Time | Session Type | Name | Description | Speakers |
---|---|---|---|---|
9:00 AM - 9:15 AM | Opening Remarks | |||
9:15 AM - 10:00 AM | (Keynote) The Connected Edge: Delivering Effect, Not Just Technology | This keynote explores the strategic imperatives shaping connected capability today, drawing lessons from Ukraine and other global theatres, while examining how to bridge the gap between innovation and operational simplicity across defence, civil, and infrastructure domains. Key Takeaways: The Ukraine conflict has redefined expectations for speed, adaptability, and resilience in connected systems. Innovation must be translated into usable, scalable solutions that work in real-world operational contexts. Civil-military convergence is accelerating; shared infrastructure, data, and spectrum demand shared strategies. | ||
Theme 1: Spectrum, Simplicity & Tactical Resilience | ||||
10:00 AM - 10:15 AM | Spectrum as a Strategic Asset | Explore how spectrum access, sharing, and resilience underpin every connected capability in contested environments. Takeaways: Spectrum is a finite and contested resource, planning for access is critical. Shared spectrum introduces risk if not carefully managed. Spectrum strategy must align with operational tempo and mission needs. | ||
10:15 AM - 10:30 AM | IoT in Denied and Disconnected Environments | Designing IoT systems that function reliably in bandwidth-constrained, mobile, and degraded conditions. Takeaways: Assume no connectivity: systems must degrade gracefully. Simplicity and autonomy are essential for frontline usability. Tactical IoT must be plug-and-play, not engineer-dependent. | ||
10:30 AM - 10:45 AM | Securing Tactical IoT | How to embed lightweight, resilient security into IoT systems deployed in high-risk, low-resource environments. Takeaways: Many IoT devices are not built with security in mind, retrofitting is essential. Security must not compromise usability or mobility. Threat models must include physical access and spoofing. | ||
10:45 AM - 11:00 AM | Q&A | |||
11:00 AM - 12:30 PM | Tech Showcase & Networking | |||
Theme 2: From Smart Cities to Smart Bases | ||||
12:30 PM - 12:45 PM | Digital Twins for Operational Readiness | Using digital twins to simulate, monitor, and optimise infrastructure and mission-critical environments. Takeaways: Digital twins enable predictive planning and real-time decision-making. Integration with live data streams is key to operational value. They bridge civil and defence infrastructure management. | ||
12:45 PM - 1:00 PM | Water, Power, and the New Battlespace | Understanding how critical infrastructure like utilities is becoming a strategic vulnerability and target. Takeaways: Infrastructure denial is a growing tactic in hybrid warfare. Civil resilience is national security. Monitoring and securing utilities must be part of operational planning. | ||
1:00 PM - 1:15 PM | Interoperability Without Lock-In | Avoiding vendor silos by designing systems that are modular, open, and future-proof. Takeaways: Proprietary ecosystems limit agility and increase cost. Open standards and APIs are essential for long-term flexibility. Interoperability should be tested, not assumed. | ||
1:15 PM - 1:30 PM | Q&A | |||
1:30 PM - 3:00 PM | Tech Showcase & Networking | |||
Theme 3: Understanding and Exploiting the Digital Attack Surface | ||||
3:00 PM - 3:15 PM | Offensive Vulnerability Discovery | How adversaries identify and exploit weaknesses in connected systems and what we can learn from them. Takeaways: Red teaming reveals blind spots before adversaries do. Vulnerability discovery is accelerating with automation. Offensive insights should inform defensive design. | ||
3:15 PM - 3:30 PM | Defensive Hardening at Scale | Strategies for building resilience into complex, multi-vendor, and legacy-heavy environments. Takeaways: Security must scale across diverse systems and lifecycles. Zero trust principles are increasingly essential. Hardening must include supply chain and third-party risk. | ||
3:30 PM - 3:45 PM | Data Bread Crumbs and Digital Exhaust | How connected systems unintentionally emit metadata, telemetry, and behavioural signals that can be exploited by adversaries and how to balance transparency, insight, and OPSEC. Takeaways: Every action leaves a digital footprint, understanding what’s discoverable is the first step to protecting it. Metadata and behavioural patterns can reveal more than content, especially in aggregate. OPSEC increasingly includes the management of the digital exhaust and erasing the residual digital footprint left behind | ||
3:45 PM - 4:00 PM | Q&A | |||
4:00 PM - 4:10 PM | Closing Remarks |