Close
#IOTSWC25

BARCELONA CYBERSECURITY CONGRESS

Tue 13
10:00h
BARCELONA CYBERSECURITY CONGRESS

Opening Remarks

Albert Tort Pugibet
Albert Tort Pugibet Government of Catalonia Secretary of Telecommunications and Digital Transf. Speaker
Constanti Serrallonga
Constanti Serrallonga Fira Barcelona Managing Director Speaker

13-05-2025 10:00 13-05-2025 10:30 Europe/Madrid Opening Remarks We are thrilled to have you join us at this global meeting point where innovation, technology, and security converge. Over the next few days, we’ll explore how the Internet of Things and cybersecurity are reshaping industries, empowering businesses, and transforming society. With expert speakers, groundbreaking solutions, and invaluable networking opportunities, this event is designed to inspire and ignite collaboration. Thank you for being part of this journey toward a smarter, safer, and more connected world. Let’s get started. Auditorium
10:00h - 10:30h Auditorium
10:30h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

The Cyber Butterfly Effect: How Global Geopolitics Leads to Local Cybercrime Threats (and what to do about it!)

Ollie Gower
Ollie Gower FTI Consulting Senior Managing Director Cybersecurity, Spain Speaker

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations

13-05-2025 10:30 13-05-2025 11:00 Europe/Madrid The Cyber Butterfly Effect: How Global Geopolitics Leads to Local Cybercrime Threats (and what to do about it!) The unstable geopolitical landscape is driving up cyber risk worldwide. The cyber criminal marketplace, which operates as a sophisticated global business model, may sound abstract, but it is fueling highly damaging attacks against small, medium and multinational companies worldwide. In this talk, Oliver Gower (FTI Cybersecurity Senior Managing Director and Former Head of the UK´s National Cyber Crime Unit) will draw on his experience leading UK cyber law enforcement to describe the changing cyber threat and present a real-life case study demonstrating how it can impact local businesses. He will provide practical advice on how to prepare for such attacks, and what to do if your organization is affected. Cybersecurity Congress Room
10:30h - 11:00h Cybersecurity Congress Room
10:30h
Keynote Auditorium (45min) | BARCELONA CYBERSECURITY CONGRESS

The Snack Cake Guide to Supply Chain Cyber Risk

Beau Woods
Beau Woods Stratigos Security Founder/CEO Speaker

#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations

13-05-2025 10:30 13-05-2025 11:15 Europe/Madrid The Snack Cake Guide to Supply Chain Cyber Risk If IoT supply chains were packaged as your favorite childhood treats, what would the label say? Using familiar and funny examples from the world of food manufacturing, this session explores how lessons from safer food supply chains can help IoT manufacturers reduce both cost and cyber risk. Bring your appetite for practical, business-ready insights to learn how managing contaminants, recalls, and quality might translate across manufacturing disciplines. Auditorium
10:30h - 11:15h Auditorium
11:00h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Common Indicators of Compromise Every SOC Team Should Watch Out

Andrés Mendoza
Andrés Mendoza ManageEngine Technical Director Southern Europe & LATAM Speaker

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations

13-05-2025 11:00 13-05-2025 11:30 Europe/Madrid Common Indicators of Compromise Every SOC Team Should Watch Out Forensics are an integral part of discovering how a cybercrime took place. As a SOC manager, you and your team have to rely on digital forensic clues (IP addresses, file hashes, etc.) to figure out if a cybercrime has taken place, and how an attacker went about it. In cybersecurity, these forensic clues or artifacts are called IoCs. These clues serve as red flags that signal a data breach or intrusive activity on the network. Cybersecurity Congress Room
11:00h - 11:30h Cybersecurity Congress Room
11:20h
Keynote Auditorium (45min) | BARCELONA CYBERSECURITY CONGRESS

Innovating the National Response: A Reputational Strategy to Address a Large-Scale Cybercrisis

Ivan Monforte
Ivan Monforte Cybersecurity Agencia of Catalonia Managing Director Speaker

