27th e-Crime & Cybersecurity Congress Germany

From cybersecurity to national security

18th June 2026 • The Westin Grand Munich

A race against time: Getting in front of the Al security problem — as much as it may seem like hype, Al adoption by business and the bad guys is a reality, and securing it is the biggest CISO challenge yet.

 

Securing Al in the business, understanding Al as a threat vector, unwrapping Al in security tooling

The Bundesverband Digitale Wirtschaft {BVDW), Germany's digital economy association, recently released a detailed framework addressing ethical implementation of Al agent systems as the technology approaches mainstream adoption across marketing and business operations. The 25-page whitepaper arrives amid stark public resistance to autonomous Al, with BVDW-commissioned surveys revealing only 25% of Germans express willingness to delegate tasks to Al agents. 

Businesses are taking a different view. According to a recent survey of 2,250 IT and cyber decision makers across 21 countries, 81% of global businesses are already using Al-driven tools as part of their cybersecurity strategy. This figure is even higher in the UK: 86% of businesses have incorporated Al. 

The survey underscores that Al and automation are considered top priorities for improving cybersecurity over the next 12 months by 42% of organisations surveyed. 

Companies see Al as a critical tool for staying ahead of threats and managing increasingly complex digital environments. However, 94% of global businesses believe that Al will negatively affect their cyber risk exposure within the next three to five years. In the UK, 66% of businesses surveyed are concerned that Al-driven attacks will increase significantly in both complexity and scale during this period. 

Every sector is affected. Some, like retail innovate so fast to keep up with customers that they already have agentic and other Al across everything from inventory management to their e­commerce offerings. Others are moving more slowly. But as Boards demand the productivity and efficiency gains being promised by Al providers, pushing back against widespread Al deployment is difficult. Accenture has just announced that promotions will be linked to the frequency with which staff login to and use Al tools! 

Securing this Al sprawl is critical. Ensuring data integrity becomes even more critical as it feeds into business-essential Al processes. 

Organisations also need to defend against Al which is already acting as a force multiplier, enabling threat actors to execute, automate, and scale complex attacks with unprecedented speed, reducing the need for high-level human expertise. These attacks use generative Al to create tailored malware, conduct highly convincing social engineering, and autonomously map, simulate, and exploit network vulnerabilities in real time. 

And what about the Al being deployed by your security vendors? Is it a new attack surface? Do you understand what they are doing? Do they? 

All these topics, as well as the bread-and-butter issues, will be discussed at our latest e­Crime & Cybersecurity Congress. If you want access to the best insights, the most thought­ provoking presentations, and the most senior and sophisticated network, it's must-attend. 

 

The e-Crime & Cybersecurity Congress Germany will look at how security teams and the business must change their security model to secure Al systems and defend against Al-enabled attackers. Join our real-life case studies and in-depth technical sessions from the most sophisticated teams in the market. 

 

Achieving visibility across ecosystems 
From exposed initial access points, to complex IT/OT environments to roaming Al agents and other non­human machine identities, simply understanding your device and application landscape is a huge challenge. Can you help with asset tracking and endpoint visibility? And what about anomaly detection after that? 

Data integrity a critical priority 
In Al-powered business, corrupted data equals corrupted decisions. Pricing engines, demand forecasts and recommendation systems are only as trustworthy as their inputs. CISOs must prioritise data lineage tracking, tamper detection, pipeline validation and cryptographic integrity controls across analytics and Al workflows.

Defending against the latest ransomware variants 
Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes. The threat and the actors are constantly evolving and that evolution is forcing the hands of government and causing havoc in the insurance market. What can CISOs do to better defend against ransomware? 

Securing Agentic Al 
Agentic systems don't just generate content - they act. CISOs must address model manipulation, prompt injection, data poisoning, tool-chain abuse and privilege escalation within Al agents executing transactions. Governance must extend beyond ML pipelines into runtime controls, behavioural monitoring and kill-switch design.

Why zero trust, isolation and segmentation are key 
Business ecosystems now include logistics APls, fintech integrations, marketplace sellers, social­commerce platforms and Saas pricing engines. Each connection expands attack surface. Continuous third-party risk scoring, API security testing, software bill of materials (SBOM) validation and zero-trust segmentation become foundational, not optional. 

