Agenda

08:00 - 08:50

Breakfast & Networking Break

08:50 - 09:00

Chairman's Welcome 

09:00 - 09:20

►Beyond DORA compliance: Orchestrating Digital Resilience in a VUCA environment

 Thomas Barkias, Principal Supervisor – Cyber Resilience, ICT, Crypto & Operational Risk, European Central Bank

  • Understanding the nuanced interplay of technology, processes, and human factors in achieving resilience
  • Exploring ways and challenging in orchestrating resilience in today's VUCA environment. 
  • Beyond Compliance, emphasising the need for a holistic approach that transcends mere compliance with regulations like DORA.
     
09:20 - 09:40

►Cybersecurity in the age of Artificial Intelligence: will the promises of today emerge as powerful threats tomorrow?

André Reichow-Prehn, Managing partner, EMEA, Palo Alto Networks 

  • Cyber Threats are emerging and for years among the top three risks on any executive board and government body risk list. 
  • Threat intelligence is a base requirement in recent regulation and best practice. 
  • Understanding and anticipating the threat landscape and capabilities of threat actors is crucial for risk based decision making and investing. 
  • The presentation will provide a recent overview about the global and regional threat landscape, describe relevant use cases  of the most notorious current threat actors and also the impact of new technologies like artificial intelligence on the threat landscape.
     
0

►Why Identity Alone Is Not Enough for a Zero Trust Strategy

Frank Barthel, Manager Solutions Engineering DACH, Netskope

  • The new reality of living in a hyperconnected online world requires a new approach to security, where multiple elements must be taken into account, besides simply blocking/allowing access to a specific service or the user identity to enforcing granular permissions.
  • Learn why the context is important to enforce a granular and effective security policy.
  • Discover which are the elements that must be considered, besides identity, to adopt an effective zero trust strategy
  • Understand how the different security controls, such as data protection, threat protection, behaviour analytics, cooperate to protect the modern enterprise.
10:00 - 10:20

►Security 3.0 - Learnings from modern medicine and longevity

Max Imbiel, CISO, Bitpanda Asset Management

•    What do security and medicine have in common?
•    What thoughts and best-practices can we transfer from modern Medicine into modern Security?
•    Applying healthier and more secure ways or working

10:20 - 11:00

►Education Seminars Session 1

Delegates will be able to choose from the following education seminars:

  • We need to talk about security in our containerized workloads, Gabriel Stein, System Engineer, SUSE
  • How 5G is going to play a crucial role, and how can we plan its adoption with an integrated Zero Trust cybersecurity approach? Ivan Majdan, Regional Sales Manager CEUR,  Security Division & Florian Rutsch, Sr. Sales Engineer Consultant CEUR, Security Division, Cradlepoint by Ericsson
11:00 - 11:30

Networking Break

11:30 - 11:50

► Beyond the Buzzwords, AI's Double-Edged Sword

Francisco Z. Gaspar, Lead Cybersecurity Architect, Telefónica Germany

  • Understanding the Evolution of Cybersecurity Paradigms
  • The Complexities of the Data Dilemma
  • AI's Promises and Pitfalls — the balancing act
  • Charting the Course towards a More Resilient and Secure Future
11:50 - 12:10

►Why established defences like Web Application Firewall or API Gateways are not enough to protect today’s APIs

Frank Sommer, Senior Solutions Engineer, Akamai

  • Why are APIs increasingly used?
  • What does this mean for the security department in companies?
  • Why are Web Application Firewalls and API Gatways not enough?
  • What is needed to secure APIs? 
12:10 - 12:30

►Warum 24 die Antwort auf alle Fragen im Cyber Security-Umfeld ist!

Thomas Schuchmann, Senior Director Sales Engineering Germany, Rubrik

  • Kennen Sie den Unterschied: Resilienz oder Resistenz? Wie unterscheiden sich Resilienz und Resistenz in der Datensicherheit und was ist wirklich effektiver für Unternehmen?
  • Sind Cyber-Vorfälle wirklich das größte Geschäftsrisiko? Warum werden Cyber-Risiken immer mehr zum Brennpunkt im Management und was bedeutet das für Unternehmen?
  • Investieren wir genug und in das Richtige? Trotz steigender Sicherheitsausgaben – warum sind Cyberangriffe immer noch ein Problem und was könnten wir anders machen?
  • Wie kann man's besser machen? Welche Strategien gibt es, um nicht nur das Risiko eines Cyberangriffs zu minimieren, sondern auch dessen mögliche Folgen abzufedern?
     
12:30 - 12:50

►Schwachstellen erkennen, priorisieren und systematisch beheben 

André Heller, Director Solution Architects DACH, Armis

  • Sie einen vollständigen Überblick über alle Ihre Schwachstellen im Unternehmen erhalten
  • Sie diese nach dem Risiko für Ihr Unternehmen priorisieren und beheben können
  • Sie die Möglichkeit erhalten, sich ein KI-basiertes Frühwarnsystem aufzubauen, das Angriffe auf Ihr Unternehmen noch vor Bekanntgabe von Schwachstellen (CVEs) identifiziert.

