml {\nscroll-padding-top: 120px;\n}\n<\/style>\n\n\n--><\/p>\n<div class=\"program\">\n<h2 id=\"day_1\">Dec 4th (Wed) Day 1 <br \/>[Modern Conflicts and Cognitive Warfare \u30fb Critical Infrastructure Protection]<\/h2>\n<table>\n<tr>\n<th>8:30<br class=\"sp-hide\"> &#8211; 10:10<\/th>\n<td class=\"event\">Opening Ceremony &#038; Welcome Remarks<\/td>\n<td>\n<div class=\"title\">Opening Remarks<\/div>\n<p>Dr. Eng. \/ MG.(ret) TOKITO Kazuo\uff1aChief of CYDEF2024 Executive Committee (Japan)<\/p>\n<div class=\"title\">Welcome Remarks<\/div>\n<p>Mr. HONDA Taro\uff08Japan\uff09\uff1aState Minister of Defense\n<\/td>\n<\/tr>\n<tr>\n<th><\/th>\n<td class=\"event\">Session 1-0<\/td>\n<td>\n<div class=\"title\">Keynote Speech<\/div>\n<p>Mr. Conrad Prince\uff08UK\uff09\uff1aFormer Cyber Security Ambassador, BAE Systems Senior Adviser<br \/>\n&#8220;Preparing for emerging conflicts&#8221;<\/p>\n<p>Dr. Yisuo Tzeng\uff08Taiwan\uff09\uff1aAssociate Research Fellow, Institute for National Defense and Security Research<br \/>\n&#8220;Current State of Taiwan\u2019s Cyber Defense&#8221;<\/p>\n<p>Mr. HIKICHI Ryota\uff08Japan\uff09\uff1aHitachi, Ltd. Defense Systems Division<br \/>\n&#8220;Possibility of Cyber Mission Assurance&#8221;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<th>10:30<br class=\"sp-hide\"> &#8211; 12:00<\/th>\n<td class=\"event\">Session1-1<\/td>\n<td>\n<div class=\"title\">Cognitive Warfare 1: &#8220;Creating cooperatively the use of cyber-related technologies for gaining cognitive superiority&#8221;<\/div>\n<div class=\"abstract\">\n<p>Cognitive superiority can be seen as one of the decisive goals of modern information and cyber warfare, relying on access to information, pervasive surveillance, personalized persuasion, and new technologies. Cognitive superiority is nothing new \u2013 but its role for the other domains of societal activity should be more systematically assessed. Hence, we must start to think about the broad field of hybrid threats in a more sophisticated way.<\/p>\n<p>Cyberspace has facilitated the creation of a vitreous human and \u2013 potentially \u2013 transparent society. Digitalization and its common use made the virtual Cyberspace a real place, a diplomatic tool, an economic factor, a military effector, and a social space, satisfying, amongst others, especially human needs for connectivity. It has democratized information access, but Cyberspace as an so far unlimited and boundless space\/domain has \u201charmed\u201d the Westphalian paradigm of the state as the guardian of sovereignty, by so far overwriting the state\u2019s monopoly of (physical) power with new forms of violence. Malign actors have gotten direct access to influence almost every target audience, setting, undermining, or dominating narratives.<\/p>\n<p>One of the biggest \u201chybrid\u201d threats in the upcoming years will be malign actors\u2019 activities influencing the \u201cWestern\u201d cognitive domain by undermining Western core values, such as human dignity, freedom, democracy, equality, the rule of law and adherence to human rights. We are facing already a \u201ccognitive\u201d fight for narratives through the Cyberspace, aiming to dominate the cognitive domain and to gain cognitive advantage.<\/p>\n<p>The panel will deal with the following questions:<\/p>\n<p>\uf0b7 Cognitive warfare and superiority: The primary goal of cognitive warfare lies in gaining cognitive superiority, which relies on access to information, pervasive surveillance, personalized persuasion, and new technologies.<\/p>\n<p>\uf0b7 Authoritarian strategic culture and digital tools: Authoritarian states, revisionist powers, rogue states, and non-state networks leverage authoritarian strategic culture thinking. They combine this mindset with digital tools enabled by new platforms, networks, and speed. The need for new regulations in this context was also emphasized.<\/p>\n<p>\uf0b7 Cognitive warfare and superiority: The primary goal of cognitive warfare lies in gaining cognitive superiority, which relies on access to information, pervasive surveillance, personalized persuasion, and new technologies.