| 07:30

PLENARY | 07:30-08:20

Registration

| 08:30

PLENARY | 08:30-13:00

Morning Plenary

PLENARY | 08:30-13:00

Official Opening

PLENARY | 08:30-08:45

The Role of the Security-Intelligence Agency in Protecting National Cyberspace

PLENARY | 08:30-08:45

Cybersecurity Ecosystem: Leveraging Government, Academic and Entrepreneurial Assets

| 08:20

PLENARY | 08:20-08:30

A Year In Review: Cybersecurity Trends & Activity In 2019

| 08:45

PLENARY | 08:45-09:00

Greetings

| 09:15

PLENARY | 09:15-09:30

Cyber Everywhere…Now what?

| 09:00

PLENARY | 09:00-09:15

A Cyber Attack and its Alternate Reality

Moderator:
Shay Simkin
Shay Simkin

Global Head of Cyber, Howden Israel

Speakers:
Saket Modi
Saket Modi

Co-founder and CEO, Safe Security, India

Nadav Zafrir
Nadav Zafrir

CEO & Co-Founder, Team8

Ben Nassi
Ben Nassi

Ph.D. Student, Ben-Gurion University of the Negev

Speaker:
Michael Meli
Michael Meli

CISO, Managing Director Senior Advisor, Bank Julius Baer

| 09:30

PLENARY | 09:30-09:45

Special Remarks

PLENARY | 09:30-09:45

Strategic Eye on the Israeli and Israel Electric Infrastructure Cybersecurity

| 09:45

PLENARY | 09:45-10:00

F35- The Future of Defense Connectivity

| 10:15

PLENARY | 10:15-10:30

Cyber Transformation in a Post-Breach World

| 10:30

PLENARY | 10:30-10:45

Redefining Risk and the Future of Security

| 10:45

PLENARY | 10:45-11:00

Bringing innovation to cloud security

PLENARY | 10:45-11:00

Faster, Smarter, Safer: Securing the Digital Revolution

| 11:00

PLENARY | 11:00-11:15

Deeds not Words: 7 Highly Effective Actions of Trusted Cloud Partners

PLENARY | 11:00-11:20

Challenges and Opportunities for the Energy Sector

| 11:20

PLENARY | 11:20-11:35

Getting Rid of Passwords: An Interview with UBS CIO

| 11:50

PLENARY | 11:50-12:05

Is Zero (Trust) a Bust? Sorting Fact from Fiction

| 12:05

PLENARY | 12:05-12:20

Cybersecurity for 2020

| 11:35

PLENARY | 11:35-11:50

The Reshaping Cyber Threat Landscape of Operational Techology (OT)

