[20.04.2023] - [21.04.2023]

[ CybeRWARFARE: intelligence, defense and offensive security]

[KRUTY HEROES MILITARY INSTITUTE OF TELECOMMUNICATION AND INFORMATION TECHNOLOGIES]


Official co-organizers: 

[E-Governance Academy (EGA, Republic of Estonia)], 

[Regional  Cyber  Defence  Center  (Republic of Lithuania)], 

[Nikola Vaptsarov Naval Academy (Republic of Bulgaria)], 

[U.S. Civilian Research & Development Foundation (CRDF Global, USA)], 

[National Coordination Center for Cybersecurity  NSDC of Ukraine ], 

[MOD Signal and cybersecurity staff]

Active participants: 

US Army Engineer Research and Development Center (ERDC, USA),

Norwegian Defence Cyber Academy (Norway),

Defence and Cyber Studies Baltic Defence College (Republic of Estonia).

Conference is finished (21.04.2023)

You can download book of abctracts here

Book of abstracts.pdf

Two-day conference and "CTF" cyber competition 

Panel discussionsPANEL 1. CRYPTOGRAPHIC CYBERSECURITY SOLUTIONS.PANEL 2. INTELLIGENT ANALYSIS OF INCIDENTS AND SIGNAL STRUCTURES IN CYBERSPACE.PANEL 3. DECISION SUPPORT FOR CYBER DEFENSE.

Cyber competition

Check your theoretical knowledge and practical skills to detect vulnerabilities in network technologies and information systems. Test your skills to block attacks and properly respond to incidents in information systems. 

Conference target 

analyzing the approaches to collaboration between European states in modern projects for keeping peace and safety by modern science technician specialists with modern training Cyber Ranges and platforms

Conference opening

[Viktor OSTAPCHUK

Knight of the III degree Order of Bohdan Khmelnytsky]
(Ukraine)

[Professor Boyan Mednikarov
Head of the Nikola Vaptsarov Naval Academy]

(Republic of Bulgaria)

[Serhiy Prokopenko

Head of the NCCC Support Service of the NSDC Staff]
(Ukraine)

[Professor Hryhoriy Radzivilov
Kruty Heroes MITIT]
(Ukraine)

 PANEL 1. CRYPTOGRAPHIC CYBERSECURITY SOLUTIONS

Methodological basis (principles, approaches, models, methods, methodologies) of technologies and the means of ensuring cybersecurity based on cryptographic information transformation: modern symmetric and asymmetric cryptosystems; modern crypto protocols; virtual private networks; authentication based on identification certificates; public key infrastructure; cryptanalysis; post-quantum cryptosystems; blockchain.

[Vladyslav Chevardin
DCs, Senior research fellow
Kruty Heroes MITIT]
(Ukraine)

[Lydmila KOVALCHUK
DCs, professor
Igor Sikorsky Kyiv Polytechnic Institute]
(Ukraine)

[Oleksander KUZNETSOV
DCs, professor
V. N. Karazin Kharkiv National University]
(Ukraine)

[Maryna YESINA

PhD, assistant professor

V. N. Karazin Kharkiv National University]
(Ukraine)

[Sergiy CNATYK DCs, professor
National Aviation University]
(Ukraine)

[Ivan Gorbenko
DCs, professor
V. N. Karazin Kharkiv National University]
(Ukraine)

[Sergiy YAKOVLEV
PhD, assistant Professor
Igor Sikorsky Kyiv Polytechnic Institute]
(Ukraine)

[Igor SAMOYLOV]
PhD, assistant Professor
Kruty Heroes MITIT]
(Ukraine)

 PANEL 2. INTELLIGENT ANALYSIS OF INCIDENTS AND SIGNAL STRUCTURES IN CYBERSPACE

Methodological basis (principles, approaches, models, methods, methodologies) of data mining in memory content, file control system objects, network traffic registration arrays, event messages, laws and signal structures of the electromagnetic spectrum for detecting cyber incidents (cyber attacks).

[Vyacheslav KHARCHENKO
DCs, Professor
National Aerospace University -KhAI-,
(Ukraine)

[Mass SOLDAL LUND
DSc, professor.

NDUC]

(Norway)

[Olav RUNE NUMMEDAL

Ph.D, professor

Norwegian Defence University College]

(Norway)

[Igor PANCHENKO

Ph.D, senior researcher.
Kruty Heroes MITIT]
(Ukraine)

[Oleksii SILKO
PhD, assistant professor

Kruty Heroes MITIT]
(Ukraine)

[Serhii Toliupa
DCs, professor

Taras Shevchenko National University of Kyiv ]
(Ukraine)

 PANEL 3. DECISION SUPPORT FOR CYBER DEFENSE 

Methodological basis (principles, approaches, models, methods, methodologies) of support for engineering and technical decisions of cyber defense measures: threat analysis; infrastructure vulnerability analysis and software tools for its assessment; possible cyber attacks modeling with analysis and assessment of their consequences; risk analysis; planning and evaluating the effectiveness of measures; differentiation of access to information; network screening; user authentication; event logging; synthesis of the components structure of systems and tools for detecting cyber incidents (cyber attacks); information backup storage; ensuring the reliability and reservation of tools; load balancing; response to cyber incidents (cyber attacks); information recovery; cyber defense object functioning restoring; cyber incidents (cyber attacks) investigation; penetration testing; SOC organizational ergonomics.

[Professor Shota Gvineria
Defense and Cyber Studies Baltic Defense College]

(Republic of Estonia)

[Igor LINKOV
Ph.D, professor.

US ERDC]
(USA)

[Tomas MOGODIA
NATO Joint Force Command Brunssum]
(LTU)

[Roman PROSKUROVSKY

Ph.D, assistant professor

NBU]

(Ukraine)

[Borislav NIKOLOV
Ph.D., assistant professor
NVNA IT Department]
(Republic of Bulgaria)

[Mykola MASESOV
PhD, assistant professor

MITIT]
(Ukraine)

[Pavlo KHUSAINOV

PhD, assistant professor

MITIT]
(Ukraine)

[Vladyslav Chevardin
DCs, Senior research fellow
MITIT]
(Ukraine)

Preparation to cyber competition

Introduction to MITIT Cyber Range

Introduction to CTF

MITIT Cyber Range purpose

Cyber competition (CTF)

Overcoming barriers during the CTF challenges

Scoring and penalties

Results of the CTF challenges on the Cyber Range

ADDRESS AND CONTACTS OF THE CONFERENCE ORGANIZING COMMITTEE


Support and maintenance – Lavryk Ivan, email csd33@viti.edu.ua
Organisators 1st day Hryhoriy Radzivilov, Vladyslav Chevardin, Shota Gvineria.
Organisators 2nd day - Vladyslav Chevardin, Oleksandr Marchuk, Andriy Brodovskiy