Conveners
Cyber and Digital Sovereignty
- Moritz Weiss (LMU Munich)
-
Prof. Daniela Mechkaroska (University of Information Science and Technology “St. Paul the Apostle”, Ohrid, N.Macedonia)12/06/2026, 13:00Cyber and Digital SovereigntyPaper Abstract (Closed Panels)
Abstract: Artificial intelligence (AI) and cloud computing, combined with IoT systems through digital interconnection, create virtual environments that merge with physical spaces. The new operational capabilities that these transformations bring to European digital ecosystems create security challenges, governance issues and societal concerns. Existing research on AI-based security solutions...
Go to contribution page -
Dr Gürkan Gür (Zurich University of Applied Sciences ZHAW)12/06/2026, 13:10Cyber and Digital SovereigntyPaper Abstract (Closed Panels)
This contribution presents and discusses quantum-resilient Space–Aerial–Terrestrial Networks (SATIN) as a crucial enabler of European future-proof digital sovereignty, strengthening secure communications, resilient critical infrastructure, and reinforcing Europe’s leadership across satellite, drone, and terrestrial networking domains.
Go to contribution page -
Vladyslav Vilihura12/06/2026, 13:25Cyber and Digital SovereigntyPaper Abstract (Closed Panels)
The ongoing armed conflict in Ukraine has served as an unprecedented stress test for
Go to contribution page
national cybersecurity frameworks, exposing both the capabilities and limitations of
existing cyber defence architectures under sustained adversarial pressure. This
paper examines two interrelated dimensions of cybersecurity governance that have
gained acute relevance in the context of European security:... -
Lorenz Sommer (Geschwister-Scholl-Institute for Political Science, LMU Munich)12/06/2026, 13:35Cyber and Digital SovereigntyPaper Abstract (Closed Panels)
Cyberspace is a new domain of state security competition that differs from the conventional and nuclear realms, most notably because states are constantly engaged in cyberspace operations below the threshold of armed attacks. This inclines many scholars to use new approaches, both theoretically and empirically, to measure and explain cyber state behaviour. This paper argues that classical...
Go to contribution page