Agenda
08:00 - 08:50 |
Breakfast & Networking Break |
08:50 - 09:00 |
Chairman's Welcome |
09:00 - 09:20 |
►Beyond DORA compliance: Orchestrating Digital Resilience in a VUCA environment Thomas Barkias, Principal Supervisor – Cyber Resilience, ICT, Crypto & Operational Risk, European Central Bank
|
09:20 - 09:40 |
►Cybersecurity in the age of Artificial Intelligence: will the promises of today emerge as powerful threats tomorrow? André Reichow-Prehn, Managing partner, EMEA, Palo Alto Networks
|
0 |
►Why Identity Alone Is Not Enough for a Zero Trust Strategy Frank Barthel, Manager Solutions Engineering DACH, Netskope
|
10:00 - 10:20 |
►Security 3.0 - Learnings from modern medicine and longevity Max Imbiel, CISO, Bitpanda Asset Management • What do security and medicine have in common? |
10:20 - 11:00 |
►Education Seminars Session 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 11:50 |
► Beyond the Buzzwords, AI's Double-Edged Sword Francisco Z. Gaspar, Lead Cybersecurity Architect, Telefónica Germany
|
11:50 - 12:10 |
►Why established defences like Web Application Firewall or API Gateways are not enough to protect today’s APIs Frank Sommer, Senior Solutions Engineer, Akamai
|
12:10 - 12:30 |
►Why 24 is the answer to all questions in the cyber security environment! Stefan Schmugge, Director Sales Engineering, Rubrik
|
12:30 - 12:50 |
►Identify Vulnerable Assets and Prioritize Remediation André Heller, Director Solution Architects DACH, Armis
|
12:50 - 13:30 |
►Education Seminars Session 2 Delegates will be able to choose from the following education seminars:
|
13:30 - 14:30 |
Lunch & Networking Break |
14:30 - 14:50 |
►Managing third-party breaches Riccardo Riccobene, Head of CSO Security Assurance & Head of Operational Resilience, DWS
|
14:50 - 15:10 |
►Less Cyber More People - Putting People At The Center of Your World (or Cybersecurity Strategy) Simon Riehle, Sales Engineer, Proofpoint Being human-centric means placing humans at the center of design, decision-making, and problem-solving processes. It involves understanding, empathizing with, and prioritizing the needs, preferences, and experiences of individuals. But how does that help us reduce our risk profile? How can we consider the needs of each individual when we design our security strategy and deploy that next bit of tech. How can we collect understand the needs of the individuals we are protecting? How can we use it to improve our defences and mitigate risk? How can we make it scale with limited resources? How can we do more for less? In this session we will share the secrets of an effective human-centric security strategy. |
11:50 - 12:10 |
►How To Create Successful Malware and Defend with Zero Trust Seamus Lennon, Vice President of Operations for EMEA, ThreatLocker
|
15:30 - 15:50 |
►The expanding role of generative AI in accelerating elite SOC performance Frank Lange, Technical Director, EMEA, Anomali
|
15:50 - 16:20 |
Networking Break |
16:20 - 16:40 |
►Ethical hacking explained: why you need ethical hackers in your organization Michele De Donno, Ethical Hacker, Sky Deutschland GmbH
|
16:40 - 17:15 |
►Senior Leadership Panel Discussion Max Imbiel, CISO, Bitpanda Asset Management (Moderator)
|
17:15 - 17:20 |
Closing Remarks |
Education seminars
Resolving incident response challenges in your SOC with automation, speed and collaboration
Steve Jackson, Senior Vice President of Growth, Binalyze
In an "assume breach" world with increasing regulatory burden, Incident Response investigation capability is critical to protecting enterprise resiliency.
Attendees will learn:
- The specific challenges around operational security, SOC resources and welfare and the regulatory landscape.
- How these challenges can be met head on through automation, collaboration and greater speed of investigation.
We need to talk about security in our containerized workloads
Jain Joseph, Solutions Architect, SUSE
In this session you will learn how you can secure your container workloads with modern security tools that give you peace of mind. Let's also talk about Zero Trust and why it is so important.
Attendees will learn:
- Why our standard tools are not enough
- Containerized workloads and security concerns
- Protecting your modern workloads
How 5G is going to play a crucial role, and how can we plan its adoption with an integrated Zero Trust cybersecurity approach?
Ivan Majdan, Regional Sales Manager CEUR, Security Division, Cradlepoint by Ericsson
Florian Rutsch,Sr. Sales Engineer Consultant CEUR, Security Division, Cradlepoint by Ericsson
As cellular performance accelerates, 4G/5G WAN connectivity creates new opportunities for organizations to expand their business with fast, flexible and agile WWAN connections for IoT devices, vehicles, branch offices and users. So how do you plan for the adoption of 4G/5G WAN into the enterprise network? Cybersecurity is critical in a high-performance environment, especially protecting assets, sensitive data moving between remote locations, users, the Internet, SaaS and cloud applications. Learn how a cloud-based SASE solution with a zero-trust approach adapts to the cellular WAN.
Beyond the Dark: A Guide to Secure Your Brand in the Digital Underworld
Mahmut Kamil Özrenk, Sr. Pre-Sales Engineer, Brandefense
In an increasingly interconnected world, the digital landscape presents both unprecedented opportunities and significant risks for brands. This presentation delves into the critical aspects of securing your brand amidst the evolving threats of the digital underworld. Join us as we go beyond the dark to illuminate the path to securing your brand in the digital age, equipping you with the knowledge and tools to protect your valuable assets against the ever-present threats of the digital underworld.
Attendees will learn:
- Credential Suffering
- Ransomware Groups
- Challenges