Agenda

Professional Certificate in Dealing with Cyber Influence Activities during Elections by External Actors

Day 1

09:30 Refreshments
09:45 Chair's Introduction
  • Overview of the week
  • Introduction and backgrounds of delegates
  • Introduction - What constitutes a Cyber Attack/ Interference in domestic infrastructure
10:15 Defining cyber influence activities
11:30 Morning Coffee
11:45 Understanding what is meant by a “hybrid threat” to elections – Part 1
13:00 Lunch
14:00 Understanding what motivates external actors to engage in cyber influence activities – OR - Understanding what is meant by a “hybrid threat” to elections – Part 2
15:00 Afternoon Tea
15:15 Methods employed by external actors to engage in cyber influence activities Social Media Platforms
16:30 End of the day Wrap Up and Questions

Day 2

09:30 Refreshments
09:45 Chair's Introduction
10:00 Review of the existing legal framework around Cyber influence in elections
  • Existing laws
  • Challenges
11:15 Morning Coffee
11:30 Responding to Cyber influence activities - Strategies for identifying and countering cyber influence activities.
  • Countermeasures and threat prevention
  • Self-Defence, military measures and the Use of Force
  • Non-forcible measures - diplomacy and cross-country collaboration
  • Problem of attribution
12:45 Lunch
13:45 Case Study 1: USA
15:00 Afternoon Tea
15:15 Case study 2: United-Kingdom & France
16:30 End of the day Wrap Up and Questions
16:45 Close

Day 3

09:30 Refreshments
09:45 Chair's Introduction and CMI Presentation
10:00 Case Study 3: Germany
11:15 Morning Coffee
11:30 Case Study 4: Sweden
12:45 Lunch
13:45 Visit to the European Parliament
16:30 End of the day Wrap Up and Questions

Day 4

09:30 Refreshments
09:45 Chair's Introduction
10:00 Developing Policies to counter cyber influence in elections
  • Influencing the policy context
  • Identifying stakeholders
  • Managing stakeholder engagement
11:15 Morning Coffee
11:30 Case Study 5: Finland
12:45 Lunch
13:45 Election Risk Management Tools
15:00 Afternoon Break
15:15 Workshop – strategic policy planning to counter cyber influence in elections
16:30 End of the day Wrap Up and Questions

Day 5

09:30 Refreshments
09:45 Chair's Introduction
10:00 Implementation and Evaluation of Policies
11:15 Morning Coffee
11:30 Recommendations for effective cyber influence coordination at various levels of government
  • policy suggestions to government
  • national action plan design and implementation
  • Infrastructures protection plans
  • Coordinating all government levels effectively
12:45 End of the course evaluations and certificates
12:45 Lunch & Close