Lisbon, Portugal (in-person event) • August 3–5, 2026
A combination of cyber technological feasibility and economic viability drives many of the decisions related to cybersecurity and cyber resiliency by both the defenders and attackers. In this context, technological feasibility is defined as any cyber resiliency technology that has the potential to be developed, fielded, and operationally controlled. In the case of economic viability, the resources required to defend, or attack must be available. We define resources in its broadest sense to include but not be limited to people, equipment, training, required funding, and asset value. On the defensive side, these technological and economic factors determine the cyber security and resiliency policies, procedures and technologies implemented to prevent and respond to cyber attacks. On the offensive side, they not only determine the type of attack but also the effort expended to ensure its success. In short, these and other factors determine the asymmetric balance between the attackers and defenders.
The CRE26 Workshop on Cyber Resiliency: Strategies, Technologies, and Economics will continue where the CRE25 Workshop ended, with the exploration of foundational and applied advances in cyber resiliency strategies, policies, and technologies to shift the balance in favor of the defender, ensure critical processes continue to operate in face of a successful cyber attack, and identify and quantify the effect economic realities have on the decision processes. At the top level, national and organizational strategies and policies are required to understand what is to be achieved and the resources to be made available to protect critical resources and infrastructures. These strategies and policies must be supported by security and resiliency technologies. As a result, in addition to exploring various strategies, the workshop will seek to understand the capabilities, strengths/weaknesses, and benefits of various technologies whether existing or in research. This includes the incorporation of new technologies that are not resilience-focused but still have significant impact on a system’s ability to continue to operate in face of attack. Such examples include Artificial Intelligence and Machine Learning, both of which can be used by the defender and the attacker to impact the asymmetric balance. The workshop will examine the parameters needed to accurately quantify cyber resilience from both the offensive and defensive perspective; examine technical and non-technical approaches to affect the offensive/defensive balance, including the full range of costs/benefits of each approach; and explore and evaluate a range of options for defining and achieving optimality. It will bring together a diverse group of experts from multiple fields to advance the above concepts.
This proposed workshop directly complements the conference’s objectives by serving to accelerate the recognition, adoption and application of cyber resilience of critical resources and infrastructures within industry, government and academia by addressing the key concerns of how these techniques and technologies can be realized within the practical constraints of cost, risk, and benefit.
Prospective authors are encouraged to submit previously unpublished contributions from a broad range of topics, which include but are not limited to the following:
› National and organizational cyber resiliency strategies and policies related to the development, deployment and use of cyber resiliency technologies
› Achieving cyber resilience in Cyber Physical and IoT environments including benefits and challenges
› Research activities in cyber resilience
› Research activities in Artificial Intelligence and Machine Learning and their impact on cyber resiliency
› Metrics, measurements, and economics of cyber resiliency & asymmetry
› Technical and economic barriers to the implementation of cyber resiliency technologies
› Defining practical cyber resiliency and potential use cases and case studies.
› Relationship between resiliency and security.
› Adversary and defender economics: assessing the impact of defender capabilities and actions to the attacker and vice versa.
› Frameworks for ROI analysis (cost, risk, benefit) to guide technology investment (research, development, and utilization)
Paper submission deadline: April 13, 2026
Authors’ notification: May 4, 2026
Camera-ready submission: May 25, 2026
Registration deadline (authors): May 25, 2026
Workshop dates: August 3–5, 2026
Submitted manuscripts should not exceed 6 pages (plus 2 extra pages, being subject to overlength page charges) and should be of sufficient detail to be evaluated by expert reviewers in the field. The workshop’s proceedings will be published by IEEE and will be included in IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.
The guidelines for authors, manuscript preparation guidelines, and policies of the IEEE CSR conference are applicable to CRE workshop. Please visit the authors’ instructions page for more details. When submitting your manuscript via the conference management system, please make sure that the workshop’s track 2T2 CRE is selected in the Topic Areas drop down list.
|
|
|
|
nick.multari@earthlink.net
rmcquaid@mitre.org
George Sharkov, European Software Inst CEE; Cybersecurity Lab (BG)
Volkmar Lotz, SAP Labs (FR)
Elena Peterson, Pacific Northwest National Lab (US)
Kelly McSweeney, MITRE Corporation (US)
Michael Atighetchi, Raytheon Corp, BBN (US)
Tom Carroll, Pacific Northwest National Lab (US)
Yung Ryn Choe, Sandia National Laboratory (US)
Sabrina De Capitani Di Vimercati, Universita degli Studi di Milano (IT)
Erich Devendorf, Rand Corporation (US)
Ilir Gashi, University of London (UK)
Doug Jacobson, Iowa State University (US)
Dong Seong Kim, University of Queensland (AU)
Gargi Mitra, University of British Columbia (CA)
Nicholas C Multari, University of Nevada Las Vegas (US)
Nuno Neves, University of Lisbon (PT)
Craig Rieger, Idaho National Laboratory (Retired) (US)
Luigi Romano, University of Naples (IT)
Meghan Sahakian, Sandia National Laboratory (US)
Reginald Sawilla, Government of Canada (CA)
O Sami Saydjari, Cyber Defense Agency (US)
Neeraj Suri, University of Lancaster (UK)
Marco Vieira, University of North Carolina Charlotte (US)
Chris Walter, WW Technologies (US)
Elena Peterson, Pacific Northwest National Lab (US)
Kelly McSweeney, MITRE Corporation (US)
Will be made available in the coming months.
See also the accepted papers of the conference.
Will be made available in the coming months.
See also the detailed program of the conference.