Agenda
Presentations already confirmed include:
►Navigating the Shifting Tides: Preparing for NIS2 and Raising Awareness
Benjamin Bachmann, Group CISO, Bilfinger Group
- Understanding NIS2: What it means for organizations and the key compliance steps.
- Awareness is Not Enough: Why a proactive and engaged cybersecurity culture is essential in today's threat landscape.
- From Knowledge to Action: How tailored awareness training can move the needle on organizational readiness
►LIVE DEMONSTRATION: Weaponising AI: Voice Phishing with AI (Social Engineering 2.0)
Manit Sahib, Ethical Hacker, The Global Fund
- Overview: How AI is being weaponised in the wild for malicious activities.
- Use-Cases: How to weaponise AI for your own Offensive Operations.
- Weaponising AI for Cyber Attacks: AI Vishing (AI Voice Phishing):
- Exploring the new Social Engineering 2.0 technique, AI generated calling Agent (AVA) for Vishing. Trained with Rejection handling.
- Live Demonstration: AI Vishing in action. Volunteers? Be ready to come on stage.
►Enhancing Web Security Without Breaking the Bank
Ashar Javed, Head of Security Technology – Security Technology Section, Hyundai AutoEver Europe GmbH
- AI-Powered Custom WAF Solutions
- Undercovering Strategies for Finding Needles in the Haystack of
- Daily Web Traffic
- Maximizing Your Existing Security Stack Within Budget
- Raising the Bar: Making Attackers Think Twice
►United in the Fight Against Global Cybercrime
Chris Robbins, Assistant Legal Attaché, LEGAT Berlin/Frankfurt Sub-office, Federal Bureau of Investigation
- How do the FBI collaborate with German authorities to dismantle international cybercrime networks?
- Insights into joint operations that target cybercriminal groups and disrupt their infrastructure.
- The role of cryptocurrency tracing in cutting off cybercriminal funding across borders.
- Strategies for public-private partnerships that enhance cybersecurity resilience in both nations.
►Resourcing priorities in Third-Party Risk Management and Supply Chain Security
Sneha Parmar, ISO, Lufthansa Group Digital Hangar
Chuks Ojeme, Global Chief Information Security & Compliance Officer, Brenntag
• Identifying, risk assessing and screening critical vendors – a job for who?
• Defining contractual obligation: how do you enforce your security requirements, standards and data handling practices?
• Approaches to continuous vendor monitoring: dealing with problem third-parties
• Incident Response Planning and managing third-party breaches
• What about security vendors?
►Redefining Security Strategy under EU AI Act: Prioritizing Human Factors in AI Integration
Meri Roboci, AI Security Strategist, DWS Group
- Adapting Security Strategies to EU AI Act – Understand practical steps to align security practices with the EU AI Act’s standards.
- Building Trust in AI Tools through Human-Centric Design – Learn how to address biases, ethical issues, and build trust in AI systems for effective security operations.
- Incorporating Human Oversight in AI Risk Management – Discover methods to improve AI risk assessment and response with human input.