{"id":577,"date":"2020-01-28T17:32:11","date_gmt":"2020-01-28T16:32:11","guid":{"rendered":"https:\/\/salons.weyou-cms.com\/itsm\/programs"},"modified":"2025-09-16T15:01:20","modified_gmt":"2025-09-16T13:01:20","slug":"conferences","status":"publish","type":"page","link":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/","title":{"rendered":"Conferences"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n\t\t\t<!-- START Banni\u00e8re pages REVOLUTION SLIDER 6.6.7 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_40_1_wrapper\" data-source=\"post\" style=\"visibility:hidden;background:#acacac;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_40_1\" style=\"\" data-version=\"6.6.7\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-577\" data-title=\"Conferences\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"ITCM_bandeau-rubriques-1920&#215;300-2022\" width=\"1920\" height=\"300\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/weyoumediastaging.blob.core.windows.net\/itcm-es\/sites\/5\/2024\/07\/ITCM_bandeau-rubriques-1920x300-2022.jpg\" data-bg=\"p:40% 50%;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-577-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:974px,520px,370px,17px;y:m;yo:-2px,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:60,50,50,50;l:60,53,53,53;fw:500;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,47px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';text-transform:uppercase;\"\n\t\t\t\t\t\t\t><H1>CONFERENCES & WORKSHOPS PROGRAMME<\/h1> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-577-layer-3\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:1117px,520px,370px,17px;y:m;yo:48px,43px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:19,20,15,20;l:30,30,30,36;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,39px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t<rs-static-layers><!--\n\t\t\t\t\t--><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_40_1',rl:[1240,1024,778,480],el:[300,200,200,280],gw:[1650,1024,778,480],gh:[300,200,200,280],type:'hero',justify:'',layout:'fullwidth',mh:\"450\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider401\"]!==undefined) {window.RS_MODULES.modules[\"revslider401\"].once = false;window.revapi40 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n[\/vc_column][\/vc_row][vc_row][vc_column]\t<div class=\"wyvc-anchors\">\r\n\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#program\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">PROGRAM<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n[\/vc_column][\/vc_row][vc_row el_id=&#8221;program&#8221;][vc_column][vc_row_inner][vc_column_inner]<div id=\"wyvc-section-title-8811\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Program<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-8811.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<strong>IT &amp; CYBERSECURITY MEETINGS<\/strong>\u00a0enables you to gain and perfect skills through plenary conferences and \u201csolutions\u201d workshops led by experts in your sector of activity.[\/vc_column_text]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/visitor.weyou-group.com\/it-and-cybersecurity-meetings-es\/2025\/inscription\/si\" target=\"_blank\">\r\n\t\t<span class=\"wyvc-btn-text\">VISIT<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;361&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_section][vc_row][vc_column el_id=&#8221;Conf\u00e9rencesetAteliers&#8221;]<div id=\"wyvc-section-title-8028\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>2025 conferences &amp; workshops<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-8028.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"wyvc-conferences wyvc-shortcode \">\r\n\t\t<div class=\"weyou-exhibitions weyou-conferences-accordion\">\r\n\t\t<div class=\"conferences-search-wrapper\">\r\n\t\t\t<input type=\"search\" class=\"conferences-search\" name=\"q\" placeholder=\"Search by topic, location, organizer or speaker\u2026\">\r\n\r\n\t\t\t<button type=\"reset\" class=\"conferences-search-clear\" disabled>\r\n\t\t\t\t<svg width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t<rect width=\"32\" height=\"32\" rx=\"16\" fill=\"#F5F5F5\"><\/rect><rect width=\"16.9705\" height=\"1.13137\" rx=\"0.565684\" transform=\"matrix(0.707106 -0.707108 0.707106 0.707108 9.60034 21.6)\" fill=\"black\"><\/rect>\r\n\t\t\t\t\t<rect width=\"16.9705\" height=\"1.13137\" rx=\"0.565684\" transform=\"matrix(-0.707106 -0.707107 0.707106 -0.707108 21.6003 22.4)\" fill=\"black\"><\/rect>\r\n\t\t\t\t<\/svg>\r\n\t\t\t<\/button>\r\n\t\t<\/div>\r\n\t\t\r\n\t\t<div class=\"conferences-menu-wrapper\">\r\n\t\t\t<ul class=\"conferences-menu dates-list\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"button menu-item primary-border\" data-date=\"2025-11-19T00:00:00\">\r\n\t\t\t\t\t\t\t19 November 2025\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"button menu-item primary-border\" data-date=\"2025-11-20T00:00:00\">\r\n\t\t\t\t\t\t\t20 November 2025\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t<li class=\"all button menu-item\">All<\/li>\r\n\t\t\t<\/ul>\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t<form action=\"https:\/\/salons-es.weyou-cms.com\/itcm\/wp-admin\/admin-ajax.php\" method=\"post\" class=\"type-filter\">\r\n\t\t\t\t\t<span class=\"option-label\">Filter<\/span>\r\n\t\t\t\t\t<select name=\"typefilter\">\r\n\t\t\t\t\t\t<option value=\"-1\">All conferences<\/option><option value=\"plenary-conference\"\/>Plenary conference<\/option><option value=\"exhibitor-workshop\"\/>Exhibitor Workshop<\/option><\/select>\r\n\t\t\t\t\t<input type=\"hidden\" name=\"action\" value=\"weyou-conference-filter\">\r\n\t\t\t\t<\/form>\t\t<\/div>\r\n\r\n\t\t<div class=\"conferences-accordion\">\r\n\t\t\t\t\t\t\t<div class=\"conferences-accordion-item\" data-date=\"2025-11-19T00:00:00\" data-type=\"plenary-conference\">\r\n\t<div class=\"conferences-accordion-header\">\r\n\t\t<div class=\"conference-infos\">\r\n\t\t\t<span class=\"conference-date\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 448 512\"><path d=\"M96 32V64H48C21.5 64 0 85.5 0 112v48H448V112c0-26.5-21.5-48-48-48H352V32c0-17.7-14.3-32-32-32s-32 14.3-32 32V64H160V32c0-17.7-14.3-32-32-32S96 14.3 96 32zM448 192H0V464c0 26.5 21.5 48 48 48H400c26.5 0 48-21.5 48-48V192z\"\/><\/svg>\r\n\t\t\t\t19 November 2025\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-time\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 512 512\"><path d=\"M256 0a256 256 0 1 1 0 512A256 256 0 1 1 256 0zM232 120V256c0 8 4 15.5 10.7 20l96 64c11 7.4 25.9 4.4 33.3-6.7s4.4-25.9-6.7-33.3L280 243.2V120c0-13.3-10.7-24-24-24s-24 10.7-24 24z\"\/><\/svg>\r\n\t\t\t\t09:00 to 09:45\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-location\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M215.7 499.2C267 435 384 279.4 384 192C384 86 298 0 192 0S0 86 0 192c0 87.4 117 243 168.3 307.2c12.3 15.3 35.1 15.3 47.4 0zM192 128a64 64 0 1 1 0 128 64 64 0 1 1 0-128z\"\/><\/svg>\r\n\t\t\t\tSala