International Cybersecurity Conference.

Registering is free, but required in order to attend the conference.
You can register until May 30, 2022.


Central Services Auditorium


Opening session
Joaquim Manuel Fernandes Brigas
Presidente do Politécnico da Guarda


Public policies in national cybersecurity
Contra-Almirante António Gameiro Marques
Gabinete Nacional de Segurança


Ibero-American Collaboration in cybersecurity
Jesús Martínez Martínez
Universidad de Murcia, Spain


Beyond quantum security with emerging pathways in information physics and complexity
Rui Perdigão
Centre for Complex System Science, Austria

Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake.

Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and communication, whose security and reliability depend on key sectors gearing modern society - such as emergency communication systems (medical, civil and environmental protection, among others), transportation and geographic information, the financial communications systems at the backbone of day-to-day transactions, the information and telecommunications systems in general. And crucially the entire defence ecosystem that in essence is a stalwart in preventing our civilisation to self-annihilate in full fulfilment of the second principle of thermodynamics.

The relevance of the problem further encompasses the preservation of crucial values such as the right to information, security and integrity of democratic processes, internal administration, justice, defence and sovereignty, ranging from the well-being of the citizen to the security of the nation and beyond.

In the present communication, we take a look at how to scientifically and technically empower society to address these challenges, with the hope and pragmatism enabled by our emerging pathways in information physics and complexity. Edging beyond classical and quantum frontiers and their vulnerabilities to unveil new principles, methodologies and technologies at the core of the next generation system dynamic intelligence and security.

To illustrate the concepts and tools, rather than going down the road of engineered systems that we can ultimately control, we take aim at the bewildering complexity of nature, deciphering new secrets in the mathematical codex underlying its complex coevolutionary phenomena that so heavily impact our lives, and ultimately bringing out novel insights, methods and technologies that propel information physics and security beyond quantum frontiers.


Coffee break


GDPR 4 years later and the challenges of EU Digital Sovereignty
João Ferreira Pinto
Supremo Tribunal De Justiça


Capacity building in Cybersecurity - Challenges and Opportunities
António Rio Costa
Portuguese National Cybersecurity Centre

Focused on the ongoing activities of the National Centre for Cybersecurity (CNCS), the talk aims to tackle the main challenges identified in the area of Cybersecurity, namely the need to augment citizens awareness, business maturity in information security, cooperation and information sharing among peers and the need to promote research and innovation in cybersecurity applied to digital transformation processes for industry and public administration.


Lunch break


Blended security analysis for web applications: techniques and tools
Paulo Nunes
Polytechnic of Guarda

Nowadays, millions of people use web applications as part of their lives by accessing and managing confidential information, including financial, health, and personal data that must be confidential, reliable, and readily accessible (CIA). Web applications are frequently deployed with security vulnerabilities that, when exploited by hackers, may have a huge negative effect on the business, potentiated by the worldwide press coverage of such incidents. To cope with this situation, the developers should find and fix these vulnerabilities. Although there are many techniques and tools to detect vulnerabilities, there is still, room for improvement as they do not detect all vulnerabilities, and they report many false positives. This presentation describes a new blended approach for web security that provides far better detection and a lower number of false alarms.


Using machine learning in intrusion detection systems
Victor Lobo e José Alberto Borges
AFCEA-Portugal, e Instituto Universitário Militar


Management of Cybersecurity and Privacy Cyber Controls at Altice Portugal
José Alegria
Altice Portugal

Altice Portugal’s cybersecurity strategy is centered on a pro Active Doctrine, with 5 integrated and complementary strategic dimensions focused on continuous cyber defense and improvement: GOVERNANCE, PREVENTION, PROTECTION, DETECTION & RESPONSE and RECOVERABILITY. They work together in a continuous 360º approach, supported by comprehensive security metrics integrated into a central security analytics platform (CyberWatch) that supports proper governance attribution and continuous improvement. Without proper GOVERNANCE it is not possible to have a sound cybersecurity strategy and execution. PREVENTION and PROTECTION are INHIBITORs, e.g., they exist to reduce the probability of security incidents materializing or propagating, respectively. DETECTION & COUNTER RESPONSE, guaranteed by our CyberSOC unit, are essential in case PREVENTION and PROTECTION fail for some reason. Finally, RECOVERABILITY is our last defense! Our doctrine is continuously adapted to deal with new threats or new IT or Telco trends.


Coffee break


ZTNA (Zero Trust Network Access)
Daniel Ferreira


Security by Design – how to embed security across modern IT
Miguel Azevedo


Digital Resilience. The importance of managing the security risk of the supply chain
Ofélia Malheiros

The new global context - geopolitical and digital - requires new ways of thinking and operating the businesses. In this new era, value chain management and cybersecurity go hand in hand. Currently, operational resilience involves managing information security risk, both internally and in the supply chain.


Closing session
Contra-Almirante António Gameiro Marques
Gabinete Nacional de Segurança


How to get to Polytechnic of Guarda

Polytechnic of Guarda
Av. Dr. Francisco Sá Carneiro nº50
6300-559 Guarda

+351 271 220 100

GPS: N 40.5412512º, W -7.2837867º


For information regarding registration and participation, please contact:

Organizing committee of the International Cybersecurity Conference
Polytechnic of Guarda

+351 271 220 100


organizing committee

Fernando Melo

Fernando Melo Rodrigues

Clara Silveira

Maria Clara Silveira

Natália Gomes

Natália Gomes

Noel Lopes

Noel Lopes

Pedro Pinto

Pedro Pinto

Previous editions

International Cybersecurity Conference