Eloy Velasco


Degree (Bachelor) in Law from the University of Deusto (Bilbao), Diploma in legal-economic specialisation from the same university. Professional judge since 1988.
Assigned to the District Court of Portugalete (Vizcaya), to the Magistrates' Courts in the Valencian towns of Sagunto, Torrente and Valencia, to the Courts of Plaza de Castilla in Madrid and to the National High Court. He has served for 10 years in the Central Court of Instruction No. 6, and is currently a Magistrate attached to the Appeals Chamber of the National High Court. Contact point of the European Criminal Judicial Network, he has been Eurojust's National Correspondent for corruption matters.
Member of the Spanish Judicial Network, he has participated in several international projects on international judicial cooperation, training forums, courses...
Award for "Best Lawyer for Digital Law" in 2014 by ENATIC (Association of Lawyers dedicated to new technologies). Gold Medal in cybersecurity to the best Judge by the UDIMA Chair and the National Association of Appraisers and Judicial Computer Experts of 2014. Accors Prize 2018 "against Corruption and for Social Regeneration" awarded by Madrid Foro Empresarial.
Author of numerous scientific publications in the field of criminal law, criminal procedure and new technologies.
Associate Professor of Criminal Procedural Law at the San Pablo CEU University in Madrid.
Carlos Seisdedos


A researcher and intelligence analyst in international security and cybersecurity. In this same field, he is a university lecturer and speaker at specialist events in both Europe and LATAM.
He has integrated Law Enforcement Agencies in criminal analysis and cyber investigation. He currently works with and advises various public authorities in Spain and LATAM countries.
He was the creator of the “magneto” tool for intelligence analysts for information analysis and is co-author of the book Open Source INTelligence (OSINT): Investigar personas e Identidades en Internet (Open Source INTelligence (OSINT): Investigating People and Identities) on the Internet, published by 0xword in in 2020.
Carlos Loureiro Montero


Active member of the Spanish National Police in the General Information Office. Coordinator of C1b3rwall Academy, member of Mundo Hacker Team and Hackmadrid% 27.
Professor in different university master's degrees focused on cybersecurity, cybercrime and cyberintelligence issues. Speaker at different computer security conferences such as CCN-CERT XIII and XIV, Mundo Hacker Day, C1b3rwall, Intelcon, WorldParty, etc.
Carlos Cilleruelo


Carlos Cilleruelo Rodríguez holds a degree in Computer Engineering from the University of Alcalá and a master's degree in cybersecurity from the Universitat Oberta de Catalunya. He is currently pursuing doctoral studies related to cybersecurity at the University of Alcalá where he also works as a researcher.
Apart from his work at the university, Carlos also works as a cybersecurity expert for several companies doing pentesting and forensic analysis among others.
Beatriz Saura Alberdi


She is a graduate in law from the University of Alicante and holds a doctorate in law from Miguel Hernández University. She has taught at the Faculty of Social Sciences and Law at Miguel Hernández University, where she was appointed member of the faculty and head of the Civil Law department.
She has been a temporary Judicial Secretary at the Central Court of Instruction No. 5 of the National High Court. She has been a Temporary Prosecutor at the Provincial Prosecutor’s Office of Madrid.
She regularly gives lectures at conferences, master’s and training courses on legal matters at various universities, bar associations and business schools. She is currently Director of the International Compliance Officer Course at the ISDE Law Business School.
She has published several articles in legal and news publications, such as Confilegal and El Economista, as well as technical articles in journals of Professional Associations and prestigious legal publishers such as Tirant Lo Blanch, Thomson Reuters Aranzadi and SEPIN.
She was the co-author, along with Eloy Velasco Núñez, of the book Cuestiones prácticas sobre responsabilidad penal de la persona jurídica y compliance: 86 Preguntas y respuestas [Practical Aspects of Legal Person Criminal Liability and Compliance_ 86 Questions and Answers]” Editorial Aranzadi 2017. She was also co-director with Mr Eloy Velasco Nuñez of the book “Delitos que pueden cometer las empresas” [Crimes Companies Can Commit], Editorial SEPIN, 2019.
She is Joint Head of the Compliance Section of the Madrid Bar Association and President of the International Compliance Research Centre.
Alfonso Muñoz Muñoz


