Workshops 19ENISE

 

Tuesday, October 14th

Create to transfer (3rd edition)

14th October, 12:00 - 14:00, Workshop 1

This session presented various ongoing projects in the field of cybersecurity and discuss collaboration and transfer in R&D.

Overview and status of the MCCE ORICE / 2MCCE

14th October, 15:00 - 15:45, Workshop 1

Presentation on the current status, functions and structure of the Joint Cyber Defence Command (MCCE).
Its capabilities, evolution and main challenges in the field of cybersecurity and defence were discussed.

Artificial intelligence centre breeding

14th October, 15:45 - 16:30, Workshop 1

Presentation of the Artificial Intelligence Reference Centre (CRIA).
Its objectives, lines of research and how it contributes to innovation in AI applied to security and defence were explained.

5G research centre

14th October, 16:30 - 17:15, Workshop 1

Talk on research and developments surrounding 5G technology. The risks, opportunities and applications in the military, security and critical communications fields were highlighted.

Awareness of cyber threats / ORICE

14th October, 17:15 - 18:00, Workshop 1

Awareness session to increase cybersecurity culture. Examples of common threats, attack vectors, and best practices for preventing incidents were discussed.

How to launch and scale start-ups in the exponential era

14th October, 12:00 - 17:00, Workshop 2

Workshop space restricted to entities collaborating with the INCIBE Emprende programme. 

*Restricted access

 

Wednesday, October 15th

CYSSDE project workshop 

15th October, 09:30 - 14:00, Workshop 1

10:15-10:30 Registration & Welcome

10:30-10:45 Welcome speech: The CYSSDE Project

10:45-11:20 Open Call Project Presentations

11:20-11:50 Coffee Break & Networking

11:50-12:15 CYSSDE Scenario Blueprints and technical demonstration

12:15-12:45 CYSSDE Way forward - Open Call 3, common challenges and support programe

12:45-13:00 Key learnings, closing notes, next steps

CPSTIC and new technologies: preparing ICT products for the future  

15th October, 15:00 - 16:30, Workshop 1

In this session, we discussed how to align ICT product development with CPSTIC requirements and emerging technology trends. Key aspects such as functional certification (CC, LINCE), the incorporation of quantum-resistant cryptography, and the role of governance in the product lifecycle were addressed. A strategic and technical vision for manufacturers seeking to ensure the viability and acceptance of their solutions in critical and regulated environments. 

Protection of Sensitive and Classified Information. Evolution towards CLOUD environments, New Paradigm  

15 October, 16:30 - 18:00, Workshop 1

The current activities carried out by the National Cryptology Centre in the field of sensitive and classified information protection were detailed, starting with the different applicable regulatory frameworks, moving on to the necessary operational and technical actions in ICT environments of this nature, concluding with the new paradigm for processing this type of information in public cloud environments and how the National Cryptology Centre is addressing this issue together with other European nations and non-EU countries.

How to design and develop Conversational Artificial Intelligence based on a Large Language Model (LLM). The case of cibersegurIA.

15th October, 10:00 - 11:30, Workshop 2

Joint RETECH Node Commission 

15th October, 11:30 - 14:00, Workshop 2

Closed space for representatives of the 17 Autonomous Communities.

*Restricted access

AI as a Service: Use cases for optimising efficiency and quality in cybersecurity

15th October, 15:00 - 16:00, Workshop 2

This workshop presented results and proposals based on Artificial Intelligence (AI) to optimise the quality and productivity of different cybersecurity services. Real cases were shown, including the use of generative AI in Agent as a Service (AaaS) mode for the translation and generation of Spanish titles for vulnerability alerts, as well as for the development of a multi-agent system for the classification of cyber incidents. In addition, results were shown from the application of temporal models for predicting cybersecurity event notification windows, and the use of mathematical feature selection models to reinforce the explainability (XAI) of the decisions made by these models. 

 Innovating Forensic Labs: From Insight to Evidence

15th October, 16:00 - 17:30, Workshop 2

 

Thursday, October 16th

Cybercooperants, a vocation for teaching cybersecurity 

16th October, 10:00 - 11:00, Workshop 1

Scraping web pages in search of valuable data

16th October, 11:30 - 14:00, Workshop 1

Industrial Cybersecurity in Automation and Control Systems Session of the Spanish Automation Committee (CEA) 

16th October, 10:00 - 13:00, Workshop 2