Agenda

Where Space Cybersecurity Gets Real

Now in its 9th year, CyberSat delivers its most technical, immersive program to date — designed for those who protect critical space systems and infrastructure. Here’s what you’ll experience:

  • 🚨 Two powerful New Tracks: Discover Business, Policy, Partnerships (BPP) – where strategy, acquisition, and mission priorities align & Technology, Threats, Solutions (TTS) – where cyber operators and engineers confront today’s real-world threats (full descriptions below)
  • 🔐 Mission-Driven Keynotes: CSO and CISO-level perspectives from government, military, and commercial leaders
  • 🔐 Deep-Dive Sessions: Tactics and frameworks to secure satellites, ground systems, and supply chains
  • 🧠 Actionable Intelligence: Threat briefings, policy updates, and tools you can implement immediately
8:30 – 9:00 AM | Opening Keynote from Katherine Arrington, CIO, U.S. Department of Defense (DOD)

As the DOD’s Chief Information Officer, Ms. Arrington oversees the defense enterprise’s most critical IT and space-based systems. In this keynote, she’ll bring a senior-level perspective on the intersection of cybersecurity, satellite communications, and national defense priorities, offering insight into the technologies, threats, and decisions shaping our most mission-critical systems.

9:15 AM – 9:45 AM | Business, Policy, Partnerships Session

This session will spotlight the evolving intersection of policy, partnerships, and business priorities shaping today’s cyber and space landscape. Full details coming soon.

10:00 AM – 10:50 AM | Golden Dome, China, and the Space Power Struggle: U.S. Ambitions in the New Era

The U.S. is ramping up its space ambitions by investing heavily in next-gen capabilities to secure strategic dominance. At the center is the Golden Dome project, which is reshaping the national space posture and accelerating defense innovation. However, in a contested domain, ambition isn’t enough. This session explores how rising cyber threats, shifting alliances, and intensifying competition with China are reshaping U.S. space strategy. We’ll examine the implications for private-sector partnerships, defense supply chains, and the broader industrial base under the new administration – inside a rapidly evolving space race.

10:50 AM – 11:30 AM | Networking Break

Join fellow attendees and sponsors for coffee and conversation. This is your chance to trade insights, spark ideas, and expand your network with cyber, space, and national security leaders.

11:30 AM – 12:20 PM | Satellite Networks Under Fire: Real-World Threats and Operator Responses

Operators are increasingly facing direct and destructive cyber campaigns. What kinds of attacks are being launched? What vulnerabilities are being exploited? This panel gathers space companies to share the incidents they’ve encountered, how they responded, and what lessons others need to know now. From command intrusion to signal disruption, the space sector is a live-fire zone. This provides a rare look at what’s actually happening and how the threat environment is escalating rapidly.

12:20 PM – 1:30 PM | Lunch & Keynote

Grab lunch and settle in for a keynote that will offer sharp insights into today’s most urgent cyber and space security challenges straight from a leader shaping the domain’s future.

1:30 PM – 2:00 PM | Networking & Dessert Break

Stick around after the keynote to enjoy dessert and keep the momentum going. It’s a great time to chat, connect, and unwind with the CyberSat community.

2:00 PM – 2:30 PM | The Enemy Gets a Vote: What Adversaries See in Your Space System

Space systems are more accessible, digitized, and interconnected than ever, which makes them easier targets. This session focuses on how adversaries perceive commercial spacecraft and ground infrastructure and how their tactics are evolving. We will explore the risks introduced by the rapid rise of NewSpace and standardized platforms and what defenders need to consider as the barriers to entry decrease. If you do not view the situation through the attacker’s lens, you are already behind.

2:45 PM – 3:35 PM | Ground Stations Breached: Inside Real Cyber Incidents

Ground systems are often seen as the soft underbelly of space networks – and attackers recognize this. This panel explores confirmed cyber incidents targeting satellite ground infrastructure, from teleport links to control centers. We will examine how attackers gained access, the methods used, and the measures being introduced to close the gaps. As threat actors shift from probing to exploiting, strengthening the ground segment is not just advisable; it now serves as the first line of defense in safeguarding space networks.

3:35 PM – 4:00 PM | Networking Break

Chat with fellow attendees about the big takeaways from today’s sessions. Whether you’re comparing notes or trading ideas, it’s a good time to reset before the final stretch.

4:00 PM – 4:45 PM | AI in the Fight: How AI Is Reshaping Attacks and Defenses in Space

Artificial intelligence is accelerating both sides of the cyber arms race. For adversaries, AI enables faster reconnaissance, adaptive attack patterns, and precision targeting of space-based infrastructure. For defenders, it offers real-time anomaly detection, automated response, and predictive threat modeling. This session examines how AI is transforming the tactics, timing, and scale of space-related cyber conflict – and what’s at stake if defense doesn’t keep pace.

