Thanks to all the great speakers!
Thanks for the support of the Canton of Geneva and Fusion!
Looking forward to our 7th edition next year in Geneva!

EVENT Summary

After editions in Brussels, New York, Iguaçu, Berlin, the 6th edition of the Free and Safe in Cyberspace conference series was held last April 9th and 10th 2019 in Geneva, at the Fintech Fusion accelerator in 50 Avenue de la Praille, new home of the organizer Trustless Computing Association and its spin-off startup TRUSTLESS.AI.

IT security and banking experts discussed how we can define new paradigms and build a new international non-governmental standards setting and certification body – and a 1st complaint open ecosystem and target architecture – that can certify end-2-end IT services with radically-unprecedented levels of trustworthiness, while concurrently ensuring offline legitimate lawful access, all the way down to extreme CPU design review and fabrication oversight. Initially targeted at the confidentiality and integrity of human communications and financial transactions, it plans to be extended to other society-critical IT systems, such 5G networks, critical AIs, and large social media. 

As in previous editions, we sought the solution to 4 Challenges that we have identified since 2015 as key to achieve the IT and AI security that we need as a society, and to spur great economic opportunities.

Day 1. During Challenge A, we tried to answer the question “What new IT paradigms and certification governance models can deliver human communications and financial transactions that are radically-more-secure than today state-of-the-art?“. Then, in Challenge B, we asked: “If we can solve Challenge A, how can we concurrently solidly ensure legitimate lawful access to prevent grave crimes and enable its sustainable adoption?“. We explored the possibility that Challenge A and B are one and the same, solvable by uncompromising apply the best time-proven socio-technical paradigm. During Panel 1 and Panel 2, we  explored how such new technologies, certifications and ecosystems can provide great economic opportunities for early adopters, such as banks, wealth management firms, and local governments.

Day 2. During Challenges C and Challenge D, we analyzed the application of such new technologies and certifications in other society-critical IT systems, such as artificial intelligence, social networks and 5G networks. During Panel 3 to Panel 4, we explored how such new IT and certifications can provide the basis of national policies and international treaties that can contribute to peace, democracy, freedom, and even improve chances of rational human control over the future of AI.

