Agenda
08:30 - 09:30 |
Breakfast Networking and Registration |
09:30 - 09:40 |
Chairman's Welcome |
09:40 - 10:00 |
► NIS2 – walking the regulatory talk Philipp Amann, Group Chief Information Security Officer, Austrian Post (Post AG)
|
10:00 - 10:20 |
► Cyber Threat Landscape - One step ahead with the Connectivity Cloud Dominic Haussmann, Specialist Solutions Engineer - Zero Trust, Cloudflare
|
10:20 - 10:40 |
► Third-party risk management from a third-party perspective Andrea Szeiler, Global CISO, Transcom
|
10:40 - 11:20 |
►Education Seminar Session 1
|
11:20 - 11:50 |
Networking Break |
11:50 - 12:20 |
► The business of being a CISO Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
12:20 - 12:40 |
► Reducing the financial impact of cyber attacks
|
12:40 - 13:20 |
►Education Seminar Session 2
|
13:20 - 14:20 |
Lunch Break and Networking |
14:20 - 14:40 |
► Cyber Insurance as a last line of defence Orion Beci, Cyber Adviser, Austria, CEE & Eastern Mediterranean, Marsh
|
0 |
►Why Identity Alone Is Not Enough for a Zero Trust Strategy Frank Barthel, Manager Solutions Engineering DACH, Netskope
|
15:00 - 15:20 |
►Understanding the basics of social engineering Dr. Martin J. Krämer, Security Awareness Advocate, KnowBe4
|
15:20 - 15:40 |
► Cyber Audit Mastery: Navigating Strategies for Success Christoph Gruber, Head of IT Security, UNIQA IT Services GmbH
|
15:40 - 16:00 |
Networking Break |
16:10 - 16:30 |
► LIVE DEMONSTRATION: Weaponising AI for Cyber Attacks & Offensive Operations Manit Sahib, Ethical Hacker, The Global Fund
|
16:20 - 16:50 |
► Technology Panel discussion Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
16:50 - 17:00 |
Event Closes |
Education seminars
Unveiling the Dark Secrets of i-SOON: Insights into China's Cyberspionage Ecosystem
Julian Kanitz, Lead Sales Engineer DACH, Recorded Future
This presentation sheds light on the recently uncovered data breach of i-SOON, a China-based cybersecurity company involved in offensive cyber espionage operations for Chinese government clients.
What attendees will learn:
- Revelation of the recently uncovered data breach of i-SOON
- Insights into the inner workings of China's cyberspionage ecosystem
- Raising awareness of the evolving landscape of cyber threats
We need to talk about security in our containerized workloads
Jain Joseph, Solutions Architect, SUSE
In this session you will learn how you can secure your container workloads with modern security tools that give you peace of mind. Let's also talk about Zero Trust and why it is so important.
Attendees will learn:
- Why our standard tools are not enough
- Containerized workloads and security concerns
- Protecting your modern workloads
From threat detection to threat prediction: How generative AI is transforming cybersecurity strategies
Kevin Breuer, Sales Engineer, LogRhythm
- Evolution from detection to prediction
- Simulation of attack scenarios
- Threat intelligence automation
- Predictive risk assessment
- Improve Security Operations Center (SOC) efficiency
- Integration with existing systems
From postcard to a sealed letter – why and how the quality of email communication can and should be improved.
Günter Esch, Managing Director, SEPPmail
98% of written communication between companies and their external partners and customers takes place via email. It should therefore be a matter of course to protect this channel in particular. There are technologies that have proven themselves in practice, but are still not used across the board. Here is a brief overview of the threats, organisational measures, the available technical protection mechanisms and how these can be used optimally and in a user-friendly way.
- Email is the number 1 gateway for attackers
- Organisational measures
- Technical measures
- Plus and minus