×

Training Programmes

Responsible State Behavior in Cyberspace

Instructors: DCAF, WB3C

Responsible State Behavior in Cyberspace: International Norms and the Role of the EU in Cyberdiplomacy

This three-day workshop, hosted by the Western Balkans Cyber Capacity Centre (WB3C) in partnership with the Geneva Centre for Security Sector Governance (DCAF) on 12-14 November 2024, focuses on fostering a deeper understanding of international frameworks and best practices in cyberdiplomacy, with a special emphasis on the European Union's role.

Day 1: Understanding the UN Framework on Responsible State Behavior in Cyberspace

The first day is dedicated to exploring the UN Framework on Responsible State Behavior in Cyberspace. Participants will engage in sessions that cover the four key components of the framework:

  • UN Norms
  • International Law
  • Capacity Building
  • Confidence Building Measures

The day will also feature discussions on the operationalization of these principles within the UN’s First Committee and the Open-ended Working Group (OEWG) on ICT security, along with an in-depth look at the draft UN convention on cybercrime. Additionally, the role of international law in cyberspace will be analyzed, focusing on the challenges of attribution and the application of a rules-based framework. The day concludes with a case study on Slovenia's practices in cyberdiplomacy.

Day 2: The EU Cyber Ecosystem and Cooperation with the Western Balkans

Day two offers insights into the structure of the EU’s cyber ecosystem and its collaborative efforts with the Western Balkans. Participants will gain a detailed understanding of:

  • The EU's cyber diplomacy ecosystem and efforts, led by the European External Action Service (EEAS)
  • EU support mechanisms for the Western Balkans through the Directorate-General for Neighbourhood and Enlargement Negotiations (DG NEAR)
  • The introduction of the EU Cyber Solidarity Act and Cyber Reserve
  • The role of the European Union Agency for Cybersecurity (ENISA) and Europol in strengthening regional cybersecurity

The day will also highlight international cooperation in cybersecurity with a special focus on the Western Balkans.

Day 3: Practical Exercises and International Cooperation

The final day features a hands-on tabletop exercise facilitated by experts from the Cyber Policy Institute. This exercise simulates international cooperation and national coordination during a cyber incident, reinforcing the lessons from the previous sessions. Participants will:

  • Explore the legal frameworks and best practices applicable to cyber incident response
  • Work in groups to manage a simulated incident
  • Debrief and present their solutions, emphasizing the importance of coordinated multinational responses

The workshop concludes with a comprehensive review of key takeaways and closing remarks.


Cryptocurrency and Online Child Sexual Abuse and Exploitation

Protecting children from online crimes

As technology continues to advance, the online exploitation of children has become one of the most pressing and deeply concerning challenges confronting law enforcement across the world.  This four-day training for law enforcement professionals and cybersecurity experts from the South East Europe Police Chiefs Association (SEPCA) member countries, focused on cryptocurrency and online child sexual abuse and exploitation. The programme is delivered in partnership with the Council of Europe (COE), OSCE, Austrian Cybercrime Competence Centre (C4) and the Ministry of Interior of Serbia.

 The training is addressing three critical areas:

1.      Cryptocurrency Investigations:  

  • The use of cryptocurrencies in criminal activities, particularly in cases involving child exploitation.  
  • Blockchain tracing techniques and methodologies for seizing virtual assets through both theory and practical exercises.
  • Sessions include best practices for evaluating wallets, understanding derivation paths, and using specialized tools to track illicit transactions.

 2.      Child Sexual Abuse and Exploitation Online:  

  • Comprehensive training on identifying and disrupting child exploitation networks, with a focus on international cooperation.
  • Psychological impact on investigators working in this sensitive area, offering support and tools to help them manage the emotional toll of these investigations.
  • In-depth discussions on undercover operations, the use of digital platforms used for child sexual exploitation and effective methods for collecting electronic evidence.

