Late Bird rate ends in 4 days
 - Get your ticket now before prices go up!
14th & 15th May 2025 in Hamburg
14th & 15th May 2025 in Hamburg Contact: info@cybersecuritysumm.it or +49 40 999 993 868

Cybersecurity Summit Day 1

Cybersecurity Summit Day 1

The agenda of the Cybersecurity Summit on May 14th, 2025.

Cybersecurity Summit Day 2

Cybersecurity Summit Day 2

The agenda of the Cybersecurity Summit on May 15th, 2025.



14th May 2025 Cybersecurity Summit Day 1

  1. MAIN STAGE
  1. ZUGSPITZE Masterclasses
  1. MATTERHORN Masterclasses
  1. 08:30
     

    08:30 Welcome

    Our doors open at 08:30 - so you can start networking at the first coffee and secure the best seat

  1. 09:15
    Presentation

    Welcome!

    Opening  of the event with a warm welcome from the organizers.

  2. 09:30
    Presentation

    Keynote: Keynote: Global perspective on emerging cyber threats and risks

    Cyber risk and threats is a concern for national security and critical infrastructure. Across the world, various regions, countries and organisations are facing into geopolitical situational risks, wave of regulatory shifts and speed of new technological developments.

    In this interactive and unique storytelling session, you will understand how the cyber risk and threats ranks compared to other global risks. Then we will deep dive into 5 regions covering insights from 10 countries on the latest cyber threat and risks focussing on what the threat and risk is, as well as understanding what the drivers are.  Lastly you will walk away with 5 practical actionable steps you can take back for shaping your cyber strategy, enterprise risk management reporting to Board and implementation in your organisation.

  3. 10:00
     

    Coffee break

    Enjoy coffee and breakfast and make new contacts with the visitors and exhibitors of the Cybersecurity Summit.

  4. 10:30
    Presentation

    Through the cyber jungle: taming black swans, grey rhinos and information security risks

    Discover how to navigate the cyber jungle and elevate your risk management to the next level. In this engaging presentation, you'll learn what "Black Swans" and "Grey Rhinos" are all about. Get inspired and take away valuable insights for your daily risk management!

  5. 11:00
    Panel discussion

    The future of Cybersecurity

    IT security experts discuss the latest strategies in cybersecurity. What measures need to be taken for successful cybersecurity?
    What are the main requirements that the NIS 2 directive places on companies and how do they differ from the previous requirements?

  6. 11:45
    Panel discussion

    Women in Cybersecurity: strategies to combat the skills shortage

    To what extent has the shortage of skilled workers already become a security risk? 
    What targeted measures can be taken to attract and promote more women in cybersecurity?

  1. Presentation

    10:00 Why vulnerability management should be at the heart of your cybersecurity strategy

    It is often said that humans are the biggest vulnerability in IT security - but data shows that vulnerabilities pose a comparable or even greater risk. This presentation highlights the central importance of consistent patch and vulnerability management in today's ever-changing threat landscape. We'll highlight the key challenges organizations face and best practices for implementing end-to-end automated vulnerability management that increases security efficiency and minimizes the attack surface.

  2. Presentation

    11:00 Ransomware Tales

    Beyond the alarming headlines and increasing financial consequences, the prevalence of malicious or weaponized software lurks as an everyday risk. Join Seamus Lennon, VP of Operations EMEA of ThreatLocker for a deep look at the evolution of ransomware. We'll explore the real stories of rogue code, the impact of an attack, and how you can protect your organization today.

  3. Presentation

    11:30 Detection by Deception - the efficient Intrusion Detection. A success story.

    The central element in intrusion detection is the detection of anomalies:

        - A user account suddenly performs actions that do not correspond to its usual tasks. Is it really the employee who is behind this? Or is it another person who is misusing their account?
        - A system, process or application suddenly sends data to unknown destinations. Is this intentional?
        - Access to the central system and user directory (e.g. Active Directory) is increasing. What is behind this?

    Recognizing this on productive systems is difficult and often involves false alarms. The additional provision of IT systems and data as sensors, which are not exposed to a productive load, simplifies and accelerates intrusion detection considerably with reliable alarms.
    In this presentation, we will show how Cybersense implements this as an MDR and what successes we achieve with it.

  4. Presentation

    12:00 Cyber security in action: interplay of governance & managed detection

    Cyber attacks have long been a reality. The decisive factor is how companies react to them. In this masterclass, DIGITALL and Grant Thornton will jointly examine the cyber security lifecycle from two perspectives: preventive governance & compliance meets managed security services. Using practical examples, we will show how this interaction works in reality and which success factors make the difference.

  1. Presentation

    10:15 Airbus Protect - Mastering intelligence-led security operations

    During the Masterclass we will explore the critical role of Threat Intelligence as a Managed Security Service Provider (MSSP) in the evolving landscape of cybersecurity. It will provide insights into the latest mission-driven methodologies in information collection, examining how we as an MSSP can proactively defend against emerging threats. This session offers valuable perspectives on intelligence-led security operations.

  2. Presentation

    10:45 Bridging Hype & Reality IN AI-DRIVEN SOCs

  3. Presentation

    11:00 Cybercrime & Cyberwar

    In today's digital world, companies are increasingly falling victim to ransomware attacks. In these attacks, criminals gain access to company data, encrypt it and demand a ransom payment to release the data. This poses a serious threat that goes far beyond the mere loss of business-critical information. Attackers are now also threatening to expose confidential data, which puts additional pressure on affected companies.
    Such security incidents not only lead to considerable financial losses, but also to massive reputational damage. In addition, there are often severe fines under the General Data Protection Regulation (GDPR), which can be imposed if personal data is not adequately protected.
    In this Masterclass, we will discuss the effects of ransomware attacks and possible strategies for protection and damage limitation. Find out how you can better protect your company against attacks and what measures should be taken in an emergency to minimise the damage and secure your data.

  4. Presentation

    11:15 Prioritising real risks by combining developer security & AI-supported cloud security. How organisations can benefit from the advantages of AI-powered cloud security from development to runtime.

    Staying one step ahead of threats requires real-time visibility and intelligent prioritisation.  Learn how SentinelOne's Singularity Cloud Workload Security solution for real-time threat detection and response integrates with Snyk to enable developers to secure applications from code to cloud.
    Together, Snyk and SentinelOne provide organisations with a comprehensive view of risk across their entire application portfolio, prioritised by real-world vulnerability and runtime context.

