cyber conflict, multi-domain operations, National cyber strategies and policies, Private companies in cyber conflict, Non-state actors, Legal aspects of cyber recruitment, Biometric data processing for identification or targeting purposes, drones, autonomous capabilities, Cyber training needs before and during armed conflict, Military cyber exercises, Narrative control in/through cyberspace, Information and intelligence sharing, International law aspects of propaganda and influence operations, Cyber neutrality, Cyber cooperation vs competition between Russia and China, Critical infrastructure security, Cybersecurity of industrial control systems, Secured 5G and next generation networks, Cybersecurity aspects of transport industry (maritime, aviation, railroad), Satellite communication security, AI use-cases in cybersecurity, AI-based intrusion detection systems, Secured AI military applications, AI-based malware detection and analysis, Novel cyber-attacks and malware analysis in the context of Russo-Ukrainian conflict