top of page

Cybersecurity & Data Protection

Private Threats  |  Public Threats |  Regulation | Investments
Thursday, 4 September 2025 | 10:00 – 18:30 | 
Stage 5
Moderator TBD

Key Issues

This track examines three key subjects affecting governments, enterprises and individual consumers and citizens world-wide: Cybersecurity, Data Protection, and Confidentiality. Cybersecurity remains a critical concern as the volume and sophistication of cyber threats continue to rise. Ransomware attacks targeting companies and governments have surged, with attackers demanding large sums either for returning control of operating systems, or for not releasing sensitive data. The rise of state-sponsored cyberattacks has further heightened geopolitical tensions, as critical infrastructure, such as energy grids, financial systems, and healthcare networks, become prime targets.

 

In addition, the expansion of remote work and hybrid environments has broadened attack surfaces, making organizations more vulnerable to breaches. Phishing, malware, social engineering and supply chain attacks are becoming increasingly prevalent, often exploiting human error and software vulnerabilities. Today, every company needs to have a cybersecurity strategy and defensive plan in place, as well as a disaster recovery plan.

 

For individual consumers and citizens, data privacy and confidentiality have become growing concerns amid the widespread collection of personal information by companies and governments. The proliferation of IoT devices, biometric authentication, and the increased use of artificial intelligence raise questions about how data is stored, shared, and protected.

 

High-profile breaches and leaks, such as those affecting social media platforms and healthcare providers, highlight the risks of inadequate safeguards. Regulatory frameworks, including the EU GDPR or the California Consumer Privacy Act (CCPA), and emerging data protection laws in other regions, are evolving to address these issues, but compliance remains a challenge for many organizations. The emphasis on zero-trust security models, encryption, and decentralized identity systems reflects the growing need for solutions to safeguard data in an interconnected world.

 

Keynote Speech

10:00 – 10:30             

 

Session 1: Cybersecurity Threats at the Corporate Level

10:30 – 12:00             

This module will provide a state-of-the-art review on Cybersecurity threats affecting companies and institutions. It will examine the latest trends on types of attacks, including both technical and social. At least one speech will present a 360 degree view defence in depth against cybersecurity threats for enterprises.

4 Speakers

 

First Break

12:00 – 12:30             

 

Session 2: Cybersecurity Threats to Governments and Institutions 

12:30 – 14:00             

This session will examine the threats currently faced by governments and institutions, including state-sponsored threats. It will focus on threat categories such as deepfakes, electoral misinformation, identity theft,  ransomware and more. Case studies of successful threats will be reviewed and analyzed, and at least one presentation will provide the conditions needed to prepare a 360 degree defence in depth against cybersecurity threats for public institutions.

4 Speakers

 

Second Break

14:00 – 14:30             

 

Session 3: The Future of Regulation

14:30 – 16:00

The past ten years have seen extensive regulatory efforts as well as international cooperation on consumer and data security and protection. The EU has passed the General Data Protection Regulation (GDPR); the Digital Markets Act; the Digital Services Act; and additional legislation. Yet its enforcement continues to be problematic, while recent developments at X and Facebook indicate that many tech giants are now eliminating any form of privacy and protection under the guise of “free speech.” At the same time, Tik Tok is faced with a ban in the United States in the name of national security under the excuse of consumer data protection and privacy, while competing platforms remain untouched. This module will examine how regulation will evolve, and whether regulation is at all possible in an age of unfettered, global information access.

4 Speakers

 

Third Break

16:00 – 16:30             

 

Session 4: Investing in Cybersecurity and Data Protection

16:30 – 18:00            

This session will share the experience of four major investors in the cybersecurity and data protection area. They will present their investment theses, success stories, case studies, due diligence issues, investment plans; and other information.

4 Speakers

bottom of page