  5. Presentation

    11:45 Intelligent security: How AI and platform strategies with Cisco & XM minimise cyber risks

    Cyber threats are constantly evolving - companies therefore need a smart and proactive security proactive security strategy. This presentation shows how the AI-powered Cisco Security Platform and Continuous Threat Exposure Management with XM Cyber help to detect vulnerabilities early and prevent attacks. Find out how an intelligent, platform-based security architecture makes your company more resilient and reduces risks in the long term.

     

  6. Presentation

    12:15 ORC4 Genetic AI

    As a speaker at the Cybersecurity Summit 2025 in Hamburg, I will be presenting the revolutionary possibilities of ORC4 Genetic AI. In my masterclass, I will show how this self-learning security solution reacts dynamically to new threats, prevents zero-day attacks and takes cyber defence to a new level. Experience how Genetic AI is shaping the future of cyber security.

  1. 12:30
     

    12:30 Lunch break

    Enjoy the food while making new contacts with visitors and exhibitors at the Cybersecurity Summit.

  1. 14:00
    Panel discussion

    Cybersecurity Summit Startup Awards - Part 1

    You will see innovative startups presenting their clever new solutions in the cybersecurity business. The best three will receive a Cybersecurity Summit Startup Award – you decide!

  2. 14:45
    Panel discussion

    Ransomware: prevention and response strategies

    How can companies respond to the challenges of ransomware attacks and protect themselves against them? 
    How can zero-trust architectures help?

  1. Presentation

    14:00 Hackers love on-prem! Why cloud security is the real game changer

  2. Presentation

    14:15 The Future of Hacking: Attacks on current and future technologies

    IT is everywhere these days. The number of connections between IT components is exploding and the attack surface is increasing massively as a result. Isn't this exactly the scenario that hackers have always dreamed of?
    Sebastian Schreiber, founder and CEO of the IT security company SySS GmbH, demonstrates in a live hacking session how IT networks can be taken over, passwords cracked, anti-virus programs bypassed and data extracted. He will demonstrate how easily and quickly current wireless alarm systems, locking systems and wireless presenters, as well as fingerprint-protected USB sticks, can be hacked. He also shows how paywalls can be outwitted and how household and other IoT devices can be manipulated by hacking thermostats.

  3. Presentation

    14:45 Now or never: dotBrands as a safe harbour for your domains

    Find out in our masterclass what advantages a dotBrand has from an IT security perspective, how you can increase the trust of your customers and users, create the best conditions for the strategic growth of your company and demonstrate your market leadership to the outside world by taking advantage of the unique opportunity in 2025/2026 to apply to ICANN for a top level domain with your company name.

  1. Presentation

    14:00 From cost factor to business enabler - repositioning cyber security

    How does cyber security go from being necessary to strategic?

    This presentation is about the transformation from isolated IT security to a company-wide business process. With a holistic view of continuity, posture and threat, it will show how security actively contributes to value creation. Automation, AI and modern detection strategies ensure agility and efficiency. This turns cyber security into a central control element.

  2. Presentation

    14:30 Current trends and strategies for digital workplaces

    Bernhard Dunst from Pointsharp highlights key trends such as the return to on-premises and the growing importance of zero trust in the face of increasing and serious phishing attacks. He provides companies with practical strategies on how they can counter these threats, secure their digital workplace holistically and thus strengthen their resilience to current challenges. Specific use cases from identity and access management will be presented.

  3. Presentation

    15:00 Complex, expensive, ineffective? - Efficiency as the key to cyber defence

    Establishing a functioning cybersecurity system is an important investment that secures a company's existence.
    Despite numerous tools and measures, companies are increasingly falling victim to attacks. Why is that? Because protection is often provided in the wrong places - and because many solutions are effective but not efficient.
    In this masterclass, Paul Werther (CTO, greenhats) and Giovanni Serpi (CEO, INS Systems) show how modern companies can make their security strategy not only effective but also efficient.
    Learn how to do the right thing right in the future. With a clear focus on the real threats, with intelligent orchestration and thus with targeted use of resources.
    In this way, you can strengthen your company's resilience, reduce the burden on your IT and cut costs.
    The solutions presented are based on the most common and critical vulnerabilities identified in the course of white hacking - practical, proven and immediately realisable.

    Ideal for IT managers, CISOs and decision-makers who take a pragmatic approach to security.

  1. 15:30
     

    15:30 Coffee break

    Enjoy coffee and cake and make new contacts with the visitors and exhibitors of the Cybersecurity Summit.

  1. 16:00
    Presentation

    Synergies between humans and AI: a critical look into the future of cybersecurity

    In this keynote, we highlight the growing collaboration between human expertise and artificial intelligence in the field of cybersecurity. We discuss both the opportunities and challenges arising from this synergy and analyze how this collaboration can impact the future of digital security. We also take a critical look at ethical issues and the need to continuously develop both technical and human capabilities to withstand ever-changing threats.

  2. 16:30
    Panel discussion

    Security awareness in Cybersecurity

    What effective methods and tools can be used to raise awareness of cyber security in companies?
    What exciting challenges and opportunities does this present?

  3. 17:15
    Presentation

    Navigating Enterprise Security in the Cloud: Overcoming Todays Challenges

    In this keynote, we will explore the evolving landscape of cloud security and the critical strategies enterprises must adopt to safeguard their digital assets. As organizations increasingly migrate to the cloud, they face a myriad of security threats and compliance issues. This session will delve into the latest trends in cloud security, identify common vulnerabilities, and provide actionable insights on how to mitigate risks. Attendees will gain a deeper understanding of best practices for securing cloud environments, the importance of a robust security framework, and how to stay ahead of emerging threats.

  4. 17:45
     

    Speaker Awards Prizegiving

    The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

  1. Presentation

    15:45 Predicting threats with AI - rethinking cyber security

    Risk management in cyber security poses particular challenges. Assessing the probability of occurrence and potential impact is often difficult. Artificial intelligence opens up new possibilities that facilitate the management of cyber security risks and strategic planning. How will AI revolutionise risk management in cyber security? We talk about new possibilities and potentials.

  2. Presentation

    16:15 Cyber defence made in Germany - digital resilience and maximum data sovereigntys

    State-sponsored attackers are increasingly targeting high-tech companies, operators of critical infrastructures and the innovation centres of the economy.

    In this masterclass, we will shed light on how professional attackers proceed, which patterns can be recognised early on and which IT security strategies have proven themselves in practice - based on findings from cooperation with over 60 security authorities.

    You will also learn why the origin and independence of German providers are crucial for trustworthy and resilient cybersecurity.

  3. Presentation

    16:45 From Complexity to Clarity: Understanding your Software Product Health

    In this masterclass we will first give an overview of the challenges in assessing and communicating the current state of a software product to different stakeholder. Therefore, we introduce the term of software product health, an aggregation of information about a product’s security, quality, sustainability, and compliance. Afterwards, we show how we have built the Software Product Health Assistant (SPHA) as an open-source tool to automatically assess a product’s health score and communicate it effectively to decision-makers while enabling developers to act upon the score.

