The webinar will focus on the importance of cybersecurity as a strategic pillar for startups and small tech companies. 

We will explore why startups are prime targets for cybercriminals, review real attack cases, and discuss the economic and reputational impacts of these incidents. 

The session will also cover how to identify critical digital assets, assess risks, and establish effective security policies, even with limited resources.

We will address the most relevant threats today, including ransomware, social engineering, and vulnerabilities specific to early-stage companies. Practical tools and strategies will be presented for protecting information, managing passwords, implementing backups, and securing cloud environments. 

The webinar will also highlight the human factor, offering guidance on training, awareness, and incident response protocols tailored for startups.

Practical details

Thursday, 12 June 2025
10:00 a.m. AST
→REGISTER HERE←

What will you get from the webinar?

  • Understand why startups are frequent targets for cyberattacks and how to anticipate these threats.
  • Learn the true cost of a cyberattack and its impact on business continuity.
  • Identify and protect your company’s most critical digital assets.
  • Discover essential security policies and tools you can implement on a limited budget.
  • Get up-to-date insights on the most common threats in 2025 and how to address them.
  • Receive practical advice for training your team and building a security-focused culture from the start.

A few words on the speaker, Santiago de Diego

Santiago de Diego is a mathematician and computer engineer (University of Granada), CPHE-certified, and he also holds a Master’s in information security (International University of La Rioja). He is a PhD student at the University of Granada. 

He currently works as a cybersecurity researcher in the Digital Core division of Tecnalia, where he works mainly on R&D projects in cybersecurity and blockchain. 

His research lines cover Privacy-Enhancing Technologies (PETs), such as DLT architectures, Self-Sovereign Identity, amongst other, and cybersecurity in industrial environments and critical systems.

REGISTER NOW