After editions in Brussels, New York, Iguaçu, Berlin, the 6th edition of the Free and Safe in Cyberspace conference series was held last April 9 and 10th 2019 in Geneva, at the Fintech Fusion accelerator in 50 Avenue de la Praille, new home of the organizer Trustless Computing Association and its spin-off startup TRUSTLESS.AI.
Thanks to all the great speakers! and Thanks for the support of the Canton of Geneva and Fusion!
Looking forward to our 7th edition in Geneva next year!
Some pictures below:
After editions in Brussels, New York, Iguaçu, Berlin, the 6th edition of the Free and Safe in Cyberspace conference series will be held next April 9 and 10th 2019 in Geneva, at the Fintech Fusion accelerator in 50 Avenue de la Praille, new home of the organizer Trustless Computing Association and its spin-off startup TRUSTLESS.AI.
IT security and banking experts will discuss how we can define new paradigms and build a new international non-governmental standards setting and certification body – and a 1st complaint open ecosystem and target architecture – that can certify end-2-end IT services with radically-unprecedented levels of trustworthiness, while concurrently ensuring offline legitimate lawful access, all the way down to extreme CPU design review and fabrication oversight. Initially targeted at the confidentiality and integrity of human communications and financial transactions, it plans to be extended to other society-critical IT systems, such 5G networks, critical AIs, and large social media.
As in previous editions, we’ll seek for the solution to 4 Challenges that we identified back in 2015 as key to achieve the IT and AI security and privacy that we need as a society, and to spur great economic opportunities.
Day 1. During Challenge A, we’ll try to answer the question “What new IT paradigms and certification governance models can deliver human communications and financial transactions that are radically-more-secure than today state-of-the-art?“. Then, in Challenge B, we’ll ask: “If we can solve Challenge A, how can we concurrently solidly ensure legitimate lawful access to prevent grave crimes and enable its sustainable adoption?“. We’ll explore the possibility that Challenge A and B are one and the same, solvable by uncompromising apply the best time-proven socio-technical paradigm. During Panel 1 and Panel 2, we will explore how such new technologies, certifications and ecosystems can provide great economic opportunities for early adopters, such as banks, wealth management firms, and local governments.
Day 2. During Challenges C and Challenge D, we’ll analyse the application of such new technologies and certifications in other society-critical IT systems, such as artificial intelligence, social networks and 5G networks. During Panel 3 to Panel 4, we’ll explore how such new IT and certifications can provide the basis of national policies and international treaties that can contribute to peace, democracy, freedom, and even improve chances of rational human control over the future of AI.
Former Chief Information Security Officer and Head of Information Security Services of UNISYS. Senior Advisor at TRUSTLESS.AI.
VP Software Research & Technologies for Thales Group. Lead of RISC-V-based SW ecosystem research.
Vice-President of eGovernment Systems at SICPA, global leader in anti-counterfeit technologies.
Founder of Skype and Kazaa.
Philantropist and founder of theAI safety centers Future of Life Institute and Centre for the Study of Existential Risk.
Co-Founder of Privacy by Blockchain Design. Former Senior Blockchain Architect at IBM Berlin. Advisor to TRUSTLESS.AI. Privacy researcher.
Managing Partner at the POINT5 Family Office, NGO advisor. Anti-corruption keynote speaker.
Former Chief Information Security Office of the Judiciary of the Republic and Canton of Geneva. Formerly IT executive at luxury retailer Richemont.
CEO and co-founder of ZENData
Cybersecurity professional, researcher & evangelist.
Columnist at Bilan.
Senior Director of Engineering at Symphony.com, leading messaging and groupware for the financial sector.
Long-term AI and IT security expert, author and professor. Director of the Cyber Security Lab. Author of “Artificial Superintelligence: a Futuristic Approach“.
Founder and President of ICON NGO based in Geneva, Director of the R&D laboratory of cybersecurity of SecuLabs in Innovation Park – EPFL campus
Italian Regional Councillor in Lazio Region. Formerly at IBM for 17 years. Expert in Digital democracy, IT security and blockchain. Submitted the 1st law proposal for Trustless Computing.
