RootedCON: Trends in IT Security, Cybersecurity and RegTech

RooteCON 2025
Share

Index

    icon newsletter
    Get the latest news right in your inbox

    The digital world is constantly evolving and, with it, cybersecurity and regulatory technology (RegTech) have emerged as strategic axes to ensure protection and regulatory compliance in companies and institutions. In this context, RootedCON is positioned as one of the benchmark events in the field of IT security, bringing together experts, ethical hackers, academics and top professionals to analyze and discuss the latest trends, disruptive technologies and challenges in cybersecurity and RegTech.

    This article discusses in depth what RootedCON is, who is behind this important congress and its conferences, the news and trends in cybersecurity and, in particular, the RegTech technologies that are revolutionizing the way organizations protect their information and comply with current regulations.

    About RootedCON: What is the IT security conference?

    RootedCON is the leading cybersecurity conference in the Spanish-speaking world and one of the main meeting points in Europe for professionals in the sector. Born with the purpose of promoting the exchange of knowledge among members of the cybersecurity and anti-fraud community, RootedCON has established itself throughout its editions as a neutral and collaborative space where critical issues are discussed and innovative research is presented.

    Since its first edition, RootedCON has stood out for its ability to adapt to new trends and challenges in digital security. With more than 15 editions held, the conference has evolved in terms of scope, quality of content and diversity of speakers. In each edition, the event not only brings together experts in ethical hacking, digital forensics and cyberintelligence, but also incorporates training sessions - such as Bootcamps and RootedLabs - that allow attendees to delve deeper into specific technical areas.

    The main objective of RootedCON is to promote the exchange of experiences and knowledge, creating an environment in which both established professionals and young talents can learn, discuss and collaborate. Among its goals are:

    • Disseminate the latest research: Presentation of new techniques, methodologies and success stories in cybersecurity.
    • Specialized training: Through workshops, bootcamps and technical talks, we promote the development of advanced skills in the sector.
    • Connect the community: Create a network of contacts between professionals, companies and institutions, strengthening the cybersecurity ecosystem.
    • Promoting innovation and digital resilience: Knowing and adopting new technologies to prevent, detect and respond to constantly evolving threats.

    What really sets RootedCON apart is its inclusive and collaborative nature. The event is structured in multiple thematic tracks ranging from forensics and cyber intelligence to the implementation of disruptive technologies such as artificial intelligence applied to security and solutions such as advanced identity verification. Each track, organized in collaboration with specialized communities and associations, ensures that the most relevant and current topics are addressed, allowing attendees to take away practical ideas and tools to implement in their organizations.

    Ask our experts in digital security solutions for a demonstration.

    About Rooted: Organizer of the largest security and technology conference

    Rooted is the entity behind RootedCON, and has established itself as one of the most important organizers in the field of computer security in Spain and Latin America. With extensive experience in organizing events and promoting cybersecurity initiatives, Rooted has been able to adapt to the dynamics of the sector and the demands of an increasingly demanding and specialized public.

    Rooted began as an initiative to promote knowledge, new projects and solutions and training in cybersecurity, bringing together experts and amateurs in a collaborative and learning environment. Over time, the organization has expanded its scope and has become an international benchmark, organizing editions not only in Spain, but also in other countries, such as Portugal and Panama. This expansion has allowed Rooted to consolidate a global network of contacts and contribute to the dissemination of best practices in digital security in different regions.

    1. Neutrality and openness: The event is held in a neutral setting where politics, economics or any other particular interest are put on the back burner to give way to technical and professional discussion.
    2. Constant innovation: Rooted is committed to the inclusion of innovative content and the use of new technologies that allow attendees to learn first-hand about the most advanced tools and methodologies in the sector.
    3. Collaboration and community: Fostering cooperation between the different players in the cybersecurity ecosystem, from experts and companies to public institutions, is essential to meet the current challenges of an increasingly complex digital world.

