Cyber Sec eSummit 2025

An exclusive series of educational webinars and expert interviews on the cutting edge of cyber security.

Launch date: July 1 🚀🚀🚀

Registration
Digitalk Cyber Sec eSummit 2025
Digitalk eSummit

The Digitalk eSummit event format is a unique fusion of an annual conference and an online expert community, where you can consume presentation videos at your own pace and connect with other professionals.

Explore the world of Digitalk's virtual events!

Cyber Sec eSummit 2025

The Digitalk Cyber Sec eSummit 2025 is a virtual event series showcasing the latest trends, technologies, and experts in cybersecurity. It connects professionals worldwide to share insights, discuss emerging threats, and explore innovative solutions, offering valuable content and networking opportunities for all experience levels.


Join now and explore a continuously expanding collection of video presentations.

Registration
TECH STACK
NIS2
ISO 27k
Common Criteria
Observability
Attack symulation
IoT
Cyber Security
AI
Identity Management
MFA
HOTP
TOTP
2FA
HMAC
SHA
Threat Landscape
AI-Powered Security Validation
Digitalk eSummit

Learn how Gideon Shmuel, CEO of Enigmatos, is redefining automotive cybersecurity with a holistic approach to connected fleet protection—leveraging anomaly detection and pattern analysis to ensure safe, compliant, and resilient vehicle operations in the era of connected mobility.

Join the MndTalk with Gergely Orosz-Rizák, Head of Sales at MWT Solutions, to learn about the complexities of the Hungarian IT market shaped by EU regulations and AI, and how MWT Solutions is driving efficiency by building comprehensive ManageEngine ecosystems for customers.

Learn from Justin Woody about how AI Agents are transforming Identity Governance by proactively hunting and remediating identity data issues.

Sponsoring partners

Presentations

Status:
On Air
Digitalk Cyber Sec eSummit 2025
Justin Woody
Twine - Co-Founder

From Reactive to Proactive: AI Agents in Identity and Access Management

IT teams chase orphaned accounts, duplicate identities, and systems that never sync. They fix one problem and three more appear. This is reactive work. It kills productivity and creates risk. AI agents change this. They hunt problems before problems hunt you. They clean data while you sleep. They prevent the fires instead of fighting them. Real deployments show 80% less manual cleanup. Better compliance. Happier users. This presentation shares five practical lessons from real-world deployments of AI Agents for identity data remediation, covering both technical approaches and organizational considerations for gaining stakeholder buy-in. Attendees will learn actionable strategies that align with Gartner's recommendations for modern identity governance.

This presentation will address the following questions:

  • How can AI agents proactively identify and remediate identity data issues before they become security risks?
  • What are the most common roadblocks to AI adoption in identity governance, and how can you overcome them?
  • What results have real-world organizations seen after deploying AI agents for identity cleanup and lifecycle management?

The presentation is for you, if....

  • You manage or secure user identities in enterprise IT environments.
  • You’re frustrated with manual cleanup of orphaned or misconfigured accounts.
  • You’re evaluating or deploying AI in identity governance or IAM workflows.
  • You want to improve compliance, reduce risk, and align with modern identity strategies.
Status:
On Air
Digitalk Cyber Sec eSummit 2025
Gergely Orosz-Rizák
MWT Solutions S.A - Business Development Manager
Leader and team member of MWT Solutions, ManageEngine solutions  expert with experience from business process supporting software solutions and IT security.

Zero Trust and Automated IT Security in Practice – with ManageEngine Solutions

The Zero Trust model and automated IT security are becoming increasingly important in the modern enterprise environment, especially with the rise of hybrid and cloud-based systems. This presentation demonstrates how the principles of Zero Trust can be implemented using ManageEngine products (such as ADManager Plus, Log360, PAM360, Endpoint Central), and how to automate privilege management, logging, incident handling, and compliance reporting. Through practical examples, the talk will show how to reduce risks caused by human error, accelerate response times, and ensure continuous compliance.

This presentation will address the following questions:

  • How can the Zero Trust model be implemented with ManageEngine tools?
  • What automation options exist for privilege management, logging, and incident handling?
  • How do ManageEngine solutions help meet compliance requirements (e.g., GDPR, ISO 27001)?
  • What are the best practices for integrating ManageEngine tools into a modern, hybrid enterprise IT environment?

Status:
On Air
Digitalk Cyber Sec eSummit 2025
Hom Bahmanyar
Global Enablement Officer at Ridge Security Technology
Hom is a well-rounded technology leader with 20+ years of experience working with large enterprise customers as well as global engineering, marketing and sales teams, driving innovative technologies. He’s a cybersecurity veteran with 10+ years at RedSeal, where he drove the integration and modeling of Cloud infrastructure and traditional network devices, and 10+ years at Cisco where he led engineering teams for Cisco Security Manager and IP Solutions Center product lines.  As the Engineering VP at RedSeal, he created a strong team culture with focus on execution, innovation, and customer care.  He has a passion for strong customer relationship and turning customers into loyal advocates.

