RT Room
50 unique topics, 100+ expert speakers
join the discussion!
- AI Powered cyber attacks
- Quantum computing
- Zero-trust architecture
- 5G network vulnerabilities
- Adapting to new regulations
- Cloud Security
Innovation
Unveiling a Unique Approach to Cybersecurity.
The Grand Edition 2025 will feature 50 roundtable discussions, covering 50 unique topics organized under 12 critical focus areas for 2025, reflecting the latest challenges and opportunities in cybersecurity.
The discussions will be moderated by 100 industry experts and top-tier solution providers.
CONTRIBUTORS
Insights from inspiring Keynotes and leading industry Experts.
Many More Power Players to Come
SEE ALL UNIQUE TOPICS
Round Table Discussion
Speaker: Giovanni Söderman
Vice President Global IT, Consilium Safety Group
As the Cyber Resilience Act (CRA) mandates organisations to bolster their cybersecurity frameworks, many are grappling with significant budget and resource constraints. The challenges of aligning with CRA requirements while operating under financial and personnel limitations needs to be discussed. Practical strategies need to take place for prioritising cybersecurity investments, optimising existing resources, and advocating for increased funding in an era where cyber threats are escalating.
- Balancing Compliance and Budget: Exploring cost-effective measures and prioritisation strategies to meet CRA requirements without overextending limited budgets.
- Resource Optimization: Identifying and leveraging existing tools, technologies, and human resources to maximise cybersecurity resilience despite staffing or technological shortages.
- Advocating for Cybersecurity Funding: Tactics for building a compelling case to stakeholders and leadership for increased investment in cybersecurity, focusing on the long-term risks of underfunding.
Speaker: Zsolt Fabian
Group Cybersecurity Lead, Byborg Enterprises
The digital landscape is evolving rapidly, and with it, the nature of cyber threats is becoming more sophisticated. As Artificial Intelligence (AI) continues to transform industries, it is also being harnessed by malicious actors to conduct more effective, intelligent, and automated cyber-attacks. These AI-powered attacks pose a significant challenge to organisations, as traditional security measures are often insufficient to detect and mitigate these advanced threats.We will delve into the growing trend of AI-driven cyber threats, explore the tactics used by attackers, and discuss how businesses can adopt AI-enhanced cybersecurity solutions to stay ahead of the curve.
- Understanding the AI Threat Landscape
- Why Traditional Cybersecurity Falls Short?
- Leveraging AI for Cyber Defense
Speaker: David Larsson
Deputy CISO, Aurobay Sweden
As we stand on the cusp of a new technological era, businesses must navigate a landscape that is constantly evolving. Emerging technologies like artificial intelligence (AI), blockchain, and the Internet of Things (IoT) are not just buzzwords; they are powerful tools that can drive innovation, streamline operations, and create new opportunities for growth. We will explore how companies can strategically leverage these technologies to stay competitive and foster sustainable growth. By understanding the impact and potential of these advancements, businesses can not only keep pace with change but also lead it.
- Unlocking the Power of AI and Machine Learning: How AI can transform business operations through automation, predictive analytics, and personalised customer experiences?
- Case studies of companies successfully implementing emerging technologies such as AI, Blockchain and IoT to improve decision-making and reduce costs.
- Best practices for integrating emerging tech into existing business models to drive innovation and efficiency.
Speaker: Smeden Svahn
CISO, Adda
As the Nordics experience a surge in phishing attacks targeting businesses and consumers, we must play a proactive role in safeguarding digital ecosystems. Cybercriminals are using increasingly sophisticated methods to exploit vulnerabilities, making it imperative for service providers, software vendors, and cybersecurity firms to enhance their defence strategies.
