Special Events & Summits
CyberMed | Hall G - P2
Cyber for the Healthcare Industry
Case Study: Editing X-Ray Images to Add or Remove Cancer
Med Tech: ML, AI and Big Data Implementation and Integration – Challenges and Opportunities I Panel
Medical and Healthcare Patents I One on One
Medical Ethics in the Cyber Era I One on One
Bio Hacking
Data Privacy in the Age of Genomic Data – Access, Management, and Ownership I Fireside Chat
Investment in Cyber: the Latest Market Trends and Strategies I Panel
Tales from the Trenches - Lessons learned from Ransomware and other Incident Response Engagements
Protecting the Healthcare Industry I Panel
Cybersecurity Insurance for Medical Practices and Malpractices I One on One
Hospitals as Critical Infrastructure – A National Security Priority
15:00–15:15
Cyber for the Healthcare Industry
15:15–15:30
Case Study: Editing X-Ray Images to Add or Remove Cancer
15:30–16:00
Med Tech: ML, AI and Big Data Implementation and Integration – Challenges and Opportunities I Panel
16:00–16:15
Medical and Healthcare Patents I One on One
16:15–16:30
Medical Ethics in the Cyber Era I One on One
17:00–17:10
Bio Hacking
17:10–17:25
Data Privacy in the Age of Genomic Data – Access, Management, and Ownership I Fireside Chat
17:25–17:45
Investment in Cyber: the Latest Market Trends and Strategies I Panel
00:00–00:00
Tales from the Trenches - Lessons learned from Ransomware and other Incident Response Engagements
00:00–00:00
Protecting the Healthcare Industry I Panel
00:00–00:00
Cybersecurity Insurance for Medical Practices and Malpractices I One on One
00:00–00:00
Hospitals as Critical Infrastructure – A National Security Priority
Frontier Tech | Hall K - P2
09:00–09:30
Gathering and Registration
09:30–10:00
Keynote
10:00–10:30
Panel: Quantum Computing
10:30–10:45
Start-up Pitch: Scalable IoT
10:45–11:15
Mingling
11:15–11:45
Panel: Mining for Technology Diamonds - Venture role in Fostering Advanced Technologies
11:45–12:00
Start-Up pitch
12:00–12:30
Panel: Semiconductors as the base of Frontier Technologies
12:30–13:00
Start-up panel: Building a Deep Tech Company
13:00–13:30
Keynote Speaker: The Future of AI
09:00–09:30
Gathering and Registration
09:30–10:00
Keynote
10:00–10:30
Panel: Quantum Computing

Dr. Orna Berry, Scientist, entrepreneur and executive
Prof. Roee Ozeri, VP Resource Development & Public Affairs, Weizmann Institute of Science
Dr. Yonatan Cohen, CTO, Quantum Machines

10:30–10:45
Start-up Pitch: Scalable IoT

Tal Tamir, CEO, Wiliot

10:45–11:15
Mingling
11:15–11:45
Panel: Mining for Technology Diamonds - Venture role in Fostering Advanced Technologies

Florent Illat, Directeur Général, Safran Corporate Ventures
Anna Farberov, Global Venture and Innovation, Pepsico
Yonatan Beck, Partner, Global IoT Technology Ventures (GITV)
Omri Green, General Partner, Grove Ventures

11:45–12:00
Start-Up pitch
12:00–12:30
Panel: Semiconductors as the base of Frontier Technologies

Dov Moran, Managing Partner, Grove Ventures
Oliver Hsieh, General Manager, UMC BV

12:30–13:00
Start-up panel: Building a Deep Tech Company

Renana Ashkanzi, Principle, Grove Ventures 
Shir Chorev, CTO, DeepChecks
Prof. Ron Naaman, Founder, Kiralis

