European Space Cybersecurity

Purpose

The Workshop will convene European space professionals from government, academia and industry with a view to co-design a Model European Space Cybersecurity program, fitted European needs, and building on Indiana University’s Space Cybersecurity program.

The workshop will integrate data from a survey to be conducted specifically for this purpose, soliciting input from European space cybersecurity professionals from the government, academia, and industry. The workshop will extend “EU-IU collaboration” to create a cross Atlantic partnership on space cybersecurity capacity building, noting the shared threats and opportunities.

 

Workshop Location

Indiana University Europe Gateway 
Gneisenaustraße 27 
10961 Berlin
Germany

Workshop Organizers

The workshop is organized by Indiana University’s Space Governance Lab, Institute for European Studies, Europe Gateway, and International Affairs in collaboration with the University of Hamburg. 

Agenda

 

Day 1: European Space Cybersecurity Priorities 

February 26th, 2026

8:30-9:00

 

Registration and Coffee

Participant check-in and informal networking. 

 

9:00-9:30

 

Opening Plenary: Cross Atlantic Partnership on Space Cybersecurity

Overview of Indiana University’s space cybersecurity initiatives, including Space Cybersecurity program, and the cross Atlantic partnership initiative to jointly curate a Model European Space Cybersecurity program and offer it in Europeans NATO member countries via partnerships with academia (e.g., Universität Hamburg and Université Toulouse Capitole) and governments (e.g., BSI, CNES). 

Output: Shared understanding of the goals and methods, including how the sessions will support drafting an European-tailored curriculum.

 

9:30-10:15

 

Indiana University Space Cybersecurity Baseline Topics Framed by Survey and EU Objectives

Presentation of core domains including architecture and attack surfaces, secure software and firmware, detection and telemetry, resilience and incident response, supply chain assurance, and governance, policy, and compliance. 

Each domain is compared with survey inputs and European regulatory drivers such as NIS2, ESA and ENISA initiatives, and NATO priorities. 

Output: A comparative map identifying strong alignment areas and elements requiring adaptation. 

 

10:15-10:30

 

Break

 

10:30-12:00

 

Breakouts I: Role-Specific Priorities 

  • Research Track: Review of Section B signals and identification of three leading research priorities. 
  • Industry Track: Review of Section C signals with emphasis on workforce shortage areas and skill gaps. 

  • Government Track: Review of Section D signals and identification of oversight and competence gaps related to NIS2 and CER obligations. 

Output: Three priority signal maps linking role needs to baseline topics and European/NATO objectives. 

 

12:00-13:00


Lunch

13:00-14:30

 

Plenary Report Back and Comparative Discussion

Each track presents its priority signal map.
Group discussion identifies convergent and divergent needs across roles. 

Output: Agreement on core shared modules and role-specific areas requiring tailored content. 

 

14:30-14:45

 

Break

 

14:45-15:00

 

NATO Space Cybersecurity Preparedness

A presentation by Professor Eytan Tepper 

 

15:00-16:00

 

Breakouts II: Tailoring to Role Needs

Each group drafts learning outcomes aligned with its priority signals, European regulatory requirements, and the Indiana University baseline domains. 

Output: Draft role-specific learning outcomes. 

 

16:00-16:45

 

Plenary Synthesis: Cross-Cutting Needs

Participants integrate learning outcomes across all tracks.
Cross-cutting European/NATO expectations are identified, including standards, certification paths, mobility, and intelligence-sharing practices. 

Output: Draft set of core Model European Space Cybersecurity Program learning outcomes. 

 

16:45-17:00

 

Wrap-Up

Review of Day 1 Outputs, and planning for Day 2

Output: Inputs for Day 2 design activities. 

 

 

Day 2: Model European Space Cybersecurity Program

February 27th, 2026

8:30-9:00

 

Coffee and Networking

Informal discussion and preparation for the design session. 

 

9:00-9:30

 

Recap and Decision Criteria

Review of Day 1 outputs including signal maps and draft learning outcomes.
Criteria for module inclusion and emphasis are confirmed with attention to European regulatory alignment and role relevance.

Output: A decision matrix guiding module drafting. 

 

9:20-10:40

 

Breakouts III: Draft Role-Specific Modules

Each role group develops a draft module outline including content focus, case examples, and assessment concepts. 

Each outline shows how survey signals are addressed, how a Kelley baseline topic is adapted, and which European objective is supported. 

Output: Draft module proposals for Research, Industry, and Government tracks. 

 

10:40-11:00

 

Break

 

10:30-12:15

 

Plenary Session: Module Alignment

Groups present their draft modules. Discussion identifies which modules are suitable as shared core content and which must remain role-specific. 

Output: A preliminary curriculum structure showing core and specialized modules. 

 

12:15-13:15


Lunch

13:15-14:30

 

Breakouts IV: European Alignment Layer 

Groups refine their modules by linking them explicitly to NIS2 requirements, ESA and ENISA security initiatives, and NATO priorities. 

Output: Annotated module outlines that show how each element aligns with Europeans expectations. 

 

14:30-14:45

 

Break

 

14:30-17:45

 

Applied Training Session: European Space Cybersecurity Landscape and Technical Foundations

This four-hour training session combines a condensed instructional block based on the Indiana University Space Cybersecurity Executive Program together with European briefings from partners. 

Part I: Core Instruction from the Indiana University Space Cybersecurity Model 

14:45–16:45

Topics include:

  • Space system architecture and attack surface fundamentals
  • Ground segment security considerations and telemetry protection
  • Threat modeling and adversary analysis
  • Detection engineering, incident response, and resilience practices
  • Governance and compliance considerations mapped to NIS2, ESA and ENISA guidance, U.S. standards and NATO priorities 

Output: A shared technical foundation suitable for European wide adaptation. 

Part II: Guest Presentations from European Institutions

16:45–17:45

  • BSI (Germany)
    Overview of national oversight roles and the relationship to DLR.
    Insight into German space security priorities and workforce considerations. 
  • Cyber Inflexion (France)
    Description of the French space ecosystem including CNES linkages.
    Focus on national cyber posture and priority research areas. 
  • Cyber Inflexion (UK)
    Description of the UK space cybersecurity ecosystem.
    Focus on national cyber posture and priority research areas. 
  • ETH Zurich (Switzerland)
    Overview of Switzerland’s space cybersecurity research landscape.
    Academic and technical workforce development pipeline insights. 
  • CYSEC (Luxembourg)
    Overview of Luxembourg Space Agency activities and commercial operator context. Discussion of Luxembourg’s growing demand for mission specific cybersecurity skills.

Output: A consolidated set of national inputs informing the European curriculum design effort. 

 

17:45-18:00

 

Conclusion

Review of Day 2 and Remarks