Photo by Giorgio GaleottiOwn work, CC BY 4.0, Link

EVENT SUMMARY

Free and Safe in Cyberspace – EU Edition 2016 was held in Brussels on September 22nd-23rd 2016 to catalyse a constructive dialogue and a wide informed consensus on new international standards and certification governance bodies for ultra-high assurance end-2-end IT systems – for communications, constitutional lawful access and autonomous systems – to deliver access to unprecedented and constitutionally meaningful e-privacy and e-security to all, while increasing public safety and cyber-investigation capabilities.Conceived by the Open Media Cluster (now called Trustless Computing Association), lead by Rufo Guerreschi, and co-organized by the EU EIT Digital Privacy, Security and Trust Action Line, lead by Jovan Golic.

Recent evidence suggests that nearly all IT devices and services are remotely, undetectably and scalably hackable by several actors, through state-sanctioned or state-mandated back-doors.

As a consequence, EU and US IT companies are struggling to seek ways to offer the levels of trustworthiness that both customers and constitutions require, by differentiating themselves sustainably on the basis of provable and meaningfully higher levels of trustworthiness.

We are told daily by nearly all privacy experts and government officials that we must to choose between meaningful personal privacy and enabling lawfully authorized cyber-investigations. But both are essential to democracy and freedom. What if it was not a choice of “either or”, a zero-sum game, but instead primarily a “both or neither” challenge, yet to be proven unfeasible?
Are key assets and capabilities of nations’ law enforcement, defense and intelligence themselves highly vulnerable to attackers – foreign, domestic and internal – due to the lack of sufficiently comprehensive, translucent and accountable socio-technical standards, such as in IT facility access, device   fabrication or assembly? How vulnerable are AI-driven autonomous IT systems, movable and not, to attacks via their critical socio-technical low-level subsystems?

Can the paradigm “Trust but verify” still be a sufficient when the bribery, threatening or identity theft of a single person (rarely 2), in key role in the life-cycle of a single critical component or process, can enable concurrent compromise of every instance of a given critical IT system, including communication,state surveillance, or autonomous movable devices?  Should the paradigm rather be “Trust or verify”, by deepening and extending oversight all the way to CPU designs and fabrication oversight? But how can that be made economical for wide spread adoption and compatible with feature and performance needs?

For more details on the context, see and contribute to our Challenges Backgrounder.

Play Video

speakers

Bart Preneel

Director at COSIC TU Leuven. President at International Association for Cryptologic Research. Arguably EU’s most peer-recognized IT security expert and researcher.

Jan Philipp Albrecht

Vice-Chair of the Committee on Civil Liberties, Justice and Home Affairs (LIBE) of the EU Parliament. Member of the European Parliament and Vice-Chair of its Committee on Civil Liberties, Justice and Home Affairs (LIBE Committee). A Franco-German politician from the Alliance ’90/The Greens.

Reinhard Posch

Chief Technology Officer (CIO) of the Federal Republic of Austria. Since 2001, he is Chief Information Officer (CIO) for the Federal Government of Austria responsible for strategic coordination of activities in the field of ICT including all levels of government. From 2007 to 2011 he was Chairman of the Management Board of the European Network and Information Security Agency (ENISA).

Renaud Sirdey

Research director at Commissariat à l’Energie Atomique, the French DoE. Since 2010, he has been working on the development of a practical technology for computing over encrypted data grounded in homomorphic cryptography. Coordinating EIT Digital project HC@WORKS, a use case-driven project which aims at demonstrating the practical value of homomorphic cryptocomputing in a 1st round of real-world settings.

Koen Maris

Chief Technology Officer at ATOS. A Security Expert with a unique combination of conceptual and technical competences. Previously Chief Security Officer at Telecom Luxembourg. ATOS is one of the top 5 EU IT security companies with 9bn€ revenue in 2015. He has 18 years of experience in the IT domain and for customers in various business sectors.

Marit Hansen

Data Protection Supervisor of the State of Schleswig-Holstein of the Federal Republic of Germany. Data Protection Supervisor of the State of Schleswig-Holstein of the Federal Republic of Germany. The Privacy Commissioner of Schleswig-Holstein, Marit Hansen, is head of ULD. ULD is responsible for both freedom of information as well as data protection at private and public sector entities seated in Schleswig-Holstein.