- Evolving Phishing Tactics in the Nordics
- Impact on Critical Sectors
- Countermeasures and Best Practices
Speaker: Linda Avad
CISO,OKQ8
In today’s interconnected and globalised world, the security of supply chains has become more critical than ever. Disruptions, ranging from cyberattacks to geopolitical tensions, have highlighted the vulnerabilities that can cripple businesses. We will explore the importance of supply chain resilience, focusing on how companies can fortify their end-to-end processes. By implementing advanced security measures, developing flexible risk management strategies, and leveraging technology, organisations can create robust and adaptive supply chains that withstand challenges and drive sustained growth.
- Integrating Cybersecurity in the Supply Chain
- Building Flexible and Agile Risk Management
- Collaborating with Partners for Holistic Security
Speaker: Jan Öhman
Information Security Evangelist (Former CISO of Elisa Polystar)
Neglecting cyber hygiene can lead to severe repercussions for individuals, businesses, and governments alike. As cyberattacks grow increasingly advanced, failing to follow basic cybersecurity protocols leaves systems vulnerable to avoidable threats. We must examine the root causes of poor cyber hygiene, its widespread effects, and the steps organisations can take to foster a stronger cybersecurity culture. Through real-world examples and practical strategies, we will highlight how to enhance security practices at every level of digital engagement.
- What Human Factors in Cybersecurity need to be scrutinised?
- Could you please share your best practices for Improving Cyber Hygiene?
- What are business and organisational risks associated with cyber hygiene?
Moderator will be announced soon!
In a world where cyber threats are evolving at an unprecedented pace, the traditional perimeter-based security models are no longer sufficient. Zero-Trust Architecture (ZTA) offers a transformative approach to modern security, shifting the focus from trusted networks to continuous verification of every user, device, and connection. How Zero-Trust is redefining the digital landscape, ensuring that security is embedded in every layer of access control, data exchange, and operational integrity? It’s a call for organisations to adopt a proactive defence mechanism in an increasingly borderless digital environment.
- Trust no one, verify everything: The shift from perimeter security. How does ZTA enforces the principle of “never trust, always verify,” ensuring each access request is authenticated and authorised regardless of location?
- How does Zero-Trust dynamically adapt to changing threat landscapes by constantly validating credentials and access points?
- Step-by-step guidance on implementing Zero-Trust across network infrastructure, including identity verification, least privilege access, and micro-segmentation.
Moderator will be announced soon!
As the global adoption of 5G technology accelerates, it promises faster speeds, reduced latency, and increased connectivity across industries. However, with these advancements come new cybersecurity challenges. The vulnerabilities inherent in 5G networks and discuss strategies for safeguarding the future of connectivity. By addressing these risks, we can ensure the secure deployment and operation of 5G, which is critical for supporting next-generation applications like autonomous vehicles, IoT, and smart cities.
- How 5G’s use of virtualization and network slicing opens new avenues for cyber threats?
- What are the risks associated with compromised software, hardware backdoors, and potential state-sponsored espionage?
- Mitigating Risks in IoT and Critical Infrastructure.
Speaker: Dimitrios Stergiou
Are you tired of dealing with misconfigurations in cloud infrastructure? Introducing the Innovator session!
Gain unparalleled insights from industry leaders who have revolutionised cloud security. Discover cutting-edge strategies and innovative solutions that will empower you to tackle challenges head-on.
Join the session and take control of your cloud security journey. Together, we can build a safer digital landscape.
Speaker: Sanjay Kumar
PhD, Cybersecurity | Threat Intelligence Manager, Landis+Gyr
In our increasingly connected world, cybersecurity is more important than ever. But too often, organisations and individuals become complacent after initial safeguards are in place. Cyber threats are constantly evolving, and so should our awareness and responses. We will dive into why cyber awareness must be an ongoing effort, not a one-time action, and how continuous vigilance can protect us from unseen dangers in the digital realm.
- “The Cyber Threat Never Sleeps”: Understand how cybercriminals continuously develop new tactics and why static defences won’t suffice.
- “Human Error: The #1 Cyber Vulnerability”: Learn why ongoing training and awareness are key to minimising the most common cybersecurity weakness—us.
- “Stay One Step Ahead”: Explore the latest trends in cybersecurity to understand why proactive measures and up-to-date security strategies are the foundation of long-term protection.