<\/p>\n<p>\uf0b7 Authoritarian strategic culture and digital tools: Authoritarian states, revisionist powers, rogue states, and non-state networks leverage authoritarian strategic culture thinking. They combine this mindset with digital tools enabled by new platforms, networks, and speed. The need for new regulations in this context was also emphasized.<\/p>\n<\/div>\n<div class=\"speaker\"><span class=\"\">Session Organizer: <\/span><br \/>\n<a href=\"https:\/\/euhybnet.eu\/directory\/hybrid-warfare-research-institute\/\" target=\"_blank\" rel=\"noopener\">Hybrid Warfare Research Institute (Finland)<\/a><\/div>\n<div class=\"speaker\"><span>Moderator:<\/span><br \/>\nDr. \/ COL. Josef, Schr\u00f6fl \uff08Austria\uff09\uff1aHybrid CoE Deputy Director for Strategy &#038; Defence<\/div>\n<div class=\"speaker\"><span>Panelist:<\/span><br \/>\nDr. Chris, Bronk\uff08US\uff09\uff1aUniversity of Houston\u3000Professor<br \/>\nProf.\/ Dr. Gabi Dreo Rodosek\uff08Germany\uff09\uff1aUniversity of the Bundeswehr Munich<br \/>\nProf. Matt Warren, University of Melbourne,\uff08Austlaria\uff09<br \/>\nDr. SAITO Takamichi\uff1aMeiji University<\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>12:00 &#8211; <\/th>\n<td class=\"event\">Luncheon <\/td>\n<td>\n<div class=\"title\"><\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>13:00<br class=\"sp-hide\"> &#8211; 13:45<\/th>\n<td class=\"event\">Session1-2<\/td>\n<td>\n<div class=\"title\">Keynote Speech<\/div>\n<p>Mr. Christophe Morand (France) : Adviser for Security of Information and Synergies between Space, Defence and Civil Industries \/ European Commission \u2013 Directorate General for Defence Industry and Space<br \/>\n&#8220;Insights on Cybersecurity from an EU Perspective&#8221;<\/p>\n<p>Dr. Didier Danet (France) : Consultant Cyberdefense of GEODE Group<br \/>\n&#8220;Modern Conflicts and Cognitive Warfare: Cognitive Security in the Age of the Metaverse: What Risks and What Responses?&#8221;<\/p>\n<p>Mr. Tim Perry\uff08UK\uff09: Cyber Programme Lead\uff0cBAE SYSTEMS DIGITAL INTELLIGENCE<br \/>\n&#8220;Modern Conflicts and Cognitive Warfare&#8221;\n<\/td>\n<\/tr>\n<tr>\n<th>14:00<br class=\"sp-hide\"> &#8211; 15:30<\/th>\n<td class=\"event\">Session1-3<\/td>\n<td>\n<div class=\"title\">Modern Conflict 1: \u201cPreventing What Happens in Ukraine Today from Happening in Asia Tomorrow: How can NATO and Indo-Pacific Partnerships Address Global Security Challenges\u201d<\/div>\n<div class=\"abstract\">\n<p>What happens in the Indo-Pacific affects NATO and vice-versa. This panel will consider how NATO can develop and deepen cooperation with partners in Asia to address cross-cutting security issues and global challenges, including cooperative cyber defence. <\/p>\n<\/div>\n<div class=\"speaker\"><span class=\"\">Session Organizer: <\/span><br \/>\n<a href=\"https:\/\/ccdcoe.org\/\" target=\"_blank\" rel=\"noopener\">NATO Cooperative Cyber Defence Centre of Excellence (Estonia)<\/a><\/div>\n<div class=\"speaker\"><span>Moderator:<\/span><br \/>\nDr. Claire Kwan\uff08Luxembourg\uff09\uff1aNATO Cooperative Cyber Defence Centre of Excellence Senior National Representative<\/div>\n<div class=\"speaker\"><span>Panelist:<\/span><br \/>\nDr. Amy Ertan\uff08UK\uff09\uff1a NATO HQ, Belgium<br \/>\nDr. So Jeong Kim\uff08ROK\uff09\uff1a Institute for National Security Strategy  Senior Research Fellow<br \/>\nDr. Yisuo Tzeng,(Taiwan)\uff1a Associate Research Fellow,  Institute for National Defense and Security Research<\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>15:50<br class=\"sp-hide\"> &#8211; 17:20<\/th>\n<td class=\"event\">Session1-4<\/td>\n<td>\n<div class=\"title\">Cognitive Warfare 2: &#8220;AI in Adversarial Influence: Weaponising Perception and Reality Manipulation&#8221;<\/div>\n<div class=\"abstract\">\n<p>The panel \u201dAI in Adversarial Influence: Weaponising Perception and Reality Manipulation\u201d  will explore the evolving landscape of information warfare, focusing on the intersection of artificial intelligence and social media manipulation. The discussion will draw from extensive research on Russian and Chinese influence operations and the impact of EU sanctions. The panel will investigate the role of generative AI in both propagandist and defensive capacities, examining the benefits and risks associated with AI-powered tools in targeted digital persuasion campaigns. Additionally, we aim to highlight the use of advanced AI technology in identifying and countering hostile influence operations across various geopolitical contexts, including the ongoing conflicts in Ukraine and the Middle East.Finally, experts will conclude the discussion with the current capabilities of social media platforms to detect and counter automated commercial manipulations.