Virtual Research Workshops

The Virtual Research Workshops provide cybersecurity researchers and practitioners with a platform to present and get feedback on research projects and papers.

We hold monthly hour-long workshop meetings where participants can present research to the community. To ensure high-quality feedback, for each presentation an expert discussant will be identified and assigned to each paper who will provide detailed comments, before opening up the discussion to all participants.

Our Spring session (March – June 2024) this year will feature senior and upcoming scholars presenting new research on the relationship between cybersecurity, Artificial Intelligence (AI), and other emerging technologies.

While the economic and social impacts of AI have dominated headlines over the last year, the implications of AI for cybersecurity (both offence and defence) have received less attention.

On the other hand, cybersecurity is one aspect of AI safety and security more broadly, and the course of cybersecurity policy offers important lessons for nascent AI governance conversations. Beyond AI, there are other emerging technologies – such as quantum computing, next-generation semiconductors, and biotechnologies – that also have the potential to significantly change the cybersecurity landscape. Our workshops will shine a light on these rapidly evolving challenges, be sure to tune in!

Workshop leadership

Upcoming workshops
Revisiting Past Cyber Security Recommendations: Lessons We Have Failed to Learn
16:00pm CET
Matthias Schulze, Institute for Peace Research and Security Policy at the University of Hamburg
Jantje Silomon, IFSH
Decrypting North Korea Cyber Operation Strategy: Analyzing the Augmenting Role of Cyber-AI nexus
16:00pm CET
Abhishek Sharma, Delhi University

Sign up

    Past workshops
    Untrustworthy AI and Cybersafety
    Jeremy Pitt, Imperial College London
    NATO’s Evolving Role In The Cyber Domain
    Amy Ertan, NATO HQ
    Official Public Political Attribution of Cyber Operations: State of Play and Policy Options
    Christina Rupp, Stiftung Neue Verantwortung
    Normal Cyber Accidents
    Sarah Backman, Stockholm University
    Protecting Objects in Cybersecurity and Critical Infrastructure:The Status of the Data Centre in International and EU law
    Mando Rachovitsa, University of Groningen
    Systems Warfare
    Iain J. Cruickshank, US Army Cyber Institute
    The power of the ‘Whole-of-Society’
    Andrew Dwyer, Royal Holloway University
    Offensive cyber capabilities from the global south perspective
    Eduardo Izycki, Instituto Brasiliense de Direito Público
    Offensive Cyber, Reflections
    Daniel Moore, Meta
    Defensive but disruptive operations: Evolving the framework of state responses to malicious cyber activity
    Jakob Bund, SWP
    Kerstin Zettl-Schabath, University of Heidelberg
    Martin Müller, University of Innsbruck
    Click! Fight! Win!: Cyberpower in Great Power Competition
    Gentry Lane, Anova Intelligence


    Who can present their research at the Workshops?

    Both established and junior cybersecurity researchers and practitioners are welcome to present their research. We especially encourage submissions from junior scholars to support their growth in the field.

    What can participants expect during these Workshops?

    Participants can present their research to the community. Each presented paper will have a designated expert discussant. This discussant will provide comprehensive comments on the paper. Following this, a broader discussion involving all workshop participants will be held.