Evolution of Continuous Security Validation with AI

As cyber threats grow in scale, sophistication, and automation, traditional security testing and validation methods can no longer keep pace. This presentation explores how AI-driven continuous security validation is reshaping the way organizations identify, prioritize, and remediate vulnerabilities. Attendees will gain insights into the evolving threat landscape, the core challenges faced by modern security teams, and practical strategies for staying resilient against advanced threat actors.

This presentation will address the following questions:

  • How has the cybersecurity threat landscape evolved in recent years?
  • What are the main challenges currently faced by security teams?
  • Why are traditional approaches falling short in addressing today’s security risks?
  • What practical steps can organizations take to stay ahead of modern threat actors?
  • What defines an ideal AI-powered security validation platform in today’s environment?

Status:
Coming soon
Digitalk Cyber Sec eSummit 2025
Szilárd Pfeiffer

A free software fanatic developer, a security committed engineer, a free-culture enthusiastic journalist, an
agile believer manager.

TOTP is not a silver bullet

The presentation about how such a simple security solution like TOTP can be incopmletely implemented, configured and how it may create the false sense of security.

This presentation will address the following questions:

  • How TOTP works?
  • What security issues may arise with TOTP?
  • What are the compliance requiremnt against a TOTP solution?
  • How secure are the most popular services in the point of veiw of TOTP?
  • What are the security/usablity problems of the most popular TOTP applications?
Status:
Coming soon
Digitalk Cyber Sec eSummit 2025
David Kellerman
Field CTO - Cymulate
David Kellerman is the Field CTO at Cymulate, a cybersecurity company specializing in continuous breach-and-attack simulation and exposure validation. With a strong background in customer-facing technical roles, he plays a key role in helping organizations assess and improve the real-world effectiveness of their security controls. Passionate about bridging theory and practice, he champions the use of automated, ongoing security validation to ensure resilience against evolving cyber threats.

Enhancing Cybersecurity with Continuous Attack Simulation and Threat Exposure Management

As cyber threats become increasingly sophisticated, organizations need to shift from reactive to proactive cybersecurity strategies. Attack simulation technologies offer a powerful approach to continuously validate security measures, identify vulnerabilities, and enhance overall resilience against potential threats.

The adoption of attack simulation and continuous threat exposure management technologies is a critical step toward building a resilient cybersecurity framework. These tools empower organizations to move beyond traditional defenses and maintain a strong security posture in an ever-changing digital world.

Status:
Coming soon
Digitalk Cyber Sec eSummit 2025
Papp Dávid
CEO, Co-Founder - Tackling challenges in AI security
Dávid has a background in software development, and security has always played a key role in his work. He has been involved in both successful and unsuccessful ventures. The development of OpenShield began at the end of 2024, providing a security layer for LLM models.

Why is it difficult to protect LLM models and AI agents? Prompt Engineering vs. Prompt Attacks: The Battle for Control Over AI Minds

In addition to LLM models, MCP servers have also emerged. Their proliferation introduces new security risks, as LLMs are just as vulnerable to attacks as other systems. The main challenge lies in the diversity of attack types. Traditional security solutions alone are no longer sufficient. Moreover, MCP systems can provide direct access to corporate data, further increasing the risk.

This presentation will address the following questions:

  • Why is it important to protect LLM models?
  • What is prompt injection?
  • What challenges must be faced?
Status:
Coming soon
Digitalk Cyber Sec eSummit 2025
Shaked Kafzan
CTO and Co-founder at Cervello
Shaked Kafzan is the CTO and Co-Founder of Cervello, a leading railway cybersecurity software company. He directs the technology vision and product strategy at Cervello, leveraging his leadership experience from the elite technological unit of the Israeli Intelligence Corps – Unit 81. In this role, Shaked managed nation-level cybersecurity projects and safeguarded critical national infrastructures, gaining deep expertise in computer networking, communications, and various cyber disciplines.Before co-founding Cervello, Shaked served as the Tech Lead at Argus, which was later acquired by Continental. At Argus, he tackled complex OT networks and specialized in automotive cybersecurity, demonstrating his ability to handle intricate technical challenges and deliver robust solutions.

At Cervello, Shaked continues to leverage this unique combination of skills to drive the company’s success and advance the field of railway cybersecurity

Transforming Cybersecurity into Operations with Margo: Your AI Assistant in the OT environment

This presentation will introduce Margo, Cervello’s AI-powered cybersecurity agent, designed to support real-time rail operations. We will explore how Margo leverages AI Agents and the MCP model to automate threat investigation, accelerate incident response, and improve operational decision-making across OT environments.

The presentation will answer the following questions:

  • What is Margo, and how does it support cybersecurity teams in the rail industry?
  • How do AI Agents enhance detection and response in OT and rail environments?
  • What is the MCP (Mission-Centric Processing) model, and how does Margo use it?
  • How can Margo be integrated into a live railway control center workflow?

Call for Paper

Digitalk Cyber Sec eSummit 2025

The Digitalk Cyber Sec eSummit 2025 is a virtual event series showcasing the latest trends, technologies, and experts in cybersecurity.
Registration