Filter your search
Welcome and Introduction


Infohound Demo

Lighthouses and the Path to Impact: Adopting AI at Speed and Scale

#AI, #Business Strategy, #Environmental, #Innovation, #Machine Learning, #Sustainability
GenAI: Transforming Cybersecurity in 2024 and Beyond

News from the Front Lines

Hunting like a Falcon: Cyber-dive into the Realm of Digital Threats

Confessions of a Dirty Hacker: Over Two Decades as a Hacking Curmudgeon

#Cybersecurity, #Threat Intelligence
KNX – Constantly on the Move

Strategy in the Shadows: Conflicts, Geopolitics, and Cyber Threats

AI Game Changer for SOC Operations


Innovative Business Models

Adversaries are Getting Smarter in the Cloud

Enter the Digital Frontier: Educating and Empowering Cyber Guardians




Emerging Technology Adoption in the State of Jharkhand, India – Business Strategy

Securing the Perimeter: A Deep Dive into Attack Surfaces, Ransomware Threats, and Insurance issues

Building a Culture of Cyber Resilience in Manufacturing

The Future is Now – Sustainable Automation as a Catalyst for Climate Action

#Climate Change, #Energy, #Environmental, #Ethics, #Government, #Industry 5.0, #Manufacturing
Roadmap to the Future of Standards and Regulations

#Regulations, #Standards
Cybersecurity Landscape: Identifying External Threats and Discussing Global Legislation



#Cybersecurity
Thriving in the Era of Industry 4.0

#Business Strategy, #Data Analytics, #Industry 4.0, #Innovation, #Manufacturing
Culture Change and Workforce Development

#Readiness, #Threat Intelligence
HUGS´n´BEERS: BSides Barcelona Community Chat



ISA 95 – Enterprise-Control System Integration Case Study

#Manufacturing, #Standards
How Emerging Technologies are Driving Innovation for Customers




#5G, #AI, #Environmental, #Innovation, #IoT
Cybercrime Trends 2024

Achieving Ubiquitous IoT Connectivity with Converged Cellular and Satellite Service

Volvo Smart Connected Factory

#Buildings, #Construction, #IoT, #Smart Cities, #Supply Chain
How Automation Can Help Your Company Achieve Your Sustainability Goals

#Business Strategy, #Sustainability
Using Automation to Reduce Risk in Deep Sea Mining

#Energy, #Environmental, #Mining, #Regulations, #Renewable Energy
Detecting Zero-Days Before Zero-Day

Keep Operations Running with OT Security Native Technologies: NIS2 Compliance




Transforming DevSecOps: Empowering SMEs and Startups with Lazarus



NIS 2 Directive Panel: Network Information Security




Regional Approach to Employee Readiness for Cybersecurity





#Threat Intelligence
Learning Path through Malicious PDF

Enhancing Cyber Defense through AI: Addressing Scalability Detection and Response

Survival of the Fittest: Data Security for a Wild World

Elevating Incident Response: Unleashing Advanced Analytics for the Next Generation


Sustainable Industries Through Automation and Digitalization

#Carbon Footprint, #Chemicals, #Cloud Computing, #Energy, #Oil and Gas, #Renewable Energy
Securing the Future: Navigating the New Era of IoT


Employee Training and Awareness

#Readiness
Accelerating Factory Integration with a Low-Code IoT Platform

#Automotive, #Business Strategy, #Data Analytics, #IoT, #Manufacturing
How Ecosystem Collaboration & Tech Innovations Fuel Deployment of IoT Projects


AI for cybercrime and for protection

Quantum Computing and Understanding Crypto BoMs

#Cybersecurity
Challenges Towards Hydrogen Network

Welcome and Introduction of Day 2


Infohound Demo

CaixaBankTech Capture The Flag Challenge: Unleash Your Hacking Skills!

Inside the Shadows: Decrypting the Data Black Market & Crafting Strategic Defenses

Data-driven Outcomes: How IoT Powers Generative AI Innovation

The Future of AI-powered Cyber Operations

Threat Detection in Xot environments with MDR

Navigating the Post-Quantum Cryptography Frontier: Assessing Risks and Readiness Strategies for Today


Incident First Golden Hour – Elite SOC Performance on the razor’s edge


International Correlation in Cybersecurity



How Decathlon is answering to sustainability challenge and future regulations thanks to the RAIN RFID?

Unveiling the Shadow: Advanced Evasion Techniques in APT Operations

OT Cybersecurity According to Czech NIS2 Transposition: Practical Approach and Implementation Steps

Lessons Learned from Incident Response


OSINT investigations with Maltego


Applying the 62443 Standard Series in Securing Industrial Automation Systems in Response to Current and Pending Regulations





#Standards
Women in Cybersecurity Panel Discussion




#Cybersecurity
Digital Transformation the Foundation for Decarbonization and a Greener Future

#AI, #Decarbonization, #Digital Twin, #Energy, #Machine Learning, #Renewable Energy, #Sustainability
Drone Tech


#5G, #Aerospace, #Environmental, #Smart Cities, #Transportation
Digital Resilience: Technologies for a Safer Future

