Close

CONGRESS OVERVIEW

Barcelona Cybersecurity Congress 2025 is a platform for leading cybersecurity innovation. Our thoughtfully designed tracks examine how critical advancements in cybersecurity are shaping industries globally. From business introductions to cybersecurity investment strategies to protecting supply chains, immerse yourself in the trends that define the future of cybersecurity.

WHAT'S COMING UP AT THE CONGRESS

Ideas to lead the future​

Fostering Innovation

BUSSINES INTRODUCTION TO CYBERSECURITY

BOOST YOUR CYBERSECURITY INVESTMENT

Investment in cybersecurity is essential for business success in 2025. But are companies seeing a return on their investment? Let the experts refine your strategy, set realistic goals, and define a clear value case for your cybersecurity efforts.

Session Topics:

Many cybersecurity initiatives stumble not due to technology, but strategy. Set clear, measurable goals to transform your approach and ensure your organization is prepared for future threats.

Embrace the promise of a sustainable cybersecurity framework. Enhance efficiency and reduce environmental impact while safeguarding your digital assets. Discover how sustainability and cybersecurity go hand in hand.

Transform big data into your greatest ally against cyber threats. Learn how effective data utilization boosts threat detection, enhances responses, and fortifies your cybersecurity posture.

Leverage the power of artificial intelligence in cybersecurity. Explore innovative AI applications that deliver significant returns, streamline processes, and elevate your defense strategies.

LEVERAGE EMERGING TECHNOLOGIES

Emerging technologies allow for a deeper understanding of persistent challenges in cybersecurity. Knowing the problem you’re trying to solve is the first step to leveraging automated solutions that deliver data in a form that can improve security processes and operations.

Session Topics:

Unlock the power of cyber intelligence to stay ahead of threats. Learn how proactive threat intelligence can identify vulnerabilities, inform security strategies, and enhance your organization’s defenses against evolving cyber risks.

Harness the potential of machine learning to revolutionize cybersecurity. Discover how machine learning algorithms can analyze vast amounts of data, detect anomalies, and improve threat detection and response times, making your systems more resilient.

Navigating the complex landscape of cybersecurity standards and regulations is crucial for compliance and security. Understand the latest frameworks, best practices, and how to align your security policies with regulatory requirements to protect your organization effectively.

Safeguard your sensitive information with robust data protection strategies. Explore the essential practices for data encryption, access controls, and incident response plans to ensure the integrity and confidentiality of your data in an increasingly digital world.

Advancing Technology

ADVANCING TECHNOLOGY IN CYBERSECURITY

Driving Digital Resilience

PROTECTING THE SUPPLY CHAIN

ENSURE SECURE CONNECTIVITY

Cybersecurity is essential in remote operations. Secure connectivity and communication are crucial for autonomous systems and remote operators to utilize real-time data for decision-making. Discover how these advanced technologies are driving the digital economy and developing new business strategies in an interconnected world.

Session Topics:

Explore the critical role of cybersecurity in autonomous vehicles. As these vehicles become more prevalent, understanding their vulnerabilities and implementing robust security measures is essential to protect data, ensure safety, and maintain public trust.

Establishing secure connectivity is fundamental for modern digital infrastructures. Learn how to implement secure communication protocols, protect data in transit, and create resilient networks that safeguard your organization against cyber threats.

Remote operations present unique cybersecurity challenges. Discover effective strategies for securing remote systems, ensuring data integrity, and maintaining operational continuity in environments where physical access is limited or impossible.

The collaboration between public and private sectors is vital for a robust cybersecurity framework. Understand how partnerships can enhance threat intelligence sharing, improve incident response, and create a unified front against cyber threats in an interconnected world.

WHY ATTEND?

Stay ahead of the curve with cutting-edge insights from industry leaders and get actionable strategies to enhance your cybersecurity framework.

TRACKS

Robust Security Measures

A robust cybersecurity program helps
business to control their network resources and systems. Discover the power of these indispensable cybersecurity elements,known as the 5 Cs: change, compliance,cost, continuity, and coverage. Being able to proactively develop robust security
measures ahead of threat actors is
paramount to protecting the security and privacy of your business’ data and your customers’ data.

Take aways: 

 

• How does every member of an organization embracing attitudes and beliefs drive secure behaviors when it comes to safeguarding their companies? 

