
The Digitalk eSummit event format is a unique fusion of an annual conference and an online expert community, where you can consume presentation videos at your own pace and connect with other professionals.
This large-scale virtual event unfolds across multiple stages, each dedicated to the technologies and trends transforming our world. On the Main Stage, visionary leaders set the tone for the future. Beyond that, explore specialized tracks in AI, Fintech, PropTech, Mobile, Cybersecurity, and many more - each packed with expert insights, groundbreaking innovations, and real-world solutions. Whether you’re here to get inspired, learn from the best, or connect with industry changemakers, Digitalk eSummit is where ideas become impact.
Join now and explore a continuously expanding collection of video presentations.








Experienced IT Manager with a strong background in DevOps, cloud computing, CI/CD, containerization, and software development. Proven track record in strategizing, planning, and executing IT initiatives while effectively managing resources and budgets. Skilled in strategic planning, problem-solving, and communication with good understanding of business principles, project management and team leadership. A results-driven leader with a broad spectrum of IT expertise, capable of driving innovation, efficiency, and security within an organization.
The emergence of Agentic AI represents a fundamental shift from traditional artificial intelligence to autonomous systems capable of independent reasoning, decision-making, and action execution. Unlike conventional AI that requires human oversight for each decision, Agentic AI operates as intelligent agents that can understand context, set goals, execute complex workflows, and adapt their behavior based on outcomes.This webinar provides a comprehensive introduction to Agentic AI, exploring what these systems are, how they differ from traditional AI, and why they represent the next evolution in enterprise technology.
Agentic AI, LLM, AI Governance, DXP, Integration

Peter is an AI enthusiast and software engineer who loves exploring how AI can make a real difference. He has worked on building Retrieval-Augmented Generation (RAG) systems, red teaming AI models to spot weaknesses, and designing practical guardrails for large language models (LLMs). His focus is on making AI not just smarter, but also safer and easier to trust—using a mix of technical safeguards, bias checks, and clear accountability. He is excited to share some hands-on lessons and tips for building AI systems that are both robust and reliable, and to show how a thoughtful approach to AI safety can make all the difference.
This webinar explains why organizations must treat AI as a safety-critical technology by sharing real-world examples of AI failures, like hallucinations, bias, and unpredictable behavior. You’ll learn how these risks can cause real harm in fields such as healthcare, finance, and transportation. The session also covers practical ways to prevent problems—like red teaming, bias checks, and clear accountability—so you can build safer, more trustworthy AI systems.

IT teams chase orphaned accounts, duplicate identities, and systems that never sync. They fix one problem and three more appear. This is reactive work. It kills productivity and creates risk. AI agents change this. They hunt problems before problems hunt you. They clean data while you sleep. They prevent the fires instead of fighting them. Real deployments show 80% less manual cleanup. Better compliance. Happier users. This presentation shares five practical lessons from real-world deployments of AI Agents for identity data remediation, covering both technical approaches and organizational considerations for gaining stakeholder buy-in. Attendees will learn actionable strategies that align with Gartner's recommendations for modern identity governance.

Dávid has a background in software development, and security has always played a key role in his work. He has been involved in both successful and unsuccessful ventures. The development of OpenShield began at the end of 2024, providing a security layer for LLM models.
In addition to LLM models, MCP servers have also emerged. Their proliferation introduces new security risks, as LLMs are just as vulnerable to attacks as other systems. The main challenge lies in the diversity of attack types. Traditional security solutions alone are no longer sufficient. Moreover, MCP systems can provide direct access to corporate data, further increasing the risk.

David Kellerman is the Field CTO at Cymulate, a cybersecurity company specializing in continuous breach-and-attack simulation and exposure validation. With a strong background in customer-facing technical roles, he plays a key role in helping organizations assess and improve the real-world effectiveness of their security controls. Passionate about bridging theory and practice, he champions the use of automated, ongoing security validation to ensure resilience against evolving cyber threats.
As cyber threats become increasingly sophisticated, organizations need to shift from reactive to proactive cybersecurity strategies. Attack simulation technologies offer a powerful approach to continuously validate security measures, identify vulnerabilities, and enhance overall resilience against potential threats.
The adoption of attack simulation and continuous threat exposure management technologies is a critical step toward building a resilient cybersecurity framework. These tools empower organizations to move beyond traditional defenses and maintain a strong security posture in an ever-changing digital world.

Shaked Kafzan is the CTO and Co-Founder of Cervello, a leading railway cybersecurity software company. He directs the technology vision and product strategy at Cervello, leveraging his leadership experience from the elite technological unit of the Israeli Intelligence Corps – Unit 81. In this role, Shaked managed nation-level cybersecurity projects and safeguarded critical national infrastructures, gaining deep expertise in computer networking, communications, and various cyber disciplines.
Before co-founding Cervello, Shaked served as the Tech Lead at Argus, which was later acquired by Continental. At Argus, he tackled complex OT networks and specialized in automotive cybersecurity, demonstrating his ability to handle intricate technical challenges and deliver robust solutions.
At Cervello, Shaked continues to leverage this unique combination of skills to drive the company’s success and advance the field of railway cybersecurity.
This presentation will introduce Margo, Cervello’s AI-powered cybersecurity agent, designed to support real-time rail operations. We will explore how Margo leverages AI Agents and the MCP model to automate threat investigation, accelerate incident response, and improve operational decision-making across OT environments.

Leader and team member of MWT Solutions, ManageEngine solutions expert with experience from business process supporting software solutions and IT security.
The Zero Trust model and automated IT security are becoming increasingly important in the modern enterprise environment, especially with the rise of hybrid and cloud-based systems. This presentation demonstrates how the principles of Zero Trust can be implemented using ManageEngine products (such as ADManager Plus, Log360, PAM360, Endpoint Central), and how to automate privilege management, logging, incident handling, and compliance reporting. Through practical examples, the talk will show how to reduce risks caused by human error, accelerate response times, and ensure continuous compliance.

Related articles