Program
IT & CYBERSECURITY MEETINGS enables you to gain and perfect skills through plenary conferences and “solutions” workshops led by experts in your sector of activity.
2025 conferences & workshops
AI-Powered Tool Exploitation: A Deep Dive into New Cyber Threats
Organized by I2CAT
Continue readingThe current ecosystem of multi-agent systems, especially when articulated through protocols such as MCP and techniques such as RAG (Retrieval-Augmented Generation), is advancing rapidly from a functional point of view, but it still drags along a security and governance logic designed for humans, not for autonomous agents operating at high speed and without direct supervision.
In particular, the use of static API keys and authorisation models designed for human users (based on interfaces, manual tokens, visible UIs, etc.) do not adequately translate the guarantees of control, interpretation and traceability to the world of LLM agents as:
● They have no explicit perception of the risks or consequences of their actions.
They may perform sensitive operations in the background, with no oversight or ability on the part of the user to intervene in time in case of error or misinterpretation of an assignment.
● They operate under an ‘enablement’ rather than an ‘explicit consent’ model.
● They overload users with unnecessary information, leading to cognitive costs and disproportionate or unintended consumption of resources.
Their vulnerability to manipulation by criminal actors exists at every point of integration, allowing access to and control of resources and tools in many cases with little or no forensic traceability.
Thus, when an LLM is given access to an API, resources and/or tools, using a key, the system assumes that its behaviour will be secure, but there is currently no standard layer to interpret context, audit decisions, or condition actions on dynamic and verified permissions, as would a human being using a controlled interface. This gap represents a systemic risk as more critical functions are delegated to automated agents that may be operated by rogue actors and protocols and strategies are already beginning to be developed to address and mitigate such threats by combining cryptography, structured semantic frameworks and DLT technologies.
Speaker:
Alfonso EGIO
Senior R&D Cybersecurity Engineer of the CyberSecurity & Blockchain Research Group – I2CAT
AI Security Risks & Winning Strategies
Organized by Ejona Preci
Continue readingAI is a double-edged sword in cybersecurity. While it empowers defenders with advanced threat detection and response, it also equips attackers with unprecedented capabilities for deception, automation, and scale. This session unpacks the latest AI-driven security risks and shares practical strategies for organizations to build resilience, harness the power of AI responsibly, and turn today’s risks into tomorrow’s competitive edge.
Speaker:
Ejona PREÇI
Award-Winning Cybersecurity Leader, Global 40-under-40 in Cybersecurity, Global CISO, Responsible AI Governor at GCRAI, Speaker, Author –
Unlock the Human Element: Proactive Cyber Prevention
Organized by I2CAT
Continue readingToday, more than 80% of cybersecurity incidents involve some human component, from unintentional mistakes to misuse of credentials or exploitation through social engineering. This reality calls for a change of approach: from post-incident reaction to proactive prevention based on the analysis of human behaviour in digital environments.
In this paper we will present a model based on user segmentation according to their level of risk, using indicators such as email interaction patterns, web browsing patterns, exposure to threats and metrics of response to awareness content. From this data, among others, we apply analysis and prioritisation techniques that allow us to anticipate potential attack vectors before they materialise.
We will share key findings from our research in corporate environments, demonstrating how this strategy significantly improves the effectiveness of awareness campaigns and reduces the attack surface. We will also see how the use of preventive measures can improve planning and investment in cybersecurity, obtaining metrics on the usefulness of the security measures applied to assess their ROI. The objective is clear: to unlock the potential of the ‘Human Element’ as an active and conscious line of defence within the cybersecurity ecosystem.
Speaker:
Nil ORTIZ
Senior R&D Cybersecurity Engineer del grupo de investigación CyberSecurity & Blockchain, i2CAT – I2CAT
A walk through cyberspace
Organized by Deepak Daswani
Continue readingDuring this conference, the audience will be introduced to the key concepts that help to understand today’s complex cybersecurity landscape in 2025. The main risks and threats faced by organisations in the age of AI and Big Data will be addressed, as well as the motivations and actors behind cyberattacks.
The session will combine theory and practice: from real-life cases illustrating common techniques used by cybercriminals—such as system compromise and the theft of sensitive information—to new forms of attack powered by artificial intelligence, including deepfakes, advanced phishing (AiTM), and disinformation campaigns.
Deepak Daswani will also share the results of his own research in cybersecurity and hacking, which includes the discovery of vulnerabilities in messaging systems, IoT devices, and smart environments from leading manufacturers.
With a strongly practical approach, this talk aims to raise awareness among the audience about the importance of best practices in process and information management, and the critical need to integrate cybersecurity into any organisation’s strategy.
Conference Moderator:
Deepak DASWANI
Cybersecurity Engineer | Hacker & Public Speaker | Author | Offensive Security –