13-05-2025 11:20 13-05-2025 12:05 Europe/Madrid Innovating the National Response: A Reputational Strategy to Address a Large-Scale Cybercrisis This session will present an innovative strategy we launched a few months ago for managing cybercrises and how we used this strategy to define a new National Incident Response Plan, focused on critical infrastructure, healthcare systems, and local municipalities. Participants will leave the session with a proven path to strengthening collective cyber defenses and responding to threats and attacks with greater robustness. Auditorium
11:20h - 12:05h Auditorium
11:30h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know

Manoel Colombani
Manoel Colombani SoSafe EMEA Solution Engineer Speaker

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain

13-05-2025 11:30 13-05-2025 12:00 Europe/Madrid Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know Cybercrime is evolving rapidly, with global costs projected to soar from $10 trillion in 2025 to $13.82 trillion by 2028. AI, once the realm of science fiction, is now a transformative force reshaping the digital battlefield. As author Frank Schätzing states, “AI is no longer controlled by a small group. With generative AI, every individual is a potential player—and that changes everything.” In collaboration with Censuswide, we surveyed 500 senior IT and security decision-makers to uncover today’s most pressing cybersecurity challenges. Our research reveals six key trends shaping the future of cybercrime—from AI-driven attacks to the widening cyber resilience gap. This session delves into these critical trends, redefining how organizations approach cybersecurity. Attendees will gain valuable insights and strategies to navigate the rapidly evolving threat landscape and build resilience in an era of unprecedented digital risks. Cybersecurity Congress Room
11:30h - 12:00h Cybersecurity Congress Room
12:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Artificial Hackers: Unleashing the dogs of war

Roberto Clavero
Roberto Clavero CrowdStrike Sales Engineer Speaker

#Artificial Intelligence, #Cybercrime, #Cybersecurity, #Standards and Regulations

13-05-2025 12:10 13-05-2025 12:40 Europe/Madrid Artificial Hackers: Unleashing the dogs of war This session explores the emergence of AgenticAIs—advanced, autonomous systems capable of executing sophisticated cyberattacks using a network of specialized LLMs and their tooling. Unlike human attackers, Agenics AIs operate without ethical considerations, blowing up the principle of security through obscurity, adapting in real time their TTP and code and making adversary attribution harder. We examine the risks associated with these entities, which are reshaping the landscape of cybersecurity. Cybersecurity Congress Room
12:10h - 12:40h Cybersecurity Congress Room
12:40h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Architecting Safety Using Cybersecurity Requirements and Assessments

Don Weber
Don Weber Cutaway Security, LLC Principal Consultant and Founder Speaker

#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations

13-05-2025 12:40 13-05-2025 13:10 Europe/Madrid Architecting Safety Using Cybersecurity Requirements and Assessments Deploying and maintaining safe processes requires planning and applying knowledge from past tests and experiences. Digitized safety equipment—field devices, controllers, servers—communicating via Ethernet or wireless has surged. Vendors are also rapidly deploying cloud-based services directly connected to critical process assets. Considering cybersecurity early in development enhances safety for people, the environment, and operations. This presentation covers cybersecurity in safe operations planning. Attendees will explore the ISA 62443 risk management process and high-level risk assessment data gathering. It outlines requirements for architecting and remotely accessing safety enclaves, including potential cloud assets. Cybersecurity vulnerability assessments will be reviewed to aid planning. By the end, attendees will have a foundation for cybersecurity discussions, enhancing process safety in existing and future environments. Cybersecurity Congress Room
12:40h - 13:10h Cybersecurity Congress Room
13:00h
Roundtable/Panel Discussion | BARCELONA CYBERSECURITY CONGRESS

NIS2: Challenges, Opportunities, and Experiences in the Implementation of the New Directive

David Esteban Haro
David Esteban Haro Barcelona City Council CISO Speaker
Oscar López Santín
Oscar López Santín Agrolimen Group Cybersecurity Manager Speaker
Javier Montoya Tomás
Javier Montoya Tomás Aigües de Barcelona Director de Ciberseguridad, Continuidad y Riesgos Speaker
Malu Ribalta Ribelles
Malu Ribalta Ribelles ISMS Forum Director of Public Affairs and Communication Moderator