13:00–13:30
Keynote Speaker: The Future of AI

Dr. Kira Radinsky, Chairman and CTO, Diagnostic robotics

Plenary
09:00–09:10
Greetings
09:10–13:10
Morning Plenary
13:00–14:30
Exhibition and Lunch Break
14:30–17:35
Afternoon Plenary
14:00–14:20
Hackers Show 1
14:20–14:50
Cyber Security for Mega Events
14:50–15:20
Secrets of a Successful Cyber City and Ecosystem | Panel
15:20–15:40
What's Ahead For The Startup Nation
15:40–16:15
Investor Highlights: Cyber Market Predictions | Panel
16:15–16:45
How to Scale your Business? | Panel
16:45–17:30
Startup Innovation Challenge 2020
08:00–09:00
09:00–09:10
Greetings
09:10–13:10
Morning Plenary

Speakers From Industry and Government From Around the World

13:00–14:30
Exhibition and Lunch Break
14:30–17:35
Afternoon Plenary
14:00–14:20
Hackers Show 1
14:20–14:50
Cyber Security for Mega Events
  • Large Sporting Events In The Cyber Era 
  • Eurovision in Israel 2019: Lessons Learned
14:50–15:20
Secrets of a Successful Cyber City and Ecosystem | Panel
15:20–15:40
What's Ahead For The Startup Nation
15:40–16:15
Investor Highlights: Cyber Market Predictions | Panel
16:15–16:45
How to Scale your Business? | Panel
16:45–17:30
Startup Innovation Challenge 2020

This year’s challenge has grown bigger and better! The grand prize will be awarded to not one, but three winning startups, each representing a different subdomain or challenge within the cybersecurity market. The winning startups will gain a unique opportunity to present their innovative solution to an esteemed panel of leading U.S.-based CISOs and cybersecurity experts, in front of a live audience at the main stage of Cybertech. Each of the three startups will win a flight ticket and pass to the 2020 RSA conference in San Francisco. 

To Apply Click Here

Hall B1 - P1
ATTACK, DEFENSE, AND ADVERSARIAL ARTIFICIAL INTELLIGENCE TRACK
14:00–14:15
Uses of AI in Cyber: Attack, Defense, and Adversarial AI
14:15–14:45
Exploiting Vulnerabilities: Purpose-Built AI Programs and Infiltration I Panel
14:45–15:00
Case Study: Cyber Influence
15:00–15:35
Cyber Defense: Detect, Prevent, and Predict Using AI I Panel
15:35–16:10
Tricking the Machine - Adversarial AI I Panel
16:10–16:40
Deep Fake and Authentication I Panel
16:40–16:50
Case Study: Deep Fake
16:50–17:00
Closing Remarks by Prof. Yaron Wolfsthal
00:00–01:00
ATTACK, DEFENSE, AND ADVERSARIAL ARTIFICIAL INTELLIGENCE TRACK
14:00–14:15
Uses of AI in Cyber: Attack, Defense, and Adversarial AI
14:15–14:45
Exploiting Vulnerabilities: Purpose-Built AI Programs and Infiltration I Panel
14:45–15:00
Case Study: Cyber Influence
15:00–15:35
Cyber Defense: Detect, Prevent, and Predict Using AI I Panel
15:35–16:10
Tricking the Machine - Adversarial AI I Panel
16:10–16:40
Deep Fake and Authentication I Panel
16:40–16:50
Case Study: Deep Fake
16:50–17:00
Closing Remarks by Prof. Yaron Wolfsthal
Hall B2 - P1
CUTTING-EDGE TECHNOLOGIES TRACK
14:00–14:20
Cyber in Cloud Computing I Panel
14:20–14:45
Cloud Computing Threats: from Data Breaches, DoS, Cryptojacking, to Hijacking Accounts I Panel
14:45–15:00
The Essentials of Data Management and Data Quality in Cyber
15:00–15:20
Big Data, Autonomous Response and the Future of Privacy I One on One
15:20–15:30
Distributed Future: Using Data Science to Manipulate IoT Networks
15:30–15:45
5G and Privacy in a Hyperconnected World
15:45–16:00
The Power of Deception: Game Over for Attackers
16:00–16:30
Quantum Computing: a Cyber Game Changer | Panel
16:30–16:45
The Cybersecurity side of Cryptocurrency
16:45–17:00
Cyber Vision for 2025
01:00–02:00
CUTTING-EDGE TECHNOLOGIES TRACK
14:00–14:20
Cyber in Cloud Computing I Panel
14:20–14:45
Cloud Computing Threats: from Data Breaches, DoS, Cryptojacking, to Hijacking Accounts I Panel
14:45–15:00
The Essentials of Data Management and Data Quality in Cyber
15:00–15:20
Big Data, Autonomous Response and the Future of Privacy I One on One
15:20–15:30
Distributed Future: Using Data Science to Manipulate IoT Networks
15:30–15:45
5G and Privacy in a Hyperconnected World
15:45–16:00
The Power of Deception: Game Over for Attackers
16:00–16:30
Quantum Computing: a Cyber Game Changer | Panel
16:30–16:45
The Cybersecurity side of Cryptocurrency
16:45–17:00
Cyber Vision for 2025
Special Events & Summits
Identity Trust | Hall L - P2
14:00–16:00