screen-shot-2019-04-14-at-14.47.57
screen-shot-2019-04-14-at-14.49.35
screen-shot-2019-04-14-at-14.53.14
screen-shot-2019-04-14-at-14.53.21
screen-shot-2019-04-14-at-14.53.29
screen-shot-2019-04-14-at-14.53.48
screen-shot-2019-04-14-at-14.58.57
screen-shot-2019-04-14-at-14.59.13
screen-shot-2019-04-14-at-15.16.50
screen-shot-2019-04-14-at-15.20.12
screen-shot-2019-04-14-at-15.20.02
screen-shot-2019-04-14-at-15.19.53
screen-shot-2019-04-14-at-15.19.45
screen-shot-2019-04-14-at-15.19.37
screen-shot-2019-04-14-at-15.18.17
screen-shot-2019-04-14-at-15.18.43
screen-shot-2019-04-14-at-15.17.51
screen-shot-2019-04-14-at-15.17.03
screen-shot-2019-04-14-at-15.17.10
screen-shot-2019-04-14-at-15.16.55
screen-shot-2019-04-14-at-15.16.45
screen-shot-2019-04-14-at-15.16.40
screen-shot-2019-04-14-at-15.16.17
screen-shot-2019-04-14-at-15.15.50
screen-shot-2019-04-14-at-15.15.42
screen-shot-2019-04-14-at-15.15.38
screen-shot-2019-04-14-at-15.15.29
screen-shot-2019-04-14-at-15.15.23
screen-shot-2019-04-14-at-15.14.51
screen-shot-2019-04-14-at-15.14.32
screen-shot-2019-04-14-at-15.14.11
screen-shot-2019-04-14-at-15.13.49
screen-shot-2019-04-14-at-15.12.32
screen-shot-2019-04-14-at-15.12.22
screen-shot-2019-04-14-at-15.11.01
screen-shot-2019-04-14-at-15.12.05
screen-shot-2019-04-14-at-15.11.05
screen-shot-2019-04-14-at-15.12.01
screen-shot-2019-04-14-at-15.11.44
screen-shot-2019-04-14-at-15.10.55
screen-shot-2019-04-14-at-15.10.35
screen-shot-2019-04-14-at-15.10.44
screen-shot-2019-04-14-at-15.10.24
screen-shot-2019-04-14-at-15.10.16
screen-shot-2019-04-14-at-15.10.09
screen-shot-2019-04-14-at-15.09.52
screen-shot-2019-04-14-at-15.10.00
screen-shot-2019-04-14-at-15.09.19
screen-shot-2019-04-14-at-15.09.00
screen-shot-2019-04-14-at-15.09.08
screen-shot-2019-04-14-at-15.08.16
screen-shot-2019-04-14-at-15.08.00
screen-shot-2019-04-14-at-15.07.54
screen-shot-2019-04-14-at-15.07.10
screen-shot-2019-04-14-at-15.07.20
screen-shot-2019-04-14-at-15.07.28
screen-shot-2019-04-14-at-15.07.03
screen-shot-2019-04-14-at-15.05.50
screen-shot-2019-04-14-at-15.05.31
screen-shot-2019-04-14-at-15.06.00
screen-shot-2019-04-14-at-15.06.52
screen-shot-2019-04-14-at-15.05.16
screen-shot-2019-04-14-at-15.05.01
screen-shot-2019-04-14-at-15.04.11
screen-shot-2019-04-14-at-15.04.25
screen-shot-2019-04-14-at-15.03.56
screen-shot-2019-04-14-at-15.03.36
screen-shot-2019-04-14-at-15.03.49
screen-shot-2019-04-14-at-15.03.21
screen-shot-2019-04-14-at-15.03.29
screen-shot-2019-04-14-at-15.03.07
screen-shot-2019-04-14-at-15.02.38
screen-shot-2019-04-14-at-15.02.49
screen-shot-2019-04-14-at-15.02.25
screen-shot-2019-04-14-at-15.02.18
screen-shot-2019-04-14-at-15.01.54
screen-shot-2019-04-14-at-15.01.43
screen-shot-2019-04-14-at-15.02.10
screen-shot-2019-04-14-at-15.01.23
screen-shot-2019-04-14-at-15.00.45
screen-shot-2019-04-14-at-15.00.53
screen-shot-2019-04-14-at-15.01.14
screen-shot-2019-04-14-at-15.00.34
screen-shot-2019-04-14-at-15.01.04
screen-shot-2019-04-14-at-15.00.10
screen-shot-2019-04-14-at-14.59.51
screen-shot-2019-04-14-at-14.59.33
screen-shot-2019-04-14-at-14.58.47
screen-shot-2019-04-14-at-14.57.25
screen-shot-2019-04-14-at-14.57.04
screen-shot-2019-04-14-at-14.57.11
screen-shot-2019-04-14-at-14.56.45
screen-shot-2019-04-14-at-14.56.50
screen-shot-2019-04-14-at-14.55.56
screen-shot-2019-04-14-at-14.56.32
screen-shot-2019-04-14-at-14.55.50
screen-shot-2019-04-14-at-14.55.34
screen-shot-2019-04-14-at-14.54.58
screen-shot-2019-04-14-at-14.55.27
screen-shot-2019-04-14-at-14.54.46
screen-shot-2019-04-14-at-14.54.39
screen-shot-2019-04-14-at-14.54.15
screen-shot-2019-04-14-at-14.54.31
screen-shot-2019-04-14-at-14.54.07
screen-shot-2019-04-14-at-14.53.55
screen-shot-2019-04-14-at-14.53.08
screen-shot-2019-04-14-at-14.52.57
screen-shot-2019-04-14-at-14.52.51
screen-shot-2019-04-14-at-14.52.39
screen-shot-2019-04-14-at-14.51.47
screen-shot-2019-04-14-at-14.51.27
screen-shot-2019-04-14-at-14.51.20
screen-shot-2019-04-14-at-14.51.11
screen-shot-2019-04-14-at-14.51.02
screen-shot-2019-04-14-at-14.16.27
screen-shot-2019-04-14-at-14.22.14
screen-shot-2019-04-14-at-14.41.57
screen-shot-2019-04-14-at-14.42.08
screen-shot-2019-04-14-at-14.42.15
screen-shot-2019-04-14-at-14.42.29
screen-shot-2019-04-14-at-14.42.37
screen-shot-2019-04-14-at-14.42.41
screen-shot-2019-04-14-at-14.42.49
screen-shot-2019-04-14-at-14.42.59
screen-shot-2019-04-14-at-14.43.32
screen-shot-2019-04-14-at-14.43.50
screen-shot-2019-04-14-at-14.43.53
screen-shot-2019-04-14-at-14.44.00
screen-shot-2019-04-14-at-14.44.19
screen-shot-2019-04-14-at-14.44.31
screen-shot-2019-04-14-at-14.44.43
screen-shot-2019-04-14-at-14.45.11
screen-shot-2019-04-14-at-14.45.12
screen-shot-2019-04-14-at-14.45.15
screen-shot-2019-04-14-at-14.45.38
screen-shot-2019-04-14-at-14.46.02
screen-shot-2019-04-14-at-14.46.09
screen-shot-2019-04-14-at-14.46.23
screen-shot-2019-04-14-at-14.46.45
screen-shot-2019-04-14-at-14.47.19
screen-shot-2019-04-14-at-14.47.33
screen-shot-2019-04-14-at-14.47.48
screen-shot-2019-04-14-at-14.48.05
screen-shot-2019-04-14-at-14.48.30
screen-shot-2019-04-14-at-14.48.48
screen-shot-2019-04-14-at-14.48.56
screen-shot-2019-04-14-at-14.49.11
screen-shot-2019-04-14-at-14.49.21
screen-shot-2019-04-14-at-14.49.38
screen-shot-2019-04-14-at-14.49.51
screen-shot-2019-04-14-at-14.50.13
screen-shot-2019-04-14-at-14.50.34
screen-shot-2019-04-14-at-14.50.47