The Role of Hydrogen in the Energy Transition

#Agriculture
Building the Best: Smart IIoT Asset Management Starts at the Edge


#Automotive, #Business Strategy, #Efficiency, #IoT, #Manufacturing
Elite SOC Performance through Intelligence Led Security Operations – The “Peacetime” Perspective

Safeguarding the Future: Securing IoT with AI driven Platformization”

EU AI Act: The Intent and Impact of AI and Machine Learning on Standards

#AI, #Machine Learning, #Standards
AI and IoT: The Blending of Two Technologies


#AI, #Machine Learning
Setting Up the Future for IoT Industry in Home and Building Automation

Innovating Security: Collaborative Solutions for Modern Threats


Disrupting attacks while fighting the cybersecurity poverty line


LPLAN, LoRaWAN’s Second Wave

#Business Strategy, #IoT, #Lpwan
Cloud Adoption and Edge Computing

Efficient Connectivity and Security Managment for Massive IoT

Real-Time Analytics for the Internet of Things


Empowering a Greener Future, While Bridging a Socio-economic Gap: AWS Solutions for Sustainable Cooking with Circle Gas


Solving the mystery: Applying intelligence to anticipate threats

Global Regulations and Security Certification IIOT

#Compliance, #Cybersecurity, #Regulations
Structuring an OT Cybersecurity Program

#Business Strategy, #Cybersecurity
5G Impacts on Technology




#5G
Security for AI in Nestlé & Leveraging Machine Learning for Brand Protection


Navigating the Future: How the Commitment to Sustainability Can Leverage AI and Cybersecurity to Gain a Competitive Advantage in the Race for Climate Neutrality

Unplugging PlugX : Sinkholing the PlugX USB worm botnet

Simplifying the Adoption of a Zero-Trust-Based Cybersecurity Strategy

The Future of ”Sensor × AI”~ AITRIOS: Our Approach to scale Vision AI Solutions on Edge~

Embracing the Future: The Impact of AI and IoT on Healthcare

#AI, #Ethics, #Healthcare, #IoT, #Machine Learning
AI Considerations to Ensure Compliance of Your Cybersecurity Program

#AI, #Business Strategy, #Compliance, #Cybersecurity, #Regulations
A Decarbonization Roadmap

Securing the Future: Building an Effective OT Cyber Strategy

#Business Strategy, #Cybersecurity
Maximising Uptime: rSIM and the Future of IoT Connectivity

The Pitfalls on the Road: Regulating for innovation in Europe

The Quantum Era is Here

Always-on IoT: Delivering Reliable Connectivity Globally with Satellite and Cellular


Welcome Remmarks



International Port Security: Threats and Case Studies about Incident Response


KNX Startup Incubator Success Story 1: KUMUX


FROM 1 TO 1 MARKETING TO 1 TO MACHINE

#IoT
Capital Convergence: Navigating Startup Investment & Resources





Staging the Future of Cybersecurity Through AI and the Cloud




Data Spaces as Enablers for Secure and Sovereign Data Sharing

The City of São Paulo Innovation Procurement – New Laws and Regulations Mitigating Bureaucracy in Public Contracts for Acquisition of Innovation and Hi-tech Solutions

#Compliance, #Innovation, #Regulations
Catalonia, where everything is possible. The strategic approach to semiconductors

Production Ready Use Cases of Artificial Intelligence Enabled Cybersecurity Powered by Fortinet

Opportunities in Europe for start-ups and SMEs: the attractiveness of public funding

Kindling Conversations: Nurturing Startup Ecosystems





How to enAIble a modern SOC


Setting the Scene for New Technologies

#AI, #Biotechnology, #Blockchain, #Business Strategy, #Cybersecurity, #Data Privacy, #Environmental, #Ethics, #Legal, #Sustainability
Digitization in Standards and Regulations

#Compliance, #Regulations, #Standards
Intelligence Evolution: Where Conflict and Adversaries Collide Within the Software World

#Cybersecurity, #Manufacturing, #Regulations, #Supply Chain, #Threat Intelligence
Lessons from Outer Space: What the ESA Interplanetary Rover Can Teach Us About Teleoperations For Autonomous Vehicles


#Aerospace, #Autonomous Vehicles, #Robotics, #Transportation
Info Sharing – Where Do I Start and How Do I Get the Approval to Do This?

#Business Strategy, #Privacy
IMAGINEXT: Project, SaaS that Combines Real-Time Pollution and Traffic Informaiton to Learn How Mobility Strategies Impact Air Quality

#AI, #Blockchain, #Carbon Footprint, #Decarbonization, #Environmental, #Policy, #Sustainability, #Transportation
The Impact of AI on Cybersecurity: Current State and Future Trends

#AI, #Cybersecurity
The Impact of Generative AI in Industry



#AI, #Business Strategy
IIoT System Implementation and Certification for Cloud-Based Functionality Based on ISA/IEC 62443 Standards


#Cloud Computing, #Standards
European EU-HybNET Project: Cluster of Institutions for Common Knowledge against Hybrid Threats


#Cybersecurity, #Regulations, #Threat Intelligence
Connecting the Unconnected
