Agenda
Presentations already confirmed include:
►How to define and manage ICT risk in line with regulatory requirements (such as DORA and MiCA)
Dr. Gulnara Hein, CISO, Chintai
- Building visibility by combining top-down business and bottom-up technology perspectives to map processes, systems, information assets and third parties
- Distinguishing real risks from control gaps, and why thismatters for prioritisation, reporting and decision-making
- Do current risk structures underestimate the role of ICT controls in mitigating broader operational risks such as process failure, human error, and third-party disruption?
►Building Cyber Resilience and Managing Risk Across Critical Industries
Sachin Gaur, Cybersecurity Manager, Continental (Moderator)
Steffen Zimmermann, Head of Industrial Security, VDMA
- How should boards and executive teams manage cyber risk as an enterprise-wide issue rather than a technical one?
- With IT and OT convergence happening in industries from energy to transportation to manufacturing, what are the key challenges in securing both business systems and operational environments?
- How can organisations strengthen resilience against third-party and supply chain risks in today’s globally interconnected economy?
- As digital transformation accelerates through technologies like AI, IoT, and automation, how can leaders balance innovation with effective cyber risk oversight?
- Looking ahead, what governance models, cross-industry collaborations, and cultural shifts will be most essential to strengthening resilience across critical national infrastructure?
►Ransomware 3.0: Weaponizing AI for the Next Generation of Ransomware Attacks
Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
- LIVE DEMO - Inside the first AI-powered ransomware attack — See how my custom Agentic Ransomware Gang can take down a network in under 8 minutes
- Firsthand insights from real-world red team ops — from legacy tech and broken access controls to the critical lack of real-world security testing
- Why traditional security fails — compliance checklists and conventional tools don’t stop modern ransomware
- What CISOs and security leaders must do now — real-world, field-tested steps to prove your controls work before attackers do it for you