    In addition to the organization of the main congress, Rooted is in charge of coordinating complementary training activities, such as:

    • Bootcamps and RootedLabs: Intensive training days that address specific cybersecurity topics, providing participants with the opportunity to improve their technical skills in a practical and collaborative environment.
    • HackerNight: A nightly challenge in which ethical hacking professionals and enthusiasts face off in competitions to discover vulnerabilities and improve system defenses.

    Workshops and technical talks: Sessions where success stories, new technologies and innovative methodologies are presented, enriching the training offer of the event.

    Cybersecurity is a constantly changing field, where threats evolve rapidly and attackers adapt to new technologies with intentity thetft attempts. RootedCON is positioned at the forefront of these trends, offering a comprehensive view of the most current challenges and solutions. The following is a look at some of the developments and trends shaping the cybersecurity landscape today.

    Trends in cybersecurity

    The rise of artificial intelligence applied to security

    Artificial intelligence (AI) and machine learning have become essential tools for detecting, preventing and mitigating cyber threats. Among the most prominent applications are:

    • Predictive analytics: AI algorithms make it possible to analyze large volumes of data in real time to identify anomalous patterns that could indicate the presence of an attack. This predictive capability is crucial to anticipate incidents before they cause significant damage.
    • Detection of suspicious behavior: Using machine learning, security systems can establish a normal behavioral profile and, if deviations are detected, issue automatic alerts so that possible intrusions can be investigated.
    • Incident response automation: The integration of AI-based solutions facilitates the orchestration and automation of cyber-attack responses, which reduces reaction time and minimizes the impact of incidents.

    Emerging regulations and standards

    The regulatory environment in cybersecurity is also constantly evolving. Some of the regulations and standards that are shaping the future of the sector are:

    • NIS2 Directive: This regulation, which seeks to improve cybersecurity in the public and private sector, obliges companies to adopt stricter security measures and to carry out regular audits.
    • Compliance with international standards: The adoption of regulations such as ISO/IEC 27001 and the implementation of risk management frameworks are increasingly common in organizations wishing to ensure the integrity of their systems.
    • Data protection and privacy: Growing privacy concerns have driven the implementation of regulations such as the GDPR, which requires companies not only to protect personal data, but also to demonstrate credibly that they comply with all legal requirements.

    In this context, the ability to adapt quickly to new regulations and implement advanced technological solutions is essential to maintain competitiveness and resilience in the digital world.

    Cyber intelligence and threat management

    The field of cyber intelligence has established itself as a key discipline for risk analysis and mitigation. Some of the most relevant trends include:

    • Integration of diverse information sources: Today's cyber intelligence draws from multiple sources, from network traffic data to social network information and global threat or AML databases. This integration enables a holistic view of the threat environment.
    • Collaboration between companies and government agencies: With cyber-attacks on the rise, collaboration between the private sector and government agencies is essential to share information and develop coordinated responses thanks to GovTech.
    • Threat hunting strategies: Cybersecurity teams are adopting proactive threat hunting methodologies to identify and neutralize vulnerabilities before they are exploited.

    New attack vectors in a hyperconnected world

    The expansion of the Internet of Things (IoT) and increasing digitization have opened up new attack vectors that challenge traditional defense capabilities. Current challenges include:

    • Vulnerable IoT devices: With billions of connected devices, the security of these devices has become a weak point. Attackers exploit vulnerabilities in poorly protected devices to form botnets or access corporate networks.
    • Attacks on critical infrastructure: Critical infrastructures, such as power grids, transportation systems and water utilities, are increasingly vulnerable to cyber attacks, putting national security and social stability at risk.
    • Exploiting vulnerabilities in mobile and cloud applications: The migration to cloud-based services and the massive use of mobile applications have created new opportunities for cybercriminals. Protecting these environments requires specialized solutions that integrate multiple layers of security.

    RegTech technologies to boost IT security

    The RegTech block is, along with cybersecurity trends, one of the most important axes on which efforts are being concentrated to digitally transform the security of companies. RegTech technologies are designed to facilitate regulatory compliance, reduce costs and increase efficiency in the detection and prevention of all types of crypto fraud, for example. Below, we take a closer look at the main technological solutions that are driving this change.