Jaap - Henk Hoepman

Associate professor at the Institute for Computing and Information Sciences of the Radboud University Nijmegen. Associate professor at the Institute for Computing and Information Sciences of the Radboud University Nijmegen. Director of the Privacy & Identity Lab. Member of the Digital Security group. Author of “The Second Crypto War Is Not about Crypto” and “Revocable Privacy: Principles, Use Cases, and Technologies“

Jovan Golic

Privacy, Security and Trust Action Line Leader of EIT Digital. Privacy, Security and Trust Action Line Leader of EIT Digital. Renowned cryptanalyst and cryptographer. EIT Digital manages, through Innovation and Education action lines, about 80M€ yearly of EU funds for close-to-market IT innovation, research and education co-funding.

Rufo Guerreschi

Executive Director at Trustless Computing Association. Project Lead at the User Verified Social Telematics project and the Trustless Computing Initiative. Long-time activist for the promotion of democracy within and through the use of IT.

Romano Stasi

Managing Director of ABI Lab since 2003.
He has lead joint research project and awareness campiagn in the field of banking innovation, with an enphasis on security. Previously at CapGemini and Accenture.

Achim Klabunde

Head of Sector IT Policy at European Data Protection Supervisor. Formerly EU Commission Team Leader of Privacy and Trust in Electronic Communications.

Paul Nemitz

Director for Fundamental Rights and Union Citizenship in the EU Commission’s Directorate-General for Justice and Consumers.
He has held posts in the Legal Service of the European Commission, the Cabinet of the Commissioner for Development Cooperation and in other Directorates-General.

Roman Yampolskiy

World-renowned AI superintelligence safety expert and professor. Author of Artificial Superintelligence. Focused on AI Containment (isolation). Active in popular media channels.

Ulrich Seldeslachts

CEO of LSEC, a not for profit industry association focused on Information Security in Europe, based in Belgium and with operations in the Netherlands, UK and Germany.
LSEC is a European Cyber Security Cluster, bringing together over 235 Core Members, e.g. providers, technology developers, integrators, advisory and research groups.

Erik Duyck

An Electronics Engineer, with a specialization in ICT and he also holds an MBA. He joined EIT Digital, to leverage his 15 years of Corporate Experience, followed by 5 years of Start-up Experience. Specializations are Sales, Business Development & HR in Sectors like Automotive, Precision Instruments, Energy & Consumer Goods.

David Meyer

Berlin-based senior technology writer at Fortune.
Specialising in connected rights, privacy, policy, communications. Previously at Gigaom and POLITICO Europe. Has written for ZDNet, BBC, the Guardian.

Jennifer Baker - Moderator

Brussels-based Europe Correspondent at Arstecnica.com, leading IT security portal.
Jennifer Baker has been a journalist in print, radio and television for nearly 20 years, the last seven specialising in EU policy and legislation in the tech sector.

program

PROGRAM – DAY 1

08.30 – Coffee Break for attendees and speakers
09.00
– Welcome and introduction by organizers. (Rufo Guerreschi)
09.10 – Intro Keynote to the 4 Challenges by Jovan Golic – “Cyberspace Jungle: Where We Are and What to Do“.

  •  If so, how? What standards, standard setting and certifications processes can enable users to reliably assess their actual trustworthiness? What scale of investments are needed? How likely is it that they would sustainably be legally allowed?  (Backgrounder on Challenge A)

Moderators: Jennfier Baker (ArsTechnica)
Panellists: Diego Naranjo, Bart Preneel, Koen Maris, Renaud Sirdey, Jovan Golic, Achim Klabunde, Rufo Guerreschi.
09.30 – Intro: Intro to Challenge A by Rufo Guerreschi
09.40 – Flash Keynotes by panellists + QAs
10.00 – Panel
10.40 – QA with the audience.

