Filter your search
Welcome and Introduction
Infohound Demo
Lighthouses and the Path to Impact: Adopting AI at Speed and Scale
#AI, #Business Strategy, #Environmental, #Innovation, #Machine Learning, #Sustainability
GenAI: Transforming Cybersecurity in 2024 and Beyond
News from the Front Lines
Hunting like a Falcon: Cyber-dive into the Realm of Digital Threats
Confessions of a Dirty Hacker: Over Two Decades as a Hacking Curmudgeon
#Cybersecurity, #Threat Intelligence
KNX – Constantly on the Move
Strategy in the Shadows: Conflicts, Geopolitics, and Cyber Threats
AI Game Changer for SOC Operations
Innovative Business Models
Adversaries are Getting Smarter in the Cloud
Enter the Digital Frontier: Educating and Empowering Cyber Guardians
Emerging Technology Adoption in the State of Jharkhand, India – Business Strategy
Securing the Perimeter: A Deep Dive into Attack Surfaces, Ransomware Threats, and Insurance issues
Building a Culture of Cyber Resilience in Manufacturing
The Future is Now – Sustainable Automation as a Catalyst for Climate Action
#Climate Change, #Energy, #Environmental, #Ethics, #Government, #Industry 5.0, #Manufacturing
Roadmap to the Future of Standards and Regulations
#Regulations, #Standards
Cybersecurity Landscape: Identifying External Threats and Discussing Global Legislation
#Cybersecurity
Thriving in the Era of Industry 4.0
#Business Strategy, #Data Analytics, #Industry 4.0, #Innovation, #Manufacturing
Culture Change and Workforce Development
#Readiness, #Threat Intelligence
HUGS´n´BEERS: BSides Barcelona Community Chat
ISA 95 – Enterprise-Control System Integration Case Study
#Manufacturing, #Standards
How Emerging Technologies are Driving Innovation for Customers
#5G, #AI, #Environmental, #Innovation, #IoT
Cybercrime Trends 2024
Achieving Ubiquitous IoT Connectivity with Converged Cellular and Satellite Service
Volvo Smart Connected Factory
#Buildings, #Construction, #IoT, #Smart Cities, #Supply Chain
How Automation Can Help Your Company Achieve Your Sustainability Goals
#Business Strategy, #Sustainability
Using Automation to Reduce Risk in Deep Sea Mining
#Energy, #Environmental, #Mining, #Regulations, #Renewable Energy
Detecting Zero-Days Before Zero-Day
Keep Operations Running with OT Security Native Technologies: NIS2 Compliance
Transforming DevSecOps: Empowering SMEs and Startups with Lazarus
NIS 2 Directive Panel: Network Information Security
Regional Approach to Employee Readiness for Cybersecurity
#Threat Intelligence
Learning Path through Malicious PDF
Enhancing Cyber Defense through AI: Addressing Scalability Detection and Response
Survival of the Fittest: Data Security for a Wild World
Elevating Incident Response: Unleashing Advanced Analytics for the Next Generation
Sustainable Industries Through Automation and Digitalization
#Carbon Footprint, #Chemicals, #Cloud Computing, #Energy, #Oil and Gas, #Renewable Energy
Securing the Future: Navigating the New Era of IoT
Employee Training and Awareness
#Readiness
Accelerating Factory Integration with a Low-Code IoT Platform
#Automotive, #Business Strategy, #Data Analytics, #IoT, #Manufacturing
How Ecosystem Collaboration & Tech Innovations Fuel Deployment of IoT Projects
AI for cybercrime and for protection
Quantum Computing and Understanding Crypto BoMs
#Cybersecurity
Challenges Towards Hydrogen Network
Welcome and Introduction of Day 2
Infohound Demo
CaixaBankTech Capture The Flag Challenge: Unleash Your Hacking Skills!
Inside the Shadows: Decrypting the Data Black Market & Crafting Strategic Defenses
Data-driven Outcomes: How IoT Powers Generative AI Innovation
The Future of AI-powered Cyber Operations
Threat Detection in Xot environments with MDR
Navigating the Post-Quantum Cryptography Frontier: Assessing Risks and Readiness Strategies for Today
Incident First Golden Hour – Elite SOC Performance on the razor’s edge
International Correlation in Cybersecurity
How Decathlon is answering to sustainability challenge and future regulations thanks to the RAIN RFID?