taller\t\t\t<\/span>\r\n\t\t\t\r\n\t\t\t\t\t\t\t<span class=\"conference-type\">\r\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M0 48V487.7C0 501.1 10.9 512 24.3 512c5 0 9.9-1.5 14-4.4L192 400 345.7 507.6c4.1 2.9 9 4.4 14 4.4c13.4 0 24.3-10.9 24.3-24.3V48c0-26.5-21.5-48-48-48H48C21.5 0 0 21.5 0 48z\"\/><\/svg>\r\n\t\t\t\t\tPlenary conference\t\t\t\t<\/span>\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t<h3 class=\"conference-title\">AI-Powered Tool Exploitation: A Deep Dive into New Cyber Threats<\/h3>\r\n\t\t\r\n\t\t\t\t\t<p class=\"organized-by\">\r\n\t\t\t\tOrganized by I2CAT\t\t\t<\/p>\r\n\t\t\t\t\r\n\t\t<a class=\"read-more\" href=\"#\">Continue reading<\/a>\r\n\t<\/div>\r\n\t\t\t\t\t\t\t\t\r\n\t<div class=\"conferences-accordion-panel\">\r\n\t\t\r\n\t\t\t\t\r\n\t\t<div class=\"conference-description\">\r\n\t\t\t<p>The current ecosystem of multi-agent systems, especially when articulated through protocols such as MCP and techniques such as RAG (Retrieval-Augmented Generation), is advancing rapidly from a functional point of view, but it still drags along a security and governance logic designed for humans, not for autonomous agents operating at high speed and without direct supervision.<\/p>\n\n<p>In particular, the use of static API keys and authorisation models designed for human users (based on interfaces, manual tokens, visible UIs, etc.) do not adequately translate the guarantees of control, interpretation and traceability to the world of LLM agents as:<br>\u25cf They have no explicit perception of the risks or consequences of their actions.<br>They may perform sensitive operations in the background, with no oversight or ability on the part of the user to intervene in time in case of error or misinterpretation of an assignment.<br>\u25cf They operate under an &lsquo;enablement&rsquo; rather than an &lsquo;explicit consent&rsquo; model.<br>\u25cf They overload users with unnecessary information, leading to cognitive costs and disproportionate or unintended consumption of resources.<br>Their vulnerability to manipulation by criminal actors exists at every point of integration, allowing access to and control of resources and tools in many cases with little or no forensic traceability.<\/p>\n\n<p>Thus, when an LLM is given access to an API, resources and\/or tools, using a key, the system assumes that its behaviour will be secure, but there is currently no standard layer to interpret context, audit decisions, or condition actions on dynamic and verified permissions, as would a human being using a controlled interface. This gap represents a systemic risk as more critical functions are delegated to automated agents that may be operated by rogue actors and protocols and strategies are already beginning to be developed to address and mitigate such threats by combining cryptography, structured semantic frameworks and DLT technologies.<\/p>\n\t\t<\/div>\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t<p class=\"speakers-title\">Speaker:<\/p>\r\n\t\t\t<div class=\"speakers\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"speaker\">\r\n\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/conferencier\/da897cc5-e8db-4237-83c1-ecee91c53b16.jpg\" alt=\"Alfonso  EGIO\"><p><strong>Alfonso  EGIO<\/strong><br\/>Senior R&D Cybersecurity Engineer of the CyberSecurity & Blockchain Research Group &ndash; I2CAT<\/p><\/div>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"exhibitor-share-box\">\r\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fi2cat%2F\" data-network=\"facebook\" aria-label=\"Facebook\" style=\"--official-color: #557dbc\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,10.1c0-5.5-4.5-10-10-10S0,4.5,0,10.1c0,5,3.7,9.1,8.4,9.9v-7H5.9v-2.9h2.5V7.9C8.4,5.4,9.9,4,12.2,4c1.1,0,2.2,0.2,2.2,0.2v2.5h-1.3c-1.2,0-1.6,0.8-1.6,1.6v1.9h2.8L13.9,13h-2.3v7C16.3,19.2,20,15.1,20,10.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fi2cat%2F&text=Conferences & workshops organized by I2CAT - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"twitter\" aria-label=\"Twitter\" style=\"--official-color: #7acdee\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,3.8c-0.7,0.3-1.5,0.5-2.4,0.6c0.8-0.5,1.5-1.3,1.8-2.3c-0.8,0.5-1.7,0.8-2.6,1c-0.7-0.8-1.8-1.3-3-1.3c-2.3,0-4.1,1.8-4.1,4.1c0,0.3,0,0.6,0.1,0.9C6.4,6.7,3.4,5.1,1.4,2.6C1,3.2,0.8,3.9,0.8,4.7c0,1.4,0.7,2.7,1.8,3.4C2,8.1,1.4,7.9,0.8,7.6c0,0,0,0,0,0.1c0,2,1.4,3.6,3.3,4c-0.3,0.1-0.7,0.1-1.1,0.1c-0.3,0-0.5,0-0.8-0.1c0.5,1.6,2,2.8,3.8,2.8c-1.4,1.1-3.2,1.8-5.1,1.8c-0.3,0-0.7,0-1-0.1c1.8,1.2,4,1.8,6.3,1.8c7.5,0,11.7-6.3,11.7-11.7c0-0.2,0-0.4,0-0.5C18.8,5.3,19.4,4.6,20,3.8z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\r\n\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fi2cat%2F&title=Conferences & workshops organized by I2CAT - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"linkedin\" aria-label=\"LinkedIn\" style=\"--official-color: #1c86c6\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M18.6,0H1.4C0.6,0,0,0.6,0,1.4v17.1C0,19.4,0.6,20,1.4,20h17.1c0.8,0,1.4-0.6,1.4-1.4V1.4C20,0.6,19.4,0,18.6,0z M6,17.1h-3V7.6h3L6,17.1L6,17.1zM4.6,6.3c-1,0-1.7-0.8-1.7-1.7s0.8-1.7,1.7-1.7c0.9,0,1.7,0.8,1.7,1.7C6.3,5.5,5.5,6.3,4.6,6.3z M17.2,17.1h-3v-4.6c0-1.1,0-2.5-1.5-2.5c-1.5,0-1.8,1.2-1.8,2.5v4.7h-3V7.6h2.8v1.3h0c0.4-0.8,1.4-1.5,2.8-1.5c3,0,3.6,2,3.6,4.5V17.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\r\n\t\t\t\t<a href=\"whatsapp:\/\/send?text=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fi2cat%2F\" data-network=\"whatsapp\" aria-label=\"WhatsApp\" style=\"--official-color: #5bba67\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M10,0C4.5,0,0,4.5,0,10c0,1.9,0.5,3.6,1.4,5.1L0.1,20l5-1.3C6.5,19.5,8.2,20,10,20c5.5,0,10-4.5,10-10S15.5,0,10,0zM6.6,5.3c0.2,0,0.3,0,0.5,0c0.2,0,0.4,0,0.6,0.4c0.2,0.5,0.7,1.7,0.8,1.8c0.1,0.1,0.1,0.3,0,0.4C8.3,8.2,8.3,8.3,8.1,8.5C8,8.6,7.9,8.8,7.8,8.9C7.7,9,7.5,9.1,7.7,9.4c0.1,0.2,0.6,1.1,1.4,1.7c0.9,0.8,1.7,1.1,2,1.2c0.2,0.1,0.4,0.1,0.5-0.1c0.1-0.2,0.6-0.7,0.8-1c0.2-0.2,0.3-0.2,0.6-0.1c0.2,0.1,1.4,0.7,1.7,0.8s0.4,0.2,0.5,0.3c0.1,0.1,0.1,0.6-0.1,1.2c-0.2,0.6-1.2,1.1-1.7,1.2c-0.5,0-0.9,0.2-3-0.6c-2.5-1-4.1-3.6-4.2-3.7c-0.1-0.2-1-1.3-1-2.6c0-1.2,0.6-1.8,0.9-2.1C6.1,5.4,6.4,5.3,6.6,5.3z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\t\t\t\t\t\t\t<div class=\"conferences-accordion-item\" data-date=\"2025-11-19T00:00:00\" data-type=\"exhibitor-workshop\">\r\n\t<div class=\"conferences-accordion-header\">\r\n\t\t<div class=\"conference-infos\">\r\n\t\t\t<span class=\"conference-date\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 448 512\"><path d=\"M96 32V64H48C21.5 64 0 85.5 0 112v48H448V112c0-26.5-21.5-48-48-48H352V32c0-17.7-14.3-32-32-32s-32 14.3-32 32V64H160V32c0-17.7-14.3-32-32-32S96 14.3 96 32zM448 192H0V464c0 26.5 21.5 48 48 48H400c26.5 0 48-21.5 48-48V192z\"\/><\/svg>\r\n\t\t\t\t19 November 2025\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-time\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 512 512\"><path d=\"M256 0a256 256 0 1 1 0 512A256 256 0 1 1 256 0zM232 120V256c0 8 