Workshops 19ENISE

Tuesday, October 14th
Create to transfer (3rd edition)
14th October, 12:00 - 14:00, Workshop 1
This session presented various ongoing projects in the field of cybersecurity and discuss collaboration and transfer in R&D.
Overview and status of the MCCE ORICE / 2MCCE
14th October, 15:00 - 15:45, Workshop 1
Presentation on the current status, functions and structure of the Joint Cyber Defence Command (MCCE).
Its capabilities, evolution and main challenges in the field of cybersecurity and defence were discussed.
Artificial intelligence centre breeding
14th October, 15:45 - 16:30, Workshop 1
Presentation of the Artificial Intelligence Reference Centre (CRIA).
Its objectives, lines of research and how it contributes to innovation in AI applied to security and defence were explained.
5G research centre
14th October, 16:30 - 17:15, Workshop 1
Talk on research and developments surrounding 5G technology. The risks, opportunities and applications in the military, security and critical communications fields were highlighted.
Awareness of cyber threats / ORICE
14th October, 17:15 - 18:00, Workshop 1
Awareness session to increase cybersecurity culture. Examples of common threats, attack vectors, and best practices for preventing incidents were discussed.
How to launch and scale start-ups in the exponential era
14th October, 12:00 - 17:00, Workshop 2
Workshop space restricted to entities collaborating with the INCIBE Emprende programme.
*Restricted access
Wednesday, October 15th
CYSSDE project workshop
15th October, 09:30 - 14:00, Workshop 1
10:15-10:30 Registration & Welcome
10:30-10:45 Welcome speech: The CYSSDE Project
10:45-11:20 Open Call Project Presentations
11:20-11:50 Coffee Break & Networking
11:50-12:15 CYSSDE Scenario Blueprints and technical demonstration
12:15-12:45 CYSSDE Way forward - Open Call 3, common challenges and support programe
12:45-13:00 Key learnings, closing notes, next steps
CPSTIC and new technologies: preparing ICT products for the future
15th October, 15:00 - 16:30, Workshop 1
In this session, we discussed how to align ICT product development with CPSTIC requirements and emerging technology trends. Key aspects such as functional certification (CC, LINCE), the incorporation of quantum-resistant cryptography, and the role of governance in the product lifecycle were addressed. A strategic and technical vision for manufacturers seeking to ensure the viability and acceptance of their solutions in critical and regulated environments.
Protection of Sensitive and Classified Information. Evolution towards CLOUD environments, New Paradigm
15 October, 16:30 - 18:00, Workshop 1
The current activities carried out by the National Cryptology Centre in the field of sensitive and classified information protection were detailed, starting with the different applicable regulatory frameworks, moving on to the necessary operational and technical actions in ICT environments of this nature, concluding with the new paradigm for processing this type of information in public cloud environments and how the National Cryptology Centre is addressing this issue together with other European nations and non-EU countries.
How to design and develop Conversational Artificial Intelligence based on a Large Language Model (LLM). The case of cibersegurIA.
15th October, 10:00 - 11:30, Workshop 2
Joint RETECH Node Commission
15th October, 11:30 - 14:00, Workshop 2
Closed space for representatives of the 17 Autonomous Communities.
*Restricted access
AI as a Service: Use cases for optimising efficiency and quality in cybersecurity
15th October, 15:00 - 16:00, Workshop 2
This workshop presented results and proposals based on Artificial Intelligence (AI) to optimise the quality and productivity of different cybersecurity services. Real cases were shown, including the use of generative AI in Agent as a Service (AaaS) mode for the translation and generation of Spanish titles for vulnerability alerts, as well as for the development of a multi-agent system for the classification of cyber incidents. In addition, results were shown from the application of temporal models for predicting cybersecurity event notification windows, and the use of mathematical feature selection models to reinforce the explainability (XAI) of the decisions made by these models.
Innovating Forensic Labs: From Insight to Evidence
15th October, 16:00 - 17:30, Workshop 2
Thursday, October 16th
Cybercooperants, a vocation for teaching cybersecurity
16th October, 10:00 - 11:00, Workshop 1
Scraping web pages in search of valuable data
16th October, 11:30 - 14:00, Workshop 1
Industrial Cybersecurity in Automation and Control Systems Session of the Spanish Automation Committee (CEA)
16th October, 10:00 - 13:00, Workshop 2



