Filter your search
Opening Remarks
Opening Remarks
Announcing Edge Impulse x IoT Stars
#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
CaixabankTech Capture the Flag “Unleash your Hacking Skills”
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Escape-room: Operació GameSafe – Pavelló de l’Agència de Ciberseguretat de Catalunya (stand D46)
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
OWASP Top 10 Vulnerabilities in Large Language Models (LLMs)
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
NIS2: Tools to Address the New Directive
Transformación Digital en la Industria 4.0: Casos de éxito en DFactory Barcelona – Session language Spanish
#Artificial Intelligence, #Connectivity, #IOT Hardware Security, #Smart Cities, #Standards and Regulations
The Cyber Butterfly Effect: How Global Geopolitics Leads to Local Cybercrime Threats (and what to do about it!)
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
The Snack Cake Guide to Supply Chain Cyber Risk
#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
Common Indicators of Compromise Every SOC Team Should Watch Out
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
IoT Via Satellite – Future Trends and Developments
#Connectivity, #Hardware, #IOT Hardware Security, #Manufacturing, #Standards and Regulations
The Security Strategy Blueprint – SSB
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Innovating the National Response: A Reputational Strategy to Address a Large-Scale Cybercrisis
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Smarter IoT: Computer Vision and Power Efficiency at the Edge
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
No Time to Breach: The CISO’s Role in I(O)T Security
#CISO, #Cybersecurity
Physical AI and Europe’s Future in the Global AI Race
#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Standards and Regulations
Industrial Decarbonization Solutions
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
Artificial Hackers: Unleashing the dogs of war
#Artificial Intelligence, #Cybercrime, #Cybersecurity, #Standards and Regulations
Architecting Safety Using Cybersecurity Requirements and Assessments
#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Livin’ on the Edge
#Cybercrime, #Cybersecurity
Strategies and Practical Applications for Sustainable and Efficient Hydrocarbon Operations
#Artificial Intelligence, #Connectivity, #IOT Hardware Security, #Smart Cities, #Standards and Regulations
Cyberwatch: Uncover, Prioritize, and Defend Against Critical Vulnerabilities
#Cybersecurity, #Protection, #Risk
NIS2: Challenges, Opportunities, and Experiences in the Implementation of the New Directive
Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation
#Artificial Intelligence, #Cyber Threat Simulation, #Cybersecurity, #Quantum Computing, #Standards and Regulations
Mortal vs Machine: How AI is Transforming Cybersecurity Investigations
#Artificial Intelligence, #Cybersecurity
The Future of IoT Connectivity
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Next Generation Narrowband Communications, #Quantum Computing, #Supply Chain
Generative AI Security Issues
#Artificial Intelligence, #Cybersecurity, #Generative AI Security Issues, #Quantum Computing, #Standards and Regulations
Volvo’s Logistics Revolution: Real-Time Location Technology Deployment
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
Data Protection in Action: Mission Possible with DSE
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
How Technology is Reshaping the IoT landscape, Driving Investment, and Enabling New use cases and Business Models.
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Next Generation Narrowband Communications, #Quantum Computing, #Supply Chain
Connecting the Future: Enhanced businesses leveraged by reliable and cost-effective IoT technologies
#Connectivity, #Next Generation Narrowband Communications
The Role of the Modern CISO
#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Securing Digital Identities: The Power of Hybrid Authentication
#Cybersecurity, #Protection, #Risk
Transforming Defense Against Cyberincidents with Generative AI
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Accelerating Edge AI | The future of AI, IoT, and challenges along the way
#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Smart Manufacturing, #Supply Chain
Image geolocation: from beginner to intermediate
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
AI-Powered Threat Informed Defense
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Reflecting on 10 Years of LoRaWAN
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing
Generative Agentic AI: The New Age of Hyper-Scaling Enterprise Automation
#Artificial Intelligence, #Autommation, #Generative AI, #Hardware
The Business of Cybercrime: Year of the Enterprising Adversary. Defend against the new era of cyber threats.
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
LoRaWAN: A Decade of Innovation, The Future Unfolding
#LoRaWAN
Welcome Remarks
#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Smart Manufacturing, #Supply Chain
Spain, land of Cybersecurity
#Cybersecurity, #Protection, #Risk
Escape-room: Operació GameSafe – Pavelló de l’Agència de Ciberseguretat de Catalunya (stand D46)
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Post Quantum Migration
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Segmentation – Best practices with Checkpoint
IoT from Space: Solutions and Future Outlook
#LoRaWAN
Real-world Experiences in Applying AI for Cyber
#Artificial Intelligence, #Cybersecurity, #Quantum Computing, #Smart Cities, #Standards and Regulations
THE ZETTASCALE ERA – The Race to Generate, Process, and Store Data
Smart Metering – a Driver of Transformation and Sustainability
#LoRaWAN
Unlocking Manufacturing Shop Floor Intelligence with LLMs
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Navigating Regulatory Requirements
Security Risks of Data Injection
A Fresh Look on Indoor Positioning: AI-Enhanced, Zero-Infrastructure Zone Tracking
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
LoRaWAN® in the Enterprise: Aligning IT and Business for IoT Success
#LoRaWAN
Data Center Market Dynamic
CrowdStrike Identity Protection Virtual Survivor Games *Registration needed*
#Cybersecurity, #Protection, #Risk
Hands-on! Train from scratch your first Edge AI model with Edge Impulse
