Foreword; Lord A. Carlile.- Part 1: Cyber Defence & Critical National Infrastructure (CNI).- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age; S. Kendzierskyj, H. Jahankhani.- N. Chelvachandran et al.- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability; K.A. Pantserev.- Considerations for the Governance of AI and Government Legislative Frameworks; N. Chelvachandran et al.- Part 2: Augmented Humanity & Digital Society.- Augmented humanity: Data, Privacy and Security; L. Naughton, H. Daly.- Consumer Awareness on Security and Privacy Threat of Medical Devices; A. Sagay, H. Jahankhani.- Biohacking Capabilities & Threat/ Attack Vectors; J. Ibarra et al.- Digital Twins for Precision Healthcare; G. Ahmadi-Assalemi et al.- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies; Y. Shah et al.- Part 3: Technology of Cyber Attacks.- Blockchain, TTP Attacks and Harmonious Relationship with AI; S. Kendzierskyj, H. Jahankhani.- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks; S. Petrov et al.- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery; Y. Shibuya et al.- Attack Vectors and Advanced Persistent Threats; S.F. de Abreu et al.- Artificial Intelligence in Protecting Smart Building''s Cloud Service Infrastructure from Cyberattacks; P. Vahakainu et al.- Part 4: Smart Societies and Data Exploitation.- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management; G. Epiphaniou et al.- Combating Domestic Abuse inflicted in smart societies; J. Mayhew, H. Jahankhani.- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review; S. Alkaabi et al.- Secure Implementation of E-governance: a Case Study about Estonia; R. Adeodato, S. Pournouri.- Insider Threat; J. Bore.