After editions twice in Brussels, and once in New York, Iguaçu and Berlin, we’ll hold our 6th Free and Safe in Cyberspace next April 9-10th 2019 in Geneva, at the Fusion startup accelerator – new home to our Trustless Computing Association and its spin-off startup TRUSTLESS.AI since October 2018.

As in previous editions, top experts and organizations will discuss how we can build a new international standards setting and certification body – and a 1st complaint open ecosystem and tagret architeture – that can certify end-2-end IT services radically-unprecedented levels of trustworthiness, while concurrently ensuring offline legitimate lawful access. Initially targeted at the confidentiality and integrity of the most sensitive human communications and financial transactions, and then for other society-critical IT systems,

The event, as in previous editions, will focus on seeking for a solution to 4 key challenges of IT and AI security, and related economic opportunities. Challenge A will explore “How can we build new IT and certification governance models for human communications and financial transactions that are radically-more-secure than today?“.  Challenge B will seek “If we can solve Challenge A, how can we concurrently solidly ensure legitimate lawful access to prevent grave crimes and enable its sustainable adoption?”  

Challenges C and Challenge D will focus on analysing the long-term public benefit impact of such techs and certifications in other critical areas such as sensitive and critical societal IT systems, such as artificial intelligence, social networks and 5G networks. During Panel 1 to Panel 4, we will explore the economic and public-good opportunities opening up for those private actors and governments that will lead in the creation and adoption of such ultra-secure IT systems.

 

Days
Hours
Minutes
Seconds

Speakers’ Highlights

Former Chief Information Security Officer and Head of Information Security Services of UNISYS. Senior Advisor at TRUSTLESS.AI 

Head of the Cybersecurity Division at the UN International Telecommunication Union.

VP Software Research & Technologies for Thales Group. Lead of RISC-V open hardware research..  

Eldo Mabiala

Group Head of Security and Organisation at SYZ Group, a leading Swiss wealth management firm.

Managing Director of the Fusion startup accelerator and Polytech Ventures Holding.

Vice-President of eGovernment Systems at SICPA, global leader in anti-counterfeit technologies.

Global Risk and Resilience Cluster Lead of Geneva Centre for Security Policy.

Head of Economic Development Department of the Canton of Geneva. Former mayor of Geneva.

Director of the EPFL Spring Lab Security and Privacy Engineering Laboratory in Lausanne.

 

Director of the Swiss Cybersecurity Advisory and Research Group. Member of the Swiss Academy of Engineering Sciences.

Chief Information Officer of the Federal Republic of Austria, since 2001.

 

James Martin Research Fellow at Future of Humanity Institute, Oxford University.

Founder and CIO of PeakView Private Investment Office.

 

Chief Investment Officer at Wealth And Asset Management Solutions.

Managing Partner at the POINT5 Family Office, NGO advisor. Anti-corruption keynote speaker.

Executive Director of the Trustless Computing Association and CEO of TRUSTLESS.AI.

CEO and co-founder of ZENData
Cybersecurity professional, researcher & evangelist.
Columnist at Bilan.
Keynote speaker

President of the World Citizen Foundation. Fellow at World Federalist Institute.

Sr Director of Engineering at Symphony.com, leading messagin and groupware for financial sector.

CEO and Co-Founder of nViso SA. Coordinator of Bonseyes Artificial Intelligence Marketplace.

Co-Founder of Privacy by Blockchain Design. Former Senior Blockchain Architect at IBM Berlin. Advisor to TRUSTLESS.AI. Privacy researcher. 

Long-term AI and IT security expert, author and professor.  Director of the Cyber Security Lab. Author of “Artificial Superintelligence: a Futuristic Approach“.

President of the Empowerment Foundation.

Italian Regional Councillor in Lazio Region. Formerly at IBM for 17 years. Expert in Digital democracy, IT security and blockchain. Submitted the 1st law proposal for Trustless Computing.

