BARCELONA CYBERSECURITY CONGRESS
Opening Remarks
The Cyber Butterfly Effect: How Global Geopolitics Leads to Local Cybercrime Threats (and what to do about it!)
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
The Snack Cake Guide to Supply Chain Cyber Risk
#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
Common Indicators of Compromise Every SOC Team Should Watch Out
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
Innovating the National Response: A Reputational Strategy to Address a Large-Scale Cybercrisis
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Artificial Hackers: Unleashing the dogs of war
#Artificial Intelligence, #Cybercrime, #Cybersecurity, #Standards and Regulations
Architecting Safety Using Cybersecurity Requirements and Assessments
#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
NIS2: Challenges, Opportunities, and Experiences in the Implementation of the New Directive
Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation
#Artificial Intelligence, #Cyber Threat Simulation, #Cybersecurity, #Quantum Computing, #Standards and Regulations
Generative AI Security Issues
#Artificial Intelligence, #Cybersecurity, #Generative AI Security Issues, #Quantum Computing, #Standards and Regulations
The Role of the Modern CISO
#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Transforming Defense Against Cyberincidents with Generative AI
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
AI-Powered Threat Informed Defense
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
The Business of Cybercrime: Year of the Enterprising Adversary. Defend against the new era of cyber threats.
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
Spain, land of Cybersecurity
#Cybersecurity, #Protection, #Risk
Real-world Experiences in Applying AI for Cyber
#Artificial Intelligence, #Cybersecurity, #Quantum Computing, #Smart Cities, #Standards and Regulations
Security Risks of Data Injection
The Future of Cloud and Hyperautomation: Driving Efficiency and Innovation
#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
AI-Specific Cyber Risks: From Data Security to Faulty Conclusions
#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Enabling Secure Data Collaboration through the use of Zero Knowledge Proofs to Verify an Information Attribute without Sharing or Exposing it
#AI and the Risks of Data Sharing, #Artificial Intelligence, #Connectivity, #Cybersecurity, #Smart Cities, #Standards and Regulations
Supply Chain Management in the Software Era
#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
How to Respond to a EU-Level Blackout Cyber Incident
Awards Ceremony
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Toward Quantum Advantage and an update on Post Quantum Cryptography
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Quantum Cryptography: Current Capabilities and Cybersecurity Challenges
#Artificial Intelligence, #Connectivity, #Cybersecurity, #Hardware, #Quantum Computing, #Standards and Regulations
Quantum Communications & Post Quantum Cryptography
#Artificial Intelligence, #Cybersecurity, #Hardware, #Quantum Computing
The Best of Both Worlds – Conventional Computing with Quantum Computing solving real world problems
#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments
#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Hardware, #Manufacturing, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Secure Communications in the Modern Threat Landscape.
Quantum Leap: Microsoft’s Vision and Innovations in Quantum Computing
#Artificial Intelligence, #Hardware, #Quantum Computing
From Operators for Operators – 14 Sector Specific IT Security Standards from Cooperation „up kritis”
#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Smart Cities, #Standards and Regulations
Silent Intrusions: The Rise of Targeted Attacks on Mobile Platforms
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity
NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications
#Connectivity, #Cybersecurity, #Standards and Regulations