From Analysts to Al Supervisors 
Security teams cannot scale headcount at the pace of digital transformation. The future SOC blends automation engineers, detection scientists and Al risk specialists. Peer collaboration, shared intelligence and trusted industry forums become force multipliers in defending fast-moving retail environments. 

Making the best use of threat intelligence 
In a preemptive security model, timing is everything - success depends on detecting and neutralizing threats before they become active incidents. To do this, security operations can't just rely on internal telemetry (e.g., endpoint or network logs). They need external, real-time context about emerging threats - where do they get it? 

Security Posture Management 
Traditional vulnerability scanners don't handle cloud native architectures well. Today's cloud environments spin up thousands 
of ephemeral assets without a traditional OS, without an IP address for long. So how do you adapt to that dynamic, APl-driven reality? How can traditional tools connect the dots - not just generate tickets? 

Improving continuous attack surface discovery 
You need to know what attackers can see and what they can actually attack -and you need it on a continuous basis, not in some static inventory. Ideally you also need assets ranked by risk priority and put into the current threat and vulnerability context. Is this feasible and is it cost effective? 

The power of automation 
There's too much manual intervention in security. SOAR pulls data from SIEMs, EDRs, firewalls, cloud APls, ticketing systems threat intelligence feeds, and even email servers and coordinates actions across tools via APls and prebuilt integrations and intelligent playbooks. Well, that's the theory. How does it work in the real world? 

Adversary simulation and behavioural analysis 
Automated adversary simulation identifies telemetry blind spots. They provide prioritized remediation guidance and control effectiveness metrics. They track progress trends and validate security ROls as well as providing board and audit reporting. How well do they work in practice? 

Dealing with regulations 
CISOs now must build a single coherent security program that simultaneously satisfies divergent regulatory demands; they must interpret vague legal standards into technical architectures, and they risk non-compliance if auditors, regulators, or courts interpret differently later; they face unrealistic expectations around incident reporting; and they face personal liability. Can RegTech help? 

  • Achieving visibility across ecosystems

    • From exposed initial access points such as warehouse management systems to complex machine control software, simply understanding your device and application landscape, its connection and data flows and dependencies is a huge challenge.
    • Can you help with asset tracking and endpoint visibility? And what about anomaly detection after that? 
  • Data integrity a critical priority

    • In Al-powered retail, corrupted data equals corrupted decisions. 
    • Pricing engines, demand forecasts and recommendation systems are only as trustworthy as their inputs. 
    • CISOs must prioritise data lineage tracking, tamper detection, pipeline validation and cryptographic integrity controls across analytics and Al workflows.
  • Defending against the latest ransomware variants

    • Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes. 
    • The threat and the actors are constantly evolving and that evolution is forcing the hands of government and causing havoc in the insurance market. 
    • What can CISOs do to better defend against ransomware? 
  • Securing Agentic Al

    • Agentic systems don't just generate content - they act. 
    • CISOs must address model manipulation, prompt injection, data poisoning, tool-chain abuse and privilege escalation within Al agents executing transactions. 
    • Governance must extend beyond ML pipelines into runtime controls, behavioural monitoring and kill-switch design.
  • Why zero trust, isolation and segmentation are key

    • Retail ecosystems now include logistics APls, fintech integrations, marketplace sellers, social-commerce platforms and Saas pricing engines. 
    • Each connection expands attack surface. 
    • Continuous third-party risk scoring, API security testing, software bill of materials (SBOM) validation and zero-trust segmentation become foundational, not optional.
  • From Analysts to Al Supervisors

    • Retail security teams cannot scale headcount at the pace of digital transformation. 
    • The future SOC blends automation engineers, detection scientists and Al risk specialists. 
    • Peer collaboration, shared intelligence and trusted industry forums become force multipliers in defending fast-moving retail environments. 
  • Making the best use of threat intelligence

    • In a pre-emptive security model, timing is everything - success depends on detecting and neutralizing threats before they become active incidents. 
    • To do this, security operations can't just rely on internal telemetry (e.g., endpoint or network logs). 
    • They need external, real-time context about emerging threats - where do they get it? 
  • Security Posture Management

