|   | 
Start | 
Length | 
Session | 
Theme | 
Topic | 
Speaker | 
| 
 Monday research symposium August 25th 2025 
 | 
9:00 | 
30 | 
Registration | 
  | 
  | 
  | 
| 9:30 | 
5 | 
 Session 1.1 
 | 
  | 
Welcome | 
George Weir (University of Strathclyde) | 
| 9:35 | 
30 | 
AI | 
AI Security - RAG Systems and others | 
Patrick Levi (OTH AW) | 
| 10:05 | 
30 | 
Vulnerabilities | 
Exploiting Vulnerabilities | 
Leo Schiller (OTH Regensburg) | 
| 10:35 | 
20 | 
Break | 
  | 
  | 
  | 
| 10:55 | 
30 | 
 Session 1.2 
 | 
AI | 
Seeing is Not Believing: Testing Human Ability to Identify AI-Generated Videos | 
Emmet Robins (Simon Fraser University) | 
| 11:25 | 
30 | 
AI & Law | 
AI & Law | 
Rebecca Owens (Durham University) | 
| 11:55 | 
30 | 
Data Privacy | 
Data rights as a research methodology | 
Tristan Henderson (University of St Andrews) | 
| 12:25 | 
50 | 
Lunch | 
  | 
  | 
  | 
| 13:15 | 
30 | 
 Session 1.3 
 | 
AI & CNI | 
Intrusion Detection in Smart Factories using ML | 
Darren James Fürst (OTH AW) | 
| 13:45 | 
30 | 
Quantum | 
Security in the UK's quantum computing ecosystem | 
Tom Murdoch (University of Strathclyde) | 
| 14:15 | 
30 | 
AI & Law | 
How do you regulate a problem like AI? The merits and pitfalls of human rights-based approaches to AI regulation | 
Birgit Schippers (University of Strathclyde) | 
| 14:45 | 
20 | 
Break | 
  | 
  | 
  | 
| 15:05 | 
30 | 
 Session 1.4 
 | 
CNI & Resilience | 
Digital resilience of industrial CNI systems | 
Dimitrios Pezaros (University of Glasgow) 
 
 | 
| 15:35 | 
30 | 
  | 
Panel discussion | 
Tristan Henderson (University of St Andrews), Tom Murdoch (University of Strathclyde), Dimitrios Pezaros (University of Glasgow), Birgit Schippers (University of Strathclyde) | 
| 16:05 | 
  | 
End | 
  | 
  | 
  | 
| 
 Tuesday summer school August 26th, 2025 
 | 
9:30 | 
15 | 
 Session 2.1 
 | 
  | 
Introductions | 
Richard Frank (Simon Fraser University) | 
| 9:45 | 
45 | 
Data Privacy | 
Cumulative Revelations in Personal Data: Some methodological insights | 
Emma Nicol (University of Strathclyde) | 
| 10:30 | 
45 | 
Identity | 
Identity | 
George Weir (University of Strathclyde) | 
| 11:15 | 
20 | 
Break | 
  | 
  | 
  | 
| 11:35 | 
45 | 
 Session 2.2 
 | 
 Hardware security 
 | 
 A Secure BF Interpreter in CHERI 
 | 
 Jeremy Singer (University of Glasgow) 
 | 
| 12:20 | 
45 | 
| 13:05 | 
50 | 
Lunch | 
  | 
  | 
  | 
| 13:55 | 
45 | 
 Session 2.3 
 | 
 CNI 
 | 
 On the Future of Cybersecurity for Our Infrastructure 
 | 
 Charles Weir (Lancaster University) 
 | 
| 14:40 | 
45 | 
| 15:25 | 
20 | 
Break | 
  | 
  | 
  | 
| 15:45 | 
30 | 
Session 2.4 | 
  | 
Panel discussion | 
Charles Weir (Lancaster University),  Jeremy Singer (University of Glasgow) | 
| 16:15 | 
  | 
End | 
  | 
  | 
  | 
| 
 Wednesday summer school August 27th 2025 
 | 
9:30 | 
45 | 
 Session 3.1 
 | 
AI | 
AI and crime | 
Richard Frank (Simon Fraser University) | 
| 10:15 | 
45 | 
Motivations | 