13-05-2025 13:00 13-05-2025 14:00 Europe/Madrid NIS2: Challenges, Opportunities, and Experiences in the Implementation of the New Directive In this discussion, cybersecurity experts will analyze the opportunities presented by the NIS2 Directive, as well as the challenge of regulatory compliance, risk management strategies, and the role of companies in adapting to these new requirements Auditorium
13:00h - 14:00h Auditorium
13:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation

Steve Mustard
Steve Mustard National Automation President Speaker

#Artificial Intelligence, #Cyber Threat Simulation, #Cybersecurity, #Quantum Computing, #Standards and Regulations

13-05-2025 13:10 13-05-2025 13:40 Europe/Madrid Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation As cyber threats become increasingly sophisticated, organizations must improve their incident response strategies to mitigate potential damage. This presentation explores how Generative AI and Immersive Reality technologies can revolutionize cybersecurity training through realistic, adaptive, and interactive simulations. By combining AI-driven scenario generation with immersive environments, organizations can create dynamic response scenarios that enhance decision-making, teamwork, and crisis management skills. Attendees will gain insights into the design and implementation of cybersecurity simulators, their advantages over traditional training methods, and best practices for integration into security operations. This session will highlight real-world applications and future trends in AI-driven cyber defense training. Cybersecurity Congress Room
13:10h - 13:40h Cybersecurity Congress Room
15:00h
Roundtable/Panel Discussion | BARCELONA CYBERSECURITY CONGRESS

Generative AI Security Issues

Steve Mustard
Steve Mustard National Automation President Speaker
Alejandro Aliaga
Alejandro Aliaga ONTINET CTO (Chief Technology Officer) Speaker
Dave Lafferty
Dave Lafferty Scientific Technical Services President Moderator
Claudio Lima
Claudio Lima Microbrains Co-founder Speaker

#Artificial Intelligence, #Cybersecurity, #Generative AI Security Issues, #Quantum Computing, #Standards and Regulations

13-05-2025 15:00 13-05-2025 16:00 Europe/Madrid Generative AI Security Issues Generative AI presents a set of unique security concerns. This panel will explore how cybersecurity can help address and manage the risks around Generative AI including: Ethical Concerns Including plagiarism, deepfakes, and the creation of misleading or harmful content Quality Control Ensuring accurate, coherent, and relevant content Bias and Fairness Controlling biases in training data and the associated weights that affect fairness and objectivity of the generated content Intellectual Property aspects ingesting data into model and of using and owning AI-generated content Cybersecurity Congress Room
15:00h - 16:00h Cybersecurity Congress Room
15:55h
Roundtable/Panel Discussion | BARCELONA CYBERSECURITY CONGRESS

The Role of the Modern CISO

Laura Caballero Nadales
Laura Caballero Nadales Cybersecurity Agency of Catalonia Director Speaker
Oscar Sánchez
Oscar Sánchez Puig Information Security and Cybersecurity Director Speaker
Steve Mustard
Steve Mustard National Automation President Moderator
Olga Forné
Olga Forné Abertis Group Global CISO Speaker
Frank Van Caenegem
Frank Van Caenegem Schneider Electric/ VP CESIN VP CISO EMEA Speaker

#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations

13-05-2025 15:55 13-05-2025 16:55 Europe/Madrid The Role of the Modern CISO It is an interesting time to be working in Cybersecurity. Technology is advancing so rapidly that regulations struggle to keep up. Many of the most exciting developments such as enhanced connectivity, edge-based computing, artificial intelligence, and quantum computing, come with a potentially off-setting risk of security vulnerability. This panel will feature Chief Information Security Officers (CISOs) from a range of end-user companies, identifying and exploring what they perceive to be the greatest opportunities (and threats) to this industry, and how their companies are adapting to this rapidly changing environment. Auditorium
15:55h - 16:55h Auditorium
16:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Transforming Defense Against Cyberincidents with Generative AI

