From Securing the Blockchain to Blockchain for Security
Cristina Pérez-Solà Associate Professor Autonomous University of Barcelona
CV
- (Nov. 2022 – Present) Associate Professor, Autonomous University of Barcelona
- (2012 – Present) Adjunct Professor, Open University of Catalonia
- (Feb. 2019 – 2022) Full-time Lecturer, Open University of Catalonia
- (2018 – 2019) Postdoctoral Researcher, Rovira i Virgili University
- (2016 – 2018) Postdoctoral Researcher, Autonomous University of Barcelona
- (2011 – 2016) Doctoral Researcher, Autonomous University of Barcelona
Summary
Blockchain technology has evolved from a nascent concept aimed at securing decentralized digital assets to a powerful framework for enhancing security in diverse domains.
This talk explores the dual trajectory of blockchain’s role in security: from addressing inherent vulnerabilities within blockchain protocols to using blockchain as a security-enabling infrastructure.
First, we examine key advancements in securing blockchain systems, including cryptographic safeguards, and how AI can contribute to detecting threats and enhancing overall security.
Then, we shift focus to emerging applications where blockchain serves as a foundational layer for implementing secure data sharing and privacy-preserving protocols in AI frameworks such as federated learning.
By highlighting both aspects, this talk underscores the transformative potential of blockchain as both a subject and a tool for advancing security in distributed systems.
Exploring the Future of AI in Cybersecurity
Trần Quang Đức Director
Hanoi University of Science and Technology
CV
- (Present) Professor, School of Information and Communication Technology, Hanoi University of Science and Technology
- (Present) Director, Center for Information Security, Hanoi University of Science and Technology
- (2018) Program Committee Member, Conference at Hanoi University of Science and Technology
- (2016) Program Committee Member, Conference at Hanoi University of Science and Technology
Summary
As attackers change their strategies over time, the threats in cybersecurity continually evolve. Artificial Intelligence (AI) enhances cybersecurity by autonomously detecting and responding to threats, hence augmenting the capacity to defend against various cyberattacks in a dynamic manner. This talk emphasizes the benefits of AI-assisted systems that effectively manage complex cyberattacks while minimizing human errors. I also address the risks associated with adversarial AI and the ethical implications for data privacy. The talk finishes by forecasting the necessity of integrating AI into cybersecurity systems as a pivotal element for ensuring a secure future Internet.
Adoption of AI and Security in the Public Sector : Building a Sustainable Foundation
Chang Hee Yoon Team Leader
CV
- (Apr. 2024 – Present) AI Expert, OECD AIGO (AI Governance) Working Group
- (Mar. 2024 – Present) Chair, Foundation Models Committee, International Association for AI Ethics (IAAE)
- (Mar. 2023 – Present) Adjunct Professor, Daegu National University of Education
- (Jul. 1999 – Present) Head of AI Policy Research Team (Ph.D. in Engineering), Korea Intelligence Information Service
- (Jul. 2016 – Jul. 2018) ICT Expert, Skolkovo Foundation, Russia
Summary
With the expanding adoption of large language models (LLMs) in the public sector, ensuring security and data sovereignty requires a domestically controlled, network-separated closed infrastructure. Rather than one-off development, a sustainable operational ecosystem must be established.
[Directions for Building a Sustainable Foundation Model]
Public-private collaboration is essential for developing domain-specific LLMs tailored to high-risk and low-profit areas (e.g., healthcare, legal sectors), based on open-source LLMs such as LLaMA, DeepSeek, LG EXAONE, and Naver HyperCLOVA X.
[Five Strategic Frameworks for Public LLM Development]
1. **Model/Architecture**: Build internal capabilities and flexible architecture to incorporate cutting-edge technologies.
2. **Data**: Establish a high-quality public data lake through refined integration.
3. **Infrastructure**: Expand secure infrastructures based on GPU, on-premise, and network separation.
