Agenda

Presentations already confirmed include:


►Navigating the Shifting Tides: Preparing for NIS2 and Raising Awareness

Benjamin Bachmann, Group CISO, Bilfinger Group

  • Understanding NIS2: What it means for organizations and the key compliance steps.
  • Awareness is Not Enough: Why a proactive and engaged cybersecurity culture is essential in today's threat landscape.
  • From Knowledge to Action: How tailored awareness training can move the needle on organizational readiness
     

►LIVE DEMONSTRATION: Weaponising AI: Voice Phishing with AI (Social Engineering 2.0)

Manit Sahib, Ethical Hacker, The Global Fund

  • Overview: How AI is being weaponised in the wild for malicious activities.
  • Use-Cases: How to weaponise AI for your own Offensive Operations.
  • Weaponising AI for Cyber Attacks: AI Vishing (AI Voice Phishing):
  • Exploring the new Social Engineering 2.0 technique, AI generated calling Agent (AVA) for Vishing. Trained with Rejection handling.
  • Live Demonstration: AI Vishing in action. Volunteers? Be ready to come on stage.
     

►Enhancing Web Security Without Breaking the Bank

Ashar Javed, Head of Security Technology – Security Technology Section, Hyundai AutoEver Europe GmbH

  • AI-Powered Custom WAF Solutions
  • Undercovering Strategies for Finding Needles in the Haystack of
  • Daily Web Traffic
  • Maximizing Your Existing Security Stack Within Budget
  • Raising the Bar: Making Attackers Think Twice

►United in the Fight Against Global Cybercrime

Chris Robbins, Assistant Legal Attaché, LEGAT Berlin/Frankfurt Sub-office, Federal Bureau of Investigation

  • How do the FBI  collaborate with German authorities to dismantle international cybercrime networks?
  • Insights into joint operations that target cybercriminal groups and disrupt their infrastructure.
  • The role of cryptocurrency tracing in cutting off cybercriminal funding across borders.
  • Strategies for public-private partnerships that enhance cybersecurity resilience in both nations.

►Resourcing priorities in Third-Party Risk Management and Supply Chain Security 

Sneha Parmar, ISO, Lufthansa Group Digital Hangar
Chuks Ojeme, Global Chief Information Security & Compliance Officer, Brenntag

•    Identifying, risk assessing and screening critical vendors – a job for who?
•    Defining contractual obligation: how do you enforce your security requirements, standards and data handling practices?
•    Approaches to continuous vendor monitoring: dealing with problem third-parties
•    Incident Response Planning and managing third-party breaches
•    What about security vendors?


►Redefining Security Strategy under EU AI Act: Prioritizing Human Factors in AI Integration

Meri Roboci, AI Security Strategist, DWS Group

  • Adapting Security Strategies to EU AI Act – Understand practical steps to align security practices with the EU AI Act’s standards.
  • Building Trust in AI Tools through Human-Centric Design – Learn how to address biases, ethical issues, and build trust in AI systems for effective security operations. 
  • Incorporating Human Oversight in AI Risk Management – Discover methods to improve AI risk assessment and response with human input.

Education seminars