  4.  

    17:30 Speaker Awards Prizegiving

    The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

  1. Presentation

    15:45 Threat Intelligence Report: Trends and defence strategies for CISOs

    In this presentation, the latest findings from the Ontinue Threat Intelligence Report will be presented. The focus will be on the rapid rise in ransomware attacks and the changes in ransom demands as well as the threatening increase in vishing attacks, supported by GenAI technologies. Find out how hackers are adapting their tactics and what practical measures companies need to take to optimise their cyber defences.

  2. Presentation

    16:00 BRL Risk Consulting Masterclass

  3. Presentation

    16:15 Clickbait vs. reality: the cyber threats you should really be worried about

    Als Managed Security Service Provider sichern wir bei glueckkanja über 1 Mio Entities in 52 Ländern bei diversen kritischen europäischen Firmen ab und erleben jeden Tag welche Angriffe stattfinden und welche Gegenmaßnahmen sowohl proaktiv als auch reaktiv sinnvoll sind. 

    Lassen sie uns einen Blick auf ein paar repräsentative Fälle aus der letzten Zeit werfen und über die sich aus diesen Vorfällen abgeleiteten notwendigen Maßnahmen sprechen. Unserer Erfahrung nach gibt es hier eine hohe Schnittmenge aller Unternehmen und wir können mit unseren Services schnell das Fundament stabilisieren, um anschließend zusammen in einen kontinuierlichen Verbesserungsprozess einzusteigen.

  4. Presentation

    16:45 SECURITY-OUT-OF-THE-BOX: Users are unique. Security should be too.

    Security, risk and compliance are often complicated and one of the biggest challenges in cyber security is effectively managing the attack surface. Traditional attack surface management and endpoint security tools rely on static, generic, or role-based policies. 60% of organizations struggle to keep up with changing compliance requirements. 67% of companies have seen an increase in their attack surface in the last two years. Sound familiar? Move to proactively manage risk, achieve compliance with ease and focus on growth.

  5.  

    17:30 Speaker Awards Prizegiving

    The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

  1. 18:00
     

    18:00 Aftershow lounge for all participants

  1. 23:00
     

    23:00 End of today's event

14th May 2025 Cybersecurity Summit Day 1

08:30

Welcome

Our doors open at 08:30 - so you can start networking at the first coffee and secure the best seat

09:15 MAIN STAGE:
Presentation

Welcome!

Opening  of the event with a warm welcome from the organizers.

09:30 MAIN STAGE:
Presentation

Keynote: Keynote: Global perspective on emerging cyber threats and risks

Cyber risk and threats is a concern for national security and critical infrastructure. Across the world, various regions, countries and organisations are facing into geopolitical situational risks, wave of regulatory shifts and speed of new technological developments.

In this interactive and unique storytelling session, you will understand how the cyber risk and threats ranks compared to other global risks. Then we will deep dive into 5 regions covering insights from 10 countries on the latest cyber threat and risks focussing on what the threat and risk is, as well as understanding what the drivers are.  Lastly you will walk away with 5 practical actionable steps you can take back for shaping your cyber strategy, enterprise risk management reporting to Board and implementation in your organisation.

10:00 MAIN STAGE:

Coffee break

Enjoy coffee and breakfast and make new contacts with the visitors and exhibitors of the Cybersecurity Summit.

10:00 ZUGSPITZE MASTERCLASSES:
Presentation

Why vulnerability management should be at the heart of your cybersecurity strategy

It is often said that humans are the biggest vulnerability in IT security - but data shows that vulnerabilities pose a comparable or even greater risk. This presentation highlights the central importance of consistent patch and vulnerability management in today's ever-changing threat landscape. We'll highlight the key challenges organizations face and best practices for implementing end-to-end automated vulnerability management that increases security efficiency and minimizes the attack surface.

10:15 MATTERHORN MASTERCLASSES:
Presentation

Airbus Protect - Mastering intelligence-led security operations

During the Masterclass we will explore the critical role of Threat Intelligence as a Managed Security Service Provider (MSSP) in the evolving landscape of cybersecurity. It will provide insights into the latest mission-driven methodologies in information collection, examining how we as an MSSP can proactively defend against emerging threats. This session offers valuable perspectives on intelligence-led security operations.

10:30 MAIN STAGE:
Presentation

Through the cyber jungle: taming black swans, grey rhinos and information security risks

Discover how to navigate the cyber jungle and elevate your risk management to the next level. In this engaging presentation, you'll learn what "Black Swans" and "Grey Rhinos" are all about. Get inspired and take away valuable insights for your daily risk management!

10:30 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass

10:45 MATTERHORN MASTERCLASSES:
Presentation

Bridging Hype & Reality IN AI-DRIVEN SOCs

11:00 MAIN STAGE:
Panel discussion

The future of Cybersecurity

IT security experts discuss the latest strategies in cybersecurity. What measures need to be taken for successful cybersecurity?
What are the main requirements that the NIS 2 directive places on companies and how do they differ from the previous requirements?

11:00 ZUGSPITZE MASTERCLASSES:
Presentation

Ransomware Tales

Beyond the alarming headlines and increasing financial consequences, the prevalence of malicious or weaponized software lurks as an everyday risk. Join Seamus Lennon, VP of Operations EMEA of ThreatLocker for a deep look at the evolution of ransomware. We'll explore the real stories of rogue code, the impact of an attack, and how you can protect your organization today.

11:00 MATTERHORN MASTERCLASSES:
Presentation

Cybercrime & Cyberwar

In today's digital world, companies are increasingly falling victim to ransomware attacks. In these attacks, criminals gain access to company data, encrypt it and demand a ransom payment to release the data. This poses a serious threat that goes far beyond the mere loss of business-critical information. Attackers are now also threatening to expose confidential data, which puts additional pressure on affected companies.
Such security incidents not only lead to considerable financial losses, but also to massive reputational damage. In addition, there are often severe fines under the General Data Protection Regulation (GDPR), which can be imposed if personal data is not adequately protected.
In this Masterclass, we will discuss the effects of ransomware attacks and possible strategies for protection and damage limitation. Find out how you can better protect your company against attacks and what measures should be taken in an emergency to minimise the damage and secure your data.

11:15 MATTERHORN MASTERCLASSES:
Presentation

Prioritising real risks by combining developer security & AI-supported cloud security. How organisations can benefit from the advantages of AI-powered cloud security from development to runtime.