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
The Future of Cloud and Hyperautomation: Driving Efficiency and Innovation
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Towards the Convergence of TN and NTN in 6G and D2D: the Vision and Roadmap of the European Space Agency
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Standards and Regulations, #Supply Chain
AI-Specific Cyber Risks: From Data Security to Faulty Conclusions
#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Future Outlook. HPC and Quantum Computing
#Artificial Intelligence, #Hardware, #Quantum Computing
Enabling Secure Data Collaboration through the use of Zero Knowledge Proofs to Verify an Information Attribute without Sharing or Exposing it
#AI and the Risks of Data Sharing, #Artificial Intelligence, #Connectivity, #Cybersecurity, #Smart Cities, #Standards and Regulations
Public/Private Partnerships to Enable Smart City Adoption
#Connectivity, #Cybersecurity, #Smart Cities, #Standards and Regulations
Supercharging AI Innovation and Progress in Europe
#Artificial Intelligence, #Connectivity, #IOT Hardware Security, #Smart Cities, #Standards and Regulations
LoRaWAN References from Germany: How Stadtwerke Amberg and Other Cities and Utilities Leverage IoT
#LoRaWAN
Pioneering The Quantum Logical Era: Achieving Commercial Advantage Through Data Centre Integration
Safeguarding People and Planet with LoRaWAN
#LoRaWAN
Shaping the Global AIoT Future: World AIoT Innovation Alliance Global Launch Session
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Standards and Regulations
From Code to Shield: DevSecOps Gets Smart with AI & LAZARUS
Global Synergy Unleashed: WAIA-AIoT Tech Commercialization & Sustainability Forum
Transforming Healthcare Facilities with LoRaWAN: Energy Efficiency and Smart Resource Management in Spanish Health Centers and Clinics
#LoRaWAN
Supply Chain Management in the Software Era
#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
LoRaWAN’s Impact on Industrial Transformation
#LoRaWAN
STEM Women Congress at the IOT Show: Innovation, Technology and Leadership
#Cybersecurity, #Manufacturing, #Standards and Regulations, #Supply Chain
Next-Gen Cybersecurity: Bridging the Gap Between Emerging Tech and Evolving Regulation
Strengthening Cyber-Physical Resilience in Critical Infrastructures
#Cybersecurity, #Protection, #Risk
How to Respond to a EU-Level Blackout Cyber Incident
Quantum Computing and Cybersecurity
#Cybersecurity, #Quantum Computing, #Standards and Regulations
Building scalable LoRaWAN solutions with AWS
#Connectivity, #Hardware, #IOT Hardware Security, #Standards and Regulations
Ethics in Artificial Intelligence
LoRaWAN® in Action – Success Stories from Smart Buildings, Facility Management & Beyond
#LoRaWAN
Cybersecurity from a gender perspective
Women in Cybersecurity: Shaping the Future of Digital Protection
#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
Pushing the Boundaries of LoRaWAN with Next-Gen Technologies
#LoRaWAN
New & Upcoming Technical Features for LoRaWAN
#LoRaWAN
Awards Ceremony
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Awards Ceremony
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Adapting Real-Time Intelligence to Remote Conditions Using Edge and Cloud
#Artificial Intelligence, #Autommation, #Connectivity, #Hardware
Humancentric IoT and the Smart Society Concept
#Artificial Intelligence, #Connectivity, #Smart Cities, #Standards and Regulations
Toward Quantum Advantage and an update on Post Quantum Cryptography
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
ARE YOU LOOKING FOR TALENT FOR YOUR ORGANIZATION? ¡PARTICIPATE IN THE BARCELONA CYBERSECURITY CONGRESS JOB MARKET PLACE!
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Jornada anual DCA Ciberseguretat – “Evento Privado”
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Escape-room: Operació GameSafe – Pavelló de l’Agència de Ciberseguretat de Catalunya (stand D46)
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Rubiq: LLM-Powered IoT Assistant for Real-Time Machine Insights & Actions
#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Smart Manufacturing, #Supply Chain
Quantum Cryptography: Current Capabilities and Cybersecurity Challenges
#Artificial Intelligence, #Connectivity, #Cybersecurity, #Hardware, #Quantum Computing, #Standards and Regulations
Scaling Smart: Empowering IoT Startups for Growth & Funding Success
#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
Turning Industrial AI into Business Value: The Power of Data Strategy
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
Quantum Communications & Post Quantum Cryptography
#Artificial Intelligence, #Cybersecurity, #Hardware, #Quantum Computing
The Best of Both Worlds – Conventional Computing with Quantum Computing solving real world problems
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments
#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Hardware, #Manufacturing, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
How IoT eSIM Gives you the Power to Choose and The Speed to Scale
#Connectivity, #Hardware, #IOT Hardware Security, #Standards and Regulations
Startup Pitch: Aritium Technologies, S.L.
#Artificial Intelligence, #Hardware
Qilimanjaro’s Quantum Computing: Applications in Industrial Automation and IoT
#Artificial Intelligence, #Hardware, #Quantum Computing
Recent Advances in Cellular & Satellite Services; Cut Costs, Ubiquitous Presence, Mastering Security and Continuous Change
#Connectivity, #Hardware, #IOT Hardware Security, #Standards and Regulations
Secure Communications in the Modern Threat Landscape.
Startup Pitch: Advanced Algorithms 4 Radar, SL
#Artificial Intelligence, #Hardware
Quantum Leap: Microsoft’s Vision and Innovations in Quantum Computing
#Artificial Intelligence, #Hardware, #Quantum Computing
From Operators for Operators – 14 Sector Specific IT Security Standards from Cooperation „up kritis”
#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Smart Cities, #Standards and Regulations
Hyped or Here to Stay?
#Artificial Intelligence, #Hardware, #Quantum Computing
Silent Intrusions: The Rise of Targeted Attacks on Mobile Platforms
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity
NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications
#Connectivity, #Cybersecurity, #Standards and Regulations