BARCELONA CYBERSECURITY CONGRESS
Confessions of a Dirty Hacker: Over Two Decades as a Hacking Curmudgeon

#Cybersecurity, #Threat Intelligence
Adversaries are Getting Smarter in the Cloud

Building a Culture of Cyber Resilience in Manufacturing

Culture Change and Workforce Development

#Readiness, #Threat Intelligence
Cybercrime Trends 2024

Detecting Zero-Days Before Zero-Day

Regional Approach to Employee Readiness for Cybersecurity





#Threat Intelligence
Survival of the Fittest: Data Security for a Wild World

Employee Training and Awareness

#Readiness
Quantum Computing and Understanding Crypto BoMs

#Cybersecurity
The Future of AI-powered Cyber Operations

International Correlation in Cybersecurity



OT Cybersecurity According to Czech NIS2 Transposition: Practical Approach and Implementation Steps

Digital Resilience: Technologies for a Safer Future

Elite SOC Performance through Intelligence Led Security Operations – The “Peacetime” Perspective

Innovating Security: Collaborative Solutions for Modern Threats


Cloud Adoption and Edge Computing

Security for AI in Nestlé & Leveraging Machine Learning for Brand Protection


Simplifying the Adoption of a Zero-Trust-Based Cybersecurity Strategy

The Quantum Era is Here

Staging the Future of Cybersecurity Through AI and the Cloud




Data Spaces as Enablers for Secure and Sovereign Data Sharing

Production Ready Use Cases of Artificial Intelligence Enabled Cybersecurity Powered by Fortinet

How to enAIble a modern SOC


Info Sharing – Where Do I Start and How Do I Get the Approval to Do This?

#Business Strategy, #Privacy
European EU-HybNET Project: Cluster of Institutions for Common Knowledge against Hybrid Threats


#Cybersecurity, #Regulations, #Threat Intelligence
Data Sharing: Safeguarding Highly Regulated and Increasingly Valuable Data Amidst an Expanding Threat Landscape and Increasing Global Connectivity



Elite SOC Performance through Intelligence Led Security Operations – The “Wartime” Perspective
