FIRST SPEAKERS ANNOUNCED 2025!
Discover the first speakers announced and sessions for the 2025 edition!
SPEAKERS ANNOUNCED
Rafa López
Cybersecurity Lecturer - MIÓLNIR
We will review the current global situation regarding cyberscams and how cybercriminals deceive us to steal money. During this journey, we will explore the Booking Scam, examining the entire process they follow before delivering the final threat to their victiims.
Juan Carlos Galindo
Partner Director - GALINDO BENLLOCH
This talk will unravel the destination of money obtained through cyber scams, highlighting that these scams would not exist if fraudsters did not use bank account numbers to move and launder funds. It will analyze how money flows through networks of “bank mules”, tax havens and the global financial system, exposing the role of the actors who, by omission or dereliction of duty, allow these illicit activities to flourish. It will also discuss the failures in banking regulation and the ethical and legal consequences of a system that indirectly facilitates these operations.
Rafa López
Cybersecurity Lecturer
European EU-HybNET Project: Cluster of Insitutions for Common Knowledge against Hybrid Threats
José L. Diego Orozco
Head, Innovation and Project Management Division - Valencia Local Police
European EU-HybNET Project: Cluster of Insitutions for Common Knowledge against Hybrid Threats
David Dickson
Senior Managing Director- Accenture
Quantum Computing and Understanding Crypto BoMs
Peter Jackson
Engineering Manager- SGS ECL
International Correlation in Cybersecurity
Selva Orejón
IT Security & Compliance Senior Specialist-Nestlé
Security for AI in Nestlé & Leveraging Machine Learning for Brand Protection
Daniel Voicu
Product Manager - Cloudflare
Detecting Zero-Days Before Zero-Day
Marc Rivero Lopez
Lead Security Researcher-Kaspersky
Securing the Perimeter: A Deep Dive into Attack Surfaces, Ransomware Threats, and Insurance issues
Keyla Rosas
IT Security & Compliance Senior Specialist-Nestlé
Security for AI in Nestlé & Leveraging Machine Learning for Brand Protection
Andreu Sancho
Cyber Security Senior Specialist-Data Scientist- Nestlé
Security for AI in Nestlé & Leveraging Machine Learning for Brand Protection
Daniel Molteni
Product Manager - Cloudflare
Detecting Zero-Days Before Zero-Day
Francisco Luís de Andrés
Global Siso- IridusRisk
Panel Discussion: International Correlation in Cybersecurity
Majed Al-Salamah
Cybersecurity Leader - Aramco
Panel Discussion: International Correlation in Cybersecurity
Tomàs Roy
Director- Cybersecurity Agency of Catalonia
Regional Approach for Employee Readiness for Cybersecurity
Stefano Cimicelli
Managing Director, Security EMEA - Accenture
ChatGPT Backup Using AI to Combat Threats
Maria Manuela Catarina
Deputy Director Under Secretary of State- National Cybersecurity Directorate
Employee Training and Awareness
Vasileios Mingos
European Operations Director - Health-ISAC
Info Sharing – Where Do I Start and How Do I Get the Approval to Do This?
Matteo Lucchetti
Director- Cyber 4.0 Cybersecurity Competence Center
Fireside Chat: 4 Motors of Europe (Regional Approach to Cybersecurity)
Steven Mustard
CEO and President- National Automation Inc
Employee Training and Awareness
“Educating employees about cybersecurity best practices and fostering a culture of security to mitigate human-related risks.”
Tom Liston
CEO- Bad Wolf Security
Confessions of a dirty Hacker
“How bad the current security landscape actually is.”
Head, Innovation and Project Management Division - Valencia Local Police
European EU-HybNET Project: Cluster of Insitutions for Common Knowledge against Hybrid Threats
Head, Innovation and Project Management Division - Valencia Local Police
European EU-HybNET Project: Cluster of Insitutions for Common Knowledge against Hybrid Threats
Allan Friedman
Senior Advisor and Strategist
Critical importance of SBoM
#JOURNEY: SUPPLY CHAIN 1
Andrew Martin
Professor of Systems Security
Cybersecurity and IoT – The worst of both worlds Securing Network Design by Design
The importance of the network context, what issues we see and how we can overcome some of those challenges with collaboration and new forms of technology.
#JOURNEY: CYBERSECURITY, IOT
Pepa Sedó
E&F Programmes Director
“Don’t Panic. You’re already doing most of this.”
On this panel, Pepa Sedó will explore supply chain security (both hardware and software), with a focus on past, present and future solutions to address a quickly evolving threat landscape.