10.50 – Keynote by Reinhard PoschChief Information Office of the Federal Republic of Austria “Prospects for upgrading IT security standards and certification to a fuller respect of the EU Charter and national constitutions, for citizens privacy, national soveriegnty and cyber-investigation integrity”.
11.10 – Coffee Break

Moderators: Jennifer Baker (ArsTechnica)
Debaters: Japp Hoepman, Reinhard Posch, Bart Preneel, Jovan Golic, Marit Hansen, Koen Maris, Achim Klabunde, Rufo Guerreschi, Diego Naranjo (video Message by Max Schrems)
11.25 – Intro: Intro to Challenge B by Rufo Guerreschi
11.35 – Flash Keynotes by panellists + QAs
11.55 – Panel
12.40 – QA with audience

13.00 – Light lunch break for attendees and speakers
14.00
– Keynote by Renaud Sirdey ““Towards new privacy-by-design services by means of practical fully homomorphic encryption” + 10-minute QA
14.45 – Keynote by Bart Preneel “Rethinking security architectures” + 10-minute QA
15.20 –  Coffee Break

  • Can ultra-high assurance ICT standards, applied to their most critical deterministic sub-systems, contribute substantially to AI safety? (Backgrounder or Challenge C)

15.35 – Intro to Challenge C by Rufo Guerreschi
15.45 – Keynote by Roman Yampolskiy (Skype video conf) + 10-minute QA
16.15 – Keynote by Stuart Armstrong (video message)
16.35 – Panel

Moderator: David Meyer (Fortune)
Panellists: Bart Preneel, Roman Yampolskiy, Rufo Guerreschi, Jaap-Henk Hoepman,
QA with audience

17.40 – Summary of the day by organizers.
17.45 – END of WORKS for DAY 1
21.00-22.30 –  Dinner for panellists, speakers’ and special guests’

PROGRAM – DAY 2

08.40 – Coffee Reception
09.10 –
 Intro to day 2 by the organizers

  • What constituent processes can ensure a timely, effective and democratically efficient implementation – by a critical mass of actors – of meaningfully-enforceable EU or international treaties for ultra-high assurance IT standards setting and certification processes? (Backgrounder on Challenge D)

Moderator: David Meyer (Fortune)
Panelists: Reinhard Posch, Achim Klabunde, Marit Hansen, Rufo Guerreschi

11..00 – Coffee Break
11.15 –
  Keynote by Paul Nemitz “Incentives to invest in cybersecurity under the new data protection Regulation”
11..30 – Flash Keynotes + QAs by panellists.

  • Startups, scaleups and large companies alike need ways to sustainably differentiate themselves in the market on the basis of the security of their offerings, but they are often unable to prove that to customers in the absence of comprehensive and reliable benchmarks. How can industry, citizen associations and public institutions work together to solve these issues?

Moderator: David Meyer (Fortune)
Panelists: Ulrich Seldeslachts, Erik Duyck, Raoul Chiesa, Jovan Golic, Rufo Guerreschi, Artur Pylak (video link)

12.40   Keynote by Jan Albrecht (Member of the European Parliament and Vice-Chair of the Committee on Civil Liberties, Justice and Home Affairs (LIBE).
13.00 – Light lunch break for attendees and speakers
14.00
– Keynote by Romani Stasi: “Challenges and hopes in the medium term for the integrity and confidentiality of e-banking offering”

  • Recent breaches have highlighted the challenges of protecting against persistent and pervasive attacks that challenge at root the trust of banks. The confidentiality and integrity of banking e-service seems ultimately constrained by that of terribly vulnerable client-side devices. Cryptocurrencies have raised hopes but also many doubts. What are the opportunities of combining recent advances, like end-2-end encryption and blockchain, with and ultra-high assurance IT endpoint security?

Moderator: David Meyer (Fortune)
Panellists: Raoul Chiesa, Romano Stasi, Roberto Baldoni (health issue), Artur Pylak (health issue), Rufo Guerreschi.

15.30 – Keynote by Roman Yampolsky (via Skype) on “Long Term AI Safety” + 5 minute QA

  • Submittal is open to all till Sept 18th. The two best proposals from audience will also be accepted for presentation.

Moderator: Jovan Golic

15.45 – Proposals Presentations:

17.00: Open discussion
17.30 – Closing Statements by panellist and audience
21.00-22.30 –  Dinner for panellists, speakers’ and special guests’ 

video

organizer

The Trustless Computing Association is a non-profit organization, based in Zurich, that has aggregated World-class partners and advisors to build open IT technologies, certifications and ecosystems that can deliver levels of trustworthiness that are radically higher than state-of-the-art.Together with its spin-off startup TRUSTLESS.AI – based in Zurich – the associaiton has been building (1) Trustless Computing Certification Body, a new IT security standards-setting, certification body, aimed at radically-unprecedented levels of trustworthiness, while at once solidly enabling legit lawful access and (2) building the Seevik Pod and Net, an initial open computing base, ecosystem and IT device, compliant to such new certifications.