| 13:00

PLENARY | 13:00-13:25

Mind the Gap: Diplomacy in Digital World

PLENARY | 13:00-14:00

Exhibition and Lunch Break

| 00:30

PLENARY | 00:30-01:40

One-on-One: Retail in the Cyber Era

| 12:50

PLENARY | 12:50-13:00

Cyber Predictions for 2020

| 14:00

PLENARY | 14:00-16:00

AFTERNOON PLENARY

PLENARY | 14:00-14:05

Opening Words by the Host

Hall C1 - P1 | 14:00-15:45

CUTTING-EDGE TECHNOLOGIES TRACK

Hall C1 - P1 | 14:00-14:05

Opening Words on Emerging Technologies

| 14:05

PLENARY | 14:05-14:15

Live Mobile Device Hacking Show

Hall C1 - P1 | 14:05-14:15

BIg Data and Autonomous Response

| 14:15

PLENARY | 14:15-14:25

The Promise of 5G in Latin America

Hall C1 - P1 | 14:15-14:25

5G Impact on Public Cloud Providers

| 14:25

PLENARY | 14:25-14:35

Creating a Trusted Cyberspace for All

Hall C1 - P1 | 14:25-15:00

Cyber Threats in the Hybrid Cloud Era

| 14:35

PLENARY | 14:35-14:55

5G and Communications - An International Perspective

| 14:55

PLENARY | 14:55-15:05

Building a Cyber Ecosystem - 2nd Time a Charm

| 15:05

PLENARY | 15:05-15:30

Cyber Security for Mega Events

| 15:30

PLENARY | 15:30-15:40

The Secret Sauce - Building Cyber Security Resilience with Optimized Investment

Hall C1 - P1 | 15:30-15:45

Quantum Computing: a Cyber Game Changer

| 15:40

PLENARY | 15:40-15:50

The Israeli Cyber Proactive Defense Approach

| 16:00

PLENARY | 16:00-18:00

Innovation and investment festival

Hall C1 - P1 | 16:00-16:10

Offensive Uses of AI - Predictions and Thoughts

| 15:50

PLENARY | 15:50-16:05

What’s Ahead for the Israeli Cyber Ecosystem

| 16:05

PLENARY | 16:05-16:10

Cyber Insurance

| 16:10

PLENARY | 16:10-16:25

Investing in Innovation - A Government Perspective I One-on-One

Hall C1 - P1 | 16:10-16:35

Cyber Defense: Detect, Prevent, and Predict Using AI

| 16:25

PLENARY | 16:25-16:40

Startup Strategies: How to Go From Seed to Lead

| 16:40

PLENARY | 16:40-17:25

Startup Innovation Challenge 2020

| 17:25

PLENARY | 17:25-18:00

Secrets of 8200

| 18:30

PLENARY | 18:30-20:00

Cocktail Reception

| 15:00

Hall C1 - P1 | 15:00-15:10

Running Without Fear: DevOps, Resilience and Security Automation

| 15:10

Hall C1 - P1 | 15:10-15:20

The Blind Spots of Email Security That Nobody Speaks About

| 15:20

Hall C1 - P1 | 15:20-15:30

Turn your Analysts Into Threat Hunting STARS

| 15:45

Hall C1 - P1 | 15:45-17:20

ATTACK, DEFENSE, AND ADVERSARIAL ARTIFICIAL INTELLIGENCE TRACK

Hall C1 - P1 | 15:45-16:00

AI Uses in Cyber

| 16:35

Hall C1 - P1 | 16:35-16:45

Tricking the Machine - Adversarial AI

| 16:45

Hall C1 - P1 | 16:45-16:55

Artificial Intelligence: Cybersecurity’s Double-Edged Sword

| 16:55

Hall C1 - P1 | 16:55-17:10

The Role of AI in OT Environment

| 17:10

Hall C1 - P1 | 17:10-17:20

AI in Cyber: the Next Steps

| 17:20

Hall C1 - P1 | 17:20-17:50

DEEP FAKE, CYBER INFLUENCE, AND ELECTION CAMPAIGNS

Hall C1 - P1 | 17:20-17:30

Cyber Influence - International Examples

| 17:30

Hall C1 - P1 | 17:30-17:40

The Use of Cyberwarfare in Influence Operations

| 17:40

Hall C1 - P1 | 17:40-17:50

Combatting Efforts to Delegitimize Elections

| 08:00

PLENARY | 08:00-09:00

Registration

| 08:50

PLENARY | 08:50-13:00

MORNING PLENARY

PLENARY | 08:50-09:00

Greetings

| 08:55

PLENARY | 08:55-09:10

CyberEthics - The Language to Interpret Cyber Incidents and Approach Cyber Hygiene | One-on-One

| 09:10

PLENARY | 09:10-09:20

AI In The Cyber Era- Trends, Challenges and Solutions

| 09:20

PLENARY | 09:20-09:30

Threat Actors Evolution (and De-Evolution): a Cyber Threat Intelligence Point of View

| 09:30

PLENARY | 09:30-09:40

The Ultimate Threat Actor Profiling

| 09:40

PLENARY | 09:40-09:50

Creating Trust in a Zero Trust World

| 09:50

PLENARY | 09:50-10:00

The Iranian Threat: A Global Perspective

| 10:00

PLENARY | 10:00-10:20

Special Remarks

| 10:20

PLENARY | 10:20-10:30

Data to Everything. The Challenges of Today´s Big Data

| 10:30

PLENARY | 10:30-10:40

National Cybersecurity as an Economical Driver

| 10:40

PLENARY | 10:40-10:50

Staying Ahead of Nation State Grade Cyber Attacks

| 10:50

PLENARY | 10:50-11:00

Special Remarks

| 11:00

PLENARY | 11:00-11:10

Entrepreneurship as a Way of Thinking

Hall C1 - P1 | 11:00-11:50

LEGAL ASPECTS OF CYBER

Hall C1 - P1 | 11:00-11:15

Security, Privacy and Productivity: Finding the Balance

| 11:10

PLENARY | 11:10-11:20

Financial Cyber Crime, Fighting Fire with Fire

| 11:20

PLENARY | 11:20-11:50

Customer Trust in Digital - Business Disruption and Innovation in the Finance Sector | Panel

