Agenda

Presentations already confirmed include:


►Beyond the Algorithm: How Human Factors Can Make or Break AI Adoption

Meri Roboci, AI Security Strategist, DWS Group

  • Why trust is not a given, and how to build AI literacy across your organisation
  • Behavioural Resistance & Organisational Culture
  • Ethical Decision-Making & Oversight
  • The Human-AI Collaboration Interface
  • Real-world examples from finance-what went right, what went wrong, and why

►Panel Discussion: Securing Future Architectures

Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England (moderator)
Alexander Zhitenev, Director of Corporate Systems & Head of IT Security, IFCO MANAGEMENT GmbH
Klaus-E. Klingner, Information Security Officer, Asambeauty 
Prashant Joshi, Head of Enterprise IT Security Architecture, Volvo Group

  • How can security teams design resilient architectures to integrate and leverage emerging technologies such as AI, quantum computing, and IoT?
  • What role does AI play in developing proactive rather than reactive security strategies?
  • What are the best practices for integrating AI without disrupting legacy systems and existing workflows?
  • How can organisations implement zero-trust principles and adaptive access controls to secure ever-evolving environments driven by AI and edge computing?

►OT Security – A Structured Approach to Securing Industrial Assets

Prashant Joshi, Head of Enterprise IT Security Architecture, Volvo Group

  • Understanding the growing sophistication of threats targeting industrial systems.
  • Building a multi-layered defence tailored to OT environments.
  • Common Pitfalls and Lessons Learned 

►Panel Discussion: Battling Nation-State Hackers: Winning the Cyber War

Andreas Englisch, IT Security Officer, European Aero Engine Consortium (moderator) 
Sreedevi Jay, Global Head of CERT, PagoNxt (a Santander company) 
Rainer Giedat, Cyber Security Officer, Scalable GmbH

  • How can organisations effectively leverage threat intelligence to proactively counter nation-state attacks? Can they?
  • Do regulatory standards actually enhance defence against nation-state actors, or do they merely add compliance burdens without
    improving security?
  • Are we doing enough to address supply chain vulnerabilities, or is this an overlooked entry point for nation-state threats?
  • What strategic, forward-looking investments are essential for effectively countering the evolving tactics of APTs?

►Insights into current cybersecurity threats impacting individuals and organisations

Ulrich Baumann, Partner & COO, Oikon LAW

  • Regulatory obligations and legal strategies for safeguarding sensitive information
  • AI and Cyber Risk Governance and navigating the implications of the EU AI Act
  • Streamlining legal and technical requirements to meet evolving standards for cyber resilience (NIS2 and ISO 27001)

►Ransomware 3.0: Weaponizing AI for the Next Generation of Ransomware Attacks

Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England

  • LIVE DEMO - Inside the first AI-powered ransomware attack — See how my custom Agentic Ransomware Gang can take down a network in under 8 minutes
  • Firsthand insights from real-world red team ops — from legacy tech and broken access controls to the critical lack of real-world security testing
  • Why traditional security fails — compliance checklists and conventional tools don’t stop modern ransomware
  • What CISOs and security leaders must do now — real-world, field-tested steps to prove your controls work before attackers do it for you

►Security despite, for, and with Quantum Computers

Pascal Debus, Head of the Quantum Security Technologies (QST) research group , Fraunhofer AISEC

  • Security despite Quantum Computers: A Call for Action today
  • Rethinking Quantum Cybersecurity Holistically
  • Turning the Tables: Using Quantum for Cyber Defense

►Navigating the Cloud Responsibly

Rainer Giedat, Cyber Security Officer, Scalable GmbH

  • The cloud provider outlined my responsibilities - but how do I actually make it work?
  • I've assigned roles within my DevOps team, but can they truly carry them out?
  • What happens to cloud security if we don’t have a firm grasp on our responsibilities?
  • Services and workloads are people too, you know…

►Solving Application Security without causing Pain between Shift Left and Shift Right

Paul Senkel, Senior Solutions Engineer, Contrast Security

  • Paul shares hard-earned lessons from both sides of the software lifecycle – rediscovering joy through a smarter, integrated approach to AppSec.
  • You will learn how to identify hidden friction points, reduce developer frustration, and bring security into the development process without slowing teams down
  • Exploring practical ways to align teams, modernise workflows, and remove the real-world pain points of fragmented AppSec – so security becomes seamless, not stressful

Education seminars