Speakers’ Highlights


Chief Information Security Office and Head of Information Security Services of Unysis

Gerhard Knecht

Former Chief Information Security Officer and Head of Information Security Services of UNISYS. Senior Advisor at TRUSTLESS.AI.  


Marco Obiso

Head of the Cybersecurity Division at the UN International Telecommunication Union.


eldo-mabiala-rounded

Eldo Mabiala

Group Head of Security and Organisation at SYZ Group, a leading Swiss wealth management firm.


Bertrand Tavernier

VP Software Research & Technologies for Thales Group. Lead of RISC-V-based SW ecosystem research.


Tony Zeiger

Founder and CIO of PeakView Private Investment Office.

 


Laurent Bischof

Managing Director of the Fusion startup accelerator and Polytech Ventures Holding.


Global Risk and Resilience Cluster Lead at the Geneva Centre for Security Policy.

Jean-Marc Rickli

Global Risk and Resilience Cluster Lead of Geneva Centre for Security Policy.


Michael Kleiner

Director of the Department of Economic Development, Directorate General for Economic Development, Research and Innovation, Republic and State of Geneva.


Jaan Tallinn

Founder of Skype and Kazaa.
Philantropist and founder of  theAI safety centers Future of Life Institute and Centre for the Study of Existential Risk.


armstrong_round

Stuart Armstrong

James Martin Research Fellow at Future of Humanity Institute, Oxford University.


Phillipe Thévoz

Vice-President of eGovernment Systems at SICPA, global leader in anti-counterfeit technologies.


Christian Wirth 

Co-Founder of Privacy by Blockchain Design. Former Senior Blockchain Architect at IBM Berlin. Advisor to TRUSTLESS.AI. Privacy researcher.  