Alejandro Aliaga
Alejandro Aliaga ONTINET CTO (Chief Technology Officer) Speaker

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations

13-05-2025 16:10 13-05-2025 16:40 Europe/Madrid Transforming Defense Against Cyberincidents with Generative AI In the current context of cybersecurity, generatiga AI is not only used to improve incident detection adn management, threat actors also make use of generative AI to evade SOC defenses. In this conference we'll look at the use of AI both from the attacker's point of view and from the SOC's proactive defense. Cybersecurity Congress Room
16:10h - 16:40h Cybersecurity Congress Room
16:40h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

AI-Powered Threat Informed Defense

Joan Ruiz
Joan Ruiz Fortinet SE Manager Speaker

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations

13-05-2025 16:40 13-05-2025 17:10 Europe/Madrid AI-Powered Threat Informed Defense We are in an era where bad actors are abusing AI tools for cybercrime. We will be introducing a framework for threat informed defense that relies on AI to detect and stop emerging advanced threats. Cybersecurity Congress Room
16:40h - 17:10h Cybersecurity Congress Room
Wed 14
10:00h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

The Business of Cybercrime: Year of the Enterprising Adversary. Defend against the new era of cyber threats.

Ramiro Céspedes
Ramiro Céspedes CROWDSTRIKE Sales Engineer Speaker

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations

14-05-2025 10:00 14-05-2025 10:30 Europe/Madrid The Business of Cybercrime: Year of the Enterprising Adversary. Defend against the new era of cyber threats. Cybersecurity Congress Room
10:00h - 10:30h Cybersecurity Congress Room
10:00h
Keynote Auditorium (45min) | BARCELONA CYBERSECURITY CONGRESS

Spain, land of Cybersecurity

Victoria Valbuena Gutiérrez
Victoria Valbuena Gutiérrez Spanish National Cybersecurity Institute (INCIBE) Head of Business Promotion & Business Development Speaker

#Cybersecurity, #Protection, #Risk

14-05-2025 10:00 14-05-2025 10:45 Europe/Madrid Spain, land of Cybersecurity In the keynote ‘Spain, Land of Cybersecurity’ Victoria Valbuena, Head of Business Promomtion and Development at INCIBE, will present the main strengths of Spain in the cybersecurity sector and the reasons why this country has the potential to become the main hub in southern Europe in the sector . Auditorium
10:00h - 10:45h Auditorium
10:30h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Real-world Experiences in Applying AI for Cyber

Kirti Kumar
Kirti Kumar EY EMEIA Cybersecurity Managed Services Leader Speaker

#Artificial Intelligence, #Cybersecurity, #Quantum Computing, #Smart Cities, #Standards and Regulations

14-05-2025 10:30 14-05-2025 11:00 Europe/Madrid Real-world Experiences in Applying AI for Cyber AI has the potential to revolutionize cybersecurity, but success depends on more than just technology. In this session, we’ll explore practical lessons from real-world AI deployments in cyber. We’ll discuss how to identify the right problems to solve, navigate the challenges of preparing and operationalizing AI models, and measure the true value of AI in enhancing security outcomes. Whether you’re starting your AI journey or refining existing implementations, this talk will provide actionable insights to maximize impact and avoid common pitfalls. Cybersecurity Congress Room
10:30h - 11:00h Cybersecurity Congress Room
11:00h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Security Risks of Data Injection

Sander van de Velde
Sander van de Velde SDG Group Principal IoT Architect Speaker
Edward Voermans
Edward Voermans Marel IoT Solutions Architect Speaker

14-05-2025 11:00 14-05-2025 11:30 Europe/Madrid Security Risks of Data Injection Cybersecurity Congress Room
11:00h - 11:30h Cybersecurity Congress Room
11:40h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

