Close

FIRST SPEAKERS ANNOUNCED 2023!

Discover the first speakers announced and sessions for the 2023 edition!

SPEAKERS ANNOUNCED

Monica Gobbato

VP - Head of Health & Life Sciences Sales for South & Eastern Europe

Design a system of AI in compliance with Digital Law

It is unthinkable to consider AI without knowing the mandatory nature of a data Protection impact assessment. GDPR obliges all subjects who have treatments with the use of innovative systems such as artificial intelligence, to carry out a impact assessment. It is a procedure aimed at describing treatments included in the AI project and to understand the risks for violations of human rights. The DPIA can be concluded simply with the decision of particular safety measures to be taken or even with the need to make certain corrective measures to the project that make it compliant with the gdpr.

#JOURNEY: ENERGY AND UTILITIES

Allan Friedman

Senior Advisor and Strategist

Critical importance of SBoM

#JOURNEY: SUPPLY CHAIN 1

Andrew Martin

Professor of Systems Security

Cybersecurity and IoT – The worst of both worlds Securing Network Design by Design

The importance of the network context, what issues we see and how we can overcome some of those challenges with collaboration and new forms of technology.

#JOURNEY: CYBERSECURITY, IOT

Jesus Sanchez

Global CISO

Panel: Energy and Utility Risks

#JOURNEY: ENERGY AND UTILITIES

Goran Novkovic

Head of Industrial Cybersecurity
Driving Cyber-Operational Intelligence with Digital Twins Solution Implementation

Operation is critical part of every Business whereas Industrial Cybersecurity is critical part of every Operation. Mission of Industrial Cybersecurity Practice is to protect the Operation. To deliver it, we must achieve and maintain OT-IoT Visibility that is required to design, tailor and implement Industrial Cybersecurity Solutions for the organizations. The presentation offers a practical approach to providing OT-IoT Visibility empowered by Digital Twins and advanced technologies (ML, AI) that transfer real-time data into cyber-operational intelligence to drive objective business decisions.

#JOURNEY: ENERGY AND UTILITIES

Mohamed Sohail

Cyber Security Advisory Consultant

A new method for a versatile sensitive IoT data handling

The Internet of Things is driving numerous innovations and transformations, which come with challenges and risks. The security and safety of data represent one of the top concerns. This use case rethinks the veracity and analytics of IoT data handling based on its sensitivity in the context of IoT tiering and classification. The Use case will discuss – Homogenous Security for all IoT Analytics – Data Classification Security Granularity. – Provide Heterogeneity for Secure-Based Analytics. – Data Classification and Mapping at the Gateway.

#JOURNEY: CYBERSECURITY, IOT

José Luis Diego

Head of European Projects Division

Cybersecurity in Europe - A police research perspective: CC-DRIVER and RAYUELA projects

The aim is to explain how the European Commission is fostering European research on cybersecurity to enhance the security of its citizens by means of Horizon Europe funding schemes. Besides a general approach explaining the European view and methodology to face cybercriminality, it will be addressed how we work on it from a R&D on security perspective, as an experienced end-user, with more than 30 EU funded projects since 2005. On the other hand, it will be discussed new methods to prevent, investigate, and mitigate cybercriminal behaviour, with a particular focus on young cybercriminality, directly involving police forces in this task.

#JOURNEY: SUPPLY CHAINHIGH PROFILE CASE STUDIES

Sarb Sembhi

CTO

The talk will cover the adoption of IoT within the smart built environment, the cybersecurity challenges it brings and how we address the knowledge/skills gaps.

#JOURNEY: IoT

Josema Cavanillas

VP - Head of Health & Life Sciences Sales for South & Eastern Europe

Data Issues: Patient Data, Device Data; Who owns the data? Who has access to it? How long is it kept? How is it shared? How is it secured? How is Biometric data viewed?

#JOURNEY: HEALTHCARE

Franky Thrasher

Manager Nuclear Cybersecurity

Supply Chain Security Overview: Where are we? How did we get here? What comes next?

#JOURNEY: SUPPLY CHAIN

Geir Arilb Engh-Hellesvik

Chief Information Security Officer

Supply Chain Security Overview: Where are we? How did we get here? What comes next?

#JOURNEY: SUPPLY CHAIN

Pepa Sedó

E&F Programmes Director

“Don’t Panic. You’re already doing most of this.”

On this panel, Pepa Sedó will explore supply chain security (both hardware and software), with a focus on past, present and future solutions to address a quickly evolving threat landscape.

#JOURNEY: SUPPLY CHAIN

Josema Cavanillas

VP - Head of Health & Life Sciences Sales for South & Eastern Europe

Data Issues: Patient Data, Device Data; Who owns the data? Who has access to it? How long is it kept? How is it shared? How is it secured? How is Biometric data viewed?

#JOURNEY: HEALTHCARE

Franky Thrasher

Manager Nuclear Cybersecurity

To be announced…

#JOURNEY: SUPPLY CHAIN

Geir Arilb Engh-Hellesvik

Chief Information Security Officer

To be announced…

#JOURNEY: SUPPLY CHAIN

Pepa Sedó

E&F Programmes Director

To be announced…

Sarb Sembhi

CTO

The talk will cover the adoption of IoT within the smart built environment, the cybersecurity challenges it brings and how we address the knowledge/skills gaps.

#JOURNEY: IoT

Allan Friedman

Importance of SBoM

Criticle importance of SBoM.

#JOURNEY: To be confirmed

Andrew Martin

Professor of Systems Security

Cybersecurity and IoT: The worst of both worlds Security Network by Design.

#JOURNEY: CYBERSECURITY, IoT

Jesus Sanchez

Global CISO

Energy and Utility Risks.

#JOURNEY: ENERGY & UTILITIES

Felix Barrio

General Manager

Energy and Utility Risks.

#JOURNEY: ENERGY & UTILITIES

Andrew Martin

Professor of Systems Security

Cybersecurity and IoT: The worst of both worlds Security Network by Design.

#JOURNEY: CYBERSECURITY, IoT

Sarb Sembhi

CTO

The talk will cover the adoption of IoT within the smart built environment, the cybersecurity challenges it brings and how we address the knowledge/skills gaps.

#JOURNEY: IoT

Jesus Sanchez

Global CISO

Energy and Utility Risks.

#JOURNEY: ENERGY & UTILITIES