Virtual Research Workshops

The Virtual Research Workshops provide cybersecurity researchers and practitioners with a platform to present and get feedback on research projects and papers.

We hold monthly hour-long workshop meetings where participants can present research to the community. To ensure high-quality feedback, for each presentation an expert discussant will be identified and assigned to each paper who will provide detailed comments, before opening up the discussion to all participants.

Our spring session (March – June 2024) this year will feature senior and upcoming scholars presenting new research on the relationship between cybersecurity, Artificial Intelligence (AI), and other emerging technologies.

While the economic and social impacts of AI have dominated headlines over the last year, the implications of AI for cybersecurity (both offence and defence) have received less attention.

On the other hand, cybersecurity is one aspect of AI safety and security more broadly, and the course of cybersecurity policy offers important lessons for nascent AI governance conversations. Beyond AI, there are other emerging technologies – such as quantum computing, next generation semiconductors, and biotechnologies – that also have the potential to significantly change the cybersecurity landscape. Our workshops will shine a light on these rapidly evolving challenges, be sure to tune in!

Full schedule to follow soon.

Workshop leadership

Upcoming workshops
Untrustworthy AI and Cybersafety
Professor Jeremy Pitt, Imperial College London
NATO’s evolving role in the cyber domain
Amy Ertan, NATO HQ
Revisiting Past Cyber Security Recommendations: Lessons we Have Failed to Learn
Dr. Matthias Schulze, Institute for Peace Research and Security Policy at the University of Hamburg
Jantje Silomon, IFSH
Decrypting North Korea Cyber Operation Strategy: Analyzing the Augmenting Role of Cyber-AI nexus
Abhishek Sharma, Delhi University

Sign up

    Past workshops
    Official Public Political Attribution of Cyber Operations: State of Play and Policy Options
    Christina Rupp, Stiftung Neue Verantwortung
    Normal Cyber Accidents
    Sarah Backman, Stockholm University
    Protecting Objects in Cybersecurity and Critical Infrastructure:The Status of the Data Centre in International and EU law
    Mando Rachovitsa, University of Groningen
    Systems Warfare
    Iain J. Cruickshank, US Army Cyber Institute
    The power of the ‘Whole-of-Society’
    Andrew Dwyer, Royal Holloway University
    Offensive cyber capabilities from the global south perspective
    Eduardo Izycki, Instituto Brasiliense de Direito Público
    Offensive Cyber, Reflections
    Daniel Moore, Meta
    Defensive but disruptive operations: Evolving the framework of state responses to malicious cyber activity
    Jakob Bund, SWP
    Kerstin Zettl-Schabath, University of Heidelberg
    Martin Müller, University of Innsbruck
    Click! Fight! Win!: Cyberpower in Great Power Competition
    Gentry Lane, Anova Intelligence


    How is the feedback process structured during the workshop?

    Each presented paper will have a designated expert discussant. This discussant will provide comprehensive comments on the paper. Following this, a broader discussion involving all workshop participants will be held.

    Who can present their research at the workshops?

    Both established and junior cybersecurity researchers and practitioners are welcome to present their research. Special emphasis is given to encourage submissions from junior scholars to support their growth in the field.

    What can participants expect during these workshops?

    Participants can present their research to the community. To ensure constructive feedback, we assign an expert discussant to every paper, who offers in-depth comments before opening up the discussion to all attendees.