24th e-Crime & Cybersecurity Congress Germany

Bridging the gap between cybersecurity and real-world risk management

22nd January 2026 • Crowne Plaza Congress Hotel, Frankfurt

As adversaries continue to disrupt state entities, CNI and CNI-adjacent organisations, CISOs and their leaders need a new paradigm.

 

If you can’t stop ransomware, then what can you do?

If you run any organisation large or small today, the best way to test your cybersecurity function is simply to ask, “are we 100% secure against a ransomware attack crippling the business?”. The answer will, in almost all cases, be “no” and that is where all real conversations about cybersecurity should start.

In that discussion, ransomware is simply a placeholder for any type of attack that can disable critical business processes to the extent that the enterprise is materially affected. And to answer the question, the enterprise has to do a lot more than give the task to the CISO and rely on a security stack that focuses on specific threats without reference to enterprise risk.

Risk prioritisation requires a complete understanding of the minimum viable business, the processes and assets (end-to-end) which that business would need to run, and then an analysis of the IT systems and vulnerabilities implicated.

That requires the business, the CRO, IT and operational risk staff, the business continuity team, the cybersecurity team and senior management all to co-operate actively to put together a true picture of what the firm really is – in terms of the businesses, people and processes that cannot be lost.

In all likelihood, this analysis has never been done before, and the pace of technical change probably means that figuring out the technology aspects will never have been done either. Does anyone know every single element in a particular business process? If not, then no security team will be able to secure it. And no-one in the business or anywhere else will have a decent handle on their operational risk either.

This is the real visibility organisations need – visibility down through business processes into the most granular dependencies (not all of which will be technical). Only with the minimum viable business mapped out to this level can cyber teams then create a risk-based security strategy as part of a broader ops risk strategy.

At that point, security is not about generically securing the network or securing applications or securing the Cloud; it’s not about EDR or IDAM or zero trust per se. It’s about asking how best to protect the core of the business. If trying to secure everything doesn’t work, then that core itself cannot be secured.

Admit that and then you only have two options: devote far more of your resources to true resilience, or, more controversially and problematically, pulling those critical processes out of the normal IT infrastructure that cannot be secured.

Defence companies do not do security like normal firms: they avoid Cloud, they airgap, they do not interact with third parties in the same way that most organisations do. We’ve spent years saying that the old perimeter is dead. Maybe it’s time to recreate it inside organisations to protect the core. And if not, then resilience and not security is the answer. The company with perfect resilience does not need security – it will still want it to avoid the costs of constant response but if the true operational risk aim is to keep the business running, rather than to mitigate some CVE or other, then surely security has to change?

So, is anyone really doing this outside those forced to by regulation? If not, do they understand the risk they are taking? How do they think about cybersecurity risk and how do they prioritise resources to mitigate it? Do CISOs understand the fundamental change that resilience brings?

 

The e-Crime & Cybersecurity Congress Germany will look at how security teams and the business must change their security model to put resilience and true risk management first.
Join our real-life case studies and in-depth technical sessions from the most sophisticated teams in the market.

  • Making the best use of threat intelligence

    • In a pre-emptive security model, timing is everything — success depends on detecting and neutralizing threats before they become active incidents.
    • To do this, security operations can't just rely on internal telemetry (e.g., endpoint or network logs).
    • They need external, real-time context about emerging threats — where do they get it?
  • Dealing with regulations

    • CISOs now must build a single coherent security program that simultaneously satisfies divergent regulatory demands.
    • They must interpret vague legal standards into technical architectures, and they risk non-compliance if auditors, regulators, or courts interpret those differently later.
    • They face unrealistic expectations around incident reporting and they face personal liability. Can RegTech help?
  • Security Posture Management

    • Traditional vulnerability scanners don’t handle cloud native architectures well.
    • Today’s cloud environments spin up thousands of ephemeral assets without a traditional OS, without an IP address for long.
    • So how do you adapt to that dynamic, API-driven reality? How can traditional tools connect the dots – not just generate tickets?
  • Improving continuous attack surface discovery