To Learn More About This Special Event, Please click here.

Critical Infrastructure Protection - IT and OT Convergence | Hall M - P2
14:30–16:30

To Learn More About This Special Event, Please Click Here.

Communications In the Cyber era | Hall F - P2
14:00–17:00

To Learn More About This Special Event, Please Click Here.

Plenary
08:00–09:00
Registration
09:00–09:15
Opening Words from the Host
09:15–09:30
Special Guest Speaker
09:30–09:45
AI, ML, and Their Connection to more Sophisticated Cyber Attacks | One-on-One
09:45–10:00
Hacking Show 2
10:00–10:35
Global Cyber Challenges and Opportunities for Financial Institutions | Panel
10:35–11:10
Cyber Insurance ROI | Panel
11:10–11:25
Hacking Show 3
11:25–12:00
Data Security and Identity Authentication
12:00–12:20
Securing 5G: New Risks, New Solutions | Fireside Chat
12:20–12:35
The Purple Mode - Securing the Automotive Industry
12:35–13:00
The Latest on Critical Infrastructure Protection - IT and OT Convergence | Panel
13:00–14:15
Exhibition and Lunch Break
08:00–09:00
Registration
09:00–09:15
Opening Words from the Host
09:15–09:30
Special Guest Speaker
09:30–09:45
AI, ML, and Their Connection to more Sophisticated Cyber Attacks | One-on-One
09:45–10:00
Hacking Show 2
10:00–10:35
Global Cyber Challenges and Opportunities for Financial Institutions | Panel
10:35–11:10
Cyber Insurance ROI | Panel
11:10–11:25
Hacking Show 3
11:25–12:00
Data Security and Identity Authentication
12:00–12:20
Securing 5G: New Risks, New Solutions | Fireside Chat
12:20–12:35
The Purple Mode - Securing the Automotive Industry
12:35–13:00
The Latest on Critical Infrastructure Protection - IT and OT Convergence | Panel
13:00–14:15
Exhibition and Lunch Break
Hall B1 - P1
IT AND OT CONVERGENCE TRACK
14:00–14:10
SOAR for OT Environments - Yes or Not
14:10–14:30
Security Operations Center (SOC) Management and Challenges | Fireside Chat
14:30–14:50
Protecting the Supply Chain Ecosystem | One on One
14:50–15:10
Protecting Autonomous Vehicles from Cyberattacks | Panel
15:10–15:30
Critical Infrastructure Protection - IT and OT Convergence
INTELLIGENCE IN THE CYBERSPACE TRACK
15:30–15:45
Cyber Intelligence and Open Source
15:45–16:00
Digital Forensics - Catching Cybercriminals
16:00–16:30
Information Sharing vs. Privacy: Industry and Law Enforcement Perspective | Fireside Chat
16:30–16:45
Data on the Dark Web
16:45–17:10
Adopting Cyber Offensive Counterintelligence
17:10–17:40
Global Cyber Investigations | Panel
17:40–17:45
The Ethics of Cyber Warfare
14:00–15:30
IT AND OT CONVERGENCE TRACK
14:00–14:10
SOAR for OT Environments - Yes or Not
14:10–14:30
Security Operations Center (SOC) Management and Challenges | Fireside Chat
