0900 - 0950
Registration & Welcome Coffee
***********************************************
0950 - 1000
Opening speech
Moderator: Yugo Neumorni, CIO Council President
Watch video here.
***********************************************
1000 - 1020
Title Session: Transforming Data Protection into Data Resilience
Synopsys: This session will cover the evolution from data protection to data resilience, focusing on ensuring data recoverability and integrity against various threats, and highlighting advanced tools and practices for enhanced business recovery and reduced downtime.
Speaker: Ionut Rosca, Data Protection Solutions Specialist, Dell Technologies
Watch video here.
***********************************************
1020 - 1040
Title Session: MetaDefender Sandbox™ & AI: Redefining Security - Practical Use Cases in Critical Sectors
Synopsys: This session will show how MetaDefender Sandbox™, leveraging AI, significantly improves threat detection for Finance, Government, and Energy.
Speaker: George Cherecheș, Director of Solutions Engineering, International, OPSWAT
Watch video here.
***********************************************
1040 - 1100
Title session: AI-Driven Behavioral Analytics: Transforming User Data into Actionable Intelligence
Synopsys:This presentation explores how AI-powered behavioral analytics can transform user data into actionable threat intelligence. By using machine learning to detect anomalies, organizations can quickly identify insider threats and respond before incidents escalate. Real-world examples and recent AI research will illustrate how this proactive approach reduces risk and enhances security resilience
Speaker: Ran Mishli - Lead Solution Consulting OpenText
Watch video here.
***********************************************
1100 - 1120
Title Session: SecureID Biometric Identity: Your face is your key.
Synopsys: Imagine a world where your face is the only key you need to unlock your digital identity. With the rise of biometric technology, facial recognition is transforming the way we interact with the world around us. Gone are the days of juggling passwords, bank cards, and access keys. Your face becomes the ultimate security token, seamlessly granting you access to everything from banking to shopping, travel, and beyond. By integrating biometric data into everyday transactions, we’re stepping into a future where your identity is tied directly to your unique features. No need for phones, cards, or even cash—just look, and you're in. This shift represents not just convenience, but a revolution in security, privacy, and simplicity. Welcome to the era of face-powered digital identity.
Speaker: Mike Draghici | CTO PowerDynamic
Watch video here.
***********************************************
1120 - 1145
************************************************************
1120 – 1145 Coffee Break
************************************************************
***********************************************
1145 - 1205
Title Session: Securing Tomorrow: Building OT Cyber Resilience with SentryOT
Synopsys: As digital transformation accelerates across the energy sector, organizations face rising cyber threats targeting critical operational technology (OT) systems. SentryOT addresses these challenges and delivers cyber-operational excellence while supporting full alignment with NIS2 compliance requirements. Our platform ensures early incident detection, seamlessly correlates network, security, and operational data, and offers advanced incident alerting and reporting tools for confident decision-making. Discover how SentryOT transforms complexity into clarity and resilience into a strategic advantage. Secure your future—start building your OT cyber resilience today
Speaker: Mircea Stremtan, Sales Director, SentryOT
Watch video here.
***********************************************
1205 - 1225
Title Session: DORA-Driven Transformation: Aligning Cybersecurity with Business Objectives
Synopsys: DORA helps organizations align cybersecurity with business goals by focusing on key pillars like ICT Risk Management, Cyber Incident Handling & response, Information sharing, resilience testing and 3rd party assessment. It shows that the compliancy with DORA reduces cybersecurity risks while improving security and business resilience. The presentation encourages viewing DORA as an opportunity for continuous business improvement, not just a regulatory requirement.
Speaker: Mohamed Mohamed-Salih, Cybersecurity Services Tower Lead, Stefanini
Watch video here.
***********************************************
1225 - 1310
PANEL 1 - Understanding the Impact of NIS2 and DORA – A New Era for Cybersecurity and Operational Resilience in the EU
"As cyber threats grow more sophisticated and persistent, the European Union is responding with a new generation of regulatory frameworks designed to strengthen cybersecurity and digital resilience across critical sectors. Two landmark regulations—the NIS2 Directive and the Digital Operational Resilience Act (DORA)—represent a significant shift in how organizations must manage risk, ensure compliance, and protect critical services.
The NIS2 Directive expands the scope of the original NIS Directive, now covering more sectors and introducing stricter obligations for risk management, incident reporting, and supply chain security. It aims to harmonize cybersecurity across member states and push organizations to elevate their security posture.
