Agenda

Where Space Cybersecurity Gets Real

CyberSat turns 9 this year, and the program we’ve built might be the most technical and relevant one yet. We’ve introduced two new tracks – Business, Policy, Partnerships (BPP) and Technology, Threats, Solutions (TTS) – alongside agency keynotes, deep-dive sessions on satellite and ground system security, and CISO-level threat intel you can actually use.

Monday, November 17

8:30 am - 9:00 am
Room: Grand Ballroom A-D
As the DOD's Chief Information Officer, Ms. Arrington oversees the defense enterprise's most critical IT and space-based systems. In this keynote, she'll bring a senior-level perspective on the intersection of cybersecurity, satellite communications, and national defense priorities, offering insight into the technologies, threats, and decisions shaping our most mission-critical systems.
Katie Arrington
Chief Information Officer (CIO)
U.S. Department of Defense (DOD)
9:15 am - 9:45 am
Room: Regency Ballroom
Many space systems lack on-board threat detection capabilities, which are essential prerequisites for cyber resilience. This session outlines efforts by the DHS Science & Technology Directorate (S&T) to lower these implementation barriers through the development of prioritized threat indicators for the SPARTA framework, reference implementations of on-board detectors, and concepts for how these fit into a broader space cybersecurity ecosystem.
Ernest Wong
Technical Lead, PNT & Space Systems
Department of Homeland Security (DHS) Science and Technology Directorate (S&T)
9:15 am - 9:45 am
Room: Grand Ballroom A-D
Dianne Poster
Senior Advisor
NOAA Office of Space Commerce
10:00 am - 10:25 am
Room: Regency Ballroom
The TRACTOR program's goal - translating C to safe, idiomatic Rust code, at scale - has the potential to radically change the economics of modernizing legacy software, both eliminating many common classes of software vulnerabilities as well as yielding code that's better structured and more maintainable. As of the date of this talk, TRACTOR will have been running for five months. This talk will both give an overview of the program's goals and aspirations, as well as discuss its progress to date.
Dan Wallach
Program Manager
DARPA Information Innovation Office
10:00 am - 10:50 am
Room: Grand Ballroom A-D
The U.S. is ramping up its space ambitions by investing heavily in next-gen capabilities to secure strategic dominance. At the center is the Golden Dome project, which is reshaping the national space posture and accelerating defense innovation. However, in a contested domain, ambition isn't enough. This session explores how rising cyber threats, shifting alliances, and intensifying competition with China are reshaping U.S. space strategy. We'll examine the implications for private-sector partnerships, defense supply chains, and the broader industrial base under the new administration - inside a rapidly evolving space race.
Moderator
Valerie Cofield
Chief Strategy Officer
U.S. Cybersecurity and Infrastructure Security Agency (CISA)
10:25 am - 10:50 am
Room: Regency Ballroom
This session presents a research effort focused on installing a software-based cybersecurity solution - SNC's Binary Armor - onto an on-orbit Lockheed Martin Pony Express 2 satellite. Learn how the team navigated hardware and software constraints, remote integration challenges, and mission limitations to test new defenses after launch. The presentation will cover observed data, demonstration outcomes, and future recommendations for applying cybersecurity to both operational and in-development spacecraft.
Kyle Shepard
(Invited)
Chief Engineer
SNC
10:50 am - 11:30 am
Room: Grand Ballroom Foyer
11:30 am - 12:20 pm
Room: Grand Ballroom A-D
Artificial intelligence is accelerating both sides of the cyber arms race. For adversaries, AI enables faster reconnaissance, adaptive attack patterns, and precision targeting of space-based infrastructure. For defenders, it offers real-time anomaly detection, automated response, and predictive threat modeling. This session examines how AI is transforming the tactics, timing, and scale of space-related cyber conflict - and what's at stake if defense doesn't keep pace.
11:30 am - 11:55 am
Room: Regency Ballroom