<\/p>\n<\/div>\n<div class=\"speaker\"><span class=\"\">Session Organizer: <\/span><br \/>\n<a href=\"https:\/\/stratcomcoe.org\/\" target=\"_blank\" rel=\"noopener\">NATO Strategic Communications Centre of Excellence (Latvia)<\/a><\/div>\n<div class=\"speaker\"><span>Moderator:<\/span><br \/>\nDr. Gundars Bergmanis-Korats\uff08Latvia\uff09\uff1aNATO StratCom COE\u3000Principal Scientist<\/div>\n<div class=\"speaker\"><span>Panelist:<\/span><br \/>\nMr. Dmytro Plieshakov\uff08Ukrainia\uff09\uff1aOsavul CEO<br \/>\nDr. Yukai Zeng\uff08Singapore\uff09\uff1aNATO StratCom COE\u3000 Senior Expert<br \/>\nMr. SUYAMA Ko \uff08Japan\uff09\uff1aSenior Analyst of Constella Security Japan<\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>17:40<br class=\"sp-hide\"> &#8211; 19:10<\/th>\n<td class=\"event\">Session1-5<\/td>\n<td>\n<div class=\"title\">Critical Infrastructure Protection 1 (Transportation &#038; Logistics): &#8220;Safeguarding Global Trade \u2013 Enhancing Logistics Critical Infrastructure Resilience&#8221;<\/div>\n<div class=\"abstract\">\n<p>The cargo ship Dali crashed into the Francis Scott Key Bridge shutting down the port of Baltimore and closing a major shipping lane or more than two months.  Failure of the electrical system after escorting tugs had released the cargo ship made it the perfect scenario to impact the supply chain.   As our shipping becomes more \u201cfly by wire\u201d the opportunity for malicious failures are more prevalent.  In addition, unauthorized surveillance devices found on cranes operating in ports equipped with cellular modems that appear to be backdoor for remote access have been found suggesting preparation of the battlefield for future attacks.  These are the entry points to the national logistics systems with similar issues found in each segment of the logistics chain.<\/p>\n<p>This session will explore the topics of logistics based critical infrastructure resilience understanding threat vectors, civil-military cooperation, the emergence of regulatory frameworks, the application of technology solutions and best practices.  Transportation and logistics are essential for the operation of the highly inter-connected commerce across multiple countries and can be disrupted impacting food and energy security as well as continued operation of manufacturing.  Technology is connecting operational systems through satellite systems allowing for remote manipulation.<\/p>\n<p>The session provides an opportunity to discuss the current state and engage the audience in innovative solutions and cooperative efforts that could be implemented.  The goal is to foster a dialogue between cybersecurity experts, policymakers, and military strategists to develop more resilient infrastructure protection strategies.<\/p>\n<\/div>\n<div class=\"speaker\"><span class=\"\">Session Organizer: <\/span><br \/>\n<a href=\"https:\/\/nuari.org\/\" target=\"_blank\" rel=\"noopener\">Norwich University Applied Research Institutes (NUARI) (United States)<\/a><\/div>\n<div class=\"speaker\"><span>Moderator:<\/span><br \/>\nMr. Phil Susmann\uff08US\uff09\uff1aPresident of Norwich University Applied Research Institutes (NUARI)<\/div>\n<div class=\"speaker\"><span>Panelist:<\/span><br \/>\nMrs, Amy, Ormrod\u3000\uff08Austlaria\uff09\uff1aCygence CEO<br \/>\nCol. \/ MBE \/ Dr. John Davies\uff08UK\uff09\uff1aCo-founder &#038; Chair of Cyber Wales<br \/>\nRADM. HOSHI Naoya\uff08Japan\uff09\uff1aDirector General of Logistics of Maritime Staff Office<\/div>\n<\/td>\n<\/tr>\n<\/table>\n<h2 id=\"day_2\">Dec 5th (Thu) Day 2 <br \/>[Critical Infrastructure Protection]<\/h2>\n<table>\n<tr>\n<th>8:30<br class=\"sp-hide\"> &#8211; 10:10<\/th>\n<td class=\"event\">Opening Ceremony &#038; Welcome Remarks<\/td>\n<td>\n<div class=\"title\">Opening Remarks<\/div>\n<p>Dr. Eng. \/ MG.