Agenda

08:30 - 09:20

Registration & Breakfast Networking

09:20 - 09:30

Chair's Welcome

09:30 - 09:50

►United in the Fight Against Global Cybercrime

Chris Robbins, Assistant Legal Attaché, LEGAT Berlin/Frankfurt Sub-office, Federal Bureau of Investigation

  • How do the FBI  collaborate with German authorities to dismantle international cybercrime networks?
  • Insights into joint operations that target cybercriminal groups and disrupt their infrastructure.
  • The role of cryptocurrency tracing in cutting off cybercriminal funding across borders.
  • Strategies for public-private partnerships that enhance cybersecurity resilience in both nations.
09:50 - 10:10

► Backup!: Cyber Recovery

Filip Verloy, Field CTO EMEA & APJ, Rubrik

  • Analysts predict that in 10 years, we will experience a successful ransomware attack approximately every 2 seconds.
  • 96% of IT and security managers worldwide fear that their organisation will not be able to maintain business continuity after a cyber attack, according to the new study ‘The State of Data Security by Rubrik Zero Labs: The Hard Truths’.
  • Attendees will learn how to increase their cyber resilience.
10:10 - 10:30

►The Cybersecurity Crystal Ball: Proactive Threat Detection with Internet Intelligence from Censys

Harald Roeder, Senior Solutions Engineer, Censys 
Tabatha von Koelichen, Regional Sales Director for DACH and Central Europe, Censys

  • The State of Cybersecurity in 2024: Emerging threats and the expanding attack surface.
  • Why Visibility Matters: Uncovering hidden risks with comprehensive internet asset discovery.
  • Real-Time Threat Detection: Leveraging global internet scanning to identify vulnerabilities before attackers do.
  • Actionable Insights: How to integrate Censys into your security stack for maximum impact.
     
10:30 - 10:50

►Redefining Security Strategy under EU AI Act: Prioritizing Human Factors in AI Integration

Meri Roboci, AI Security Strategist, DWS Group

  • Adapting Security Strategies to EU AI Act – Understand practical steps to align security practices with the EU AI Act’s standards.
  • Building Trust in AI Tools through Human-Centric Design – Learn how to address biases, ethical issues, and build trust in AI systems for effective security operations. 
  • Incorporating Human Oversight in AI Risk Management – Discover methods to improve AI risk assessment and response with human input.
10:50 - 11:20

Networking Break

11:20 - 11:40

►Navigating Supply Chain Cyber Risks: The Impact of Regulations and Geopolitical Tension

Chuks Ojeme, Global Chief Information Security Officer, Brenntag

  • Mastering compliance challenges amid geopolitical tensions and escalating cyber threats.
  • Proactively mitigating advanced, volatile, and persistent threats to ensure seamless business continuity.
  • Developing cost-efficient strategies to overcome global supply chain upheavals in 2025 and beyond.
11:40 - 12:00

►Cybersecurity in the spotlight or the headlights?

Simon Brady, Event Chairman & Managing Editor, AKJ Associates Ltd

  • What does high profile mean for CISOs and other security staff
  • Why regulation is a double-edged sword
  • The problem of transparency
  • The transition to true risk management – shake out and shake down
     
12:00 - 12:20

►Securing the Modern Enterprise: The Power of Adaptive MXDR

Christopher Schrauf, SIEM & Cybersecurity Architekt, Cyberproof 
Pietro Verzi, Partner Engineering, Global Security, Google Germany GmbH

  • The modern enterprise faces an ever-evolving threat landscape, characterized by sophisticated cyberattacks and rapid technological advancements. This presentation will explore how organizations can build capabilities that adapt to changing landscape and new cyber threats, using Adaptive MXDR.  
  • Discussion points: 
    • The importance of a cloud native and modern SecOps platform 
    • The need for threat intelligence to track cyber criminals activities 
    • Increasing alert fidelity to enhance operational efficiency 
    • Defining the outcomes that matters to drive continuous improvement.
12:20 - 13:00

►Education Seminars

Delegates will be able to choose from the following education seminars:

  • Email Security Today: The Role of DMARC, Antony Seedhouse, Customer Engineer, Red Sift
  • Why Do Employees Steal Data from Their Own Company? – Hunting Insiders with Varonis, Florian Raack, Sales Engineer, Varonis
13:00 - 14:00

