Skip to content

Presentations

Inspiring Cyber-security Dialogues: Access our impactful presentations, bridging the gap between research and real-world solutions.

2025

2025: Another Year of Enlightening Cyber-security Dialogues has started. Access presentations that encapsulate the year’s most influential talks, workshops, and conferences, driving the conversation forward.

Evaluating Organization Security: User Stories of European Union NIS2 Directive

Evaluating Organization Security: User Stories of European Union NIS2 Directive

Security in Automated Manufacturing: A Function-Driven Approach

Security in Automated Manufacturing: A Function-Driven Approach

Forensic Readiness and Privacy: Towards Resolving Software Goal Conflict

Forensic Readiness and Privacy: Towards Resolving Software Goal Conflict

IoV-TwinChain: Predictive Maintenance of Vehicles in Internet of Vehicles through Digital Twin and Blockchain

IoV-TwinChain: Predictive Maintenance of Vehicles in Internet of Vehicles through Digital Twin and Blockchain

Leveraging Blockchain-Enabled Digital Twins in Healthcare

Leveraging Blockchain-Enabled Digital Twins in Healthcare

Towards Developing a Blockchain Selection Toolkit for Smart Cities

Towards Developing a Blockchain Selection Toolkit for Smart Cities

Moving Post-Quantum for customers and community 

Moving Post-Quantum for customers and community 

Quantum-Resistant Security Libraries

Quantum-Resistant Security Libraries

Post-Quantum Cryptography Standards and Roadmapping, PQC in Legislation

Post-Quantum Cryptography Standards and Roadmapping, PQC in Legislation

Postkvantová kryptografie

Postkvantová kryptografie

InfoSec Seminar Introducing the Cybersecurity Excellence Hub in Estonia and South Moravia

InfoSec Seminar Introducing the Cybersecurity Excellence Hub in Estonia and South Moravia

Usability of Penetration Testing Reports

Usability of Penetration Testing Reports

Cybersecurity Exercises

Cybersecurity Exercises

Post-Quantum Hardware Encryptors

Post-Quantum Hardware Encryptors

Post-Quantum Transition Exercises

Post-Quantum Transition Exercises

Turbe mõõtmisest

Turbe mõõtmisest

Deception-based Security Approach Leveraging Digital Twins and Blockchain

Deception-based Security Approach Leveraging Digital Twins and Blockchain

Threshold signatures on smartcards

Threshold signatures on smartcards

Open-source analysis tooling for crypto implementations

Open-source analysis tooling for crypto implementations

Security target for secure computing

Security target for secure computing

Framework for Security Level Evaluation F4SLE

Framework for Security Level Evaluation F4SLE

FREAS: Forensic-Ready Analysis Suite

FREAS: Forensic-Ready Analysis Suite

Smart System

Smart System

Understanding the Product Security Certification Ecosystem

Understanding the Product Security Certification Ecosystem

Secure Data Sharing in the Internet of Vehicles Using Blockchain-based Federated Learning

Secure Data Sharing in the Internet of Vehicles Using Blockchain-based Federated Learning

2024

2024: Another Year of Enlightening Cyber-security Dialogues. Access presentations that encapsulate the year’s most influential talks, workshops, and conferences, driving the conversation forward.

2023

2023: A Year of Enlightening Cyber-security Dialogues. Access presentations that encapsulate the year’s most influential talks, workshops, and conferences, driving the conversation forward.