|  | Start | Length | Session | Theme | Topic | Speaker | 
| Monday research symposium August 25th 2025 | 9:00 | 30 | Registration |  |  |  | 
| 9:30 | 5 | Session 1.1 |  | Welcome | George Weir (University of Strathclyde) | 
| 9:35 | 30 | AI | AI Security - RAG Systems and others | Patrick Levi (OTH AW) | 
| 10:05 | 30 | Vulnerabilities | Exploiting Vulnerabilities | Leo Schiller (OTH Regensburg) | 
| 10:35 | 20 | Break |  |  |  | 
| 10:55 | 30 | Session 1.2 | AI | Seeing is Not Believing: Testing Human Ability to Identify AI-Generated Videos | Emmet Robins (Simon Fraser University) | 
| 11:25 | 30 | AI & Law | AI & Law | Rebecca Owens (Durham University) | 
| 11:55 | 30 | Data Privacy | Data rights as a research methodology
 | Tristan Henderson (University of St Andrews) | 
| 12:25 | 50 | Lunch |  |  |  | 
| 13:15 | 30 | Session 1.3 | AI & CNI | Intrusion Detection in Smart Factories using ML | Darren James Fürst (OTH AW) | 
| 13:45 | 30 | Quantum | Security in the UK's quantum computing ecosystem | Tom Murdoch (University of Strathclyde) | 
| 14:15 | 30 | AI & Law | How do you regulate a problem like AI? The merits and pitfalls of human rights-based approaches to AI regulation | Birgit Schippers (University of Strathclyde) | 
| 14:45 | 20 | Break |  |  |  | 
| 15:05 | 30 | Session 1.4 | CNI & Resilience | Digital resilience of industrial CNI systems | 
Dimitrios Pezaros (University of Glasgow) | 
| 15:35 | 30 |  | Panel discussion | Tristan Henderson (University of St Andrews), Tom Murdoch (University of Strathclyde), Dimitrios Pezaros (University of Glasgow), Birgit Schippers (University of Strathclyde) | 
| 16:05 |  | End |  |  |  | 
| Tuesday summer school August 26th, 2025 | 9:30 | 15 | Session 2.1 |  | Introductions | Richard Frank (Simon Fraser University) | 
| 9:45 | 45 | Data Privacy | Cumulative Revelations in Personal Data: Some methodological insights | Emma Nicol (University of Strathclyde) | 
| 10:30 | 45 | Identity | Identity | George Weir (University of Strathclyde) | 
| 11:15 | 20 | Break |  |  |  | 
| 11:35 | 45 | Session 2.2 | Hardware security | A Secure BF Interpreter in CHERI | Jeremy Singer (University of Glasgow) | 
| 12:20 | 45 | 
| 13:05 | 50 | Lunch |  |  |  | 
| 13:55 | 45 | Session 2.3 | CNI | On the Future of Cybersecurity for Our Infrastructure | Charles Weir (Lancaster University) | 
| 14:40 | 45 | 
| 15:25 | 20 | Break |  |  |  | 
| 15:45 | 30 | Session 2.4 |  | Panel discussion | Charles Weir (Lancaster University), Jeremy Singer (University of Glasgow)
 | 
| 16:15 |  | End |  |  |  | 
| Wednesday summer school August 27th 2025 | 9:30 | 45 | Session 3.1 | AI | AI and crime | Richard Frank (Simon Fraser University) | 
| 10:15 | 45 | Motivations | Motivations and decision making in cybercriminals | John McAlaney (University of Bournemouth) | 
| 11:00 | 20 | Break |  |  |  | 
| 11:20 | 45 | Session 3.2 | Phishing Campaign | Phishing Workshop - Design | Richard Frank (Simon Fraser University) | 
| 12:05 | 45 |  | 
| 12:50 | 50 | Lunch |  |  |  | 
| 13:40 | 45 | Session 3.3 | Phishing Campaign | Phishing Workshop - Implementation | Richard Frank (Simon Fraser University) | 
| 14:25 | 45 |  | 
| 15:10 | 20 | Break |  |  |  | 
| 15:30 | 30 | Session 3.4 |  | Panel discussion | John McAlaney (University of Bournemouth), Richard Frank (Simon Fraser University) | 
| 16:00 |  | End |  |  |  | 
| Thursday summer school August 28th 2025 | 9:30 | 45 | Session 4.1 | Data privacy | Age verification | Chelsea Jarvie (University of Strathclyde) | 
| 10:15 | 45 | Disinformation | How hard is it to identifying disinformation? | Richard Frank (Simon Fraser University) | 
| 11:00 | 20 | Break |  |  |  | 
| 11:20 | 45 | Session 4.2 | Global Trends | The Next Wave of Cybercrime: AI-Driven Scams in the ASEAN Landscape | Manmeet Kaur Mahinderjit Singh (Universiti Sains Malaysia) | 
| 12:05 | 45 | Fraud | Never Meet Your Heroes: Understanding Why People Fall for Celebrity Deepfake Scams | Emmet Robins (Simon Fraser University) | 
| 12:50 | 50 | Lunch |  |  |  | 
| 13:40 | 45 | Session 4.3 | Policing | Influence government | Daniel Thomas (University of Strathclyde) | 
| 14:25 | 20 | Break |  |  |  | 
| 14:45 | 45 |  | Networks | DDoS | Daniel Thomas (University of Strathclyde) | 
| 15:30 | 30 | Session 4.4 |  | Panel discussion | Daniel Thomas (University of Strathclyde), Chelsea Jarvie (University of Strathclyde) | 
| 16:00 |  | End |  |  |  | 
| Friday summer school August 29th 2025 | 9:30 | 30 | Session 5.1 | Privacy | Security and Privacy for Whom? | Partha Das Chowdhury (University of Bristol) | 
| 10:00 | 30 | Identity | Cognitive Processes and Educational Interventions in Children’s Password Practice | Maria Lamond (University of Abertay) | 
| 10:30 | 20 | Break |  |  |  | 
| 10:50 | 45 | Session 5.2 | Policing | Evaluating law enforcement interventions in cybercrime ecosystems | Ben Collier (University of Edinburgh) | 
| 11:35 | 45 | CNI | Critical National Infrastructure and the Utilities | James Irvine (University of Strathclyde) | 
| 12:20 | 50 | Lunch |  |  |  | 
| 13:10 | 45 | Session 5.3 | Negotiation | Talking with the Enemy: Ransom Negotiation strategies | Mark Cunningham-Dickie (QuorumCyber.com) | 
| 13:55 | 45 |  | 
| 14:40 | 20 | Break |  |  |  | 
| 15:00 | 45 | Session 5.4 |  | Closing panel discussion | James Irvine (University of Strathclyde), Mark Cunningham-Dickie (QuorumCyber.com) | 
| 15:45 |  | End |  |  |  |