14:30–14:50
Protecting the Supply Chain Ecosystem | One on One
14:50–15:10
Protecting Autonomous Vehicles from Cyberattacks | Panel
15:10–15:30
Critical Infrastructure Protection - IT and OT Convergence
15:30–18:00
INTELLIGENCE IN THE CYBERSPACE TRACK
15:30–15:45
Cyber Intelligence and Open Source
15:45–16:00
Digital Forensics - Catching Cybercriminals
16:00–16:30
Information Sharing vs. Privacy: Industry and Law Enforcement Perspective | Fireside Chat
16:30–16:45
Data on the Dark Web
16:45–17:10
Adopting Cyber Offensive Counterintelligence
17:10–17:40
Global Cyber Investigations | Panel
17:40–17:45
The Ethics of Cyber Warfare
Hall B2 - P1
THE HUMAN FACTOR TRACK
14:45–15:15
Human Resources at the Heart of Cyber | Panel
14:00–14:45
The Academia's Point of View: From Research to Cyber Workforce Development | Panel
15:15–15:45
Awareness, Training, and Education | Fireside Chat
15:45–15:55
Case Study: Inside Threat
15:55–16:15
Human Error: The Scale of the Problem | One on One
16:15–16:45
Cyber Robustness: Hygiene, Awareness, and Readiness | Panel
16:45–17:00
Autonomous Cyber Agents
15:00–18:00
THE HUMAN FACTOR TRACK
14:45–15:15
Human Resources at the Heart of Cyber | Panel
14:00–14:45
The Academia's Point of View: From Research to Cyber Workforce Development | Panel
15:15–15:45
Awareness, Training, and Education | Fireside Chat
15:45–15:55
Case Study: Inside Threat
15:55–16:15
Human Error: The Scale of the Problem | One on One
16:15–16:45
Cyber Robustness: Hygiene, Awareness, and Readiness | Panel
16:45–17:00
Autonomous Cyber Agents
Special Events & Summits
Cyber In The Banking and Finance Sector | Hall I - P2
14:00–14:10
STAYING AHEAD OF THE EVER CHANGING FINANCIAL SECTOR
14:10–14:20
CERT-IL FINANCIAL CERT CASE STUDY
14:20–14:50
CYBER ATTACK TRENDS AND REAL WORLD EXAMPLES | PANEL
14:50–15:00
TECHNOLOGY DEMO
15:00–15:30
FINTECH 2020: BLOCKCHAIN, ROBOTIC PROCESS AUTOMATION, AI, AND REGTECH | PANEL
15:30–15:45
PROTECTING SWIFT INTERNATIONAL BANK TRANSFERS
15:45–16:15
CYBER INSURANCE FOR FINANCIAL INSTITUTIONS | FIRESIDE CHAT
16:15–16:30
CRYPTOJACKING AND RANSOMWARE PREDICTIONS
14:00–14:10
STAYING AHEAD OF THE EVER CHANGING FINANCIAL SECTOR
14:10–14:20
CERT-IL FINANCIAL CERT CASE STUDY
14:20–14:50
CYBER ATTACK TRENDS AND REAL WORLD EXAMPLES | PANEL
14:50–15:00
TECHNOLOGY DEMO
15:00–15:30
FINTECH 2020: BLOCKCHAIN, ROBOTIC PROCESS AUTOMATION, AI, AND REGTECH | PANEL
15:30–15:45
PROTECTING SWIFT INTERNATIONAL BANK TRANSFERS
15:45–16:15
CYBER INSURANCE FOR FINANCIAL INSTITUTIONS | FIRESIDE CHAT
16:15–16:30
CRYPTOJACKING AND RANSOMWARE PREDICTIONS
  • 18000Attendees
  • 180+Speakers
  • 200Companies
  • 90Startups
  • 160Delegations