After editions twice in Brussels, and once in New York, Iguaçu and Berlin, we’ll hold our 6th Free and Safe in Cyberspace next April 9-10th 2019 in Geneva, at the Fusion startup accelerator – new home to our Trustless Computing Association and its spin-off startup TRUSTLESS.AI since October 2018.
As in previous editions, top experts and organizations will discuss how we can build a new international standards setting and certification body – and open ecosystem – to achieve radically-unprecedented levels of trustworthiness, for our most sensitive computing, while concurrently ensuring offline legitimate lawful access. Initially for sensitive human communications and financial transactions, and then for critical AIs.
The event, as in previous editions, will focus on seeking for a solution to 4 key challenges of IT and AI security, and related economic opportunities. Challenge A will explore “How can we build new IT and certification governance models for human communications and financial transactions that are radically-more-secure than today?“. Challenge B will seek “If we can solve Challenge A, how can we concurrently solidly ensure legitimate lawful access to prevent grave crimes and enable its sustainable adoption?”
Challenges C and Challenge D will focus on analysing the long-term public benefit impact of such techs and certifications in other critical areas such as sensitive and critical societal IT systems, such as Artificial Intelligence, social networks and 5G networks. During Panel 1 to Panel 4, we will explore the economic and public-good opportunities opening up for those private actors and governments that will lead in the creation and adoption of such ultra-secure IT systems.
Former Chief Information Security Officer and Head of Information Security Services of UNISYS. Senior Advisor at TRUSTLESS.AI.
VP Software Research & Technologies for Thales Group. Lead of RISC-V open hardware research..
Vice-President of eGovernment Systems at SICPA, global leader in anti-counterfeit technologies.
Director of the EPFL Spring Lab Security and Privacy Engineering Laboratory in Lausanne.
Director of the Swiss Cybersecurity Advisory and Research Group. Member of the Swiss Academy of Engineering Sciences.
Managing Partner at the POINT5 Family Office, NGO advisor. Anti-corruption keynote speaker.
CEO and co-founder of ZENData
Cybersecurity professional, researcher & evangelist.
Columnist at Bilan.
Sr Director of Engineering at Symphony.com, leading messagin and groupware for financial sector.
Co-Founder of Privacy by Blockchain Design. Former Senior Blockchain Architect at IBM Berlin. Advisor to TRUSTLESS.AI. Privacy researcher.
Long-term AI and IT security expert, author and professor. Director of the Cyber Security Lab. Author of “Artificial Superintelligence: a Futuristic Approach“.
Italian Regional Councillor in Lazio Region. Formerly at IBM for 17 years. Expert in Digital democracy, IT security and blockchain. Submitted the 1st law proposal for Trustless Computing.
Executive Advisor to the CEO and Advisory Board Member at High-Tech Bridge, Advisory Board Member and Cybersecurity Advocate at Mt Pelerin
Co-founder at the Wealth Mosaic, leader building connectionsworld-wide between startups and wealth managers.
Founder and President of ICON NGO based in Geneva, Director of the R&D laboratory of cybersecurity of SecuLabs in Innovation Park – EPFL campus
Founder and CEO of Id Est Avocats, Swiss law firm specialized in digital privacy and open innovation.
Professor at Università di Bologna and full professor of digital circuits and systems at ETH Zurich
Cybercrime cost will reach $6 trillion by 2021, most of which unreported or unnoticed by the victims.
Our networks are broken. Monitoring of 3G, 4G and 5G networks is essential for nations’ ability to combat crime. But their lack of certified security and international accountability leads to major privacy and security risks for all citizens, and distrust among nations.
Our devices are broken. When even Bezos and Trump communications with their closest associates appear to be easily hackable even by mid-level hackers, what hope is there for the rest of us for?
Our digital banking is broken. Network tracking and lack of condifentiality, fast increasing identity thefts and financials frauds via spearphishing and even voice cloning are eroding trust in financial transactions.
Key problem is that technologies are getting ever more complex and more obscure and hackers ever more resourceful. Current attempts to radically increase the trustworthiness of IT sensitive system – especially in communications and transactions – are centered on the pursuit of scientific breakthroughs in the area of artificial intelligence, on quantum computing, and innovative encryption protocols, such as quantum-resistant, blockchains, zero-proof, end-2-end and homomorphic. Meanwhile, a few security-by-design or blockchain initiatives are taking a more holistic, short-term and trustless approach, which is centered on open, time-proven, battle-tested – yet future-proof – technologies and processes; transparent oversight down to critical hardware design and fabrication; a transparent resolution of the lawful access needs; and radically more accountable and resilient certification and ecosystem governance models.
