KOMITÉ NASJONAL

Les tips fra komitéene:

Les tips fra komitéene:

Spor:

 

Språk: Norsk eller engelsk

Lengde: 40 minutter eller lyntale (10 min)

Generelt: Vi ønsker foredrag som tar opp aktuelle problemstillinger for sporene, eller på tvers av disse, gjerne med kobling til aktuelle samfunnsspørsmål eller på annen måte av interesse for et bredt publikum.

Listene under gir noen forslag og innspill til aktuelle tema for hvert av sporene.

National security:

We are looking for talks that provide insightful, new, and ideally multidisciplinary perspectives related to cyber threats, state actors, how they shape our security landscape, and how they should be addressed nationally or internationally. The following bullet points provide some examples of relevant topics.

  • Updated threat landscape (national focus)
  • Cyber-situational awareness (strategic / national level)
  • National digital autonomy and national control
  • Cybersecurity as it relates to the total defence concept (totalforsvaret)
  • Applications of cybersecurity to critical domains, such as space, offshore, and OT
  • Cybersecurity governance and coordination, on a national and/or international level
  • Hybrid threats and how to address them
  • Private-public partnerships in national digital security
  • Policy and regulatory developments, nationally or abroad
  • Society’s strategic needs, as relates to cyber operations and use of power
  • Other real-world examples, case studies, and war stories

Cybercrime:

We are looking for talks that provide insightful, up-to-date, and ideally multidisciplinary perspectives on the evolution of cybercrime; its trends, the threat actors, their methods, infrastructures, and business models, and how we can detect and prevent cybercrime and cyber-enabled crime. The following bullet points provide some examples of relevant topics.

  • Updated threat landscape (national focus)
  • Policy and regulatory developments, nationally or abroad
  • Business models and incentives for cybercrime, such as “Cybercrime-as-a-service”
  • Emerging trends and threats in cybercrime
  • Victims of cybercrime and their perspectives
  • Collaboration between private sector and the police during incidents and investigations
  • Which mitigations and controls are more effective in preventing cybercrime?
  • Other real-world examples, case studies, and war stories

Threat intelligence (TI):

We are looking for talks that provide listeners with valuable and tangible knowledge about practical threat intelligence they can start using in the office. Think of what you would have loved to listen to if you were in the audience. Use the bullet points below as ideas to start shaping your CFP:

  • Updated threat landscape (at the operational and/or strategic level, or with a business focus)
  • Threat Intelligence and decision-support: 
    • From TI to business decisions (Risk reduction)
    • TIs place in the risk equation
  • Strategic security cooperation and trusted sharing communities as a business enabler
  • Translating Tactical TI to strategic value
  • Threat Intelligences’ role in Business Intelligence
  • Foresight: Scenarios and indicators based on TI and relevant to the business
  • Practical experiences with implementing traditional intelligence methodologies
  • Other real-world examples, case studies, and war stories

Cryptography:

We request talks that clearly address and engage with a broader audience, at the intersections of cryptography and other key topics in security and privacy, rather than talks primarily aimed at experts within the crypto community. Beyond that requirement, we will consider most relevant topics. The following examples are provided to give some ideas:

  • Cryptography in the public sphere, real-world use-cases and challenges
  • Post-quantum migration, perhaps as seen from a user perspective
  • Important or surprising attacks on algorithms, protocols, or systems
  • Crypto regulation and policy (e.g. Chat Control, the “Crypto Wars”)
  • Secure electronic voting
  • Designing and operating complex PKIs in the real world
  • Mainstream usage of cryptocurrency techniques (e.g. central bank digital currency)
  • Popular introductions to crypto for non-cryptographers
  • Other real-world examples, case studies, and war stories