3.      Cross-Border Collaboration:

  •  Facilitating collaboration among law enforcement agencies from across the region, Europe and key international partners. The goal is to share knowledge and foster greater coordination in tackling these global challenges.
  • Presentation of updates on regional and international efforts to combat cybercrime. 

This collaborative training activity marks a significant step forward in our shared mission to protect children from exploitation and hold those who use emerging technologies for illicit purposes accountable. International collaboration is key for strengthening the tools and techniques needed to safeguard vulnerable communities and dismantle criminal networks.

Operational Technology, Resilient Ecosystems and Infrastructure Protection

Enhancing cybersecurity proficiancy of Western Balkans administrations

The training series developed in cooperation with the Netherlands' Ministry of Foreign Affairs and the National Cyber Security Centre consists of three integral parts, each designed to enhance different aspects of cybersecurity proficiency among participants from the Western Balkans within the context of Critical Infrastructures (CI) and Critical Information Infrastructures (CII). Participants will gain critical theoretical knowledge, practical skills, and awareness necessary to address the evolving challenges in cybersecurity.

1. Operational Technology

Duration: 1,5 days

This segment focuses on the specific security needs related to operational technology (OT), which is increasingly targeted in cyberattacks due to its critical role in controlling physical processes in industries like manufacturing, energy and utilities. The training aims to strengthen skills in protecting and securing OT environments from potential cyber threats.

*Focus on the integration and protection of operational technology within cybersecurity framework.

*Explore dependencies and the impact of cascading risks in operational settings.

*Practical sessions on developing resilient strategies and responses to cyber threats in operational technologies.

2. Cyber Resilient Ecosystems

Duration: 1,5 days

Participants will learn how to build and maintain cyber-resilient ecosystems that can withstand and quickly recover from cyber incidents. This part of the training emphasizes the importance of resilience planning and strategies to ensure continuity and reliability in the face of cyber disruptions.

  •  Innovative approaches to ecosystemic-thinking in cybersecurity.
  • Lessons from natural ecosystems applied to cyber challenges to foster robust public-private partnerships and strengthen regional cyber resilience.
  • Hands-on exercises for mapping and establishing cyber resilient ecosystems for organisations, specific regions like industrial areas, harbors, airports, or targeted sectors.

3. Critical Information Infrastructure Protection

Duration: 1 day

This training focuses on protecting critical information infrastructure, which is essential for the functioning of a society and economy. Topics include risk assessment, protection strategies and the implementation of security measures designed to protect vital digital assets and services from cyber threats.

  •  Essential insights into the relationship between CI and CII under cybersecurity perspectives.
  • Detailed discussion on the needs for protection amid a continuously changing cyber environment.
  • Focus on four key areas: Understanding CI and CII, Asset management, and building secure communities.
  • Practical exercises aimed at developing comprehensive strategies for protecting critical information infrastructure.
Artificial intelligence applied in cybersecurity quantum programme

The use of advanced quantum technologies and AI in protecting critical infrastructure

The "Artificial Intelligence Applied to Cybersecurity and Quantum Program" offered by the Western Balkans Cyber Capacity Centre (WB3C) focuses on equipping cybersecurity professionals with advanced knowledge in AI and quantum technologies. This program covers a wide range of topics essential for modern cybersecurity, including the application of large language models (LLMs) in cybersecurity, event registry systems, and the role of digital twins in enhancing security measures. Participants will also learn about the SiQUID project, post-quantum cryptography (PQC), and the use of honeypots for detecting cyber threats.

Additionally, the course provides insights into cutting-edge developments beyond traditional semiconductors and an introduction to quantum computing and cryptography. Through expert-led sessions, participants will gain both theoretical knowledge and practical skills, enabling them to implement these advanced technologies within their organisations. This comprehensive program prepares professionals to address current and future cybersecurity challenges, enhancing their ability to protect and secure digital infrastructures in the Western Balkans.


Copyright © WB3C

Disclaimer: Translations of the original content written in English into other languages are AI generated by Weglot.