{"id":193,"date":"2026-04-10T14:01:22","date_gmt":"2026-04-10T14:01:22","guid":{"rendered":"https:\/\/csnet-conference.org\/2026\/?page_id=193"},"modified":"2026-04-28T20:38:35","modified_gmt":"2026-04-28T20:38:35","slug":"keynotes","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2026\/keynotes\/","title":{"rendered":"Keynotes"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Keynotes <\/mark><\/strong><\/h2>\n\n\n\n<p id=\"keynote1\"><strong>Keynote<\/strong> <strong>#1:<\/strong> <\/p>\n\n\n\n<p id=\"keynote1\"><strong>Title:<\/strong> <strong><em><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\"><strong><strong>Agentic AI for Operational Technology Security: Enhancing Visibility, Security Assessment, Auditing, and Proactive Testing in Cyber-Physical Environments<\/strong><\/strong><\/mark><\/em><\/strong><\/p>\n\n\n\n<p><strong>Abstract: <\/strong>Operational Technology (OT) environments are undergoing rapid digital transformation, leading to deeper interconnection with IT, cloud, and industrial IoT ecosystems. While this convergence improves efficiency and operational insight, it also expands the cyber-attack surface and exposes critical infrastructures to increasingly sophisticated threats. This keynote examines how OT security can be strengthened through an integrated strategy centred on asset visibility, continuous security assessment and auditing, and proactive testing, supported by emerging agentic AI techniques.<\/p>\n\n\n\n<p>The talk will present a research- and industry-aligned perspective on how intelligent autonomous agents can assist security teams in mapping complex OT assets and communication flows, identifying misconfigurations and policy violations, prioritising exploitable weaknesses, and supporting controlled validation activities in cyber-physical environments. Particular attention will be given to the distinction between conventional IT security assumptions and the safety, availability, and determinism requirements of OT systems.<\/p>\n\n\n\n<p>The keynote will also discuss practical case studies from critical and regulated sectors, including industrial control and digitally transformed operational environments, illustrating how agentic AI can support risk-informed auditing, adaptive security assessment, and proactive resilience testing while respecting operational constraints. The overall aim is to outline a realistic pathway towards more scalable, intelligent, and resilient OT security assurance.<\/p>\n\n\n\n<div class=\"row listeCommitee\"><div class=\"col-lg-12\"><img decoding=\"async\" src=\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/04\/mohamed-900-524-1.png\" class=\"img-rounded imageCommitee\" alt=\"Mohamed Chahine Ghanem - CSNet 2026\"><p><b>Mohamed Chahine Ghanem<\/b><br>(Keele University and the University of Liverpool, UK)<\/p><\/div><\/div>\n\n\n\n<p><strong>Bio:<\/strong> <strong>Dr Mohamed Chahine Ghanem<\/strong> is Associate Professor in Cyber Security at Keele University and the University of Liverpool, where he serves as Director of a Research Theme, and also retains a Senior Advisor position in Cyber Resilience in Fintech Industry. Before joining academia, he gained over 15 years of industry experience in senior law enforcement and corporate roles, including CISO-level responsibilities and leading security management, governance, and auditing activities in major firms. His professional work has spanned cyber resilience, digital forensics, risk assurance, and the security assessment of complex IT, OT, and cyber-physical environments. He holds an Engineering Degree in Computer Systems, an MSc in Digital Forensics and IT Security, and a PhD in Cyber Security Engineering from City, University of London. He is Co-founder of CyDRA, focused on security by design and resilience in OT. His research centres on applied AI for cyber security, OT security, cyber resilience, and digital forensics. He has published widely in leading journals, serves in editorial roles including ACM Digital Threats: Research and Practice, chaired CIOT 2025, and is a frequent speaker at major academic conferences and industry events<em>.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p id=\"keynote1\"><strong>Keynote<\/strong> <strong>#2:<\/strong><\/p>\n\n\n\n<p id=\"keynote1\"><strong>Title:<\/strong> <strong><em><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\"><strong><strong>The Next Cyber Battlefield: Securing Large Language Models in an Autonomous and Adversarial World<\/strong><\/strong><\/mark><\/em><\/strong><\/p>\n\n\n\n<p><strong>Abstract: <\/strong>Large Language Models (LLMs) are redefining how digital systems reason, communicate, and act, transitioning from passive tools to autonomous agents embedded in critical infrastructures. This paradigm shift is simultaneously creating a new cyber battlefield, where adversaries no longer target only software and networks, but also the reasoning processes of AI systems.