Tech Hub Stage

Tech Hub Stage

Be the first to witness and hear the groundbreaking product launches and revolutionary solutions. Our stage offers a dynamic platform to explore real-world applications and in-depth case studies. Engage directly with technical experts, ready to answer your questions on the spot. Don't miss this chance to dive into the cutting-edge of technology.

Loading
10:30
  1. Tech Hub Stage
    20 mins
    The human factor remains cybersecurity's most critical, yet often overlooked, element. This keynote dives into the fascinating psychology of trust – how we build it, how it's exploited, and whether we should even try to validate it in a digital world. From a grandmother's Facebook recipe group to a North Korean fake IT worker infiltrating a tech company, this presentation will explore real-world tales of social engineering. It will unpack why human brains are wired to fall for scams, and how AI is blurring the lines of reality, and how we can navigate the modern trust paradox.
10:55
  1. Tech Hub Stage
    20 mins
    Jake will delve into the darker, more controversial aspects of facial recognition technology, exposing its unsettling potential. He'll unveil cutting-edge glasses capable of real-time identification, allowing you to discover someone's identity with nothing more than a glance. But it doesn't stop there — Jake will also demonstrate how AI can be used to outsmart these systems, revealing how he successfully bypassed a bank’s supposedly secure facial recognition system using nothing but freely available software. For the grand finale, Jake will push the boundaries even further. He’ll add himself to a high-security watchlist of known suspects - only to walk straight past the system undetected with the use of AI, proving just how vulnerable and exploitable this technology truly is.
11:45
  1. Tech Hub Stage
    20 mins
    Discover how Secure Access Service Edge (SASE) can transform your security architecture by unifying network and security services into a cloud-native platform. Learn how SASE enhances web security, streamlines remote user access, and supports a modern, scalable, and secure digital workplace
12:10
  1. Tech Hub Stage
    20 mins
    •  Trends and Emerging Cybersecurity Risks – An overview of the latest threats and vulnerabilities in cybersecurity, from advanced attack methods to evolving tactics used by threat actors.
    •  The Evolution of Cybersecurity: Are We Doing Something Wrong? – A critical look at today’s security strategies, identifying key gaps and exploring innovative ways to stay ahead.
    •  AI in Cybersecurity: Risks and Opportunities – Exploring how AI is reshaping both cyber threats and defense, and what steps organizations must take to use it effectively while reducing risks
12:35
  1. Tech Hub Stage
    20 mins
    This presentation addresses the urgent need to future-proof digital security against emerging quantum computing threats, which enable "harvest now, decrypt later" attacks by allowing adversaries to collect encrypted data today for future decryption. Co-Founder and CTO of Senetas, Julian Fay will explain how high speed encryptors provide a robust and high-performance solution, designed to protect data as it travels across various network types. This includes a simplified guide to Post-Quantum Cryptography (PQC), detailing how our encryptors implement NIST quantum-resistant algorithms through hybrid key establishment and inherently quantum-safe Transport Independent Mode, alongside support for Quantum Key Distribution (QKD). Attendees will gain insight into why proactive preparation is critical now to safeguard sensitive information, leveraging our globally certified and future-ready encryption portfolio.
13:25
  1. Tech Hub Stage
    20 mins
    An overview of Datambit’s Deepfake Detection Solutions for Audio and Video deepfakes will be presented, as well as the use cases Datambit is targeting. An overview of the ease of use and deployment of the solution will be discussed. The tenants of performance and trust that the Company is built upon will be explained
13:50
  1. Tech Hub Stage
    20 mins
    This session explores strategies to strengthen cyber resilience by addressing the full threat spectrum—from human error to ransomware. It highlights the importance of security awareness, proactive defenses, and incident response planning, empowering organizations to mitigate risks, safeguard data, and maintain business continuity in an increasingly hostile landscape.
15:05
  1. Tech Hub Stage
    20 mins
    In an era of escalating threats, just as military forces rigorously train to ensure readiness and integration, the private sector must embrace the same ethos of continuous, tested development. This talk explores why exercises, ranging from tabletop scenarios to advanced cyber range simulations, are essential for assessing and strengthening cyber resilience across people, processes, and technology. It highlights how these exercises foster collaboration, sharpen incident response, and bolster supply chain resilience, while also demonstrating the necessary operational readiness needed to meet the stringent compliance requirements of the Cyber Resilience Act, NIS2, DORA and similar legislation.