| 11:50

PLENARY | 11:50-12:00

Identity and Trust Solutions and Regulations 2020

Hall C1 - P1 | 11:50-12:50

CYBER HYGIENE AND THE HUMAN FACTOR

Hall C1 - P1 | 11:50-12:20

The Academia's Point Of View: From Research to Cyber Workforce Development

| 12:00

PLENARY | 12:00-12:10

CISOing the Cyber Challenges: Legacy and Innovation

| 12:10

PLENARY | 12:10-12:20

Cyber Risk Quantification & Live Hacking

| 12:20

PLENARY | 12:20-12:50

The Latest On Critical Infrastructure Protection | Panel

Hall C1 - P1 | 12:20-12:30

Detecting And Patching The Human Factor In CyberSecurity

| 13:00

PLENARY | 13:00-14:15

Exhibition and Lunch Break

| 11:15

Hall C1 - P1 | 11:15-11:50

Panel Discussion

| 12:30

Hall C1 - P1 | 12:30-12:40

Case Study: Insider Threat

| 12:40

Hall C1 - P1 | 12:40-12:50

SecHack365: Training Young Security Innovators

| 14:00

Hall C1 - P1 | 14:00-15:40

IT AND OT CONVERGENCE

Hall C1 - P1 | 14:00-14:15

When IT meets OT - Cybersecurity Practicalities

| 14:15

Hall C1 - P1 | 14:15-14:25

Research: Phantom of the Advanced Driver-Assistance Systems (ADAS)

| 14:25

Hall C1 - P1 | 14:25-14:40

Protecting Autonomous Vehicles from Cyberattacks | One-on-One

| 14:40

Hall C1 - P1 | 14:40-14:50

More Than IT and OT Cyber Security

| 14:50

Hall C1 - P1 | 14:50-15:10

Security Operations Center (SOC) Management and Challenges | Fireside Chat

| 15:10

Hall C1 - P1 | 15:10-15:20

Safe Digitalization of the Manufacturing Industry

| 15:20

Hall C1 - P1 | 15:20-15:30

Securing the Future of IoT- A Paradigm Shift

| 15:30

Hall C1 - P1 | 15:30-15:40

Cyber in the Hazardous Materials Industry

| 15:40

Hall C1 - P1 | 15:40-16:50

INTELLIGENCE IN THE CYBERSPACE TRACK

Hall C1 - P1 | 15:40-15:50

The Role of Intelligence in Cybersecurity Doctrine

| 15:50

Hall C1 - P1 | 15:50-16:10

Preventing Cyber Attacks Ahead of Time - A Legitimate and Probable Goal

| 16:10

Hall C1 - P1 | 16:10-16:20

New Cybercrime Threats: Facing Fraud Head On

| 16:20

Hall C1 - P1 | 16:20-16:30

Cyber For the National Level

| 16:30

Hall C1 - P1 | 16:30-16:40

Data on the Dark Web

| 16:40

Hall C1 - P1 | 16:40-16:50

The Ethics of Cyber Warfare

| 16:50

Hall C1 - P1 | 16:50-18:00

LAW ENFORCEMENT & CYBERSECURITY TRACK

Hall C1 - P1 | 16:50-17:20

Catching the Cyber Criminals - The New Forensics in Cyber Crime | Panel

| 17:20

Hall C1 - P1 | 17:20-17:45

The Money Behind Global Cyber Investigations | Panel

| 17:45

Hall C1 - P1 | 17:45-18:00

Crypto, Darknet and Malware - the Technology and Methodology of Cybercrime

  • CYBERTECHby the numbers
  • 85KAttendees
  • 1.5KSpeakers
  • 1.2KCompanies
  • 600Startups
  • 500+DELEGATIONS