<br>In this keynote, we argue that LLMs introduce a fundamentally new attack surface. In this context, prompts become programs, outputs become attack vectors, and model behavior becomes exploitable. We explore how emerging threats such as prompt injection, jailbreaking, zero-click attacks, supply chain compromises, and vector-space manipulation enable adversaries to bypass traditional security controls and orchestrate complex, multi-stage attacks across AI-driven ecosystems.<br>Moving beyond current defenses, we outline a forward-looking security vision grounded in Zero Trust principles for AI, continuous behavioral verification, and resilient-by-design architectures. We also discuss the need to integrate security frameworks into AI pipelines and to advance explainability and adaptive defense mechanisms capable of evolving alongside adversarial strategies.<br>This keynote positions LLM security not as a technical afterthought, but as a strategic imperative for the trustworthy deployment of autonomous systems in the next generation of digital society.<\/p>\n\n\n\n<div class=\"row listeCommitee\"><div class=\"col-lg-12\"><img decoding=\"async\" src=\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/04\/diogo-mattos.png.webp\" class=\"img-rounded imageCommitee\" alt=\"Diogo Menezes Ferrazani Mattos - CSNet 2026\"><p><b>Diogo Menezes Ferrazani Mattos<\/b><br>(Universidade Federal Fluminense (UFF), Brazil)<\/p><\/div><\/div>\n\n\n\n<p><strong>Bio:<\/strong> <strong>Diogo Menezes Ferrazani Mattos<\/strong> is a Professor in the Department of Telecommunications Engineering at Universidade Federal Fluminense (UFF), Niter\u00f3i, Brazil. He earned his doctoral degree (D.Sc.) in Electrical Engineering from the Universidade Federal do Rio de Janeiro (COPPE\/UFRJ) in 2017. From 2015 to 2016, he was a Sandwich Doctoral Fellow at the Laboratoire d\u2019Informatique de Paris 6 (LIP6), Sorbonne Universit\u00e9, Pierre et Marie Curie Campus, Paris, France. In 2021, he was a Visiting Research Fellow at Sorbonne Universit\u00e9, and in 2024, he held the position of Visiting Professor at Universit\u00e9 Sorbonne Paris Nord. He has received research grants from the Brazilian National Council for Scientific and Technological Development (CNPq), the Rio de Janeiro State Research Support Foundation (FAPERJ), and the Municipality of Niter\u00f3i. His research interests include network security, next-generation networks, and future Internet applications<em>.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p id=\"keynote1\"><strong>Keynote<\/strong> <strong>#3:<\/strong><\/p>\n\n\n\n<p id=\"keynote1\"><strong>Title:<\/strong> <strong><em><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\"><strong><strong>Fuzz me if you can! A look at fuzzing for web applications<\/strong><\/strong><\/mark><\/em><\/strong><\/p>\n\n\n\n<p><strong>Abstract: <\/strong>Fuzzing is a powerful technique for finding vulnerabilities in software applications, including web applications. Primarily, a software testing technique, fuzzing involves sending a large number of random or semi-random inputs to an application to see how it responds. Guided fuzzing, on the other hand, uses feedback from the application to generate more targeted inputs, increasing the chances of finding vulnerabilities. Although guided fuzzing has demonstrated remarkable success in identifying vulnerabilities, such as memory-corruption bugs, in native software, it has not been widely adopted for web applications and, when adopted, results are much less impressive. In this talk, I will start with the basic mechanics of fuzzing as a security tool for bug-finding purposes, and then I will dive into the challenges of fuzzing for the web ecosystem. Last but not least, I will give a look of what I expect to see in the future of fuzzing, with a constant focus on web applications.