4 15.5 10.7 20l96 64c11 7.4 25.9 4.4 33.3-6.7s4.4-25.9-6.7-33.3L280 243.2V120c0-13.3-10.7-24-24-24s-24 10.7-24 24z\"\/><\/svg>\r\n\t\t\t\t12:30 to 13:15\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-location\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M215.7 499.2C267 435 384 279.4 384 192C384 86 298 0 192 0S0 86 0 192c0 87.4 117 243 168.3 307.2c12.3 15.3 35.1 15.3 47.4 0zM192 128a64 64 0 1 1 0 128 64 64 0 1 1 0-128z\"\/><\/svg>\r\n\t\t\t\tClub VIP\t\t\t<\/span>\r\n\t\t\t\r\n\t\t\t\t\t\t\t<span class=\"conference-type\">\r\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M0 48V487.7C0 501.1 10.9 512 24.3 512c5 0 9.9-1.5 14-4.4L192 400 345.7 507.6c4.1 2.9 9 4.4 14 4.4c13.4 0 24.3-10.9 24.3-24.3V48c0-26.5-21.5-48-48-48H48C21.5 0 0 21.5 0 48z\"\/><\/svg>\r\n\t\t\t\t\tExhibitor Workshop\t\t\t\t<\/span>\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t<h3 class=\"conference-title\">Responsible AI and Data Security: Keys to Safe Collaboration<\/h3>\r\n\t\t\r\n\t\t\t\t\t<p class=\"organized-by\">\r\n\t\t\t\tOrganized by AVEPOINT\t\t\t<\/p>\r\n\t\t\t\t\r\n\t\t<a class=\"read-more\" href=\"#\">Continue reading<\/a>\r\n\t<\/div>\r\n\t\t\t\t\t\t\t\t\r\n\t<div class=\"conferences-accordion-panel\">\r\n\t\t\r\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/1dd45cbd-1b68-401d-9397-7816f4a2d1ef.jpg\" class=\"exhibitor-logo\" alt=\"AVEPOINT\">\r\n\t\t\t\t\t\r\n\t\t<div class=\"conference-description\">\r\n\t\t\t<p>Responsible AI and data security are more than just trends today: they are the foundation of digital trust. We are talking about governance, privacy, compliance, and information protection in every interaction.<\/p>\n\n<p><br>With AvePoint, turning these challenges into opportunities is possible: we help you innovate securely, ensure compliance, and build risk-free digital collaboration.<\/p>\n\t\t<\/div>\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t<p class=\"speakers-title\">Speakers:<\/p>\r\n\t\t\t<div class=\"speakers\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"speaker\">\r\n\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/conferencier\/8345beb3-7b21-4aec-921a-b795987bba62.jpg\" alt=\"Roberto DELGADO\"><p><strong>Roberto DELGADO<\/strong><br\/>Principal TSP &ndash; AVEPOINT<\/p><\/div>\t\t\t\t\t\t\t\t\t<div class=\"speaker\">\r\n\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/conferencier\/4f7d0406-177f-4877-b738-09902cfef223.jpg\" alt=\"Hanane JENDOUBI\"><p><strong>Hanane JENDOUBI<\/strong><br\/>Regional Sales Director, Iberia &ndash; AVEPOINT<\/p><\/div>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"exhibitor-share-box\">\r\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Favepoint%2F\" data-network=\"facebook\" aria-label=\"Facebook\" style=\"--official-color: #557dbc\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,10.1c0-5.5-4.5-10-10-10S0,4.5,0,10.1c0,5,3.7,9.1,8.4,9.9v-7H5.9v-2.9h2.5V7.9C8.4,5.4,9.9,4,12.2,4c1.1,0,2.2,0.2,2.2,0.2v2.5h-1.3c-1.2,0-1.6,0.8-1.6,1.6v1.9h2.8L13.9,13h-2.3v7C16.3,19.2,20,15.1,20,10.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Favepoint%2F&text=Conferences & workshops organized by AVEPOINT - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"twitter\" aria-label=\"Twitter\" style=\"--official-color: #7acdee\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,3.8c-0.7,0.3-1.5,0.5-2.4,0.6c0.8-0.5,1.5-1.3,1.8-2.3c-0.8,0.5-1.7,0.8-2.6,1c-0.7-0.8-1.8-1.3-3-1.3c-2.3,0-4.1,1.8-4.1,4.1c0,0.3,0,0.6,0.1,0.9C6.4,6.7,3.4,5.1,1.4,2.6C1,3.2,0.8,3.9,0.8,4.7c0,1.4,0.7,2.7,1.8,3.4C2,8.1,1.4,7.9,0.8,7.6c0,0,0,0,0,0.1c0,2,1.4,3.6,3.3,4c-0.3,0.1-0.7,0.1-1.1,0.1c-0.3,0-0.5,0-0.8-0.1c0.5,1.6,2,2.8,3.8,2.8c-1.4,1.1-3.2,1.8-5.1,1.8c-0.3,0-0.7,0-1-0.1c1.8,1.2,4,1.8,6.3,1.8c7.5,0,11.7-6.3,11.7-11.7c0-0.2,0-0.4,0-0.5C18.8,5.3,19.4,4.6,20,3.8z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\r\n\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Favepoint%2F&title=Conferences & workshops organized by AVEPOINT - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"linkedin\" aria-label=\"LinkedIn\" style=\"--official-color: #1c86c6\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M18.6,0H1.4C0.6,0,0,0.6,0,1.4v17.1C0,19.4,0.6,20,1.4,20h17.1c0.8,0,1.4-0.6,1.4-1.4V1.4C20,0.6,19.4,0,18.6,0z M6,17.1h-3V7.6h3L6,17.1L6,17.1zM4.6,6.3c-1,0-1.7-0.8-1.7-1.7s0.8-1.7,1.7-1.7c0.9,0,1.7,0.8,1.7,1.7C6.3,5.5,5.5,6.3,4.6,6.3z M17.2,17.1h-3v-4.6c0-1.1,0-2.5-1.5-2.5c-1.5,0-1.8,1.2-1.8,2.5v4.7h-3V7.6h2.8v1.3h0c0.4-0.8,1.4-1.5,2.8-1.5c3,0,3.6,2,3.6,4.5V17.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\r\n\t\t\t\t<a href=\"whatsapp:\/\/send?text=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Favepoint%2F\" data-network=\"whatsapp\" aria-label=\"WhatsApp\" style=\"--official-color: #5bba67\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M10,0C4.5,0,0,4.5,0,10c0,1.9,0.5,3.6,1.4,5.1L0.1,20l5-1.3C6.5,19.5,8.2,20,10,20c5.5,0,10-4.5,10-10S15.5,0,10,0zM6.6,5.3c0.2,0,0.3,0,0.5,0c0.2,0,0.4,0,0.6,0.4c0.2,0.5,0.7,1.7,0.8,1.8c0.1,0.1,0.1,0.3,0,0.4C8.3,8.2,8.3,8.3,8.1,8.5C8,8.6,7.9,8.8,7.8,8.9C7.7,9,7.5,9.1,7.7,9.4c0.1,0.2,0.6,1.1,1.4,1.7c0.9,0.8,1.7,1.1,2,1.2c0.2,0.1,0.4,0.1,0.5-0.1c0.1-0.2,0.6-0.7,0.8-1c0.2-0.2,0.3-0.2,0.6-0.1c0.2,0.1,1.4,0.7,1.7,0.8s0.4,0.2,0.5,0.3c0.1,0.1,0.1,0.6-0.1,1.2c-0.2,0.6-1.2,1.1-1.7,1.2c-0.5,0-0.9,0.2-3-0.6c-2.5-1-4.1-3.6-4.2-3.7c-0.1-0.2-1-1.3-1-2.6c0-1.2,0.6-1.8,0.9-2.1C6.1,5.4,6.4,5.3,6.6,5.3z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\t\t\t\t\t\t\t<div class=\"conferences-accordion-item\" data-date=\"2025-11-19T00:00:00\" data-type=\"exhibitor-workshop\">\r\n\t<div class=\"conferences-accordion-header\">\r\n\t\t<div class=\"conference-infos\">\r\n\t\t\t<span class=\"conference-date\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 448 512\"><path d=\"M96 32V64H48C21.5 64 0 85.5 0 112v48H448V112c0-26.5-21.5-48-48-48H352V32c0-17.7-14.3-32-32-32s-32 14.3-32 32V64H160V32c0-17.7-14.3-32-32-32S96 14.3 96 32zM448 192H0V464c0 26.5 21.5 48 48 48H400c26.5 0 48-21.5 48-48V192z\"\/><\/svg>\r\n\t\t\t\t19 November 2025\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-time\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 512 512\"><path d=\"M256 0a256 256 0 1 1 0 512A256 256 0 1 1 256 0zM232 120V256c0 8 4 15.5 10.7 20l96 64c11 7.4 25.9 4.4 33.3-6.7s4.4-25.9-6.7-33.3L280 243.2V120c0-13.3-10.7-24-24-24s-24 10.7-24 24z\"\/><\/svg>\r\n\t\t\t\t12:30 to 13:15\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-location\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M215.7 499.2C267 435 384 279.4 384 192C384 86 298 0 192 0S0 86 0 192c0 87.4 117 243 168.3 307.2c12.3 15.3 35.1 15.3 47.4 0zM192 128a64 64 0 1 1 0 128 64 64 0 1 1 0-128z\"\/><\/svg>\r\n\t\t\t\tSala taller\t\t\t<\/span>\r\n\t\t\t\r\n\t\t\t\t\t\t\t<span class=\"conference-type\">\r\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M0 48V487.7C0 501.1 10.9 512 24.3 512c5 0 9.9-1.5 14-4.4L192 400 345.7 507.6c4.1 2.9 9 4.4 14 4.4c13.4 0 24.3-10.9 24.3-24.3V48c0-26.5-21.5-48-48-48H48C21.5 0 0 21.5 0 48z\"\/><\/svg>\r\n\t\t\t\t\tExhibitor Workshop\t\t\t\t<\/span>\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t<h3 class=\"conference-title\">Securing Tomorrow: An Introduction to Post-Quantum Cryptography<\/h3>\r\n\t\t\r\n\t\t\t\t\t<p class=\"organized-by\">\r\n\t\t\t\tOrganized by CLOUDFLARE\t\t\t<\/p>\r\n\t\t\t\t\r\n\t\t<a class=\"read-more\" href=\"#\">Continue reading<\/a>\r\n\t<\/div>\r\n\t\t\t\t\t\t\t\t\r\n\t<div class=\"conferences-accordion-panel\">\r\n\t\t\r\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/7b00adff-cd74-4fec-ba77-839d918ad587.jpg\" class=\"exhibitor-logo\" alt=\"CLOUDFLARE\">\r\n\t\t\t\t\t\r\n\t\t<div class=\"conference-description\">\r\n\t\t\t<p>The imminent arrival of quantum computing threatens to render global encryption obsolete. In this talk, we will explore key advances in Post-Quantum Cryptography (PQC) and global standardization efforts. We will discuss Cloudflare&rsquo;s proactive stance and present a strategic migration roadmap to help your company secure its critical data against the &ldquo;Collect Now, Decrypt Later&rdquo; threat.