The Future of Cloud and Hyperautomation: Driving Efficiency and Innovation

Carlos Payés
Carlos Payés SentinelOne Sr Manager, Solution Engineering Speaker

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations

14-05-2025 11:40 14-05-2025 12:10 Europe/Madrid The Future of Cloud and Hyperautomation: Driving Efficiency and Innovation Join us for an insightful keynote that explores the transformative potential of cloud technology and hyperautomation in modern enterprises. As businesses continue to evolve, the integration of these advanced technologies is becoming increasingly crucial to stay ahead of the attackers. During this session, we will discuss the latest trends, benefits, and challenges associated with leveraging cloud solutions and hyperautomation to streamline operations, enhance security, and foster innovation. Whether you are considering the adoption of these technologies or looking to optimize your existing infrastructure, this keynote will provide you with a comprehensive understanding of how cloud and hyperautomation can drive efficiency and reshape the future of your organization. Don’t miss this opportunity to gain valuable insights and hear from industry experts on how to successfully implement these cutting-edge solutions. Cybersecurity Congress Room
11:40h - 12:10h Cybersecurity Congress Room
12:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

AI-Specific Cyber Risks: From Data Security to Faulty Conclusions

Tom Liston
Tom Liston Bad Wolf Security Principal Consultant, Owner Speaker

#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations

14-05-2025 12:10 14-05-2025 12:40 Europe/Madrid AI-Specific Cyber Risks: From Data Security to Faulty Conclusions Unless you've spent the last few years under a rock, you must know that the biggest buzzword in the security industry is "Artificial Intelligence." As with every new technology, AI brings both immensely promising benefits and an entirely new class of potential problems. In this presentation, we'll look at the risks this new technology can create for your organization. Imagine you've just hired a new intern who can't keep from chatting about everything he knows and who—when you need his help the most—has an annoying tendency to lie to you. Whatever will you do? Welcome to the wonderful new world of Artificial Intelligence. Cybersecurity Congress Room
12:10h - 12:40h Cybersecurity Congress Room
12:40h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Enabling Secure Data Collaboration through the use of Zero Knowledge Proofs to Verify an Information Attribute without Sharing or Exposing it

Rob Leslie
Rob Leslie Sedicii CEO Speaker

#AI and the Risks of Data Sharing, #Artificial Intelligence, #Connectivity, #Cybersecurity, #Smart Cities, #Standards and Regulations

14-05-2025 12:40 14-05-2025 13:10 Europe/Madrid Enabling Secure Data Collaboration through the use of Zero Knowledge Proofs to Verify an Information Attribute without Sharing or Exposing it A Zero Knowledge Proof (ZKP) is a cryptographic protocol that allows one party to prove the veractity of a piece of information to another party without either party learning anything about the information other than the fact that the information is true or not. The protocol is extremely useful where there is sensitivity to the information that needs to be verified such that it cannot be exposed or shared in any way, which could cause non-compliance with GDPR or other laws or regulations. We will discuss a particular implementation where the national electricity utility operator in Ireland allowed the implementation of a verification service for a person's name and address for relying parties in the financial services sector where no information is every disclosed other than the verification of the name and address. We will discuss how the project was conceived, implemented and delivered in order to ensure full compliance with GDPR and the commercial requirements of the utility that no customer data could ever leave the utility. Cybersecurity Congress Room
12:40h - 13:10h Cybersecurity Congress Room
14:30h
Fireside Chat | BARCELONA CYBERSECURITY CONGRESS

Supply Chain Management in the Software Era

Julien Bertolini
Julien Bertolini Volvo Group IoT expert Speaker
Ilya Subbotin
Ilya Subbotin Asset Care Western Europe Senior Manager Maintenance Speaker
Beau Woods
Beau Woods Stratigos Security Founder/CEO Moderator
Mark Kraeling
Mark Kraeling GE Solutions Architect – Digital Communications Speaker

#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations

14-05-2025 14:30 14-05-2025 15:30 Europe/Madrid Supply Chain Management in the Software Era As connected technology increasingly drives business value for manufacturers, traditional supply chain risks are extended by the adoption of software, firmware, and hardware components. Manufacturers are seeing this on several fronts, including the products they sell, the plants that make these goods, and augmentations to the traditional supply chain (such as blockchain for track and trace). As effective practices in technology adoption mature, learn how mature manufacturers are empowering their operations with new capabilities. All while avoiding unintended consequences from new sources of risk to ensure products are designed, developed, and delivered at lower cost, in less time, and fewer defects. Cybersecurity Congress Room
14:30h - 15:30h Cybersecurity Congress Room
15:30h
Workshop | BARCELONA CYBERSECURITY CONGRESS

