Agenda
08:00 - 08:50 |
Breakfast & Networking Break |
08:50 - 09:00 |
Chairman's Welcome |
09:00 - 09:20 |
►Beyond DORA compliance: Orchestrating Digital Resilience in a VUCA environment Thomas Barkias, Principal Supervisor – Cyber Resilience, ICT, Crypto & Operational Risk, European Central Bank
|
09:20 - 09:40 |
►Cybersecurity in the age of Artificial Intelligence: will the promises of today emerge as powerful threats tomorrow? André Reichow-Prehn, Managing partner, EMEA, Palo Alto Networks
|
0 |
►Why Identity Alone Is Not Enough for a Zero Trust Strategy Frank Barthel, Manager Solutions Engineering DACH, Netskope
|
10:00 - 10:20 |
►Security 3.0 - Learnings from modern medicine and longevity Max Imbiel, CISO, Bitpanda Asset Management • What do security and medicine have in common? |
10:20 - 11:00 |
►Education Seminars Session 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 11:50 |
► Beyond the Buzzwords, AI's Double-Edged Sword Francisco Z. Gaspar, Lead Cybersecurity Architect, Telefónica Germany
|
11:50 - 12:10 |
►Why established defences like Web Application Firewall or API Gateways are not enough to protect today’s APIs Frank Sommer, Senior Solutions Engineer, Akamai
|
12:10 - 12:30 |
►Warum 24 die Antwort auf alle Fragen im Cyber Security-Umfeld ist! Thomas Schuchmann, Senior Director Sales Engineering Germany, Rubrik
|
12:30 - 12:50 |
►Schwachstellen erkennen, priorisieren und systematisch beheben André Heller, Director Solution Architects DACH, Armis
|
12:50 - 13:30 |
►Education Seminars Session 2 Delegates will be able to choose from the following education seminars:
|
13:30 - 14:30 |
Lunch & Networking Break |
14:30 - 14:50 |
►Managing third-party breaches Riccardo Riccobene, Head of CSO Security Assurance & Head of Operational Resilience, DWS
|
14:50 - 15:10 |
►Less Cyber More People - Putting People At The Center of Your World (or Cybersecurity Strategy) Simon Riehle, Sales Engineer, Proofpoint Being human-centric means placing humans at the center of design, decision-making, and problem-solving processes. It involves understanding, empathizing with, and prioritizing the needs, preferences, and experiences of individuals. But how does that help us reduce our risk profile? How can we consider the needs of each individual when we design our security strategy and deploy that next bit of tech. How can we collect understand the needs of the individuals we are protecting? How can we use it to improve our defences and mitigate risk? How can we make it scale with limited resources? How can we do more for less? In this session we will share the secrets of an effective human-centric security strategy. |
11:50 - 12:10 |
►How To Create Successful Malware and Defend with Zero Trust Seamus Lennon, Vice President of Operations for EMEA, ThreatLocker
|
15:30 - 15:50 |
►The expanding role of generative AI in accelerating elite SOC performance Frank Lange, Technical Director, EMEA, Anomali
|
15:50 - 16:20 |
Networking Break |
16:20 - 16:40 |
►Ethical hacking explained: why you need ethical hackers in your organization Michele De Donno, Ethical Hacker, Sky Deutschland GmbH
|
16:40 - 17:15 |
►Senior Leadership Panel Discussion Max Imbiel, CISO, Bitpanda Asset Management (Moderator)
|
17:15 - 17:20 |
Closing Remarks |
Bildungsseminare
Resolving incident response challenges in your SOC with automation, speed and collaboration
Steve Jackson, Senior Vice President of Growth, Binalyze
In an "assume breach" world with increasing regulatory burden, Incident Response investigation capability is critical to protecting enterprise resiliency.
Attendees will learn:
- The specific challenges around operational security, SOC resources and welfare and the regulatory landscape.
- How these challenges can be met head on through automation, collaboration and greater speed of investigation.
We need to talk about security in our containerized workloads
Jain Joseph, Solutions Architect, SUSE
In this session you will learn how you can secure your container workloads with modern security tools that give you peace of mind. Let's also talk about Zero Trust and why it is so important.
Attendees will learn:
- Why our standard tools are not enough
- Containerized workloads and security concerns
- Protecting your modern workloads
Wie wird 5G eine entscheidende Rolle spielen, und wie können wir seine Einführung mit einem integrierten Zero-Trust-Cybersecurity-Ansatz planen?
Ivan Majdan, Regional Sales Manager CEUR, Security Division, Cradlepoint by Ericsson
Florian Rutsch,Sr. Sales Engineer Consultant CEUR, Security Division, Cradlepoint by Ericsson
Da sich die Mobilfunkleistung beschleunigt, bietet die 4G/5G-WAN-Konnektivität neue Möglichkeiten für Unternehmen, ihr Geschäft mit schnellen, flexiblen und agilen WWAN-Verbindungen für IoT-Geräte, Fahrzeuge, Zweigstellen und Benutzer zu erweitern. Wie planen Sie also die Einführung von 4G/5G WAN in Ihr Unternehmensnetzwerk? Cybersicherheit ist in einer Hochleistungsumgebung von entscheidender Bedeutung, insbesondere der Schutz von Vermögenswerten, sensiblen Daten, die zwischen entfernten Standorten, Benutzern, dem Internet, SaaS- und Cloud-Anwendungen übertragen werden. Erfahren Sie, wie sich eine Cloud-basierte SASE-Lösung mit einem Zero-Trust-Ansatz an das Mobilfunk-WAN anpassen lässt.
Beyond the Dark: A Guide to Secure Your Brand in the Digital Underworld
Mahmut Kamil Özrenk, Sr. Pre-Sales Engineer, Brandefense
In an increasingly interconnected world, the digital landscape presents both unprecedented opportunities and significant risks for brands. This presentation delves into the critical aspects of securing your brand amidst the evolving threats of the digital underworld. Join us as we go beyond the dark to illuminate the path to securing your brand in the digital age, equipping you with the knowledge and tools to protect your valuable assets against the ever-present threats of the digital underworld.
Attendees will learn:
- Credential Suffering
- Ransomware Groups
- Challenges