Filter your search
Opening Remarks


Opening Remarks


Announcing Edge Impulse x IoT Stars
#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
CaixabankTech Capture the Flag “Unleash your Hacking Skills”

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Escape-room: Operació GameSafe – Pavelló de l’Agència de Ciberseguretat de Catalunya (stand D46)
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
OWASP Top 10 Vulnerabilities in Large Language Models (LLMs)


#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
NIS2: Tools to Address the New Directive

Transformación Digital en la Industria 4.0: Casos de éxito en DFactory Barcelona – Session language Spanish





#Artificial Intelligence, #Connectivity, #IOT Hardware Security, #Smart Cities, #Standards and Regulations
The Cyber Butterfly Effect: How Global Geopolitics Leads to Local Cybercrime Threats (and what to do about it!)

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
The Snack Cake Guide to Supply Chain Cyber Risk

#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
Common Indicators of Compromise Every SOC Team Should Watch Out

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
IoT Via Satellite – Future Trends and Developments

#Connectivity, #Hardware, #IOT Hardware Security, #Manufacturing, #Standards and Regulations
The Security Strategy Blueprint – SSB

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Innovating the National Response: A Reputational Strategy to Address a Large-Scale Cybercrisis

Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Smarter IoT: Computer Vision and Power Efficiency at the Edge


#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
No Time to Breach: The CISO’s Role in I(O)T Security

#CISO, #Cybersecurity
Physical AI and Europe’s Future in the Global AI Race

#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Standards and Regulations
Industrial Decarbonization Solutions

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
Artificial Hackers: Unleashing the dogs of war

#Artificial Intelligence, #Cybercrime, #Cybersecurity, #Standards and Regulations
Architecting Safety Using Cybersecurity Requirements and Assessments

#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Livin’ on the Edge

#Cybercrime, #Cybersecurity
Strategies and Practical Applications for Sustainable and Efficient Hydrocarbon Operations

#Artificial Intelligence, #Connectivity, #IOT Hardware Security, #Smart Cities, #Standards and Regulations
Cyberwatch: Uncover, Prioritize, and Defend Against Critical Vulnerabilities

#Cybersecurity, #Protection, #Risk
NIS2: Challenges, Opportunities, and Experiences in the Implementation of the New Directive




Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation

#Artificial Intelligence, #Cyber Threat Simulation, #Cybersecurity, #Quantum Computing, #Standards and Regulations
Mortal vs Machine: How AI is Transforming Cybersecurity Investigations

#Artificial Intelligence, #Cybersecurity
The Future of IoT Connectivity

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Next Generation Narrowband Communications, #Quantum Computing, #Supply Chain
Generative AI Security Issues




#Artificial Intelligence, #Cybersecurity, #Generative AI Security Issues, #Quantum Computing, #Standards and Regulations
Volvo’s Logistics Revolution: Real-Time Location Technology Deployment


#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
Data Protection in Action: Mission Possible with DSE

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
How Technology is Reshaping the IoT landscape, Driving Investment, and Enabling New use cases and Business Models.

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Next Generation Narrowband Communications, #Quantum Computing, #Supply Chain
Connecting the Future: Enhanced businesses leveraged by reliable and cost-effective IoT technologies


#Connectivity, #Next Generation Narrowband Communications
The Role of the Modern CISO





#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Securing Digital Identities: The Power of Hybrid Authentication


#Cybersecurity, #Protection, #Risk
Transforming Defense Against Cyberincidents with Generative AI

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Accelerating Edge AI | The future of AI, IoT, and challenges along the way

#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Smart Manufacturing, #Supply Chain
Image geolocation: from beginner to intermediate

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
AI-Powered Threat Informed Defense

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Reflecting on 10 Years of LoRaWAN

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing
Generative Agentic AI: The New Age of Hyper-Scaling Enterprise Automation

#Artificial Intelligence, #Autommation, #Generative AI, #Hardware
The Business of Cybercrime: Year of the Enterprising Adversary. Defend against the new era of cyber threats.

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
LoRaWAN: A Decade of Innovation, The Future Unfolding

#LoRaWAN
Welcome Remarks

#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Smart Manufacturing, #Supply Chain
Spain, land of Cybersecurity

#Cybersecurity, #Protection, #Risk
Escape-room: Operació GameSafe – Pavelló de l’Agència de Ciberseguretat de Catalunya (stand D46)
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Post Quantum Migration

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Segmentation – Best practices with Checkpoint

IoT from Space: Solutions and Future Outlook

#LoRaWAN
Real-world Experiences in Applying AI for Cyber

#Artificial Intelligence, #Cybersecurity, #Quantum Computing, #Smart Cities, #Standards and Regulations
THE ZETTASCALE ERA – The Race to Generate, Process, and Store Data

Smart Metering – a Driver of Transformation and Sustainability


#LoRaWAN
Unlocking Manufacturing Shop Floor Intelligence with LLMs

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Navigating Regulatory Requirements




Security Risks of Data Injection


A Fresh Look on Indoor Positioning: AI-Enhanced, Zero-Infrastructure Zone Tracking

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
LoRaWAN® in the Enterprise: Aligning IT and Business for IoT Success

#LoRaWAN
Data Center Market Dynamic


CrowdStrike Identity Protection Virtual Survivor Games *Registration needed*


#Cybersecurity, #Protection, #Risk
Hands-on! Train from scratch your first Edge AI model with Edge Impulse

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
The Future of Cloud and Hyperautomation: Driving Efficiency and Innovation

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Towards the Convergence of TN and NTN in 6G and D2D: the Vision and Roadmap of the European Space Agency

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Standards and Regulations, #Supply Chain
AI-Specific Cyber Risks: From Data Security to Faulty Conclusions