Juan Carlos Lara

Managing Partner at the POINT5 Family Office, NGO advisor. Anti-corruption keynote speaker.


Caroline Portal

Former Chief Information Security Office of the Judiciary of the Republic and Canton of Geneva. Formerly IT executive at luxury retailer Richemont


Carmela Troncoso

Director of the EPFL Spring Lab Security and Privacy Engineering Laboratory in Lausanne.

 


Solange Ghernaouti

Director of the Swiss Cybersecurity Advisory and Research Group. Member of the Swiss Academy of Engineering Sciences.


Roman Yampolskiy 

Long-term AI and IT security expert, author and professor.  Director of the Cyber Security Lab. Author of “Artificial Superintelligence: a Futuristic Approach“.


Steven Meyer 

CEO and co-founder of ZENData
Cybersecurity professional, researcher & evangelist.
Columnist at Bilan.
Keynote speaker.


Troy Davis 

President of the World Citizen Foundation. Fellow at World Federalist Institute.


Antoine Clerget

Senior Director of Engineering at Symphony.com, leading messaging and groupware for the financial sector.


Paul Wang

Forensic expert. Executive Advisor to the CEO and Advisory Board Member at High-Tech Bridge, Advisory Board Member and Cybersecurity Advocate at Mt Pelerin. 


Leila Delarive 

President of the Empowerment Foundation. Co-Founder & CEO
of Amplify.


Lennig Pedron

Founder and President of ICON NGO based in Geneva, Director of the R&D laboratory of cybersecurity of SecuLabs in Innovation Park – EPFL campus


Davide Barillari

Italian Regional Councillor in Lazio Region. Formerly at IBM for 17 years. Expert in Digital democracy, IT security and blockchain. Submitted the 1st law proposal for Trustless Computing.


Michel Jaccard

Founder and CEO of Id Est Avocats, Swiss law firm specialized in digital privacy and open innovation.


Co-founder at the Wealth Mosaic, leader building connectionsworld-wide between startups and wealth managers.

Stephen Wall 

Co-founder of Wealth Mosaic, leader building connections world-wide between startups and wealth managers.


Stephane Nappo

Group Chief Information Security Officer at OVH. Formerly was Chief Information Security Officer of Societè Generale.


Rufo Guerreschi

Executive Director of the Trustless Computing Association and CEO of TRUSTLESS.AI.


Wouter ’t Hoen

Senior Legal Expert in privacy and data protection law. Formerly at the Dutch Ministry of the Interior, the European Commission and T-Mobile Netherlands. Now actively involved in the Internal Justice System of the World Health Organization in Geneva.


Luca Benini

Professor of digital circuits and systems at ETH Zurich. Professor at Università di Bologna.


Daniel Haudenschild

President of the Board Of Directors of the Crypto Valley Association. Former CEO of Swisscom Blockchain.


Emmanuelle Tzanos

Committee Member at CLUSIT, the Fédération des Entreprises Romandes FER Genève and the State of Geneva.


SPEAKERS OF PREVIOUS EDITIONS

Program

Location: Fusion startup accelerator (50 Avenue de la Praille, Geneva)
Capacity: 50 seats capacity.
Language: English.

April 9th, Tuesday

12:00 pm – Registration & light lunch 

01:00 pm – Welcome by Laurent Bischof, Managing Director of Fusion and Polytech Ventures. Video Link

01:10 pm – Welcome by Michael Kleiner, Head of Department of Economic Development, Directorate General for Economic Development, Research and Innovation, Republic and State of Geneva.
“Economic opportunities for Geneva in the area of IT security”. Video Link

01:20 pm – Keynote by Marco Obiso, Head of Cybersecurity Division at UN International Communication Union. “Paths towards next- generation international IT security standards and certifications for sensitive human communications and transactions”  Video Link

01:30 pm – Introduction by Rufo Guerreschi, Exec. Dir. of Trustless Computing Association and CEO of TRUSTLESS.AI.
“The 4 Challenges of Free and Safe in Cyberspace.“. Video Link

01:50 pm – Challenge A: How can we build and certify IT systems that are radically more secure than state-of-the-art for human communications and transactions?