#JOURNEY: SUPPLY CHAIN
Goran Novkovic
Driving Cyber-Operational Intelligence with Digital Twins Solution Implementation
Operation is critical part of every Business whereas Industrial Cybersecurity is critical part of every Operation. Mission of Industrial Cybersecurity Practice is to protect the Operation. To deliver it, we must achieve and maintain OT-IoT Visibility that is required to design, tailor and implement Industrial Cybersecurity Solutions for the organizations. The presentation offers a practical approach to providing OT-IoT Visibility empowered by Digital Twins and advanced technologies (ML, AI) that transfer real-time data into cyber-operational intelligence to drive objective business decisions.
#JOURNEY: ENERGY AND UTILITIES
Mohamed Sohail
Cyber Security Advisory Consultant
A new method for a versatile sensitive IoT data handling
The Internet of Things is driving numerous innovations and transformations, which come with challenges and risks. The security and safety of data represent one of the top concerns. This use case rethinks the veracity and analytics of IoT data handling based on its sensitivity in the context of IoT tiering and classification. The Use case will discuss – Homogenous Security for all IoT Analytics – Data Classification Security Granularity. – Provide Heterogeneity for Secure-Based Analytics. – Data Classification and Mapping at the Gateway.
#JOURNEY: CYBERSECURITY, IOT
José Luis Diego
Head of European Projects Division
Cybersecurity in Europe - A police research perspective: CC-DRIVER and RAYUELA projects
The aim is to explain how the European Commission is fostering European research on cybersecurity to enhance the security of its citizens by means of Horizon Europe funding schemes. Besides a general approach explaining the European view and methodology to face cybercriminality, it will be addressed how we work on it from a R&D on security perspective, as an experienced end-user, with more than 30 EU funded projects since 2005. On the other hand, it will be discussed new methods to prevent, investigate, and mitigate cybercriminal behaviour, with a particular focus on young cybercriminality, directly involving police forces in this task.
#JOURNEY: SUPPLY CHAINHIGH PROFILE CASE STUDIES
Sarb Sembhi
CTO
The talk will cover the adoption of IoT within the smart built environment, the cybersecurity challenges it brings and how we address the knowledge/skills gaps.
#JOURNEY: IoT
Josema Cavanillas
VP - Head of Health & Life Sciences Sales for South & Eastern Europe
Data Issues: Patient Data, Device Data; Who owns the data? Who has access to it? How long is it kept? How is it shared? How is it secured? How is Biometric data viewed?
#JOURNEY: HEALTHCARE
Franky Thrasher
Manager Nuclear Cybersecurity
Supply Chain Security Overview: Where are we? How did we get here? What comes next?
#JOURNEY: SUPPLY CHAIN
Geir Arilb Engh-Hellesvik
Chief Information Security Officer
Supply Chain Security Overview: Where are we? How did we get here? What comes next?
#JOURNEY: SUPPLY CHAIN
Jesus Sanchez
Global CISO
Panel: Energy and Utility Risks
#JOURNEY: ENERGY AND UTILITIES
Josema Cavanillas
VP - Head of Health & Life Sciences Sales for South & Eastern Europe
Data Issues: Patient Data, Device Data; Who owns the data? Who has access to it? How long is it kept? How is it shared? How is it secured? How is Biometric data viewed?
#JOURNEY: HEALTHCARE
Franky Thrasher
Manager Nuclear Cybersecurity
To be announced…
#JOURNEY: SUPPLY CHAIN
Geir Arilb Engh-Hellesvik
Chief Information Security Officer
To be announced…
#JOURNEY: SUPPLY CHAIN
Pepa Sedó
E&F Programmes Director
To be announced…
Sarb Sembhi
CTO
The talk will cover the adoption of IoT within the smart built environment, the cybersecurity challenges it brings and how we address the knowledge/skills gaps.
#JOURNEY: IoT
Allan Friedman
Importance of SBoM
Criticle importance of SBoM.
#JOURNEY: To be confirmed
Andrew Martin
Professor of Systems Security
Cybersecurity and IoT: The worst of both worlds Security Network by Design.
#JOURNEY: CYBERSECURITY, IoT
Jesus Sanchez
Global CISO
Energy and Utility Risks.
#JOURNEY: ENERGY & UTILITIES
Felix Barrio
General Manager
Energy and Utility Risks.
#JOURNEY: ENERGY & UTILITIES
Andrew Martin
Professor of Systems Security
Cybersecurity and IoT: The worst of both worlds Security Network by Design.
#JOURNEY: CYBERSECURITY, IoT
Sarb Sembhi
CTO
The talk will cover the adoption of IoT within the smart built environment, the cybersecurity challenges it brings and how we address the knowledge/skills gaps.
#JOURNEY: IoT
Jesus Sanchez
Global CISO
Energy and Utility Risks.
#JOURNEY: ENERGY & UTILITIES