2nd e-Crime & Cybersecurity Congress Austria

Are CISOs – and their suppliers – fit for fighting the new cold war?

30th April, 2025  •  Renaissance Wien Hotel, Vienna, Austria

If cybersecurity is national security, what changes must security vendors, tech suppliers and CISOs make?

 

Austria boosts cybersecurity spending in the face of sustained attacks

Underlining the growing conflation of cybersecurity with national security and national economic security, just how far perceptions of cybersecurity have swung towards national, political and economic security is emphasized by recent events in Austria.

In September, before the elections, a Russian hacker group used a crowd-sourced botnet project named DDOSIA to target the websites of several Austrian political parties as well as more than 40 other targets including national and regional government sites, airports, utilities, financial services and the Wiener Borse.

The Austrian interior ministry said it had registered an increase in cyberattacks since mid-September and the National Centre for Cyber Security stood ready to counter any threats. The Ukrainian ambassador to Austria, Vasyl Khymynets, shared the news of the cyber assaults on X, claiming they were proof of the hybrid war Russia was waging against “free Europe”.

The hacker group responsible said, amongst other things, “We decided to visit Austria again to check on cybersecurity ahead of the upcoming elections. As it turns out, nothing has changed since our last visit.”

Before this, in May, then Defence Minister Klaudia Tanner signed the Permanent Structured Cooperation (PESCO project) "Cyber Rapid Response Team" (CRRT) together with Lithuania and Latvia and the Austrian Armed Forces, which will be investing around 40 million euros in the cyber sector over the next four years.

The "Cyber Rapid Response Team" is a team of cyber specialists whose task is to detect, analyse and defend against cyber-attacks at any location. It secures traces of attacks, provides in-depth expertise and takes measures to respond appropriately to threats and attacks. The cyber response team thus represents an extended arm of the cyber forces and makes a significant contribution to cyber defence.

And earlier in the year, in March, the Counter Terrorism Preparedness Network (CTPN) and the United Nations Office of Counter Terrorism (UNOCT), in partnership with the AIT Austrian Institute of Technology, conducted a strategic, scenario-based, roundtable table-top exercise focused on a terrorist cyber-attack against critical infrastructure.

These initiatives illustrate how far cybersecurity has risen up government priorities. When the main threat appeared to be the P&Ls of private sector firms, governments were not that interested. States and law enforcement view citizens and public sector entities as their primary constituency – not corporations. But now that they have become prime targets, and now that it has become clear that the private sector is itself critical to national security (most CNI is in the private sector and private sector firms are key suppliers to the public sector) and to the economic security that underpins political stability, governments (and their regulators) are playing catch-up.

So, what does all this mean for cybersecurity professionals? It certainly means that the volume and sophistication of attacks will continue to increase. It means that malicious state actors will devote more resources to smarter attacks and new attack technology – like AI. But it also means that more regulation is coming, with perhaps more support from government and a better story on budgets for management. It also means more scrutiny for CISOs – for better and worse.

 

The e-Crime & Cybersecurity Congress Austria will look at how the collision of cybersecurity, business, economics and politics affects cybersecurity professionals on the ground.
Join our real-life case studies and in-depth technical sessions from the most sophisticated teams in the market.

  • Making the most of next gen tech: automation, AI and the rest

    • The next 20 years will see an ecosystem of small single-issue vendors slim down to a far less complex set of larger platforms
    • These platforms will be able to invest in continuous development and offer to cover all or large chunks of organisations’ security needs
    • But will the winners in this evolution be those at today’s cutting edge?
  • Ransomware – dealing with the new normal

    • The US Treasury reported that companies paid an estimated $5.2 billion in BitCoin transactions due to ransomware payments for companies in 2021.
    • Only a quarter of ransomware attacks are reported. 
    • Ransomware is here to stay. So how can CISOs stop it being a permanent tax on the business?
  • Building a next gen security architecture

    • How do you efficiently manage multiple vendors, tightly integrate security controls and bridge the gap between network and security teams?
    • One answer is to reengineer your security architecture
    • So, what do efficiency-oriented security architects think is the best paradigm?
  • Cybersecurity for SaaS/IaaS/PaaS

    • Most companies’ core reliance is now upon a small number of monolithic application suites and Cloud services
    • In addition, they are likely to be developing their own software in the Cloud
    • These and other changes fundamentally alter the IT landscape in which cybersecurity operates
    • So do CISOs need a new model for cybersecurity and are legacy solutions still valid?
  • What do regulators really want?

    • It’s always easier to get budget for things that are compulsory, and cybersecurity / resilience regulation is introducing more and more mandatory requirements.
    • But how do those requirements translate into people, process and technology?
    • And does resourcing only for the regulatory minimum leave organisations vulnerable?
  • Can zero trust be done?

    • Zero Trust/ZTNA/SASE - they promise solutions to the key problems CISOs face today.
    • But how realistic are they? Do they take into account existing legacy technology, and the ways in which real companies actually do business day-to-day?
    • Can you explain how a real-world implementation works?

Venue

Renaissance Wien Hotel

Location: 

Renaissance Wien Hotel

Linke Wienzeile/Ullmannstraße 71, 
1150 Vienna,  
Austria

Telephone: +43 1-891020

Directions: 

Please click here