Speaker: Christian Hedström
CISO, QD Sverige
Cybersecurity is no longer just an IT issue—it’s a business imperative. However, a gap often exists between the technical insights of CISOs and the strategic priorities of the management board. We will explore how organisations can build stronger bridges of communication and collaboration between these two crucial groups. By fostering mutual understanding, businesses can not only enhance their cyber resilience but also turn cybersecurity into a competitive advantage.
- Speak the Same Language: Translating Tech to Business Impact
- Cybersecurity as a Strategic Asset: Making Cyber a Boardroom Priority
- Bridging the Cultural Divide: Building Trust Between CISOs and Executives
Speaker: Anders Jared
CISO, Bravida
As the EU prepares to enforce its groundbreaking AI regulations, industries across the globe are left grappling with what compliance means in practice. The new EU AI Act sets ambitious standards for AI systems, aiming to balance innovation with ethical oversight.Let’s dive into the implications of these regulations, exploring how businesses can adapt, what loopholes still exist, and whether this new legal framework will truly tame the AI revolution or leave it in chaos.
- What are the key compliance challenges, and how can organisations ensure they align with these new rules while fostering innovation?
- Will the AI Act stifle creativity, or does it create new opportunities for ethical AI development?
- How will this regulation impact global AI development and adoption, and what does it mean for non-EU companies looking to do business in Europe?
Speaker: Nithin Krishna
Head of Cyber Security, Jeppesen
While the advantages and drawbacks of Zero Trust solutions have been widely debated, the greatest challenge lies in shifting the mindset of users. Educating individuals on adopting the Zero Trust approach is far more crucial than merely deploying the technology itself. The success of Zero Trust strategies hinges on effectively translating the concept into tangible business value.
- The Future of Zero Trust with Advanced Technologies and AI: As technology evolves, particularly with advancements in artificial intelligence, the Zero Trust framework will continue to evolve. AI will play a pivotal role in enhancing security through dynamic, real-time verification processes, automating threat detection, and responding to potential risks in a smarter, more adaptive manner.
- What Does “Always Verify, Never Trust” Mean? At the core of Zero Trust is the principle that no entity, whether inside or outside the network, should ever be trusted by default. Every access attempt must be continuously verified. This proactive stance ensures that the network remains secure, requiring constant authentication and validation of users, devices, and data before granting access.
- Zero Trust in the Cybersecurity Landscape: In cybersecurity, the Zero Trust model marks a paradigm shift from traditional perimeter-based defences. Instead of assuming that entities within the network are safe, Zero Trust operates under the assumption that threats can exist both inside and outside. This approach minimises risk by enforcing strict access controls, continuous monitoring, and verification at every step, ensuring a more resilient and secure environment.
Speaker: Lars Ponten
Cybersecurity Evangelist
In the age of artificial intelligence, businesses and individuals are more connected—and more vulnerable—than ever before. While AI offers groundbreaking innovations, it also opens the door to new cyber threats. As technology evolves, so must our cybersecurity practices. How good cyber hygiene and compliance protocols are essential for safeguarding sensitive data, maintaining trust, and staying ahead of evolving threats? Join us to discover how combining traditional cybersecurity measures with AI-driven solutions can create an unbreakable digital fortress.
- “Smart Defences for Smart Attacks”: Learn how AI is transforming both sides of the cybersecurity landscape—making attackers more sophisticated and defences more dynamic. Understand the importance of proactive cyber hygiene practices to stay one step ahead of AI-powered threats.
- “Compliance in the Age of Automation”: Explore the evolving regulatory landscape, from GDPR to CCPA, and how businesses must adapt compliance measures to meet the challenges of automated data processing and AI integration.
- “AI + Human Vigilance = A Clean, Safe Digital Space”: Discover why AI alone is not a silver bullet and how fostering a culture of cyber hygiene—where human vigilance complements AI-driven defences—is key to long-term cybersecurity success.