But the, in the end, is it really a technological problem? Or is it instead that all IT is broken – by design, at birth – to satisfy legitimate needs of law enforcement? Can we have both meaningful freedom and public safety in cyberspace?
Most believe that meaningful digital freedoms and public safety are an inevitable “either-or” choice, a sort of “zero-sum game“. We discovered it may well be instead a “both-or-neither” challenge, solvable through the same zero-trust socio-technical paradigms and international certification governance models. This is all the more urgent as the breaking of all IT at birth by powerful nations, to retain investigative access, has placed the safety and freedom of nearly all citizens, and the very integrity of their democratic systems, in the hands of the most powerful hacking entities.
Can a new international standards setting and certification body – and complaint open ecosystem – achieve radically-unprecedented levels of confidentiality and integrity – for our most sensitive human computing, and then other critical systems – while concurrently ensuring offline legitimate lawful access?
Can a few leading wealth management firms, enterprises, public institutions and NGOs can leverage such an innovation to turn client-side cybersecurity from a threat into a fundamental competitive advantage in their respective markets.
April 9th, TUESDAY
Location: Fusion startup accelerator (50 Avenue de la Praille, Geneva)
Capacity: 60 seats capacity.
12:00 pm – Registration & light lunch
01:00 pm – Welcome by Laurent Bischof, MD at Fusion and Polytech Ventures.
01:10 pm – Keynote by Marco Obiso, Head of Cybersecurity Division at ITU. “A path towards next generation international IT security standards and certtifications for human communications and transactions”
01:20 pm – Welcome by Pierre Maudet, Head of Economic Development Department, Canton of Geneve. “Economic opportunities for Geneva in the are of IT security”.
01:30 pm – Introduction by Rufo Guerreschi. “The 4 Challenges of Free and Safe in Cyberspace.”
- Moderator: Knecht,— Panelists: Marco Obiso, Luca Benini, Manuela Troncoso, Reinhard Posch, Paul Wang, Solange Ghernaouti.
- How can we provide ordinary citizens access to affordable and user-friendly IT services with levels of trustworthiness that are radically-unprecedented (i.e. ultra-high assurance*) and meaningfully-abiding to the UN Universal Declaration of Human Rights, at least for their most sensitive computing?
Can we re-create in cyberspace a meaningful private sphere? What are the key paradigms needed to achieve this goal? What is the role of uncompromisingly “zero trust” security-by-design paradigms, via transparent and extreme review and oversight of all critical lifecycle components and processes? Can we realistically secure enough CPU design and chi fabrication oversight? What are the advantages, disadvamtages and limitations of free/open source software? What the role of formal verification and ensuring deep review by expert “ethical” hackers? How about Blockchains, Quantum Computing, Artificial Intelligence? Can citizen-witness and citizen-jury processes help? What is the role of certification and oversight governance? What scale of investments are needed? Can we imagine a parallel hardware and software ultra-secure computing universe, as a user-friendly supplement to every-day computing devices? Read more
02:40pm – Coffee break
02:50 pm – Keynote by TBD
03:00 pm – Intro to Challenge B by the Trustless Computing Association.
- Moderator: Guerreschi — Panelists: Jaccard ,Tavernier, Posch, Clerget, Nemitz.
- Can providers of ultra-high assurance* IT reliably offer compliance mechanisms to legitimate lawful access requests – voluntarily (i.e. in addition to what’s required by selected jurisdictions) – while overall reducing both resulting risks for the privacy of users and for public safety? If so, how?What are the core paradigms of such certification processes?
Can the same extreme technical and human safeguards that are needed to deliver ultra-high assurance also enable voluntary compliance to lawful access request – at least in some EU states – that overall reduce the risk of privacy rights abuse of end-users by anyone to levels that are radically or substantially lower than any of the other alternative secure IT systems which do not offer such voluntary processing? Could or should such processes rely on a provider-managed voluntary data and/or key recovery scheme that is certified and overseen by primarily-non-governmental radically citizen-accountable, independent and competent international body? Could the inevitable added risk be essentially shifted from technical systems to resilient in-person organizational processes? Read more
04:00 pm – Coffee break
04:20 pm – Keynote & QA by Rufo Guerreschi: Case for a Trustless Computing Certification Body. Ongoing initiative for a standard setting and certification body suitable to certify ultra-high levels of trustworthiness for IT systems and their voluntary offline complaince to legitimate lawful access requests. Initially for human communications and transactions, and then for society-critical and complex IT systems.
