AboutCommunication, Networking and Broadcast Technologies; Components, Circuits, Devices and Systems; Computing and Processing; Robotics and Control Systems Keywords:cyber security,cyber conflict,Cyberspace,cyber stategy,cyber law,cyber norms,Data Privacy,cyber infrastructure,critical infrastructure,network defence,network protection,Standards,Protocols,security challenges, Scope:Cyber effects in multi-domain operations and in conflict (concepts/tactics/characteristics/legal implications) • National cyber strategies and policies in/for armed conflict • Private companies as the providers of cyber infrastructure and protection • Non-state actors - volunteers, hacktivists and cyber partisans • Legal aspects of cyber recruitment • Biometric data processing for identification or targeting purposes • Use of drones (for combat or surveillance) • Technical, strategic and/or legal questions related to the deployment of autonomous capabilities • Cyber training needs before and during armed conflict • Military (cyber) exercises • Narrative control in/through cyberspace • Information and intelligence sharing • International law aspects of propaganda and influence operations • (Cyber) neutrality in a globalized world • (Cyber) cooperation vs competition between Russia and China • Critical infrastructure security• AI use-cases in cybersecurity Sponsor Type:3; 9
留言