Forensic expert. Executive Advisor to the CEO and Advisory Board Member at High-Tech Bridge, Advisory Board Member and Cybersecurity Advocate at Mt Pelerin.
Co-founder of Wealth Mosaic, leader building connections world-wide between startups and wealth managers.
Group Chief Information Security Officer at OVH. Formerly was Chief Information Security Officer of Societè Generale.
Founder and CEO of Id Est Avocats, Swiss law firm specialized in digital privacy and open innovation.
Professor of digital circuits and systems at ETH Zurich. Professor at Università di Bologna.
Committee Member at CLUSIT, the Fédération des Entreprises Romandes FER Genève and the State of Geneva.
Senior Legal Expert in privacy and data protection law. Formerly at the Dutch Ministry of the Interior, the European Commission and T-Mobile Netherlands. Now actively involved in the Internal Justice System of the World Health Organization in Geneva.
Our networks are broken. Monitoring of 3G, 4G and 5G networks is essential for nations’ ability to combat crime. But their lack of certified security and international accountability leads to major privacy and security risks for all citizens, and distrust among nations.
Our devices are broken. When even Bezos and Trump communications with their closest associates appear to be easily hackable even by mid-level hackers, what hope is there for the rest of us for?
Our digital banking is broken. Network tracking and lack of confidentiality, fast increasing identity thefts and financials frauds via spear-phishing and even voice cloning are eroding trust in financial transactions.
Key problem is that technologies are getting ever more complex and more obscure and hackers ever more resourceful. Current attempts to radically increase the trustworthiness of IT sensitive system – especially in communications and transactions – are centered on the pursuit of scientific breakthroughs in the area of artificial intelligence, on quantum computing, and innovative encryption protocols, such as quantum-resistant, blockchains, zero-proof, end-2-end and homomorphic. Meanwhile, a few security-by-design or blockchain initiatives are taking a more holistic, short-term and trustless approach, which is centered on open, time-proven, battle-tested – yet future-proof – technologies and processes; transparent oversight down to critical hardware design and fabrication; a transparent resolution of the lawful access needs; and radically more accountable and resilient certification and ecosystem governance models.
But is it really a technological problem? Or is it instead that all IT is broken – by design, at birth – to satisfy legitimate needs of law enforcement? Can we have both meaningful freedom and public safety in cyberspace?
Most believe that meaningful digital freedoms and public safety are an inevitable “either-or” choice, a sort of “zero-sum game“. We discovered it may well be instead a “both-or-neither” challenge, solvable primarily through the same zero-trust socio-technical paradigms and international certification governance models. This is all the more urgent as the breaking of all IT at birth by powerful nations, to retain investigative access, has placed the safety and freedom of nearly all citizens, and the very integrity of their democratic systems, in the hands of the most powerful hacking entities.
Can a new international standards setting and certification body – and complaint open ecosystem – achieve radically-unprecedented levels of confidentiality and integrity – for our most sensitive human computing, and then other critical systems – while concurrently ensuring offline legitimate lawful access?
Can a few leading wealth management firms, enterprises, public institutions and NGOs can leverage such an innovation to turn client-side cybersecurity from a threat into a fundamental competitive advantage in their respective markets.
Location: Fusion startup accelerator (50 Avenue de la Praille, Geneva)
Capacity: 50 seats capacity.
April 9th, Tuesday
12:00 pm – Registration & light lunch
01:00 pm – Welcome by Laurent Bischof, Managing Director of Fusion and Polytech Ventures.
01:10 pm – Welcome by Michael Kleiner, Head of Department of Economic Development, Directorate General for Economic Development, Research and Innovation, Republic and State of Geneva.
“Economic opportunities for Geneva in the area of IT security”.
01:20 pm – Keynote by Marco Obiso, Head of Cybersecurity Division at UN International Communication Union. “Paths towards next- generation international IT security standards and certifications for sensitive human communications and transactions”
01:30 pm – Introduction by Rufo Guerreschi, Exec. Dir. of Trustless Computing Association and CEO of TRUSTLESS.AI.
