08:30
Regulatory Challenges: How to Keep Up with Cyber Laws in Cyprus and the EU
The Future of privacy in the new AI and Quantum World

In this session, Punit Bhatia will explore the rapidly evolving privacy landscape in the context of two transformative technological forces: Artificial Intelligence (AI) and quantum computing. As organizations and regulators worldwide grapple with the unprecedented capabilities and risks introduced by these technologies, the session will provide a forward-looking view on the challenges, regulatory responses, and ideas shaping the future of privacy.

The Future of AI-Driven Security: Can We Trust Machines to Defend Us?
  • The benefits and risks of AI in cybersecurity
  • Ethical challenges: AI bias, false positives, and adversarial AI
  • Case study: When AI failed and how security teams adapted
Cloud Security: Best Practices for Securing Data in the Cloud
  • Common cloud vulnerabilities
  • Shared responsibility model in cloud security
Panel Discussion: Inside a Ransomware Attack: Real-Life Stories from the Frontlines

Security leaders share experiences of dealing with major ransomware incidents

  • How AI is making ransomware faster, stealthier, and harder to stop
  • How organizations responded and recovered
  • Lessons for businesses of all sizes
The Rise of Supply Chain Attacks: How to Defend Against Hidden Threats
  • Understanding third-party risks
  • How to build a resilient supply chain security strategy
Panel Discussion: Building a Cyber Resilient Organization – DORA application experiences & lessons learnt

9 months on from the implementation of DORA, CISOs and security leaders share real-life insights. What teething problems and implementation issues still remain to be tackled? What are some of the best practices they would recommend?

The Insider Threat: Tackling Risks from Within the Organization

How to identify and mitigate internal cybersecurity risks

Panel Discussion: Beyond Penetration Testing – Is It Enough to Stay Secure?
  • Experts discuss the limits of pentesting & alternative security approaches
  • GenAI Pen testing
The Evolution of Nation-State Cyber Tactics: From Espionage to Full-Spectrum Cyber Warfare
14:30
AI-Powered Social Engineering: The New Frontier of Cyber Threats