04:40 pm – Q&A on the Trustless Computing Certification Body.
05:00 pm – Coffee break
05:20 pm – Keynote by Wall of Wealth Mosaic: “Landscape of innnovations and startups in cybersecurity for wealth management”
05:30 pm – Keynote by TBD
05:40 pm – Keynote by TBD
- Moderator: Juan Carlos Lara — Panelists: Tony Zeiger, Valdo Petronio, Gherbouti, TBD.
- Hackers and data breaches are part of the daily news. But bulk of cybercrime is unreported or unnoticed, with behind the scene financial frauds, extortion and theft of personal and business secrets. Wealth management clients are ever more concerned about the confidentiality of their advisory and security of their financial transactions, and this in turn increases friction to client relationship where client will just trust face-to-face meeting for confidential matters. Even the best and most secure apps, expensive devices, authentication methods are vulnerable to confidentiality, integrity and authentication breaches even by mid-level hackers. Will the “call back” transaction verification be enough when voice cloning and deep fakes technologies are constantly improving? Meanwhile, IT giants like are rapidly moving into banking, and increasingly taking control of the client user interface and trust relationship like WeChat or WhasApp, and being able to offer better security by controlling the underlying software and hardware like Apple.
06:40 pm – Aperitif session
- Moderator: Meyer — Panelists: Rufo Guerreschi, Eldo Mabiala, Valdo Petronio, Tony Zeiger.
- Cyber in the financial World done correctly can open doors to new and amazing opportunity; but done wrong, it can bring us back to the age of pen & paper. Both ease of use and security of digital financial advisory are critical to retain, deepen and expand client relationship in the digital age.
How can financial institutions become the digital trust partner of their clients? How can this be done and what advantage would the leaders gain compared to the followers? Can a group of leading enterprises, wealth management firms, banks, NGOs and nations gain a fundamental competitive advantage in digital trust by leading the creation and adoption of next-generation IT security paradigms and certifications?
08:00 pm – Aperitif, snack and networking
09:00 pm – End
*Definition of “ultra-high assurance”: In civilian and military IT security, it is used to refer to systems of the highest level of trustworthiness in confidentiality, integrity, and/or availability. Perfect trustworthiness will never exist, but we have learned that even current “high assurance” technologies, standards, and certifications are radically inadequate for the needs of citizens, enterprises, democratic institutions, critical societal systems, and autonomous systems.
April 10th, Wednesday
Location: Fusion startup accelerator (50 Avenue de la Praille, Geneva)
Capacity: 60 seats capacity.
08:30 am – Registration & Coffee
09:10 am – Welcome by Rufo Guerreschi and Introduction to Challenges C and D.
- Moderator: Lennig Pedron — Speakers: Jean-Marc Rickli, Leila Delarive, Staurt Armstrong, Llewellynn, Daniel Haudenschild.
- Current attempts to radically increase the trustworthiness of critical IT systems are often centered on the pursuit of scientific breakthroughs in the area of artificial intelligence, quantum computing and cryptography, blockchains, and new protocols, such as zero-knowldeg proof, and end-2-end and homomorphic encryption. Meanwhile, a few security-by-design or blockchain initiatives are taking a more holistic, short-term and trustless approach, centered on open, time-proven, battle-tested – yet future-aware – technologies and processes; transparent oversight down to critical hardware design and fabrication; a transparent resolution with extreme safeguards of the lawful access needs; and more accountable and resilient certification and ecosystem governance models.
09:50 am – Keynote by Wirth & Kolain “Can blockchain technology become market-ready, trustworthy and GDPR-compliant through standardisation?”
10:00 am – Keynote by Haudenschild: ““Core challenge to raise the actual and perceived trustlessness and trustworthiness of blockchains in the banking sector”
- Moderator: Christian Wirth — Speakers: Daniel Haudenschild, Paul Wang, Thevoz. Kolain.
- A large majority of IT security experts and prospective blockchain institutional users are still highly sceptical of the security claims of even the most securely-architected or time-tested blockchains. Many challenges remains to be addressed. How can the blockchain benefit from ultra-high assurance IT systems (for example, on the client -side) and their certification models? How can blockchains, in turn, measurably improve the assurance of high-assurance systems?
