HACKING VILLAGE
CaixabankTech Capture the Flag “Unleash your Hacking Skills”

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
OWASP Top 10 Vulnerabilities in Large Language Models (LLMs)


#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
NIS2: Tools to Address the New Directive

The Security Strategy Blueprint – SSB

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
No Time to Breach: The CISO’s Role in I(O)T Security

#CISO, #Cybersecurity
Livin’ on the Edge

#Cybercrime, #Cybersecurity
Cyberwatch: Uncover, Prioritize, and Defend Against Critical Vulnerabilities

#Cybersecurity, #Protection, #Risk
Mortal vs Machine: How AI is Transforming Cybersecurity Investigations

#Artificial Intelligence, #Cybersecurity
Data Protection in Action: Mission Possible with DSE

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Securing Digital Identities: The Power of Hybrid Authentication


#Cybersecurity, #Protection, #Risk
Image geolocation: from beginner to intermediate

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Post Quantum Migration

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Segmentation – Best practices with Checkpoint

CrowdStrike Identity Protection Virtual Survivor Games *Registration needed*


#Cybersecurity, #Protection, #Risk
Hands-on! Train from scratch your first Edge AI model with Edge Impulse

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
From Code to Shield: DevSecOps Gets Smart with AI & LAZARUS


Global Synergy Unleashed: WAIA-AIoT Tech Commercialization & Sustainability Forum







Strengthening Cyber-Physical Resilience in Critical Infrastructures







#Cybersecurity, #Protection, #Risk