<\/p>\n\t\t<\/div>\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t<p class=\"speakers-title\">Speaker:<\/p>\r\n\t\t\t<div class=\"speakers\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"speaker\">\r\n\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/conferencier\/d55916fe-a453-45fc-87a0-21b708aaa227.jpg\" alt=\"Sergio MAESO JIMENEZ\"><p><strong>Sergio MAESO JIMENEZ<\/strong><br\/>Senior Solutions Engineer &ndash; CLOUDFLARE FRANCE SAS<\/p><\/div>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"exhibitor-share-box\">\r\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fcloudflare%2F\" data-network=\"facebook\" aria-label=\"Facebook\" style=\"--official-color: #557dbc\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,10.1c0-5.5-4.5-10-10-10S0,4.5,0,10.1c0,5,3.7,9.1,8.4,9.9v-7H5.9v-2.9h2.5V7.9C8.4,5.4,9.9,4,12.2,4c1.1,0,2.2,0.2,2.2,0.2v2.5h-1.3c-1.2,0-1.6,0.8-1.6,1.6v1.9h2.8L13.9,13h-2.3v7C16.3,19.2,20,15.1,20,10.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fcloudflare%2F&text=Conferences & workshops organized by CLOUDFLARE - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"twitter\" aria-label=\"Twitter\" style=\"--official-color: #7acdee\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,3.8c-0.7,0.3-1.5,0.5-2.4,0.6c0.8-0.5,1.5-1.3,1.8-2.3c-0.8,0.5-1.7,0.8-2.6,1c-0.7-0.8-1.8-1.3-3-1.3c-2.3,0-4.1,1.8-4.1,4.1c0,0.3,0,0.6,0.1,0.9C6.4,6.7,3.4,5.1,1.4,2.6C1,3.2,0.8,3.9,0.8,4.7c0,1.4,0.7,2.7,1.8,3.4C2,8.1,1.4,7.9,0.8,7.6c0,0,0,0,0,0.1c0,2,1.4,3.6,3.3,4c-0.3,0.1-0.7,0.1-1.1,0.1c-0.3,0-0.5,0-0.8-0.1c0.5,1.6,2,2.8,3.8,2.8c-1.4,1.1-3.2,1.8-5.1,1.8c-0.3,0-0.7,0-1-0.1c1.8,1.2,4,1.8,6.3,1.8c7.5,0,11.7-6.3,11.7-11.7c0-0.2,0-0.4,0-0.5C18.8,5.3,19.4,4.6,20,3.8z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\r\n\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fcloudflare%2F&title=Conferences & workshops organized by CLOUDFLARE - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"linkedin\" aria-label=\"LinkedIn\" style=\"--official-color: #1c86c6\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M18.6,0H1.4C0.6,0,0,0.6,0,1.4v17.1C0,19.4,0.6,20,1.4,20h17.1c0.8,0,1.4-0.6,1.4-1.4V1.4C20,0.6,19.4,0,18.6,0z M6,17.1h-3V7.6h3L6,17.1L6,17.1zM4.6,6.3c-1,0-1.7-0.8-1.7-1.7s0.8-1.7,1.7-1.7c0.9,0,1.7,0.8,1.7,1.7C6.3,5.5,5.5,6.3,4.6,6.3z M17.2,17.1h-3v-4.6c0-1.1,0-2.5-1.5-2.5c-1.5,0-1.8,1.2-1.8,2.5v4.7h-3V7.6h2.8v1.3h0c0.4-0.8,1.4-1.5,2.8-1.5c3,0,3.6,2,3.6,4.5V17.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\r\n\t\t\t\t<a href=\"whatsapp:\/\/send?text=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fcloudflare%2F\" data-network=\"whatsapp\" aria-label=\"WhatsApp\" style=\"--official-color: #5bba67\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M10,0C4.5,0,0,4.5,0,10c0,1.9,0.5,3.6,1.4,5.1L0.1,20l5-1.3C6.5,19.5,8.2,20,10,20c5.5,0,10-4.5,10-10S15.5,0,10,0zM6.6,5.3c0.2,0,0.3,0,0.5,0c0.2,0,0.4,0,0.6,0.4c0.2,0.5,0.7,1.7,0.8,1.8c0.1,0.1,0.1,0.3,0,0.4C8.3,8.2,8.3,8.3,8.1,8.5C8,8.6,7.9,8.8,7.8,8.9C7.7,9,7.5,9.1,7.7,9.4c0.1,0.2,0.6,1.1,1.4,1.7c0.9,0.8,1.7,1.1,2,1.2c0.2,0.1,0.4,0.1,0.5-0.1c0.1-0.2,0.6-0.7,0.8-1c0.2-0.2,0.3-0.2,0.6-0.1c0.2,0.1,1.4,0.7,1.7,0.8s0.4,0.2,0.5,0.3c0.1,0.1,0.1,0.6-0.1,1.2c-0.2,0.6-1.2,1.1-1.7,1.2c-0.5,0-0.9,0.2-3-0.6c-2.5-1-4.1-3.6-4.2-3.7c-0.1-0.2-1-1.3-1-2.6c0-1.2,0.6-1.8,0.9-2.1C6.1,5.4,6.4,5.3,6.6,5.3z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\t\t\t\t\t\t\t<div class=\"conferences-accordion-item\" data-date=\"2025-11-19T00:00:00\" data-type=\"plenary-conference\">\r\n\t<div class=\"conferences-accordion-header\">\r\n\t\t<div class=\"conference-infos\">\r\n\t\t\t<span class=\"conference-date\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 448 512\"><path d=\"M96 32V64H48C21.5 64 0 85.5 0 112v48H448V112c0-26.5-21.5-48-48-48H352V32c0-17.7-14.3-32-32-32s-32 14.3-32 32V64H160V32c0-17.7-14.3-32-32-32S96 14.3 96 32zM448 192H0V464c0 26.5 21.5 48 48 48H400c26.5 0 48-21.5 48-48V192z\"\/><\/svg>\r\n\t\t\t\t19 November 2025\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-time\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 512 512\"><path d=\"M256 0a256 256 0 1 1 0 512A256 256 0 1 1 256 0zM232 120V256c0 8 4 15.5 10.7 20l96 64c11 7.4 25.9 4.4 33.3-6.7s4.4-25.9-6.7-33.3L280 243.2V120c0-13.3-10.7-24-24-24s-24 10.7-24 24z\"\/><\/svg>\r\n\t\t\t\t17:45 to 18:30\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-location\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M215.7 499.2C267 435 384 279.4 384 192C384 86 298 0 192 0S0 86 0 192c0 87.4 117 243 168.3 307.2c12.3 15.3 35.1 15.3 47.4 0zM192 128a64 64 0 1 1 0 128 64 64 0 1 1 0-128z\"\/><\/svg>\r\n\t\t\t\tSala taller\t\t\t<\/span>\r\n\t\t\t\r\n\t\t\t\t\t\t\t<span class=\"conference-type\">\r\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M0 48V487.7C0 501.1 10.9 512 24.3 512c5 0 9.9-1.5 14-4.4L192 400 345.7 507.6c4.1 2.9 9 4.4 14 4.4c13.4 0 24.3-10.9 24.3-24.3V48c0-26.5-21.5-48-48-48H48C21.5 0 0 21.5 0 48z\"\/><\/svg>\r\n\t\t\t\t\tPlenary conference\t\t\t\t<\/span>\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t<h3 class=\"conference-title\">AI Security Risks & Winning Strategies<\/h3>\r\n\t\t\r\n\t\t\t\t\t<p class=\"organized-by\">\r\n\t\t\t\tOrganized by Ejona Preci\t\t\t<\/p>\r\n\t\t\t\t\r\n\t\t<a class=\"read-more\" href=\"#\">Continue reading<\/a>\r\n\t<\/div>\r\n\t\t\t\t\t\t\t\t\r\n\t<div class=\"conferences-accordion-panel\">\r\n\t\t\r\n\t\t\t\t\r\n\t\t<div class=\"conference-description\">\r\n\t\t\t<p>AI is a double-edged sword in cybersecurity. While it empowers defenders with advanced threat detection and response, it also equips attackers with unprecedented capabilities for deception, automation, and scale. This session unpacks the latest AI-driven security risks and shares practical strategies for organizations to build resilience, harness the power of AI responsibly, and turn today&rsquo;s risks into tomorrow&rsquo;s competitive edge.