Close

Track: Cybersecurity Adoption Strategy

Tue 13
13:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation

Steve Mustard
Steve Mustard National Automation President Speaker

#Artificial Intelligence, #Cyber Threat Simulation, #Cybersecurity, #Quantum Computing, #Standards and Regulations

13-05-2025 13:10 13-05-2025 13:40 Europe/Madrid Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation As cyber threats become increasingly sophisticated, organizations must improve their incident response strategies to mitigate potential damage. This presentation explores how Generative AI and Immersive Reality technologies can revolutionize cybersecurity training through realistic, adaptive, and interactive simulations. By combining AI-driven scenario generation with immersive environments, organizations can create dynamic response scenarios that enhance decision-making, teamwork, and crisis management skills. Attendees will gain insights into the design and implementation of cybersecurity simulators, their advantages over traditional training methods, and best practices for integration into security operations. This session will highlight real-world applications and future trends in AI-driven cyber defense training. Cybersecurity Congress Room
13:10h - 13:40h Cybersecurity Congress Room
15:50h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Structuring cybersecurity through compliance: a lever to anticipate future objectives

Léandre Romerosa
Léandre Romerosa Tenacy Presales & Delivery  Speaker

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations

13-05-2025 15:50 13-05-2025 16:20 Europe/Madrid Structuring cybersecurity through compliance: a lever to anticipate future objectives In light of evolving threats and regulatory requirements, compliance provides a framework to strengthen security and ensure sustainable management. More than just an end goal, it is becoming a strategic lever to professionalize internal practices and anticipate future obligations. Cybersecurity Congress Room
15:50h - 16:20h Cybersecurity Congress Room
Wed 14
10:30h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Real-world Experiences in Applying AI for Cyber

Kirti Kumar
Kirti Kumar EY EMEIA Cybersecurity Managed Services Leader Speaker

#Artificial Intelligence, #Cybersecurity, #Quantum Computing, #Smart Cities, #Standards and Regulations

14-05-2025 10:30 14-05-2025 11:00 Europe/Madrid Real-world Experiences in Applying AI for Cyber AI has the potential to revolutionize cybersecurity, but success depends on more than just technology. In this session, we’ll explore practical lessons from real-world AI deployments in cyber. We’ll discuss how to identify the right problems to solve, navigate the challenges of preparing and operationalizing AI models, and measure the true value of AI in enhancing security outcomes. Whether you’re starting your AI journey or refining existing implementations, this talk will provide actionable insights to maximize impact and avoid common pitfalls. Cybersecurity Congress Room
10:30h - 11:00h Cybersecurity Congress Room
Thu 15
10:30h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Quantum Cryptography: Current Capabilities and Cybersecurity Challenges

Aitor Brazaola-Vicario
Aitor Brazaola-Vicario TECNALIA Research & Innovation Foundation Cybersecurity Researcher Speaker

#Artificial Intelligence, #Connectivity, #Cybersecurity, #Hardware, #Quantum Computing, #Standards and Regulations

15-05-2025 10:30 15-05-2025 11:00 Europe/Madrid Quantum Cryptography: Current Capabilities and Cybersecurity Challenges This presentation will explore the growing threats posed by quantum computing to classical cryptographic systems and the potential of quantum key distribution (QKD) as a resilient security solution. It will include real-world use cases, such as our experience deploying QKD in the energy sector, highlighting both its technical challenges and its integration with existing infrastructures. Additionally, the talk will discuss the latest advancements in quantum cryptographic technologies and the key research directions shaping their future development. Cybersecurity Congress Room
10:30h - 11:00h Cybersecurity Congress Room
11:40h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments

Mr. SZ Lin
Mr. SZ Lin Sun Square Chief Expert Speaker

#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Hardware, #Manufacturing, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain

15-05-2025 11:40 15-05-2025 12:10 Europe/Madrid Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments As smart cities increasingly adopt IoT, industrial automation, and integrated infrastructure, the complexity of these interconnected systems expands potential cybersecurity risks. Without a structured security strategy, vulnerabilities persist, risking essential services like transportation and energy. The ISA/IEC 62443 standard set best practices for securing industrial automation and control systems in smart cities. By establishing risk assessment and corresponding physical, administrative, and technical controls, it mitigates cyber risks while enhancing resilience. However, static security measures alone are insufficient—continuous assessment is essential. The ISASecure Site Assessment evaluates cybersecurity posture against ISA/IEC 62443 compliance, helping cities identify risks, validate protections, and align with industry best practices. Regular assessments enable operators to proactively strengthen defenses and safeguard critical infrastructure from evolving cyber threats. Cybersecurity Congress Room
11:40h - 12:10h Cybersecurity Congress Room
12:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Designed with Intent: Avoiding the Cybersecurity Patchwork in Smart City OT

Charlie Souza
Charlie Souza Acutech Functional Safety and Industrial Cybersecurity Lead Speaker

#Connectivity, #Cybersecurity, #End-user Security Assessment, #Manufacturing, #Smart Cities, #Standards and Regulations, #Supply Chain

15-05-2025 12:10 15-05-2025 12:40 Europe/Madrid Designed with Intent: Avoiding the Cybersecurity Patchwork in Smart City OT Modern smart cities rely on a complex web of operational technology (OT) systems to enhance efficiency, connectivity, and sustainability. However, securing these systems requires more than just deploying cyber tools—it demands a holistic design and integration approach. This session explores lessons learned from recent cyber risk assessments, highlighting the challenges of implementing security controls in both green and brownfield environments. From the pitfalls of fragmented tool selection to the risks of misaligned assumptions between teams, we’ll discuss how poor operational understanding leads to ineffective cybersecurity measures. Through real-world examples, attendees will gain insights into how smart city projects can: • Align cybersecurity tools with operational intent, • Improve coordination between IT, OT, and security teams, • Navigate the differences between greenfield and brownfield cybersecurity design, • Ensure cyber controls are implemented effectively rather than just on paper. Cybersecurity Congress Room
12:10h - 12:40h Cybersecurity Congress Room
15:00h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications

Régis Cazenave
Régis Cazenave ECSO | S2 Grupo SME Chair, ECSO | General Manager Europe, S2 Grupo Speaker

#Connectivity, #Cybersecurity, #Standards and Regulations

15-05-2025 15:00 15-05-2025 15:30 Europe/Madrid NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications Despite the October 17, 2024 deadline, most EU member states have not yet transposed the NIS2 Directive into national law, prompting the European Commission to initiate infringement proceedings against 23 countries. We will take a look at the fragmented implementation which has created substantial operational challenges, particularly for organizations operating across borders. Member States have adopted varying approaches to entity classification, sector inclusion, and size-cap thresholds, while also implementing different incident reporting classification, compliance deadlines and referencing diverse international security frameworks. This will be followed by a closer examination of the main challenges and priorities facing organizations within the scope of the Directive, as well as their preparedness level. Cybersecurity Congress Room
15:00h - 15:30h Cybersecurity Congress Room

Pedro Mier

Pedro Mier holds a degree in Telecommunications Engineer ing from the Polytechnic University of Catalonia, MBA from ESADE and PADE from IESE. He is currently President of AMETIC (Association of Electronics, Information Technology and Telecommunications Companies of Spain), Shareholder and Chairman of the Board of Directors of TRYO Aerospace & Electronics, Board Member of the Premo Group and Committee of CTTC. member of Space Angels Network and Member of the Sc ientific Advisory

Close