    • Traditional vulnerability scanners don't handle cloud native architectures well. 
    • Today's cloud environments spin up thousands of ephemeral assets without a traditional OS, without an IP address for long. 
    • So how do you adapt to that dynamic, APl-driven reality? 
    • How can traditional tools connect the dots - not just generate tickets? 
  • Improving continuous attack surface discovery

    • You need to know what attackers can see and what they can actually attack - and you need it on a continuous basis, not in some static inventory. 
    • Ideally you also need assets ranked by risk priority and put into the current threat and vulnerability context. 
    • Is this feasible and is it cost effective? 
  • The power of automation

    • There’s too much manual intervention in security. SOAR pulls data from SIEMs, EDRs, firewalls, cloud APIs, ticketing systems, threat intelligence feeds, and even email servers.
    • It also coordinates actions across tools via APIs and prebuilt integrations and intelligent playbooks.
    • Well, that’s the theory. How does it work in the real world?
  • Adversary simulation and behavioural analysis

    • Automated adversary simulation identifies telemetry blind spots. 
    • They provide prioritized remediation guidance and control effectiveness metrics. 
    • They track progress trends and validate security ROls as well as providing board and audit reporting. 
    • How well do they work in practice? 
  • Dealing with regulations

    • CISOs now must build a single coherent security program that simultaneously satisfies divergent regulatory demands; they must interpret vague legal standards into technical architectures, and they risk non-compliance if auditors, regulators, or courts interpret differently later; they face unrealistic expectations around incident reporting; and they face personal liability. 
    • Can RegTech help? 

Who attends

Job titles

Chief BISO
Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
Chief Security & Privacy Officer
CISO
CISO/CTO
Director
Director Cyber Defense & CERT
Director Data Privacy
Director Security Risk & Compliance
Director Global Security Investigations
Director Information Security
Director, CRISC
Head of Security & Governance
Head of Compliance
Head of Corporate Data Protection
Head of Cyber
Head of Cyber Security
Head of Cyber Threat Response
Manager Information Security
Head of I.T.
Head of I.T. Security
Head of Information Security
Head of Information Security
Head of Internal Audit
Head of IT / Operations
Head of IT Security
Head of IT-Security
Head of Legal Data Privacy
Head of Penetration Testing
Head of I.T. Security
Head of Security
Head of Security Management
Head PCI Compliance
VP Cyber Security & Defence
Vice President, Threat Intelligence
VP Credit & Fraud
VP Crisis & Emergency Management
ASIC Operations
BISO
Cards Security Manager
CERT
COO Data Protection Programme
Corporate Audit
Head of Methods, Projects, IT
Corporate Security Awareness Manager
Counsel, Privacy & Information Law
Country Security Officer
CTO Security & Risk
CTSO
Fraud & Risk Manager
GAMA Business Task Force
Global Head of Data Protection
Global IT - Information Security
Global IT Manager
Group Data Protection Commissioner
Group Information Security Officer
Group Lead Active Defense Center
Information Security Manager
Information Security Manager
Information Security Manager
Information Security Manager
Information Security Manager
IT Security Manager
IT Security Manager
IT Security Research Engineer
Global IT Security & Compliance
Global IT Security & Compliance
IT Spezialist, WAN und Zugang
ITM Global Information Security
Lawyer
Lawyer
Leiter Informationssicherheit CISO
Leiter Unternehmenssicherheit
Local Data Security Officer
Manager Compliance
Manager Fraud Prevention
Operational Security Officer
Partner
Partner
IT Infrastructure Vice President
Security Fraud Manager
Security Manager
Security Manager, CISSP
Senior Alliance & BD Manager
Senior Manager Internal Audit
Senior Enterprise Security Manager
Senior I.T. Auditor
Senior Information Security Manager
Senior Information Security Manager
Senior Internal Auditor
Senior IT Auditor
Senior Manager
Senior Manager, Products & Innovation
Senior Project Manager (Infocontrol)
Senior Ref NGN
Senior Researcher
Senior Risk Manager
Senior Security Consultant
Senior Security Expert
Senior Security Product Manager
Senior Security Professional
Senior Security Specialist
Senior Security Specialist
Cyber Crime Investigations
Service & Contract Manager
Software Development Engineer
Specialist Security
SR IT Security Consultant
I.T. Security & Compliance Manager
System Analyst
Systemadministrator / CISO
GAMA Business Task Force
Team manager IT Security Operations
Teamleader I.T. Infrastructure
TORM & Financial Crime

