EU Space Cybersecurity Priorities & Capacity Building
The Workshop will convene European space professionals from government, academia and industry with a view to co-design a Model European Space Cybersecurity program, fitted European needs, and building on Indiana University’s Space Cybersecurity program.
The workshop will integrate data from a survey to be conducted specifically for this purpose, soliciting input from European space cybersecurity professionals from the government, academia, and industry. The workshop will extend “EU-IU collaboration” to create a cross Atlantic partnership on space cybersecurity capacity building, noting the shared threats and opportunities.
Indiana University Europe Gateway
Gneisenaustraße 27
10961 Berlin
Germany
The workshop is organized by Indiana University’s Space Governance Lab, Institute for European Studies, Europe Gateway, and International Affairs in collaboration with the University of Hamburg.
Eytan Tepper, DIL
Research Professor, Space Governance & Security and Director, Space Governance Lab
Indiana University-Bloomington
February 26th, 2026
8:30-9:00 |
Registration and Coffee
|
9:00-9:30 |
Opening Plenary: Cross Atlantic Partnership on Space Cybersecurity
|
9:30-10:15 |
Indiana University Space Cybersecurity Baseline Topics Framed by Survey and EU Objectives
|
10:15-10:30 |
|
10:30-12:00 |
Breakouts I: Role-Specific Priorities
|
12:00-13:00 |
|
13:00-14:30 |
Plenary Report Back and Comparative Discussion
|
14:30-14:45 |
|
14:45-15:00 |
NATO Space Cybersecurity Preparedness
|
15:00-16:00 |
Breakouts II: Tailoring to Role Needs
|
16:00-16:45 |
Plenary Synthesis: Cross-Cutting Needs
|
16:45-17:00 |
Wrap-Up
|
February 27th, 2026
8:30-9:00 |
Coffee and Networking
|
9:00-9:30 |
Recap and Decision Criteria
|
9:20-10:40 |
Breakouts III: Draft Role-Specific Modules
|
10:40-11:00 |
|
10:30-12:15 |
Plenary Session: Module Alignment
|
12:15-13:15 |
|
13:15-14:30 |
Breakouts IV: European Alignment Layer
|
14:30-14:45 |
|
14:30-17:45 |
Applied Training Session: European Space Cybersecurity Landscape and Technical Foundations
|
17:45-18:00 |
Conclusion
|