Close
#IOTSWC25

Track: Cybersecurity Adoption Strategy

Tue 13
10:30h
Keynote Auditorium (45min) | BARCELONA CYBERSECURITY CONGRESS

The Snack Cake Guide to Supply Chain Cyber Risk

Beau Woods
Beau Woods Stratigos Security Founder/CEO Speaker

#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations

13-05-2025 10:30 13-05-2025 11:15 Europe/Madrid The Snack Cake Guide to Supply Chain Cyber Risk If IoT supply chains were packaged as your favorite childhood treats, what would the label say? Using familiar and funny examples from the world of food manufacturing, this session explores how lessons from safer food supply chains can help IoT manufacturers reduce both cost and cyber risk. Bring your appetite for practical, business-ready insights to learn how managing contaminants, recalls, and quality might translate across manufacturing disciplines. Auditorium
10:30h - 11:15h Auditorium
13:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation

Steve Mustard
Steve Mustard National Automation President Speaker

#Artificial Intelligence, #Cyber Threat Simulation, #Cybersecurity, #Quantum Computing, #Standards and Regulations

13-05-2025 13:10 13-05-2025 13:40 Europe/Madrid Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation As cyber threats become increasingly sophisticated, organizations must improve their incident response strategies to mitigate potential damage. This presentation explores how Generative AI and Immersive Reality technologies can revolutionize cybersecurity training through realistic, adaptive, and interactive simulations. By combining AI-driven scenario generation with immersive environments, organizations can create dynamic response scenarios that enhance decision-making, teamwork, and crisis management skills. Attendees will gain insights into the design and implementation of cybersecurity simulators, their advantages over traditional training methods, and best practices for integration into security operations. This session will highlight real-world applications and future trends in AI-driven cyber defense training. Cybersecurity Congress Room
13:10h - 13:40h Cybersecurity Congress Room
16:40h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

AI-Powered Threat Informed Defense

Joan Ruiz
Joan Ruiz Fortinet SE Manager Speaker

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations

13-05-2025 16:40 13-05-2025 17:10 Europe/Madrid AI-Powered Threat Informed Defense We are in an era where bad actors are abusing AI tools for cybercrime. We will be introducing a framework for threat informed defense that relies on AI to detect and stop emerging advanced threats. Cybersecurity Congress Room
16:40h - 17:10h Cybersecurity Congress Room
Wed 14
10:00h
Keynote Auditorium (45min) | BARCELONA CYBERSECURITY CONGRESS

Spain, land of Cybersecurity

Victoria Valbuena Gutiérrez
Victoria Valbuena Gutiérrez Spanish National Cybersecurity Institute (INCIBE) Head of Business Promotion & Business Development Speaker

#Cybersecurity, #Protection, #Risk

14-05-2025 10:00 14-05-2025 10:45 Europe/Madrid Spain, land of Cybersecurity In the keynote ‘Spain, Land of Cybersecurity’ Victoria Valbuena, Head of Business Promomtion and Development at INCIBE, will present the main strengths of Spain in the cybersecurity sector and the reasons why this country has the potential to become the main hub in southern Europe in the sector . Auditorium
10:00h - 10:45h Auditorium
10:30h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Real-world Experiences in Applying AI for Cyber

Kirti Kumar
Kirti Kumar EY EMEIA Cybersecurity Managed Services Leader Speaker

#Artificial Intelligence, #Cybersecurity, #Quantum Computing, #Smart Cities, #Standards and Regulations

14-05-2025 10:30 14-05-2025 11:00 Europe/Madrid Real-world Experiences in Applying AI for Cyber AI has the potential to revolutionize cybersecurity, but success depends on more than just technology. In this session, we’ll explore practical lessons from real-world AI deployments in cyber. We’ll discuss how to identify the right problems to solve, navigate the challenges of preparing and operationalizing AI models, and measure the true value of AI in enhancing security outcomes. Whether you’re starting your AI journey or refining existing implementations, this talk will provide actionable insights to maximize impact and avoid common pitfalls. Cybersecurity Congress Room
10:30h - 11:00h Cybersecurity Congress Room
Thu 15
10:30h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Quantum Cryptography: Current Capabilities and Cybersecurity Challenges

Aitor Brazaola-Vicario
Aitor Brazaola-Vicario TECNALIA Research & Innovation Foundation Cybersecurity Researcher Speaker

#Artificial Intelligence, #Connectivity, #Cybersecurity, #Hardware, #Quantum Computing, #Standards and Regulations