Staying one step ahead of threats requires real-time visibility and intelligent prioritisation.  Learn how SentinelOne's Singularity Cloud Workload Security solution for real-time threat detection and response integrates with Snyk to enable developers to secure applications from code to cloud.
Together, Snyk and SentinelOne provide organisations with a comprehensive view of risk across their entire application portfolio, prioritised by real-world vulnerability and runtime context.

11:30 ZUGSPITZE MASTERCLASSES:
Presentation

Detection by Deception - the efficient Intrusion Detection. A success story.

The central element in intrusion detection is the detection of anomalies:

    - A user account suddenly performs actions that do not correspond to its usual tasks. Is it really the employee who is behind this? Or is it another person who is misusing their account?
    - A system, process or application suddenly sends data to unknown destinations. Is this intentional?
    - Access to the central system and user directory (e.g. Active Directory) is increasing. What is behind this?

Recognizing this on productive systems is difficult and often involves false alarms. The additional provision of IT systems and data as sensors, which are not exposed to a productive load, simplifies and accelerates intrusion detection considerably with reliable alarms.
In this presentation, we will show how Cybersense implements this as an MDR and what successes we achieve with it.

11:45 MAIN STAGE:
Panel discussion

Women in Cybersecurity: strategies to combat the skills shortage

To what extent has the shortage of skilled workers already become a security risk? 
What targeted measures can be taken to attract and promote more women in cybersecurity?

11:45 MATTERHORN MASTERCLASSES:
Presentation

Intelligent security: How AI and platform strategies with Cisco & XM minimise cyber risks

Cyber threats are constantly evolving - companies therefore need a smart and proactive security proactive security strategy. This presentation shows how the AI-powered Cisco Security Platform and Continuous Threat Exposure Management with XM Cyber help to detect vulnerabilities early and prevent attacks. Find out how an intelligent, platform-based security architecture makes your company more resilient and reduces risks in the long term.

 

12:00 ZUGSPITZE MASTERCLASSES:
Presentation

Cyber security in action: interplay of governance & managed detection

Cyber attacks have long been a reality. The decisive factor is how companies react to them. In this masterclass, DIGITALL and Grant Thornton will jointly examine the cyber security lifecycle from two perspectives: preventive governance & compliance meets managed security services. Using practical examples, we will show how this interaction works in reality and which success factors make the difference.

12:15 MATTERHORN MASTERCLASSES:
Presentation

ORC4 Genetic AI

As a speaker at the Cybersecurity Summit 2025 in Hamburg, I will be presenting the revolutionary possibilities of ORC4 Genetic AI. In my masterclass, I will show how this self-learning security solution reacts dynamically to new threats, prevents zero-day attacks and takes cyber defence to a new level. Experience how Genetic AI is shaping the future of cyber security.

12:30

Lunch break

Enjoy the food while making new contacts with visitors and exhibitors at the Cybersecurity Summit.

14:00 MAIN STAGE:
Panel discussion

Cybersecurity Summit Startup Awards - Part 1

You will see innovative startups presenting their clever new solutions in the cybersecurity business. The best three will receive a Cybersecurity Summit Startup Award – you decide!

14:00 ZUGSPITZE MASTERCLASSES:
Presentation

Hackers love on-prem! Why cloud security is the real game changer

14:00 MATTERHORN MASTERCLASSES:
Presentation

From cost factor to business enabler - repositioning cyber security

How does cyber security go from being necessary to strategic?

This presentation is about the transformation from isolated IT security to a company-wide business process. With a holistic view of continuity, posture and threat, it will show how security actively contributes to value creation. Automation, AI and modern detection strategies ensure agility and efficiency. This turns cyber security into a central control element.

14:15 ZUGSPITZE MASTERCLASSES:
Presentation

The Future of Hacking: Attacks on current and future technologies

IT is everywhere these days. The number of connections between IT components is exploding and the attack surface is increasing massively as a result. Isn't this exactly the scenario that hackers have always dreamed of?
Sebastian Schreiber, founder and CEO of the IT security company SySS GmbH, demonstrates in a live hacking session how IT networks can be taken over, passwords cracked, anti-virus programs bypassed and data extracted. He will demonstrate how easily and quickly current wireless alarm systems, locking systems and wireless presenters, as well as fingerprint-protected USB sticks, can be hacked. He also shows how paywalls can be outwitted and how household and other IoT devices can be manipulated by hacking thermostats.

14:30 MATTERHORN MASTERCLASSES:
Presentation

Current trends and strategies for digital workplaces

Bernhard Dunst from Pointsharp highlights key trends such as the return to on-premises and the growing importance of zero trust in the face of increasing and serious phishing attacks. He provides companies with practical strategies on how they can counter these threats, secure their digital workplace holistically and thus strengthen their resilience to current challenges. Specific use cases from identity and access management will be presented.

14:45 MAIN STAGE:
Panel discussion

Ransomware: prevention and response strategies

How can companies respond to the challenges of ransomware attacks and protect themselves against them? 
How can zero-trust architectures help?

14:45 ZUGSPITZE MASTERCLASSES:
Presentation

Now or never: dotBrands as a safe harbour for your domains

Find out in our masterclass what advantages a dotBrand has from an IT security perspective, how you can increase the trust of your customers and users, create the best conditions for the strategic growth of your company and demonstrate your market leadership to the outside world by taking advantage of the unique opportunity in 2025/2026 to apply to ICANN for a top level domain with your company name.

15:00 ZUGSPITZE MASTERCLASSES:
Presentation

A day in the life of a file

15:00 MATTERHORN MASTERCLASSES:
Presentation

Complex, expensive, ineffective? - Efficiency as the key to cyber defence

Establishing a functioning cybersecurity system is an important investment that secures a company's existence.
Despite numerous tools and measures, companies are increasingly falling victim to attacks. Why is that? Because protection is often provided in the wrong places - and because many solutions are effective but not efficient.
In this masterclass, Paul Werther (CTO, greenhats) and Giovanni Serpi (CEO, INS Systems) show how modern companies can make their security strategy not only effective but also efficient.
Learn how to do the right thing right in the future. With a clear focus on the real threats, with intelligent orchestration and thus with targeted use of resources.
In this way, you can strengthen your company's resilience, reduce the burden on your IT and cut costs.
The solutions presented are based on the most common and critical vulnerabilities identified in the course of white hacking - practical, proven and immediately realisable.

Ideal for IT managers, CISOs and decision-makers who take a pragmatic approach to security.

15:30

Coffee break

Enjoy coffee and cake and make new contacts with the visitors and exhibitors of the Cybersecurity Summit.