<br>&nbsp;<\/p>\n\t\t<\/div>\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t<p class=\"speakers-title\">Speaker:<\/p>\r\n\t\t\t<div class=\"speakers\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"speaker\">\r\n\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/conferencier\/f3a156e8-31b4-4e70-b218-81b03b9466a4.jpg\" alt=\"Ejona PRE\u00c7I\"><p><strong>Ejona PRE\u00c7I<\/strong><br\/>Award-Winning Cybersecurity Leader, Global 40-under-40 in Cybersecurity, Global CISO, Responsible AI Governor at GCRAI, Speaker, Author &ndash; <\/p><\/div>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"exhibitor-share-box\">\r\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fejona-preci%2F\" data-network=\"facebook\" aria-label=\"Facebook\" style=\"--official-color: #557dbc\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,10.1c0-5.5-4.5-10-10-10S0,4.5,0,10.1c0,5,3.7,9.1,8.4,9.9v-7H5.9v-2.9h2.5V7.9C8.4,5.4,9.9,4,12.2,4c1.1,0,2.2,0.2,2.2,0.2v2.5h-1.3c-1.2,0-1.6,0.8-1.6,1.6v1.9h2.8L13.9,13h-2.3v7C16.3,19.2,20,15.1,20,10.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fejona-preci%2F&text=Conferences & workshops organized by Ejona Preci - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"twitter\" aria-label=\"Twitter\" style=\"--official-color: #7acdee\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,3.8c-0.7,0.3-1.5,0.5-2.4,0.6c0.8-0.5,1.5-1.3,1.8-2.3c-0.8,0.5-1.7,0.8-2.6,1c-0.7-0.8-1.8-1.3-3-1.3c-2.3,0-4.1,1.8-4.1,4.1c0,0.3,0,0.6,0.1,0.9C6.4,6.7,3.4,5.1,1.4,2.6C1,3.2,0.8,3.9,0.8,4.7c0,1.4,0.7,2.7,1.8,3.4C2,8.1,1.4,7.9,0.8,7.6c0,0,0,0,0,0.1c0,2,1.4,3.6,3.3,4c-0.3,0.1-0.7,0.1-1.1,0.1c-0.3,0-0.5,0-0.8-0.1c0.5,1.6,2,2.8,3.8,2.8c-1.4,1.1-3.2,1.8-5.1,1.8c-0.3,0-0.7,0-1-0.1c1.8,1.2,4,1.8,6.3,1.8c7.5,0,11.7-6.3,11.7-11.7c0-0.2,0-0.4,0-0.5C18.8,5.3,19.4,4.6,20,3.8z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\r\n\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fejona-preci%2F&title=Conferences & workshops organized by Ejona Preci - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"linkedin\" aria-label=\"LinkedIn\" style=\"--official-color: #1c86c6\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M18.6,0H1.4C0.6,0,0,0.6,0,1.4v17.1C0,19.4,0.6,20,1.4,20h17.1c0.8,0,1.4-0.6,1.4-1.4V1.4C20,0.6,19.4,0,18.6,0z M6,17.1h-3V7.6h3L6,17.1L6,17.1zM4.6,6.3c-1,0-1.7-0.8-1.7-1.7s0.8-1.7,1.7-1.7c0.9,0,1.7,0.8,1.7,1.7C6.3,5.5,5.5,6.3,4.6,6.3z M17.2,17.1h-3v-4.6c0-1.1,0-2.5-1.5-2.5c-1.5,0-1.8,1.2-1.8,2.5v4.7h-3V7.6h2.8v1.3h0c0.4-0.8,1.4-1.5,2.8-1.5c3,0,3.6,2,3.6,4.5V17.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\r\n\t\t\t\t<a href=\"whatsapp:\/\/send?text=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fejona-preci%2F\" data-network=\"whatsapp\" aria-label=\"WhatsApp\" style=\"--official-color: #5bba67\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M10,0C4.5,0,0,4.5,0,10c0,1.9,0.5,3.6,1.4,5.1L0.1,20l5-1.3C6.5,19.5,8.2,20,10,20c5.5,0,10-4.5,10-10S15.5,0,10,0zM6.6,5.3c0.2,0,0.3,0,0.5,0c0.2,0,0.4,0,0.6,0.4c0.2,0.5,0.7,1.7,0.8,1.8c0.1,0.1,0.1,0.3,0,0.4C8.3,8.2,8.3,8.3,8.1,8.5C8,8.6,7.9,8.8,7.8,8.9C7.7,9,7.5,9.1,7.7,9.4c0.1,0.2,0.6,1.1,1.4,1.7c0.9,0.8,1.7,1.1,2,1.2c0.2,0.1,0.4,0.1,0.5-0.1c0.1-0.2,0.6-0.7,0.8-1c0.2-0.2,0.3-0.2,0.6-0.1c0.2,0.1,1.4,0.7,1.7,0.8s0.4,0.2,0.5,0.3c0.1,0.1,0.1,0.6-0.1,1.2c-0.2,0.6-1.2,1.1-1.7,1.2c-0.5,0-0.9,0.2-3-0.6c-2.5-1-4.1-3.6-4.2-3.7c-0.1-0.2-1-1.3-1-2.6c0-1.2,0.6-1.8,0.9-2.1C6.1,5.4,6.4,5.3,6.6,5.3z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\t\t\t\t\t\t\t<div class=\"conferences-accordion-item\" data-date=\"2025-11-20T00:00:00\" data-type=\"plenary-conference\">\r\n\t<div class=\"conferences-accordion-header\">\r\n\t\t<div class=\"conference-infos\">\r\n\t\t\t<span class=\"conference-date\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 448 512\"><path d=\"M96 32V64H48C21.5 64 0 85.5 0 112v48H448V112c0-26.5-21.5-48-48-48H352V32c0-17.7-14.3-32-32-32s-32 14.3-32 32V64H160V32c0-17.7-14.3-32-32-32S96 14.3 96 32zM448 192H0V464c0 26.5 21.5 48 48 48H400c26.5 0 48-21.5 48-48V192z\"\/><\/svg>\r\n\t\t\t\t20 November 2025\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-time\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 512 512\"><path d=\"M256 0a256 256 0 1 1 0 512A256 256 0 1 1 256 0zM232 120V256c0 8 4 15.5 10.7 20l96 64c11 7.4 25.9 4.4 33.3-6.7s4.4-25.9-6.7-33.3L280 243.2V120c0-13.3-10.7-24-24-24s-24 10.7-24 24z\"\/><\/svg>\r\n\t\t\t\t09:00 to 09:45\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-location\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M215.7 499.2C267 435 384 279.4 384 192C384 86 298 0 192 0S0 86 0 192c0 87.4 117 243 168.3 307.2c12.3 15.3 35.1 15.3 47.4 0zM192 128a64 64 0 1 1 0 128 64 64 0 1 1 0-128z\"\/><\/svg>\r\n\t\t\t\tSala taller\t\t\t<\/span>\r\n\t\t\t\r\n\t\t\t\t\t\t\t<span class=\"conference-type\">\r\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M0 48V487.7C0 501.1 10.9 512 24.3 512c5 0 9.9-1.5 14-4.4L192 400 345.7 507.6c4.1 2.9 9 4.4 14 4.4c13.4 0 24.3-10.9 24.3-24.3V48c0-26.5-21.5-48-48-48H48C21.5 0 0 21.5 0 48z\"\/><\/svg>\r\n\t\t\t\t\tPlenary conference\t\t\t\t<\/span>\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t<h3 class=\"conference-title\">Unlock the Human Element: Proactive Cyber Prevention<\/h3>\r\n\t\t\r\n\t\t\t\t\t<p class=\"organized-by\">\r\n\t\t\t\tOrganized by I2CAT\t\t\t<\/p>\r\n\t\t\t\t\r\n\t\t<a class=\"read-more\" href=\"#\">Continue reading<\/a>\r\n\t<\/div>\r\n\t\t\t\t\t\t\t\t\r\n\t<div class=\"conferences-accordion-panel\">\r\n\t\t\r\n\t\t\t\t\r\n\t\t<div class=\"conference-description\">\r\n\t\t\t<p>Today, more than 80% of cybersecurity incidents involve some human component, from unintentional mistakes to misuse of credentials or exploitation through social engineering. This reality calls for a change of approach: from post-incident reaction to proactive prevention based on the analysis of human behaviour in digital environments.<\/p>\n\n<p><br>In this paper we will present a model based on user segmentation according to their level of risk, using indicators such as email interaction patterns, web browsing patterns, exposure to threats and metrics of response to awareness content. From this data, among others, we apply analysis and prioritisation techniques that allow us to anticipate potential attack vectors before they materialise.<\/p>\n\n<p><br>We will share key findings from our research in corporate environments, demonstrating how this strategy significantly improves the effectiveness of awareness campaigns and reduces the attack surface. We will also see how the use of preventive measures can improve planning and investment in cybersecurity, obtaining metrics on the usefulness of the security measures applied to assess their ROI. The objective is clear: to unlock the potential of the &lsquo;Human Element&rsquo; as an active and conscious line of defence within the cybersecurity ecosystem.