CINTONA

Program

26. März 2025

The impact of AI-driven attack vectors

How Cybercriminals use AI Tools for crafting attacks. Deepfakes. New Attack vectors.
Romano Ramanti, Zürcher Kantonalbank

Latest Regulatory and Compliance Trends and why that is critical

Regulatory approaches, such as NIS-2 and DORA in the EU, as well as a brief overview of relevant UK and US regulation. Which industries and companies are in scope? Implementation...
Read More
Alexander Sagawe, UBS

Clearing Europe’s Regulatory Forest: A Swiss Way to Turn TPRM Into a Walk in the Park

TPRM in the context of EU and Swiss laws and regulations. Third party risks as largest identified risks in all implemented NIS-2, ISMS and BCM projects. How to get on...
Read More
Alexis Hirschhorn, Supplier Shield
10:30 - 11:15

Coffee break & Networking talks

Geopolitics in cybersecurity – Safeguarding national sovereignty in the digital era

Understanding national sovereignty in cyberspace. Global threat landscape and geopolitical tensions. Strategies for strengthening sovereign cybersecurity systems. International cooperation vs. sovereign control.
Pietro Vassalli, Gruppo Sicurezza SA

AI’s Achilles’ Heel: Unveiling Vulnerabilities in Artificial Intelligence

How can subtle manipulation of training data introduce hidden vulnerabilities allowing attackers to control AI behavior? How can inputs be crafted to exploit AI weaknesses and trigger misclassifications? How can...
Read More
Andra-Irina Vasile, SIX
12:30 - 13:30

Lunch break

Balancing Security, Compliance, and Productivity in AI Implementation

Organizations can harness AI’s potential without compromising security and compliance. Organizations need an effective risk management process and a focus on a secure, compliant, and productive AI implementation approach. Practical...
Read More
Jakub Bryl, Tenthpin

Social Engineering in the Age of AI – Pitfalls and Effective Risk Mitigating Training

Misconceptions about users increase cybersecurity risks. Poor communication and usability create barriers to secure practices. Overly rigid security measures drive policy violations. Punitive approaches foster resentment and weaken compliance. User-centered...
Read More
Cornelia Puhze, Switch
14:30 - 15:00

COFFEE BREAK & NETWORKING TALKS

Strategic Impacts of Cybersecurity: The Interplay of Digital Transformation and Cybersecurity Management in Organizations

Relationship between DT and Cybersecurity Management: Understanding the tensions between Digital Transformation and Cybersecurity Management. Looking into the three waves of the Fourth Industrial Revolution: Digitalization, Automation, and Autonomization. Understanding...
Read More
Mirko Helbling, RUAG

Architectural Resilience: Cybersecurity Strategies for AI-Driven Threats in a Cloud-First Era

Transitioning from static defense to intelligent, self-adapting cybersecurity systems. Integrating Zero Trust principles to enhance security frameworks. Leveraging AI-driven threat intelligence to proactively counter emerging threats. Building strategic resilience models...
Read More
Marcelo Sousa Ancelmo, KPMG Switzerland