    Advanced electronic signature and digital identity verification

    The electronic signature has become an essential tool in today's digital environment, allowing the formalization of contracts and agreements quickly, securely and without the need for physical presence. Among the features and advantages are the following:

    • Legal validity and security: advanced electronic signature solutions in accordance with Regulation (EU) No. 910/2014 (eIDAS) offer a high level of security and legal recognition throughout the European Union. This ensures that electronically signed documents have the same validity as a handwritten signature.
    • Integration with onboarding processes: In the onboarding process, the electronic signature is integrated with other verification mechanisms, such as eKYC, allowing companies to validate the identity of their customers in a matter of seconds.
    • Cost and time reduction: By digitizing document signatures, companies eliminate the use of paper and significantly reduce management time, which translates into greater operational efficiency.
    • Compatibility and scalability: eSignature platforms can be easily integrated into existing enterprise systems, adapting to both mobile applications and web environments, enabling scalable deployment across multiple industries.

    Leading RegTech companies have developed solutions that combine electronic signatures with automated identity verification processes. These tools not only ensure that the signer's identity is authentic, but also integrate biometrics and digital forensic analysis techniques to detect any fraud attempt.

    electronic signature

    Identity verification and biometrics

    Digital identity verification is another fundamental component within the RegTech ecosystem. This process relies on various technologies that allow confirming a user's identity remotely and with high accuracy. Some of the most outstanding solutions are:

    • Face recognition: Using artificial intelligence algorithms, verification platforms compare the image captured in a selfie with the photograph contained in an identity document. This ensures that the person performing the verification is the same person who appears on the document, drastically reducing the risk of impersonation.
    • Biometric verification: In addition to facial recognition, other forms of biometrics are used, such as fingerprint scanning, voice recognition or even handwriting dynamics. These technologies have been refined to the point of offering levels of accuracy comparable to traditional methods, but with the advantage of being able to be performed remotely.
    • Liveness tests: To avoid the use of prerecorded photos or videos, verification systems incorporate liveness detection techniques. These tests ask the user to perform specific gestures - such as blinking, smiling or shaking their head - to ensure that the person is real and present at the time of verification.
    • Integration of databases and checklists: Identity verification is also enriched by cross-checking the information provided with official databases and watch lists, which helps to identify individuals who may be linked to illicit or high-risk activities.

    These solutions are used in a variety of industries, but find a particularly critical application in financial services, where identity verification is essential to comply with KYC and AML regulations. Adoption of these technologies enables banks and fintechs to streamline the customer onboarding process, improve the user experience and reduce fraud

    KYC and regulatory compliance processes (Know Your Customer)

    The KYC (Know Your Customer) process is a cornerstone in the fight against fraud, money laundering and other illicit activities. RegTech solutions have revolutionized this process, allowing companies to perform comprehensive checks in an automated and real-time manner. Key features and benefits include:

    • Automation of the onboarding process and registration : Through the use of artificial intelligence and machine learning, KYC systems can analyze and validate customer information - such as identity documents, proof of address and personal data - in a matter of seconds.
    • Reduced human error: Automation significantly reduces the possibility of errors, which improves process reliability and reduces the costs associated with manual handling.
    • Continuous risk assessment: Modern KYC solutions are not limited to initial verification; they integrate continuous monitoring systems to detect changes in the customer profile and anticipate possible fraudulent activities.
    • Simplified compliance: With the increasing complexity of international regulations (such as AML, GDPR and NIS2), having a RegTech solution that centralizes and automates the verification process is indispensable. These platforms allow companies to keep up to date with legal requirements, avoiding fines and penalties.

    Integrating KYC processes with electronic signature and biometric verification systems creates a robust security chain that protects both the company and the customer. By digitizing and automating these processes, a seamless user experience is achieved without sacrificing security and compliance.