On the other hand, DORA is tailored specifically for the financial sector, establishing a comprehensive framework for managing ICT risks, testing digital resilience, and ensuring continuity even in the face of major disruptions. It addresses not only internal risks but also the growing dependence on third-party technology providers.
Together, NIS2 and DORA set a new standard for cyber maturity, governance, and operational preparedness. They pose both a challenge and an opportunity: to rethink cybersecurity as a strategic pillar of business resilience and trust.
This panel will explore the practical implications, challenges, and opportunities that these regulations bring, and how companies can turn compliance into a competitive advantage.ntain it over time?
- Challenges and strategy for the NIS2 long-term compliance.
- Manage the Third party compliance and the supply chain
- Best cyber strategy and common measures for NIS2 compliance"
Speakers:
- Mohamed Mohamed-Salih, Cybersecurity Services Tower Lead, Stefanini
- Alexandru Dumitru Musat, Cyber Security Consultant, Bit Sentinel
- Gabriel Dinu, Directoratul National de Securitate Cibernetica
- Florina Neag, CISO EON Romania, CIO Council member
- Eusebiu Rotaru, Director SOC, Electrica Distributie, CIO Council Member
Moderator: Calin Rangu VicePresident, CIO Council Romania
Watch video here.
***********************************************
1310 - 1330
Title Session: Digital Sovereignty: A Wake-Up Call for Europe
Synopsys: The new U.S. administration has triggered a shift in Europe’s approach to technology. Concerns over security, reliability, and autonomy are pushing European governments and businesses to rethink their reliance on American cloud and tech providers. As Trump’s policies create uncertainty and transatlantic tensions, the urgency for investment, a “Buy European!” call for action, and a stronger European tech stack is clearer than ever.
EuroStack, supported by 100+ companies, is at the forefront of this call for action, advocating for self-sufficiency in tech and a clear commitment to buying European, while central to the movement is SECA (Sovereign Cloud European API) that plays a crucial role in shaping European cloud interoperability and sovereignty. SECA’s mission is to establish common standards and frameworks that enable European cloud providers to offer secure, scalable, and compliant solutions. SECA’s commitment to digital sovereignty is particularly relevant in the cloud computing space, where European providers have often struggled to compete against U.S. hyperscalers. By pushing for strategic investments and partnerships to bolster European infrastructure, SECA is helping create a more resilient and competitive tech ecosystem.
Dynamo stands firmly behind this call for action and offers real solutions to the problems Europe is facing today, shaping a secure, transparent, and collaborative cloud environment tailored for European users, aiming to provide a commercial and technical federation across multiple independent providers.
Speaker: Francesco Bonfiglio, CEO Dynamo
Watch video here.
***********************************************
1330 - 1420
************************************************************
1330 – 1420 Networking Lunch
************************************************************
***********************************************
1420 - 1505
PANEL 2: Operational Technology Under Siege – Securing Critical Infrastructure from Supply Chain and Nation-State Threats
In an era of heightened geopolitical instability and increasing cyber-physical convergence, operational technology (OT) and critical infrastructure systems have become prime targets for cyberattacks. From energy and utilities to transportation and healthcare, these systems are no longer isolated or immune—they are deeply interconnected with IT networks, cloud platforms, and global vendor ecosystems.
The recent wave of supply chain intrusions and state-sponsored cyberattacks—like SolarWinds, Colonial Pipeline, and the NotPetya incident—demonstrates a chilling reality: critical infrastructure is now a frontline in modern cyber warfare. Attackers are exploiting third-party software, compromised firmware, legacy SCADA systems, and vendor blind spots to disrupt economies and threaten national security.
As organizations across Europe prepare to meet the cybersecurity demands of NIS2 and DORA, a new level of scrutiny is being applied to vendor ecosystems, procurement practices, and the cyber hygiene of OT environments. Protecting these systems demands not only Zero Trust and segmentation strategies, but also a proactive rethinking of vendor risk management, incident response, and public-private collaboration.
This panel brings together cybersecurity leaders from critical infrastructure sectors, regulators, and solution providers to explore:
• How can we assess and reduce the cyber risks across complex vendor ecosystems?
• What does cyber resilience mean in the context of SCADA/ICS and legacy infrastructure?
• Can we build cyber accountability into procurement and vendor relationships?
• What role should governments and regulators play in safeguarding national digital sovereignty?
Speaker:
- Dan Bogdan, ISG Technology Consulting Manager, Dell Technologies
- Alexandru Suditu, Co-founder and General Manager, SentryOT
- Catalina Dodu, Partner EY
- Ion Ionut Georgian, Head of IT, OMV Petrom Global Solutions
- Alex "Jay" Balan, CISO, SuperBet
Moderator: Yugo Neumorni President, CIO Council Romania
Watch video here.