Motivations and decision making in cybercriminals | 
John McAlaney (University of Bournemouth) | 
| 11:00 | 
20 | 
Break | 
  | 
  | 
  | 
| 11:20 | 
45 | 
 Session 3.2 
 | 
Phishing Campaign | 
 Phishing Workshop - Design 
 | 
 Richard Frank (Simon Fraser University) 
 | 
| 12:05 | 
45 | 
  | 
| 12:50 | 
50 | 
Lunch | 
  | 
  | 
  | 
| 13:40 | 
45 | 
 Session 3.3 
 | 
Phishing Campaign | 
 Phishing Workshop - Implementation 
 | 
 Richard Frank (Simon Fraser University) 
 | 
| 14:25 | 
45 | 
  | 
| 15:10 | 
20 | 
Break | 
  | 
  | 
  | 
| 15:30 | 
30 | 
Session 3.4 | 
  | 
Panel discussion | 
John McAlaney (University of Bournemouth), Richard Frank (Simon Fraser University) | 
| 16:00 | 
  | 
End | 
  | 
  | 
  | 
| 
 Thursday summer school August 28th 2025 
 | 
9:30 | 
45 | 
 Session 4.1 
 | 
Data privacy | 
Age verification | 
Chelsea Jarvie (University of Strathclyde) | 
| 10:15 | 
45 | 
Disinformation | 
How hard is it to identifying disinformation? | 
Richard Frank (Simon Fraser University) | 
| 11:00 | 
20 | 
Break | 
  | 
  | 
  | 
| 11:20 | 
45 | 
 Session 4.2 
 | 
Global Trends | 
The Next Wave of Cybercrime: AI-Driven Scams in the ASEAN Landscape | 
Manmeet Kaur Mahinderjit Singh (Universiti Sains Malaysia) | 
| 12:05 | 
45 | 
Fraud | 
Never Meet Your Heroes: Understanding Why People Fall for Celebrity Deepfake Scams | 
Emmet Robins (Simon Fraser University) | 
| 12:50 | 
50 | 
Lunch | 
  | 
  | 
  | 
| 13:40 | 
45 | 
Session 4.3 | 
Policing | 
Influence government | 
Daniel Thomas (University of Strathclyde) | 
| 14:25 | 
20 | 
Break | 
  | 
  | 
  | 
| 14:45 | 
45 | 
  | 
Networks | 
DDoS | 
Daniel Thomas (University of Strathclyde) | 
| 15:30 | 
30 | 
Session 4.4 | 
  | 
Panel discussion | 
Daniel Thomas (University of Strathclyde), Chelsea Jarvie (University of Strathclyde) | 
| 16:00 | 
  | 
End | 
  | 
  | 
  | 
| 
 Friday summer school August 29th 2025 
 | 
9:30 | 
30 | 
 Session 5.1 
 | 
Privacy | 
Security and Privacy for Whom? | 
Partha Das Chowdhury (University of Bristol) | 
| 10:00 | 
30 | 
Identity | 
Cognitive Processes and Educational Interventions in Children’s Password Practice | 
Maria Lamond (University of Abertay) | 
| 10:30 | 
20 | 
Break | 
  | 
  | 
  | 
| 10:50 | 
45 | 
 Session 5.2 
 | 
Policing | 
Evaluating law enforcement interventions in cybercrime ecosystems | 
Ben Collier (University of Edinburgh) | 
| 11:35 | 
45 | 
CNI | 
Critical National Infrastructure and the Utilities | 
James Irvine (University of Strathclyde) | 
| 12:20 | 
50 | 
Lunch | 
  | 
  | 
  | 
| 13:10 | 
45 | 
 Session 5.3 
 | 
Negotiation | 
 Talking with the Enemy: Ransom Negotiation strategies 
 | 
 Mark Cunningham-Dickie (QuorumCyber.com) 
 | 
| 13:55 | 
45 | 
  | 
| 14:40 | 
20 | 
Break | 
  | 
  | 
  | 
| 15:00 | 
45 | 
Session 5.4 | 
  | 
Closing panel discussion | 
James Irvine (University of Strathclyde), Mark Cunningham-Dickie (QuorumCyber.com) | 
| 15:45 | 
  | 
End | 
  | 
  | 
  |