CINTONA

Program

26. März 2025

The impact of AI-driven attack vectors

How Cybercriminals use AI Tools for crafting attacks. Deepfakes. New Attack vectors.
Romano Ramanti, Zürcher Kantonalbank

Nis 2.0 Easy to Install in 2 Months

Low cost solution. No Power Point. Real Life Story.
Michael Dörr, NextPharma

Clearing Europe’s Regulatory Forest: A Swiss Way to Turn TPRM Into a Walk in the Park

TPRM in the context of EU and Swiss laws and regulations. Third party risks as largest identified risks in all implemented NIS-2, ISMS and BCM projects. How to get on...
Read More
Alexis Hirschhorn, Supplier Shield
10:15 - 11:00

Coffee break & Networking talks

Geopolitics in cybersecurity – Safeguarding national sovereignty in the digital era

Understanding national sovereignty in cyberspace. Global threat landscape and geopolitical tensions. Strategies for strengthening sovereign cybersecurity systems. International cooperation vs. sovereign control.
Pietro Vassalli, Gruppo Sicurezza SA

AI’s Achilles’ Heel: Unveiling Vulnerabilities in Artificial Intelligence

How can subtle manipulation of training data introduce hidden vulnerabilities allowing attackers to control AI behavior? How can inputs be crafted to exploit AI weaknesses and trigger misclassifications? How can...
Read More
Andra-Irina Vasile, SIX

Latest Regulatory and Compliance Trends and why that is critical

Regulatory approaches, such as NIS-2 and DORA in the EU, as well as a brief overview of relevant UK and US regulation. Which industries and companies are in scope? Implementation...
Read More
Alexander Sagawe, UBS
12:30 - 13:30

Lunch break

Balancing Security, Compliance, and Productivity in AI Implementation

Organizations can harness AI’s potential without compromising security and compliance. Organizations need an effective risk management process and a focus on a secure, compliant, and productive AI implementation approach. Practical...
Read More
Jakub Bryl, Tenthpin

Strategic and Economic Impacts of Cybersecurity for the Company

Why “more secure” does not mean “more cost” Lowering risks with smart platform decisions Advocating fundamental changes
Petri Ala-Annala, Nobia

Social Engineering in the Age of AI – Pitfalls and Effective Risk Mitigating Training

Misconceptions about users increase cybersecurity risks. Poor communication and usability create barriers to secure practices. Overly rigid security measures drive policy violations. Punitive approaches foster resentment and weaken compliance. User-centered...
Read More
Cornelia Puhze, Switch
15:00 - 15:45

COFFEE BREAK & NETWORKING TALKS

Strategic Impacts of Cybersecurity: Fostering Innovation, Minimizing Risks, Gaining Competitive Edge

Risk-oriented cyber strategy: Defining goals and implementing them with hands-on mentality. Opportunity-based mindset: Identifying risks, but also opportunities to explore. Establishing a security culture in the company. Fostering innovation, compliance...
Read More
Mirko Helbling, RUAG

Architectural Resilience: Cybersecurity Strategies for AI-Driven Threats in a Cloud-First Era

Transitioning from static defense to intelligent, self-adapting cybersecurity systems. Integrating Zero Trust principles to enhance security frameworks. Leveraging AI-driven threat intelligence to proactively counter emerging threats. Building strategic resilience models...
Read More
Marcelo Sousa Ancelmo, KPMG Switzerland