How to Respond to a EU-Level Blackout Cyber Incident

Carlos Valderrama
Carlos Valderrama Straumann Group Head of Global Security Operations Speaker

14-05-2025 15:30 14-05-2025 16:30 Europe/Madrid How to Respond to a EU-Level Blackout Cyber Incident This workshop simulates a cyberattack response to a blackout affecting several European countries. It trains participants in cyber crisis management, stakeholder coordination, and rapid response to prevent escalation into a national emergency. The exercise is dynamic and follows best practices such as NIST SP 800-61 and ISO 27035. The scenario involves a cyberattack on SCADA systems using a zero-day exploit and ransomware attributed to “DarkGrid,” a fictional state-sponsored actor. Objectives include crisis response, impact mitigation, and drawing lessons learned, all within 90 minutes. The attack causes cascading outages; by April 29, 99.95% of Spain's power is restored, though disruptions remain. The workshop begins at 13:00 on April 28, 2025—30 minutes after the blackout and initial cyber indicators. Objectives: Practice NIST/ISO-based crisis response Coordinate multi-stakeholder containment Mitigate secondary impacts Extract lessons for resilience Apply insights to future cyber exercises Cybersecurity Congress Room
15:30h - 16:30h Cybersecurity Congress Room
17:30h
BARCELONA CYBERSECURITY CONGRESS

Awards Ceremony

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain

14-05-2025 17:30 14-05-2025 18:30 Europe/Madrid Awards Ceremony The Industry Solutions Awards celebrate groundbreaking innovations across key sectors. Our goal is to honor transformative technologies driving progress, from sustainability to AI, Industry 4.0, cybersecurity, and beyond. Participating in these awards places your project in the spotlight alongside leaders shaping tomorrow’s world. Winning an Industry Solutions Award showcases your commitment to excellence and leadership in your field. Auditorium
17:30h - 18:30h Auditorium
Thu 15
10:00h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Toward Quantum Advantage and an update on Post Quantum Cryptography

David Dickson
David Dickson sinektik Managing Director Speaker

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain

15-05-2025 10:00 15-05-2025 10:30 Europe/Madrid Toward Quantum Advantage and an update on Post Quantum Cryptography Quantum computing—one of our most profound innovations—has the potential to address practical challenges beyond the scope of traditional computing. However, as we know, solving one complex problem often leads to the creation of another. As we enter an era of quantum advantage, we must also acknowledge the complexities it introduces. Our growing reliance on data, coupled with the rise of automation and AI, increases our vulnerability to cybersecurity threats and their impact. These risks are further compounded by the algorithmic power of quantum computing. This presents significant dangers to our cyber and critical infrastructure, potentially leading to an existential crisis if not proactively managed. This presentation aims to demystify the reality of quantum physics, showcasing real-world quantum computing applications, and providing an update on the progress of Post-Quantum Cryptography, ecosystems, and future development roadmaps Cybersecurity Congress Room
10:00h - 10:30h Cybersecurity Congress Room
10:30h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Quantum Cryptography: Current Capabilities and Cybersecurity Challenges

Aitor Brazaola-Vicario
Aitor Brazaola-Vicario TECNALIA Research & Innovation Foundation Cybersecurity Researcher Speaker

#Artificial Intelligence, #Connectivity, #Cybersecurity, #Hardware, #Quantum Computing, #Standards and Regulations

15-05-2025 10:30 15-05-2025 11:00 Europe/Madrid Quantum Cryptography: Current Capabilities and Cybersecurity Challenges This presentation will explore the growing threats posed by quantum computing to classical cryptographic systems and the potential of quantum key distribution (QKD) as a resilient security solution. It will include real-world use cases, such as our experience deploying QKD in the energy sector, highlighting both its technical challenges and its integration with existing infrastructures. Additionally, the talk will discuss the latest advancements in quantum cryptographic technologies and the key research directions shaping their future development. Cybersecurity Congress Room
10:30h - 11:00h Cybersecurity Congress Room
11:00h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Quantum Communications & Post Quantum Cryptography