<\/p>\n\t\t<\/div>\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t<p class=\"speakers-title\">Speaker:<\/p>\r\n\t\t\t<div class=\"speakers\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"speaker\">\r\n\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/conferencier\/d25b1195-ecad-426b-a40d-cf21c8b2cba0.jpg\" alt=\"Nil ORTIZ\"><p><strong>Nil ORTIZ<\/strong><br\/>Senior R&D Cybersecurity Engineer del grupo de investigaci\u00f3n CyberSecurity & Blockchain, i2CAT &ndash; I2CAT<\/p><\/div>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"exhibitor-share-box\">\r\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fi2cat%2F\" data-network=\"facebook\" aria-label=\"Facebook\" style=\"--official-color: #557dbc\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,10.1c0-5.5-4.5-10-10-10S0,4.5,0,10.1c0,5,3.7,9.1,8.4,9.9v-7H5.9v-2.9h2.5V7.9C8.4,5.4,9.9,4,12.2,4c1.1,0,2.2,0.2,2.2,0.2v2.5h-1.3c-1.2,0-1.6,0.8-1.6,1.6v1.9h2.8L13.9,13h-2.3v7C16.3,19.2,20,15.1,20,10.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fi2cat%2F&text=Conferences & workshops organized by I2CAT - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"twitter\" aria-label=\"Twitter\" style=\"--official-color: #7acdee\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,3.8c-0.7,0.3-1.5,0.5-2.4,0.6c0.8-0.5,1.5-1.3,1.8-2.3c-0.8,0.5-1.7,0.8-2.6,1c-0.7-0.8-1.8-1.3-3-1.3c-2.3,0-4.1,1.8-4.1,4.1c0,0.3,0,0.6,0.1,0.9C6.4,6.7,3.4,5.1,1.4,2.6C1,3.2,0.8,3.9,0.8,4.7c0,1.4,0.7,2.7,1.8,3.4C2,8.1,1.4,7.9,0.8,7.6c0,0,0,0,0,0.1c0,2,1.4,3.6,3.3,4c-0.3,0.1-0.7,0.1-1.1,0.1c-0.3,0-0.5,0-0.8-0.1c0.5,1.6,2,2.8,3.8,2.8c-1.4,1.1-3.2,1.8-5.1,1.8c-0.3,0-0.7,0-1-0.1c1.8,1.2,4,1.8,6.3,1.8c7.5,0,11.7-6.3,11.7-11.7c0-0.2,0-0.4,0-0.5C18.8,5.3,19.4,4.6,20,3.8z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\r\n\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fi2cat%2F&title=Conferences & workshops organized by I2CAT - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"linkedin\" aria-label=\"LinkedIn\" style=\"--official-color: #1c86c6\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M18.6,0H1.4C0.6,0,0,0.6,0,1.4v17.1C0,19.4,0.6,20,1.4,20h17.1c0.8,0,1.4-0.6,1.4-1.4V1.4C20,0.6,19.4,0,18.6,0z M6,17.1h-3V7.6h3L6,17.1L6,17.1zM4.6,6.3c-1,0-1.7-0.8-1.7-1.7s0.8-1.7,1.7-1.7c0.9,0,1.7,0.8,1.7,1.7C6.3,5.5,5.5,6.3,4.6,6.3z M17.2,17.1h-3v-4.6c0-1.1,0-2.5-1.5-2.5c-1.5,0-1.8,1.2-1.8,2.5v4.7h-3V7.6h2.8v1.3h0c0.4-0.8,1.4-1.5,2.8-1.5c3,0,3.6,2,3.6,4.5V17.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\r\n\t\t\t\t<a href=\"whatsapp:\/\/send?text=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fi2cat%2F\" data-network=\"whatsapp\" aria-label=\"WhatsApp\" style=\"--official-color: #5bba67\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M10,0C4.5,0,0,4.5,0,10c0,1.9,0.5,3.6,1.4,5.1L0.1,20l5-1.3C6.5,19.5,8.2,20,10,20c5.5,0,10-4.5,10-10S15.5,0,10,0zM6.6,5.3c0.2,0,0.3,0,0.5,0c0.2,0,0.4,0,0.6,0.4c0.2,0.5,0.7,1.7,0.8,1.8c0.1,0.1,0.1,0.3,0,0.4C8.3,8.2,8.3,8.3,8.1,8.5C8,8.6,7.9,8.8,7.8,8.9C7.7,9,7.5,9.1,7.7,9.4c0.1,0.2,0.6,1.1,1.4,1.7c0.9,0.8,1.7,1.1,2,1.2c0.2,0.1,0.4,0.1,0.5-0.1c0.1-0.2,0.6-0.7,0.8-1c0.2-0.2,0.3-0.2,0.6-0.1c0.2,0.1,1.4,0.7,1.7,0.8s0.4,0.2,0.5,0.3c0.1,0.1,0.1,0.6-0.1,1.2c-0.2,0.6-1.2,1.1-1.7,1.2c-0.5,0-0.9,0.2-3-0.6c-2.5-1-4.1-3.6-4.2-3.7c-0.1-0.2-1-1.3-1-2.6c0-1.2,0.6-1.8,0.9-2.1C6.1,5.4,6.4,5.3,6.6,5.3z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\t\t\t\t\t\t\t<div class=\"conferences-accordion-item\" data-date=\"2025-11-20T00:00:00\" data-type=\"exhibitor-workshop\">\r\n\t<div class=\"conferences-accordion-header\">\r\n\t\t<div class=\"conference-infos\">\r\n\t\t\t<span class=\"conference-date\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 448 512\"><path d=\"M96 32V64H48C21.5 64 0 85.5 0 112v48H448V112c0-26.5-21.5-48-48-48H352V32c0-17.7-14.3-32-32-32s-32 14.3-32 32V64H160V32c0-17.7-14.3-32-32-32S96 14.3 96 32zM448 192H0V464c0 26.5 21.5 48 48 48H400c26.5 0 48-21.5 48-48V192z\"\/><\/svg>\r\n\t\t\t\t20 November 2025\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-time\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 512 512\"><path d=\"M256 0a256 256 0 1 1 0 512A256 256 0 1 1 256 0zM232 120V256c0 8 4 15.5 10.7 20l96 64c11 7.4 25.9 4.4 33.3-6.7s4.4-25.9-6.7-33.3L280 243.2V120c0-13.3-10.7-24-24-24s-24 10.7-24 24z\"\/><\/svg>\r\n\t\t\t\t12:30 to 13:15\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-location\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M215.7 499.2C267 435 384 279.4 384 192C384 86 298 0 192 0S0 86 0 192c0 87.4 117 243 168.3 307.2c12.3 15.3 35.1 15.3 47.4 0zM192 128a64 64 0 1 1 0 128 64 64 0 1 1 0-128z\"\/><\/svg>\r\n\t\t\t\tSala taller\t\t\t<\/span>\r\n\t\t\t\r\n\t\t\t\t\t\t\t<span class=\"conference-type\">\r\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M0 48V487.7C0 501.1 10.9 512 24.3 512c5 0 9.9-1.5 14-4.4L192 400 345.7 507.6c4.1 2.9 9 4.4 14 4.4c13.4 0 24.3-10.9 24.3-24.3V48c0-26.5-21.5-48-48-48H48C21.5 0 0 21.5 0 48z\"\/><\/svg>\r\n\t\t\t\t\tExhibitor Workshop\t\t\t\t<\/span>\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t<h3 class=\"conference-title\">Discover Albert, the cyber coach who improves your employees\u2019 cybersecurity posture.<\/h3>\r\n\t\t\r\n\t\t\t\t\t<p class=\"organized-by\">\r\n\t\t\t\tOrganized by RIOT\t\t\t<\/p>\r\n\t\t\t\t\r\n\t\t<a class=\"read-more\" href=\"#\">Continue reading<\/a>\r\n\t<\/div>\r\n\t\t\t\t\t\t\t\t\r\n\t<div class=\"conferences-accordion-panel\">\r\n\t\t\r\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ffae3ec7-bfcd-4077-98c6-df17415e4230.jpg\" class=\"exhibitor-logo\" alt=\"RIOT\">\r\n\t\t\t\t\t\r\n\t\t<div class=\"conference-description\">\r\n\t\t\t\r\n\r\n<p>Today's threats evolve faster than we can train our teams, and CISOs know that legacy awareness programs are no longer enough to stop sophisticated and adaptive attacks.<\/p>\r\n<p>By empowering users to take ownership of their daily cyber habits and actions, CISOs can limit their exposure to attacks, enable clearer reporting on key metrics, and build a stronger shared security posture across the organisation.<\/p>\r\n<p>Join this boardroom to discuss strategies to:<\/p>\r\n<ul>\r\n<li>Expand security awareness programmes to engage all business units, not just IT\r\n<\/li><li>Implement individual cybersecurity KPIs to encourage teams to build better habits\r\n<\/li><li>Enable effective board-level reporting with clear, measurable security progress indicators\r\n<\/li><\/ul>\r\n<br>\t\t<\/div>\r\n\t\t\t\r\n\t\t\t\t\t<p class=\"speakers-title\">Conference Moderator:<\/p>\r\n\t\t\t<div class=\"speakers\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"speaker\">\r\n\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/conferencier\/2881b976-fade-44c1-9487-8117078b872b.jpg\" alt=\"Samuel  ALANIS ROJAS\"><p><strong>Samuel  ALANIS ROJAS<\/strong><br\/>Account Executive  &ndash; RIOT<\/p><\/div>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"exhibitor-share-box\">\r\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Friot%2F\" data-network=\"facebook\" aria-label=\"Facebook\" style=\"--official-color: #557dbc\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,10.1c0-5.5-4.5-10-10-10S0,4.5,0,10.1c0,5,3.7,9.1,8.4,9.9v-7H5.9v-2.9h2.5V7.9C8.4,5.4,9.9,4,12.2,4c1.1,0,2.2,0.2,2.2,0.2v2.5h-1.3c-1.2,0-1.6,0.8-1.6,1.6v1.9h2.8L13.9,13h-2.3v7C16.3,19.2,20,15.1,20,10.