Information about the Workshops

The workshops took place on July 11th. Here you can find more information about the individual workshops.

If we have the consent of the speakers, you will find the presentation slides listed below. As soon as we receive more slides and summaries of the workshops, you will also find them here.

Workshop 1 (Room 0231): Geoinformation Systems

This workshop brings together researchers and practitioners from the fields of spatial data acquisition, spatial data management, and spatial data science in order to discuss the current status of the field from different perspectives. This includes a technical point of view related to managing big and complex spatial data including trajectories of moving objects and dense point clouds, a perspective of open source for spatial applications, perspectives of spatiotemporal statistics, remote sensing and Earth observation, and data science and data fusion.

With this multidisciplinary perspective, the speakers cover a wide portion of the field of working with spatiotemporal data with significant differences in data, terminology, demand, and abilities. Therefore, a panel discussion will ask question giving title to the workshop: what is going to happen in the domain of spatial data collection, analysis, and application. The audience is warmly welcomed to join this discussion.

Moderation and Organization:
  • Martin Werner, DLR / Universität der Bundeswehr, Big Geospatial Data

Speakers/Panelists:
  • Anita Graser, Austrian Institute of Technology, Spatial Data Science, Open Source GIS Advocate [presentation slides]
  • Philipp Otto, Universität Hannover, Spatiotemporal Statistics and Modelling, Environmetrics
  • Michael Schmitt, Technische Universität München, Earth Observation, SAR/Optical Fusion
  • Matthias Renz, Universität Kiel, Data Science, Searching & Mining heterogeneous and uncertain data
  • Martin Werner, Deutsches Zentrum für Luft- und Raumfahrt [presentation slides]
 

 

Workshop 2 (Room 1101): Challenges and Application of Threat Intelligence

With cybersecurity at the top of the agenda for many decision makers, ENISA realized that business and organizations are demanding for technical and non-technical strategic insights that will inform leaders on the most relevant threats facing their operations. Cyber threat Intelligence (CTI), as one of the core disciplines in Cybersecurity, is best positioned to respond to this challenge. CTI is capable of delivering these insights by integrating security data from across the enterprise enriched with external context to provide a complete perspective of the organization’s threat landscape. This seamless and integrated approach strengthens the organization’s security posture by empowering stakeholders with an informed view on how cyber threats are relevant to their areas of responsibility.

In 2018, ENISA introduced a CTI Capability Framework and Maturity Model in the annual threat landscape report, aiming at organizations willing to establish or maturing their CTI program. The proposed methodology prescribes a proactive approach, through the implementation of a CTI Program and the introduction of an operational framework that includes a proper governance structure and a maturity model. The capabilities identified in the framework are multiple and are designed to enable the continuous production of relevant, contextualized and actionable information about threats, bridging the gap between technical and non-technical aspects of CTI for any organization.

Topics to develop in the CTI Workshop:
1) CTI framework and capability model
2) CTI maturity model
3) How to implement a CTI practice within an organization

Moderation and Organization:
  • Louis Marinos, ENISA
  • Marco Barros Lourenco, ENISA
 

 

Workshop 3 (Room 1231): Quantum Computers and Applications

This year the focus of the workshop "Quantum Computers and Applications" will be on software and examples. On the one hand quantum annealing is presented as a specialized approach for specific optimization problems. On the other hand universal quantum computation is explained with the help of frameworks/SDKs like Qiskit and Q#

Moderation and Organization:
  • Klaus Buchenrieder, Ph.D, Research Institute CODE
  • Dr. Wolfgang Gehrke, Research Institute CODE, moderator

Speaker:
  • Sebastian Zielinski, Software for adiabatic QC, Institut für Informatik, LMU
  • Damian Steiger, Q# and and quantum inspired optimization, Microsoft
  • Francois Varchon, Presentation of Qiskit, IBM
  • Leonie Bruckert, Post Quantum Cryptography, Secunet Security Networks AG
 

 

Workshop 4 (Room 1131): AI for Cyber Security

In the future Cyber security systems that use Artificial Intelligence (AI) will help to detect in the future the intelligent hackers and their attacks, avoid damage and minimize risks in the desired digitization process.