PhD in Telecommunications Engineering from the Polytechnic University of Madrid (UPM, 2010) and postdoctoral researcher in computer network security at the University Carlos III of Madrid (UC3M).
A professional with more than 18 years of experience, he has worked on advanced projects with European organisations, state security forces and multinationals (global 500 and IBEX-35). For more than a decade he has been involved in the design of secure architectures, technical security assessment (hacking), forensic analysis and security in mobile environments and wireless networks, leading technical teams, managing their budget in various areas of cybersecurity, and scientific research and innovation teams, in universities and private companies. He’s a lover of agile management and resource optimisation.
Alfonso is a regular speaker at major security conferences (STIC CCN-CERT, DeepSec, HackInTheBox, Virus Bulletin, Ekoparty, Blackhat Europe, BSIDES Panama, RootedCon, 8.8, No cON Name, GSICKMinds, Cybercamp, Secadmin, JNIC, Ciberseg, X1RedMasSegura, Navaja Negra, T3chfest, etc.), has published more than 60 publications of impact in the area (IEEE, ACM, JCR, ...), patents, books and opensource cybersecurity tools. He is certified as CISA (Certified Information Systems Auditor), CISSP (Certified Information Systems Security Professional), CEHv8 (Certified Ethical Hacker), CHFIv8 (Computer Hacking Forensic Investigator), CES (Certified Encryption Specialist), OSWP (Offensive Security Wireless Attack), CriptoCert Certified Crypto Analyst and CCSK (Certificate of Cloud Security Knowledge).
His work as a cybersecurity professional has been recognised by numerous academic and professional awards (Hall of fame Google, Security Bulletins Microsoft, ...), including in 2018 as one of the 25 most influential people in Spain in the field of cybersecurity and in 2019 as one of the 50 most relevant people in the protection of digital assets (TOP 50 Cybersecurity Blue Team). He has been interviewed by the main Spanish media and is often consulted on problems of social impact derived from cybersecurity and privacy. He is a lecturer in different cybersecurity master's degrees in public and private universities, as well as co-editor of the thematic network CRIPTORED, the oldest and most influential informative network on these issues in Spain and Latin America. This network has received recognition and awards from the most significant players in the cybersecurity community in Spain (RedSeguridad Magazine, SIC Magazine, Antonio Ropero-RootedCon Awards, etc.).
In recent years he has combined his professional work with the launch of the start-up CriptoCert, a company dedicated to training and education in cryptography, publishing the world's first professional certification in this discipline.
Forensic liability analysis of computer content in the enterprise
- Speaker: Beatriz Saura Alberdi
- Topic: Technological research and case law
- Content of the workshop:
- Corporate internal investigations; regulations and case law.
- Forensic analysis of computer devices to obtain evidence.
- Recording compliance evidence in a blockchain system.
Cryptocurrencies as an object of crime
- Speaker: Isaac Francisco Pérez Pérez
- Topic: Cryptocurrencies in cybercrime
- Content of the workshop:
- General concepts.
- Concept of cryptocurrency.
- Underlying technology. Blockchain. Cybersecurity in transactions.
- The legal approach cryptocurrency (legislation and case law).
- The anonymity and value of cryptocurrency as a lure in cybercrime.
- Cryptocurrencies as a target of cybercrime.
- The role of cryptocurrency in crime. Object of desire.
- Major crimes related to cryptocurrencies.
- New offences related to cryptocurrencies. Amendments to the law.
- New regulation of cryptocurrency platforms.
- Practical approach.
- Real cases investigated in the Audiencia Nacional.
- Cryptocurrency transactions. Tracking.
- Crime prevention.
- Questions from the floor.
- General concepts.
Investigating under supposed identities
- Speaker: Ruth Sala Ordoñez
- Topic: Technological research and case law
- Content of the workshop: The ease of access to the Internet has fostered the growing use of the Internet as a facilitating instrument of searches by investigators for any data that helps to find out the crime and the identity of the criminals. The workshop places special emphasis on all the roles that admit the use of the supposed identity for the investigation, the suspicions derived from obtaining the evidences of the virtual environment and its possible qualification as legal or illegal.
- Results of the previous questionnaire.
- Normative, legal and doctrinal study of the undercover agent and the undercover online agent.
- Principles of action, limits to its activity, probative value of the results obtained with its activity.
- The intelligence report obtained in open sources OSINT.
- Concept and fundamentals.
- The subject responsible for the OSINT intelligence report (Judicial Police Agent; the individual investigator; the expert).
- The supposed identity: consequences of the incorporation into the judicial process of the evidence obtained under the presumed identity.
- The probative value of the OSINT report.
Ethical and cybersecurity risks in adopting emerging technologies
- Speaker: Pablo Ballarin Usieto
- Topic: Risk management in adopting emerging technologies
- Content of the workshop:
- Introduction
- Cybersecurity risks in emerging technologies
- Concepts
- Particularities of IOT/IA architectures and their vulnerabilities
- Attack vectors and types of attacks on AI/IOT platforms
- Theoretical risk analysis of an IA/IOT platform
- Baseline for securitisation of an IA/IOT platform
- Real-life example of a risk analysis of a Brain-Computer Interface product.
- Class exercises: identifying risks in given scenarios and defining protection baselines.
- Ethical risks in emerging technologies
- Ethical principles in emerging technologies
- User and societal impact
- Applications that do not follow these principles
- What is trusted AI?
- Example guidelines: EU Ethical Design Guidance, Montreal Ethical AI Declaration, Beijing AI Principles
- Aligning AI with ethical principles
- Real-life example of an assessment of the ethical principles of an AI
- Exercises: Identifying issues in given scenarios, and finding possible approaches to solutions