15:45 ZUGSPITZE MASTERCLASSES:
Presentation

Predicting threats with AI - rethinking cyber security

Risk management in cyber security poses particular challenges. Assessing the probability of occurrence and potential impact is often difficult. Artificial intelligence opens up new possibilities that facilitate the management of cyber security risks and strategic planning. How will AI revolutionise risk management in cyber security? We talk about new possibilities and potentials.

15:45 MATTERHORN MASTERCLASSES:
Presentation

Threat Intelligence Report: Trends and defence strategies for CISOs

In this presentation, the latest findings from the Ontinue Threat Intelligence Report will be presented. The focus will be on the rapid rise in ransomware attacks and the changes in ransom demands as well as the threatening increase in vishing attacks, supported by GenAI technologies. Find out how hackers are adapting their tactics and what practical measures companies need to take to optimise their cyber defences.

16:00 MAIN STAGE:
Presentation

Synergies between humans and AI: a critical look into the future of cybersecurity

In this keynote, we highlight the growing collaboration between human expertise and artificial intelligence in the field of cybersecurity. We discuss both the opportunities and challenges arising from this synergy and analyze how this collaboration can impact the future of digital security. We also take a critical look at ethical issues and the need to continuously develop both technical and human capabilities to withstand ever-changing threats.

16:00 MATTERHORN MASTERCLASSES:
Presentation

BRL Risk Consulting Masterclass

16:15 ZUGSPITZE MASTERCLASSES:
Presentation

Cyber defence made in Germany - digital resilience and maximum data sovereigntys

State-sponsored attackers are increasingly targeting high-tech companies, operators of critical infrastructures and the innovation centres of the economy.

In this masterclass, we will shed light on how professional attackers proceed, which patterns can be recognised early on and which IT security strategies have proven themselves in practice - based on findings from cooperation with over 60 security authorities.

You will also learn why the origin and independence of German providers are crucial for trustworthy and resilient cybersecurity.

16:15 MATTERHORN MASTERCLASSES:
Presentation

Clickbait vs. reality: the cyber threats you should really be worried about

Als Managed Security Service Provider sichern wir bei glueckkanja über 1 Mio Entities in 52 Ländern bei diversen kritischen europäischen Firmen ab und erleben jeden Tag welche Angriffe stattfinden und welche Gegenmaßnahmen sowohl proaktiv als auch reaktiv sinnvoll sind. 

Lassen sie uns einen Blick auf ein paar repräsentative Fälle aus der letzten Zeit werfen und über die sich aus diesen Vorfällen abgeleiteten notwendigen Maßnahmen sprechen. Unserer Erfahrung nach gibt es hier eine hohe Schnittmenge aller Unternehmen und wir können mit unseren Services schnell das Fundament stabilisieren, um anschließend zusammen in einen kontinuierlichen Verbesserungsprozess einzusteigen.

16:30 MAIN STAGE:
Panel discussion

Security awareness in Cybersecurity

What effective methods and tools can be used to raise awareness of cyber security in companies?
What exciting challenges and opportunities does this present?

16:45 ZUGSPITZE MASTERCLASSES:
Presentation

From Complexity to Clarity: Understanding your Software Product Health

In this masterclass we will first give an overview of the challenges in assessing and communicating the current state of a software product to different stakeholder. Therefore, we introduce the term of software product health, an aggregation of information about a product’s security, quality, sustainability, and compliance. Afterwards, we show how we have built the Software Product Health Assistant (SPHA) as an open-source tool to automatically assess a product’s health score and communicate it effectively to decision-makers while enabling developers to act upon the score.

16:45 MATTERHORN MASTERCLASSES:
Presentation

SECURITY-OUT-OF-THE-BOX: Users are unique. Security should be too.

Security, risk and compliance are often complicated and one of the biggest challenges in cyber security is effectively managing the attack surface. Traditional attack surface management and endpoint security tools rely on static, generic, or role-based policies. 60% of organizations struggle to keep up with changing compliance requirements. 67% of companies have seen an increase in their attack surface in the last two years. Sound familiar? Move to proactively manage risk, achieve compliance with ease and focus on growth.

17:15 MAIN STAGE:
Presentation

Navigating Enterprise Security in the Cloud: Overcoming Todays Challenges

In this keynote, we will explore the evolving landscape of cloud security and the critical strategies enterprises must adopt to safeguard their digital assets. As organizations increasingly migrate to the cloud, they face a myriad of security threats and compliance issues. This session will delve into the latest trends in cloud security, identify common vulnerabilities, and provide actionable insights on how to mitigate risks. Attendees will gain a deeper understanding of best practices for securing cloud environments, the importance of a robust security framework, and how to stay ahead of emerging threats.

17:30 ZUGSPITZE MASTERCLASSES:

Speaker Awards Prizegiving

The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

17:30 MATTERHORN MASTERCLASSES:

Speaker Awards Prizegiving

The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

17:45 MAIN STAGE:

Speaker Awards Prizegiving

The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

18:00

Aftershow lounge for all participants

23:00

End of today's event

15th May 2025 Cybersecurity Summit Day 2

  1. MAIN STAGE
  1. ZUGSPITZE Masterclasses
  1. MATTERHORN Masterclasses
  1. 09:00
     

    09:00 Welcome

    Our doors open at 09:00 - so you can start networking at the first coffee and secure the best seat

  1. 10:00
     

    Welcome!

    Opening of the event with a warm welcome by the moderator.

  2. 10:15
    Presentation

    Mirror, mirror on the wall, who's the most secure in the land? - Fairytale cyber security culture in the lives of Max and Moritz

    A question that concerns us all, especially in times of growing cyber threats. In this interactive presentation, Corinna Klempt and Annika Wägenbauer will take you on an exciting journey through the day-to-day work of Max, the CEO of a medium-sized company, and Moritz, its CISO. But instead of dry theory blocks, we will experience various scenarios together with the two actors that show how important a strong cyber security culture is for the success of a company. So you can look forward to a mixture of fairy tale and reality, in which Max and Moritz tip the scales in favour of a secure corporate environment not only in the virtual world, but also in everyday working life. We hope you have fun and gain valuable insights - and perhaps you will find yourself in one or two situations!

  3. 11:00
    Panel discussion

    Artificial intelligence in Cybersecurity

    What role does artificial intelligence play in modern cyber security? 
    How are AI-based solutions changing the way threats are detected and combated?

  4. 11:45
    Presentation

    Navigating uncertainty - AI in a Zero trust world

    In today’s digital world, traditional data protection methods are insufficient. The shift from static defenses to dynamic approaches like Zero Trust—where everything is verified—reflects the growing complexity of securing valuable and ubiquitous data. Artificial intelligence (AI) offers both opportunities and risks for cybersecurity. To address these challenges, organizations must understand the evolution of security practices, the data dilemma, and AI’s role, while implementing robust measures, continuous monitoring, and regulatory compliance.

