An exclusive series of educational webinars and expert interviews on the cutting edge of cyber security.
Launch date: July 1 🚀🚀🚀

The Digitalk eSummit event format is a unique fusion of an annual conference and an online expert community, where you can consume presentation videos at your own pace and connect with other professionals.
Explore the world of Digitalk's virtual events!
The Digitalk Cyber Sec eSummit 2025 is a virtual event series showcasing the latest trends, technologies, and experts in cybersecurity. It connects professionals worldwide to share insights, discuss emerging threats, and explore innovative solutions, offering valuable content and networking opportunities for all experience levels.
Join now and explore a continuously expanding collection of video presentations.

Learn how Gideon Shmuel, CEO of Enigmatos, is redefining automotive cybersecurity with a holistic approach to connected fleet protection—leveraging anomaly detection and pattern analysis to ensure safe, compliant, and resilient vehicle operations in the era of connected mobility.
Join the MndTalk with Gergely Orosz-Rizák, Head of Sales at MWT Solutions, to learn about the complexities of the Hungarian IT market shaped by EU regulations and AI, and how MWT Solutions is driving efficiency by building comprehensive ManageEngine ecosystems for customers.
Learn from Justin Woody about how AI Agents are transforming Identity Governance by proactively hunting and remediating identity data issues.




IT teams chase orphaned accounts, duplicate identities, and systems that never sync. They fix one problem and three more appear. This is reactive work. It kills productivity and creates risk. AI agents change this. They hunt problems before problems hunt you. They clean data while you sleep. They prevent the fires instead of fighting them. Real deployments show 80% less manual cleanup. Better compliance. Happier users. This presentation shares five practical lessons from real-world deployments of AI Agents for identity data remediation, covering both technical approaches and organizational considerations for gaining stakeholder buy-in. Attendees will learn actionable strategies that align with Gartner's recommendations for modern identity governance.

The Zero Trust model and automated IT security are becoming increasingly important in the modern enterprise environment, especially with the rise of hybrid and cloud-based systems. This presentation demonstrates how the principles of Zero Trust can be implemented using ManageEngine products (such as ADManager Plus, Log360, PAM360, Endpoint Central), and how to automate privilege management, logging, incident handling, and compliance reporting. Through practical examples, the talk will show how to reduce risks caused by human error, accelerate response times, and ensure continuous compliance.

As cyber threats grow in scale, sophistication, and automation, traditional security testing and validation methods can no longer keep pace. This presentation explores how AI-driven continuous security validation is reshaping the way organizations identify, prioritize, and remediate vulnerabilities. Attendees will gain insights into the evolving threat landscape, the core challenges faced by modern security teams, and practical strategies for staying resilient against advanced threat actors.

The presentation about how such a simple security solution like TOTP can be incopmletely implemented, configured and how it may create the false sense of security.

As cyber threats become increasingly sophisticated, organizations need to shift from reactive to proactive cybersecurity strategies. Attack simulation technologies offer a powerful approach to continuously validate security measures, identify vulnerabilities, and enhance overall resilience against potential threats.
The adoption of attack simulation and continuous threat exposure management technologies is a critical step toward building a resilient cybersecurity framework. These tools empower organizations to move beyond traditional defenses and maintain a strong security posture in an ever-changing digital world.

In addition to LLM models, MCP servers have also emerged. Their proliferation introduces new security risks, as LLMs are just as vulnerable to attacks as other systems. The main challenge lies in the diversity of attack types. Traditional security solutions alone are no longer sufficient. Moreover, MCP systems can provide direct access to corporate data, further increasing the risk.

This presentation will introduce Margo, Cervello’s AI-powered cybersecurity agent, designed to support real-time rail operations. We will explore how Margo leverages AI Agents and the MCP model to automate threat investigation, accelerate incident response, and improve operational decision-making across OT environments.

Related articles