(ret) TOKITO Kazuo\uff1aChief of CYDEF2024 Executive Committee (Japan)<\/td>\n<\/tr>\n<tr>\n<th><\/th>\n<td class=\"event\">Keynote Speech<\/td>\n<td>\n<div class=\"title\"><\/div>\n<p>Dr. TEZUKA Satoru \uff08Japan\uff09\uff1aProject Professor of Global Research Institute, Keio University<br \/>\n&#8220;Digital Cyber Security for National Security, Economic Security, and Societal Security&#8221;<\/p>\n<p>Mr. Minier Jiro \uff08Germany \/ France\uff09\uff1aLead, Threat Intelligence Research &#038; Analysis\uff0cDeutsche Cyber-Sicherheitsorganisation (DCSO)<br \/>\n&#8220;Lessons Learned the Hard Way: Critical Considerations for Critical Infrastructure Protection&#8221;<\/p>\n<p>Mr. Alexander Patton\uff08UK\uff09\uff1aCyber Security Lead &#8211; Japan, Amentum<br \/>\n&#8220;Critical Infrastructure Protection and Public-Private Partnership in the UK&#8221;\n<\/td>\n<\/tr>\n<tr>\n<th>10:30<br class=\"sp-hide\"> &#8211; 12:00<\/th>\n<td class=\"event\">Session2-1<\/td>\n<td>\n<div class=\"title\">Critical Infrastructure Protection 2 (Energy): &#8220;Cybersecurity and Resilience of Critical Energy Infrastructure&#8221;<\/div>\n<div class=\"abstract\">\n<p>The 2021 Colonial Gas Pipeline ransomware attack in the United States demonstrated that the cybersecurity of critical energy infrastructure is of global concern. As more countries shift to green and renewable energy sources, partly in response to oil and gas concerns surrounding the ongoing Russia-Ukraine war, and partly to commitments to uphold climate change agreements, we can be certain that adversarial nation states and criminals will seek opportunities to disrupt international order by increasing cyber attacks on the energy sector.<\/p>\n<p>Our CYDEF panel includes experts who are seeking solutions to the threat of cyber attack on energy infrastructure. We will explore how nations within the Indo-Pacific region are preparing for and securing their national and shared energy resources, including operational control systems, renewable energy generation, electrical grids, battery storage, or gas\/oil storage and transfer.<\/p>\n<\/div>\n<div class=\"speaker\"><span class=\"\">Session Organizer: <\/span><br \/>\n<a href=\"https:\/\/cyber.army.mil\/\" target=\"_blank\" rel=\"noopener\">U.S. Army Cyber Institute (Unietd States)<\/a><\/div>\n<div class=\"speaker\"><span>Moderator:<\/span><br \/>\nDr. \/ LTC. Jason Brown\uff08USA\uff09\uff1aArmy Cyber Institute\u3000Assistant Professor<\/div>\n<div class=\"speaker\"><span>Panelist:<\/span><br \/>\nMr Ashwinder Malhotra\uff08USA\uff09\uff1aCybersecurity Analyst, United States Indo-Pacific Command<br \/>\nDr. Sarah Lohmann\uff08USA\uff09\uff1aFull-Time Teaching Faculty (University of Washington) and Visiting Researcher (USMA)<br \/>\nMr. YUKI Norihisa\uff08Japan\uff09\uff1aCybersecurity Strategist, NTT Security Japan\n<\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>12:00 &#8211; <\/th>\n<td class=\"event\">Luncheon<\/td>\n<td>\n<div class=\"title\"><\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>13:00<br class=\"sp-hide\"> &#8211; 13:45<\/th>\n<td class=\"event\">Session2-2<\/td>\n<td>\n<div class=\"title\">Keynote Speech<\/div>\n<p>Mr. Otakar Hor\u00e1k\uff08Czech\uff09\uff1aNATO CCDCOE\u3000Researcher \/ National expert<br \/>\n&#8220;International Law in Cyberspace &#8211; Shaped by the Practice of States&#8221;<\/p>\n<p>Mr. Derek Manky (Canada)\uff1aChief Security Strategist &#038; Global VP Threat Intelligence, Fortinet, Inc.<br \/>\n&#8220;The Accelerated OT Playbook&#8221;\n<\/td>\n<\/tr>\n<tr>\n<th>14:00<br class=\"sp-hide\"> &#8211; 15:30<\/th>\n<td class=\"event\">Session2-3<\/td>\n<td>\n<div class=\"title\">Critical Infrastructure Protection 3 (Communication &#038; Information System): &#8220;Identifying cyber threats and promoting resilience  for Satellite Communications (SATCOM)&#8221;<\/div>\n<div class=\"abstract\">\n<p>Satellite communications (SATCOM) are a significant aspect of national security and play a pivotal role in connecting society. They underpin critical infrastructure and modern economic activity and are a crucial point of multi-domain advantage or vulnerability. Financial trading, for example, increasingly leverages SATCOM connectivity through very small aperture terminals (VSATs), and there are diverse military dependencies including for command and control (C2). The societal, economic, and strategic significance of SATCOM makes it a target for adversaries.