“The 4 Challenges of Free and Safe in Cyberspace.“
- Moderator: Gerhard Knecht –— Panelists: Marco Obiso, Luca Benini, Manuela Troncoso, Reinhard Posch, Solange Ghernaouti.
- How can we provide ordinary citizens access to affordable and user-friendly IT services with levels of trustworthiness that are radically-unprecedented (i.e. ultra-high assurance*) and meaningfully-abiding to the UN Universal Declaration of Human Rights, at least for their most sensitive computing?
Can we re-create in cyberspace a meaningful private sphere? What are the key paradigms needed to achieve this goal? What is the role of uncompromisingly “zero trust” security-by-design paradigms, via transparent and extreme review and oversight of all critical lifecycle components and processes? Can we realistically secure enough CPU design and chip fabrication oversight? What are the advantages, disadvantages and limitations of free/open source software? What is the role of formal verification? What is the role of public security-review by “ethical” experts? How about Blockchains, Quantum Computing, Artificial Intelligence? Can citizen-witness and citizen-jury processes help secure the supply-chain? What is the role of certification and oversight governance? What scale of investments are needed? Can we imagine a parallel hardware and software ultra-secure computing universe, as a user-friendly supplement to every-day computing devices? Read more
02:40pm – Coffee break
02:50 pm – Keynote by Gerhard Knecht “Towards ultra-high assurance IT for human computing”
03:00 pm – Intro to Challenge B by the Trustless Computing Association.
- Moderator: Rufo Guerreschi
Panel 1: Michel Jaccard, Hoten t’ Wouter, Caroline Portal, Antoine Clerget, Bernard Tavernier.
- Can providers of ultra-high assurance* IT reliably offer compliance mechanisms to legitimate lawful access requests – voluntarily (i.e. in addition to what’s required by selected jurisdictions) – while overall reducing both resulting risks for the privacy of users and for public safety? If so, how?What are the core paradigms of such certification processes?
Can the same extreme technical and human safeguards that are needed to deliver ultra-high assurance also enable voluntary compliance to lawful access request – at least in some EU states – that overall reduce the risk of privacy rights abuse of end-users by anyone to levels that are radically or substantially lower than any of the other alternative secure IT systems which do not offer such voluntary processing? Could or should such processes rely on a provider-managed voluntary data and/or key recovery scheme that is certified and overseen by primarily-non-governmental radically citizen-accountable, independent and competent international body? Could the inevitable added risk be essentially shifted from technical systems to resilient in-person organizational processes? Read more
04:10 pm – Coffee break
04:30 pm – Keynote & QA by Rufo Guerreschi: Case for a Trustless Computing Certification Body. Ongoing initiative for a standard setting and certification body suitable to certify ultra-high levels of trustworthiness for IT systems and their voluntary offline compliance to legitimate lawful access requests. Initially for human communications and transactions, and then for society-critical and complex IT systems.
05:10 pm – Coffee break
05:30 pm – Keynote by Daniel Haudenschild, President of the Crypto Valley Association:
“Core challenge to raise the actual and perceived trustlessness and trustworthiness of blockchains in the banking sector”
05:40 pm – Keynote by Roman Yampolskiy (Video Link)
“Challenges of AI safety and resilience: the role of technical and socio-technical technical breakthroughs, of adequate certification bodies and transnational governance”
05:50 pm – Intro by Rufo Guerreschi, Exec. Dir. Trustless Computing Association
“Introduction to Panels 1 and 2: wealth management and client-side cybersecurity”
06.00 pm – Keynote by Stephen Wall of Wealth Mosaic
“Trends and developments in the global WealthTech landscape and the relative importance and focus on their security”.