Sponsor

Bart Preneel

Director at COSIC TU Leven.

Bart Preneel is the Director at COSIC TU Leuven, and the president at International Association for Cryptologic Research. He received the Electrical Engineering degree and the Doctorate in Applied Sciences from the Katholieke Universiteit Leuven (Belgium). He is currently full professor (gewoon hoogleraar) at the Katholieke Universiteit Leuven. He has been visiting professors at the Technical University of Denmark (2007), Graz University of Technology in Austria (1997-2006), the University of Bergen in Norway (1997-2001), Ruhr-Universitaet Bochum in Germany (2001-2002) and at the University of Ghent (1994-2002). He is a scientific advisor of Philips Research (the Netherlands). During the academic year 1993-1994, he was a research fellow of the EECS Department of the University of California at Berkeley. His main research interests are cryptology and information security. He has authored and co-authored more than 200 scientific publications and is inventor of two patents. He was president of the IACR (International Association for Cryptologic Research) and he is a member of the Editorial Board of the Journal of Cryptology, the IEEE Transactions on Information Foresnsics and Security, and the International Journal of Information and Computer Security. He is also a Member of the Accreditation Board of the Computer and Communications Security Reviews (ANBAR, UK). He has participated to more than 20 research projects sponsored by the European Commission, for four of these as project manager. He is currently project manager of the European Network of Excellence ECRYPT, which groups more than 250 researchers in the area of cryptology and watermarking

Jan-Philipp-Albrecht

Jan Philipp Albrecht

Vice-Chair of the Committee on Civil Liberties, Justice and Home Affairs (LIBE) of the EU Parliament.

Albrecht studied law in Bremen, Brussels and Berlin and worked for the Walter Hallstein Institute for European Constitutional Law in Berlin. He graduated in information and communications technology law from the Universities of Hanover and Oslo. He was also a spokesman of the Green Youth in Germany from 2006 to 2008. He joined the German Green Party in 1999 and held various posts at local, regional and federal level. He led working groups and pressed political campaigns especially in the fields of civil liberties, legal affairs and constitutional issues. Albrecht became an anti-nuclear activist very early in his career, prompted by the problems with a nuclear waste storage facility in his home town, and has taken part in demonstrations against the transport of nuclear waste in his region. He later explained that these experiences provoked his commitment to civil liberties and democracy, in particular with regards to new technologies[citation needed]. His commitment to data protection and other issues of civil rights in the digital age have become a defining point in his political career. In March 2018, Albrecht was elected as the successor of Deputy Minister-President of Schleswig-Holstein, Robert Habeck, who concurrently holds the position of chairman of the Green Party. Albrecht will not assume office before late 2018. In this capacity, he will also serve as State Minister for Energy, Agriculture, Environment and Digitization in the government of Minister-President Daniel Günther. To some, he was even hailed the “King of Data Protection.

Reinhard Posch

Chief Information Officer for Austria (Since 2001). Since 2005 Head of the Digital Austria platform. Scientific Director of the A-SIT Austrian Secure Information Technology Center (Since 1999), which sets state secret cybersecurity standards (member of SOGIS)

Prof. Dr. Reinhard Posch is member of many professional societies: IEEE, ACM, OCG (member of the board of the Austrian Computer Society), OGI (Oesterreichische Gesellschaft für Informatik), ACONET, OeMG (Oesterreichische Mathematische Gesellschaft), GME (Microelectronic society) etc. He was the Austrian representative in IFIP TC6 (Communication) as well as IFIP TC11 (Computer Security). Besides this, Reinhard Posch is member of the Working Group on security of payment systems with chip cards of the Austrian National Bank. He worked with the OECD group of experts on cryptography in preparing the OECD guidelines for cryptographic policies. At the national level, he was consulting the Federal Chancellery, the Ministry of the Interior and other public institutions on matters of security and cryptography. As the CIO for the Federal Government, Reinhard Posch is primarily involved in the strategic coordination of activities in the field of information and communications technology that concern more than one ministry. He specialized in ‘Applied Information Processing and Communications Technology’, and as Scientific Director of the Austrian Secure Information Technology Centre. The main efforts are computer security, cryptography, secure hard- and software, and eGovernment. He also helped Greece to recover from the economic crisis by working with the Reichenbach Group to assist implementing innovation in the Greek eGovernment. Reinhard was later awarded the Grand Decoration of Honour in Silver for Services to the Republic of Austria.