<\/p>\n<p>Cyber-attacks are a vector by which adversaries seek to target and impact SATCOM. The February 2022 cyber-attack on ViaSat, attributed to Russia, is a prominent case of this but it is not an isolated incident. Cyber threat actors have targeted SATCOM to gather intelligence, achieve access, and create destructive effects among other objectives. As SATCOM is commercialised, cyber-attacks increasingly target private companies many of whom have insufficient incentives or abilities to prioritise cyber security. SATCOM has limited regulation, complex supply chains, few cyber security personnel, and faces unique trade-offs in security vs functionality. Cyber capabilities targeting satellite systems have proliferated over the last 20 years, with around 30 countries now possessing cyber counterspace capabilities.  Moreover, countries that lack sophisticated SATCOM are incentivised to offset their disadvantage by disrupting other\u2019s capabilities. There is a clear need to assess and improve SATCOM cyber security and resilience.<\/p>\n<\/div>\n<div class=\"speaker\"><span class=\"\">Session Organizer: <\/span><br \/>\n<a href=\"https:\/\/rusi.org\/\" target=\"_blank\" rel=\"noopener\">Royal United Services Institute (RUSI) (United Kingdom)<\/a><\/div>\n<div class=\"speaker\"><span>Moderator:<\/span><br \/>\nMr. Joseph Jarnecki\uff08UK\u30fbPoland\uff09\uff1aRoyal United Services Institute\u3000Research Fellow<\/div>\n<div class=\"speaker\"><span>Panelist:<\/span><br \/>\nLTC. Andrea, Console\uff08Italy\uff09\uff1aNATO Space COE Chief of Staff<br \/>\nDr. Cassandra Steer\uff08Austlaria\uff09\uff1aChair of Australian Centre for Space Governance<br \/>\nCOL. SUGIYAMA Kimitoshi\uff08Japan\uff09\uff1aCommander Space Operations Group, Japan Air Self Defense Force\n<\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>15:50<br class=\"sp-hide\"> &#8211; 17:20<\/th>\n<td class=\"event\">Session2-4<\/td>\n<td>\n<div class=\"title\">Critical Infrastructure Protection 4 (Conclusion): &#8220;Preparing for a Taiwan Contingency \u2013 What Needs to Be Done Now? &#8220;<\/div>\n<div class=\"abstract\">\n<p> As geo-political tension in East Asia intensifies, preparing for potential conflict becomes an important issue for countries in the region. Ensuring service availability of social infrastructure is one of the most important mission and enhanced public-private-partnership will be necessary. In this session, panelists will share perspectives of potential cyber threat scenario and actions taken to prepare for the potential threats. Key factors for successful public-private-partnership will be also addressed.<\/p>\n<\/div>\n<div class=\"speaker\"><span class=\"\">Session Organizer: <\/span><br \/>\n<a href=\"https:\/\/cydef.net\/\" target=\"_blank\" rel=\"noopener\">The Organization for Cyber Defense Innovation<\/a><\/div>\n<div class=\"speaker\"><span>Moderator:<\/span><br \/>\nMr. YOKOHAMA Shinichi\uff08Japan\uff09\uff1aGroup Chief Information Security Officer (CISO) and CEO, NTT Holdings \/ CEO, NTT Security Holdings\n<\/div>\n<div class=\"speaker\"><span>Panelist:<\/span><br \/>\nMr. NAKAMA Chikara\uff08Japan\uff09\uff1aBusiness Development Executive for CIP, Splunk<br \/>\nCAPT Oscar Simmons\uff08US\uff09\uff1aDirector\u3000C4 Systems, United States Forces Japan<br \/>\nDr. Yisuo Tzeng,(Taiwan) \uff1aAssociate Research Fellow, Institute for National Defense and Security Research<br \/>\nMr. Geistautas Cernius (Lithuania) \uff1aHead of Division, National Cyber Security Centre of Lithuania\n<\/div>\n<\/td>\n<\/tr>\n<\/table>\n<h2 id=\"day_3\">Dec 6th (Fri)  Day 3 <br class=\"sp-show\">[Summary]<\/h2>\n<table>\n<tr>\n<th>8:30<br class=\"sp-hide\"> &#8211; 9:05<\/th>\n<td class=\"event\">Opening Ceremony &#038; Welcome Remarks<\/td>\n<td>\n<div class=\"title\">Opening Remarks<\/div>\n<p>Dr. Eng. \/ MG.(ret) TOKITO Kazuo\uff1aChief of CYDEF2024 Executive Committee (Japan)\u3000<!