Close

BARCELONA CYBERSECURITY CONGRESS

Tue 13
08:00h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know

Manoel Colombani
Manoel Colombani SoSafe EMEA Solution Engineer Speaker

13-05-2025 08:00 13-05-2025 08:30 Europe/Madrid Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know Cybercrime is evolving rapidly, with global costs projected to soar from $10 trillion in 2025 to $13.82 trillion by 2028. AI, once the realm of science fiction, is now a transformative force reshaping the digital battlefield. As author Frank Schätzing states, “AI is no longer controlled by a small group. With generative AI, every individual is a potential player—and that changes everything.” In collaboration with Censuswide, we surveyed 500 senior IT and security decision-makers to uncover today’s most pressing cybersecurity challenges. Our research reveals six key trends shaping the future of cybercrime—from AI-driven attacks to the widening cyber resilience gap. This session delves into these critical trends, redefining how organizations approach cybersecurity. Attendees will gain valuable insights and strategies to navigate the rapidly evolving threat landscape and build resilience in an era of unprecedented digital risks. IOT Room
08:00h - 08:30h IOT Room
11:00h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Common indicators of compromise every SOC team should watch out

Andrés Mendoza
Andrés Mendoza ManageEngine Technical Director Southern Europe & LATAM Speaker

13-05-2025 11:00 13-05-2025 11:30 Europe/Madrid Common indicators of compromise every SOC team should watch out Forensics are an integral part of discovering how a cybercrime took place. As a SOC manager, you and your team have to rely on digital forensic clues (IP addresses, file hashes, etc.) to figure out if a cybercrime has taken place, and how an attacker went about it. In cybersecurity, these forensic clues or artifacts are called IoCs. These clues serve as red flags that signal a data breach or intrusive activity on the network. Cybersecurity Congress Room
11:00h - 11:30h Cybersecurity Congress Room
13:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation

Steve Mustard
Steve Mustard National Automation President Speaker

13-05-2025 13:10 13-05-2025 13:40 Europe/Madrid Enhancing Cybersecurity Preparedness: Leveraging Generative AI and Immersive Reality for Incident Response Simulation As cyber threats become increasingly sophisticated, organizations must improve their incident response strategies to mitigate potential damage. This presentation explores how Generative AI and Immersive Reality technologies can revolutionize cybersecurity training through realistic, adaptive, and interactive simulations. By combining AI-driven scenario generation with immersive environments, organizations can create dynamic response scenarios that enhance decision-making, teamwork, and crisis management skills. Attendees will gain insights into the design and implementation of cybersecurity simulators, their advantages over traditional training methods, and best practices for integration into security operations. This session will highlight real-world applications and future trends in AI-driven cyber defense training. Cybersecurity Congress Room
13:10h - 13:40h Cybersecurity Congress Room
14:40h
Roundtable/Panel Discussion (max 4 speakers) | BARCELONA CYBERSECURITY CONGRESS

Generative AI Security Issues

Steve Mustard
Steve Mustard National Automation President Speaker
David Souto
David Souto Airbus Operations GmbH Enterprise Security Architect Speaker
Dave Lafferty
Dave Lafferty Scientific Technical Services President Moderator
Roberto Perez Rodríguez
Roberto Perez Rodríguez Nestlé Senior Solution Architect Speaker

13-05-2025 14:40 13-05-2025 15:40 Europe/Madrid Generative AI Security Issues Generative AI presents a set of unique security concerns. This panel will explore how cybersecurity can help address and manage the risks around Generative AI including: Ethical Concerns Including plagiarism, deepfakes, and the creation of misleading or harmful content Quality Control Ensuring accurate, coherent, and relevant content Bias and Fairness Controlling biases in training data and the associated weights that affect fairness and objectivity of the generated content Intellectual Property aspects ingesting data into model and of using and owning AI-generated content Cybersecurity Congress Room
14:40h - 15:40h Cybersecurity Congress Room
Wed 14
11:50h
Keynote | BARCELONA CYBERSECURITY CONGRESS

Towards the Convergence of TN and NTN in 6G and D2D: the Vision and Roadmap of the European Space Agency

Xavier Lobao
Xavier Lobao ESA – ESTEC Head of Future Telecom Programmes Division Speaker

14-05-2025 11:50 14-05-2025 12:35 Europe/Madrid Towards the Convergence of TN and NTN in 6G and D2D: the Vision and Roadmap of the European Space Agency The presentation will address the efforts of ESA in supporting the role of satellites in the convergence of the terrestrial and non-terrestrial networks in the 3GPP family of standards starting in 5G and culminating in 6G. A fundamental element of this convergence is manifested in Direct-to-Device (D2D), the holy grail of satellite communications, whereby satellites connect directly to consumer daily-use devices. This is a fundamental step for the digitalization of many mobility businesses and will fuel the development from connected to autonomous mobility by road, rail, sea and air. Longer-term evolutions supported by ESA towards the Internet of the Solar System (ISS) and the Internet of the Quantum Things (IoQT) will also be presented Auditorium
11:50h - 12:35h Auditorium
12:40h
Fireside Chat | BARCELONA CYBERSECURITY CONGRESS