4. **Talent & Organization**: Train in-house experts and build a collaborative public-private system.
5. **Policy & Regulation**: Institutionalize legal frameworks and operational standards for research data.
The research focuses on strategies for securing autonomy, sustainability, and security in public-sector AI — paving the way toward national AI sovereignty and enhanced global competitiveness.
ClumitSecurity: Autonomous Cybersecurity Enabled by AI Clustering and LLM Integration
Min Gyu Cho CSO ClumL
Corporate Overview
ClumL is an AI-driven cybersecurity company leading innovation through advanced artificial intelligence technologies.
At the core of our solutions is *Clumit Security*, an autonomous security platform that combines proprietary AI clustering and large language model (LLM)-based analysis. Clumit Security enables real-time detection of emerging, mutated, and stealth threats across the entire network—without relying on static rules or signatures. It also provides automated threat analysis and natural language reporting to streamline incident response.
By maximizing operational efficiency and precision through AI-powered automation, ClumL empowers organizations across enterprise, public, and industrial sectors to ensure business continuity and protect critical information assets.
With a vision for faster, smarter, and more autonomous security, ClumL is shaping the future of cybersecurity.
Summary
Clumit Security is an autonomous cybersecurity platform developed by ClumL, integrating proprietary AI clustering and large language model (LLM) orchestration technologies.
In this presentation, we introduce the core principles and real-world applications of ClumL’s AI clustering engine, which analyzes large-scale network traffic in real time. Unlike traditional systems that rely on predefined rules or signatures, our technology effectively detects emerging, mutated, and stealth threats.
Moreover, Clumit Security leverages LLMs to automatically interpret detected events and generate human-readable reports—reducing repetitive manual tasks and enabling security professionals to focus on high-level strategic decisions.
By transcending the limitations of conventional security architectures, Clumit Security paves the way for a faster, smarter, and more precise era of autonomous cybersecurity.
Practical Challenges and Strategic Approaches to Cloud-Native Transformation
Sang Chan Seok General Manager PIOLINK
Corporate Overview
PIOLINK delivers industry-leading application availability and performance while simplifying data center infrastructure management, enabling secure and intelligent network operations in today’s increasingly complex IT environments.
The company holds a dominant position in the domestic market with its flagship products, including application delivery controllers (ADC), web application firewalls (WAF), cloud-managed networking solutions, and hyper-converged infrastructure (HCI) systems. Its core services include managed security operations and security consulting.
With trusted customer relationships at its foundation, PIOLINK continues to pioneer next-generation networking technologies—connecting systems to systems, and people to people—while driving innovation and progress in IT infrastructure.
Summary
The IT industry is evolving at an unprecedented pace—and at the heart of this transformation lies cloud technology. For today’s enterprises, moving beyond traditional infrastructure and adopting a cloud-native approach has become a strategic necessity.
POPCON HCI offers a seamless solution for this transition by enabling unified management of both VM-based systems and Kubernetes-based container environments within a single platform. This reduces operational complexity while allowing for gradual migration with scalability and resource optimization in mind.
Designed to maximize the value of existing IT assets, POPCON HCI empowers organizations to flexibly adopt new cloud-native technologies without abandoning prior investments.
As a comprehensive solution, POPCON HCI helps businesses overcome the limitations of legacy systems and shift efficiently and reliably into a modern, cloud-native infrastructure.
Implementation Strategy for N²SF Based on Zero Trust
Gwang Hoon Kim Senior Executive Director SGA Solutions Co., Ltd.
Corporate Overview
SGA Solutions is a leading integrated IT security company with core proprietary technologies across system security, cloud security, next-generation security, application security, and zero trust architecture. Leveraging its accumulated expertise in comprehensive security, SGA Solutions provides safe and reliable IT security environments for organizations across sectors.
As traditional perimeter-based security strategies reach their limits—and rapid changes driven by cloud, AI, and digital transformation accelerate—SGA Solutions’ integrated security framework is gaining increasing recognition as a forward-looking alternative.