--\uff08Adjustment of notation method3-0-1\uff09--><\/td>\n<\/tr>\n<tr>\n<th><\/th>\n<td class=\"event\">Keynote Speech<\/td>\n<td>\n<div class=\"title\"><\/div>\n<p>Dr. Sandro Gaycken\uff08Germany\uff09\uff1aDirector, Digital Society Institute Berlin<br \/>\n&#8220;Are Our Free and Democratic Countries Competitive Enough in the Great Power Struggle?&#8221;\n<\/td>\n<\/tr>\n<tr>\n<th>9:05<br class=\"sp-hide\"> &#8211; 10:15<\/th>\n<td class=\"event\">Session3-1<\/td>\n<td>\n<div class=\"title\">Summary<\/div>\n<div class=\"report\">Modern Conflict<\/div>\n<p>\u3010\u5831\u544a\u8005\u3011Dr. Claire Kwan\uff08Luxembourg\uff09\uff1aNATO Cooperative Cyber Defence Centre of Excellence Senior National Representative<\/p>\n<div class=\"report\">Cognitive Warfare 1<\/div>\n<p><span>\u3010\u5831\u544a\u8005\u3011<\/span>Dr. \/ COL. Josef Schr\u00f6fl \uff08Austria\uff09\uff1aHybrid CoE Deputy Director for Strategy &#038; Defence<\/p>\n<div class=\"report\">Cognitive Warfare 2<\/div>\n<p>\u3010\u5831\u544a\u8005\u3011Dr. Gundars Bergmanis-Korats\uff08Latvia\uff09\uff1aNATO StratCom COE\u3000Principal Scientist<\/p>\n<div class=\"report\">Critical Infrastructure 1 (Transportation &#038; Logistics)<\/div>\n<p>\u3010\u5831\u544a\u8005\u3011Col. \/ MBE \/ Dr. John Davies\uff08UK\uff09\uff1aCo-founder &#038; Chair of Cyber Wales<\/p>\n<div class=\"report\">Critica Infrastructure 2 (Energy)<\/div>\n<p>\u3010\u5831\u544a\u8005\u3011Dr. \/ LTC. Jason Brown\uff08USA\uff09\uff1aArmy Cyber Institute\u3000 Assistant Professor<\/p>\n<div class=\"report\">Critical Infrastructure 3 (Communication &#038; Information System)<\/div>\n<p>\u3010\u5831\u544a\u8005\u3011Mr. Joseph Jarnecki\uff08UK\u30fbPoland\uff09\uff1aRoyal United Services Institute\u3000Research Fellow<\/p>\n<div class=\"report\">Critical Infrastructure 4  (Conclusion)<\/div>\n<p>\u3010\u5831\u544a\u8005\u3011Mr. NAKAMA Chikara\uff08Japan\uff09\uff1aBusiness Development Executive for CIP, Splunk\n<\/td>\n<\/tr>\n<tr>\n<th>10:35<br class=\"sp-hide\"> &#8211; 11:50<\/th>\n<td class=\"event\">Session3-2<\/td>\n<td>\n<div class=\"title\">Program Panel &#8211; Looking Ahead to Next Year<\/div>\n<div class=\"speaker\"><span>Moderator:<\/span><br \/>\nMr. HASHIMOTO Go\uff08Japan\uff09\uff1aPartner, Ohebashi LPC &#038; Partners\n<\/div>\n<div class=\"speaker\"><span>Panelist:<\/span><br \/>\nDr. \/ COL. Josef Schr\u00f6fl\uff08Austria\uff09\uff1aHybrid CoE Deputy Director for Strategy &#038; Defence<br \/>\nDr. Gundars Bergmanis-Korats\uff08Latvia\uff09\uff1aNATO StratCom COE\u3000Principal Scientist<br \/>\nDr. \/ LTC. Jason Brown\uff08USA\uff09\uff1aArmy Cyber Institute\u3000 Assistant Professor<br \/>\nMr. Joseph Jarnecki\uff08UK\u30fbPoland\uff09\uff1aRoyal United Services Institute\u3000Research Fellow<br \/>\nLTC. Andrea Console (Italy) \uff1aChief of Staff, NATO Space COE<br \/>\nCol. \/ MBE \/ Dr. John Davies\uff08UK\uff09\uff1aCo-founder &#038; Chair of Cyber Wales<br \/>\nProf.\/ Dr. Gabi Dreo Rodosek\uff08Germany\uff09\uff1aUniversity of the Bundeswehr Munich<br \/>\nProf. Bernard Siman\uff08Belgium\uff09\uff1aSenior Associate Fellow\uff0cEgmont- Royal Institute for International Relations<br \/>\nProf. FUJII Akihiro \uff08Japan\uff09\uff1aProfesseor, Hosei University<\/div>\n<\/td>\n<\/tr>\n<tr>\n<th>11:55 &#8211; <\/th>\n<td class=\"event\">Closing Ceremony &#038; Remarks<\/td>\n<td>\n<div class=\"title\">Closing Remarks<\/div>\n<p>Dr. Eng. \/ MG.(ret) TOKITO Kazuo\uff1aChief of CYDEF2024 Executive Committee (Japan)\u3000<!--\uff08Adjustment of notation method3-3-1\uff09--><\/td>\n<\/tr>\n<\/table>\n<h2 id=\"panel\">Program Panel Members<\/h2>\n<ul class=\"panel-members\">\n<li>Dr.