Deepa Shinde
Deepa Shinde Quantum Computing Ambassador - Microsoft UK Lead AI/ML Architect for Pharma & LifeSciences Speaker

#Artificial Intelligence, #Cybersecurity, #Hardware, #Quantum Computing

15-05-2025 11:00 15-05-2025 11:30 Europe/Madrid Quantum Communications & Post Quantum Cryptography This session delves into the transformative potential of quantum communications and the critical advancements in post-quantum cryptography (PQC). As quantum computing evolves, traditional cryptographic systems face unprecedented threats, necessitating the development of quantum-resistant algorithms. We will discuss what organizations should be doing in terms of readiness, including how they should plan and prepare. We will also explore Microsoft's Quantum Safe program. Cybersecurity Congress Room
11:00h - 11:30h Cybersecurity Congress Room
11:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

The Best of Both Worlds – Conventional Computing with Quantum Computing solving real world problems

David Dickson
David Dickson sinektik Managing Director Speaker

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain

15-05-2025 11:10 15-05-2025 11:40 Europe/Madrid The Best of Both Worlds – Conventional Computing with Quantum Computing solving real world problems Quantum computing—one of our most profound innovations—has the potential to address deeply complex, yet practical challenges that are beyond the reach of classical computing. I will provide an update on the rapid developments towards the era of quantum advantage, achieved by combining the power of both classical and quantum computing to overcome quantum computational impediments. This presentation aims to: ground the reality of quantum physics; explore the evolution into quantum computing; provide an update on the progress of quantum ecosystems; highlight QC’s role as part of the IoT fabric in solving real-world problems across the chemicals, battery, and agriculture industries; and present an example roadmap. Auditorium
11:10h - 11:40h Auditorium
11:40h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments

Mr. SZ Lin
Mr. SZ Lin Sun Square Chief Expert Speaker

#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Hardware, #Manufacturing, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain

15-05-2025 11:40 15-05-2025 12:10 Europe/Madrid Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments As smart cities increasingly adopt IoT, industrial automation, and integrated infrastructure, the complexity of these interconnected systems expands potential cybersecurity risks. Without a structured security strategy, vulnerabilities persist, risking essential services like transportation and energy. The ISA/IEC 62443 standard set best practices for securing industrial automation and control systems in smart cities. By establishing risk assessment and corresponding physical, administrative, and technical controls, it mitigates cyber risks while enhancing resilience. However, static security measures alone are insufficient—continuous assessment is essential. The ISASecure Site Assessment evaluates cybersecurity posture against ISA/IEC 62443 compliance, helping cities identify risks, validate protections, and align with industry best practices. Regular assessments enable operators to proactively strengthen defenses and safeguard critical infrastructure from evolving cyber threats. Cybersecurity Congress Room
11:40h - 12:10h Cybersecurity Congress Room
12:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Secure Communications in the Modern Threat Landscape.

John Brand
John Brand Aeronix Technology Group Sr Product Line Manager Speaker

15-05-2025 12:10 15-05-2025 12:40 Europe/Madrid Secure Communications in the Modern Threat Landscape. Cybersecurity Congress Room
12:10h - 12:40h Cybersecurity Congress Room
12:30h
Keynote Auditorium (45min) | BARCELONA CYBERSECURITY CONGRESS

Quantum Leap: Microsoft’s Vision and Innovations in Quantum Computing

Deepa Shinde
Deepa Shinde Quantum Computing Ambassador - Microsoft UK Lead AI/ML Architect for Pharma & LifeSciences Speaker

#Artificial Intelligence, #Hardware, #Quantum Computing

15-05-2025 12:30 15-05-2025 13:00 Europe/Madrid Quantum Leap: Microsoft’s Vision and Innovations in Quantum Computing Join us for an exhilarating session on Quantum Computing that will demystify the Hype vs Reality in this cutting-edge field. Dive into Microsoft's visionary approach and groundbreaking innovations in Quantum Computing. Discover how our pioneering efforts are driving significant breakthroughs in hardware advancements, including the revolutionary Majorana 1 quantum processor. Explore real-world applications poised to transform industries, from enhancing material science and chemistry to bolstering security with post-quantum cryptography. This session promises to be an eye-opening journey into the future of technology and its transformative potential. Auditorium
12:30h - 13:00h Auditorium
12:40h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

