Agenda
| 08.00 - 09.00 |
Breakfast Networking Break |
| 09.00 - 09.10 |
Chair's Opening Remarks |
| 09.10 - 09.30 |
►Operational Resilience by Design in the Age of DORA Thomas Barkias, Team Lead - Banking Supervision, European Central Bank
|
| 09.30 - 09.50 |
►Cyber-Bedrohungen mit Zero Trust Cyber & Identity Resilience entgegenwirken Frank Schwaak, Field CTO, Rubrik
|
| 09.50 - 10.10 |
►Managing a Live Cyberattack: The Volt Viper Scenario Julian Dube, Information Security Officer, E.ON Digital Technology
|
| 10.10 - 10.50 |
►Education Seminar 1 Delegates will be able to choose from a range of topics:
|
| 10.50 - 11.20 |
Networking Break |
| 11.20 - 11.40 |
►How to define and manage ICT risk in line with regulatory requirements (such as DORA and MiCA) Dr. Gulnara Hein, CISO, Chintai
|
| 11.40 - 12.00 |
►Wissen ist die beste Verteidigung – was wissen Sie über Identitäten? Andreas Mueller, Regional Sales Director CEUR, Delinea
|
| 12.00 - 12.20 |
►European Threat Reality 2025: Was Angreifer Heute Wirklich Tun Nikolei Steinhage, Senior Sales Engineer, CrowdStrike
|
| 12.20 - 12.25 |
►Zero Trust Controls at the Endpoint Eoin Molloy, Account Executive, Threatlocker
|
| 12.25 - 13.05 |
►Education Seminar 2 Delegates will be able to choose from a range of topics:
|
| 13.05 - 14.00 |
Lunch Networking Break |
| 14.00 - 1420 |
►Zero Trust—Beyond the Buzzword: separating Strategy from Implementation Igor Podebrad, Director, Office of the CISO, Google Cloud
|
| 14.20 - 14.40 |
►Ransomware 3.0: Weaponizing AI for the Next Generation of Ransomware Attacks Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
|
| 14.40 - 15.20 |
►Education Seminar 3 Delegates will be able to choose from a range of topics:
|
| 15.20 - 15.50 |
Networking Break |
| 15.50 - 16.25 |
►Building Cyber Resilience and Managing Risk Across Critical Industries Sachin Gaur, Cybersecurity Manager, Continental (Moderator)
|
| 16.25 - 16.30 |
Chairs Closing Remarks |
Bildungsseminare
Shadow API: Find Them, Test Them, Fix What Matters
Mark Schembri, Field Software Engineering Manager, Invicti Security
Your business is increasingly API-driven, yet partially blind when it comes to API security. Often, security teams are unsure of the number of APIs they have, let alone which ones are exposed, undocumented, or vulnerable. Join us to learn how you can apply Invicti’s multilayered approach to shadow API discovery and schema reconstruction. Once discovered, you test these APIs with the industry's best DAST. Validating difficult-to-find vulnerabilities like BOLA and BLFA, business logic errors, and the presence of weak authentication with proof-based scanning to achieve AppSec’s charter that only secure apps reach production.
Attendees will learn:
- Sensorless API discovery and schema reconstruction
- API management system integration
- Network traffic analysis (NTA) across F5, NGINX, and Cloudflare
- OWASP Top 10 for API testing and reporting
Purchase Scams Uncovered: A Look at the Dark Web's “Opportunity Economy” and Advanced Resilience Tactics
Joël Giger, Senior Intelligence Consultant, Recorded Future
Purchase scams are a major emerging fraud threat using fake e-commerce stores to steal data and accept payments for non-existent goods. The dark web's "opportunity economy" amplifies these scams through market promotions for criminal services and emerging AI tools for content generation and scale. Threat actors also employ advanced strategies to ensure resilience, which complicates detection and investigation. Effective mitigation requires scam merchant intelligence and increased customer awareness.
Attendees will learn:
- The role of the dark web "opportunity economy" and emerging AI tools in rapidly scaling and amplifying purchase scam infrastructure and campaigns.
- The advanced resilience tactics prolonging the scams' lifespan and complicating investigations.
- How to mitigate purchase scam risk using scam merchant intelligence for proactive detection and the importance of robust customer awareness and education programs for card issuers and merchant acquirers.
Your Perimeter is on the Front Lines: Attack Surface Reduction as a Primary Defence
Dan Andrew, Head of Security, Intruder
This education seminar will provide a deep-dive into core concepts and practical recommendations for Attack Surface Management (ASM) and Asset Discovery. Your perimeter is on the front line, and good patch management alone is not enough to protect it. You should leave this session with a better idea of how to blend ASM and Asset Discovery with Patch Management for a robust exposure management process.