    • You need to know what attackers can see and what they can actually attack – and you need it on a continuous basis, not in some static inventory.
    • Ideally you also need assets ranked by risk priority and put into the current threat and vulnerability context.
    • Is this feasible and is it cost effective?
  • Defending against the latest ransomware variants

    • Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes
    • The threat and the actors are constantly evolving, and that evolution is forcing the hand of the government and causing havoc in the insurance market
    • What can CISOs do to better defend against ransomware?
  • The power of automation

    • There’s too much manual intervention in security. SOAR pulls data from SIEMs, EDRs, firewalls, cloud APIs, ticketing systems, threat intelligence feeds, and even email servers.
    • It also coordinates actions across tools via APIs and prebuilt integrations and intelligent playbooks.
    • Well, that’s the theory. How does it work in the real world?
  • Adversary simulation and behavioural analysis

    • Automated adversary simulation identifies telemetry blind spots.
    • They provide prioritized remediation guidance and control effectiveness metrics. They track progress trends and validate security ROIs as well as providing board and audit reporting.
    • How well do they work in practice?
  • Achieving visibility across ecosystems

    • From exposed initial access points such as warehouse management systems to complex machine control software, simply understanding your device and application landscape, its connection and data flows and dependencies is a huge challenge.
    • Can you help with asset tracking and endpoint visibility?
    • And what about anomaly detection after that?
  • Transitioning OT to the Cloud?

    • OT traditionally was localized in particular sites and air-gapped from IT systems.
    • But connectivity with broader corporate networks and the need to manage technology more centrally (especially during COVID) has seen companies looking at managed services in the Cloud for OT.
    • Is this a way forward?
  • Why zero trust, isolation and segmentation are key

    • There has been a shift in recent attacks away from the theft of data – now threat actors are concerned with interrupting all operation activity.
    • It is now critical that business functions are separated, and that internet access to OT networks is limited.
    • Can security teams keep up with sophisticated foes? 
  • OT and the regulations

    • DORA, NIS2 and other regulations put more responsibility for resilience on firms deemed important or critical.
    • Many have focused on IT networks but the regulations include all resilience and so OT environments matter. 
    • What does this new emphasis from regulators mean practically for OT security?
  • Pen testing for OT / SCADA

    • Testing is key to identifying and fixing vulnerabilities before they're exploited. 
    • Regulations like NERC CIP require utilities to assess and mitigate risk. 
    • Testing checks OT security controls are functioning properly and shows regulators an organization's commitment to security.Can you help?

Who attends

Job titles

Information Security
Information Technology Security Engineer
IT Security Officer
Head of Development
Rechtsanwalt, Partner
Seniorreferent Datenschutz
Senior IT Architect, Enterprise Architecture
Information Technology Security Engineer
Risikomanagement Information Risk
Cyber- und IT-Sicherheit, Verwaltungsdigitalisierung
IT Security Engineer
Manager, Information Security
Head of IT Risk
Senior IT Auditor
IT Business Continuity Manager
CISO
Manager IT Compliance
Director, Information Security Leader DACH
Lead IT Security Manager
CISO
Director Cyber Security
Head of Financial Crime
Manager IT
Information Security Expert
Risk & Compliance Manager (EMEA)
Chief Information Security Officer
Penetration tester / Red Teamer
Chief Cyber Risk Officer
DevOps Engineer
Informationssicherheitsbeauftragter (CISO)
IT Site Manager
ISO
Senior Intelligence Consultant in der Division Cyber- und Informationsraum
Security Engineer
Senior Architect
Head of Information & Data Governance
Sr.Cloud Network Security Engineer
Senior Analyst Information Security
Cyber Security Manager
Threat & Intel Specialist
Business Intelligence Engineer
Senior Manager Energy & Infrastructure Policy
Mitglied der Geschäftsleitung
Senior Information Security Analyst
Regional Chief Security Officer
IT Security Experte
IT Sicherheitsbeauftragter
Global CISO
Head of Compliance
Risk Manager (including IT-Bereich)
Security Analyst
Senior IT Security Manager
Information Security Officer
Information Security Officer
IT Security Analyst - Security Specialist
Chief Information Security Officer
IT Security Analyst
Senior Manager Operations Security - Information Security
IT-Security Specialist
Internal Audit IT & Information Security
CISO
Sr. Director Information Security
Gründerin & Unabhängige Advisor
Senior Cyber Security Specialist
Head of Information Risk Management
CISO
Specialist Threat Intelligence
Information Security Officer
Product Owner SIEM
Data & IT Compliance Officer
Senior Systems Engineer
Information Security Specialist
Senior Associate Manager
Enterprise Cybersecurity Architect
MDM Process Manager
Group CISO
Information Security Professional
VP Head of Information Security Management
Business Information Security Officer
Regional Information Security Officer - EMEA
Senior Manager Security Governance

