Filter your search
CaixabankTech Capture the Flag “Unleash your Hacking Skills”


OWASP Top 10 Vulnerabilities in Large Language Models (LLMs)


#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Transformación Digital en la Industria 4.0: Casos de éxito en DFactory Barcelona – Session language Spanish

#Artificial Intelligence, #Connectivity, #IOT Hardware Security, #Smart Cities, #Standards and Regulations
The Cyber Butterfly Effect: How Global Geopolitics Leads to Local Cybercrime Threats (and what to do about it!)

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
Race With Technology – Space Enabled Intelligent Infrastructures

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
IoT Via Satellite – Future Trends and Developments

#Connectivity, #Hardware, #IOT Hardware Security, #Manufacturing, #Standards and Regulations
Common Indicators of Compromise Every SOC Team Should Watch Out

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Hardware, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Smarter IoT: Computer Vision and Power Efficiency at the Edge


#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
No Time to Breach: The CISO’s Role in I(O)T Security

#CISO, #Cybersecurity
Industrial Decarbonization Solutions

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
Physical AI and Europe’s Future in the Global AI Race

#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Standards and Regulations
Artificial Hackers: Unleashing the dogs of war

#Artificial Intelligence, #Cybercrime, #Cybersecurity, #Standards and Regulations
Architecting Safety Using Cybersecurity Requirements and Assessments

#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Livin’ on the Edge

#Cybercrime, #Cybersecurity
Cyberwatch: Uncover, Prioritize, and Defend Against Critical Vulnerabilities

#Cybersecurity, #Protection, #Risk
Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation

#Artificial Intelligence, #Cyber Threat Simulation, #Cybersecurity, #Quantum Computing, #Standards and Regulations
Mortal vs Machine: How AI is Transforming Cybersecurity Investigations

#Artificial Intelligence, #Cybersecurity
The Future of IoT Connectivity

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Next Generation Narrowband Communications, #Quantum Computing, #Supply Chain
Generative AI Security Issues




#Artificial Intelligence, #Cybersecurity, #Generative AI Security Issues, #Quantum Computing, #Standards and Regulations
Volvo’s Logistics Revolution: Real-Time Location Technology Deployment


#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
How Technology is Reshaping the IoT landscape, Driving Investment, and Enabling New use cases and Business Models.

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Next Generation Narrowband Communications, #Quantum Computing, #Supply Chain
Structuring cybersecurity through compliance: a lever to anticipate future objectives

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
The Role of the Modern CISO




#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Securing Digital Identities: The Power of Hybrid Authentication


#Cybersecurity, #Protection, #Risk
Accelerating Edge AI | The future of AI, IoT, and challenges along the way

#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Smart Manufacturing, #Supply Chain
Transforming Defense Against Cyberincidents with Generative AI

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Reflecting on 10 Years of LoRaWAN

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing
Generative Agentic AI: The New Age of Hyper-Scaling Enterprise Automation

#Artificial Intelligence, #Autommation, #Generative AI, #Hardware
Spain, land of Cybersecurity

The Business of Cybercrime: Year of the Enterprising Adversary. Defend against the new era of cyber threats.

#Artificial Intelligence, #Connectivity, #Cybercrime, #Cybersecurity, #Standards and Regulations
LoRaWAN: A Decade of Innovation, The Future Unfolding

#LoRaWAN
IoT from Space: Solutions and Future Outlook

#LoRaWAN
Real-world Experiences in Applying AI for Cyber

#Artificial Intelligence, #Cybersecurity, #Quantum Computing, #Smart Cities, #Standards and Regulations
Smart Metering – a Driver of Transformation and Sustainability


#LoRaWAN
A Fresh Look on Indoor Positioning: AI-Enhanced, Zero-Infrastructure Zone Tracking

Simple, Smart, Secure: The IoT Fabric Transforming Urban Management

#LoRaWAN
The Future of Cloud and Hyperautomation: Driving Efficiency and Innovation

#Artificial Intelligence, #Cybersecurity, #Standards and Regulations
Towards the Convergence of TN and NTN in 6G and D2D: the Vision and Roadmap of the European Space Agency

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Standards and Regulations, #Supply Chain
CrowdStrike Identity Protection Virtual Survivor Games *Registration needed*


#Cybersecurity, #Protection, #Risk
AI-Specific Cyber Risks: From Data Security to Faulty Conclusions

#Artificial Intelligence, #Cybersecurity, #Smart Cities, #Standards and Regulations
Public/Private Partnerships to Enable Smart City Adoption