    Other key technologies in the RegTech ecosystem

    In addition to the aforementioned solutions, there are other technologies that are transforming the way companies manage compliance and digital security:

    • Blockchain: Blockchain technology offers a high degree of immutability and transparency, making it ideal for recording transactions and validating the integrity of documents and data. In RegTech, blockchain is used to create secure and auditable digital records, facilitating verification and traceability processes.
    • Big Data and predictive analytics: The ability to process and analyze large volumes of data in real time allows companies to anticipate risks and detect suspicious behavior patterns. Big data algorithms combined with artificial intelligence improve fraud prediction and prevention capabilities.
    • Cloud computing: Cloud-based solutions offer scalability, flexibility and reduced infrastructure costs, allowing companies to implement RegTech technologies quickly and efficiently. In addition, they facilitate the integration of different systems and access to real-time data from anywhere in the world.
    • APIs and SDKs: Application integration through programming interfaces (APIs) and development kits (SDKs) enables identity verification and e-signature solutions to be seamlessly integrated into existing enterprise systems. This interoperability is key to extending the functionality of onboarding processes and improving the user experience.
    RegTech ecosystem

    Global benefits of adopting RegTech technologies

    The adoption of RegTech solutions has a profound impact on the digital transformation of companies. Some of the most prominent benefits include:

    • Optimization of internal processes: Digitization and automation of regulatory processes allow companies to reduce management time, reduce operating costs and improve overall efficiency.
    • Improved customer experience: By offering fast, secure and frictionless processes, companies can significantly improve customer satisfaction, resulting in increased loyalty and competitiveness in the marketplace.
    • Increased security and resilience: RegTech solutions offer multiple layers of security, from biometric verification to early threat detection, strengthening the company's digital infrastructure and protecting it against cyber attacks.
    • Guaranteed regulatory compliance: With increasingly stringent international regulations, having systems in place to ensure compliance with legal requirements is essential to avoid sanctions and maintain the company's reputation.
    • Adaptability and scalability: RegTech technologies allow organizations to quickly adapt to changes in the regulatory environment and new market challenges, guaranteeing a long-term solution that adapts to business growth and evolution.

    RootedCON has established itself as an essential event in the cybersecurity and regulatory technology landscape. Through its editions, this congress not only brings together experts and professionals in digital security, but also drives innovation in critical areas such as identity verification, electronic signatures and the implementation of RegTech solutions.

    In an increasingly digital and connected world, where cyber threats are evolving along with technology, combining cybersecurity trends with RegTech solutions is critical to ensure protection and compliance. Electronic signature, identity verification and biometrics technologies, along with automated KYC/AML processes and predictive analytics, are transforming the way companies protect their assets and manage their risks.

    The integration of these technologies not only optimizes internal processes and improves the user experience, but also strengthens overall security, facilitating the adoption of measures to proactively detect and mitigate threats

    Schedule a meeting with our cybersecurity experts.

    Tags
    Newsletter icon

    Get the latest news right in your inbox

    Ft
    aifintech
    regtech
    etica
    techbehemoths
    finnovating
    ecija

    Trust, identity and automation services

    Tecalis creates disruptive digital product to make the most innovative companies grow and evolve. We drive growth and digital transformation processes to bring the future to businesses today.
    Identity

    KYC (Know Your Customer) Video Identity Verification, Digital Onboarding and Authentication (MFA/2FA) solutions and services enable our customers to provide their users with an agile and secure experience.

    Our RPA (Robot Process Automation) software enables the creation of sustainable, scalable, productive and efficient business models through BPM (Business Process Management), allowing unlimited growth.

    Digitization

    Advanced and Qualified Electronic Signature and Certified Communication services (Electronic Burofax) allow customer acquisition, contracting and acceptance processes that used to take days or weeks to be completed and approved in minutes or seconds.

    Customer Onboarding (eKYC), Digital Signature (eSignature) services and Automated Fraud Prevention are making it possible for companies to operate online and without borders.

    Trust

    As an EU-certified Trust Services Provider and an established RegTech partner, we help organizations comply with the most demanding regulatory standards in their sector and region, including AML (Anti-Money Laundering), eIDAS (Electronic IDentification, Authentication and etrust Services), GDPR (General Data Protection Regulation), SCA (Strong Customer Authentication) or PSD2 (Payment Services Directive) regulations thanks to Tecalis Anti-Fraud Controls and Document Verification.