Agenda
08:00 - 08:50 CET |
Login & Networking |
08:50 - 09:00 CET |
Chairman's Welcome |
09:00 - 09:20 CET |
► Information Security and Privacy as the 2nd Line of Defense - The Impossible Boundary Drawing between Consulting and Operational Implementation Matthias Jungkeit, Chief Information Security & Data Protection Officer, Münchener Hypothekenbank
|
09:20 - 09:40 CET |
► Building a Response Strategy to Advanced Threats Richard Wieneke, Regional Manager, ExtraHop
|
09:40 - 10:00 CET |
► How Hackers Hack: Attacker Methodology & Lifecycle Jeremiah Roe, Synack
|
10:00 - 10:20 CET |
► Developer Security Awareness Klaus-E. Klingner, Divisional Information Security Officer, Allianz Technology SE
|
10:20 - 10:50 CET |
► Education Seminar Session 1 Delegates will be able to choose from the following education seminars:
|
10:50 - 11:20 CET |
Networking Break |
09:00 - 09:20 |
► Current Cyber Threats – (How) Can a 'responsible person' still sleep peacefully? Dr. Rolf Häcker, CISO, Landtag von Baden-Württemberg
|
11:40 - 12:00 CET |
► IT-Security challenges for 2022 and how to Skyrocket Cyber-Defense-Maturity Dr. Sebastian Schmerl, Director Security Services EMEA, Arctic Wolf
|
12:00 - 12:20 CET |
► Six things you need to know to protect against ransomware attacks Laszlo Stadler, Solutions Engineer, BeyondTrust
|
12:20 - 12:40 CET |
► How Good IT Asset and Risk Management Can Protect You From Ransomware Anton Merk, Director Solutions Engineering, OneTrust
|
12:40 - 13:10 CET |
► Education Seminar 2 Delegates will be able to choose from the following education seminars:
|
13:10 - 14:00 CET |
Lunch Break |
14:00 - 14:20 CET |
► Cybersecurity in 2022: A Legal Perspective Daniel Sandmann, Attorney at Law, Senior Lecturer at University of Augsburg and ICN Business School Nancy/Berlin; Henrik Becker, Lawyer/Partner, Kristof + Becker Partner Compliance Consulting; Dr. Matthias Orthwein, LL.M. (Boston), Head of the IT & Digital Business, SKW Schwarz
|
14:20 - 14:40 CET |
► The Battle of Algorithms: How AI is beating AI at its own game Beverly McCann, Principal Cyber Security Analyst, Darktrace In this session, discover:
|
14:40 - 15:00 CET |
► Man and machine in cybersecurity: friend or foe? Matthias Canisius, Regional Director Central Europe, SentinelOne
|
15:00 - 15:20 |
► The psychology of a Social Engineering attack Jelle Wieringa, Security Awareness Advocate, EMEA, KnowBe4
|
15:20 - 15:40 CET |
► Build in security: from DevOps to SecDevOps? Brice Abrioux, Lead Architect, Union Bancaire Privée, UBP SA
|
15:40 - 16:10 CET |
Networking Break |
16:10 - 16:50 CET |
► Cloud, Data Security, Data Protection and Governance Dr. Sebastian Frischbier, Head of Cloud & IT Compliance, Infront
|
16:50 - 17:00 CET |
Chairman's Closing Remarks |
17:00 - 17:30 CET |
Networking |
17:30 |
Conference Close |
Education seminars
Internet Isolation: No Surrender to Cyber Criminals
Brett Raybould, EMEA Solutions Architect, Menlo Security
Despite the growing sophistication of cyber-attacks and new pressures of managing remote workers, cyber practitioners remain defiant in their cyber defence. No one is ready to wave a white flag. This session is designed for security professionals who are not content to maintain the cyber status quo and are exploring fundamentally different approaches such as isolation to proactively protect their users and systems.
Join this session to hear two real world case studies of organisations that have transformed risk of infection at speed and scale – outsmarting threats and promoting productivity.
What will attendees learn:
- How to eliminate risk of infection from browser-based threats
- How to protect users from credential theft via phishing attacks
- How quickly isolation’s protective layer around users delivers business value
How AI based ‘Threat Detection & Response’ finds and stops Ransomware
Matthias Schmauch, Regional Sales Manager Central Europe, Vectra AI
Cybercriminals are always looking for easy targets and opportunities to steal personal information. With no application, network, or data centre being invulnerable, decision-makers often harbour a false sense of security about their ability to fend off hackers—especially when they’re not armed with the necessary tools to succeed.
During our presentation we will cover:
- How prepared your organisation is to detect and respond to a ransomware attack
- What approaches other organisations are taking to stop ransomware gangs
- How to detect and respond to Ransomware before it impacts you
Leveraging IAM for Effective and Efficient Threat Mitigation
Daniel Gordon, Senior Sales Engineer, OneLogin
There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions.
Faced with the challenge of managing identities and securing access to data and applications from a growing number of endpoints, what are the fundamental controls organizations need to maintain business continuity and secure their remote and hybrid workforce?
Hear from Lonnie Benavides – Head of Infrastructure and Application Security, Onelogin – for a discussion on practical information and advice regarding the utilization of identity and access management solutions to effectively mitigate modern cyber threats to your business.
Key Takeaways:
- Understanding the key fundamentals of a strong cloud security posture
- Why passwords alone are not enough
- Best practices for building a cybersecurity strategy at scale
E-Crime: Perception and Reality
Jörg Schauff, Strategic Threat Intelligence Advisor, CrowdStrike
Cybercrime is a problem. In order to successfully protect one’s organisation it is mandatory to understand the system that hides behind the constantly evolving threat landscape, the increasing number of intrusions and the ever-present ransomware threat.
During our presentation we will cover:
- Supply chains in the crosshairs of cybercriminals
- Ransomware: A blessing for attackers, a curse for victims
- Global Attitude of IT-Security professionals towards E-Crime
- The benefits of Threat Intelligence for security teams