skip to Main Content

SPEAKERS

SAMPLE OF KEYNOTE SPEAKERS AND THEIR CASE STUDIES

Guglielmo
IOZZIA

Associate Director, IT & AI

CASE STUDY / DAY 1

Explainable AI Application in Mitigating Adversarial Effects

Nowadays, applications of Convolutional Neural Networks are common in sensible contexts. These specific neural networks are powerful and adaptable to many computer vision tasks, but they are also vulnerable to adversarial attacks, therefore, also imperceptible perturbations added to legit input images can cause a network to fail. Some techniques have been proposed to mitigate this risk: the challenge is in the black box nature of Deep Neural Networks. In this presentation, the speaker will pick up one of the most advanced mitigation techniques and show how Explainable AI can help validating it.

  • Convolutional Neural Networks (CNN) overview
  • Adversarial attacks to CNNs
  • Explainable AI (XAI) 101
  • Validation of mitigation defense through XAI

CASE STUDY / DAY 1

Risk Mitigation – A Shared Responsibility in the 5G Ecosystem

5G has been fuelling EU headlines for the past years. As a result, EU commission published Risk Assessment Report and ENISA wrote a 5G Threat Landscape. Both documents are highlighting the importance of collaboration and sharing information between the different actors.Building the necessary trust goes beyond the words, Huawei will present its view on how to collaborate with ecosystem stakeholders to raise E2E security.

  • Example of a risk-based approach for a vertical sector
  • Setting up collaboration within an ecosystem and establishing trustworthiness
  • Role of standards and regulations

Bob
XIE

Cyber Security Officer for Western Europe

This year Summit will host speakers from the world’s leading companies.
See sample of key note speakers.

Adri
PURKAYASTHA

Global Head of Technology & Cyber Risk Analytics

Hila
MELLER

Vice President Security Europe

Dr. Michael
VON DER HORST

Managing Director Cyber Security Germany

Guglielmo
IOZZIA

Associate Director, IT & AI

Bob
XIE

Cyber Security Officer for Western Europe

Alberto
SEMPERE

Global Director for Digital Security Products

CASE STUDY / DAY 2

Network Security Evolution Beyond SASE and Zero Trust

New concepts such as SASE and Zero trust promise seamless integration of multiple network and security services at scale. All industry vendors are adapting their value proposition to adapt to this new paradigm and it is crucial to understand how much is already available or mature and how much is just an ongoing trend so that we can make the right investments. Telco MSSPs have the experience on secure access and authenticated services and can play an important role in the evolution of the connectivity.

  • Network security evolution
  • SASE and Zero trust
  • Are current services offered meeting the expectations?
  • How to plan the evolution of your network

Alberto
SEMPERE BLANCO

Global Director for Digital Security Products

Adri
PURKAYASTHA

Global Head of Technology & Cyber Risk Analytics

CASE STUDY / DAY 2

Techniques for Deepfakes Detection

The speaker will share experience leading research in identification of manipulated media generated by techniques such as deepfakes.

  • What are deepfakes?
  • Forms of deepfakes: 1. Videos and images, 2. Texts, 3. Voices
  • ML/AI techniques used to generate deepfakes
  • Survey of technologies that can help detect deepfakes
FOR MORE INFORMATION REQUEST FULL PROGRAMME

See what keynote speakers will be taking part in the exclusive speaking panel.
Explore what Case Studies will be discussed by our senior corporate speakers

3rd Annual Cyber Security Summit
TIME IS RUNNING OUT! DON’T RISK MISSING IT

THANK YOU FOR YOUR CALL REQUEST

You will be contacted shortly.

Back To Top