Cyber Sec eSummit 2025

An exclusive series of educational webinars and expert interviews on the cutting edge of cyber security.

Launch date: July 1 🚀🚀🚀

Registration
Digitalk Cyber Sec eSummit 2025
Digitalk eSummit

The Digitalk eSummit event format is a unique fusion of an annual conference and an online expert community, where you can consume presentation videos at your own pace and connect with other professionals.

Explore the world of Digitalk's virtual events!

Cyber Sec eSummit 2025

The Digitalk Cyber Sec eSummit 2025 is a virtual event series showcasing the latest trends, technologies, and experts in cybersecurity. It connects professionals worldwide to share insights, discuss emerging threats, and explore innovative solutions, offering valuable content and networking opportunities for all experience levels.


Join now and explore a continuously expanding collection of video presentations.

Registration
TECH STACK
NIS2
ISO 27k
Common Criteria
Observability
Attack symulation
IoT
Cyber Security
AI
Identity Management
Sponsoring partners

Presentations

Presentation video #1
Digitalk Cyber Sec eSummit 2025
David Kellerman
Field CTO - Cymulate

Adam has worked on numerous projects at both international and domestic enterprise companies in leadership, architectural, and expert roles (HP, Nokia, Vodafone, EPAM, United Consult). His main areas of expertise include Observability, Performance Engineering, and Quality. Beyond client projects, he has also been a speaker at international and domestic conferences such as HUSTEF, TestCon, and Mndwrk events.

Enhancing Cybersecurity with Continuous Attack Simulation and Threat Exposure Management

As cyber threats become increasingly sophisticated, organizations need to shift from reactive to proactive cybersecurity strategies. Attack simulation technologies offer a powerful approach to continuously validate security measures, identify vulnerabilities, and enhance overall resilience against potential threats.

The adoption of attack simulation and continuous threat exposure management technologies is a critical step toward building a resilient cybersecurity framework. These tools empower organizations to move beyond traditional defenses and maintain a strong security posture in an ever-changing digital world.

Presentation video #2
Digitalk Cyber Sec eSummit 2025
Nadav Erez
Twine - CTO and Co-Founder

Nadav is the Co-founder and CTO of Twine, whose mission is to build the next generation AI workforce. Previously Nadav was the Vice President of Data and Analytics at Claroty, a leading firm in Industrial Control Systems and medical security. His professional journey also included tenure as the leader of a strategic research team within the elite 8200 Cyber Unit of the Israel Defense Forces.Nadav holds a degree in Mathematics from the University of Tel Aviv. Renowned for his passion for creating outstanding products and leading like-minded developers, Nadav is a respected figure in the tech community.

Digitalk Cyber Sec eSummit 2025
Omri Green
Twine - Co-Founder

Omri is the Co-founder and leading G2M efforts of Twine, whose mission is to build the next generation AI workforce. Previously Omri was a Partner at Dell technologies Capital, a Tier 1 VC firm. His career also includes significant stints at Grove VC and Claroty. As a seasoned entrepreneur, Twine marks his second foray into founding a company. Omri earned a degree in Electrical Engineering from the University of Tel Aviv. He leverages his technical expertise and practical insights to drive digital transformation. Omri maintains close ties with a network of cyber leaders to foster innovation and share insights.

From Reactive to Proactive: AI Agents in Identity and Access Management

IT teams chase orphaned accounts, duplicate identities, and systems that never sync. They fix one problem and three more appear. This is reactive work. It kills productivity and creates risk. AI agents change this. They hunt problems before problems hunt you. They clean data while you sleep. They prevent the fires instead of fighting them. Real deployments show 80% less manual cleanup. Better compliance. Happier users. This presentation shares five practical lessons from real-world deployments of AI Agents for identity data remediation, covering both technical approaches and organizational considerations for gaining stakeholder buy-in. Attendees will learn actionable strategies that align with Gartner's recommendations for modern identity governance.

Presentation video #3
Digitalk Cyber Sec eSummit 2025
Gergely Orosz-Rizák
MWT Solutions S.A - Head of sales activites in Hungary

Leader and team member of MWT Solutions, ManageEngine solutions  expert with experience from business process supporting software solutions and IT security.

Zero Trust and Automated IT Security in Practice – with ManageEngine Solutions

The Zero Trust model and automated IT security are becoming increasingly important in the modern enterprise environment, especially with the rise of hybrid and cloud-based systems. This presentation demonstrates how the principles of Zero Trust can be implemented using ManageEngine products (such as ADManager Plus, Log360, PAM360, Endpoint Central), and how to automate privilege management, logging, incident handling, and compliance reporting. Through practical examples, the talk will show how to reduce risks caused by human error, accelerate response times, and ensure continuous compliance.

The presentation answers the following questions:

- How can the Zero Trust model be implemented with ManageEngine tools?
- What automation options exist for privilege management, logging, and incident handling?
- How do ManageEngine solutions help meet compliance requirements (e.g., GDPR, ISO 27001)?
- What are the best practices for integrating ManageEngine tools into a modern, hybrid enterprise IT environment?

Presentation video #4
Digitalk Cyber Sec eSummit 2025
Papp Dávid
CEO, Co-Founder - Tackling challenges in AI security

Dávid has a background in software development, and security has always played a key role in his work. He has been involved in both successful and unsuccessful ventures. The development of OpenShield began at the end of 2024, providing a security layer for LLM models.

Why is it difficult to protect LLM models and AI agents? Prompt Engineering vs. Prompt Attacks: The Battle for Control Over AI Minds

In addition to LLM models, MCP servers have also emerged. Their proliferation introduces new security risks, as LLMs are just as vulnerable to attacks as other systems. The main challenge lies in the diversity of attack types. Traditional security solutions alone are no longer sufficient. Moreover, MCP systems can provide direct access to corporate data, further increasing the risk.

This presentation will address the following questions:

  • Why is it important to protect LLM models?
  • What is prompt injection?
  • What challenges must be faced?

Presentation video #5

Quantum Threats, Real Solutions – The Future of Secure Data Sharing

The rapid advancement of quantum computers could fundamentally change our current understanding of data security. Most encryption methods widely used today may become vulnerable within a few decades, making the research and development of quantum-proof solutions essential. This presentation will review the theoretical and practical challenges of quantum-proof encryption, introduce the principles of post-quantum cryptography, and discuss methods already available for achieving future-proof data transmission. The goal of this presentation is to highlight the importance of quantum security in data sharing and communication through practical examples.

Call for Paper

Digitalk Cyber Sec eSummit 2025

The Digitalk Cyber Sec eSummit 2025 is a virtual event series showcasing the latest trends, technologies, and experts in cybersecurity.
Registration