<\/p>\n\n\n\n<div class=\"row listeCommitee\"><div class=\"col-lg-12\"><img decoding=\"async\" src=\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/04\/elathan-400x500.jpg\" class=\"img-rounded imageCommitee\" alt=\"Elias Athanasopoulos - CSNet 2026\"><p><b>Elias Athanasopoulos<\/b><br>(University of Cyprus, Cyprus)<\/p><\/div><\/div>\n\n\n\n<p><strong>Bio:<\/strong> <strong>Elias Athanasopoulos<\/strong> is an associate professor in Computer Science with the University of Cyprus. He received his BSc in Physics from the University of Athens and his PhD in Computer Science from the University of Crete. Before joining University of Cyprus, he was an assistant professor with Vrije Universiteit, Amsterdam. Elias was a Microsoft Research PhD Scholar, as well as a Marie Curie fellow with Columbia University and FORTH. \u00a0His research interests are system security and privacy. \u00a0He has several publications in all major systems, system-security, and privacy venues, such as IEEE Security and Privacy (Oakland), IEEE European Security and Privacy, ACM CCS, Usenix Security, Usenix ATC, NDSS, EuroSys, PETS, CHI and ACM TOPS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keynotes Keynote #1: Title: Agentic AI &hellip; <a href=\"https:\/\/csnet-conference.org\/2026\/elika_speaker\/elias-athanasopoulos\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-193","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keynotes - CSNet 2026<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2026\/keynotes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keynotes - CSNet 2026\" \/>\n<meta property=\"og:description\" content=\"Keynotes Keynote #1: Title: Agentic AI &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2026\/keynotes\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2026\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T20:38:35+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/keynotes\/\",\"url\":\"https:\/\/csnet-conference.org\/2026\/keynotes\/\",\"name\":\"Keynotes - CSNet 2026\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#website\"},\"datePublished\":\"2026-04-10T14:01:22+00:00\",\"dateModified\":\"2026-04-28T20:38:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/keynotes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2026\/keynotes\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/keynotes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csnet-conference.org\/2026\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keynotes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2026\/\",\"name\":\"CSNet 2026\",\"description\":\"10th Cyber Security in Networking Conference\",\"publisher\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csnet-conference.org\/2026\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#organization\",\"name\":\"CSNet 2026\",\"url\":\"https:\/\/csnet-conference.org\/2026\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png\",\"width\":512,\"height\":512,\"caption\":\"CSNet 2026\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keynotes - CSNet 2026","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csnet-conference.org\/2026\/keynotes\/","og_locale":"en_US","og_type":"article","og_title":"Keynotes - CSNet 2026","og_description":"Keynotes Keynote #1: Title: Agentic AI &hellip; Continue reading &rarr;","og_url":"https:\/\/csnet-conference.org\/2026\/keynotes\/","og_site_name":"CSNet 2026","article_modified_time":"2026-04-28T20:38:35+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csnet-conference.org\/2026\/keynotes\/","url":"https:\/\/csnet-conference.org\/2026\/keynotes\/","name":"Keynotes - CSNet 2026","isPartOf":{"@id":"https:\/\/csnet-conference.org\/2026\/#website"},"datePublished":"2026-04-10T14:01:22+00:00","dateModified":"2026-04-28T20:38:35+00:00","breadcrumb":{"@id":"https:\/\/csnet-conference.org\/2026\/keynotes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csnet-conference.org\/2026\/keynotes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csnet-conference.org\/2026\/keynotes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csnet-conference.org\/2026\/"},{"@type":"ListItem","position":2,"name":"Keynotes"}]},{"@type":"WebSite","@id":"https:\/\/csnet-conference.org\/2026\/#website","url":"https:\/\/csnet-conference.org\/2026\/","name":"CSNet 2026","description":"10th Cyber Security in Networking Conference","publisher":{"@id":"https:\/\/csnet-conference.org\/2026\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csnet-conference.org\/2026\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csnet-conference.org\/2026\/#organization","name":"CSNet 2026","url":"https:\/\/csnet-conference.org\/2026\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/","url":"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png","contentUrl":"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png","width":512,"height":512,"caption":"CSNet 2026"},"image":{"@id":"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/comments?post=193"}],"version-history":[{"count":8,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/193\/revisions"}],"predecessor-version":[{"id":229,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/193\/revisions\/229"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/media?parent=193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}