Cyber Security Conference /

CyCon 2013


4-7 Jun 2013



Tallinn, Estonia

Number of participants:


CyCon 2013 focused on technical, strategic and legal implications of using automatic methods in cyber conflicts.

CyCon was opened by keynote speeches by the President of the Republic of Estonia, Toomas Hendrik Ilves and Commander of US CYBERCOMMAND, General Keith B. Alexander. President Ilves marked that cyber security has finally reached the attention and awareness of the highest political elite, much so due to Estonia’s presence at the forefront of this topic in the past six years. He attributed Estonia’s active role to the high degree to which Estonia is wired and dependent on e-services, which at the same time makes it vulnerable to hostile cyber activities. As in many previous appearances, he continued promoting the personal identification cards and two-factor authentication that are used and implemented in Estonia and which set a great example to other countries. The President also predicted that the inherent conflict between privacy and security in the cyber domain will in the future become even more sensitive. At the same time, however, he stated that the fear of the “Big Brother” is overblown and people should instead be more worried about the private sector that possesses significantly greater amounts of personal data than governments.

General Alexander mainly discussed the topics of training the professionals who are responsible for defending networks and sharing information between the government and the private sector. He pointed out the worrying gap in education between those who are tasked to defend the Department of Defense networks and those who attack them. He also stressed the need for domestic legislation to support the real-time information sharing between the government and the private sector, and assured that such information sharing does not threaten the privacy right of individuals as the monitoring focuses on certain signatures, not the personal data or content of communications of individuals. General Alexander also expressed his support to the migration of data and processes to cloud-based systems.

The talks in the tracks within the three days varied from ethical analysis of robotic weapons arms control (by John Sullins, PhD, Sonoma State University) and international law (Prof. Michael N. Schmitt, U.S. Naval War College) to technical talks on aviation security (Hugo Teso, n.runs AG) and the viability of cyber attacks against unmanned aviation vehicle platforms (Sachin Deodhar, Zscaler Threatlabz Research Group). Among speakers are Commander Ilker Duranlioglu (NATO), Dr Gabriel Jakobson (Altusys Corp), Keren Elazari (GigaOM Research & Tel Aviv University ) Elliott Atkins (QinetiQ), Dr Jens Tölle (Fraunhofer FKIE), Jeffrey L. Caton (Kepler Strategies LLC), Prof. Dr Marco Gercke (Cybercrime Research Institute).

The conference was supported by IEEE, Cisco, Gamma International and Microsoft.

Conference articles and videos are available here.