  • Video Link
  • Moderator: Gerhard Knecht –— Panelists:  Marco Obiso, Luca Benini, Manuela Troncoso, Reinhard Posch, Solange Ghernaouti.
    .
  • How can we provide ordinary citizens access to affordable and user-friendly IT services with levels of trustworthiness that are radically-unprecedented (i.e. ultra-high assurance*) and meaningfully-abiding to the UN Universal Declaration of Human Rights, at least for their most sensitive computing?
    .
    Can we re-create in cyberspace a meaningful private sphere? What are the key paradigms needed to achieve this goal? What is the role of uncompromisingly “zero trust” security-by-design paradigms, via transparent and extreme review and oversight of all critical lifecycle components and processes? Can we realistically secure enough CPU design and chip fabrication oversight? What are the advantages, disadvantages and limitations of free/open source software? What is the role of formal verification? What is the role of public security-review by “ethical” experts? How about Blockchains, Quantum Computing, Artificial Intelligence? Can citizen-witness and citizen-jury processes help secure the supply-chain? What is the role of certification and oversight governance?  What scale of investments are needed? Can we imagine a parallel hardware and software ultra-secure computing universe, as a user-friendly supplement to every-day computing devices?  Read more

02:40pm – Coffee break

02:50 pm – Keynote by Gerhard Knecht “Towards ultra-high assurance IT for human computing”

03:00 pm –  Intro to Challenge B by the Trustless Computing Association. Video Link 

03.10 pm – Challenge B: If we can solve Challenge A, how can we concurrently solidly ensure legitimate lawful access to prevent grave crimes and enable its sustainable adoption?

  • Video Link 
  • Moderator: Rufo Guerreschi 
    Panel 1: Michel Jaccard, Hoten t’ Wouter, Caroline Portal, Antoine Clerget, Bernard Tavernier.
    .
  • Can providers of ultra-high assurance* IT reliably offer compliance mechanisms to legitimate lawful access requests – voluntarily (i.e. in addition to what’s required by selected jurisdictions) – while overall reducing both resulting risks for the privacy of users and for public safety? If so, how?What are the core paradigms of such certification processes?
    .
    Can the same extreme technical and human safeguards that are needed to deliver ultra-high assurance also enable voluntary compliance to lawful access request – at least in some EU states – that overall reduce the risk of privacy rights abuse of end-users by anyone to levels that are radically or substantially lower than any of the other alternative secure IT systems which do not offer such voluntary processing? Could or should such processes rely on a provider-managed voluntary data and/or key recovery scheme that is certified and overseen by primarily-non-governmental radically citizen-accountable, independent and competent international body? Could the inevitable added risk be essentially shifted from technical systems to resilient in-person organizational processes? Read more

04:10 pm – Coffee break

04:30 pm – Keynote & QA by Rufo Guerreschi: Case for a Trustless Computing Certification Body. Ongoing initiative for a standard setting and certification body suitable to certify ultra-high levels of trustworthiness for IT systems and their voluntary offline compliance to legitimate lawful access requests. Initially for human communications and transactions, and then for society-critical and complex IT systems. Video Link

05:10 pm – Coffee break

05:30 pm –  Keynote by Daniel Haudenschild, President of the Crypto Valley Association: 
“Core challenge to raise the actual and perceived trustlessness and trustworthiness of blockchains in the banking sector” Video Link

05:40 pm –  Keynote by Roman Yampolskiy (Video Link)
“Challenges of AI safety and resilience: the role of technical and socio-technical technical breakthroughs, of adequate certification bodies and transnational governance” Video Link

05:50 pm – Intro by Rufo Guerreschi, Exec. Dir. Trustless Computing Association
“Introduction to Panels 1 and 2: wealth management and client-side cybersecurity” Video Link

06.00 pm – Keynote by Stephen Wall of Wealth Mosaic
“Trends and developments in the global WealthTech landscape and the relative importance and focus on their security”. Video Link