***********************************************
1500 - 1520
Title session: GravityZone Presentation – How to Build a Strong Cybersecurity Defense
Synopsys:Cum arată o strategie de apărare modernă într-un peisaj digital tot mai complex? Ce înseamnă, concret, să construiești o securitate cibernetică robustă, capabilă să facă față noilor tipuri de amenințări?Paul Butnaru, Director of Product Management la Bitdefender, va vorbi despre GravityZone, tehnologia care protejează organizații din peste 170 de țări, și despre ce înseamnă o securitate care funcționează acolo unde contează cel mai mult: în viața de zi cu zi a companiilor.
Speaker: Paul Butnaru - Director of Product Management, ENTERPRISE SOLUTIONS, Bitdefender
Watch video here.
***********************************************
1520 - 1540
Title session: Cyngular's value proposition
Synopsys: Cyngular Security is transforming the way Security Operations Centers (SOCs) safeguard cloud and multi-cloud environments.
Our all-in-one platform combines six powerful capabilities to deliver unmatched value—providing the most comprehensive, cost-effective, and efficient solution for modern Cloud-SOC and IR (Incident Response) challenges.
IR Readiness – Achieve full readiness with 100% coverage over 100% of your assets 100% of the time. We act as a continuous watchdog, ensuring your team is always prepared to respond, not just during incidents but every day.
Situational Awareness – Gain real-time, comprehensive visibility into your environment, enabling faster, more informed decision-making.
Threat Hunting & Deception (CDR + TDIR) – Proactively hunt for threats and deceive attackers, turning the tables before they strike.
Investigation (CIRA) – The most complicated and time-consuming process, but Cyngular shrinks it to under 2 minutes, drastically speeding up your response time and improving efficiency.
Response – AI-driven capabilities help you rapidly mitigate and contain threats, ensuring swift, automated response.
IR Reporting (AI-driven) – Generate incident reports in less than 5 minutes, compared to the traditional 7-14 days and up to $250K of manual effort.
Cyngular achieves all of this with an agentless approach, read-only permissions, multi-tenancy architecture and deployment in as little as 30 minutes.
We reduce your time, money, headcount, and most importantly, risk—allowing your team to work faster and smarter than ever before.
Cyngular Security isn't just a tool—it's the most complete, affordable, and effective solution for SOCs to tackle the complexities of cloud security, empowering your team to stay ahead of threats with precision and efficiency
Speaker: Paul Moskovich, Co-Founder & CEO, Cyngular Security
Watch video here.
***********************************************
1540 - 1625
PANEL 3 - Cyber Resilience in the Age of AI – Rethinking Defenses for the Digital Era
"In today’s hyper-connected world, cyber resilience has become a board-level priority. It’s no longer enough to focus only on prevention—organizations must build the capacity to withstand, respond to, and recover from cyberattacks while maintaining critical operations.
At the same time, Artificial Intelligence (AI) is reshaping the cybersecurity landscape—both as a powerful tool for defenders and a growing threat vector. AI can enhance threat detection, automate incident response, and identify vulnerabilities faster than any human team could. Yet, adversaries are also using AI to scale attacks, bypass defenses, and launch more sophisticated, adaptive threats.
This panel brings together experts to discuss how companies can leverage AI to build stronger cyber resilience, the ethical and governance challenges that come with AI-driven defense strategies, and how to strike the right balance between automation and human expertise. We’ll explore real-world use cases, best practices, and what the future holds as AI becomes an integral part of cyber defense strategies.
Cyber resilience is not just a technical goal—it’s a strategic capability. And AI, if used wisely, could be a game-changer.".
Speakers:
- Ran Mishli - Lead Solution Consulting Opentext
- Gratiela Magdalinoiu, President ISACA Romania
- Gabriel Herbei, CTO First Bank, CIO Council Member
- George Lazar, VP, Program Manager, Deutsche Bank, CIO Council member
- Cristian Cucu, Former CIO Government Romania, CIO Council member
Moderator: Bogdan Tudor, Vicepresident, CIO Council
Watch video here.
***********************************************
1625 - 1635
CIO Council Awards Project
Moderator: Steliana Moraru, Community Manager CIO Council
CIO Council Academy Project
Moderator: Bogdan Tudor, VicePresident CIO Council
CONCLUSION & Prize Raffles
Moderator: Yugo Neumorni, President CIO Council
Watch video here.