  5. 12:15
    Presentation

    Beyond the AI hype: where we really stand and what awaits us in terms of the cybersecurity industry

    Tech analyst Philipp Klöckner explores the questions: Where do we really stand when it comes to artificial intelligence? What role can Europe play in this race for technological leadership? What is wishful thinking and what is already reality? And what do all these developments mean not only for each and every one of us, but also for our companies and our economy in general? 

  1. Presentation

    10:15 Cyber resilience in the digital age

    In the digital age, protecting sensitive data and maintaining critical systems and applications is of paramount importance. Zerto's Cyber Resilience Vault provides a comprehensive solution that protects organizations from ransomware attacks while meeting stringent data protection requirements.

    The strategic approach combines near-synchronous data replication with isolated, immutable data storage and a zero-trust architecture, enabling rapid recovery in the event of a cyberattack - without disrupting ongoing operations.

  2. Presentation

    10:30 AI and cyber security: Between myth and reality - How companies can counter the new dangers

    The cyber security risks posed by AI are increasing year on year, but as is so often the case, AI is a nebulous concept. Myths and half-truths haunt the public consciousness and it is difficult to assess the actual risks.
    Manuel Reinsperger, researcher for the use of AI systems in offensive cyber security, pentester and cybersecurity consultant, provides clarity and reports on the current state of science.

    What do such AI attacks look like, why is it no longer just about phishing, and how does this affect me as a company?

    Find out about the latest findings from leading-edge research and learn from operational experience which risks will affect you in the coming years.

  3. Presentation

    11:00 The future of cybersecurity is Zero Trust!

    Join us for a deep dive into today’s most pressing IT risks and discover how hackers operate during real-world cyberattacks.

    What does the future hold? How will the threat landscape evolve over the next few years?

    Find out how long it really takes to recover from a ransomware attack — and why.

    Most importantly: Learn how to protect your organization permanently and efficiently, even against unknown and emerging cyber threats.

    The presentation will be held in German.

  4. Presentation

    11:30 The human factor in cyber security

  5. Presentation

    12:00 No compromises - identity security without limits

    Service accounts are a prime target for attackers—often unprotected, without MFA, and difficult to monitor. But there’s a solution: automatically discover, analyze, and secure your service accounts. Gain full visibility into all identities, reduce attack surfaces, and enforce security controls to stop lateral movement, ransomware, and other identity-based threats.

  6. Presentation

    12:15 APTs on the Rise: How Hackers Target Smartphones to Breach Corporate Data

    With the increasing use of mobile devices and text-based communication in the workplace, companies are facing heightened risks. Phishing attacks on smartphones have increased by 20% in the second half of 2024. These attacks do not only target smartphones themselves but, more importantly, the sensitive corporate data accessible through them.

    Security experts from Lookout, the industry-leading solution for mobile endpoint security, explain:

    • How attackers’ tactics have evolved
    • Which attack vectors on smartphones are particularly vulnerable
    • New APT surveillanceware discoveries targeting organizations
  1. Presentation

    10:30 Will developers become extinct? The impact of AI on the software security industry

    CISOs and AppSec professionals are well accustomed to flexing with industry movements, whether it be in the form of new technology, emerging threats, or rapidly shifting regulatory and compliance environments. It’s certainly not easy, and generative AI exploding onto the scene has resulted in significant changes on the horizon for both the AppSec team and their developer counterparts. Touted as both a blessing and a curse for development and software security, there is no better time to ensure the enterprise security program is not just updated to accommodate the increased attack surface, but actively optimizing it for SDLC efficiency and cyber defense. 


    In particular, the advent of AI coding tools promising rapid code generation and supercharged productivity has enthralled developers, who have adopted the technology in droves, embracing it as the pair programming partner they have been sorely missing. However, the trade-off for speed is a significant uptick in AI-borne security risk, and using these tools without verified security skills is a recipe for disaster.

    World-class security leaders must rise to the occasion and lead proactive security programs that utilize all the tools available to them to reduce their attack surface. Developers have immense potential to be central to a defensive security strategy, and they can be enabled with the right knowledge to transform their approach to coding and shift to a security-first mindset. This revolution is vital as the use of AI coding tools grows, and critical thinking from the developer is a must to deploy them safely in their workflow.

    In this presentation, Dr. Matias Madou, will reveal, based on AI experiments and key research with CISOs, the critical pathways security leaders can take to execute incredible developer-focused training programs that reduce risk, shift negative security sentiment in the development cohort, and safely adapt AI technology, including:

    • Understanding comparisons between AI and human coding, what works, and what can affect enterprise security maturity.
    • Navigating AI data quality issues and establishing safe pair programming.
    • Developer upskilling, including benchmarking and growing key security skills with knowledge that leads to better risk mitigation.
    • How to establish a skills baseline among developers, and grow relevant competency quickly.
    • The pitfalls of AI vulnerability detection, and the skillset your developers must master to overcome hallucination, insecure code generation and misconfiguration.
  2. Presentation

    10:45 Threat Exposure Management (CTEM) - central processes in the SOC

    CTEM was coined by Gartner and describes permanent attack surface management, which goes far beyond simple vulnerability scans. According to Gartner, it is about ‘identifying, assessing, and mitigating vulnerabilities’. Moritz Degenkolb heads the Security Operations Centre (SOC) at AirITSystems and emphasised the central importance of CTEM in central SOC processes in his presentation. ‘I can defend architectures better if I know them’, describes his attitude to CTEM.  AirITSystems is committed to ‘fighting system breaches’ and consistently dovetails security architectures, operational processes and IT governance tasks. The experts will be available at the Cybersecurity Summit - also to share experiences from the field. The experts have special trade fair offers in the form of GAP analyses: for IT security, information security and data protection.

  3. Presentation

    11:00 FAST LTA Masterclass

  4. Presentation

    11:15 Concierge Day in the Life

    Arctic Wolf supports its customers by taking a unique approach to security operations, delivering security outcomes via the Concierge Security® delivery model. In presentation, we’ll introduce you to one of our Concierge Security model and share how our teams work together to help end cyber risk for your organization. We’ll also share some real examples of our world-class security engineers stepping in to protect our customers from cybersecurity threats.

  5. Presentation

    11:30 Cybersecurity dynamics 2025: Why XDR protects your organisation from the attack you don't see coming

  6. Presentation

    12:15 Netzlink & Fortinet Masterclass

  1. 12:45
     

    12:45 Lunch break

    Enjoy the food while making new contacts with visitors and exhibitors at the Cybersecurity Summit.

