AI-Driven Zero Trust Architectures for Critical Infrastructures
As business sectors across finance, healthcare, energy, smart-cities, and more increasingly rely on AI, big data, IoT, and ultra-connectivity, cybersecurity and privacy become foundational — not optional.
As AI systems are deployed in adversarial environments—from high-frequency trading to autonomous critical infrastructure—current empirical defenses (e.g., adversarial training) are proving insufficient. This panel pivots from general risk discussion to the hard scientific problems impeding trustworthy AI and explores how AI can be both a powerful ally and a serious threat: enabling advanced security analytics, automated threat detection, and privacy-preserving data handling — while also introducing new attack surfaces, adversarial risks, and governance challenges.
Bringing together academic experts, industry leaders, and policy thinkers, the panel will evaluate how businesses can navigate the trade-offs, leverage AI responsibly, and build robust frameworks to protect data integrity, user privacy, and operational stability in a rapidly evolving digital landscape. Panelists will discuss the latest research on adversarial bounds, neuro-symbolic integration, and gradient leakage.
Participants will walk away with:
Associate Professor, École Supérieure des Communications de Tunis (Sup'Com), Tunisia
Expert in Network & Cloud Security
Specializes in network security, cloud security, IoT security, risk management, intrusion detection, and secure architectures. Ensures the discussion remains grounded in both theoretical rigor and practical cybersecurity realities — bridging academia, industry and policy perspectives.
Professor of Industrial Engineering
Alfaisal University, Saudi Arabia
Wireless and optical networks, IoT and smart-building systems, distributed sensor networks, and applied research on networked infrastructures and their vulnerabilities. Brings a technical networking and systems-level perspective — discussing how AI-augmented connectivity and IoT deployments must be balanced with strong security design and proactive threat mitigation.
Full Professor of Cybersecurity
University of Jordan & Prince Sultan University
Top 2% World Scientists (Stanford/Elsevier)
Founder, Security Engineering Lab (SEL)
Network & Mobile Security, Security Maturity Models, Malware Analysis, IPS/IDS, Wireless Sensor Networks, and e-Learning Security. Former Head of Computer Science Department at UJ and Associate Director of Research & Initiatives at PSU. Led ABET accreditation for CS department and pioneered research in mobile ad hoc network security.
Associate Professor in Computer Science
University of Tunis El Manar, Faculty of Science
Director, LIPAH Research Laboratory
Computer Networks & IT Security, Blockchain & Self-Sovereign Identity, IoT Access Management, P2P Networks, Privacy Risk Assessment, Web Tracking, and Mobile Application Security. Expert in supply chain coordination using blockchain and automatized Identity & Access Management for IoT ecosystems.
We invite senior researchers, IT security leaders, corporate executives, policy makers, and legal experts to join this panel. The aim is to build a multi-stakeholder dialogue — to better understand how AI, while offering remarkable power, also requires responsible governance and robust safeguards.
Don't miss this critical discussion on securing the AI-powered future of business