Speaker: Prof. Shahid Raza
Professor of Cybersecurity, University of Glasgow, UK
As we race into the 2025 and beyond, the next generation of communication, 6G, promises to natively integrate terrestrial networks with non-terrestrial networks, namely satellite, drones, planes, in addition to promising revolutionary advancements in speed and connectivity. However, this rapid evolution can bring a new set of vulnerabilities that could jeopardise our digital infrastructure. Join us as we dive into the emerging risks and strategies to safeguard our hyper-connected future. Explore the novel attack vectors and security challenges unique to 6G technology.
- Explore the novel attack vectors and security challenges unique to 6G technology.
- Analyse case studies and potential consequences of 5G network breaches on businesses and everyday life.
- Learn about cutting-edge security measures and proactive strategies being developed to protect the 6G ecosystem from future threats.
Moderator will be announced soon!
In this riveting session, we dive into the high-stakes world of ransomware attacks that have rocked Europe. From multi-million-dollar ransom demands to critical infrastructure disruptions, this case study sheds light on how various European countries have been fighting back against these relentless cyber threats. Discover the strategies, lessons learned, and innovative solutions that are shaping Europe’s cybersecurity landscape.
- The Ransomware Rising: A European overview
- Strengthening the frontlines: Europe’s defence strategies
- Lessons from the Battlefield: Building a resilient future.
Speaker: Daniela Lourenço
CISO, Tinka
Phishing simulations are crucial for maintaining a security edge. Currently, phishing your own users is just as vital as implementing cutting-edge cybersecurity solutions. Without training your team to remain vigilant, how can you ensure protection against phishing attacks?
- The increase of phishing attacks due to advanced technologies.
- Strategies for conducting sophisticated awareness programs for users.
- Methods for staying ahead of emerging threats.
Speaker: Annika Wägenbauer
Cybersecurity Evangelist
In an era where cyber threats are evolving at an unprecedented rate, it’s crucial to stay ahead of the curve. Join us as we delve into the latest innovations in cybersecurity that are set to revolutionise the way we protect our digital realms. From AI-driven threat detection to quantum encryption, this will showcase how emerging technologies are shaping the future of cyber defence.
- AI Revolution: Explore how artificial intelligence is revolutionising industries from healthcare to entertainment, and what ethical considerations come with its rapid advancement.
- Quantum Leap: Get a glimpse into the world of quantum computing, where the limits of classical computing are challenged, and see how this technology might solve complex problems faster than ever before.
- Sustainable Tech: Discover the latest in green technologies and sustainable practices, and learn how emerging innovations are working towards a more eco-friendly and energy-efficient future.
Speaker: Rudy Dordonne
CISO, Dustin
As we approach the new year, the supply chain industry is set to undergo transformative changes driven by cutting-edge technologies. Innovations on the horizon are poised to redefine efficiency, transparency, and agility within supply chains. From AI-powered logistics to blockchain’s promise of security and automation revolution, discover how these emerging technologies will shape the future of supply chain management in 2025 and beyond.
- Dive into how artificial intelligence and machine learning are enhancing predictive analytics, optimising routes, and personalising supply chain strategies to meet evolving market demands with greater precision.
- Explore how blockchain technology is set to revolutionise supply chain visibility and trust, enabling real-time tracking, reducing fraud, and ensuring authenticity from origin to end-user.
- Join us as we surf the tech wave into the future of supply chains and prepare to navigate the exciting developments on the horizon!
Moderator will be announced soon!
Organisations across various industries have embraced cloud computing to simplify their operations and enjoy its technological benefits. However, this transition is not without its challenges. In fact, it introduces significant concerns, as companies struggle to safeguard their cloud environments from prevalent security threats. Issues such as limited visibility and control over cloud infrastructure, unauthorised access, and external data sharing pose ongoing difficulties.
- Cloud Security Threats: 2025 and Beyond
- Regulatory Compliance: Is It Beneficial for Cloud Security?