Renaud-Sirdey

Renaud Sirdey

Research director at Commissariat à l’Energie Atomique, the French DoE.

Renaud Sirdey is a Research Director at Commissariat à l’Energie Atomique (CEA), the French DoE. His main research interests include applied cryptography, compilation, parallelism and discrete optimization. Prior to his current responsibilities, after spending around 10 years as a system architect in the telecom industry, he most notably led the research team which designed a complete industry-grade dataflow compiler for the 256 cores MPPA architecture as well as served as head of the Embedded Real Time & Security Lab. As early as the end of 2010, while leading a CEA internal research project on cloud computing security, Renaud started to work on compilation and RTE for building a practical homomorphic encryption-based cryptocomputing technology. At present, he is mainly working towards the development of this technology through the leadership or contribution to several R&D projects on that topic and which have recently lead to the release of the open-source Cingulata FHE compiler. Since 2015-16, my activities in cryptography have also started to broaden beyond FHE including work on implementation security as well as as lightweight symmetric encryption. On the more academic side, I am the author or co-author of over 50 refereed research papers, several popular science papers, as well as more than 10 patents. Specialties: applied cryptography; compilation; parallel computing; combinatoric optimization; graph theory; dependability engineering; software engineering; statistics.

Koen-Maris

Koen Maris

Chief Technology Officer at ATOS. 

Koen Maris is Chief Technology Officer in the field of cyber security for ATOS in the region of the BeNeLux and the Nordics. Together with his team he scouts for new technologies and how to embed them into new services for the organization to serve their customers. He is recognized as a distinguished expert in the organization. He started his IT career as a software developer. This experience provided solid background in complex environments and a basis in the rollout of challenging IT projects. After a few years, he swapped development for ethical hacking because of a natural curiosity to flaws in systems. This was the start of technical career in IT security, however due to rise of security problems his career evolved from ethical hacking to security solutions integration and eventually to the more managerial side of security. He has been CISO and security officer preceding his current role (since 2015) as a Chief Technology Officer at Atos. He advises large organizations in a multi-industry environment to think on a long-term basis on Cyber Security and addresses complex security topics in layman terms for board of directors and executive committees. Koen Maris serves as a trusted advisor for many organizations and is becoming a known speaker that challenges his audience and questions current applied security models.

Marit Hansen

Data Protection Supervisor of the State of Schleswig-Holstein of the Federal Republic of Germany.

Marit Hansen is a German computer scientist and privacy expert. Since 2015 she has been the Data Protection Officer of Schleswig-Holstein. Her work focuses on Privacy Enhancing Technologies (PET) , Identity Management, Anonymity, Pseudonymity, Data Security, Technical Data Protection and Privacy by Design and Privacy by Default. She was appointed by the European Commission in 2007 as an expert in the Working Group on Privacy & Technology of the European Network and Information Security Agency (ENISA). Until 2008 she was a spokeswoman for the PET Group of the Society for Computer Science. As part of the recurring event “Data Protection – Law and Technology”, she gives lectures at the Institute of Computer Science of the Christian-Albrechts-University Kiel. She was also a lecturer at the Multimedia Campus Kiel and at the University of Applied Sciences in Kiel. In the ULD she was responsible for the EU-funded projects FIDIS , PRIME , PrimeLife and ABC4Trust . She was appointed as the successor to Thilo Weichert to the head of the Independent Center for Privacy Protection in July 2015, and has been a member of the Federal Government’s Data Ethics Commission since July 2018 .

Jaap-Henk-Hoepman

Jaap - Henk Hoepman

Associate professor at the Institute for Computing and Information Sciences of the Radboud University Nijmegen.

Jaap-Henk Hoepman studied computer science at the Rijksuniversiteit Groningen, the Netherlands, and obtained his PhD at the University of Amsterdam based on work done at the Centre for Mathematics and Computer Science (CWI). Currently he is an associate professor at the Institute for Computing and Information Sciences of the Radboud University Nijmegen, and principal scientist of the Privacy & Identity Lab. He is also an associate professor in the IT Law section of the Transboundary Legal Studies department of the Faculty of Law of the University of Groningen, and a researcher at the Tilburg Institute of Law, Technology, and Society (TILT). His research interests focus on privacy by design, and privacy friendly protocols for identity management and the Internet of Things. He also maintains a blog covering his research and activities, and he is a columnist for the Financieele Dagblad (FD, a major Dutch newspaper) and a regular guest on the Dutch national radio news show Nieuws en Co.

