Agenda 2024

09:30 AM - 09:45 AM

Advanced Security: Chairperson’s Welcome

  • Chairpersons welcome and opening remarks

09:50 – 10:20

Keynote Presentation – Generative AI in Cybersecurity

Explore the transformative potential of Generative AI in cybersecurity. Delve into its applications, advantages, and the unique challenges it poses. Gain insights into leveraging Generative AI for proactive defence in the ever-evolving landscape of cyber threats

Nir Chervoni

Head of Data Security

10:25 AM - 10:55 AM

Retro Resurgence: Overcoming Modern Detection Systems in Cybersecurity

Examining the resurgence of older cyber techniques and strategies, and the challenges they pose to modern detection systems

11:00 AM - 11:30 AM

Zero-Day Vigilance: Revolutionizing Threat Detection and Prevention

Embark on a transformative exploration of threat detection and prevention, integrating zero-day vigilance. Unveil innovative strategies, leveraging advanced technologies and threat intelligence to revolutionize cybersecurity defenses. Join the evolution.

11:30 AM - 12:00 PM

Networking Break

12:00 PM - 12:40 PM

Visibility Matters: Proactive Threat Detection in the Cyber Landscape

Enhance your understanding of cyber landscapes by focusing on visibility, gaining insights into strategies for proactive threat detection in the ever-evolving digital environment.

Tenable - Track Sponsor

Olaf de Ruiter

Security Engineer


12:45 PM - 12:55 PM

Synchronized Security

Gain quick insights into the benefits and challenges of security consolidation. Discover ways to streamline defences, improve visibility, and simplify security management for cyber resilience.

1:00 PM - 1:30 PM

Securing Tomorrow: Mastering the Future of Cybersecurity

This session delves into cutting-edge advancements, emerging threats, and strategic insights shaping the future of cybersecurity. Explore proactive measures and innovative approaches that empower organizations to stay resilient in the dynamic landscape of digital security. Join us for a forward-looking exploration of cybersecurity excellence.

13:30 PM - 2:30 PM

Lunch Networking Break

2:30 PM - 3:00 PM

Fortifying the Code: Strategies for Robust Application Security

A comprehensive exploration of methodologies and best practices to ensure the security of software applications in the ever-evolving cyber threat landscape.

3:05 PM - 3:35 PM

AI's Tactical Edge: Balancing Offense and Defence in Cyber Operations

Exploring how artificial intelligence serves a dual role in cyber operations, enhancing both offensive and defensive strategies.

3:40 PM - 4:00 PM

Malware Unveiled: Navigating Shifting Trends and Detection Strategies

Dive into the evolving landscape of malware development, examining emerging trends and effective strategies for detecting and mitigating the impact of sophisticated threats.

4:00 PM - 4:30 PM

Networking Break

4:30 PM - 4:50 PM

Securing the Future: Strategies for Quantum-Resilient Cybersecurity

A forward-looking discussion on strategies and considerations to build quantum-resilient cybersecurity measures, anticipating the challenges posed by the era of quantum computing.

4:55 PM - 5:25 PM

Journey to a Passwordless Future: Revolutionizing Cybersecurity

Explore innovations and cybersecurity advancements propelling us toward enhanced authentication. Join the conversation for a secure and seamless digital future, leaving traditional passwords behind.

5:30 PM

End of Day


10:00 AM - 10:15 AM

Security Fundamentals & Risk Management: Chairperson’s Welcome

Chairperson’s welcome and opening remarks.

10:15 AM - 10:55 AM

Navigating Emerging Regulations: Proactive Measures for Organizational Resilience

Explore the landscape of emerging regulations and discover proactive strategies to fortify organizational resilience. Learn how to stay ahead, ensuring compliance and robust security practices.

11:00 AM - 11:30 AM

Optimizing Security: Risk Prioritization and Proactive Defence

Explore the art of risk prioritization and proactive investment in both physical and digital security. Learn to optimize budgets strategically.

11:30 AM - 11:50 AM

Networking Break


11:50 AM - 12:20 PM

AI-Powered Data Protection: Balancing Privacy Concerns and Advantages

Explore the intersection of artificial intelligence and data protection, examining the privacy implications and inherent advantages AI brings to safeguarding sensitive information.

12:25 PM - 12:45 PM

Challenges in Cyber Threat Classification: Addressing Issues in Categorizing Threat

Delve into the challenges of classifying and categorizing cyber threats, exploring innovative approaches to overcome issues in effectively identifying and responding to diverse cyber threats.

12:50 PM - 1:10 PM

Privacy-Driven Security: Turning Compliance into an Advantage

Uncover the symbiotic relationship between privacy measures and heightened security, revealing strategies to leverage privacy for a robust defence against cyber threats.

1:10 PM - 2:10 PM

Lunch Networking Break


2:10 PM - 2:40 PM

Ethical Cybersecurity: Navigating the Moral Compass in Digital Defence

Explore the ethical dimensions of cybersecurity, navigating moral values and digital defence.

2:45 PM - 2:55 PM


  • Elevate your cybersecurity knowledge in minutes.

3:00 PM - 3:35 PM



3:35 PM

End of Day