Close

FIRST SPEAKERS ANNOUNCED 2025!

Discover the first speakers announced and sessions for the 2025 edition!

SPEAKERS ANNOUNCED

Rafa López

Cybersecurity Lecturer - MIÓLNIR

We will review the current global situation regarding cyberscams and how cybercriminals deceive us to steal money. During this journey, we will explore the Booking Scam, examining the entire process they follow before delivering the final threat to their victiims.

Juan Carlos Galindo

Partner Director - GALINDO BENLLOCH

This talk will unravel the destination of money obtained through cyber scams, highlighting that these scams would not exist if fraudsters did not use bank account numbers to move and launder funds. It will analyze how money flows through networks of “bank mules”, tax havens and the global financial system, exposing the role of the actors who, by omission or dereliction of duty, allow these illicit activities to flourish. It will also discuss the failures in banking regulation and the ethical and legal consequences of a system that indirectly facilitates these operations.

Rafa López

Cybersecurity Lecturer

European EU-HybNET Project: Cluster of Insitutions for Common Knowledge against Hybrid Threats  

José L. Diego Orozco

Head, Innovation and Project Management Division - Valencia Local Police

European EU-HybNET Project: Cluster of Insitutions for Common Knowledge against Hybrid Threats  

David Dickson

Senior Managing Director- Accenture

Quantum Computing and Understanding Crypto BoMs

Peter Jackson

Engineering Manager- SGS ECL

International Correlation in Cybersecurity

Selva Orejón

IT Security & Compliance Senior Specialist-Nestlé

Security for AI in Nestlé & Leveraging Machine Learning for Brand Protection

Daniel Voicu

Product Manager - Cloudflare

Detecting Zero-Days Before Zero-Day 

Marc Rivero Lopez

Lead Security Researcher-Kaspersky

Securing the Perimeter: A Deep Dive into Attack Surfaces, Ransomware Threats, and Insurance issues

Keyla Rosas

IT Security & Compliance Senior Specialist-Nestlé

Security for AI in Nestlé & Leveraging Machine Learning for Brand Protection

Andreu Sancho

Cyber Security Senior Specialist-Data Scientist- Nestlé

Security for AI in Nestlé & Leveraging Machine Learning for Brand Protection

Daniel Molteni

Product Manager - Cloudflare

Detecting Zero-Days Before Zero-Day 

Francisco Luís de Andrés

Global Siso- IridusRisk

Panel Discussion: International Correlation in Cybersecurity

Majed Al-Salamah

Cybersecurity Leader - Aramco

Panel Discussion: International Correlation in Cybersecurity

Tomàs Roy

Director- Cybersecurity Agency of Catalonia

Regional Approach for Employee Readiness for Cybersecurity

Stefano Cimicelli

Managing Director, Security EMEA - Accenture

ChatGPT Backup Using AI to Combat Threats

Maria Manuela Catarina

Deputy Director Under Secretary of State- National Cybersecurity Directorate

Employee Training and Awareness

Vasileios Mingos

European Operations Director - Health-ISAC

Info Sharing – Where Do I Start and How Do I Get the Approval to Do This?

Matteo Lucchetti

Director- Cyber 4.0 Cybersecurity Competence Center

Fireside Chat: 4 Motors of Europe (Regional Approach to Cybersecurity)

Steven Mustard

CEO and President- National Automation Inc

Employee Training and Awareness

“Educating employees about cybersecurity best practices and fostering a culture of security to mitigate human-related risks.”

Tom Liston

CEO- Bad Wolf Security

Confessions of a dirty Hacker

“How bad the current security landscape actually is.”

Head, Innovation and Project Management Division - Valencia Local Police

European EU-HybNET Project: Cluster of Insitutions for Common Knowledge against Hybrid Threats  

Head, Innovation and Project Management Division - Valencia Local Police

European EU-HybNET Project: Cluster of Insitutions for Common Knowledge against Hybrid Threats  

Allan Friedman

Senior Advisor and Strategist

Critical importance of SBoM

#JOURNEY: SUPPLY CHAIN 1

Andrew Martin

Professor of Systems Security

Cybersecurity and IoT – The worst of both worlds Securing Network Design by Design

The importance of the network context, what issues we see and how we can overcome some of those challenges with collaboration and new forms of technology.

#JOURNEY: CYBERSECURITY, IOT

Pepa Sedó

E&F Programmes Director

“Don’t Panic. You’re already doing most of this.”

On this panel, Pepa Sedó will explore supply chain security (both hardware and software), with a focus on past, present and future solutions to address a quickly evolving threat landscape.