Executive Advisor to the CEO and Advisory Board Member at High-Tech Bridge, Advisory Board Member and Cybersecurity Advocate at Mt Pelerin

Co-founder at the Wealth Mosaic, leader building connectionsworld-wide between startups and wealth managers.

Founder and President of ICON NGO based in Geneva, Director of the R&D laboratory of cybersecurity of SecuLabs in Innovation Park – EPFL campus

Mathematician and founder of PersonalData.io, the startup hestia.ai, MyData Geneva and board member of MyData Global.

Founder and CEO of Id Est Avocats, Swiss law firm specialized in digital privacy and open innovation.

Professor at Università di Bologna and full professor of digital circuits and systems at ETH Zurich

President of the Board Of Directors of the Crypto Valley Association. Former CEO of Swisscom Blockchain.

Backgrounder

Cybercrime cost will reach $6 trillion by 2021, most of which unreported or unnoticed by the victims.  

Our networks are broken. Monitoring of 3G, 4G and 5G networks is essential for nations’ ability to combat crime. But their lack of certified security and international accountability leads to major privacy and security risks for all citizens, and distrust among nations.

Our devices are broken. When even Bezos and Trump communications with their closest associates appear to be easily hackable even by mid-level hackers, what hope is there for the rest of us for? 

Our digital banking is broken. Network tracking and lack of condifentiality, fast increasing identity thefts and financials frauds via spearphishing and even voice cloning are eroding trust in financial transactions.

Key problem is that technologies are getting ever more complex and more obscure and hackers ever more resourceful. Current attempts to radically increase the trustworthiness of IT sensitive system – especially in communications and transactions – are centered on the pursuit of scientific breakthroughs in the area of artificial intelligence, on quantum computing, and innovative encryption protocols, such as quantum-resistant, blockchains, zero-proof, end-2-end and homomorphic. Meanwhile, a few security-by-design or blockchain initiatives are taking a more holistic, short-term and trustless approach, which is centered on open, time-proven, battle-tested – yet future-proof – technologies and processes; transparent oversight down to critical hardware design and fabrication; a transparent resolution of the lawful access needs; and radically more accountable and resilient certification and ecosystem governance models

But the, in the end, is it really a technological problem? Or is it instead that all IT is broken – by design, at birth – to satisfy legitimate needs of law enforcement?  Can we have both meaningful freedom and public safety in cyberspace? 

Most believe that meaningful digital freedoms and public safety are an inevitable “either-or” choice, a sort of “zero-sum game“. We discovered it may well be instead a “both-or-neither” challenge, solvable through the same zero-trust socio-technical paradigms and international certification governance models. This is all the more urgent as the breaking of all IT at birth by powerful nations, to retain investigative access, has placed the safety and freedom of nearly all citizens, and the very integrity of their democratic systems, in the hands of the most powerful hacking entities.

Can a new international standards setting and certification body – and complaint open ecosystem – achieve radically-unprecedented levels of confidentiality and integrity – for our most sensitive human computing, and then other critical systems – while concurrently ensuring offline legitimate lawful access?

Can a few leading wealth management firms, enterprises, public institutions and NGOs can leverage such an innovation to turn client-side cybersecurity from a threat into a fundamental competitive advantage in their respective markets.

Agenda

April 9th, TUESDAY

Location: Fusion startup accelerator (50 Avenue de la Praille, Geneva)
Capacity: 60 seats capacity.
Language: English.

12:00 pm – Registration & light lunch

01:00 pm – Welcome by Laurent Bischof, MD at Fusion and Polytech Ventures.

01:10 pm – Keynote by Marco Obiso, Head of Cybersecurity Division at ITU. “A path towards next generation international IT security standards and certtifications for human communications and transactions”

01:20 pm – Welcome by Pierre Maudet, Head of Economic Development Department, Canton of Geneve. “Economic opportunities for Geneva in the are of IT security”.

01:30 pm – Introduction by Rufo Guerreschi. “The 4 Challenges of Free and Safe in Cyberspace.”