Unveiling the Shadow: Advanced Evasion Techniques in APT Operations
OT Cybersecurity According to Czech NIS2 Transposition: Practical Approach and Implementation Steps
Lessons Learned from Incident Response
OSINT investigations with Maltego
Applying the 62443 Standard Series in Securing Industrial Automation Systems in Response to Current and Pending Regulations
#Standards
Women in Cybersecurity Panel Discussion
#Cybersecurity
Digital Transformation the Foundation for Decarbonization and a Greener Future
#AI, #Decarbonization, #Digital Twin, #Energy, #Machine Learning, #Renewable Energy, #Sustainability
Drone Tech
#5G, #Aerospace, #Environmental, #Smart Cities, #Transportation
Digital Resilience: Technologies for a Safer Future
The Role of Hydrogen in the Energy Transition
#Agriculture
Building the Best: Smart IIoT Asset Management Starts at the Edge
#Automotive, #Business Strategy, #Efficiency, #IoT, #Manufacturing
Elite SOC Performance through Intelligence Led Security Operations – The “Peacetime” Perspective
Safeguarding the Future: Securing IoT with AI driven Platformization”
EU AI Act: The Intent and Impact of AI and Machine Learning on Standards
#AI, #Machine Learning, #Standards
AI and IoT: The Blending of Two Technologies
#AI, #Machine Learning
Setting Up the Future for IoT Industry in Home and Building Automation
Innovating Security: Collaborative Solutions for Modern Threats
Disrupting attacks while fighting the cybersecurity poverty line
LPLAN, LoRaWAN’s Second Wave
#Business Strategy, #IoT, #Lpwan
Cloud Adoption and Edge Computing
Efficient Connectivity and Security Managment for Massive IoT
Real-Time Analytics for the Internet of Things
Empowering a Greener Future, While Bridging a Socio-economic Gap: AWS Solutions for Sustainable Cooking with Circle Gas
Solving the mystery: Applying intelligence to anticipate threats
Global Regulations and Security Certification IIOT
#Compliance, #Cybersecurity, #Regulations
Structuring an OT Cybersecurity Program
#Business Strategy, #Cybersecurity
5G Impacts on Technology
#5G
Security for AI in Nestlé & Leveraging Machine Learning for Brand Protection
Navigating the Future: How the Commitment to Sustainability Can Leverage AI and Cybersecurity to Gain a Competitive Advantage in the Race for Climate Neutrality
Unplugging PlugX : Sinkholing the PlugX USB worm botnet
Simplifying the Adoption of a Zero-Trust-Based Cybersecurity Strategy
The Future of ”Sensor × AI”~ AITRIOS: Our Approach to scale Vision AI Solutions on Edge~
Embracing the Future: The Impact of AI and IoT on Healthcare
#AI, #Ethics, #Healthcare, #IoT, #Machine Learning
AI Considerations to Ensure Compliance of Your Cybersecurity Program
#AI, #Business Strategy, #Compliance, #Cybersecurity, #Regulations
A Decarbonization Roadmap
Securing the Future: Building an Effective OT Cyber Strategy
#Business Strategy, #Cybersecurity
Maximising Uptime: rSIM and the Future of IoT Connectivity
The Pitfalls on the Road: Regulating for innovation in Europe
The Quantum Era is Here
Always-on IoT: Delivering Reliable Connectivity Globally with Satellite and Cellular
Welcome Remmarks
International Port Security: Threats and Case Studies about Incident Response
KNX Startup Incubator Success Story 1: KUMUX
FROM 1 TO 1 MARKETING TO 1 TO MACHINE
#IoT
Capital Convergence: Navigating Startup Investment & Resources
Staging the Future of Cybersecurity Through AI and the Cloud
Data Spaces as Enablers for Secure and Sovereign Data Sharing
The City of São Paulo Innovation Procurement – New Laws and Regulations Mitigating Bureaucracy in Public Contracts for Acquisition of Innovation and Hi-tech Solutions
#Compliance, #Innovation, #Regulations
Catalonia, where everything is possible. The strategic approach to semiconductors
Production Ready Use Cases of Artificial Intelligence Enabled Cybersecurity Powered by Fortinet
Opportunities in Europe for start-ups and SMEs: the attractiveness of public funding
Kindling Conversations: Nurturing Startup Ecosystems
How to enAIble a modern SOC
Setting the Scene for New Technologies
#AI, #Biotechnology, #Blockchain, #Business Strategy, #Cybersecurity, #Data Privacy, #Environmental, #Ethics, #Legal, #Sustainability
Digitization in Standards and Regulations
#Compliance, #Regulations, #Standards
Intelligence Evolution: Where Conflict and Adversaries Collide Within the Software World
#Cybersecurity, #Manufacturing, #Regulations, #Supply Chain, #Threat Intelligence
Lessons from Outer Space: What the ESA Interplanetary Rover Can Teach Us About Teleoperations For Autonomous Vehicles
#Aerospace, #Autonomous Vehicles, #Robotics, #Transportation
Info Sharing – Where Do I Start and How Do I Get the Approval to Do This?
#Business Strategy, #Privacy
IMAGINEXT: Project, SaaS that Combines Real-Time Pollution and Traffic Informaiton to Learn How Mobility Strategies Impact Air Quality
#AI, #Blockchain, #Carbon Footprint, #Decarbonization, #Environmental, #Policy, #Sustainability, #Transportation
The Impact of AI on Cybersecurity: Current State and Future Trends
#AI, #Cybersecurity
The Impact of Generative AI in Industry
#AI, #Business Strategy
IIoT System Implementation and Certification for Cloud-Based Functionality Based on ISA/IEC 62443 Standards
#Cloud Computing, #Standards
European EU-HybNET Project: Cluster of Institutions for Common Knowledge against Hybrid Threats
#Cybersecurity, #Regulations, #Threat Intelligence
Connecting the Unconnected
Quantum IoT: Overhyped, Underestimated or Is It a Matter of Your Position?