Perimeter-based security is no longer sufficient for protecting modern space systems. This session explores how Zero Trust (ZT) principles such as least privilege, continuous access validation, and data-centric protection can be tailored to space environments that include distinct ground, space, link, launch, and user segments. With intermittent connectivity, legacy platforms, and mission-critical constraints, applying ZT without modification risks system fragility or operational failure. Drawing from NIST, CISA, and DOD frameworks, this talk outlines a segment-aware approach and presents draft guidance to help mission designers and cybersecurity planners adopt Zero Trust in ways that enhance resilience without compromising performance.
Marcus Wallum
Operations Data Systems Manager
European Space Agency (ESA)
11:55 am - 12:20 pm
Room: Regency Ballroom
Space Force Captain David M. Vermillion will present results and analysis from a two-year proof-of-concept project to predict thruster anomalies on an operational satellite constellation using an ensemble machine learning approach. This talk will cover the project purpose, a brief overview of relevant satellite bus components, data engineering and modeling processes, project results, and an analysis of recommended changes for future approaches to similar problem-sets.
Capt. David Vermillion
Commercial Consolidated Satellite Systems Expert Deputy Division Chief
U.S. Space Force
12:20 pm - 1:30 pm
Room: Grand Ballroom A-D
1:30 pm - 2:00 pm
Room: Grand Ballroom Foyer
2:00 pm - 2:30 pm
Room: Regency Ballroom
Purple teaming provides critical value for space cybersecurity by testing detection and response under real conditions. This session describes how red and blue teams are using on-orbit spacecraft and FlatSats to simulate cyber threats, identify vulnerabilities, and validate defensive strategies. It also explores how end-of-life (EOL) spacecraft enable safe cyber experimentation.This presentation highlights lessons learned from recent exercises, shares effective purple team methodologies tailored for space systems, and outlines how such activities contribute to a more resilient and threat-informed defense posture across the space enterprise.
Brandon Bailey
(Invited)
Principal Engineer
The Aerospace Corporation
2:00 pm - 2:30 pm
Room: Grand Ballroom A-D
Space systems are more accessible, digitized, and interconnected than ever, which makes them easier targets. This session focuses on how adversaries perceive commercial spacecraft and ground infrastructure and how their tactics are evolving. We will explore the risks introduced by the rapid rise of NewSpace and standardized platforms and what defenders need to consider as the barriers to entry decrease. If you do not view the situation through the attacker's lens, you are already behind.
Jacob Oakley
Director of Cyber & Space, Technical Principal
SIXGEN
2:45 pm - 3:10 pm
Room: Grand Ballroom A-D
Ground systems are often seen as the soft underbelly of space networks - and attackers recognize this. This panel explores confirmed cyber incidents targeting satellite ground infrastructure, from teleport links to control centers. We will examine how attackers gained access, the methods used, and the measures being introduced to close the gaps. As threat actors shift from probing to exploiting, strengthening the ground segment is not just advisable; it now serves as the first line of defense in safeguarding space networks.
3:10 pm - 3:35 pm
Room: Regency Ballroom
Trusted computing principles are foundational to modern cybersecurity, but their application in satellite systems remains limited. This session explores how standards like the Trust Platform Module (TPM) and CyRes from the Trusted Computing Group can help secure satellite systems throughout their lifecycle. Using examples from other industries and recent high-profile IT failures, like the CrowdStrike incident that disrupted critical services worldwide, the presentation highlights the role of hardware roots-of-trust in building secure software platforms and communication pathways for space-based infrastructure.
Thorsten Stremlau
Systems Principal Architect, CISSP
NVIDIA & TCG
3:10 pm - 3:35 pm
Room: Grand Ballroom A-D
3:35 pm - 4:00 pm
Room: Grand Ballroom Foyer
4:00 pm - 4:45 pm
Room: Grand Ballroom A-D
Operators are increasingly facing direct and destructive cyber campaigns. What kinds of attacks are being launched? What vulnerabilities are being exploited? This panel gathers space companies to share the incidents they've encountered, how they responded, and what lessons others need to know now. From command intrusion to signal disruption, the space sector is a live-fire zone. This provides a rare look at what's actually happening and how the threat environment is escalating rapidly.
5:00 pm - 5:30 pm
Room: Grand Ballroom A-D