Companies

Deutsche Bank Group
Deutsche Post
GE Capital
NYSE Euronext
Vodafone
Merck & Co
Audi
Deutsche Bank Group
Deutsche Telekom
First Data Merchant Solutions
First Data Merchant Solutions
American Express
Tech Data
SAP
BT
Allianz
Otto Group
Marsh
Airbus
Deutsche Bank Group
Daimler
Hengeler Mueller
Commerzbank
Eurostar
Quipu
Nintendo
Triodos Bank
Wirecard Bank
Lanxess AG
Siemens
Deutsche Telekom
Federal Office for Information Security
Commerzbank
Bank Verlag
Six-Group
Atos
Citigroup
Elavon Merchant Services
Deutsche Telekom
Allianz
Citigroup
BP
Commerzbank
UBS
MAN SE
BMW
Vodafone
Field Fisher Waterhouse LLP
Vattenfall AB
Deutsche Bank Group
Vodafone
Sofort
Deutsche Bank Group
Allianz
Adidas
Adidas
Deutsche Lufthansa
Citigroup
Commerzbank
KfW Bankengruppe
DZ Bank
Oce
Teradata
AXA
Deutsche Bundesbank
KfW Bankengruppe
Airbus
Adidas
E.ON
BMW
Daimler
Postbank P.O.S. Transact
Osborne Clarke
RWE Group
DZ Bank
Robert Bosch
Adidas
DZ Bank
E.ON
Osborne Clarke
Baker & McKenzie LLP
Deutsche Bank Group
Q8 Kuwait Petroleum
Siemens
Vodafone
Research in Motion
Nintendo
Adidas
Commerzbank
Deutsche Post
DHL
Mondi
DHL
ThyssenKrupp AG
Deutsche Telekom
BP
Deutsche Telekom
UBS
Postbank P.O.S. Transact
BT
Deutsche Telekom
Research in Motion
Triodos Bank
Deutsche Post
Tech Data
American Express
COLT Technology Services
Nintendo
COLT Technology Services
Deutsche Bank Group
Deutsche Post
Citigroup
BNP Paribas
Deutsche Bank Group
Deutsche Bundesbank
SCOR
Santander

Industries

Banking
Communications
Electronics
Finance
Telecoms
Other
Automotive
Banking
Telecommunications
Technology
Technology
Finance
Technology
Technology
Communications
Life Insurance
Retail
Insurance
Manufacturing
Banking
Auto Manufacturing
Law Firm
Banking
Transportation
Finance
Entertainment
Banking
Banking
Real Estate
Technology
Telecommunications
Government
Banking
Banking
Finance
Technology
Finance
Finance
Telecommunications
Life Insurance
Finance
Energy
Banking
Finance
Transportation
Manufacturing
Telecoms
Law Firm
Energy
Banking
Telecoms
Other
Banking
Life Insurance
consumer products
Consumer Products
Transportation
Finance
Banking
Banking
Banking
Electronics
Technology
Life Insurance
Banking
Banking
Manufacturing
consumer products
Energy
Manufacturing
Auto Manufacturing
Banking
Law Firm
Energy
Banking
Manufacturing
consumer products
Banking
Energy
Law Firm
Law Firm
Banking
Energy
Technology
Telecoms
Technology
Entertainment
consumer products
Banking
Communications
Transportation
Other
Transportation
Law Firm
Telecommunications
Energy
Telecommunications
Finance
Banking
Communications
Telecommunications
Technology
Banking
Communications
Technology
Finance
Telecommunications
Entertainment
Telecommunications
Banking
Communications
Finance
Finance
Banking
Banking
Insurance
Banking


Venue

The Westin Grand Munich

Location:

The Westin Grand Munich

Arabellastrasse 6,
Munich, Germany, 81925

Phone number: +49 89-92640

Directions:

Please click here