5:00 PM – 5:30 PM | Closing Keynote Presentation

Close out the day with a keynote that connects the dots and sets the tone for tomorrow—offering insights into where cyber and space security are headed next.

8:30 AM – 9:00 AM | Opening Keynote from James “Aaron” Bishop, CISO, Department of the Air Force (DAF)

As CISO for the Department of the Air Force, James “Aaron” Bishop plays a central role in shaping cybersecurity strategy across the Air Force and Space Force. With decades of experience spanning government, industry, and national security, Bishop brings a mission-first perspective to some of the most urgent cyber and defense challenges. In this keynote, he’ll share senior insights on securing critical systems and navigating the evolving threat landscape across air, space, and cyber domains

9:15 AM – 9:45 AM | Business, Policy, Partnerships Session

This session will spotlight the evolving intersection of policy, partnerships, and business priorities shaping today’s cyber and space landscape. Full details coming soon.

10:00 AM – 10:50 AM | Cleared for Contract: Navigating Compliance to Compete in Space

Winning space contracts today requires more than technical capability. It demands a strong compliance posture. From CMMC 2.0 and IA-PRE to tightening European regulations, space companies must navigate a complex and evolving landscape to work with defense and government customers. This session breaks down what’s required, where most companies fall short, and why compliance is now a critical part of space security. With government and defense customers tightening requirements, compliance isn’t paperwork – it’s a security posture.

10:50 AM – 11:15 AM | Networking Break

Grab a refreshment and continue the conversation. Whether it’s a quick handshake or a deeper discussion, this is your time to build on Day 2’s momentum.

11:15 AM – 12:05 PM | Multi-Orbit, Multi-Risk: Securing the Next Generation of Space Architectures

Hybrid constellations represent the future, but they bring layered complexity. As operators transition toward hybrid constellations that encompass LEO, MEO, and GEO, complexity and risk increase. This session examines how multi-orbit architectures impact cybersecurity, from vulnerable cross-link connections to unpredictable mesh behaviors. We’ll analyze the trade-offs between LEO-only and blended networks, emphasize where vulnerabilities arise, and investigate how government investment is accelerating the demand for secure, scalable design across orbits.

12:05 PM – 1:15 PM | Lunch & Keynote Presentation

Enjoy lunch with your peers while hearing from a headline speaker offering perspective on leadership, innovation, and the future of defense technology.

1:15 PM – 1:45 PM | Networking & Dessert Break

Grab an afternoon pick-me-up and connect with fellow attendees before the final sessions. It’s a good chance to swap insights, ideas, and contact info.

1:45 PM – 2:35 PM | Direct-to-Device: The Next Great Security Challenge

Direct-to-device (D2D) is exploding, connecting satellites to smartphones and sensors worldwide. But it’s also creating a massive, fragmented attack surface. This session explores how D2D shifts the threat model from opening space networks to spoofing, endpoint compromise, and data manipulation at scale. As adoption grows, so does the attack surface. What will it take to secure a world where any device can become an entry point?

2:45 PM – 3:15 PM | Closing Keynote Presentation

We wrap with a final keynote that looks ahead—highlighting the critical decisions and innovations shaping the next phase of cybersecurity and space resilience.

Track One: Business, Policy, Partnerships (BPP)

This track explores the strategic, regulatory, and economic drivers shaping the cybersecurity of space systems. It focuses on evolving U.S. and allied government policy, including mandated frameworks like CMMC 2.0, and the growing imperative to secure space as a critical warfighting domain. With nation-state threats accelerating and space now central to national defense, government agencies have made clear that cyber-secure space systems are a top priority. Sessions in this track examine public-private collaboration, acquisition strategies, hybrid architectures, and the commercial sector’s expanding role in enabling mission assurance across the entire space enterprise.

Track Two: Technology, Threats, Solutions (TTS)

Built for the cyber operators, engineers, and researchers securing space systems at the tactical edge, this track showcases hands-on techniques, real-world testing, and applied defenses — from on-board intrusion detection to purple teaming in orbit and space-specific zero trust architectures. With space assets increasingly targeted by nation-state actors and AI-enabled threats, expect deep dives on the methods being used now to harden satellite networks, ground infrastructure, and mission-critical data flows. Attendees will gain actionable intel on identity governance, anomaly detection, red-blue team integration, and next-generation cyber defense built for the orbital domain.