Tuesday, November 18

8:30 am - 9:00 am
Room: Grand Ballroom A-D
As CISO for the Department of the Air Force, James "Aaron" Bishop plays a central role in shaping cybersecurity strategy across the Air Force and Space Force. With decades of experience spanning government, industry, and national security, Bishop brings a mission-first perspective to some of the most urgent cyber and defense challenges. In this keynote, he'll share senior insights on securing critical systems and navigating the evolving threat landscape across air, space, and cyber domains.
James "Aaron" Bishop
Chief Information Security Officer (CISO)
Department of the Air Force (DAF)
9:15 am - 9:45 am
Room: Grand Ballroom A-D
9:15 am - 9:45 am
Room: Regency Ballroom
As the demand for low-latency, high-volume processing grows, On-Orbit Data Centers (ODCs) offer a path to real-time analytics, fused intelligence, and edge autonomy. This session explores how ODCs support evolving mission needs while introducing new cybersecurity risks, from expanded attack surfaces to challenges in securing autonomous operations. Learn how operators are addressing these risks, and why on-orbit compute is central to the future of resilient and scalable space infrastructure.
Lori Gordon
Systems Director
The Aerospace Corporation
10:00 am - 10:50 am
Room: Grand Ballroom A-D
Winning space contracts today requires more than technical capability. It demands a strong compliance posture. From CMMC 2.0 and IA-PRE to tightening European regulations, space companies must navigate a complex and evolving landscape to work with defense and government customers. This session breaks down what's required, where most companies fall short, and why compliance is now a critical part of space security. With government and defense customers tightening requirements, compliance isn't paperwork - it's a security posture.
10:00 am - 10:25 am
Room: Regency Ballroom
Future deep space missions will face cyber threats without immediate support from ground control. This session outlines a proposed architecture for autonomous, self-adaptive cyber defense using AI-driven telemetry analysis, onboard reasoning, and reinforcement learning. Drawing from experience with defense systems at SpaceX and Anduril, we'll examine how spacecraft can detect, evaluate, and respond to evolving threats independently. Core design elements include agentic AI, graph-based data storage, and hardware-accelerated threat modeling.
Nik Seetharaman
(Invited)
Founder
Wraihtwatch
10:25 am - 10:50 am
Room: Regency Ballroom
As satellite networks become more interconnected, securing real-time data exchange between satellites remains a critical challenge. Traditional satellite architectures rely on ground stations for data relay, creating latency and bottlenecks in mission-critical applications. This session will explore how Satlyt is pioneering a software-defined, AI-driven Intersatellite Network (ISN) to provide secure, low-latency edge computing in space. The presentation will cover: 1. AI-Enhanced Cybersecurity in Satellite Networks How machine learning models deployed at the edge can detect and mitigate anomalies in real-time. 2. Inter-Satellite Link (ISL) Security Framework Implementing encrypted, decentralized, software-defined networking (SDN) to enhance data integrity across constellations. 3. Delay-Tolerant Networking (DTN) for Secure Data Transfer How Satlyt's architecture leverages advanced DTN routing protocols, combining Contact Graph Routing (CGR) and AI-driven traffic management. 4. Real-World Use Cases & Implementation Progress Lessons from Satlyt's early-stage software deployments and prototype testing on virtualized satellite environments. Attendees will gain actionable insights on deploying secure, decentralized compute infrastructure for satellite networks while addressing cybersecurity threats in real-time edge computing.
Rama Afullo
Founder & CEO
Satlyt
10:50 am - 11:15 am
Room: Grand Ballroom Foyer
11:15 am - 11:40 am
Room: Regency Ballroom
As quantum computing advances, legacy encryption methods are becoming vulnerable. This session introduces practical approaches to deploying quantum-resistant protocols in proliferated satellite architectures. Drawing from commercial pilots and coalition exercises, the speaker will share implementation guidance for secure key exchange, constrained spacecraft integration, and cross-border interoperability. The discussion offers actionable insights for protecting future LEO constellations and sustaining deterrence through cryptographic resilience.
Ross Coffman
President
Forward Edge-AI, Inc.
11:15 am - 12:05 pm
Room: Grand Ballroom A-D
Hybrid constellations represent the future, but they bring layered complexity. As operators transition toward hybrid constellations that encompass LEO, MEO, and GEO, complexity and risk increase. This session examines how multi-orbit architectures impact cybersecurity, from vulnerable cross-link connections to unpredictable mesh behaviors. We'll analyze the trade-offs between LEO-only and blended networks, emphasize where vulnerabilities arise, and investigate how government investment is accelerating the demand for secure, scalable design across orbits.
12:05 pm - 1:15 pm
Room: Grand Ballroom A-D
1:15 pm - 1:45 pm
Room: Grand Ballroom A-D
1:45 pm - 2:35 pm
Room: Grand Ballroom A-D
Direct-to-device (D2D) is exploding, connecting satellites to smartphones and sensors worldwide. But it's also creating a massive, fragmented attack surface. This session explores how D2D shifts the threat model from opening space networks to spoofing, endpoint compromise, and data manipulation at scale. As adoption grows, so does the attack surface. What will it take to secure a world where any device can become an entry point?
1:45 pm - 2:10 pm
Room: Regency Ballroom
Detecting cyber threats before they reach software is key to protecting space systems. This session focuses on Radio Frequency Signal Anomaly Detection (RFAD) as a method for early warning. Using case studies and competition results from MIT's Anomaly Detection Challenge, we'll examine how RFAD algorithms operate under tight SWaP constraints and what industries like GNSS and IoT can teach us. Learn best practices for integrating RFAD into space architecture as a first layer of defense.
Zanir Habib
CEO
Ferociter
2:10 pm - 2:35 pm
Room: Regency Ballroom
This session introduces a three-tier model for space collective defense, developed through engagements with Space-ISAC and Space Command. Topics include structuring Primary Intelligence Requirements, applying open-source detection engineering with roota.io, and instrumenting telemetry to map exposure. The approach connects intelligence priorities with practical implementation, offering a coordinated strategy for defending converged space platforms. Recommended for incident responders and cybersecurity teams seeking to operationalize collaborative defense.
William Ferguson
Researcher and Content Creator
ethicallyHackingspace (eHs)
2:45 pm - 3:15 pm
Room: Grand Ballroom A-D
We wrap with a final keynote that looks ahead--highlighting the critical decisions and innovations shaping the next phase of cybersecurity and space resilience.