#Connectivity, #Cybersecurity, #Smart Cities, #Standards and Regulations
Enabling Secure Data Collaboration through the use of Zero Knowledge Proofs to Verify an Information Attribute without Sharing or Exposing it

#AI and the Risks of Data Sharing, #Artificial Intelligence, #Connectivity, #Cybersecurity, #Smart Cities, #Standards and Regulations
LoRaWAN References from Germany: How Stadtwerke Amberg and Other Cities and Utilities Leverage IoT


#LoRaWAN
LoRaWAN for People & Planet





#LoRaWAN
From Code to Shield: DevSecOps Gets Smart with AI & LAZARUS


Transforming Healthcare Facilities with LoRaWAN: Energy Efficiency and Smart Resource Management in Spanish Health Centers and Clinics


#LoRaWAN
LoRaWAN for Smart Industry



#LoRaWAN
STEM Women Congress at the IOT Show: Innovation, Technology and Leadership

#Cybersecurity, #Manufacturing, #Standards and Regulations, #Supply Chain
Strengthening Cyber-Physical Resilience in Critical Infrastructures







#Cybersecurity, #Protection, #Risk
Quantum Computing and Cybersecurity

#Cybersecurity, #Quantum Computing, #Standards and Regulations
LoRaWAN for Smart Buildings & Facility Management




#LoRaWAN
Women in Cybersecurity: Shaping the Future of Digital Protection





#Cybersecurity, #Hardware, #Manufacturing, #Standards and Regulations
Pushing the Boundaries of LoRaWAN with Next-Gen Technologies

#LoRaWAN
New & Upcoming Technical Features for LoRaWAN

#LoRaWAN
Adapting Real-Time Intelligence to Remote Conditions Using Edge and Cloud

#Artificial Intelligence, #Autommation, #Connectivity, #Hardware
Toward Quantum Advantage and an update on Post Quantum Cryptography

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
Humancentric IoT and the Smart Society Concept




#Artificial Intelligence, #Connectivity, #Smart Cities, #Standards and Regulations
Quantum Cryptography: Current Capabilities and Cybersecurity Challenges

#Artificial Intelligence, #Connectivity, #Cybersecurity, #Hardware, #Quantum Computing, #Standards and Regulations
Rubiq: LLM-Powered IoT Assistant for Real-Time Machine Insights & Actions

#Artificial Intelligence, #Connectivity, #Hardware, #Smart Cities, #Smart Manufacturing, #Supply Chain
Quantum Communications & Post Quantum Cryptography

From Data Silos to AI-Driven Growth: The Data Strategy for Turning Raw Data into Business Value


#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Supply Chain
The Best of Both Worlds – Conventional Computing with Quantum Computing solving real world problems

#Artificial Intelligence, #Connectivity, #Hardware, #Manufacturing, #Quantum Computing, #Supply Chain
How IoT eSIM Gives you the Power to Choose and The Speed to Scale

#Connectivity, #Hardware, #IOT Hardware Security, #Standards and Regulations
Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments

#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Hardware, #Manufacturing, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain
Designed with Intent: Avoiding the Cybersecurity Patchwork in Smart City OT

#Connectivity, #Cybersecurity, #End-user Security Assessment, #Manufacturing, #Smart Cities, #Standards and Regulations, #Supply Chain
Recent Advances in Cellular & Satellite Services; Cut Costs, Ubiquitous Presence, Mastering Security and Continuous Change

#Connectivity, #Hardware, #IOT Hardware Security, #Standards and Regulations
Qilimanjaro’s Quantum Computing: Applications in Industrial Automation and IoT

#Artificial Intelligence, #Hardware, #Quantum Computing
Quantum Leap: Microsoft’s Vision and Innovations in Quantum Computing

#Artificial Intelligence, #Hardware, #Quantum Computing
From Operators for Operators – 14 Sector Specific IT Security Standards from Cooperation „up kritis”

#Artificial Intelligence, #Connectivity, #Cybersecurity, #End-user Security Assessment, #Smart Cities, #Standards and Regulations
NIS2 Directive Implementation State of Play: National Transposition, Entities Readiness Level, and Sectoral Applications

#Connectivity, #Cybersecurity, #Standards and Regulations
SIN “MULAS” NO HAY PARAISO (¿Dónde está el dinero?)

#Artificial Intelligence, #Connectivity, #Cybersecurity, #Hardware, #Manufacturing, #Quantum Computing, #Smart Cities, #Standards and Regulations, #Supply Chain