{"id":193,"date":"2026-04-10T14:01:22","date_gmt":"2026-04-10T14:01:22","guid":{"rendered":"https:\/\/csnet-conference.org\/2026\/?page_id=193"},"modified":"2026-04-10T14:10:14","modified_gmt":"2026-04-10T14:10:14","slug":"keynotes","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2026\/keynotes\/","title":{"rendered":"Keynotes"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Keynotes <\/mark><\/strong><\/h2>\n\n\n\n<p id=\"keynote1\"><strong>Keynote<\/strong> <strong>#1:<\/strong> <\/p>\n\n\n\n<p id=\"keynote1\"><strong>Title:<\/strong> <strong><em><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\"><strong><strong>Agentic AI for Operational Technology Security: Enhancing Visibility, Security Assessment, Auditing, and Proactive Testing in Cyber-Physical Environments<\/strong><\/strong><\/mark><\/em><\/strong><\/p>\n\n\n\n<p><strong>Abstract: <\/strong>Operational Technology (OT) environments are undergoing rapid digital transformation, leading to deeper interconnection with IT, cloud, and industrial IoT ecosystems. While this convergence improves efficiency and operational insight, it also expands the cyber-attack surface and exposes critical infrastructures to increasingly sophisticated threats. This keynote examines how OT security can be strengthened through an integrated strategy centred on asset visibility, continuous security assessment and auditing, and proactive testing, supported by emerging agentic AI techniques.<\/p>\n\n\n\n<p>The talk will present a research- and industry-aligned perspective on how intelligent autonomous agents can assist security teams in mapping complex OT assets and communication flows, identifying misconfigurations and policy violations, prioritising exploitable weaknesses, and supporting controlled validation activities in cyber-physical environments. Particular attention will be given to the distinction between conventional IT security assumptions and the safety, availability, and determinism requirements of OT systems.<\/p>\n\n\n\n<p>The keynote will also discuss practical case studies from critical and regulated sectors, including industrial control and digitally transformed operational environments, illustrating how agentic AI can support risk-informed auditing, adaptive security assessment, and proactive resilience testing while respecting operational constraints. The overall aim is to outline a realistic pathway towards more scalable, intelligent, and resilient OT security assurance.<\/p>\n\n\n\n<p>Please let me know if you would like a shorter version of the abstract or a short biographical note to accompany the keynote announcement.<\/p>\n\n\n\n<div class=\"row listeCommitee\"><div class=\"col-lg-12\"><img decoding=\"async\" src=\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/04\/mohamed-900-524-1.png\" class=\"img-rounded imageCommitee\" alt=\"Mohamed Chahine Ghanem - CSNet 2026\"><p><b>Mohamed Chahine Ghanem<\/b><br>(Keele University and the University of Liverpool, UK)<\/p><\/div><\/div>\n\n\n\n<p><strong>Bio:<\/strong> <strong>Dr Mohamed Chahine Ghanem<\/strong> is Associate Professor in Cyber Security at Keele University and the University of Liverpool, where he serves as Director of a Research Theme, and also retains a Senior Advisor position in Cyber Resilience in Fintech Industry. Before joining academia, he gained over 15 years of industry experience in senior law enforcement and corporate roles, including CISO-level responsibilities and leading security management, governance, and auditing activities in major firms. His professional work has spanned cyber resilience, digital forensics, risk assurance, and the security assessment of complex IT, OT, and cyber-physical environments. He holds an Engineering Degree in Computer Systems, an MSc in Digital Forensics and IT Security, and a PhD in Cyber Security Engineering from City, University of London. He is Co-founder of CyDRA, focused on security by design and resilience in OT. His research centres on applied AI for cyber security, OT security, cyber resilience, and digital forensics. He has published widely in leading journals, serves in editorial roles including ACM Digital Threats: Research and Practice, chaired CIOT 2025, and is a frequent speaker at major academic conferences and industry events<em>.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p id=\"keynote1\"><strong>Keynote<\/strong> <strong>#2:<\/strong><\/p>\n\n\n\n<p id=\"keynote1\"><strong>Title:<\/strong> <strong><em><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\"><strong><strong>The Next Cyber Battlefield: Securing Large Language Models in an Autonomous and Adversarial World<\/strong><\/strong><\/mark><\/em><\/strong><\/p>\n\n\n\n<p><strong>Abstract: <\/strong>Large Language Models (LLMs) are redefining how digital systems reason, communicate, and act, transitioning from passive tools to autonomous agents embedded in critical infrastructures. This paradigm shift is simultaneously creating a new cyber battlefield, where adversaries no longer target only software and networks, but also the reasoning processes of AI systems.<br>In this keynote, we argue that LLMs introduce a fundamentally new attack surface. In this context, prompts become programs, outputs become attack vectors, and model behavior becomes exploitable. We explore how emerging threats such as prompt injection, jailbreaking, zero-click attacks, supply chain compromises, and vector-space manipulation enable adversaries to bypass traditional security controls and orchestrate complex, multi-stage attacks across AI-driven ecosystems.<br>Moving beyond current defenses, we outline a forward-looking security vision grounded in Zero Trust principles for AI, continuous behavioral verification, and resilient-by-design architectures. We also discuss the need to integrate security frameworks into AI pipelines and to advance explainability and adaptive defense mechanisms capable of evolving alongside adversarial strategies.