Wednesday, November 19

8:00 am - 8:30 am
9:00 am - 9:30 am
CMSgt Kenneth Bruce
Command Senior Enlisted Leader, U.S. Cyber Command and Senior Enlisted Advisor
National Security Agency/Central Security Service
10:15 am - 10:30 am
10:30 am - 11:00 am
Dan Trujillo
AFRL - Air Force Research Laboratory
11:00 am - 11:30 am
11:00 am - 12:00 pm
Peter Kaloroumakis
Applied Ontologist & MITRE D3FEND Lead
MITRE
Carl Rodio
Chief Engineer, Defensive Space Cyber Operations
MITRE
12:00 pm - 1:00 pm
2:00 pm - 2:30 pm
Karan Singh
Advanced Systems and Technology Directorate and a Cyber Security SME
National Reconnaissance Office (NRO)
4:45 pm - 6:15 pm

Thursday, November 20

9:30 am - 10:00 am
Dan Austin
Space Staff SETA
Sigmatech
Marouane Balmakhtar
Lt Col, Dr.
HQ, Space Force, Division Chief Cyber Operations
10:00 am - 10:30 am
Christina Pino
Senior Conference Manager
Access Intelligence
10:30 am - 11:30 am
11:30 am - 12:00 pm
12:00 pm - 12:30 pm