10:40 am– Keynote by Wirth & Kolain “”Novel risk-based instruments of the GDPR – How to create trust through legal informatics”
10:50 am – Coffee Break
11:00 am – Keynote by Roman Yampolskiy: (Video Link) “Challenges of AI safety and resilience: the role of technical and socio-technical technical breakthroughs, of adequate ecrtification bodies and transanational governance”
11.10 am – Keynote by Stuart Armstrong: “How can a coalition of actors promote the establishment of adequate global AI governance by exiting the current semi-anarchic default condition.”
11.20 am – Coffe break
11.30 am – Keynote by Leila Delarive “Can will law harness the tech (r)evolution?”
11.40 am – Keynote by Troy Davis: “The history of the fight for a federal global government: from Garry Davis in 1945 all the way to the needs of global AI regulation” (1 min video on Garry Davis)
- Moderator: Troy Davis — Speakers: Troy Davis, Stuart Armstrong, Leila Delarive, Lennig Pedron, Rufo Guerreschi, Reinhard Posch.
- Recent calls for international treaties or new ethics for the trustworthiness of IT or AI systems – such as Tech Accord, Charter of Trust, Call of Paris or a Digital Geneva Convention – are crucial to raise awareness. Yet, none of them tackles head on the need for trustworthy cybersecurity certifications to enforce the oversight of treaties or enact the principles of such declarations.
How can such certification bodies increase the resilience and “forensic friendliness”, to radically improve resistance against attacks and confidence about attacks attribution? — What constituent processes can ensure a timely, effective and democratically-efficient implementation – by a critical mass of actors – of meaningfully-enforceable national policies or international treaties for ultra-high assurance IT standards setting and certification processes?
12:20 pm – Coffee Break
- Discussants: Audience and Armstrong, Rickly, Davis, Delarive, Guerreschi, Pedron
- Can the all-powerful threats of AI and cybersecurity provide the needed motivation to build adequate open federal transnational democratic institutions, as the nuclear threat nearly did in 1945? Can the threats (and opportunities) of the accelerating pace AI and the destabilizing effect of cyber-warfare constitute a unique opportunity to radically empower and democratize our transnational governance institutions?
13:00 pm – Light Lunch and Networking
02:00 pm – End
On Sept 24-25th 2015, the 1st Edition 2018 was held in Brussels, with a high-level set of speakers, including recognized IT security experts such as Bruce Schneier and Bart Preneel, and from the IT security institutions, such as the Head of Information Superiority of the European Defence Agency, and more. See the report and the program with videos.
On Oct 16th, 2015, the 2nd Edition was held during the largest South American free software conference in Iguaçu, Brazil, and gathered distinguished minister of IT of Brazil, Marcos Mazoni, Rogerio Winter, a high-ranking official of the Brazilian Cyber Command, the CEO of the most advanced crypto company in Brazil, Kryptus, and more experts.
On July 21st, 2016, a 3rd Edition was held in New York with amazing speakers, including Joe Cannataci, the UN Special Rapporteur on the Right to Privacy, and Max Schrems, the Austrian privacy activist behind the overhaul of Safe Harbor Agreement.
On September 22nd-23rd 2016, the 4th Edition 2016 held in Brussels gathered experts, including the CIO of Austria, the Vice-Chair of the EU Parliament LIBE Committee, Paul Nemitz, Director of Fundamental Rights and Union citizenship in the DG Justice of the European Commission, and more. See the
On May 4th 2018, the 5th Edition 2018 was held in Berlin. High profiles joined, including Reinhard Posch, Chief Information Officer for Austria, Andreas Reisen, Head of Division “IT and Cyber Security in Critical Infrastructures and the Private Sector, Secure Information Technology” of the German Federal Ministry of the Interior, and more.
Interview on Swiss TV (Feb 2019)
Trailer of the 4th Edition (2017)
Panel on Challenge A (2015)
Welcome Keynote (2015)
The Trustless Computing Association is a non-profit organization, based in Geneva, that has aggregated World-class partners and advisors to build open IT technologies, certifications and ecosystems of technologies to deliver levels of trustworthiness that are radically more secure and accountable than today’s state-of-the-art.
Together with its spin-off startup TRUSTLESS.AI – based in Geneva at the Fusion accelerator – it has been building (1) the Trustless Computing Certification Body, a new IT security certification body and schema, aimed at radically-unprecedented levels of trustworthiness, while at once solidly enabling legit lawful access and (2) building the Seevik Pod and Net, an initial compliant open computing base, ecosystem and IT device.
Event Series Supported By