Agenda
08:30 - 09:30 |
Breakfast Networking and Registration |
09:30 - 09:40 |
Chairman's Welcome |
09:40 - 10:00 |
► NIS2 – walking the regulatory talk Philipp Amann, Group Chief Information Security Officer, Austrian Post (Post AG)
|
10:00 - 10:20 |
► Cyber Threat Landscape - One step ahead with the Connectivity Cloud Dominic Haussmann, Specialist Solutions Engineer - Zero Trust, Cloudflare
|
10:20 - 10:40 |
► Third-party risk management from a third-party perspective Andrea Szeiler, Global CISO, Transcom
|
10:40 - 11:20 |
►Education Seminar Session 1
|
11:20 - 11:50 |
Networking Break |
11:50 - 12:20 |
► The business of being a CISO Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
12:20 - 12:40 |
► Reducing the financial impact of cyber attacks
|
12:40 - 13:20 |
►Education Seminar Session 2
|
13:20 - 14:20 |
Lunch Break and Networking |
14:20 - 14:40 |
► Cyber Insurance as a last line of defence Orion Beci, Cyber Adviser, Austria, CEE & Eastern Mediterranean, Marsh
|
0 |
►Why Identity Alone Is Not Enough for a Zero Trust Strategy Frank Barthel, Manager Solutions Engineering DACH, Netskope
|
15:00 - 15:20 |
►Understanding the basics of social engineering Dr. Martin J. Krämer, Security Awareness Advocate, KnowBe4
|
15:20 - 15:40 |
► Cyber Audit Mastery: Navigating Strategies for Success Christoph Gruber, Head of IT Security, UNIQA IT Services GmbH
|
15:40 - 16:00 |
Networking Break |
16:00 - 16:20 |
► LIVE DEMONSTRATION: Weaponising AI for Cyber Attacks & Offensive Operations Manit Sahib, Ethical Hacker, The Global Fund
|
16:20 - 16:50 |
► Technology Panel discussion Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
16:50 - 17:00 |
Event Closes |
Education seminars
Unveiling the Dark Secrets of i-SOON: Insights into China's Cyberspionage Ecosystem
Julian Kanitz, Lead Sales Engineer DACH, Recorded Future
This presentation sheds light on the recently uncovered data breach of i-SOON, a China-based cybersecurity company involved in offensive cyber espionage operations for Chinese government clients.
What attendees will learn:
- Revelation of the recently uncovered data breach of i-SOON
- Insights into the inner workings of China's cyberspionage ecosystem
- Raising awareness of the evolving landscape of cyber threats
We need to talk about security in our containerized workloads
Holger Moenius, NeuVector Sales Executive DACH, Benelux, Nordics & South, SUSE
Securing your container workloads with modern security tools that gives you peace of mind. Let's talk also about Zero Trust and why it is so important.
Attendees will learn:
- Why are our standard tools are not enough
- Containerized workloads and security concerns
- Protecting your modern workloads
From threat detection to threat prediction: How generative AI is transforming cybersecurity strategies
Kevin Breuer, Sales Engineer, LogRhythm
- Evolution from detection to prediction
- Simulation of attack scenarios
- Threat intelligence automation
- Predictive risk assessment
- Improve Security Operations Center (SOC) efficiency
- Integration with existing systems
From postcard to a sealed letter – why and how the quality of email communication can and should be improved.
Günter Esch, Managing Director, SEPPmail
98% of written communication between companies and their external partners and customers takes place via email. It should therefore be a matter of course to protect this channel in particular. There are technologies that have proven themselves in practice, but are still not used across the board. Here is a brief overview of the threats, organisational measures, the available technical protection mechanisms and how these can be used optimally and in a user-friendly way.
- Email is the number 1 gateway for attackers
- Organisational measures
- Technical measures
- Plus and minus