Jovan Golic

World renowned cryptographerSenior Technical Leader, Security Lab at Telecom Italia. Former Action Line Leader for Privacy, Security & Trust for EU EIT ICT labs.

 

Jovan Golic has been working in the field of information security for more than three decades, both in academic and industrial world. In his current position at the Security Lab of Telecom Italia Group, he has been working on a number of projects related to data anonymization and pseudonymization, format-preserving and syntax-preserving encryption, pseudorandom number generation and stream ciphers, true random number generation in hardware, secure hardware implementations, secret sharing and key agreement protocols, intrusion detection, statistical anomaly detection, biometric authentication, authentication in ad hoc networks, security in information-centric networks, and embedded SIM protocols. He has been also involved in startup creation and delivering services and products to the market.

Rufo Guerreschi

Executive Director of the Trustless Computing AssociationCEO of its spin-off TRUSTLESS.AIFounder of the Free and Safe in Cyberspace conference series.

Executive Director of the Trustless Computing Association. CEO of  TRUSTLESS.AI Founder of the Free and Safe in Cyberspace conference series. IT security entrepreneur, expert and activist with 20 years of experience. Founded and exited e-democracy startup Participatory Technologies. At 4thpass, acquired by Motorola, he sold +$10M java mobile app stores, including to Telefonica. Founder of the Trustless Computing Association. Launched the Free and Safe in Cyberspace event series.As CEO at Open Media Park, he brought the valuation of the planned EU’s 2nd largest IT/media park from €3m to €21m.

Romano Stasi

Managing Director of ABI Lab since 2003.

Romano Stasi graduated in Mechanical Engineering in 1993 at the University of Rome La Sapienza, where he achieved an MBA in 1998 at the Bocconi University in Milan. He is the Managing Director of ABI Lab, the Banking Research & Innovation Centre promoted by the Italian Banking Association. He is also Chief operating officer of CERTFin, the Italian CERT (Computer Emergency Response Team ) dedicated to the banking sector. He has relevant work experience on B2B relationship, regarding in particular make or buy choices, marketing activities and process reengineering with a strong focus on the ICT solutions. He was a managing consultant for international consulting firms such as Accenture and Cap Gemini Ernst&Young developing projects in the Financial Services and ICT sector. He had the responsibility as E-business leader in GE Oil&Gas to define and implement the world wide B2B e-business strategy.

Achim Klabunde

Head of Sector IT Policy at European Data Protection Supervisor.

Achim Klabunde heads the IT Policy group at the European Commission Data protection supervisor. In previous roles, he was at the European Commission, as a member of the team for the preparation of the Data protection reform in the Directorate-General for Justice. Before that, he led the Telecommunications Data Protection Directive team at the 2009 Telecom Reform. From 2002 to 2006, he was a project consultant for the Support for eHealth, eGovernment, ITSecurity and data protection projects. After studying computer science and communications research and Graduated as a computer scientist from the University of Bonn, he worked 15 Years in IT and communications as a software developer, project manager and IT manager.

Paul Nemitz

Director for Fundamental Rights and Union Citizenship in the EU Commission’s Directorate-General for Justice and Consumers.

Paul F. Nemitz is the Director responsible for Fundamental rights & Union citizenship in the Directorate-General Justice of the European commission. Before joining DG Justice, he held posts in the Legal Service of the Commission, the Cabinet of Commissioner Nielson, and in the Directorates General for Trade, Transport and Maritime Affairs. He has a broad experience as agent of the Commission in litigation before the European Courts and he has published extensively on EU law. Nemitz was admitted to the Bar in Hamburg and for a short time was a teaching assistant at Hamburg University. He obtained a Master of Comparative Law from George Washington University Law School in Washington, D.C., where he was a Fulbright grantee. He also passed the first and second cycle of the Strasburg Faculty for comparative law, with the support of a grant by the German Academic Exchange Service (DAAD).