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Friot%2F&text=Conferences & workshops organized by RIOT - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"twitter\" aria-label=\"Twitter\" style=\"--official-color: #7acdee\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,3.8c-0.7,0.3-1.5,0.5-2.4,0.6c0.8-0.5,1.5-1.3,1.8-2.3c-0.8,0.5-1.7,0.8-2.6,1c-0.7-0.8-1.8-1.3-3-1.3c-2.3,0-4.1,1.8-4.1,4.1c0,0.3,0,0.6,0.1,0.9C6.4,6.7,3.4,5.1,1.4,2.6C1,3.2,0.8,3.9,0.8,4.7c0,1.4,0.7,2.7,1.8,3.4C2,8.1,1.4,7.9,0.8,7.6c0,0,0,0,0,0.1c0,2,1.4,3.6,3.3,4c-0.3,0.1-0.7,0.1-1.1,0.1c-0.3,0-0.5,0-0.8-0.1c0.5,1.6,2,2.8,3.8,2.8c-1.4,1.1-3.2,1.8-5.1,1.8c-0.3,0-0.7,0-1-0.1c1.8,1.2,4,1.8,6.3,1.8c7.5,0,11.7-6.3,11.7-11.7c0-0.2,0-0.4,0-0.5C18.8,5.3,19.4,4.6,20,3.8z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\r\n\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Friot%2F&title=Conferences & workshops organized by RIOT - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"linkedin\" aria-label=\"LinkedIn\" style=\"--official-color: #1c86c6\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M18.6,0H1.4C0.6,0,0,0.6,0,1.4v17.1C0,19.4,0.6,20,1.4,20h17.1c0.8,0,1.4-0.6,1.4-1.4V1.4C20,0.6,19.4,0,18.6,0z M6,17.1h-3V7.6h3L6,17.1L6,17.1zM4.6,6.3c-1,0-1.7-0.8-1.7-1.7s0.8-1.7,1.7-1.7c0.9,0,1.7,0.8,1.7,1.7C6.3,5.5,5.5,6.3,4.6,6.3z M17.2,17.1h-3v-4.6c0-1.1,0-2.5-1.5-2.5c-1.5,0-1.8,1.2-1.8,2.5v4.7h-3V7.6h2.8v1.3h0c0.4-0.8,1.4-1.5,2.8-1.5c3,0,3.6,2,3.6,4.5V17.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\r\n\t\t\t\t<a href=\"whatsapp:\/\/send?text=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Friot%2F\" data-network=\"whatsapp\" aria-label=\"WhatsApp\" style=\"--official-color: #5bba67\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M10,0C4.5,0,0,4.5,0,10c0,1.9,0.5,3.6,1.4,5.1L0.1,20l5-1.3C6.5,19.5,8.2,20,10,20c5.5,0,10-4.5,10-10S15.5,0,10,0zM6.6,5.3c0.2,0,0.3,0,0.5,0c0.2,0,0.4,0,0.6,0.4c0.2,0.5,0.7,1.7,0.8,1.8c0.1,0.1,0.1,0.3,0,0.4C8.3,8.2,8.3,8.3,8.1,8.5C8,8.6,7.9,8.8,7.8,8.9C7.7,9,7.5,9.1,7.7,9.4c0.1,0.2,0.6,1.1,1.4,1.7c0.9,0.8,1.7,1.1,2,1.2c0.2,0.1,0.4,0.1,0.5-0.1c0.1-0.2,0.6-0.7,0.8-1c0.2-0.2,0.3-0.2,0.6-0.1c0.2,0.1,1.4,0.7,1.7,0.8s0.4,0.2,0.5,0.3c0.1,0.1,0.1,0.6-0.1,1.2c-0.2,0.6-1.2,1.1-1.7,1.2c-0.5,0-0.9,0.2-3-0.6c-2.5-1-4.1-3.6-4.2-3.7c-0.1-0.2-1-1.3-1-2.6c0-1.2,0.6-1.8,0.9-2.1C6.1,5.4,6.4,5.3,6.6,5.3z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\t\t\t\t\t\t\t<div class=\"conferences-accordion-item\" data-date=\"2025-11-20T00:00:00\" data-type=\"plenary-conference\">\r\n\t<div class=\"conferences-accordion-header\">\r\n\t\t<div class=\"conference-infos\">\r\n\t\t\t<span class=\"conference-date\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 448 512\"><path d=\"M96 32V64H48C21.5 64 0 85.5 0 112v48H448V112c0-26.5-21.5-48-48-48H352V32c0-17.7-14.3-32-32-32s-32 14.3-32 32V64H160V32c0-17.7-14.3-32-32-32S96 14.3 96 32zM448 192H0V464c0 26.5 21.5 48 48 48H400c26.5 0 48-21.5 48-48V192z\"\/><\/svg>\r\n\t\t\t\t20 November 2025\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-time\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 512 512\"><path d=\"M256 0a256 256 0 1 1 0 512A256 256 0 1 1 256 0zM232 120V256c0 8 4 15.5 10.7 20l96 64c11 7.4 25.9 4.4 33.3-6.7s4.4-25.9-6.7-33.3L280 243.2V120c0-13.3-10.7-24-24-24s-24 10.7-24 24z\"\/><\/svg>\r\n\t\t\t\t17:45 to 18:30\t\t\t<\/span>\r\n\t\t\t<span class=\"conference-location\">\r\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M215.7 499.2C267 435 384 279.4 384 192C384 86 298 0 192 0S0 86 0 192c0 87.4 117 243 168.3 307.2c12.3 15.3 35.1 15.3 47.4 0zM192 128a64 64 0 1 1 0 128 64 64 0 1 1 0-128z\"\/><\/svg>\r\n\t\t\t\tSala taller\t\t\t<\/span>\r\n\t\t\t\r\n\t\t\t\t\t\t\t<span class=\"conference-type\">\r\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1em\" viewBox=\"0 0 384 512\"><path d=\"M0 48V487.7C0 501.1 10.9 512 24.3 512c5 0 9.9-1.5 14-4.4L192 400 345.7 507.6c4.1 2.9 9 4.4 14 4.4c13.4 0 24.3-10.9 24.3-24.3V48c0-26.5-21.5-48-48-48H48C21.5 0 0 21.5 0 48z\"\/><\/svg>\r\n\t\t\t\t\tPlenary conference\t\t\t\t<\/span>\r\n\t\t\t\t\t<\/div>\r\n\t\t\r\n\t\t<h3 class=\"conference-title\">A walk through cyberspace<\/h3>\r\n\t\t\r\n\t\t\t\t\t<p class=\"organized-by\">\r\n\t\t\t\tOrganized by Deepak Daswani\t\t\t<\/p>\r\n\t\t\t\t\r\n\t\t<a class=\"read-more\" href=\"#\">Continue reading<\/a>\r\n\t<\/div>\r\n\t\t\t\t\t\t\t\t\r\n\t<div class=\"conferences-accordion-panel\">\r\n\t\t\r\n\t\t\t\t\r\n\t\t<div class=\"conference-description\">\r\n\t\t\t<p>During this conference, the audience will be introduced to the key concepts that help to understand today&rsquo;s complex cybersecurity landscape in 2025. The main risks and threats faced by organisations in the age of AI and Big Data will be addressed, as well as the motivations and actors behind cyberattacks.<\/p>\n\n<p>The session will combine theory and practice: from real-life cases illustrating common techniques used by cybercriminals&mdash;such as system compromise and the theft of sensitive information&mdash;to new forms of attack powered by artificial intelligence, including deepfakes, advanced phishing (AiTM), and disinformation campaigns.<\/p>\n\n<p>Deepak Daswani will also share the results of his own research in cybersecurity and hacking, which includes the discovery of vulnerabilities in messaging systems, IoT devices, and smart environments from leading manufacturers.<\/p>\n\n<p>With a strongly practical approach, this talk aims to raise awareness among the audience about the importance of best practices in process and information management, and the critical need to integrate cybersecurity into any organisation&rsquo;s strategy.<\/p>\n\t\t<\/div>\r\n\t\t\t\r\n\t\t\t\t\t<p class=\"speakers-title\">Conference Moderator:<\/p>\r\n\t\t\t<div class=\"speakers\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"speaker\">\r\n\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/conferencier\/7dfce435-8b74-4885-83e0-22f13719047a.jpg\" alt=\"Deepak  DASWANI\"><p><strong>Deepak  DASWANI<\/strong><br\/>Cybersecurity Engineer | Hacker & Public Speaker | Author | Offensive Security &ndash; <\/p><\/div>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"exhibitor-share-box\">\r\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fdeepak-daswani%2F\" data-network=\"facebook\" aria-label=\"Facebook\" style=\"--official-color: #557dbc\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,10.1c0-5.5-4.5-10-10-10S0,4.5,0,10.1c0,5,3.7,9.1,8.4,9.9v-7H5.9v-2.9h2.5V7.9C8.4,5.4,9.9,4,12.2,4c1.1,0,2.2,0.2,2.2,0.2v2.5h-1.3c-1.2,0-1.6,0.8-1.6,1.6v1.9h2.8L13.9,13h-2.3v7C16.3,19.2,20,15.1,20,10.