  • ModeratorKnecht,Panelists:  Marco Obiso, Luca Benini, Manuela Troncoso, Reinhard Posch, Paul Wang, Solange Ghernaouti.
    .
  • How can we provide ordinary citizens access to affordable and user-friendly IT services with levels of trustworthiness that are radically-unprecedented (i.e. ultra-high assurance*) and meaningfully-abiding to the UN Universal Declaration of Human Rights, at least for their most sensitive computing?
    .
    Can we re-create in cyberspace a meaningful private sphere? 
    What are the key paradigms needed to achieve this goal? What is the role of uncompromisingly “zero trustsecurity-by-design paradigms, via transparent and extreme review and oversight of all critical lifecycle components and processes? Can we realistically secure enough CPU design and chi fabrication oversight? What are the advantages, disadvamtages and limitations of free/open source software? What the role of formal verification and ensuring deep review by expert “ethical” hackers? How about Blockchains, Quantum Computing, Artificial Intelligence? Can citizen-witness and citizen-jury processes help? What is the role of certification and oversight governance?  What scale of investments are needed? Can we imagine a parallel hardware and software ultra-secure computing universe, as a user-friendly supplement to every-day computing devices?  Read more

02:40pm – Coffee break

02:50 pm – Keynote by TBD

03:00 pm –  Intro to Challenge B by the Trustless Computing Association.

  • Moderator: Guerreschi — Panelists: Jaccard ,Tavernier, Posch, Clerget, Nemitz.
    .
  • Can providers of ultra-high assurance* IT reliably offer compliance mechanisms to legitimate lawful access requests – voluntarily (i.e. in addition to what’s required by selected jurisdictions) – while overall reducing both resulting risks for the privacy of users and for public safety? If so, how?What are the core paradigms of such certification processes?
    .
    Can the same extreme technical and human safeguards that are needed to deliver ultra-high assurance also enable voluntary compliance to lawful access request – at least in some EU states – that overall reduce the risk of privacy rights abuse of end-users by anyone to levels that are radically or substantially lower than any of the other alternative secure IT systems which do not offer such voluntary processing? Could or should such processes rely on a provider-managed voluntary data and/or key recovery scheme that is certified and overseen by primarily-non-governmental radically citizen-accountable, independent and competent international body? Could the inevitable added risk be essentially shifted from technical systems to resilient in-person organizational processes? Read more

04:00 pm – Coffee break

04:20 pm – Keynote & QA by Rufo Guerreschi: Case for a Trustless Computing Certification Body. Ongoing initiative for a standard setting and certification body suitable to certify ultra-high levels of trustworthiness for IT systems and their voluntary offline complaince to legitimate lawful access requests. Initially for human communications and transactions, and then for society-critical and complex IT systems.

04:40 pm – Q&A on the Trustless Computing Certification Body.

05:00 pm – Coffee break

05:20 pm – Keynote by Wall of Wealth Mosaic: “Landscape of innnovations and startups in cybersecurity for wealth management”

05:30 pm – Keynote by TBD

05:40 pm – Keynote by TBD

  • Moderator: Juan Carlos Lara — Panelists: Tony Zeiger, Valdo Petronio, Gherbouti, TBD.
    .
  • Hackers and data breaches are part of the daily news. But bulk of cybercrime is unreported or unnoticed, with behind the scene financial frauds, extortion and theft of personal and business secrets. Wealth management clients are ever more concerned about the confidentiality of their advisory and security of their financial transactions, and this in turn increases friction to client relationship where client will just trust face-to-face meeting for confidential matters. Even the best and most secure apps, expensive devices, authentication methods are vulnerable to confidentiality, integrity and authentication breaches even by mid-level hackers. Will the “call back” transaction verification be enough when voice cloning and deep fakes technologies are constantly improving? Meanwhile, IT giants like are rapidly moving into banking, and increasingly taking control of the client user interface and trust relationship like WeChat or WhasApp, and being  able to offer better security by controlling the underlying software and hardware like Apple. 

