The situation of cybersecurity regulation at European level and how the regulation and the different frameworks affect the space sector. As a use case, the PNT programs will be presented (Posiciona ...
During this session we will share how SOCs are gaining autonomy and how artificial intelligence is revolutionizing cybersecurity. We will explore how advanced automation and collaboration ...
The biggest challenge in cybersecurity is no longer just technical, but human. In this session, Risi will share how, together with SoSafe, he has transformed his teams into the first line of defense against cybersecurity attacks and ...
Every day there is news of cyber-attacks, can we be calm? Francisco Javier Farfán assures that there is no magic recipe, but after years dedicated to cybersecurity, he has learned great ...
As companies adopt more SaaS solutions, their critical data becomes more dispersed and risks increase. Many rely on integrated backups, not considering that these are not always ...
Can digital identity be more than just a login system? In this talk we explore how smart identity management helped Su Red solve critical business challenges and accelerate ...
Discover how Object First improves the performance, security and simplicity of Veeam customers' backup environments. In this webinar we will explore the fundamentals of Object ...
AI assistants are coming to enterprises and with them also come new risks, such as prompt injection. In this session, Hornetsecurity will show how it is developing AI.MY, its AI assistant, to ...
Uniway, together with Sygnia, will present a success story in this presentation that will offer a comprehensive perspective to face cyber-attacks, making quick and strategic decisions that allow mitigating cyber-attacks and ...
Everyone talks about AppSec maturity, but let's be real: most programs hit a wall. You've bought the tools. You've got the dashboards. You're running scans. But vulnerabilities keep piling up, devs do ...
How Var Group transforms cybersecurity into a more effective and human experience. Our inclusive SOC, with diverse and globally connected teams under the Follow the Sun model, ensures protection and ...
Small and medium-sized businesses today face the same challenges as large corporations, but without their resources and structures. From ransomware attacks to the complexities of the cloud, they ...
In a context where digital threats are growing in complexity and speed, cybersecurity can no longer be the sole responsibility of the CISO, nor does it consist only of protecting systems, but also of anti ...
This panel will address the challenges and opportunities presented by the transposition of the NIS2 Directive to Spain. Specifically, we will focus on several aspects of the NIS2 Kit that we have prepared from ...
In this dialogue, Olga Forné and Susana Calvo will share their experience, their concerns and their vision of the main challenges facing the cybersecurity sector from the perspective of senior management. The ...
Since the invention of Bitcoin in 2008, the use of digital forms of trade and currency has increased. Digital assets have enhanced the capabilities of financial systems by reducing the t ...
The human factor remains a favorite target among cybercriminals. General trainings and phishing simulations are not enough to measure and mitigate the real risk. This p ...
In this presentation we will explore how THOR APT Scanner can accelerate advanced forensic investigations with its ability to detect sophisticated threats accurately and efficiently. ...
With the digital transformation underway, OT (Operational Technology) infrastructures are increasingly utilizing widely used technologies such as servers, virtualization, storage, networking and ...
In today's dynamic digital environment, cybersecurity has evolved from being the sole concern of the IT department to a responsibility shared by all members of an organization. ...
During the presentation, Syneto and Orizon will share their corporate alliance that allows them to offer comprehensive protection for demanding IT environments. Syneto will present its sol ...
The paper addresses the management of assets and vulnerabilities in critical infrastructures, highlighting the classification by criticality and compliance with security policies, and presents a practical case study of the ...
In this talk, we will explore the critical importance of identity in modern cybersecurity and how access control has become a key pillar against emerging threats such as ...
Cybersecurity is a global challenge that goes beyond technology: it requires communication, awareness and collective involvement. This panel seeks to demystify the sector, break down stereotypes ...
Technology is changing faster than standards can adapt. In this talk, Daniel Romano reflects on how the evolution of IoT, cloud and automation are transforming the way ...