From Operators for Operators – 14 Sector Specific IT Security Standards from Cooperation „up kritis”

Michael Pilgermann
Michael Pilgermann UP KRITIS Professor | Spokesman Speaker

#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Smart Cities, #Standards and Regulations

15-05-2025 12:40 15-05-2025 13:10 Europe/Madrid From Operators for Operators – 14 Sector Specific IT Security Standards from Cooperation „up kritis” Operators of Critical Infrastructures (CI) face a severe cyber threat landscape. While some IT security challenges are universal, others are sector-specific. Germany’s implementation of the NIS Directive enabled operators to propose industry standards for IT security; 14 such standards now exist. The B3S Medical Care for example addresses the specifics of medical devices. These standards are collaboratively developed by operators and authorities under UP KRITIS, a PPP for CI protection with around 800 members. The talk will also explain, how UP KRITIS supports NIS2 and CER implementation. Cybersecurity Congress Room
12:40h - 13:10h Cybersecurity Congress Room
14:30h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Silent Intrusions: The Rise of Targeted Attacks on Mobile Platforms

Marc Rivero
Marc Rivero Kaspersky Lead Security Researcher Speaker

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity

15-05-2025 14:30 15-05-2025 15:00 Europe/Madrid Silent Intrusions: The Rise of Targeted Attacks on Mobile Platforms Mobile platforms have become a primary target for sophisticated cyber threats, with attackers leveraging zero-click exploits, spyware, and supply chain compromises to infiltrate high-value targets. As these threats continue to evolve, understanding their mechanics and impact is crucial for both researchers and security practitioners. We will analyze the latest targeted attacks on mobile environments, focusing on zero-click exploits, cyber-espionage operations, and advanced persistent threats (APTs) against iOS and Android devices. We will explore real-world attack chains, discuss emerging techniques used by threat actors, and evaluate current detection and mitigation strategies. Attendees will gain insights into: • The evolution of mobile APTs and their operational tactics • Zero-click and zero-day vulnerabilities in iOS and Android • Advanced spyware and cyber-surveillance techniques • Supply chain compromises affecting mobile ecosystems • Effective threat intelligence, forensics, and defense strategies Cybersecurity Congress Room
14:30h - 15:00h Cybersecurity Congress Room
15:00h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications

Régis Cazenave
Régis Cazenave ECSO | S2 Grupo SME Chair, ECSO | General Manager Europe, S2 Grupo Speaker

#Connectivity, #Cybersecurity, #Standards and Regulations

15-05-2025 15:00 15-05-2025 15:30 Europe/Madrid NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications Despite the October 17, 2024 deadline, most EU member states have not yet transposed the NIS2 Directive into national law, prompting the European Commission to initiate infringement proceedings against 23 countries. We will take a look at the fragmented implementation which has created substantial operational challenges, particularly for organizations operating across borders. Member States have adopted varying approaches to entity classification, sector inclusion, and size-cap thresholds, while also implementing different incident reporting classification, compliance deadlines and referencing diverse international security frameworks. This will be followed by a closer examination of the main challenges and priorities facing organizations within the scope of the Directive, as well as their preparedness level. Cybersecurity Congress Room
15:00h - 15:30h Cybersecurity Congress Room

Pedro Mier

Pedro Mier holds a degree in Telecommunications Engineer ing from the Polytechnic University of Catalonia, MBA from ESADE and PADE from IESE. He is currently President of AMETIC (Association of Electronics, Information Technology and Telecommunications Companies of Spain), Shareholder and Chairman of the Board of Directors of TRYO Aerospace & Electronics, Board Member of the Premo Group and Committee of CTTC. member of Space Angels Network and Member of the Sc ientific Advisory

Close