This day is the introduction to Security Week, setting the scene for the challenges and opportunities that will be discussed during the week. This workshop will cover:

  • The latest developments in cyber security
  • The threat landscape and major upcoming security threats, challenges and opportunities
  • Case studies of attacks in the past year, attack vectors, and emerging attacks
  • Organisation case studies: how standards helped them to improve their cyber security; are standards of any use at all
  • How these issues relate to forthcoming legislations such as the Cybersecurity Act and ePrivacy regulation

This thread provides a common understanding from which all workshop attendees (policy and technical) can work from during the week. 

Attendees will:

  • Have an appreciation of the breadth and scale of the cyber security challenge we face today
  • Understand the latest developments in cyber security and their impact on the technical landscape
  • Know key features and facts from case studies of recent cyber attacks
  • Leave with a common understanding from which to work during Security Week

Target audience:
Attendees with technical or policy backgrounds, from industry, academia and government, are welcome to gain a broad overview of the latest threats and state-of-the-art security technologies. 

Cyber Security Landscape: Monday 17 June 2019


  • 09:00

    Welcome to the ETSI Security Week and Thread Introduction
    Luis Jorge Romero, ETSI

  • SESSION 1: Opening Speeches - Setting the Scene of the Cyber Security Landscape Chaired by Alex Leadbeater BT, PC Chair
  • 09:10

    Current developments in the threat landscape from APT to Ransomware
    Christoph Fischer, BFK

  • 09:30

    Cooperation in the Cyber Domain
    Michael Widmann, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)

  • 09:50

    Cybersecurity Challenges to European Society: Research, Policy and Standardization Effort
    Fabio di Franco, ENISA

  • 10:10

    Toward a Safe Quantum Future
    Michele Mosca, University of Waterloo

  • 10:30

    Questions & Answers

  • 10:45 Coffee, Posters & Demos
  • SESSION 2: Recent Major Attacks, Threats and Mitigations, chaired by Christoph Fischer, BFK

    This session will give an overview of the major cyber-attacks and threats over the past year and will look at the mitigation actions undertaken.

  • 11:15

    The Threat Landscape
    Eleanor F, NCSC

  • 11:35

    The Mobile Telecommunications Security Threat Landscape
    Samantha Kight, GSMA

  • 11:55

    Mutating Threats – The How, The Where…The Impact, The Opportunities
    Galina Pildush, PaloAlto

  • 12:15

    Questions & Answers

  • 12:30 Lunch, ETSI Explainer, Posters & Demos
  • 12:40

    ETSI Explainer (Amphi Athena):  Migration to a QSC Future
    Scott Cadzow, TC CYBER WG QSC

  • SESSION 3: Latest Innovations and Technical Breakthroughs in Cybersecurity, Chaired by Kirsty P. NCSC

    During this session, speakers will share their views on some of the latest innovations and solutions from industry and academia to enhance cyber defence postures.

  • 14:00

    CNI Threat Intelligence Challenges
    Alex Tarter, Thales UK 

  • 14:20

    Securing Cyberspace: How innovations in technology & law help keep us safe on the Internet
    Maciej Surowiec, Microsoft

  • 14:40

    Security failure as product defect: the new wave of liability
    Robert Carolina, Royal Holloway, Cyber Security Innovation

  • 15:00

    Questions & Answers

  • 15:30 Coffee, Posters & Demos
  • SESSION 4 : Case Studies from Organisations - Are standards Improving Cyber Defence or Creating New Risks? Chaired by Andreas Fuchsberger, Microsoft

    Through different use cases and application domains, this session will discuss success stories, improvements, limitations or potential risks that standards can bring in terms of cybersecurity.

  • 16:00

    The potential impact EU Cyber Security Act on Cloud Computing
    Daniele Catteddu, Cloud Security Alliance (CSA)

  • 16:20

    Hacked by Crypto
    Bret Jordan, Symantec Corporation

  • 16:40

    Trust & cyber security: How eIDAS qualified trust services generate a European trust space
    Kim Nguyen, D-Trust GmbH

  • 17:00

    The Automotive Cyber Threat 
    Alain Baritault, iotaBEAM

  • 17:20

    Landscape of Hardware roots of Trust for Connectivity and Security
    Nicolas Ponsini, ORACLE

  • 17:40

    Close of the Workshop

  • 17:40

    Networking Event - Courtesy of

  • Alex Leadbeater, BT & TC CYBER Chairman - PC Chair
  • Sonia Compans, ETSI
  • Christoph Fisher, BFK
  • Andreas Fuchsberger, Microsoft
  • Kirsty Paine, NCSC
  • Colin Whorlow, NCSC 
  • Andreas Wolf, ISO/IEC JTC 1 SC27 Chair

Any Questions? Contact us