Cybersecurity & Data Protection
Private Threats | Public Threats | Regulation | Investments
Thursday, 4 September 2025 | 10:00 – 18:30 | Stage 5
Moderator TBD
Key Issues
This track examines three key subjects affecting governments, enterprises and individual consumers and citizens world-wide: Cybersecurity, Data Protection, and Confidentiality. Cybersecurity remains a critical concern as the volume and sophistication of cyber threats continue to rise. Ransomware attacks targeting companies and governments have surged, with attackers demanding large sums either for returning control of operating systems, or for not releasing sensitive data. The rise of state-sponsored cyberattacks has further heightened geopolitical tensions, as critical infrastructure, such as energy grids, financial systems, and healthcare networks, become prime targets.
In addition, the expansion of remote work and hybrid environments has broadened attack surfaces, making organizations more vulnerable to breaches. Phishing, malware, social engineering and supply chain attacks are becoming increasingly prevalent, often exploiting human error and software vulnerabilities. Today, every company needs to have a cybersecurity strategy and defensive plan in place, as well as a disaster recovery plan.
For individual consumers and citizens, data privacy and confidentiality have become growing concerns amid the widespread collection of personal information by companies and governments. The proliferation of IoT devices, biometric authentication, and the increased use of artificial intelligence raise questions about how data is stored, shared, and protected.
High-profile breaches and leaks, such as those affecting social media platforms and healthcare providers, highlight the risks of inadequate safeguards. Regulatory frameworks, including the EU GDPR or the California Consumer Privacy Act (CCPA), and emerging data protection laws in other regions, are evolving to address these issues, but compliance remains a challenge for many organizations. The emphasis on zero-trust security models, encryption, and decentralized identity systems reflects the growing need for solutions to safeguard data in an interconnected world.
Keynote Speech
10:00 – 10:30
Session 1: Cybersecurity Threats at the Corporate Level
10:30 – 12:00
This module will provide a state-of-the-art review on Cybersecurity threats affecting companies and institutions. It will examine the latest trends on types of attacks, including both technical and social. At least one speech will present a 360 degree view defence in depth against cybersecurity threats for enterprises.
4 Speakers
First Break
12:00 – 12:30
Session 2: Cybersecurity Threats to Governments and Institutions
12:30 – 14:00
This session will examine the threats currently faced by governments and institutions, including state-sponsored threats. It will focus on threat categories such as deepfakes, electoral misinformation, identity theft, ransomware and more. Case studies of successful threats will be reviewed and analyzed, and at least one presentation will provide the conditions needed to prepare a 360 degree defence in depth against cybersecurity threats for public institutions.
4 Speakers
Second Break
14:00 – 14:30
Session 3: The Future of Regulation
14:30 – 16:00
The past ten years have seen extensive regulatory efforts as well as international cooperation on consumer and data security and protection. The EU has passed the General Data Protection Regulation (GDPR); the Digital Markets Act; the Digital Services Act; and additional legislation. Yet its enforcement continues to be problematic, while recent developments at X and Facebook indicate that many tech giants are now eliminating any form of privacy and protection under the guise of “free speech.” At the same time, Tik Tok is faced with a ban in the United States in the name of national security under the excuse of consumer data protection and privacy, while competing platforms remain untouched. This module will examine how regulation will evolve, and whether regulation is at all possible in an age of unfettered, global information access.
4 Speakers
Third Break
16:00 – 16:30
Session 4: Investing in Cybersecurity and Data Protection
16:30 – 18:00
This session will share the experience of four major investors in the cybersecurity and data protection area. They will present their investment theses, success stories, case studies, due diligence issues, investment plans; and other information.
4 Speakers