#JOURNEY: SUPPLY CHAIN

Goran Novkovic

Head of Industrial Cybersecurity
Driving Cyber-Operational Intelligence with Digital Twins Solution Implementation

Operation is critical part of every Business whereas Industrial Cybersecurity is critical part of every Operation. Mission of Industrial Cybersecurity Practice is to protect the Operation. To deliver it, we must achieve and maintain OT-IoT Visibility that is required to design, tailor and implement Industrial Cybersecurity Solutions for the organizations. The presentation offers a practical approach to providing OT-IoT Visibility empowered by Digital Twins and advanced technologies (ML, AI) that transfer real-time data into cyber-operational intelligence to drive objective business decisions.

#JOURNEY: ENERGY AND UTILITIES

Mohamed Sohail

Cyber Security Advisory Consultant

A new method for a versatile sensitive IoT data handling

The Internet of Things is driving numerous innovations and transformations, which come with challenges and risks. The security and safety of data represent one of the top concerns. This use case rethinks the veracity and analytics of IoT data handling based on its sensitivity in the context of IoT tiering and classification. The Use case will discuss – Homogenous Security for all IoT Analytics – Data Classification Security Granularity. – Provide Heterogeneity for Secure-Based Analytics. – Data Classification and Mapping at the Gateway.

#JOURNEY: CYBERSECURITY, IOT

José Luis Diego

Head of European Projects Division

Cybersecurity in Europe - A police research perspective: CC-DRIVER and RAYUELA projects

The aim is to explain how the European Commission is fostering European research on cybersecurity to enhance the security of its citizens by means of Horizon Europe funding schemes. Besides a general approach explaining the European view and methodology to face cybercriminality, it will be addressed how we work on it from a R&D on security perspective, as an experienced end-user, with more than 30 EU funded projects since 2005. On the other hand, it will be discussed new methods to prevent, investigate, and mitigate cybercriminal behaviour, with a particular focus on young cybercriminality, directly involving police forces in this task.

#JOURNEY: SUPPLY CHAINHIGH PROFILE CASE STUDIES

Sarb Sembhi

CTO

The talk will cover the adoption of IoT within the smart built environment, the cybersecurity challenges it brings and how we address the knowledge/skills gaps.

#JOURNEY: IoT

Josema Cavanillas

VP - Head of Health & Life Sciences Sales for South & Eastern Europe

Data Issues: Patient Data, Device Data; Who owns the data? Who has access to it? How long is it kept? How is it shared? How is it secured? How is Biometric data viewed?

#JOURNEY: HEALTHCARE

Franky Thrasher

Manager Nuclear Cybersecurity

Supply Chain Security Overview: Where are we? How did we get here? What comes next?

#JOURNEY: SUPPLY CHAIN

Geir Arilb Engh-Hellesvik

Chief Information Security Officer

Supply Chain Security Overview: Where are we? How did we get here? What comes next?

#JOURNEY: SUPPLY CHAIN

Jesus Sanchez

Global CISO

Panel: Energy and Utility Risks

#JOURNEY: ENERGY AND UTILITIES

Josema Cavanillas

VP - Head of Health & Life Sciences Sales for South & Eastern Europe

Data Issues: Patient Data, Device Data; Who owns the data? Who has access to it? How long is it kept? How is it shared? How is it secured? How is Biometric data viewed?

#JOURNEY: HEALTHCARE

Franky Thrasher

Manager Nuclear Cybersecurity

To be announced…

#JOURNEY: SUPPLY CHAIN

Geir Arilb Engh-Hellesvik

Chief Information Security Officer

To be announced…

#JOURNEY: SUPPLY CHAIN

Pepa Sedó

E&F Programmes Director

To be announced…

Sarb Sembhi

CTO

The talk will cover the adoption of IoT within the smart built environment, the cybersecurity challenges it brings and how we address the knowledge/skills gaps.

#JOURNEY: IoT

Allan Friedman

Importance of SBoM

Criticle importance of SBoM.

#JOURNEY: To be confirmed

Andrew Martin

Professor of Systems Security

Cybersecurity and IoT: The worst of both worlds Security Network by Design.

#JOURNEY: CYBERSECURITY, IoT

Jesus Sanchez

Global CISO

Energy and Utility Risks.

#JOURNEY: ENERGY & UTILITIES

Felix Barrio

General Manager

Energy and Utility Risks.

#JOURNEY: ENERGY & UTILITIES

Andrew Martin

Professor of Systems Security

Cybersecurity and IoT: The worst of both worlds Security Network by Design.

#JOURNEY: CYBERSECURITY, IoT

Sarb Sembhi

CTO

The talk will cover the adoption of IoT within the smart built environment, the cybersecurity challenges it brings and how we address the knowledge/skills gaps.

#JOURNEY: IoT

Jesus Sanchez

Global CISO

Energy and Utility Risks.

#JOURNEY: ENERGY & UTILITIES