  1. 13:30
    Panel discussion

    Cybersecurity Summit Startup Awards - Part 2

    Here you can see innovative startups that present smart new solutions for digital innovations in IT security. The best three will receive a Cybersecurity Summit Startup Award - you vote!

  2. 14:30
    Panel discussion

    Cloud Security & Encryption

    What are the biggest security risks when using cloud services and how can successful companies minimize these risks? 

  3. 15:15
    Panel discussion

    IT-Security und Sustainability: Synergien und Herausforderungen

    What challenges and opportunities arise from the integration of sustainability goals into IT security measures?

  4. 16:00
     

    Speaker Awards Prizegiving

    The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

  5. 16:15
    Presentation

    Security in times of revolution

    We are living in times of revolution: driven by digitalisation, our world is changing faster and more profoundly than we can imagine. Digitalisation is one of the rare turning points in the history of our civilisation, and how we deal with it today will be decisive for the world in which generations of people after us will live. Join us on a journey through the past and present to better understand the future.

  1. Presentation

    13:30 Hunting The Adversary: Cross-Domain Visibility

    CrowdStrike and Serviceware join forces to show how modern attackers move laterally across IT, OT and cloud domains to expand access and permanently embed themselves in infrastructures. Kai Engel, Pre Sales Manager, and Haseeb Ahmad, Corporate Sales Engineer, will explain how companies can use cross-domain visibility to recognise attacks at an early stage, disrupt them in a targeted manner and contain them sustainably.

  2.  

    16:15 Speaker Awards Prizegiving

    The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

  1. Presentation

    13:30 Future-proof corporate strategies: control and resilience in a world full of risks

    Today more than ever, companies are under pressure to remain capable of acting in an increasingly unpredictable threat situation. The key lies in clear control over critical business processes and a resilient security strategy. In this presentation, you will learn how leading companies recognise risks at an early stage, manage them in a targeted manner and respond to incidents with the right technologies and structures. We will show practical approaches for building effective incident response plans, utilising threat intelligence and how you can anchor sustainable resilience in the digital age with vision and control.

  2.  

    16:15 Speaker Awards Prizegiving

    The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

  1. 17:00
     

    17:00 Networking & Drinks for all participants

  1. 18:00
     

    18:00 End of Cybersecurity Summit 2025

15th May 2025 Cybersecurity Summit Day 2

09:00

Welcome

Our doors open at 09:00 - so you can start networking at the first coffee and secure the best seat

10:00 MAIN STAGE:

Welcome!

Opening of the event with a warm welcome by the moderator.

10:15 MAIN STAGE:
Presentation

Mirror, mirror on the wall, who's the most secure in the land? - Fairytale cyber security culture in the lives of Max and Moritz

A question that concerns us all, especially in times of growing cyber threats. In this interactive presentation, Corinna Klempt and Annika Wägenbauer will take you on an exciting journey through the day-to-day work of Max, the CEO of a medium-sized company, and Moritz, its CISO. But instead of dry theory blocks, we will experience various scenarios together with the two actors that show how important a strong cyber security culture is for the success of a company. So you can look forward to a mixture of fairy tale and reality, in which Max and Moritz tip the scales in favour of a secure corporate environment not only in the virtual world, but also in everyday working life. We hope you have fun and gain valuable insights - and perhaps you will find yourself in one or two situations!

10:15 ZUGSPITZE MASTERCLASSES:
Presentation

Cyber resilience in the digital age

In the digital age, protecting sensitive data and maintaining critical systems and applications is of paramount importance. Zerto's Cyber Resilience Vault provides a comprehensive solution that protects organizations from ransomware attacks while meeting stringent data protection requirements.

The strategic approach combines near-synchronous data replication with isolated, immutable data storage and a zero-trust architecture, enabling rapid recovery in the event of a cyberattack - without disrupting ongoing operations.

10:30 ZUGSPITZE MASTERCLASSES:
Presentation

AI and cyber security: Between myth and reality - How companies can counter the new dangers

The cyber security risks posed by AI are increasing year on year, but as is so often the case, AI is a nebulous concept. Myths and half-truths haunt the public consciousness and it is difficult to assess the actual risks.
Manuel Reinsperger, researcher for the use of AI systems in offensive cyber security, pentester and cybersecurity consultant, provides clarity and reports on the current state of science.

What do such AI attacks look like, why is it no longer just about phishing, and how does this affect me as a company?

Find out about the latest findings from leading-edge research and learn from operational experience which risks will affect you in the coming years.

10:30 MATTERHORN MASTERCLASSES:
Presentation

Will developers become extinct? The impact of AI on the software security industry

CISOs and AppSec professionals are well accustomed to flexing with industry movements, whether it be in the form of new technology, emerging threats, or rapidly shifting regulatory and compliance environments. It’s certainly not easy, and generative AI exploding onto the scene has resulted in significant changes on the horizon for both the AppSec team and their developer counterparts. Touted as both a blessing and a curse for development and software security, there is no better time to ensure the enterprise security program is not just updated to accommodate the increased attack surface, but actively optimizing it for SDLC efficiency and cyber defense. 


In particular, the advent of AI coding tools promising rapid code generation and supercharged productivity has enthralled developers, who have adopted the technology in droves, embracing it as the pair programming partner they have been sorely missing. However, the trade-off for speed is a significant uptick in AI-borne security risk, and using these tools without verified security skills is a recipe for disaster.

World-class security leaders must rise to the occasion and lead proactive security programs that utilize all the tools available to them to reduce their attack surface. Developers have immense potential to be central to a defensive security strategy, and they can be enabled with the right knowledge to transform their approach to coding and shift to a security-first mindset. This revolution is vital as the use of AI coding tools grows, and critical thinking from the developer is a must to deploy them safely in their workflow.

In this presentation, Dr. Matias Madou, will reveal, based on AI experiments and key research with CISOs, the critical pathways security leaders can take to execute incredible developer-focused training programs that reduce risk, shift negative security sentiment in the development cohort, and safely adapt AI technology, including:

  • Understanding comparisons between AI and human coding, what works, and what can affect enterprise security maturity.
  • Navigating AI data quality issues and establishing safe pair programming.
  • Developer upskilling, including benchmarking and growing key security skills with knowledge that leads to better risk mitigation.
  • How to establish a skills baseline among developers, and grow relevant competency quickly.
  • The pitfalls of AI vulnerability detection, and the skillset your developers must master to overcome hallucination, insecure code generation and misconfiguration.
10:45 MATTERHORN MASTERCLASSES:
Presentation

Threat Exposure Management (CTEM) - central processes in the SOC

CTEM was coined by Gartner and describes permanent attack surface management, which goes far beyond simple vulnerability scans. According to Gartner, it is about ‘identifying, assessing, and mitigating vulnerabilities’. Moritz Degenkolb heads the Security Operations Centre (SOC) at AirITSystems and emphasised the central importance of CTEM in central SOC processes in his presentation. ‘I can defend architectures better if I know them’, describes his attitude to CTEM.  AirITSystems is committed to ‘fighting system breaches’ and consistently dovetails security architectures, operational processes and IT governance tasks. The experts will be available at the Cybersecurity Summit - also to share experiences from the field. The experts have special trade fair offers in the form of GAP analyses: for IT security, information security and data protection.