06:10 pm – Panel 1: IT security & wealth management: threats and opportunities

  • Video Link
  • Moderator: Tony Zeiger  — Panelists: Eldo Mabiala, Stephen Wall, Tony Zeiger, Solange Gherbouti, 
    .
  • Hackers and data breaches are part of the daily news. But bulk of cybercrime is unreported or unnoticed, with behind the scene financial frauds, extortion and theft of personal and business secrets. Wealth management clients are ever more concerned about the confidentiality of their advisory and security of their financial transactions, and this in turn increases friction to client relationship where client will just trust face-to-face meeting for confidential matters. Even the best and most secure apps, expensive devices, authentication methods are vulnerable to confidentiality, integrity and authentication breaches even by mid-level hackers. Will the “call back” transaction verification be enough when voice cloning and deep fakes technologies are constantly improving? Meanwhile, IT giants like are rapidly moving into banking, and increasingly taking control of the client user interface and trust relationship like WeChat or WhatsApp, and being  able to offer better security by controlling the underlying software and hardware like Apple. 

06:40 pm – Aperitif session

06.50 pm – Spephane Nappo, Group Chief Information Security Officer at OVH:
Threats and opportunities of client-side security in the banking sector” 

07:00 pm – Panel 2: Client-side IT & wealth management: an opportunity to become clients’ digital trust provider and digital confidant?

  • Video Link
  • Moderator: Steven Meyer — Panelists: Eldo Mabiala, Emmanuelle Tzanos, Rufo Guerreschi, Tony Zeiger.
    .
  • Cyber in the financial World done correctly can open doors to new and amazing opportunity; but done wrong, it can bring us back to the age of pen & paper. Both ease of use and security of digital financial advisory are critical to retain, deepen and expand client relationship in the digital age. 
    How can financial institutions  become the digital trust partner of their clients? How can this be done and what advantage would the leaders gain compared to the followers? Can a group of leading enterprises, wealth management firms, banks, NGOs and nations gain a fundamental competitive advantage in digital trust by leading the creation and adoption of next-generation IT security paradigms and certifications? 

08:00 pm – Aperitif, snack and networking

09:00 pm – End

*Definition of “ultra-high assurance”: In civilian and military IT security, it is used to refer to systems of the highest level of trustworthiness in confidentiality, integrity, and/or availability. Perfect trustworthiness will never exist, but we have learned that even current “high assurance” technologies, standards, and certifications are radically inadequate for the needs of citizens, enterprises, democratic institutions, critical societal systems, and autonomous systems.

April 10th, Wednesday

08:30 am – Registration & Coffee

09:10 am – Welcome by Rufo Guerreschi
“Introduction to Free and Safe in Cyberspace – Challenges C and D”

09:25 am – Challenge C: Can such ultra-high assurance IT – and related certification governance models – contribute to radically increase the security, privacy or safety of complex and critical IT, AI and cyber-physical systems, such as 5G Networks, self-driving cars, robo-advisors, or social media?

  • Moderator: Rufo Guerreschi — Speakers:  Christian Wirth, Leila Delarive, Stuart Armstrong, Tim Llewellynn.
    .
  • Current attempts to radically increase the trustworthiness of critical IT systems are often centered on the pursuit of scientific breakthroughs in the area of artificial intelligence, quantum computing and cryptography, blockchains, and new protocols, such as zero-knowledge proof, and end-2-end and homomorphic encryption. Meanwhile, a few security-by-design or blockchain initiatives are taking a more holistic, short-term and trustless approach, centered on open, time-proven, battle-tested – yet future-aware – technologies and processes; transparent oversight down to critical hardware design and fabrication; a transparent resolution with extreme safeguards of the lawful access needs; and more accountable and resilient certification and ecosystem governance models.

09:50 am – Keynote by Wirth 
Can blockchain technology become market-ready, trustworthy and GDPR-compliant through standardisation?”  Video Link

10.00 am – Keynote by Leila Delarive
“Can law harness the tech (r)evolution?”  Video Link

10:10 am – Panel 3: The search for truly trustless blockchain. What are the technical, governance, ecosystem and certification challenges to increase the actual, measurability and perceived trustworthiness of blockchains.