Application fields are for example, the increase of detection rate of attacks, support / relief of cyber security experts, improvements of existing cyber security solutions as well as detection of malware, spam, fake news, etc. or secure software development, IT forensics, threat intelligence, etc.

Additional, the security and trustworthiness of AI systems themselves are becoming increasingly important.

In the workshop AI for Cyber Security, we want to deal with the basic ideas and possibilities of AI in the field of cyber security and discuss which topics can be particularly relevant in the near future.

Moderation and Organization:
  • Norbert Pohlmann, Professor in the Computer Science Department for information security and director of the Institute for Internet Security at the University of Applied Sciences Gelsenkirchen, Germany [presentation slides deu. / engl.]

Speakers/Panelists:
  • Ammar Alkassar, Commissioner for Innovation, Saarland
  • Ulla Coester, Partner Wegesrand, Lecturer at the Hochschule Fresenius
 
 
Workshop 5 (Room 0301): Cyber Range - Oportunities and Challenges

Defending networks from cyber attacks is a continuous effort, based on deploying, operating, and monitoring a variety of advanced cyber defence tools and products. Knowing the operational gaps in one’s networks is a key element in achieving comprehensive IT cyber defence solution. Thus, the capability to train cyber security personnel on realistic threat scenarios, to test tools and new equipment in a simulated/emulated environment and design and configure new network architectures are crucial to the improvement of cyber defence capabilities.

Cyber Ranges are simulation platforms and have emerged to a means to achieve the before mentioned goals -  training of IT and cybersecurity professionals, including assessing incident response processes, and testing new technologies and network architectures.

Given the fact that cyber attacks are occurring on an increasing scale, hands-on cyber security education and training is critical. Practical activities can ensure that trainees will acquire skills necessary to deal with cyber incidents in real-life situations.

Cyber Ranges are typically based on virtualization technology and are used to set up complex computer networks, simulate events, and observe phenomena in a controlled environment. However, to set up realistic tests, training or exercises in a cyber range is often difficult, expensive and error prone, since the customized training environments rely significantly on the manual setup and configuration, which is a tedious and inefficient.

Within this workshop different Cyber Ranges with different approaches are presented. The aim of the workshop is to discuss both best practices and technologies and infrastructures required to simulate real systems with cyber incidents. Furthermore it will be discussed how Cyber Ranges with different scopes could be federated in order to provide a broader portfolio of scenarios for a more efficient training.

Moderation and Organization:
  • Prof. Dr. Arno Wacker, RI CODE

Speakers/Panelists:
  • Jean De Cornulier, Airbus CyberSecurity France
  • Volker Eiseler/Matthias Schopp, RI CODE [presentation slides]
  • Jakub Čegan and Daniel Tovarňák, Masaryk University, Czech Republic
 
Workshop 6 (Room 0331): Digital Souvereignty - A Must for Europe

With the gradual decline of the EU ICT industry over the past two decades relative to the US and China, the question of European digital sovereignty has become an increasing concern. As of 2018, data published by the European Commission indicates that there is no European company in the global top 15 digital companies. At present, Europe is an ICT taker rather than an ICT maker, and barring a change of course there is no indication of a reversal of this trend.

With the manufacturing and development of ICT products and services predominately in control of non-EU industry, the difficulty of working towards a digitally sovereign Europe is significantly increased. The perceived loss of grip on European digital sovereignty is particularly disquieting from a cybersecurity perspective. Strong cybersecurity is a prerequisite for a digitally sovereign Europe, and conversely a competitive ICT industry is needed to develop effective cybersecurity solutions.

Against this backdrop, it is clear that now more than ever the EU should seek to review its policy approach to the European ICT industry and work to improve its competitiveness in the global marketplace, as well as in the domestic marketplace. This workshop will provide a forum for discussion on how such a policy shift can be achieved and how we can move towards a more competitive and more digitally sovereign European ICT sector.

Organisation:
  • Olivier Van Geel, ENISA

Moderation:
  • Steve Purser, ENISA

Speakers/Panelists:
  • Ilias Chantzos, Symantex
  • Detlef Houdeau, Infineon
  • Dr. Patrick Jungkunz, BMVG