06:40 pm – Aperitif session

  • Moderator: Meyer — Panelists: Rufo Guerreschi, Eldo Mabiala, Valdo Petronio, Tony Zeiger.
    .
  • Cyber in the financial World done correctly can open doors to new and amazing opportunity; but done wrong, it can bring us back to the age of pen & paper. Both ease of use and security of digital financial advisory are critical to retain, deepen and expand client relationship in the digital age. 
    How can financial institutions  become the digital trust partner of their clients? How can this be done and what advantage would the leaders gain compared to the followers? Can a group of leading enterprises, wealth management firms, banks, NGOs and nations gain a fundamental competitive advantage in digital trust by leading the creation and adoption of next-generation IT security paradigms and certifications? 

08:00 pm  Aperitif, snack and networking

09:00 pm  End

*Definition of “ultra-high assurance”: In civilian and military IT security, it is used to refer to systems of the highest level of trustworthiness in confidentiality, integrity, and/or availability. Perfect trustworthiness will never exist, but we have learned that even current “high assurance” technologies, standards, and certifications are radically inadequate for the needs of citizens, enterprises, democratic institutions, critical societal systems, and autonomous systems.

April 10th, Wednesday

Location: Fusion startup accelerator (50 Avenue de la Praille, Geneva)
Capacity: 60 seats capacity.
Language: English.

08:30 am – Registration & Coffee

09:10 am – Welcome by Rufo Guerreschi and Introduction to Challenges C and D.

  • Moderator: Lennig Pedron — Speakers:  Jean-Marc Rickli, Leila Delarive, Staurt Armstrong, Llewellynn, Daniel Haudenschild.
    .
  • Current attempts to radically increase the trustworthiness of critical IT systems are often centered on the pursuit of scientific breakthroughs in the area of artificial intelligence, quantum computing and cryptography, blockchains, and new protocols, such as zero-knowldeg proof, and end-2-end and homomorphic encryption. Meanwhile, a few security-by-design or blockchain initiatives are taking a more holistic, short-term and trustless approach, centered on open, time-proven, battle-tested – yet future-aware – technologies and processes; transparent oversight down to critical hardware design and fabrication; a transparent resolution with extreme safeguards of the lawful access needs; and more accountable and resilient certification and ecosystem governance models.

09:50 am – Keynote by Wirth & Kolain “Can blockchain technology become market-ready, trustworthy and GDPR-compliant through standardisation?”

10:00 am – Keynote by Haudenschild: ““Core challenge to raise the actual and perceived trustlessness and trustworthiness of blockchains in the banking sector”

  • Moderator: Christian Wirth — Speakers: Daniel Haudenschild, Paul Wang, Thevoz. Kolain.
    .
  • A large majority of IT security experts and prospective blockchain institutional users are still highly sceptical of the security claims of even the most securely-architected or time-tested blockchains. Many challenges remains to be addressed. How can the blockchain benefit from ultra-high assurance IT systems (for example, on the client -side) and their certification models? How can blockchains, in turn, measurably improve the assurance of high-assurance systems? 

10:40 amKeynote by Wirth & Kolain “”Novel risk-based instruments of the GDPR – How to create trust through legal informatics”

10:50 am – Coffee Break

11:00 am – Keynote by Roman Yampolskiy: (Video Link) “Challenges of AI safety and resilience: the role of technical and socio-technical technical breakthroughs, of adequate ecrtification bodies and transanational governance”

11.10 am – Keynote by Stuart Armstrong: How can a coalition of actors promote the establishment of adequate global AI governance by exiting the current semi-anarchic default condition.”

11.20 am – Coffe break

11.30 am – Keynote by Leila Delarive “Can will law harness the tech (r)evolution?”