- Strategies for Protecting Your Cloud Environment
Moderator will be announced soon!
As artificial intelligence continues to evolve and integrate into various sectors, its potential to revolutionise cybersecurity is accompanied by new and unprecedented threats. We will explore the dark side of AI, revealing how malicious actors are harnessing its power to orchestrate sophisticated cyber attacks. Attendees will gain insights into the emerging trends in AI-driven cyber threats, understand the vulnerabilities that are being exploited, and learn proactive strategies to defend against this high-tech menace.
- The Rise of AI-Powered Cyber Weapons: Uncover how AI is being used to automate and enhance cyber attacks, from deepfakes to autonomous hacking tools.
- Identifying Vulnerabilities in the Age of AI: Learn about the new security challenges posed by AI and how traditional defences are being outpaced by smart, adaptive threats.
- Strategies for Resilience and Defense: Discover cutting-edge techniques and best practices for leveraging AI in your own cybersecurity efforts to stay one step ahead of the attackers.
Speaker: Martin Finnerman
CISO, Riksbyggen
While ransomware may no longer dominate the news, it continues to wreak havoc on organisations worldwide. Only a small percentage of victims manage to recover their data without paying a ransom. Alarmingly, many that do pay still fail to regain access to their information. What steps can be taken to avoid this cyber nightmare?
- The significance of ransomware threat assessments.
- Advanced AI tools that enhance ransomware detection and prevention.
- Can sharing best practices reduce ransomware attacks? How can organisations be motivated to share their experiences for the greater good?
Speaker: Nicola Sotira
Head of CERT, Poste Italiane
Quantum computing is no longer science fiction—it’s fast becoming a revolutionary technology with the potential to reshape industries, crack previously unsolvable problems, and drive innovation. But with great power comes great responsibility. While quantum computers promise breakthroughs in fields like medicine, finance, and artificial intelligence, they also pose existential risks to cybersecurity and could widen the digital divide. In this session, we will explore the promise and peril of quantum computing, and whether it will lead us to a brighter future or usher in unforeseen challenges. Is it the blessing we’ve been waiting for, or could it become a curse in disguise?
- The quantum leap: Breakthroughs and opportunities
Quantum computing’s immense power can revolutionise sectors such as drug discovery, climate modelling, and artificial intelligence by solving complex problems that today’s supercomputers struggle with.
- Security: Savior or Saboteur?
While quantum computers could improve cryptography and enhance security systems, they also threaten to break the encryption methods that protect global financial systems, military secrets, and personal data.
- Widening the Tech Gap: Who Wins, Who Loses?
As quantum technology matures, the digital divide between countries and corporations may widen. Those who can harness its power will gain immense advantages, leaving others behind and potentially reshaping the geopolitical landscape.
Moderator will be announced soon!
Ransomware attacks have rapidly evolved into one of the most severe and pervasive cybersecurity threats, targeting businesses, governments, and individuals alike. The sophistication of these attacks has escalated, often resulting in catastrophic financial and operational impacts. The current state of ransomware, exploring recent high-profile cases, emerging trends, and the critical strategies needed to defend against this growing menace and business processes. How can this journey can and should be planned, which steps to take first and best practices in establishing a cybersecurity culture?
- The Rise of Double and Triple Extortion Tactics
- The Role of Ransomware-as-a-Service (RaaS)
- Strategies for Building Resilience and Response
Speaker: Martin Vallee
CISO,CSO & Head od DevOps, Eyeonid
As more organisations migrate to cloud-based environments, they find themselves facing a new set of cybersecurity challenges. While the cloud promises scalability, flexibility, and cost savings, it also brings its own stormy skies. The biggest cybersecurity challenges cloud users face today: Cloud Compliance, Lack of Skills, Identity and Access Management (IAM), and Shadow IT. Join our experts as they discuss these pressing issues and provide actionable insights on how to secure your cloud journey and weather any cybersecurity storm that comes your way.
- Cloud Compliance
- Lack of Skills
- Identity and Access Management (IAM)
- Shadow IT
Moderator will be announced soon!
