BARCELONA CYBERSECURITY CONGRESS
Opening Remarks


The Cyber Butterfly Effect: How Global Geopolitics Leads to Local Cybercrime Threats (and what to do about it!)

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
The Snack Cake Guide to Supply Chain Cyber Risk

#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
Common Indicators of Compromise Every SOC Team Should Watch Out

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
Innovating the National Response: A Reputational Strategy to Address a Large-Scale Cybercrisis

Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Artificial Hackers: Unleashing the dogs of war

#Artificial Intelligence, #Cybercrime, #Cybersecurity, #Standards and Regulations
Architecting Safety Using Cybersecurity Requirements and Assessments

#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
NIS2: Challenges, Opportunities, and Experiences in the Implementation of the New Directive




Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation

#Artificial Intelligence, #Cyber Threat Simulation, #Cybersecurity, #Quantum Computing, #Standards and Regulations
Generative AI Security Issues




#Artificial Intelligence, #Cybersecurity, #Generative AI Security Issues, #Quantum Computing, #Standards and Regulations
The Role of the Modern CISO





#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Transforming Defense Against Cyberincidents with Generative AI

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
AI-Powered Threat Informed Defense

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
The Business of Cybercrime: Year of the Enterprising Adversary. Defend against the new era of cyber threats.

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
Spain, land of Cybersecurity

#Cybersecurity, #Protection, #Risk
Real-world Experiences in Applying AI for Cyber

#Artificial Intelligence, #Cybersecurity, #Quantum Computing, #Smart Cities, #Standards and Regulations
Security Risks of Data Injection


The Future of Cloud and Hyperautomation: Driving Efficiency and Innovation

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
AI-Specific Cyber Risks: From Data Security to Faulty Conclusions

#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Enabling Secure Data Collaboration through the use of Zero Knowledge Proofs to Verify an Information Attribute without Sharing or Exposing it

#AI and the Risks of Data Sharing, #Artificial Intelligence, #Connectivity, #Cybersecurity, #Smart Cities, #Standards and Regulations
Supply Chain Management in the Software Era




#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
How to Respond to a EU-Level Blackout Cyber Incident

Awards Ceremony
#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Toward Quantum Advantage and an update on Post Quantum Cryptography

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Quantum Cryptography: Current Capabilities and Cybersecurity Challenges

#Artificial Intelligence, #Connectivity, #Cybersecurity, #Hardware, #Quantum Computing, #Standards and Regulations
Quantum Communications & Post Quantum Cryptography

#Artificial Intelligence, #Cybersecurity, #Hardware, #Quantum Computing
The Best of Both Worlds – Conventional Computing with Quantum Computing solving real world problems

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments

#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Hardware, #Manufacturing, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Secure Communications in the Modern Threat Landscape.

Quantum Leap: Microsoft’s Vision and Innovations in Quantum Computing

#Artificial Intelligence, #Hardware, #Quantum Computing
From Operators for Operators – 14 Sector Specific IT Security Standards from Cooperation „up kritis”

#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Smart Cities, #Standards and Regulations
Silent Intrusions: The Rise of Targeted Attacks on Mobile Platforms

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity
NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications

#Connectivity, #Cybersecurity, #Standards and Regulations