     
12:50 - 13:30

►Education Seminars Session 2

Delegates will be able to choose from the following education seminars:

  • Resolving incident response challenges in your SOC with automation, speed, and collaboration, Steve Jackson, Senior Vice President of Growth, Binalyze
  • Beyond the Dark: A Guide to Secure Your Brand in the Digital Underworld, Mahmut Kamil Özrenk, Sr. Pre-Sales Engineer, Brandefense
     
13:30 - 14:30

Lunch & Networking Break

14:30 - 14:50

►Managing third-party breaches

Riccardo Riccobene, Head of CSO Security Assurance & Head of Operational Resilience, DWS

  • Restoration and post-recovery steps  
  • Legal terms and conditions and resulting due diligence
  • Data restoration and best practice
  • Implementing security enhancements and lessons learnt
     
14:50 - 15:10

►Less Cyber More People - Putting People At The Center of Your World (or Cybersecurity Strategy)

Simon Riehle, Sales Engineer, Proofpoint
Marcel Alexander Bayer, Named Account Manager, Proofpoint

Being human-centric means placing humans at the center of design, decision-making, and problem-solving processes. It involves understanding, empathizing with, and prioritizing the needs, preferences, and experiences of individuals.  But how does that help us reduce our risk profile?  How can we consider the needs of each individual when we design our security strategy and deploy that next bit of tech.  How can we collect understand the needs of the individuals we are protecting?  How can we use it to improve our defences and mitigate risk?  How can we make it scale with limited resources?  How can we do more for less?  In this session we will share the secrets of an effective human-centric security strategy.
 

11:50 - 12:10

►How To Create Successful Malware and Defend with Zero Trust

Seamus Lennon, Vice President of Operations for EMEA, ThreatLocker

  •  In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. 
  • Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.
     
15:30 - 15:50

►The expanding role of generative AI in accelerating elite SOC performance

Frank Lange, Technical Director, EMEA, Anomali

  • Today's challenges in Security Operations
  • Doing more with less: practical Security Analytics Use Cases based on AI (demo)
  • The impact of AI on visibility, speed and scale in the modern SOC
15:50 - 16:20

Networking Break

16:20 - 16:40

►Ethical hacking explained: why you need ethical hackers in your organization

Michele De Donno, Ethical Hacker, Sky Deutschland GmbH

  • Ethical hacking and penetration testing: what and why
  • Myths and misconceptions about ethical hacking
  • A glimpse into the penetration testing process
  • Penetration test (live demo)
     
16:40 - 17:15

►Senior Leadership Panel Discussion

Max Imbiel, CISO, Bitpanda Asset Management (Moderator) 
Klaus-E. Klingner, Information Security Officer, Assambeauty 
Ralf Mutzke, Director Cyber Security, Aon Deutschland
Sreedevi Jay, Head of Cyber Threat Unit for EU, PagoNxt (A Santander Company)
Sheetal Joseph, Director, Cybersecurity, Isar Aerospace

  • The role of the CISO as security regulation increases (NIS2, DORA etc.)
  • Compliance versus security as a true business driver
  • Ai — helping or hindering?
  • Adopting a risk based approach to securing budgets
17:15 - 17:20

Closing Remarks 

Bildungsseminare


Resolving incident response challenges in your SOC with automation, speed and collaboration


Steve Jackson, Senior Vice President of Growth, Binalyze

In an "assume breach" world with increasing regulatory burden, Incident Response investigation capability is critical to protecting enterprise resiliency.

Attendees will learn:

  • The specific challenges around operational security, SOC resources and welfare and the regulatory landscape. 
  • How these challenges can be met head on through automation, collaboration and greater speed of investigation.
     

We need to talk about security in our containerized workloads


Jain Joseph, Solutions Architect, SUSE

In this session you will learn how you can secure your container workloads with modern security tools that give you peace of mind. Let's also talk about Zero Trust and why it is so important.

Attendees will learn:

  • Why our standard tools are not enough
  • Containerized workloads and security concerns
  • Protecting your modern workloads 

 


Wie wird 5G eine entscheidende Rolle spielen, und wie können wir seine Einführung mit einem integrierten Zero-Trust-Cybersecurity-Ansatz planen?


Ivan Majdan, Regional Sales Manager CEUR,  Security Division, Cradlepoint by Ericsson
Florian Rutsch,Sr. Sales Engineer Consultant CEUR, Security Division, Cradlepoint by Ericsson

Da sich die Mobilfunkleistung beschleunigt, bietet die 4G/5G-WAN-Konnektivität neue Möglichkeiten für Unternehmen, ihr Geschäft mit schnellen, flexiblen und agilen WWAN-Verbindungen für IoT-Geräte, Fahrzeuge, Zweigstellen und Benutzer zu erweitern.  Wie planen Sie also die Einführung von 4G/5G WAN in Ihr Unternehmensnetzwerk?  Cybersicherheit ist in einer Hochleistungsumgebung von entscheidender Bedeutung, insbesondere der Schutz von Vermögenswerten, sensiblen Daten, die zwischen entfernten Standorten, Benutzern, dem Internet, SaaS- und Cloud-Anwendungen übertragen werden. Erfahren Sie, wie sich eine Cloud-basierte SASE-Lösung mit einem Zero-Trust-Ansatz an das Mobilfunk-WAN anpassen lässt.
 


Beyond the Dark: A Guide to Secure Your Brand in the Digital Underworld


Mahmut Kamil Özrenk, Sr. Pre-Sales Engineer, Brandefense

In an increasingly interconnected world, the digital landscape presents both unprecedented opportunities and significant risks for brands. This presentation delves into the critical aspects of securing your brand amidst the evolving threats of the digital underworld. Join us as we go beyond the dark to illuminate the path to securing your brand in the digital age, equipping you with the knowledge and tools to protect your valuable assets against the ever-present threats of the digital underworld.

Attendees will learn: 

  • Credential Suffering
  • Ransomware Groups
  • Challenges