Tracks
Cyber Threats & Attacks
Digital threats are evolving rapidly, and cyberattacks are becoming both more targeted and sophisticated. This theme highlights the current threat landscape – from ransomware and phishing, to state-sponsored attacks and presents the latest methods for detection, prevention, and response. The focus is on both technology and the human factor.
Governance, Risk & Compliance
Organizations face increasing demands for documentation, control, and regulatory compliance. This theme addresses how to connect governance, risk management, and compliance in relation to standards such as ISO 27001 and regulations like NIS2 and DORA. It explores how to operationalize security and build trust across the organization.
Network, Infrastructure & Cloud
Digital infrastructures are the backbone of modern IT operations, but also a growing target. This theme focuses on securing networks, data centers, and cloud environments: from zero-trust architecture and segmentation to monitoring and protection of hybrid setups. It combines technical solutions with strategic decisions for building a resilient infrastructure.
Industry & OT Security
As production, utilities, and critical infrastructure become digitalized, the need to protect OT (Operational Technology) from cyberattacks increases. This theme explores the intersection between IT and industry, and how to safeguard systems that cannot afford downtime. It covers standards, segmentation, detection, and collaboration between IT and operational staff.
AI, Automation & Emerging Technologies
Artificial intelligence and automation bring both new opportunities and new risks. This theme looks at how AI can strengthen cybersecurity – for example in threat detection and incident response, but also how it can be exploited for advanced attacks. It also addresses emerging technologies such as quantum encryption and automated defense.
Geopolitics & Digital Sovereignty
Security policy and technology are more intertwined than ever. This theme examines how global power dynamics, sanctions, and trade conflicts impact cybersecurity, data flows, and supply chains. Discussions center on Europe’s digital sovereignty, dependency on foreign suppliers, and the need for strategic autonomy in a new geopolitical reality.
Crisis Management & Resilience
How do businesses and public institutions ensure continuity when an attack occurs? This theme focuses on preparedness, crisis management, and recovery. Resilience becomes the key to survival in an increasingly unstable threat environment.