11.40 am – Keynote by Troy Davis: “The history of the fight for a federal global government: from Garry Davis in 1945 all the way to the needs of global AI regulation” (1 min video on Garry Davis)

  • Moderator: Troy Davis — Speakers: Troy Davis, Stuart Armstrong, Leila Delarive, Lennig Pedron, Rufo Guerreschi, Reinhard Posch.
    .
  • Recent calls for international treaties or new ethics for the trustworthiness of IT or AI systems – such as Tech Accord, Charter of Trust, Call of Paris or a Digital Geneva Convention – are crucial to raise awareness. Yet, none of them tackles head on the need for trustworthy cybersecurity certifications to enforce the oversight of treaties or enact the principles of such declarations. 
    .
    How can such certification bodies increase the resilience and “forensic friendliness”, to radically improve resistance against attacks and confidence about attacks attribution? — What constituent processes can ensure a timely, effective and democratically-efficient implementation – by a critical mass of actors – of meaningfully-enforceable national policies or international treaties for ultra-high assurance IT standards setting and certification processes? 

12:20 pm   Coffee Break

  • Discussants: Audience and Armstrong, Rickly, Davis, Delarive, Guerreschi, Pedron
  • Can the all-powerful threats of AI and cybersecurity provide the needed motivation to build adequate open federal transnational democratic institutions, as the nuclear threat nearly did in 1945? Can the threats (and opportunities) of the accelerating pace AI and the destabilizing effect of cyber-warfare constitute a unique opportunity to radically empower and democratize our transnational governance institutions? 

13:00 pm – Light Lunch and Networking

02:00 pm  End

Past Editions

On Sept 24-25th 2015, the 1st Edition 2018 was held in Brussels, with a high-level set of speakers, including recognized IT security experts such as Bruce Schneier and Bart Preneel, and from the IT security institutions, such as the Head of Information Superiority of the European Defence Agency, and more. See the report and the program with videos.

On Oct 16th, 2015, the 2nd Edition was held during the largest South American free software conference in Iguaçu, Brazil, and gathered distinguished minister of IT of Brazil, Marcos Mazoni, Rogerio Winter, a high-ranking official of the Brazilian Cyber Command, the CEO of the most advanced crypto company in Brazil, Kryptus, and more experts.

On July 21st, 2016, a 3rd Edition was held in New York with amazing speakers, including Joe Cannataci, the UN Special Rapporteur on the Right to Privacy, and Max Schrems, the Austrian privacy activist behind the overhaul of Safe Harbor Agreement. See the report.

On September 22nd-23rd 2016, the 4th Edition 2016 held in Brussels gathered experts, including the CIO of Austria, the Vice-Chair of the EU Parliament LIBE Committee, Paul Nemitz, Director of Fundamental Rights and Union citizenship in the DG Justice of the European Commission, and more. See the Programme, Videos and Slides.

On May 4th 2018, the 5th Edition 2018 was held in Berlin. High profiles joined, including Reinhard Posch, Chief Information Officer for Austria, Andreas Reisen, Head of Division “IT and Cyber Security in Critical Infrastructures and the Private Sector, Secure Information Technology” of the German Federal Ministry of the Interior, and more.


Interview on Swiss TV (Feb 2019)

Play Video


Trailer of the 4th Edition (2017)

Panel on Challenge A (2015)

Play Video

Welcome Keynote (2015)

ORGANIZERS

TCA

The Trustless Computing Association is a non-profit organization, based in Geneva, that has aggregated World-class partners and advisors to build open IT technologies, certifications and ecosystems of technologies to deliver levels of trustworthiness that are radically more secure and accountable than today’s state-of-the-art. 

Together with its spin-off startup TRUSTLESS.AI – based in Geneva at the Fusion accelerator – it has been building (1) the Trustless Computing Certification Body, a new IT security certification body and schema, aimed at radically-unprecedented levels of trustworthiness, while at once solidly enabling legit lawful access  and (2) building the Seevik Pod and Net, an initial compliant open computing base, ecosystem and IT device.

Event Series Supported By

Organizers’ Partners

Sponsors

Limited Spaces

Limited Spaces

Powered By

Start typing and press Enter to search