11:00 MAIN STAGE:
Panel discussion

Artificial intelligence in Cybersecurity

What role does artificial intelligence play in modern cyber security? 
How are AI-based solutions changing the way threats are detected and combated?

11:00 ZUGSPITZE MASTERCLASSES:
Presentation

The future of cybersecurity is Zero Trust!

Join us for a deep dive into today’s most pressing IT risks and discover how hackers operate during real-world cyberattacks.

What does the future hold? How will the threat landscape evolve over the next few years?

Find out how long it really takes to recover from a ransomware attack — and why.

Most importantly: Learn how to protect your organization permanently and efficiently, even against unknown and emerging cyber threats.

The presentation will be held in German.

11:00 MATTERHORN MASTERCLASSES:
Presentation

FAST LTA Masterclass

11:15 MATTERHORN MASTERCLASSES:
Presentation

Concierge Day in the Life

Arctic Wolf supports its customers by taking a unique approach to security operations, delivering security outcomes via the Concierge Security® delivery model. In presentation, we’ll introduce you to one of our Concierge Security model and share how our teams work together to help end cyber risk for your organization. We’ll also share some real examples of our world-class security engineers stepping in to protect our customers from cybersecurity threats.

11:30 ZUGSPITZE MASTERCLASSES:
Presentation

The human factor in cyber security

11:30 MATTERHORN MASTERCLASSES:
Presentation

Cybersecurity dynamics 2025: Why XDR protects your organisation from the attack you don't see coming

11:45 MAIN STAGE:
Presentation

Navigating uncertainty - AI in a Zero trust world

In today’s digital world, traditional data protection methods are insufficient. The shift from static defenses to dynamic approaches like Zero Trust—where everything is verified—reflects the growing complexity of securing valuable and ubiquitous data. Artificial intelligence (AI) offers both opportunities and risks for cybersecurity. To address these challenges, organizations must understand the evolution of security practices, the data dilemma, and AI’s role, while implementing robust measures, continuous monitoring, and regulatory compliance.

12:00 ZUGSPITZE MASTERCLASSES:
Presentation

No compromises - identity security without limits

Service accounts are a prime target for attackers—often unprotected, without MFA, and difficult to monitor. But there’s a solution: automatically discover, analyze, and secure your service accounts. Gain full visibility into all identities, reduce attack surfaces, and enforce security controls to stop lateral movement, ransomware, and other identity-based threats.

12:15 MAIN STAGE:
Presentation

Beyond the AI hype: where we really stand and what awaits us in terms of the cybersecurity industry

Tech analyst Philipp Klöckner explores the questions: Where do we really stand when it comes to artificial intelligence? What role can Europe play in this race for technological leadership? What is wishful thinking and what is already reality? And what do all these developments mean not only for each and every one of us, but also for our companies and our economy in general? 

12:15 ZUGSPITZE MASTERCLASSES:
Presentation

APTs on the Rise: How Hackers Target Smartphones to Breach Corporate Data

With the increasing use of mobile devices and text-based communication in the workplace, companies are facing heightened risks. Phishing attacks on smartphones have increased by 20% in the second half of 2024. These attacks do not only target smartphones themselves but, more importantly, the sensitive corporate data accessible through them.

Security experts from Lookout, the industry-leading solution for mobile endpoint security, explain:

  • How attackers’ tactics have evolved
  • Which attack vectors on smartphones are particularly vulnerable
  • New APT surveillanceware discoveries targeting organizations
12:15 MATTERHORN MASTERCLASSES:
Presentation

Netzlink & Fortinet Masterclass

12:45

Lunch break

Enjoy the food while making new contacts with visitors and exhibitors at the Cybersecurity Summit.

13:30 MAIN STAGE:
Panel discussion

Cybersecurity Summit Startup Awards - Part 2

Here you can see innovative startups that present smart new solutions for digital innovations in IT security. The best three will receive a Cybersecurity Summit Startup Award - you vote!

13:30 ZUGSPITZE MASTERCLASSES:
Presentation

Hunting The Adversary: Cross-Domain Visibility

CrowdStrike and Serviceware join forces to show how modern attackers move laterally across IT, OT and cloud domains to expand access and permanently embed themselves in infrastructures. Kai Engel, Pre Sales Manager, and Haseeb Ahmad, Corporate Sales Engineer, will explain how companies can use cross-domain visibility to recognise attacks at an early stage, disrupt them in a targeted manner and contain them sustainably.

13:30 MATTERHORN MASTERCLASSES:
Presentation

Future-proof corporate strategies: control and resilience in a world full of risks

Today more than ever, companies are under pressure to remain capable of acting in an increasingly unpredictable threat situation. The key lies in clear control over critical business processes and a resilient security strategy. In this presentation, you will learn how leading companies recognise risks at an early stage, manage them in a targeted manner and respond to incidents with the right technologies and structures. We will show practical approaches for building effective incident response plans, utilising threat intelligence and how you can anchor sustainable resilience in the digital age with vision and control.

14:30 MAIN STAGE:
Panel discussion

Cloud Security & Encryption

What are the biggest security risks when using cloud services and how can successful companies minimize these risks? 

15:15 MAIN STAGE:
Panel discussion

IT-Security und Sustainability: Synergien und Herausforderungen

What challenges and opportunities arise from the integration of sustainability goals into IT security measures?

16:00 MAIN STAGE:

Speaker Awards Prizegiving

The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

16:15 MAIN STAGE:
Presentation

Security in times of revolution

We are living in times of revolution: driven by digitalisation, our world is changing faster and more profoundly than we can imagine. Digitalisation is one of the rare turning points in the history of our civilisation, and how we deal with it today will be decisive for the world in which generations of people after us will live. Join us on a journey through the past and present to better understand the future.

16:15 ZUGSPITZE MASTERCLASSES:

Speaker Awards Prizegiving

The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

16:15 MATTERHORN MASTERCLASSES:

Speaker Awards Prizegiving

The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.

17:00

Networking & Drinks for all participants

18:00

End of Cybersecurity Summit 2025