  • Video Link
  • Moderator: Christian Wirth — Speakers: Paul Wang, Philippe Thevoz, Michael Kolain, Jorn Erbguth.
    .
  • A large majority of IT security experts and prospective blockchain institutional users are still highly sceptical of the security claims of even the most securely-architected or time-tested blockchains. Many challenges remains to be addressed. How can the blockchain benefit from ultra-high assurance IT systems (for example, on the client -side) and their certification models? How can blockchains, in turn, measurably improve the assurance of high-assurance systems? 

10:40 am Keynote by Kolain 
“Novel risk-based instruments of the GDPR – How to create trust through legal informatics” Video Link

10:50 am – Coffee Break

11.10 am – Keynote by Stuart Armstrong: “How can a coalition of actors promote the establishment of adequate global AI governance by exiting the current semi-anarchic default condition.”  Video Link

11.20 am – Keynote by Troy Davis: 
“The history of the fight for a federal global government: from Garry Davis in 1945 all the way to the needs of global AI regulation” (trailer video on Garry Davis) Video Link

11.35 am – “Skype-Side Chat” with Jaan Talliin (recorded video interview) 
“Need, challenges and scenarios of global governance of AI ” Video Link

11:50 am – Challenge D: What governance models can best maximize the trustworthiness and resilience of an ultra-high assurance certifications body in critical IT and AI domains? Can such certifications and their governance models provide the basis for radically more trustworthy, trusted, resilient and enforceable national policies and international treaties?

  • Video Link
  • Moderator: Troy Davis — Speakers: Stuart Armstrong, Leila Delarive, Lennig Pedron, Rufo Guerreschi.
    .
  • Recent calls for international treaties or new ethics for the trustworthiness of IT or AI systems – such as Tech Accord, Charter of Trust, Call of Paris or a Digital Geneva Convention – are crucial to raise awareness. Yet, none of them tackles head on the need for trustworthy cybersecurity certifications to enforce the oversight of treaties or enact the principles of such declarations. 
    .
    How can such certification bodies increase the resilience and “forensic friendliness”, to radically improve resistance against attacks and confidence about attacks attribution? — What constituent processes can ensure a timely, effective and democratically-efficient implementation – by a critical mass of actors – of meaningfully-enforceable national policies or international treaties for ultra-high assurance IT standards setting and certification processes? 

12:20 pm –  Coffee Break

12:30pm – Open Conversation: the Future of Humanity, AI, Media, and Global Governance.

  • Video Link
  • Moderator: Rufo Guerreschi
    Panelist: Troy Davis, Stuart Armstrong, Jean-Marc Rickly, Leila Delarive, Lennig Pedron
  • Can the all-powerful threats of AI and cybersecurity provide the needed motivation to build adequate open federal transnational democratic institutions, as the nuclear threat nearly did in 1945? Can the threats (and opportunities) of the accelerating pace AI and the destabilizing effect of cyber-warfare constitute a unique opportunity to radically empower and democratize our transnational governance institutions? 

13:00 pm – Light Lunch and Networking

02:00 pm – End

Theme for FSC 6th edition:

Cybersecurity: From a threat to a ket competitive advantage for the private banking industry? 

Cybercrime cost will reach $6 trillion by 2021, most of which unreported or unnoticed by the victims.

Our networks are broken. Monitoring of 3G, 4G and 5G networks is essential for nations’ ability to combat crime. But their lack of certified security and international accountability leads to major privacy and security risks for all citizens, and distrust among nations.

Our devices are broken. When even Bezos and Trump communications with their closest associates appear to be easily hackable even by mid-level hackers, what hope is there for the rest of us for?

Our digital banking is broken. Network tracking and lack of confidentiality, fast increasing identity thefts and financials frauds via spear-phishing and even voice cloning are eroding trust in financial transactions.

