Agenda

0

►Panel Discussion: Securing Future Architectures 

Jorge Pardeiro Sánchez, Head of Security by Design, Banco Sabadell (Moderator)

Gabriel Moliné, CISO, Carrefour Spain

  • How can security teams design resilient architectures to integrate and leverage emerging technologies such as AI, quantum computing, and IoT?
  • What role does AI play in developing proactive rather than reactive security strategies? 
  • What are the best practices for integrating AI without disrupting legacy systems and existing workflows? 
  • How can organisations implement zero-trust principles and adaptive access controls to secure ever-evolving environments driven by AI and edge computing?
0

► Panel Discussion: Battling Nation-State Hackers: Winning the Cyber War

Jesús Abascal Santamaría, CISO, Eni Plenitude Iberia (Moderator)

  • How can organisations effectively leverage threat intelligence to proactively counter nation-state attacks? Can they?
  • Are we doing enough to address supply chain vulnerabilities, or is this an overlooked entry point for nation-state threats?
  • What strategic, forward-looking investments are essential for effectively countering the evolving tactics of APTs?
  • In the event of a sector wide cyber-attack are we adequately prepared, and can vendors and service providers effectively handle the pressure of a coordinated response?
0

►Ransomware 3.0: Weaponizing AI for the Next Generation of Ransomware Attacks

Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England

  • LIVE DEMO - Inside the first AI-powered ransomware attack — See how my custom Agentic Ransomware Gang can take down a network in under 8 mins 
  • First-hand insights from real-world red team ops — from legacy tech and broken access controls to the critical lack of real-world security testing
  • Why traditional security fails — compliance checklists and conventional tools don’t stop modern ransomware 
  • What CISOs and security leaders must do now — real-world, field-tested steps to prove your controls work before attackers do it for you

Education seminars