Lunch & Networking Break

14:00 - 14:20

►Enhancing Web Security Without Breaking the Bank

Ashar Javed, Head of Security Technology – Security Technology Section, Hyundai AutoEver Europe GmbH

  • AI-Powered Custom WAF Solutions
  • Undercovering Strategies for Finding Needles in the Haystack of
  • Daily Web Traffic
  • Maximizing Your Existing Security Stack Within Budget
  • Raising the Bar: Making Attackers Think Twice
14:20 - 14:40

►8 things your NG SIEM must do 

Christian Schramm, Enterprise Sales Engineer, CrowdStrike

  • Many traditional SIEM and logging tools [crowdstrike.com] were developed more than a decade ago and can no longer adequately handle today's data volumes. With the volume of log data growing faster than IT budgets, SecOps teams need a solution that can keep pace with the demands for speed, scalability and efficiency to support the growing volumes of data. Modern log management can deliver high performance and sub-second latency at low cost.
  • Learn from Christian Schramm, Sales Engineer at CrowdStrike:
    • The typical drawbacks and blind spots of legacy SIEM systems
    • How changing security requirements have turned the SIEM market on its head
    • Eight key features to look for when evaluating your next SIEM system

       
14:40 - 15:00

►The Human Factor - The Importance of Cyber Security and You 

Javvad Malik, Lead Security Awareness Advocate, KnowBe4 

15:00 - 15:30

Networking Break

15:30 - 15:50

►Leveraging DORA TLPT (Threat-Led Penetration Testing) to enhance Cyber Resilience

Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England

  • How DORA TLPT aligns seamlessly with TIBER-EU, CBEST & DORA to enhance cyber risk management.
  • Discover the benefits of an EU-standard approach to threat-led testing.
  • See how DORA TLPT boosts readiness for live system testing.
  • Learn how to start using DORA TLPT for ongoing cyber resilience and regulatory compliance

 

15:50 - 16:30

►Resourcing priorities in Third-Party Risk Management and Supply Chain Security 

Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator) 
Sneha Parmar, ISO, Lufthansa Group Digital Hangar
Chuks Ojeme, Global Chief Information Security & Compliance Officer, Brenntag 
Julian Dube, Information Security Officer, E.ON Digital Technology 
Kashif Husain, Information Security Officer, Nomura Continental Europe

  • Identifying, risk assessing and screening critical vendors – a job for who?
  • Defining contractual obligation: how do you enforce your security requirements, standards and data handling practices?
  • Approaches to continuous vendor monitoring: dealing with problem third-parties
  • Incident Response Planning and managing third-party breaches
  • What about security vendors?
16:30 - 16:35

Chairs Closing Remarks 

Education seminars


Why Do Employees Steal Data from Their Own Company? – Hunting Insiders with Varonis


Florian Raack, Sales Engineer, Varonis

In our modern IT world, we are constantly focused on preventing external threats. However, we often overlook one of the biggest threats: insiders within our own ranks. Corporate espionage, high employee turnover, and corruption are just a few reasons why individuals might steal data from their own companies.
Moreover, it only takes a single compromised identity for an attacker to transition from an outsider to an insider. These acts often go unnoticed because they occur under the guise of legitimate authorization. Additionally, employees typically have access to far more data than they need to perform their jobs. Generative AI adds another layer of complexity to this issue.

Attendees will learn:

  • How the Varonis Data Security Posture Management Platform can help you tackle this problem and effectively protect your data in a hybrid world.
  • Remember, a data breach can never be undone.

Email Security Today: The Role of DMARC


Antony Seedhouse, Customer Engineer, Red Sift

  • Understanding the Risk: Explore the increasing prevalence of email spoofing and phishing attacks and their impact on businesses that lack robust domain protection.
  • Why DMARC Matters: Gain insights into how DMARC works to prevent email impersonation and safeguard your organization’s email ecosystem.
  • DMARC Trends and Challenges: Understand common challenges and what the data reveals about organizational progress in securing domains.
  • Streamlining with a Managed OnDMARC Provider: Learn how using a managed DMARC provider such as Red Sift’s OnDMARC makes implementation and management straightforward, helping organizations achieve enforcement and stay secure without added complexity.
  • OnDMARC in Action: Hear how businesses have strengthened email security and protected their brands with OnDMARC.