Agenda
08:00 - 08:50 |
Registration and Networking Break |
08:50 - 09:00 |
Chairman’s welcome |
09:00 - 09:20 |
► Fighting cybercrime is teamwork! – Co-operating with the police in cyber attacks on companies Dominik Mauer, Analyst & Cooperation Manager, Federal Criminal Police Office/Bundeskriminalamt, Cybercrime Division
|
09:20 - 09:40 |
► Why 24 is the answer to all questions in the cyber security environment! Thomas Schuchmann, Senior Director Sales Engineering Germany, Rubrik & Stefan Schmugge, Director Sales Engineering, Rubrik
|
09:40 - 10:00 |
► Looking Back at the Threat Landscape in 2023 (And What to Expect for 2024) Paolo Passeri, Principal Sales Engineer and Cyber Intelligence Specialist, Netskope This session will provide an overview of the main security trends observed in 2023, providing some indications on what to expect for 2024.
|
10:00 - 10:20 |
► Threatcasting: disrupt the threat and enable the future Sonia Neffati, Regional Chief Security Officer, Europe, Mastercard
|
10:20 - 11:00 |
► Education Seminar Session 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
10:05 - 10:20 |
► The Utopia of European Cybersecurity Certification – Automation of Compliance Dr. Jesus Luna Garcia, Cybersecurity Governance – Cloud and AI, Robert Bosch GmbH
|
11:50 - 12:10 |
► The Cyber Threat Landscape Germany Marvin Schneider, Customer development, Cloudflare
|
12:10 - 12:30 |
► NIS 2.0 - Burden or Opportunity? Roland Stritt, SentinelOne
|
12:30 - 12:50 |
► Email Authentication: Are You Ready for Stringent Email Acceptance Rules at Google and Yahoo? Giovanni Pascale, Proofpoint To help address the high number of fraudulent emails hitting their users accounts, Google and Yahoo announced new email authentication requirements that could impact your company’s deliverability. The new requirements will be enforced as early as 1st February 2024. Join our session to hear from our subject matter expert Giovanni Pascale on key aspects of the new requirements, such as SPF, DKIM, DMARC, and DMARC alignment. We will discuss:
|
12:50 - 13:30 |
► Education Seminar Session 2 Delegates will be able to choose from the following education seminars:
|
13:30 - 14:30 |
Lunch and Networking Break |
14:30 - 14:50 |
► The role of CISO in the evolving new frontiers of cybersecurity regulations Chuks Ojeme, Global Chief Information Security & Compliance Officer, Brenntag
|
14:50 - 15:10 |
► It’s all about readiness! Why you may have been doing cyber training wrong! Rupert Collier, VP Global Sales, RangeForce Rupert will provide some insights into the following:
|
15:10 - 15:30 |
► The challenges of NIS2: Just compliant or also secured? Nikolei Steinhage, Enterprise Sales Engineer DACH, CrowdStrike NIS2 stellt viele Unternehmen vor enorme Herausforderungen. Statt NIS2 einfach nur als eine Compliance-Anforderung zu betrachten, wollen wir zwei Fragen in den Mittelpunkt stellen:
|
15:30 - 16:10 |
► Education Seminar Session 3 Delegates will be able to choose from the following education seminars:
|
16:10 - 16:30 |
Networking Break |
16:30 - 16:50 |
► Why CISOs should care about resilience Dr. Timo Wandhöfer, Group CISO, Klöckner & Co
|
16:50 - 17:30 |
► CISO Panel Discussion Chuks Ojeme, Global Chief Information Security & Compliance Officer, Brenntag (Moderator);
|
17:30 |
Conference Close |
Education seminars
Browser security – the proven prevention layer for enterprise cybersecurity
Tom McVey, Solution Architect, Menlo Security
According to Google, 98% of attacks originate from internet usage and 80% of those target end user browsers – sadly all too successfully. Combine this stark reality, with users’ relentless demand for new SaaS and private applications, often collaborating with external stakeholders, and security pros are always running to stand still.
Join us for a practical session where we will cover:
- Security – The proven value of robust browser security across managed and unmanaged devices – automating browser configuration and establishing enhanced browser forensics
- Connectivity – Your users and third parties need access to SaaS applications, private web apps and data, including the use of GenAI. We share how organisations are enhancing user protection and productivity while reducing the cost and complexity of solutions such as VDI
- Compliance – How browser security supports organisations striving to comply with key NIS 2 requirements for incident management and prevention
We will provide real world examples of how to increase cyber prevention through improved browser security including a case study of a major German car manufacturer.
Network Traffic Visibility & Zero Trust Security in Kubernetes Environments
Bettina Bassermann, Business Strategist, Pre-Sales DACH, SUSE Software Solutions Germany GmbH
Deep network visibility is the most important part of container security at runtime.
With traditional perimeter-based security, administrators use firewalls to isolate or block attacks before they reach the workload. Inspecting container network traffic reveals how an application communicates with other applications and is the only way to stop attacks before they reach the application or workload. NeuVector is the only 100% open source security platform for containers with continuous auditing throughout the lifecycle.
- Supply chain Security
- Vulnerability and Compliance Management
- Zero Day Attack Prevention
- Perform Deep Packet Inspection (DPI)
- Monitor east-west and north-south container traffic
Insights into the dark web: cybercrime forums, markets and threats to watch out for
Bernd Knippers, Senior Sales Engineer DACH , Recorded Future
The dark web is a hidden area of the World Wide Web and operates through specialized software that allows users and websites to remain anonymous. In this presentation, we will discuss the nature of the dark web and the potential threats it poses, as well as appropriate detection and defence strategies through applied threat intelligence.
Ransomware Revealed: The Changing Landscape of Ransomware and Data Exploitation
Christian Buhrow, Regional Sales Director, SpyCloud
- Trends in the shifting ransomware landscape, including frequency of attacks, costs to organizations, and emerging new threats to be aware of
- The riskiest entry points, as well as the connection between specific infostealer malware infections and the probability that a company will subsequently experience a ransomware event
- Gaps in remediation that are contributing to a proliferation of entry points for follow-on ransomware attacks
- A live demonstration on how to turn recaptured darknet data into your greatest defense against ransomware, next gen account takeover & online fraud
The anatomy of online fraud: How AI is changing the battlefield in favor of the attacker and what we can do about it
Julian Wulff, Director, Cyber Security Central Europe, Red Sift
There are a few key components in the making of online fraud. Some of these elements are becoming an order of magnitude faster to execute for attackers thanks to Generative AI. But not everything about this new technology is a gift to attackers, and there are some common-sense things that organizations can do to defend themselves more effectively
- What makes a very effective online fraud
- How is Generative AI accelerating and making fraud easier to carry out effectively
- What actions can we take to counteract this? How can defenders use Generative AI themselves?
Fraud prevention, AML, and KYC with Mobile Intelligence
Gerhard Sahner, Business Development Mobile Intelligence, JT Global
The use of real-time mobile intelligence data for customer authentication based on verified subscriber data from mobile network operators enables a higher level of security, especially in the fields of finance and e-business. These mobile data are already being used to establish robust cybersecurity measures, combat cybercrime, and reduce risks associated with mobile fraud. Additionally, they provide the ability to verify SIM integrity, identify high-risk transactions, and conduct age verification. Furthermore, they contribute to assessing the creditworthiness of customers for Buy Now, Pay Later (BNPL) and credit services. Gerhard Sahner's (Jersey Telecom) presentation offers an interesting overview of the various possibilities of this innovative technology."