A major challenge many businesses face in cloud environments is the limited control and visibility over their systems and data. It’s essential to maintain full oversight of your cloud infrastructure to ensure data security and smooth operations. Without proper control and visibility, your organisation becomes vulnerable to data breaches, leaks, or even encryption attacks.
Thankfully, there are security solutions available to help mitigate these risks.
Speaker: Shahmeer Amir
Ethical Hacker
As we transition into the 5G era, the enhanced speed and widespread availability bring unprecedented opportunities but also broaden the attack surface for cyber threats. However, solutions are available to secure and monitor 5G network traffic, safeguarding against unauthorised access and data breaches.
Moderator will be announced soon!
Join our exclusive session on Supply Chain Attacks, tailored for professionals looking to deepen their knowledge of software supply chain vulnerabilities. Explore the complexities of these threats and learn strategies to protect your organisation from the risks posed by malicious actors. Gain valuable insights into identifying weaknesses within your supply chain and strengthening your defences to prevent breaches that could endanger critical systems and sensitive data. Don’t miss this opportunity to enhance your expertise and secure your digital assets.
Speaker: Sebastian Rosendahl
CISO, Consilium Safety Group
Are you ready for the next wave of ransomware attacks? Join us for an eye-opening session that uncovers the dark progression of triple extortion. Imagine this: hackers breach a system, unleashing ransomware, but they don’t stop there. Before encrypting the data and locking out the victim, they steal sensitive information. Then, they push the extortion further by threatening the victim’s business partners and associates with a data leak, aiming to extract even more money. In this session, you’ll gain the tools and insights to defend your organisation against this escalating threat and protect your critical data from malicious attacks.
Speaker: Thomas Evertsson
Head of IT, Swedish Film Institute
As artificial intelligence transforms industries and powers innovation, it also opens the door to unforeseen threats. The same algorithms that drive progress can be weaponized for malicious purposes, making it essential for businesses and individuals to understand and address the risks. This presentation will highlight the growing dangers of AI-related threats, from data manipulation to deep fakes, and explore how to stay ahead of these evolving challenges.
- Deep fake Deception
- AI-Driven Cyber Attacks
- Ethical AI Dilemmas
Speaker: Teresia Willstedt
CISO, MedMera Bank
In today’s digital landscape, phishing attacks are more common than ever, often disguised as legitimate communications. This presentation will unravel the mysteries behind these deceptive schemes, helping you spot the fakes and protect your valuable information. Join us for a deep dive into the world of phishing and learn how to defend yourself from these cunning cyber threats.
- Spotting the Hook
- Reeling in the Scammers
- Safety Net Strategies
Speaker: Tom Kjoelhamar
Maintaining robust cyber hygiene is not just a recommendation—it’s a necessity. Poor cyber hygiene can expose individuals and organisations to a range of threats, from data breaches to ransomware attacks. We shall delve into the hidden risks associated with inadequate cyber practices and offer actionable insights to enhance your digital security posture. By understanding and addressing these vulnerabilities, you can safeguard your information and maintain a secure online environment.
- Unseen Threats
- Costly Consequences
- Proactive Measures
Speaker: Nuno Martins da Silveira Teodoro
ex-Global Fortune 500 CISO, Solaris Group
Digital landscape, traditional security models are no longer sufficient to protect against sophisticated cyber threats. Enter Zero-Trust Security—a groundbreaking approach that operates on the principle of never trusting, always verifying. This presentation will explore how Zero-Trust can revolutionise your security strategy, providing a robust framework that anticipates and mitigates threats before they can compromise your systems.
- Uncompromising Security
- Enhanced Risk Management
- Seamless Integration
Moderator will be announced soon!
This presentation will explore how emerging technologies are reshaping the security landscape, presenting both new opportunities and challenges. We’ll delve into the latest advancements, from AI-driven security measures to quantum encryption, and discuss their implications for safeguarding digital assets. Discover how these innovations are revolutionising the way we protect our information and what steps you can take to stay ahead of cyber threats.