\/LTC. Jason Brown (US Army Cyber Institute) <a class=\"out\" href=\"https:\/\/cydef2024.cydef.net\/en\/speakers\/#JasonBrown\">(Profile)<\/a><\/li>\n<li>Dr. \/ COL. Josef Schroefl (Hybrid COE) <a class=\"out\" href=\"https:\/\/cydef2024.cydef.net\/en\/speakers\/#JosefSchroefl\">(Profile)<\/a><\/li>\n<li>Dr. Clarie Kwan (NATO Cooperative Cyber Defence COE) <a class=\"out\" href=\"https:\/\/cydef2024.cydef.net\/en\/speakers\/#ClaireKwan\">(Profile)<\/a><\/li>\n<li>Dr. Gundars Bergmanis-Korats (NATO Strategic Communications COE) <a class=\"out\" href=\"https:\/\/cydef2024.cydef.net\/en\/speakers\/#GundarsBergmanis-Korats\">(Profile)<\/a><\/li>\n<li>Prof. Phil Susmann (Norwich University Applied Research Institutes (NUARI) ) <a class=\"out\" href=\"https:\/\/cydef2024.cydef.net\/en\/speakers\/#PhilSusmann\">(Profile)<\/a><\/li>\n<li>Mr. Joseph Jarnecki (Royal United Services Institute (RUSI) ) <a class=\"out\" href=\"https:\/\/cydef2024.cydef.net\/en\/speakers\/#JosephJarnecki\">(Profile)<\/a><\/li>\n<li>Prof. Bernard Siman (Egmont Royal Institute for Foreign Relations) <a class=\"out\" href=\"https:\/\/cydef2024.cydef.net\/en\/speakers\/#BernardSiman\">(Profile)<\/a><\/li>\n<li>Dr. Eng. \/ MG.(ret) TOKITO Kazuo (HITACHI Co.Ltd) <a class=\"out\" href=\"https:\/\/cydef2024.cydef.net\/en\/speakers\/#KazuoTokito\">(Profile)<\/a><\/li>\n<li>Dr. IKEGAMI Jyusuke (Waseda Univ.) <!--<a class=\"out\" href=\"https:\/\/cydef2024.cydef.net\/en\/speakers\/#JyusukeIkegami\">(Profile)<\/a>--><\/li>\n<li>Dr. \/ CAPT. (ret)  IDE Tatsuo (Organization for Cyber Defense Innovation) <a class=\"out\" href=\"https:\/\/cydef2024.cydef.net\/en\/speakers\/#TatsuoIde\">(Profile)<\/a><\/li>\n<\/ul>\n<div style=\"margin-top:2.0em;\">\uff08Random Order\uff09<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Dec 4th (Wed) Day 1 [Modern Conflicts and Cognitive Warfare \u30fb Critical Infrastructure Protection] 8:30 &#8211; 10:10 Opening Ceremony &#038; Welcome Remarks Opening Remarks Dr. Eng. \/ MG.(ret) TOKITO Kazuo\uff1aChief of CYDEF2024 Executive Committee (Japan) Welcome Remarks Mr. HONDA Taro\uff08Japan\uff09\uff1aState Minister of Defense Session 1-0 Keynote Speech Mr. Conrad Prince\uff08UK\uff09\uff1aFormer Cyber Security Ambassador, BAE Systems [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_locale":"en_US","_original_post":"https:\/\/cydef2024.cydef.net\/?page_id=34","footnotes":""},"class_list":["post-186","page","type-page","status-publish","hentry","en-US"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Program - CYDEF2024 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cydef2024.cydef.net\/en\/program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program - CYDEF2024 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation\" \/>\n<meta property=\"og:description\" content=\"Dec 4th (Wed) Day 1 [Modern Conflicts and Cognitive Warfare \u30fb Critical Infrastructure Protection] 8:30 &#8211; 10:10 Opening Ceremony &#038; Welcome Remarks Opening Remarks Dr. Eng. \/ MG.(ret) TOKITO Kazuo\uff1aChief of CYDEF2024 Executive Committee (Japan) Welcome Remarks Mr. HONDA Taro\uff08Japan\uff09\uff1aState Minister of Defense Session 1-0 Keynote Speech Mr. Conrad Prince\uff08UK\uff09\uff1aFormer Cyber Security Ambassador, BAE Systems [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cydef2024.cydef.net\/en\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"CYDEF2024 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-28T05:24:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cydef2024.cydef.net\/en\/program\/\",\"url\":\"https:\/\/cydef2024.cydef.net\/en\/program\/\",\"name\":\"Program - CYDEF2024 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation\",\"isPartOf\":{\"@id\":\"https:\/\/cydef2024.cydef.net\/#website\"},\"datePublished\":\"2024-07-16T14:46:01+00:00\",\"dateModified\":\"2024-12-28T05:24:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cydef2024.cydef.net\/en\/program\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cydef2024.cydef.net\/en\/program\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cydef2024.cydef.net\/en\/program\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30db\u30fc\u30e0\",\"item\":\"https:\/\/cydef2024.cydef.