We'll run through examples of attack surface risks, real-world vulnerabilities affecting internet exposed tech, and why implementing an ASM process is critical alongside patch management. It may be tempting to fall back on just patching your biggest *known* threats, but some of the biggest risks are vulnerabilities that are not yet publicly known. These threats do not have a CVSS score, and attack surface management is your primary defence. Learn how to future-proof your perimeter.
Asset Discovery is also an essential part of managing your attack surface. Keeping track of your internet exposed IPs and domains is far from trivial, and cloud environments in particular make this challenge harder. Losing track of some of your assets is no longer an embarrassing mistake - it's an unavoidable reality. We will show some examples of how this happens, and give a practical approach to asset discovery which helps you keep track, and avoid systems slipping outside of your exposure management process entirely.
Attendees will learn:
- Integrating Attack Surface Management into your Patch Management process - defining ASM as a Primary Defence that's proactive, not reactive
- Prioritisation considerations and why Informational risks are Criticals waiting to happen. Why not all 'Criticals' are equal, and why CVSS is not king
- The importance of Asset Discovery to find Shadow IT and build a realistic view of your Attack Surface. Practical recommendations on how to approach this
Adapting to AI in security: Best practices for autonomous AI and human interaction
Susann Burnell, Principal Solution Engineer, Tines
Artificial intelligence holds great promise for cyber security professionals, who see AI as a key tool in the complex and critical effort to stay ahead of cyber threats. Layering AI-driven capabilities onto existing frameworks like SOAR (security orchestration, automation, and response) and SIEM (security information and event management) can be labour- and skills-intensive.
Attendees will learn:
- How Tines address many of the challenges around integrating AI into SecOps
- The common challenges driving organizations to modernize SecOps
- The latest market trends driving use of AI as a component of modern cyber security
Defending Against Multi-Channel Brand Impersonation
Billy McDiarmid, Senior Director of Sales Engineering, Red Sift
Even with SPF and DMARC in place, cybercriminals are now impersonating organisations across email, web, and social media to deceive customers and partners. During this session, Red Sift expert Billy McDiarmid will reveal how lookalike domains, forgotten DNS records, and fake social profiles erode brand integrity. With brand and social media monitoring, you’ll see how security teams can detect and shut down impersonation campaigns across every digital channel.
Attendees will learn:
- How attackers leverage DNS gaps and high-risk lookalikes to launch cross-channel impersonation attacks
- The power of AI-driven detection and agentic automation that makes response faster and smarter
- How to build a robust defense against exact-domain spoofing and lookalike domain attacks
How Continuous Threat Exposure Management Turns Exposure Data into Proof of Risk
Tamim Mamozai, Regional Sales Director DACH, Nagomi Security & Nick Coleman, Sales Engineer, Nagomi Security
Senior security leaders don’t need another recap of tool sprawl or vulnerability overload—you live it. The question is: how do you prove which exposures actually raise breach risk in your environment, and eliminate them faster than the threat changes? That’s where Continuous Threat Exposure Management becomes practical. In this 30-minute, interactive session, we will skip definitions and go straight to execution. Expect a fast, lively walkthrough of what works, what fails, and the assumptions Continuous Threat Exposure Management routinely overturns. No pitch—just repeatable methods and hard-earned lessons to make CTEM measurable and defencible.
Attendees will learn:
- Verify what you actually own, revealing true scope and exposure at the foundation of your attack surface
- Continuously validate controls, catching drift and coverage gaps before they fail silently
- Identify real exposure beyond CVEs, including misconfigurations, identity abuse paths, and control weaknesses
- Focus remediation on what matters most, based on how active attackers actually operate
- Practical Continuous Threat Exposure Management moves you can apply immediately to reduce real risk
Preventing Data Breaches - Why is it so complicated across the company?
Tobias Gerhardt, Sales Engineer, Varonis
TL;DR: If you know you would be screwed if data gets stolen, I can show you how to close a few often-existing gaps.
In our modern IT world, we are constantly focused on preventing external threats. However, we often overlook the golden nugget: sensitive Data. However, the root cause of this problem is not as easily solved as one might think. That is because companies still misinterpret who could be an enemy and who could be a target. Furthermore, a 9-to-5 job has its limits and so does the company's pocket. Therefore, I will explain a common but still underestimated attack vector. It will also outline the situation in which you end up, when you think that's enough. In turn, we will dig into three vectors that could still allow stealing data and how a little "Control the Controllables" by the help of the Varonis Data Security Platform could tackle them.
Attendees will learn:
- You will learn which aspects around holistic data security exist
- Why to much effort into a single aspect or point solution can cause problems
- How Varonis does support data security across different domains
