Virtual Research Workshops

The Virtual Research Workshops provide cybersecurity researchers and practitioners with a platform to present and get feedback on research projects and papers.

We hold monthly hour-long workshop meetings where participants can present research to the community. To ensure high-quality feedback, for each presentation an expert discussant will be identified and assigned to each paper who will provide detailed comments, before opening up the discussion to all participants.

This Workshop has three main goals.

First, it promotes cutting-edge research and interdisciplinary dialogue.

Second, it aims to foster a community of trust among Europe’s cybersecurity experts.

Third, it aspires to support junior scholars who may lack local networks providing guidance since cybersecurity remains an emerging field of research. To that end, we explicitly welcome submissions by junior scholars.

Would you like to present your paper or be discussant at the Virtual Research Workshops? Please email us your title and abstract (max. 250 words) at

Workshop leaders

Upcoming workshops
Protecting Objects in Cybersecurity and Critical Infrastructure:The Status of the Data Centre in International and EU law
Mando Rachovitsa, University of Groningen
Sarah Backman, Stockholm University
The Normative Power of the Factual: How State Practice Shapes Understandings About Direct Public Political Attribution of Cyber Operations
Christina Rupp, Stiftung Neue Verantwortung

Sign up

    Past workshops
    Systems Warfare
    Iain J. Cruickshank, US Army Cyber Institute
    The power of the ‘Whole-of-Society’
    Andrew Dwyer, Royal Holloway University
    Offensive cyber capabilities from the global south perspective
    Eduardo Izycki, Instituto Brasiliense de Direito Público
    Offensive Cyber, Reflections
    Daniel Moore, Meta
    Defensive but disruptive operations: Evolving the framework of state responses to malicious cyber activity
    Jakob Bund, SWP
    Kerstin Zettl-Schabath, University of Heidelberg
    Martin Müller, University of Innsbruck
    Click! Fight! Win!: Cyberpower in Great Power Competition
    Gentry Lane, Anova Intelligence


    What can participants expect during these workshops?

    Participants can present their research to the community. To ensure constructive feedback, we assign an expert discussant to every paper, who offers in-depth comments before opening up the discussion to all attendees.

    Who can present their research at the workshops?

    Both established and junior cybersecurity researchers and practitioners are welcome to present their research. Special emphasis is given to encourage submissions from junior scholars to support their growth in the field.

    How is the feedback process structured during the workshop?

    Each presented paper will have a designated expert discussant. This discussant will provide comprehensive comments on the paper. Following this, a broader discussion involving all workshop participants will be held.