- Moderator: Tony Zeiger — Panelists: Eldo Mabiala, Stephen Wall, Tony Zeiger, Solange Gherbouti,
- Hackers and data breaches are part of the daily news. But bulk of cybercrime is unreported or unnoticed, with behind the scene financial frauds, extortion and theft of personal and business secrets. Wealth management clients are ever more concerned about the confidentiality of their advisory and security of their financial transactions, and this in turn increases friction to client relationship where client will just trust face-to-face meeting for confidential matters. Even the best and most secure apps, expensive devices, authentication methods are vulnerable to confidentiality, integrity and authentication breaches even by mid-level hackers. Will the “call back” transaction verification be enough when voice cloning and deep fakes technologies are constantly improving? Meanwhile, IT giants like are rapidly moving into banking, and increasingly taking control of the client user interface and trust relationship like WeChat or WhatsApp, and being able to offer better security by controlling the underlying software and hardware like Apple.
06:40 pm – Aperitif session
06.50 pm – Spephane Nappo, Group Chief Information Security Officer at OVH:
“Threats and opportunities of client-side security in the banking sector”
- Moderator: Steven Meyer — Panelists: Eldo Mabiala, Emmanuelle Tzanos, Rufo Guerreschi, Tony Zeiger.
- Cyber in the financial World done correctly can open doors to new and amazing opportunity; but done wrong, it can bring us back to the age of pen & paper. Both ease of use and security of digital financial advisory are critical to retain, deepen and expand client relationship in the digital age.
How can financial institutions become the digital trust partner of their clients? How can this be done and what advantage would the leaders gain compared to the followers? Can a group of leading enterprises, wealth management firms, banks, NGOs and nations gain a fundamental competitive advantage in digital trust by leading the creation and adoption of next-generation IT security paradigms and certifications?
08:00 pm – Aperitif, snack and networking
09:00 pm – End
*Definition of “ultra-high assurance”: In civilian and military IT security, it is used to refer to systems of the highest level of trustworthiness in confidentiality, integrity, and/or availability. Perfect trustworthiness will never exist, but we have learned that even current “high assurance” technologies, standards, and certifications are radically inadequate for the needs of citizens, enterprises, democratic institutions, critical societal systems, and autonomous systems.
April 10th, Wednesday
08:30 am – Registration & Coffee
09:10 am – Welcome by Rufo Guerreschi
“Introduction to Free and Safe in Cyberspace – Challenges C and D”
- Moderator: Rufo Guerreschi — Speakers: Christian Wirth, Leila Delarive, Stuart Armstrong, Tim Llewellynn.
- Current attempts to radically increase the trustworthiness of critical IT systems are often centered on the pursuit of scientific breakthroughs in the area of artificial intelligence, quantum computing and cryptography, blockchains, and new protocols, such as zero-knowledge proof, and end-2-end and homomorphic encryption. Meanwhile, a few security-by-design or blockchain initiatives are taking a more holistic, short-term and trustless approach, centered on open, time-proven, battle-tested – yet future-aware – technologies and processes; transparent oversight down to critical hardware design and fabrication; a transparent resolution with extreme safeguards of the lawful access needs; and more accountable and resilient certification and ecosystem governance models.
09:50 am – Keynote by Wirth
“Can blockchain technology become market-ready, trustworthy and GDPR-compliant through standardisation?”
10.00 am – Keynote by Leila Delarive
“Can law harness the tech (r)evolution?”
- Moderator: Christian Wirth — Speakers: Paul Wang, Philippe Thevoz, Michael Kolain, Jorn Erbguth.
- A large majority of IT security experts and prospective blockchain institutional users are still highly sceptical of the security claims of even the most securely-architected or time-tested blockchains. Many challenges remains to be addressed. How can the blockchain benefit from ultra-high assurance IT systems (for example, on the client -side) and their certification models? How can blockchains, in turn, measurably improve the assurance of high-assurance systems?
10:40 am – Keynote by Kolain
“Novel risk-based instruments of the GDPR – How to create trust through legal informatics”
10:50 am – Coffee Break
11.10 am – Keynote by Stuart Armstrong: “How can a coalition of actors promote the establishment of adequate global AI governance by exiting the current semi-anarchic default condition.”