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cydef2024.cydef.net\/#website\",\"url\":\"https:\/\/cydef2024.cydef.net\/\",\"name\":\"CYDEF2024 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation\",\"description\":\"CYDEF2024\uff1a\u30e1\u30a4\u30f3\u30c6\u30fc\u30de\u300c\u8105\u5a01\u3068\u5171\u5275\u300d\u30012024\u5e7412\u67082\u65e5\uff08\u6708\uff09\uff5e6\u65e5\uff08\u91d1\uff09\u90fd\u5185\u3067\u958b\u50ac\u3002\u4e16\u754c\u898f\u6a21\u3067\u5897\u5927\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u3078\u306e\u5bfe\u51e6\u3092\u76ee\u7684\u3068\u3057\u3001\u56fd\u969b\u7684\u306a\u9023\u643a\u3001\u5171\u901a\u8a8d\u8b58\u306e\u5f62\u6210\u3092\u76ee\u6307\u3057\u3001\u6280\u8853\u7684\u306a\u691c\u8a0e\u3001\u5b66\u8853\u7684\u306a\u5e45\u5e83\u3044\u8b70\u8ad6\u304c\u884c\u308f\u308c\u308b\u3002\u4e16\u754c\u5404\u56fd\u3088\u308a\u95a3\u50da\u3001\u5c02\u9580\u5bb6\u3001\u7814\u7a76\u8005\u3001\u95a2\u4fc2\u5404\u8005\u304c\u96c6\u307e\u308a\u307e\u3059\u3002\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cydef2024.cydef.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Program - CYDEF2024 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cydef2024.cydef.net\/en\/program\/","og_locale":"en_US","og_type":"article","og_title":"Program - CYDEF2024 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation","og_description":"Dec 4th (Wed) Day 1 [Modern Conflicts and Cognitive Warfare \u30fb Critical Infrastructure Protection] 8:30 &#8211; 10:10 Opening Ceremony &#038; Welcome Remarks Opening Remarks Dr. Eng. \/ MG.(ret) TOKITO Kazuo\uff1aChief of CYDEF2024 Executive Committee (Japan) Welcome Remarks Mr. HONDA Taro\uff08Japan\uff09\uff1aState Minister of Defense Session 1-0 Keynote Speech Mr. Conrad Prince\uff08UK\uff09\uff1aFormer Cyber Security Ambassador, BAE Systems [&hellip;]","og_url":"https:\/\/cydef2024.cydef.net\/en\/program\/","og_site_name":"CYDEF2024 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation","article_modified_time":"2024-12-28T05:24:02+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cydef2024.cydef.net\/en\/program\/","url":"https:\/\/cydef2024.cydef.net\/en\/program\/","name":"Program - CYDEF2024 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation","isPartOf":{"@id":"https:\/\/cydef2024.cydef.net\/#website"},"datePublished":"2024-07-16T14:46:01+00:00","dateModified":"2024-12-28T05:24:02+00:00","breadcrumb":{"@id":"https:\/\/cydef2024.cydef.net\/en\/program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cydef2024.cydef.net\/en\/program\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cydef2024.cydef.net\/en\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30db\u30fc\u30e0","item":"https:\/\/cydef2024.cydef.net\/"},{"@type":"ListItem","position":2,"name":"Program"}]},{"@type":"WebSite","@id":"https:\/\/cydef2024.cydef.net\/#website","url":"https:\/\/cydef2024.cydef.net\/","name":"CYDEF2024 - \u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u6a5f\u69cb \/ Organization for Cyber Defence Innovation","description":"CYDEF2024\uff1a\u30e1\u30a4\u30f3\u30c6\u30fc\u30de\u300c\u8105\u5a01\u3068\u5171\u5275\u300d\u30012024\u5e7412\u67082\u65e5\uff08\u6708\uff09\uff5e6\u65e5\uff08\u91d1\uff09\u90fd\u5185\u3067\u958b\u50ac\u3002\u4e16\u754c\u898f\u6a21\u3067\u5897\u5927\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b9\u30af\u3078\u306e\u5bfe\u51e6\u3092\u76ee\u7684\u3068\u3057\u3001\u56fd\u969b\u7684\u306a\u9023\u643a\u3001\u5171\u901a\u8a8d\u8b58\u306e\u5f62\u6210\u3092\u76ee\u6307\u3057\u3001\u6280\u8853\u7684\u306a\u691c\u8a0e\u3001\u5b66\u8853\u7684\u306a\u5e45\u5e83\u3044\u8b70\u8ad6\u304c\u884c\u308f\u308c\u308b\u3002\u4e16\u754c\u5404\u56fd\u3088\u308a\u95a3\u50da\u3001\u5c02\u9580\u5bb6\u3001\u7814\u7a76\u8005\u3001\u95a2\u4fc2\u5404\u8005\u304c\u96c6\u307e\u308a\u307e\u3059\u3002","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cydef2024.cydef.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cydef2024.cydef.net\/wp-json\/wp\/v2\/pages\/186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cydef2024.cydef.net\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cydef2024.cydef.net\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cydef2024.cydef.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cydef2024.cydef.net\/wp-json\/wp\/v2\/comments?post=186"}],"version-history":[{"count":59,"href":"https:\/\/cydef2024.cydef.net\/wp-json\/wp\/v2\/pages\/186\/revisions"}],"predecessor-version":[{"id":349,"href":"https:\/\/cydef2024.cydef.net\/wp-json\/wp\/v2\/pages\/186\/revisions\/349"}],"wp:attachment":[{"href":"https:\/\/cydef2024.cydef.net\/wp-json\/wp\/v2\/media?parent=186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}