With SGA ZTA, Korea’s only full-stack Zero Trust Architecture solution, the company is redefining the national security paradigm and solidifying its position as a pioneer in next-generation cybersecurity.
Summary
This session explores strategic approaches to implementing a national network security framework (N²SF) based on Zero Trust principles.
It introduces a methodology for classifying data by Confidentiality, Sensitivity, and Openness (C/S/O), and for assessing Zero Trust maturity to derive AS-IS and TO-BE models. The strategy aims to prevent redundant investments and mitigate policy conflicts between overlapping control mechanisms.
In particular, the session will present the “Zero Trust Overlay” approach—a practical framework for introducing Zero Trust architecture effectively across complex government or enterprise environments.
The Evolution of SOC: Insights through AI and N²SF
Il Ok Jung Research Fellow IGLOO Corporation
Corporate Overview
IGLOO Corporation has significantly increased its R&D investment in AI since 2015. The company has rapidly advanced its capabilities in classification, explanatory, and generative AI technologies to strengthen its cybersecurity offerings. In 2019, IGLOO launched the first AI-powered security monitoring solution in Korea. In 2023, it introduced 'AiR', an AI security assistant integrated with ChatGPT, and ‘GREEN Ai’, its proprietary small language model (sLLM).
Currently, IGLOO is accelerating the implementation of its “AI-driven Open XDR” strategy, which aims to maximize the efficiency of security operations, threat analysis, and response. As part of this strategy, the company is expanding the deployment of its core solution, SPiDER ExD, and diversifying both the delivery format and language model of its AI assistant, AiR.
Summary
The Security Operations Center (SOC)—the heart of cybersecurity—is evolving. At the core of this transformation lie AI technologies, the N²SF (National Network Security Framework), and the need for skilled professionals who can understand and operate within this new paradigm.
This session explores the changes required across key domains to achieve successful SOC evolution. It also highlights practical strategies and real-world implementations adopted by Igloo Corporation to support this transition.
As security threats grow more complex, the future of SOC demands not only technological advancement but also strategic alignment and workforce readiness.
calendar_month7.11.(Fri)
The Hacker’s Future: From CTF to AI and Career Development
Insu Yoon Professor
KAIST
CV
- (2025 – Present) Associate Professor, School of Electrical Engineering, KAIST
- (2024 – Present) Advisory Committee Member, HackTheon Sejong International Collegiate Cyber Security Competition
- (2021 – Present) Adjunct Professor, Graduate School of Information Security, KAIST
- (2021 – 2025) Assistant Professor, School of Electrical Engineering, KAIST
Summary
Many students today begin their journey into hacking through CTF (Capture The Flag) competitions, sharpening their skills by solving complex and challenging problems. However, a common question arises:
""How does this connect to my future career?""
""What more should I do to grow as a professional hacker?""
In an era where technology evolves rapidly and AI is transforming the landscape—including cybersecurity—these concerns are more relevant than ever:
""How can I survive and thrive in the midst of such change?""
In this talk, the speaker shares personal experiences—first as a student who grew through CTFs, and now as a professor mentoring future hackers. The session aims to provide insights and practical advice on building a meaningful career in cybersecurity, navigating industry shifts, and finding your own path as a hacker in the age of AI.