Key problem is that technologies are getting ever more complex and more obscure and hackers ever more resourceful. Current attempts to radically increase the trustworthiness of IT sensitive system – especially in communications and transactions – are centered on the pursuit of scientific breakthroughs in the area of artificial intelligence, on quantum computing, and innovative encryption protocols, such as quantum-resistant, blockchains, zero-proof, end-2-end and homomorphic. Meanwhile, a few security-by-design or blockchain initiatives are taking a more holistic, short-term and trustless approach, which is centered on open, time-proven, battle-tested – yet future-proof – technologies and processes; transparent oversight down to critical hardware design and fabrication; a transparent resolution of the lawful access needs; and radically more accountable and resilient certification and ecosystem governance models.

But is it really a technological problem? Or is it instead that all IT is broken – by design, at birth – to satisfy legitimate needs of law enforcement?  Can we have both meaningful freedom and public safety in cyberspace?

Most believe that meaningful digital freedoms and public safety are an inevitable “either-or” choice, a sort of “zero-sum game“. We discovered it may well be instead a “both-or-neither” challenge, solvable primarily through the same zero-trust socio-technical paradigms and international certification governance models. This is all the more urgent as the breaking of all IT at birth by powerful nations, to retain investigative access, has placed the safety and freedom of nearly all citizens, and the very integrity of their democratic systems, in the hands of the most powerful hacking entities.

Can a new international standards setting and certification body – and complaint open ecosystem – achieve radically-unprecedented levels of confidentiality and integrity – for our most sensitive human computing, and then other critical systems – while concurrently ensuring offline legitimate lawful access?

Can a few leading wealth management firms, enterprises, public institutions and NGOs can leverage such an innovation to turn client-side cybersecurity from a threat into a fundamental competitive advantage in their respective markets.

Past Editions


On Sept 24-25th 2015, the 1st Edition 2018 was held in Brussels, with a high-level set of speakers, including recognized IT security experts such as Bruce Schneier and Bart Preneel, and from the IT security institutions, such as the Head of Information Superiority of the European Defence Agency, and more. See the report and the program with videos.


On May 4th 2018, the 5th Edition 2018 was held in Berlin. High profiles joined, including Reinhard Posch, Chief Information Officer for Austria, Andreas Reisen, Head of Division “IT and Cyber Security in Critical Infrastructures and the Private Sector, Secure Information Technology” of the German Federal Ministry of the Interior, and more.

Interview on Swiss TV (Feb 2019)

Trailer of the 4th Edition (2017)

Panel on Challenge A (2015)

Welcome Keynote (2015)



Full Video Playlist

ORGANIZERS

TCA

The Trustless Computing Association is a non-profit organization, based in Rome and Geneva, that has aggregated World-class partners and advisors to build open IT technologies, certifications and ecosystems that can deliver levels of trustworthiness that are radically higher than state-of-the-art. 

Together with its spin-off startup TRUSTLESS.AI – based in Geneva at the Fusion accelerator – it has been building (1) the Trustless Computing Certification Body, a new IT security certification body and schema, aimed at radically-unprecedented levels of trustworthiness, while at once solidly enabling legit lawful access and (2) building the Seevik Pod and Net, an initial open computing base, ecosystem and IT device, compliant to such new certifications.

Event Series Supported By


logo_epfl.svg


logo-3


ccl-gcsp-cobranded-logo_ng_responsive_half


fti




european-commission-logo-b12e1f84cc-seeklogo.com_


itu


deutsche-telekom-1-logo-png-transparent


eit-sdigital


un-privacy-logo


abi-lab


wire


cosic-logo


eda-logo


fsf


ecselju


atos.svg


2000px-capgemini-logo-2017.svg


logo-aeneas-color


tca-partners-logs-only


canton-geneva


fhi-logo


empowerment-foundation


peakview


world-federalist-movement-squarelogo


bonseyes-logo


nviso-logo-transparent-600-1001


logozendatawebsite

Organizers’ Partners


Sponsors



trustless.ai_logo_514x514px_514x514
id-est

Powered By


TCA