• What impact does generational tech gaps have on cybersecurity? 

• How do we ensure critical assets are protected first and at all levels of employees? 

• How can we anticipate changes in AI based on the development and implementation history in cybersecurity?

Threat Intelligence and Monitoring

Some analysts say ransomware costs worldwide could rise to $265 billion by 2031. These are all serious threats and risks that can affect the business continuity, financial stability, and reputations of all kinds of organizations. Threat intelligence monitoring is an organization’s ability to observe and understand various threats to its IT operations and confidential data in the company’s possession. This includes monitoring external threats to your business and can help with decisions on how to develop the best security measures. 

Take aways: 

 

• Is Quantum Computing the new Y2K?

 • What is the importance of Understanding Crypto BoMs? 

• How have AI powered solutions and machine learning changed cybersecurity? 

• How robust is your cloud security?

Employee training and awareness

Get your team motivated to take on a world of threats in cybersecurity. Cybersecurity readiness means being able to detect and effectively respond to computer security breaches and intrusions, malware attacks, phishing attacks, theft of data and intellectual property from both outside and inside the network. It is established by teaching all levels of employees within the business that cyber threats are everyone’s problem so everyone has to be ready to deal with them.

Take aways: 

 

• How can we utilize AI powered threat detection to get ahead? 

•What potential issues do encryption algorithms present in 5G Connectivity? 

• How do we stay ahead of threat actors and stay on top of incidence response?

Compliance Management Solutions

Strategize to remain ahead of regulatory compliance by having a solid plan in place to deal with oversight, complaints and compliance for cybersecurity. Ensure you have appropriate safeguards, policies, and agreements in place to maintain solid relationships and keep high customer ratings.

Take aways: 

 

• How is Secure by Design not just a vendor problem? 

• How can you develop smarter planning solutions with critical assets monitoring? 

• What are the impacts of the 62443 series on the supply chain and how could that impact my compliance management solutions?

Data Governance and Privacy

Data sharing and collaboration expose your data to potential threats, such as unauthorized access, misuse, theft, or loss. It is important to protect the security and privacy of your business’ data and your customers’ data and ensure you have the appropriate safeguards, policies, and agreements in place. 

Take aways: 

 

• What are the impacts of new technology on data governance and privacy? 

• Does law enforcement have any new tool kits to assist with cyber attacks? 

• How can international correlation assist us in governance practices?

Regulatory Technology

Software applications have the ability to help with compliance management and data governance. Learn about specific examples of where regulatory technology has assisted and what the potentials for ROI are in implementing. 

Take aways: 

 

• What are safe practices for sharing large quantities of data with other communities? 

• What new cyber regulations and certifications will impact your business? 

• How can blockchain be used in your field to assist with data integrity?

VERTICAL INDUSTRIES

Manufacturing

Energy & Utilities

Healthcare

Business

Program
direction

Industry Journeys

Healthcare

This session looks at issues related to patient date, device data, and medical records. Who owns the data? Who has access to it? How long is it kept? How is it shared? And, importantly, how is the data secured? With the growth in Biometric data and web-enabled medical devices security and privacy issues have emerged. How do GDPR and regulatory frameworks affect the collection and storage of this data? What happens to the patient if this data is compromised by a cybersecurity breach or ransomware attack?

Supply Chain & SBoM

The Supply Chain topic has become such a critical issue it will take up a full day of our conference. The discussion will center around both the Software Bill of Materials (SBoM) and the Hardware Bill of Materials (HBoM). Companies are finding it increasingly difficult to know just what software is used in the products they buy. Attacks on supply chain can be subtle. Small changes that may go unnoticed can, over time, create huge supply chain issues (quality control, availability). Such small changes can be difficult to detect.

Energy & Utilities

Under the shadow of the war in the Ukraine and subsequent disruption of the European gas supply, this session will examine the regulatory perspective on standards, best practices, and base-line control systems. What are the security risks and compatibility issues unique to legacy power systems? How can these facilities be safely integrated with new green-field operations?

IACS Controls

This area of the program will focus on Industrial Automation and Control Systems (IACS). This topic touches on key areas of cybersecurity risk, including Cloud, IIoT, and Critical Infrastructure. These important topics will be explored through a variety of end-user case studies and a possible panel discussion.

EXHIBIT

Discover the different types of participation in #BCC24