11.20 am – Keynote by Troy Davis:
“The history of the fight for a federal global government: from Garry Davis in 1945 all the way to the needs of global AI regulation” (trailer video on Garry Davis)
11.35 am – “Skype-Side Chat” with Jaan Talliin (recorded video interview)
“Need, challenges and scenarios of global governance of AI “
- Moderator: Troy Davis — Speakers: Stuart Armstrong, Leila Delarive, Lennig Pedron, Rufo Guerreschi.
- Recent calls for international treaties or new ethics for the trustworthiness of IT or AI systems – such as Tech Accord, Charter of Trust, Call of Paris or a Digital Geneva Convention – are crucial to raise awareness. Yet, none of them tackles head on the need for trustworthy cybersecurity certifications to enforce the oversight of treaties or enact the principles of such declarations.
How can such certification bodies increase the resilience and “forensic friendliness”, to radically improve resistance against attacks and confidence about attacks attribution? — What constituent processes can ensure a timely, effective and democratically-efficient implementation – by a critical mass of actors – of meaningfully-enforceable national policies or international treaties for ultra-high assurance IT standards setting and certification processes?
12:20 pm – Coffee Break
- Moderator: Rufo Guerreschi
Panelist: Troy Davis, Stuart Armstrong, Jean-Marc Rickly, Leila Delarive, Lennig Pedron
- Can the all-powerful threats of AI and cybersecurity provide the needed motivation to build adequate open federal transnational democratic institutions, as the nuclear threat nearly did in 1945? Can the threats (and opportunities) of the accelerating pace AI and the destabilizing effect of cyber-warfare constitute a unique opportunity to radically empower and democratize our transnational governance institutions?
13:00 pm – Light Lunch and Networking
02:00 pm – End
On Sept 24-25th 2015, the 1st Edition 2018 was held in Brussels, with a high-level set of speakers, including recognized IT security experts such as Bruce Schneier and Bart Preneel, and from the IT security institutions, such as the Head of Information Superiority of the European Defence Agency, and more. See the report and the program with videos.
On Oct 16th, 2015, the 2nd Edition was held during the largest South American free software conference in Iguaçu, Brazil, and gathered distinguished minister of IT of Brazil, Marcos Mazoni, Rogerio Winter, a high-ranking official of the Brazilian Cyber Command, the CEO of the most advanced crypto company in Brazil, Kryptus, and more experts.
On July 21st, 2016, a 3rd Edition was held in New York with amazing speakers, including Joe Cannataci, the UN Special Rapporteur on the Right to Privacy, and Max Schrems, the Austrian privacy activist behind the overhaul of Safe Harbor Agreement.
On September 22nd-23rd 2016, the 4th Edition 2016 held in Brussels gathered experts, including the CIO of Austria, the Vice-Chair of the EU Parliament LIBE Committee, Paul Nemitz, Director of Fundamental Rights and Union citizenship in the DG Justice of the European Commission, and more. See the
On May 4th 2018, the 5th Edition 2018 was held in Berlin. High profiles joined, including Reinhard Posch, Chief Information Officer for Austria, Andreas Reisen, Head of Division “IT and Cyber Security in Critical Infrastructures and the Private Sector, Secure Information Technology” of the German Federal Ministry of the Interior, and more.
Interview on Swiss TV (Feb 2019)
Trailer of the 4th Edition (2017)
Panel on Challenge A (2015)
Welcome Keynote (2015)
The Trustless Computing Association is a non-profit organization, based in Rome and Geneva, that has aggregated World-class partners and advisors to build open IT technologies, certifications and ecosystems that can deliver levels of trustworthiness that are radically higher than state-of-the-art.
Together with its spin-off startup TRUSTLESS.AI – based in Geneva at the Fusion accelerator – it has been building (1) the Trustless Computing Certification Body, a new IT security certification body and schema, aimed at radically-unprecedented levels of trustworthiness, while at once solidly enabling legit lawful access and (2) building the Seevik Pod and Net, an initial open computing base, ecosystem and IT device, compliant to such new certifications.
Event Series Supported By