<br>This keynote positions LLM security not as a technical afterthought, but as a strategic imperative for the trustworthy deployment of autonomous systems in the next generation of digital society.<\/p>\n\n\n\n<div class=\"row listeCommitee\"><div class=\"col-lg-12\"><img decoding=\"async\" src=\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/04\/diogo-mattos.png.webp\" class=\"img-rounded imageCommitee\" alt=\"Diogo Menezes Ferrazani Mattos - CSNet 2026\"><p><b>Diogo Menezes Ferrazani Mattos<\/b><br>(Universidade Federal Fluminense (UFF), Brazil)<\/p><\/div><\/div>\n\n\n\n<p><strong>Bio:<\/strong> <strong>Diogo Menezes Ferrazani Mattos<\/strong> is a Professor in the Department of Telecommunications Engineering at Universidade Federal Fluminense (UFF), Niter\u00f3i, Brazil. He earned his doctoral degree (D.Sc.) in Electrical Engineering from the Universidade Federal do Rio de Janeiro (COPPE\/UFRJ) in 2017. From 2015 to 2016, he was a Sandwich Doctoral Fellow at the Laboratoire d\u2019Informatique de Paris 6 (LIP6), Sorbonne Universit\u00e9, Pierre et Marie Curie Campus, Paris, France. In 2021, he was a Visiting Research Fellow at Sorbonne Universit\u00e9, and in 2024, he held the position of Visiting Professor at Universit\u00e9 Sorbonne Paris Nord. He has received research grants from the Brazilian National Council for Scientific and Technological Development (CNPq), the Rio de Janeiro State Research Support Foundation (FAPERJ), and the Municipality of Niter\u00f3i. His research interests include network security, next-generation networks, and future Internet applications<em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keynotes Keynote #1: Title: Agentic AI &hellip; <a href=\"https:\/\/csnet-conference.org\/2026\/elika_speaker\/diogo-menezes-ferrazani-mattos\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-193","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keynotes - CSNet 2026<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2026\/keynotes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keynotes - CSNet 2026\" \/>\n<meta property=\"og:description\" content=\"Keynotes Keynote #1: Title: Agentic AI &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2026\/keynotes\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2026\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T14:10:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/keynotes\/\",\"url\":\"https:\/\/csnet-conference.org\/2026\/keynotes\/\",\"name\":\"Keynotes - CSNet 2026\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#website\"},\"datePublished\":\"2026-04-10T14:01:22+00:00\",\"dateModified\":\"2026-04-10T14:10:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/keynotes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2026\/keynotes\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/keynotes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csnet-conference.org\/2026\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keynotes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2026\/\",\"name\":\"CSNet 2026\",\"description\":\"10th Cyber Security in Networking Conference\",\"publisher\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csnet-conference.org\/2026\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#organization\",\"name\":\"CSNet 2026\",\"url\":\"https:\/\/csnet-conference.org\/2026\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png\",\"width\":512,\"height\":512,\"caption\":\"CSNet 2026\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keynotes - CSNet 2026","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csnet-conference.org\/2026\/keynotes\/","og_locale":"en_US","og_type":"article","og_title":"Keynotes - CSNet 2026","og_description":"Keynotes Keynote #1: Title: Agentic AI &hellip; Continue reading &rarr;","og_url":"https:\/\/csnet-conference.org\/2026\/keynotes\/","og_site_name":"CSNet 2026","article_modified_time":"2026-04-10T14:10:14+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csnet-conference.org\/2026\/keynotes\/","url":"https:\/\/csnet-conference.org\/2026\/keynotes\/","name":"Keynotes - CSNet 2026","isPartOf":{"@id":"https:\/\/csnet-conference.org\/2026\/#website"},"datePublished":"2026-04-10T14:01:22+00:00","dateModified":"2026-04-10T14:10:14+00:00","breadcrumb":{"@id":"https:\/\/csnet-conference.org\/2026\/keynotes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csnet-conference.org\/2026\/keynotes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csnet-conference.org\/2026\/keynotes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csnet-conference.org\/2026\/"},{"@type":"ListItem","position":2,"name":"Keynotes"}]},{"@type":"WebSite","@id":"https:\/\/csnet-conference.org\/2026\/#website","url":"https:\/\/csnet-conference.org\/2026\/","name":"CSNet 2026","description":"10th Cyber Security in Networking Conference","publisher":{"@id":"https:\/\/csnet-conference.org\/2026\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csnet-conference.org\/2026\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csnet-conference.org\/2026\/#organization","name":"CSNet 2026","url":"https:\/\/csnet-conference.org\/2026\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/","url":"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png","contentUrl":"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png","width":512,"height":512,"caption":"CSNet 2026"},"image":{"@id":"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/comments?post=193"}],"version-history":[{"count":6,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/193\/revisions"}],"predecessor-version":[{"id":205,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/193\/revisions\/205"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/media?parent=193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}