#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Future Outlook. HPC and Quantum Computing

#Artificial Intelligence, #Hardware, #Quantum Computing
Enabling Secure Data Collaboration through the use of Zero Knowledge Proofs to Verify an Information Attribute without Sharing or Exposing it

#AI and the Risks of Data Sharing, #Artificial Intelligence, #Connectivity, #Cybersecurity, #Smart Cities, #Standards and Regulations
Public/Private Partnerships to Enable Smart City Adoption




#Connectivity, #Cybersecurity, #Smart Cities, #Standards and Regulations
Supercharging AI Innovation and Progress in Europe


#Artificial Intelligence, #Connectivity, #IOT Hardware Security, #Smart Cities, #Standards and Regulations
LoRaWAN References from Germany: How Stadtwerke Amberg and Other Cities and Utilities Leverage IoT


#LoRaWAN
Pioneering The Quantum Logical Era: Achieving Commercial Advantage Through Data Centre Integration

Safeguarding People and Planet with LoRaWAN





#LoRaWAN
Shaping the Global AIoT Future: World AIoT Innovation Alliance Global Launch Session
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Standards and Regulations
From Code to Shield: DevSecOps Gets Smart with AI & LAZARUS


Global Synergy Unleashed: WAIA-AIoT Tech Commercialization & Sustainability Forum







Transforming Healthcare Facilities with LoRaWAN: Energy Efficiency and Smart Resource Management in Spanish Health Centers and Clinics


#LoRaWAN
Supply Chain Management in the Software Era




#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
LoRaWAN’s Impact on Industrial Transformation




#LoRaWAN
STEM Women Congress at the IOT Show: Innovation, Technology and Leadership

#Cybersecurity, #Manufacturing, #Standards and Regulations, #Supply Chain
Next-Gen Cybersecurity: Bridging the Gap Between Emerging Tech and Evolving Regulation

Strengthening Cyber-Physical Resilience in Critical Infrastructures







#Cybersecurity, #Protection, #Risk
How to Respond to a EU-Level Blackout Cyber Incident

Quantum Computing and Cybersecurity

#Cybersecurity, #Quantum Computing, #Standards and Regulations
Building scalable LoRaWAN solutions with AWS

#Connectivity, #Hardware, #IOT Hardware Security, #Standards and Regulations
Ethics in Artificial Intelligence

LoRaWAN® in Action – Success Stories from Smart Buildings, Facility Management & Beyond




#LoRaWAN
Cybersecurity from a gender perspective

Women in Cybersecurity: Shaping the Future of Digital Protection





#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
Pushing the Boundaries of LoRaWAN with Next-Gen Technologies

#LoRaWAN
New & Upcoming Technical Features for LoRaWAN

#LoRaWAN
Awards Ceremony
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Awards Ceremony
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Adapting Real-Time Intelligence to Remote Conditions Using Edge and Cloud

#Artificial Intelligence, #Autommation, #Connectivity, #Hardware
Humancentric IoT and the Smart Society Concept




#Artificial Intelligence, #Connectivity, #Smart Cities, #Standards and Regulations
Toward Quantum Advantage and an update on Post Quantum Cryptography

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
ARE YOU LOOKING FOR TALENT FOR YOUR ORGANIZATION? ¡PARTICIPATE IN THE BARCELONA CYBERSECURITY CONGRESS JOB MARKET PLACE!
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Jornada anual DCA Ciberseguretat – “Evento Privado”
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Escape-room: Operació GameSafe – Pavelló de l’Agència de Ciberseguretat de Catalunya (stand D46)
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Rubiq: LLM-Powered IoT Assistant for Real-Time Machine Insights & Actions

#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Smart Manufacturing, #Supply Chain
Quantum Cryptography: Current Capabilities and Cybersecurity Challenges

#Artificial Intelligence, #Connectivity, #Cybersecurity, #Hardware, #Quantum Computing, #Standards and Regulations
Scaling Smart: Empowering IoT Startups for Growth & Funding Success




#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
Turning Industrial AI into Business Value: The Power of Data Strategy


#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
Quantum Communications & Post Quantum Cryptography

#Artificial Intelligence, #Cybersecurity, #Hardware, #Quantum Computing
The Best of Both Worlds – Conventional Computing with Quantum Computing solving real world problems

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments

#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Hardware, #Manufacturing, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
How IoT eSIM Gives you the Power to Choose and The Speed to Scale

#Connectivity, #Hardware, #IOT Hardware Security, #Standards and Regulations
Startup Pitch: Aritium Technologies, S.L.
#Artificial Intelligence, #Hardware
Qilimanjaro’s Quantum Computing: Applications in Industrial Automation and IoT

#Artificial Intelligence, #Hardware, #Quantum Computing
Recent Advances in Cellular & Satellite Services; Cut Costs, Ubiquitous Presence, Mastering Security and Continuous Change

#Connectivity, #Hardware, #IOT Hardware Security, #Standards and Regulations
Secure Communications in the Modern Threat Landscape.

Startup Pitch: Advanced Algorithms 4 Radar, SL
#Artificial Intelligence, #Hardware
Quantum Leap: Microsoft’s Vision and Innovations in Quantum Computing

#Artificial Intelligence, #Hardware, #Quantum Computing
From Operators for Operators – 14 Sector Specific IT Security Standards from Cooperation „up kritis”

#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Smart Cities, #Standards and Regulations
Hyped or Here to Stay?





#Artificial Intelligence, #Hardware, #Quantum Computing
Silent Intrusions: The Rise of Targeted Attacks on Mobile Platforms

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity
NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications

#Connectivity, #Cybersecurity, #Standards and Regulations