23rd e-Crime & Cybersecurity Congress Germany

Building a better value security stack

16th January 2025 • Steigenberger Frankfurter Hof, Frankfurt

In a cost-constrained environment, what tech is must-have, nice-to-have, and best value for money?

 

Deliver value-for-money security and resilience, de-couple from the IT budget

At the end of August, a report based on the responses of more than 1,000 German companies revealed that in the past 12 months cybercrime and other acts of sabotage have cost German companies around 267 billion euros ($298 billion) up 29% on the year before.

The report also found that 90% expect more cyberattacks in the next 12 months, and 81% of companies reported data theft, including customer data, access data and passwords, as well as intellectual property such as patents.

These are all good tactical reasons to keep spending on cybersecurity. And in Germany, at least the proportion of the IT budget devoted to security is increasing, from 14% last year to 17%.

But there are key strategic reasons to invest in security too. Companies now depend on digital systems for everything from frontline revenue generation to product delivery and the running of their physical infrastructure. Not to mention unglamourous but critical systems such as payroll.

Plus, as indices like the Euronext Cybersecurity World GR show, perceived strength in cybersecurity translates into increased enterprise value.

Over the last year, that index has outperformed the Euro STOXX 50, the MSCI World and the Dow Jones Industrial indices.

So, one key challenge for CISOs is to communicate this link between business and security better – and to try to escape today’s coupling with the IT budget, which rises and falls with the P&L. The sad truth is that there is still a credibility gap between CISOs and the Board.

The other challenge is to build more efficient security stacks. CISOs must be able to define security priorities and demonstrate that current spend delivers these without duplication and under-utilization in their security technology.

They must also look at removing complexity – and so the likelihood of human error – from bloated and overlapping stacks. If core hygiene and human error cause most breaches, then do you need multiple best-of-breed point solutions, or a simpler, but better utilised all-rounder?

Come to the e-Crime & Cybersecurity Congress Germany to find out how your fellow cybersecurity professionals are dealing with these issues now.

 

The e-Crime & Cybersecurity Congress Germany will look at how security teams must extract more value from their tech stacks and communicate better with the business.

Join our real-life case studies and in-depth technical sessions from the most sophisticated teams in the market.

  • Making the most of AI and ML

    • If the practical realities of business make conventional zero trust ideas impractical for most organisations, then what else?
    • Some say that AI and behavioural analysis are better suited to a world where perfect data and visibility are unavailable.
    • But are they right? And don’t these solutions only pick up problems after they have occurred?
  • Building a next gen security architecture

    • How do you efficiently manage multiple vendors, tightly integrate security controls and bridge the gap between network and security teams?
    • One answer is to reengineer your security architecture
    • So, what do efficiency-oriented security architects think is the best paradigm?
  • What do regulators really want?

    • It’s always easier to get budget for things that are compulsory, and cybersecurity / resilience regulation is introducing more and more mandatory requirements.
    • But how do those requirements translate into people, process and technology?
    • And does resourcing only for the regulatory minimum leave organisations vulnerable?
  • Cybersecurity as a service: the pros and cons

    • MSSP, MDR, CSaaS – all of these offer varying degrees of outsourced cybersecurity services
    • So when does it make sense to outsource?
    • And what outsourcing arrangements make sense for which firms?
  • Developing the next generation of security leaders

    • If cybersecurity is to change to meet the evolution of our digital world, then so must those who implement it.
    • CISOs cannot cling to an IT paradigm and companies must move away from hiring on false pretences (on budget and commitment) and firing at the first breach.
    • What does a next-gen CISO look like and are you one of them?
  • Cybersecurity for SaaS/IaaS/PaaS

    • Most companies’ core reliance is now upon a small number of monolithic application suites and Cloud services
    • In addition, they are likely to be developing their own software in the Cloud
    • These and other changes fundamentally alter the IT landscape in which cybersecurity operates
    • So do CISOs need a new model for cybersecurity and are legacy solutions still valid?