Companies

Deutsche Börse
Deutsche Börse
Banco do Brasil SA
REA Card
Kristof + Becker
Deutsche Bahn Aktiengesellschaft
Vodafone
Daiichi Sankyo
Bethmann Bank AG
Hessisches Ministerium des Innern und für Sport
ING-DiBa
BCD Travel
Commerzbank
KfW Bankengruppe
Miles & More GmbH
Douglas Holding
Commerz Real
Procter & Gamble
VTB Bank (Europe) SE
ARLANXEO
Börse Stuttgart
SEB - Skandinaviska Enskilda Banken
Deutsche Börse
Deutsche Bank Group
BCD Travel
Chintai
Airbus Defence and Space
Riskpoint Group
Deutsche Telekom
Nomura Bank
Paccar
SECB Swiss Euro Clearing Bank GmbH
ESG Elektroniksystem- und Logistik-GmbH
ING
Clark
Hyundai
3M
Fidelity International
Union Investment
Commerzbank
Baloise Group
Energie Baden-Württemberg AG
Bank11 für Privatkunden und Handel GmbH
Fidelity International
MasterCard
Börse Stuttgart
Bundesrepublik Deutschland Finanzagentur GmbH
Brenntag GmbH
Flaschenpost SE
Banco do Brasil SA
Commerzbank
CMS
Fidelity Investments
Morgan Stanley
Commerzbank
SCHUFA Holding AG
Deutsche Börse
BCD Travel
B&B Hotels
Helaba (Landesbank Hessen Thuringen)
E3 WORLD
BCD Travel
E-Mobility Sharing Economy Services
Wayfair
ING
Eurex Frankfurt AG
COLT Technology Services
Citigroup
Commerzbank
Standard Chartered Bank
Emma – The Sleep Company
Stellantis
Deutsche Börse
E.ON
Boehringer Ingelheim GmbH
Klöckner & Co SE
Tipico
E.ON
Deutsche Bank Group
Evonik
GLS Germany GmbH & Co. OHG

Industries

Banking
Banking
Banking
Hardware
Legal
Transportation/Shipping
Telecommunications
Pharmaceuticals
Banking
Regional Government
Banking
Travel/Leisure/Hospitality
Banking
Banking
Travel/Leisure/Hospitality
Retail
Banking
Manufacturer
Banking
Commercial Chemicals
Banking
Banking
Banking
Banking
Travel/Leisure/Hospitality
Consultancy
Manufacturer
Insurance
Telecommunications
Banking
Industrial Engineering
Banking
Electronic/Electrical Equipment
Banking
Insurance
Automobiles/Parts
Manufacturer
Banking
Banking
Banking
Insurance
Oil/Gas
Banking
Banking
Banking
Banking
Banking
Pharmaceuticals
Food/Beverage/Tobacco
Banking
Banking
Legal
Banking
Banking
Banking
Banking
Banking
Travel/Leisure/Hospitality
Travel/Leisure/Hospitality
Banking
Consultancy
Travel/Leisure/Hospitality
Other Industry
Hardware
Banking
Banking
Telecommunications
Banking
Banking
Banking
Household/Personal Products
Automobiles/Parts
Banking
Electricity
Pharmaceuticals
Manufacturer
Casinos/Gaming
Electricity
Banking
Commercial Chemicals
Transportation/Shipping


Venue

Crowne Plaza Frankfurt Congress Hotel

Crowne Plaza Frankfurt

Location:

Crowne Plaza Frankfurt Congress Hotel

Lyoner Str. 44 -48

60528 Frankfurt am Main

Germany

 

Directions:

Please click here

 

Telephone:

+496966330