- AI and Machine Learning in Cyber Defense
- Quantum Encryption: The Future of Secure Communication
- The rise of decentralised security
Speaker: Dag Friden
Chief Information Security Officer, Aros Kapital
- Evolving Threats: Cyber threats are constantly changing. Staying updated on the latest risks ensures your defences remain effective and your data stays protected.
- Ongoing Education: Regular training keeps your team informed about best practices, empowering them to recognize and respond to potential threats swiftly.
- Adaptive Strategies: Continuous awareness helps in refining security policies and practices, ensuring they adapt to new vulnerabilities and attack vectors.
Speaker: Anupama Jaiswal
Information Security Specialist, Truecaller
- Understanding the Threat Landscape: Learn about the increasing risks associated with third-party vendors and partners, including data breaches and cyber-attacks, and how they can impact your organisation.
- Effective Risk Management Strategies: Discover actionable strategies to assess and mitigate third-party risks, from due diligence to continuous monitoring, ensuring your cybersecurity measures extend beyond your direct control.
- Building Resilient Partnerships: Gain insights on fostering secure and trustworthy relationships with third parties, including best practices for contracts, compliance, and regular audits to fortify your overall cybersecurity posture.
Speaker: Thomas Dahlbeck
Cybersecurity manager, Scania
- Unseen Risks: Learn how insider threats can quietly compromise your data and systems from within, often without detection until it’s too late.
- Detection and Prevention: Explore cutting-edge techniques and tools designed to identify suspicious behaviour early and prevent potential breaches.
- Real-World Case Studies: Discover lessons from recent insider threat incidents and how businesses like yours can bolster defences against these internal risks.
Speaker: Thea Sogenbits
CISO, Estonian Tax and Customs Board
- Targeted Precision: Explore how state-sponsored attacks are strategically designed to exploit specific vulnerabilities in national infrastructure, corporate systems, and critical technologies.
- Advanced Techniques: Discover the cutting-edge methods employed by nation-states to conduct cyber espionage, from sophisticated malware to zero-day exploits.
- Global Implications: Understand the far-reaching consequences of state-sponsored cyberattacks, including geopolitical tensions, economic impact, and the need for international
Moderator will be announced soon!
- Phishing Phantoms: Learn how attackers use deceptive emails and websites to steal your confidential information. Spot the red flags before they hook you!
- Pretexting Perils: Discover how cybercriminals craft convincing stories to manipulate you into revealing personal details or giving away access. Stay one step ahead with our insider tips!
- Baiting Blunders: Understand the tactics behind fake offers or tempting downloads designed to lure you into compromising your security. Guard against these traps with our expert advice!
Moderator will be announced soon!
In today’s interconnected economy, technology-driven supply chains enable the seamless flow of goods across borders. However, this reliance on digital systems also exposes these global networks to significant risks from cybercriminals and other malicious actors. To safeguard uninterrupted operations, implementing comprehensive, end-to-end security measures is no longer optional but essential.
- Cyber Vulnerabilities: Increasing dependence on technology makes supply chains prime targets for cyberattacks, threatening disruptions in critical sectors.
- Need for Comprehensive Security: Robust, multi-layered defences are crucial to detect, prevent, and respond to potential cyber threats throughout the supply chain.
- Impact on Global Economies: Disruptions in supply chains due to cyber incidents can have ripple effects, impacting global trade and economic stability.
Delve into our detailed agenda
Agenda
Short text as intructions. Please arrive early to secure your spot and ensure you don’t miss any important opening remarks.
Jelena Zelenović Matone, Senior Head, CISO, European Investment Bank
Mario Beccia, CISO, NATO
content
Deepak Subramanian, Chief Information Security Officer, Energy One Limited
Nicola Sotira, Head of CERT, Poste Italiane
David Jacoby, Ethical Hacker
Satisfied Delegates
Join us as we navigate the future of cybersecurity together.