Who attends

Job titles

Information Security
Information Technology Security Engineer
IT Security Officer
Head of Development
Rechtsanwalt, Partner
Seniorreferent Datenschutz
Senior IT Architect, Enterprise Architecture
Information Technology Security Engineer
Risikomanagement Information Risk
Cyber- und IT-Sicherheit, Verwaltungsdigitalisierung
IT Security Engineer
Manager, Information Security
Head of IT Risk
Senior IT Auditor
IT Business Continuity Manager
CISO
Manager IT Compliance
Director, Information Security Leader DACH
Lead IT Security Manager
CISO
Director Cyber Security
Head of Financial Crime
Manager IT
Information Security Expert
Risk & Compliance Manager (EMEA)
Chief Information Security Officer
Penetration tester / Red Teamer
Chief Cyber Risk Officer
DevOps Engineer
Informationssicherheitsbeauftragter (CISO)
IT Site Manager
ISO
Senior Intelligence Consultant in der Division Cyber- und Informationsraum
Security Engineer
Senior Architect
Head of Information & Data Governance
Sr.Cloud Network Security Engineer
Senior Analyst Information Security
Cyber Security Manager
Threat & Intel Specialist
Business Intelligence Engineer
Senior Manager Energy & Infrastructure Policy
Mitglied der Geschäftsleitung
Senior Information Security Analyst
Regional Chief Security Officer
IT Security Experte
IT Sicherheitsbeauftragter
Global CISO
Head of Compliance
Risk Manager (including IT-Bereich)
Security Analyst
Senior IT Security Manager
Information Security Officer
Information Security Officer
IT Security Analyst - Security Specialist
Chief Information Security Officer
IT Security Analyst
Senior Manager Operations Security - Information Security
IT-Security Specialist
Internal Audit IT & Information Security
CISO
Sr. Director Information Security
Gründerin & Unabhängige Advisor
Senior Cyber Security Specialist
Head of Information Risk Management
CISO
Specialist Threat Intelligence
Information Security Officer
Product Owner SIEM
Data & IT Compliance Officer
Senior Systems Engineer
Information Security Specialist
Senior Associate Manager
Enterprise Cybersecurity Architect
MDM Process Manager
Group CISO
Information Security Professional
VP Head of Information Security Management
Business Information Security Officer
Regional Information Security Officer - EMEA
Senior Manager Security Governance

Companies

Deutsche Börse
Deutsche Börse
Banco do Brasil SA
REA Card
Kristof + Becker
Deutsche Bahn Aktiengesellschaft
Vodafone
Daiichi Sankyo
Bethmann Bank AG
Hessisches Ministerium des Innern und für Sport
ING-DiBa
BCD Travel
Commerzbank
KfW Bankengruppe
Miles & More GmbH
Douglas Holding
Commerz Real
Procter & Gamble
VTB Bank (Europe) SE
ARLANXEO
Börse Stuttgart
SEB - Skandinaviska Enskilda Banken
Deutsche Börse
Deutsche Bank Group
BCD Travel
Chintai
Airbus Defence and Space
Riskpoint Group
Deutsche Telekom
Nomura Bank
Paccar
SECB Swiss Euro Clearing Bank GmbH
ESG Elektroniksystem- und Logistik-GmbH
ING
Clark
Hyundai
3M
Fidelity International
Union Investment
Commerzbank
Baloise Group
Energie Baden-Württemberg AG
Bank11 für Privatkunden und Handel GmbH
Fidelity International
MasterCard
Börse Stuttgart
Bundesrepublik Deutschland Finanzagentur GmbH
Brenntag GmbH
Flaschenpost SE
Banco do Brasil SA
Commerzbank
CMS
Fidelity Investments
Morgan Stanley
Commerzbank
SCHUFA Holding AG
Deutsche Börse
BCD Travel
B&B Hotels
Helaba (Landesbank Hessen Thuringen)
E3 WORLD
BCD Travel
E-Mobility Sharing Economy Services
Wayfair
ING
Eurex Frankfurt AG
COLT Technology Services
Citigroup
Commerzbank
Standard Chartered Bank
Emma – The Sleep Company
Stellantis
Deutsche Börse
E.ON
Boehringer Ingelheim GmbH
Klöckner & Co SE
Tipico
E.ON
Deutsche Bank Group
Evonik
GLS Germany GmbH & Co. OHG

Industries

Banking
Banking
Banking
Hardware
Legal
Transportation/Shipping
Telecommunications
Pharmaceuticals
Banking
Regional Government
Banking
Travel/Leisure/Hospitality
Banking
Banking
Travel/Leisure/Hospitality
Retail
Banking
Manufacturer
Banking
Commercial Chemicals
Banking
Banking
Banking
Banking
Travel/Leisure/Hospitality
Consultancy
Manufacturer
Insurance
Telecommunications
Banking
Industrial Engineering
Banking
Electronic/Electrical Equipment
Banking
Insurance
Automobiles/Parts
Manufacturer
Banking
Banking
Banking
Insurance
Oil/Gas
Banking
Banking
Banking
Banking
Banking
Pharmaceuticals
Food/Beverage/Tobacco
Banking
Banking
Legal
Banking
Banking
Banking
Banking
Banking
Travel/Leisure/Hospitality
Travel/Leisure/Hospitality
Banking
Consultancy
Travel/Leisure/Hospitality
Other Industry
Hardware
Banking
Banking
Telecommunications
Banking
Banking
Banking
Household/Personal Products
Automobiles/Parts
Banking
Electricity
Pharmaceuticals
Manufacturer
Casinos/Gaming
Electricity
Banking
Commercial Chemicals
Transportation/Shipping


Venue

Steigenberger Frankfurter Hof, Frankfurt

g

Location: 

Steigenberger Frankfurter Hof

Am Kaiserplatz 
(GPS input: Bethmannstraße 33)
60311 Frankfurt am Main
Germany

Telephone: +49 69 215-02

Directions: 

Please click here