Enabling Secure Data Collaboration through the use of Zero Knowledge Proofs to verify an information attribute without sharing or exposing it

Rob Leslie
Rob Leslie Sedicii CEO Speaker

14-05-2025 12:40 14-05-2025 13:10 Europe/Madrid Enabling Secure Data Collaboration through the use of Zero Knowledge Proofs to verify an information attribute without sharing or exposing it A Zero Knowledge Proof (ZKP) is a cryptographic protocol that allows one party to prove the veractity of a piece of information to another party without either party learning anything about the information other than the fact that the information is true or not. The protocol is extremely useful where there is sensitivity to the information that needs to be verified such that it cannot be exposed or shared in any way, which could cause non-compliance with GDPR or other laws or regulations. We will discuss a particular implementation where the national electricity utility operator in Ireland allowed the implementation of a verification service for a person's name and address for relying parties in the financial services sector where no information is every disclosed other than the verification of the name and address. We will discuss how the project was conceived, implemented and delivered in order to ensure full compliance with GDPR and the commercial requirements of the utility that no customer data could ever leave the utility. Cybersecurity Congress Room
12:40h - 13:10h Cybersecurity Congress Room
16:10h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

From operators for operators – 14 sector specific IT security standards from cooperation „up kritis”

Michael Pilgermann
Michael Pilgermann UP KRITIS Professor | Spokesman Speaker

14-05-2025 16:10 14-05-2025 16:40 Europe/Madrid From operators for operators – 14 sector specific IT security standards from cooperation „up kritis” Operators of Critical Infrastructures (CI) face a severe cyber threat landscape. While some IT security challenges are universal, others are sector-specific. Germany’s implementation of the NIS Directive enabled operators to propose industry standards for IT security; 14 such standards now exist. The B3S Medical Care for example addresses the specifics of medical devices. These standards are collaboratively developed by operators and authorities under UP KRITIS, a PPP for CI protection with around 800 members. The talk will also explain, how UP KRITIS supports NIS2 and CER implementation. Cybersecurity Congress Room
16:10h - 16:40h Cybersecurity Congress Room
Thu 15
11:40h
Solo session (30 min) | BARCELONA CYBERSECURITY CONGRESS

Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments

Mr. SZ Lin
Mr. SZ Lin Sun Square Chief Expert Speaker

15-05-2025 11:40 15-05-2025 12:10 Europe/Madrid Strategic Site Assessment: Managing Cybersecurity Risks in Smart City Environments As smart cities increasingly adopt IoT, industrial automation, and integrated infrastructure, the complexity of these interconnected systems expands potential cybersecurity risks. Without a structured security strategy, vulnerabilities persist, risking essential services like transportation and energy. The ISA/IEC 62443 standard set best practices for securing industrial automation and control systems in smart cities. By establishing risk assessment and corresponding physical, administrative, and technical controls, it mitigates cyber risks while enhancing resilience. However, static security measures alone are insufficient—continuous assessment is essential. The ISASecure Site Assessment evaluates cybersecurity posture against ISA/IEC 62443 compliance, helping cities identify risks, validate protections, and align with industry best practices. Regular assessments enable operators to proactively strengthen defenses and safeguard critical infrastructure from evolving cyber threats. Cybersecurity Congress Room
11:40h - 12:10h Cybersecurity Congress Room
15:30h
Solo session (30 min), | BARCELONA CYBERSECURITY CONGRESS

SIN “MULAS” NO HAY PARAISO (¿Dónde está el dinero?)

Juan Carlos Galindo
Juan Carlos Galindo Galindo-Benlloch Socio Director Speaker

15-05-2025 15:30 15-05-2025 16:00 Europe/Madrid SIN “MULAS” NO HAY PARAISO (¿Dónde está el dinero?) Esta charla desentrañará el destino del dinero obtenido mediante ciberestafas, destacando que estas no existirían si los estafadores no utilizaran números de cuentas bancarias para mover y blanquear los fondos. Se analizará cómo el dinero fluye a través de redes de "mulas bancarias", paraísos fiscales y el sistema financiero global, exponiendo el papel de los actores que, por omisión o dejación de funciones, permiten que estas actividades ilícitas prosperen. También se debatirán las fallas en la regulación bancaria y las consecuencias éticas y legales de un sistema que facilita indirectamente estas operaciones Cybersecurity Congress Room
15:30h - 16:00h Cybersecurity Congress Room

Pedro Mier

Pedro Mier holds a degree in Telecommunications Engineer ing from the Polytechnic University of Catalonia, MBA from ESADE and PADE from IESE. He is currently President of AMETIC (Association of Electronics, Information Technology and Telecommunications Companies of Spain), Shareholder and Chairman of the Board of Directors of TRYO Aerospace & Electronics, Board Member of the Premo Group and Committee of CTTC. member of Space Angels Network and Member of the Sc ientific Advisory

Close