{"id":8168,"date":"2020-07-15T10:40:01","date_gmt":"2020-07-15T08:40:01","guid":{"rendered":"https:\/\/www.free-and-safe.org\/?page_id=8168"},"modified":"2021-03-21T18:37:51","modified_gmt":"2021-03-21T17:37:51","slug":"7th-edition-zurich-2020","status":"publish","type":"page","link":"https:\/\/www.free-and-safe.org\/7th-edition-zurich-2020\/","title":{"rendered":"7th Edition – Zurich 2020"},"content":{"rendered":"\t\t
After 6 editions \u2013 held twice in\u00a0Brussels<\/strong>, and once in\u00a0New\u00a0 york,\u00a0Iguazu, Berlin\u00a0and\u00a0Geneva\u00a0<\/strong>with World-class\u00a0speakers<\/a>\u00a0\u2013 the Trustless Computing Association is happy to announce that the 7th\u00a0Free and Safe in Cyberspace Conference<\/span>\u00a0was held on January 29th 2020 on\u00a0Paradeplatz, the financial earth of\u00a0Zurich<\/strong>.<\/p> As in all previous editions, through\u00a04 Challenges<\/i>, we\u2019ll explore\u00a0new approaches,<\/strong>\u00a0technologies and certifications<\/strong>\u00a0that can\u00a0radically increase the state-of-the-art of security<\/strong>\u00a0for sensitive human digital communications and transactions\u00a0\u2013 and then for other critical AI, 5G, IoT<\/b>, and e-government systems \u2013 while\u00a0concurrently ensuring<\/b>\u00a0legitimate lawful access\u00a0<\/b>to adequately mitigate risks for criminal abuse;\u00a0in a time when\u00a0even the richest person in the World, Jeff Bezos<\/a>, cannot protect his digital private life.<\/p> Can both be achieved by\u00a0reconceptualizing cybersecurity <\/b>as the byproduct of organizational\u00a0processes\u00a0critically\u00a0involved in the entire lifecycle<\/b>\u00a0of a given IT service, by eliminating all\u00a0unverified<\/i>\u00a0trust in anything and anyone \u2013 all the way down to\u00a0CPU design<\/b>\u00a0and\u00a0fabrication oversight<\/b>\u00a0and ultimately\u00a0standards-setting and<\/b>\u00a0certification governance<\/b>?<\/p> Earlier on the same day, we’ll hold an invitation-only\u00a0Pre-Conference<\/strong>, detailed below, where leading organizations will discuss and advance the main concrete initiative that has grown out of previous editions: the Trustless Computing Certification Body.<\/strong><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/figure><\/div>
<\/figure><\/div>
<\/figure><\/div>
<\/figure><\/div>
<\/figure><\/div>
<\/figure><\/div>
<\/figure><\/div>
<\/figure><\/div>
<\/figure><\/div>
<\/figure><\/div>
<\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t
CONFERENCE -<\/span>\nVenue<\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Location<\/strong><\/h3>\nTrust Square, Poststrasse 5, Zurich.<\/strong>\n(Same location as the Conference)\nBoard Room, 2nd floor.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t