15-05-2025 10:30 15-05-2025 11:00 Europe/Madrid Quantum Cryptography: Current Capabilities and Cybersecurity Challenges This presentation will explore the growing threats posed by quantum computing to classical cryptographic systems and the potential of quantum key distribution (QKD) as a resilient security solution. It will include real-world use cases, such as our experience deploying QKD in the energy sector, highlighting both its technical challenges and its integration with existing infrastructures. Additionally, the talk will discuss the latest advancements in quantum cryptographic technologies and the key research directions shaping their future development. Cybersecurity Congress Room
10:30h - 11:00h Cybersecurity Congress Room
11:40h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments

Mr. SZ Lin
Mr. SZ Lin Sun Square Chief Expert Speaker

#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Hardware, #Manufacturing, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain

15-05-2025 11:40 15-05-2025 12:10 Europe/Madrid Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments As smart cities increasingly adopt IoT, industrial automation, and integrated infrastructure, the complexity of these interconnected systems expands potential cybersecurity risks. Without a structured security strategy, vulnerabilities persist, risking essential services like transportation and energy. The ISA/IEC 62443 standard set best practices for securing industrial automation and control systems in smart cities. By establishing risk assessment and corresponding physical, administrative, and technical controls, it mitigates cyber risks while enhancing resilience. However, static security measures alone are insufficient—continuous assessment is essential. The ISASecure Site Assessment evaluates cybersecurity posture against ISA/IEC 62443 compliance, helping cities identify risks, validate protections, and align with industry best practices. Regular assessments enable operators to proactively strengthen defenses and safeguard critical infrastructure from evolving cyber threats. Cybersecurity Congress Room
11:40h - 12:10h Cybersecurity Congress Room
14:30h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Silent Intrusions: The Rise of Targeted Attacks on Mobile Platforms

Marc Rivero
Marc Rivero Kaspersky Lead Security Researcher Speaker

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity

15-05-2025 14:30 15-05-2025 15:00 Europe/Madrid Silent Intrusions: The Rise of Targeted Attacks on Mobile Platforms Mobile platforms have become a primary target for sophisticated cyber threats, with attackers leveraging zero-click exploits, spyware, and supply chain compromises to infiltrate high-value targets. As these threats continue to evolve, understanding their mechanics and impact is crucial for both researchers and security practitioners. We will analyze the latest targeted attacks on mobile environments, focusing on zero-click exploits, cyber-espionage operations, and advanced persistent threats (APTs) against iOS and Android devices. We will explore real-world attack chains, discuss emerging techniques used by threat actors, and evaluate current detection and mitigation strategies. Attendees will gain insights into: • The evolution of mobile APTs and their operational tactics • Zero-click and zero-day vulnerabilities in iOS and Android • Advanced spyware and cyber-surveillance techniques • Supply chain compromises affecting mobile ecosystems • Effective threat intelligence, forensics, and defense strategies Cybersecurity Congress Room
14:30h - 15:00h Cybersecurity Congress Room
15:00h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications

Régis Cazenave
Régis Cazenave ECSO | S2 Grupo SME Chair, ECSO | General Manager Europe, S2 Grupo Speaker

#Connectivity, #Cybersecurity, #Standards and Regulations

15-05-2025 15:00 15-05-2025 15:30 Europe/Madrid NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications Despite the October 17, 2024 deadline, most EU member states have not yet transposed the NIS2 Directive into national law, prompting the European Commission to initiate infringement proceedings against 23 countries. We will take a look at the fragmented implementation which has created substantial operational challenges, particularly for organizations operating across borders. Member States have adopted varying approaches to entity classification, sector inclusion, and size-cap thresholds, while also implementing different incident reporting classification, compliance deadlines and referencing diverse international security frameworks. This will be followed by a closer examination of the main challenges and priorities facing organizations within the scope of the Directive, as well as their preparedness level. Cybersecurity Congress Room
15:00h - 15:30h Cybersecurity Congress Room

Pedro Mier

Pedro Mier holds a degree in Telecommunications Engineer ing from the Polytechnic University of Catalonia, MBA from ESADE and PADE from IESE. He is currently President of AMETIC (Association of Electronics, Information Technology and Telecommunications Companies of Spain), Shareholder and Chairman of the Board of Directors of TRYO Aerospace & Electronics, Board Member of the Premo Group and Committee of CTTC. member of Space Angels Network and Member of the Sc ientific Advisory

Close