Roman Yampolskiy

Long-term AI and IT security expert, author and professor. Director of the Cyber Security Lab. Author of “Artificial Superintelligence: a Futuristic Approach

Dr Roman V. Yampolskiy is a Tenured Associate Professor in the Department of Computer Engineering and Computer Science at the Speed School of Engineering, University of Louisville. He is the founding and current director of the Cyber Security Lab and an author of many books including Artificial Superintelligence: a Futuristic Approach. During his tenure at UofL, Dr. Yampolskiy has been recognized as: Distinguished Teaching Professor, Professor of the Year, Faculty Favorite, Top 4 Faculty, Leader in Engineering Education, Top 10 of Online College Professor of the Year, and Outstanding Early Career in Education award winner among many other honours and distinctions. Yampolskiy is a Senior Member of IEEE and AGI, Member of Kentucky Academy of Science, and Research Advisor for MIRI and Associate of GCRI. Roman Yampolskiy holds a PhD degree from the Department of Computer Science and Engineering at the University at Buffalo. He was a recipient of a four year NSF (National Science Foundation) IGERT (Integrative Graduate Education and Research Traineeship) fellowship. Dr Yampolskiy’s main areas of interest are AI Safety, Artificial Intelligence, Behavioral Biometrics, Cybersecurity, Digital Forensics, Games, Genetic Algorithms, and Pattern Recognition. Dr Yampolskiy is an author of over 100 publications including multiple journal articles and books. His research has been cited by 1000+ scientists and profiled in popular magazines both American and foreign.

Ulrich Seldeslachts

Ulrich Seldeslachts

CEO of LSEC, a not for profit industry association focused on Information Security in Europe, based in Belgium and with operations in the Netherlands, UK and Germany.

Ulrich Seldeslachts is executive director of LSEC.eu, a not for profit industry association focused on Cyber Security and Data Protection in Europe, based in Belgium and with operations in the Netherlands, UK and Germany. LSEC is a cyber security catalyst, bringing together enterprise and government users, with industrial ICT Security expertise and academic experts and researchers. As a spinoff of KU Leuven University, LSEC is a thought leader on Cyber Security since 2002. Next to GDPR and data protection, LSEC has been active in domains of Cyber Threat Intelligence (CTI), Insider Threats, and Cyber Security Market Analysis. Prior to LSEC, Ulrich was responsible for the corporate development of a US-European Broadband wireless operator (Sprint-Clearwire), held operational ICT security positions at Orange and ran Cybersecurity investments at a Corporate Venture Capital. Ulrich has been coordinating digital transformations since 1996, operating the first commercial websites for large international companies such as Royal Dutch Shell, KBC bank, Interleasing, and Food Lion – Delhaize group.

Erik Duyck

Erik Duyck

An Electronics Engineer, with a specialization in ICT and he also holds an MBA.

Erik Duyck is an electronics engineer and business development accelerator at EIT Digital, a leading European digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. They deliver breakthrough digital innovations to the market and breeds entrepreneurial talent for economic growth and improved quality of life in Europe. It does this by mobilising a pan-European ecosystem of almost 200 top European corporations, SMEs, start-ups, universities and research institutes. He currently works out of Eindhoven, and recently returned from a mission in Silicon Valley, to further experience Digital Transformation, for the benefit of their scale-ups, corporate partners & our professional education. As an engineer, he likes to be inspired. In turn, he likes to inspire others with empathy.

David-Meyer

David Meyer

Berlin-based senior technology writer at Fortune.

David Meyer is a freelance technology journalist specialising in connected rights, policy, communications technology, emerging markets and emerging tech. His early journalistic career was spent in general news, working behind the scenes for BBC radio and on-air as a newsreader for independent stations. David’s main focus is on communications, of both the fixed and wireless varieties, as well as internet technologies, regulation and mobile devices. He is based in Berlin.

Jennifer-Baker

Jennifer Baker

Brussels-based Europe Correspondent at Arstecnica.com, leading IT security portal.

Jennifer Baker is an EU tech policy reporter with 18 years experience as a journalist – freelance, remote, and in-house. She has over eight years of experience in Brussels reporting on EU technology, politics and legislation. Her skills include translating technical jargon, legalese & policy-speak into understandable, engaging English. Jennifer also has many contacts bursting with tech influencers and Brussels insiders, as well as Great on-air presentation skills including, live breaking news. She is a renowned live event moderator with in-depth knowledge of EU policy & the tech sector and expert in event reports and analysis publications for knowledgeable, targeted audiences. She was named in Politico’s Top 20 Women Shaping Brussels in 2017, ranked in Onalytica’s Top 100 Global Influencers on Data Protection 2016, and an expert council member, with a good technology collective.