Workshop ‘Command and Control under the Cyber Radar: Untangling the Complexities of Attribution of State-Driven Cyber Operations’
When: | We 19-03-2025 09:30 - 14:30 |
Where: | House of Connections, Grote Markt 21, Groningen, and online |

Currently, malicious cyber-attacks constitute a major threat to the Netherlands and other European countries. They target not only civilian objects and infrastructure but also critical national infrastructure and can result in significant – and even irreparable – material and immaterial damage. According to the Dutch National Coordinator for Counterterrorism and Security, the digital threat remains ‘ as great as ever ’ for our country and keeps continuously evolving and changing. This can be explained by not only the extensive use of AI by malicious actors requiring a robust human security approach but also severe geopolitical tensions resulting in state-supported cyber operations harming interests of a large number of states around the globe.
A sophisticated malicious cyber operation could significantly affect national security of the Netherlands and its vital processes may be compromised as a result of chain effects from digital attacks conducted by hackers on other countries. In today’s digital age, the ability to attribute cyber-attacks as accurately as possible is paramount to maintaining resilient cybersecurity defences, reacting to those attacks and preventing them from happening in the future. As an attacked state, the Netherlands must be able to defend itself, respond to such harmful activities emanating from cyberspace and hold the involved states responsible. Malicious hackers and hackers’ groups often act under a certain degree of control of intelligence agencies, military units and other bodies of foreign governments. Unfortunately, at the moment it is highly difficult if not impossible to attribute in a legal sense cyber-attacks constituting violations of international law, such as the customary prohibition of the use of force, to states hiding behind private hackers’ collectives or individual cybercriminals.
This engaging hybrid workshop (in-person/online) with a particular focus on attribution of state-driven offensive cyber operations will bring together legal, technical and other experts to share knowledge, develop skills and explore innovative approaches to cyber attribution. By fostering expert collaboration, we aim to build a more resilient cybersecurity community and facilitate joint efforts in future projects and grant applications. This event featuring hands-on activities and lively discussions is funded by and organized in cooperation with the Jantina Tammes School. It is a unique opportunity to brainstorm on emerging challenges and opportunities in the field of cyber attribution, contribute to cutting-edge cybersecurity research and expand your professional network.
We are looking forward to an activating and productive workshop and to welcoming you in Groningen, both onsite and digitally!
Registration
Please register by clicking the button below. The registration is open until 10 March 2025.
Programme
09:30 - 10:00 |
Walk-in |
10:00 - 10:15 |
General introduction (Evgeni Moyakine (University of Groningen)) |
10:15 - 10:45 |
Political aspects of attribution (Anne Aagten, Clingendael Institute)
|
10:45 - 11:15 |
Break/networking |
11:15 - 11:45 |
Technical aspects of attribution (Jayanthi Ramamoorthy (Sam Houston State University)) |
11:45 - 12:45 |
Lunch/networking |
12:45 - 13:15 |
Legal attribution and control theories (Evgeni Moyakine (University of Groningen))
|
13:15 - 14:00 |
Unmasking the adversary: hands-on experience with a real-world case study (Evgeni Moyakine (University of Groningen))
|
14:00 - 14:30 |
Networking |