Agenda

Presentations already confirmed include:


► Beyond the Buzzwords, AI's Double-Edged Sword


Francisco Z. Gaspar, Lead Cybersecurity Architect, Telefónica Germany

  • Understanding the Evolution of Cybersecurity Paradigms:
  • The Complexities of the Data Dilemma
  • AI's Promises and Pitfalls
  • Balancing Act
  • Charting the Course Forward towards a More Resilient and Secure Future

►Security 3.0 - Learnings from modern medicine and longevity

Max Imbiel, CISO, Bitpanda Asset Management

•    What does Security have in common with Medicine?
•    What thoughts and best-practices can we transfer from modern Medicine into modern Security?
•    Applying healthier and more secure ways or working


►Ethical hacking explained: why you need ethical hackers in your organization

Michele De Donno, Ethical Hacker, Sky Deutschland GmbH

  • Ethical hacking and penetration testing: what and why
  • Myths and misconceptions about ethical hacking
  • A glimpse into the penetration testing process
  • Penetration test (live demo)
     

►Senior Leadership Panel Discussion

Max Imbiel, CISO, Bitpanda Asset Management
Klaus-E. Klingner, Information Security Officer, Assambeauty 

  • The role of the CISO as security regulation increases (NIS2, DORA etc.)
  • Compliance versus security as a true business driver
  • Ai — helping or hindering?
  • Adopting a risk based approach to securing budgets

►Why Identity Alone Is Not Enough for a Zero Trust Strategy

Paolo Passeri, Principal Sales Engineer and Cyber Intelligence Specialist, Netskope

  • The new reality of living in a hyperconnected online world requires a new approach to security, where multiple elements must be taken into account, besides simply blocking/allowing access to a specific service or the user identity to enforcing granular permissions.
  • Learn why the context is important to enforce a granular and effective security policy.
  • Discover which are the elements that must be considered, besides identity, to adopt an effective zero trust strategy
  • Understand how the different security controls, such as data protection, threat protection, behaviour analytics, cooperate to protect the modern enterprise.

Education seminars