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fdeepak-daswani%2F&text=Conferences & workshops organized by Deepak Daswani - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"twitter\" aria-label=\"Twitter\" style=\"--official-color: #7acdee\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M20,3.8c-0.7,0.3-1.5,0.5-2.4,0.6c0.8-0.5,1.5-1.3,1.8-2.3c-0.8,0.5-1.7,0.8-2.6,1c-0.7-0.8-1.8-1.3-3-1.3c-2.3,0-4.1,1.8-4.1,4.1c0,0.3,0,0.6,0.1,0.9C6.4,6.7,3.4,5.1,1.4,2.6C1,3.2,0.8,3.9,0.8,4.7c0,1.4,0.7,2.7,1.8,3.4C2,8.1,1.4,7.9,0.8,7.6c0,0,0,0,0,0.1c0,2,1.4,3.6,3.3,4c-0.3,0.1-0.7,0.1-1.1,0.1c-0.3,0-0.5,0-0.8-0.1c0.5,1.6,2,2.8,3.8,2.8c-1.4,1.1-3.2,1.8-5.1,1.8c-0.3,0-0.7,0-1-0.1c1.8,1.2,4,1.8,6.3,1.8c7.5,0,11.7-6.3,11.7-11.7c0-0.2,0-0.4,0-0.5C18.8,5.3,19.4,4.6,20,3.8z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\r\n\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fdeepak-daswani%2F&title=Conferences & workshops organized by Deepak Daswani - IT and Cybersecurity One to one Meetings Espa\u00f1a\" data-network=\"linkedin\" aria-label=\"LinkedIn\" style=\"--official-color: #1c86c6\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M18.6,0H1.4C0.6,0,0,0.6,0,1.4v17.1C0,19.4,0.6,20,1.4,20h17.1c0.8,0,1.4-0.6,1.4-1.4V1.4C20,0.6,19.4,0,18.6,0z M6,17.1h-3V7.6h3L6,17.1L6,17.1zM4.6,6.3c-1,0-1.7-0.8-1.7-1.7s0.8-1.7,1.7-1.7c0.9,0,1.7,0.8,1.7,1.7C6.3,5.5,5.5,6.3,4.6,6.3z M17.2,17.1h-3v-4.6c0-1.1,0-2.5-1.5-2.5c-1.5,0-1.8,1.2-1.8,2.5v4.7h-3V7.6h2.8v1.3h0c0.4-0.8,1.4-1.5,2.8-1.5c3,0,3.6,2,3.6,4.5V17.1z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\r\n\t\t\t\t<a href=\"whatsapp:\/\/send?text=https%3A%2F%2Fwww.it-and-cybersecurity-one-to-one-meetings.es%2Fen%2Fconference%2Fdeepak-daswani%2F\" data-network=\"whatsapp\" aria-label=\"WhatsApp\" style=\"--official-color: #5bba67\" rel=\"noopener noreferrer nofollow\">\r\n\t\t\t\t\t<span class=\"icon-container\">\r\n\t\t\t\t\t\t<svg width=\"20px\" height=\"20px\" viewBox=\"0 0 20 20\" aria-hidden=\"true\">\r\n\t\t\t\t\t\t\t<path d=\"M10,0C4.5,0,0,4.5,0,10c0,1.9,0.5,3.6,1.4,5.1L0.1,20l5-1.3C6.5,19.5,8.2,20,10,20c5.5,0,10-4.5,10-10S15.5,0,10,0zM6.6,5.3c0.2,0,0.3,0,0.5,0c0.2,0,0.4,0,0.6,0.4c0.2,0.5,0.7,1.7,0.8,1.8c0.1,0.1,0.1,0.3,0,0.4C8.3,8.2,8.3,8.3,8.1,8.5C8,8.6,7.9,8.8,7.8,8.9C7.7,9,7.5,9.1,7.7,9.4c0.1,0.2,0.6,1.1,1.4,1.7c0.9,0.8,1.7,1.1,2,1.2c0.2,0.1,0.4,0.1,0.5-0.1c0.1-0.2,0.6-0.7,0.8-1c0.2-0.2,0.3-0.2,0.6-0.1c0.2,0.1,1.4,0.7,1.7,0.8s0.4,0.2,0.5,0.3c0.1,0.1,0.1,0.6-0.1,1.2c-0.2,0.6-1.2,1.1-1.7,1.2c-0.5,0-0.9,0.2-3-0.6c-2.5-1-4.1-3.6-4.2-3.7c-0.1-0.2-1-1.3-1-2.6c0-1.2,0.6-1.8,0.9-2.1C6.1,5.4,6.4,5.3,6.6,5.3z\"><\/path>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n<\/div>[\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row el_id=&#8221;program&#8221;][vc_column][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]IT &amp; CYBERSECURITY MEETINGS\u00a0enables you to gain and perfect skills through plenary conferences and \u201csolutions\u201d workshops led by experts in your sector of activity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;361&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_section][vc_row][vc_column el_id=&#8221;Conf\u00e9rencesetAteliers&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-577","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Conferences - IT and Cybersecurity One to one Meetings Espa\u00f1a<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Conferences - IT and Cybersecurity One to one Meetings Espa\u00f1a\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row el_id=&#8221;program&#8221;][vc_column][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]IT &amp; CYBERSECURITY MEETINGS\u00a0enables you to gain and perfect skills through plenary conferences and \u201csolutions\u201d workshops led by experts in your sector of activity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;361&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_section][vc_row][vc_column el_id=&#8221;Conf\u00e9rencesetAteliers&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/\" \/>\n<meta property=\"og:site_name\" content=\"IT and Cybersecurity One to one Meetings Espa\u00f1a\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-16T13:01:20+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/\",\"name\":\"Conferences - IT and Cybersecurity One to one Meetings Espa\u00f1a\",\"isPartOf\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website\"},\"datePublished\":\"2020-01-28T16:32:11+00:00\",\"dateModified\":\"2025-09-16T13:01:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Conferences\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/\",\"name\":\"IT & Cybersecurity Meetings\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization\",\"name\":\"IT & Cybersecurity Meetings\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png\",\"contentUrl\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png\",\"width\":198,\"height\":175,\"caption\":\"IT & Cybersecurity Meetings\"},\"image\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/it-and-cybersecurity-meetings\/\",\"https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Conferences - IT and Cybersecurity One to one Meetings Espa\u00f1a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/","og_locale":"en_US","og_type":"article","og_title":"Conferences - IT and Cybersecurity One to one Meetings Espa\u00f1a","og_description":"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row el_id=&#8221;program&#8221;][vc_column][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]IT &amp; CYBERSECURITY MEETINGS\u00a0enables you to gain and perfect skills through plenary conferences and \u201csolutions\u201d workshops led by experts in your sector of activity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;361&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_section][vc_row][vc_column el_id=&#8221;Conf\u00e9rencesetAteliers&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section]","og_url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/","og_site_name":"IT and Cybersecurity One to one Meetings Espa\u00f1a","article_modified_time":"2025-09-16T13:01:20+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/","name":"Conferences - IT and Cybersecurity One to one Meetings Espa\u00f1a","isPartOf":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website"},"datePublished":"2020-01-28T16:32:11+00:00","dateModified":"2025-09-16T13:01:20+00:00","breadcrumb":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/"},{"@type":"ListItem","position":2,"name":"Conferences"}]},{"@type":"WebSite","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/","name":"IT & Cybersecurity Meetings","description":"","publisher":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization","name":"IT & Cybersecurity Meetings","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/","url":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png","contentUrl":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png","width":198,"height":175,"caption":"IT & Cybersecurity Meetings"},"image":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/it-and-cybersecurity-meetings\/","https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw"]}]}},"_links":{"self":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/comments?post=577"}],"version-history":[{"count":0,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/577\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/media?parent=577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}