Policy Direction for Personal Data Protection in the Age of AI
Jikdong Kim Manager PIPC
CV
- B.S., M.S., and Ph.D. in Electrical and Electronic Engineering, Korea Advanced Institute of Science and Technology (KAIST)
- Director, New Technology Personal Information Division, Personal Information Protection Commission
- Team Lead, Contactless Industry Promotion, Ministry of Science and ICT
- Seconded to Asia-Pacific Telecommunity (APT), an international organization
- Materials and Components Policy Division, Ministry of Knowledge Economy
- Industrial Technology Team, Ministry of Information and Communication
- Senior Research Engineer, LG Electronics
Summary
Securing the Future: Cybersecurity in the Age of Generative AI
Song-Jin Ryoo
Director
NSR
CV
- (2024 – Present) Executive Committee Member, Data Security and Privacy Division, Korea Information Processing Society
- (2022 – Present) Executive Committee Member, AI Security Division, Korea Institute of Information Security and Cryptology
- (2022 – Present) Director, National Security Research Institute
- (2014 – 2021) Senior Researcher, National Security Research Institute
- (2007 – 2013) Integrated Master's and Ph.D. Program, KAIST
Summary
Generative AI is driving innovation across various industries, including the field of cybersecurity. While it offers powerful tools for both offense and defense, it also introduces new and significant security challenges.
This talk explores the dual dimensions of security in the era of Generative AI:
1. **AI for Security** – the use of AI technologies to enhance cybersecurity capabilities, such as phishing detection, malware generation, code auditing, and log analysis.
2. **Security for AI** – addressing vulnerabilities in AI systems themselves, including prompt injection, data poisoning, and corresponding defense mechanisms like guardrails and robust alignment strategies.
By examining both how AI can be used to secure systems and how AI systems must be secured, this presentation offers a comprehensive overview of cybersecurity in the age of Generative AI.
Evolving Security Paradigms in the Age of Quantum Computing
Seo Seung Hyun Professor
Hanyang University ERICA
CV
- (Jan. 2025 – Present) Executive Board Member, Korea Information Processing Society
- (Jan. 2024 – Present) Chair, Automotive and Unmanned Vehicle Security Division, Korea Institute of Information Security and Cryptology
- (Jan. 2022 – Present) Executive Board Member, Korea Institute of Information Security and Cryptology
- (Mar. 2017 – Present) Professor, Department of Electronic Engineering, Hanyang University ERICA
- (Mar. 2015 – Feb. 2017) Assistant Professor, Department of Mathematics, Korea University Sejong Campus
- (Jun. 2014 – Feb. 2015) Research Professor, BK21 Project Team, Graduate School of Information Security, Korea University
- (Feb. 2012 – May 2014) Postdoctoral Researcher, Purdue University, USA
- (Feb. 2010 – Feb. 2012) Senior Researcher, Korea Internet & Security Agency
- (Dec. 2006 – Jan. 2010) Researcher, Financial Security Institute
Summary
With the rapid advancement of quantum computing, concerns are growing over the vulnerability of existing public-key cryptographic systems. To prepare for potential threats in the quantum era, researchers and institutions are actively exploring various countermeasures.
This talk introduces the fundamentals of quantum computing and recent developments in quantum software. It then examines the current state of post-quantum cryptography (PQC) standardization efforts aimed at securing systems against quantum-enabled attacks. Additionally, the session will explore emerging security technologies that leverage the unique characteristics of quantum mechanics.
Large-Scale Analysis of Satellite Signals
Sang-Kil Cha
Professor
KAIST School of computing
CV
- (Present) Director, KAIST Cyber Security Research Center
- (Present) Chair Professor, Graduate School of Information Security, KAIST
- (2022) First Korean recipient of the IEEE Security & Privacy Test-of-Time Award
- (2024, 2022, 2020, 2014) Recipient of the ACM Distinguished Paper Award
- (2023) Recipient of the USENIX Security Distinguished Paper Award
- (2022) Recipient of the IEEE Transactions on Software Engineering (TSE) Best Paper Award "
Summary
Currently, more than 7,000 low Earth orbit (LEO) satellites are in operation, and the number is rapidly increasing each year with the expansion of networks like Starlink. Despite this growth, there is limited public knowledge about the nature of the data transmitted and received through these satellites.
This presentation briefly shares preliminary findings from our research team’s recent project on collecting and analyzing LEO satellite signals. While still in its early stages, we believe that large-scale satellite signal analysis will play a crucial role in shaping the future of space cybersecurity.