-
MAIN STAGE
-
ZUGSPITZE Masterclasses
-
MATTERHORN Masterclasses
-
08:30
-
09:15Presentation
Welcome!
Opening of the event with a warm welcome from the organizers.
Presentation:
Inken März Cybersecurity Summit
-
09:30Presentation
Keynote: Keynote: Global perspective on emerging cyber threats and risks
Cyber risk and threats is a concern for national security and critical infrastructure. Across the world, various regions, countries and organisations are facing into geopolitical situational risks, wave of regulatory shifts and speed of new technological developments.
In this interactive and unique storytelling session, you will understand how the cyber risk and threats ranks compared to other global risks. Then we will deep dive into 5 regions covering insights from 10 countries on the latest cyber threat and risks focussing on what the threat and risk is, as well as understanding what the drivers are. Lastly you will walk away with 5 practical actionable steps you can take back for shaping your cyber strategy, enterprise risk management reporting to Board and implementation in your organisation.
Presentation:
Inken März Cybersecurity Summit
-
10:00
-
10:30Presentation
Through the cyber jungle: taming black swans, grey rhinos and information security risks
Discover how to navigate the cyber jungle and elevate your risk management to the next level. In this engaging presentation, you'll learn what "Black Swans" and "Grey Rhinos" are all about. Get inspired and take away valuable insights for your daily risk management!
Presentation:
Inken März Cybersecurity Summit
-
11:00Panel discussion
The future of Cybersecurity
IT security experts discuss the latest strategies in cybersecurity. What measures need to be taken for successful cybersecurity?
What are the main requirements that the NIS 2 directive places on companies and how do they differ from the previous requirements?Katia Winkler Zürich Gruppe Deutschland
Alexandros Manakos ISC2 Germany
Dennis Pokupec Creditplus Bank
Johannes Steger Verlag der Tagesspiegel
Martin Brünn ADVANCED Systemhaus GmbH
Presentation:
Nico Freitag Cybersecurity ist Chefsache
-
11:45Panel discussion
Women in Cybersecurity: strategies to combat the skills shortage
To what extent has the shortage of skilled workers already become a security risk?
What targeted measures can be taken to attract and promote more women in cybersecurity?Vicky Sorge Kaufland e-commerce
Dennis Buroh Minimax
Janine Rauch Schnellecke Logistics
Chris Müller Ratepay
Isabel Höhn Cybersecurity ist Chefsache
Presentation:
Susann Bartels The Strongest Link
-
Presentation
10:00 Why vulnerability management should be at the heart of your cybersecurity strategy
It is often said that humans are the biggest vulnerability in IT security - but data shows that vulnerabilities pose a comparable or even greater risk. This presentation highlights the central importance of consistent patch and vulnerability management in today's ever-changing threat landscape. We'll highlight the key challenges organizations face and best practices for implementing end-to-end automated vulnerability management that increases security efficiency and minimizes the attack surface.
Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
11:00 Ransomware Tales
Beyond the alarming headlines and increasing financial consequences, the prevalence of malicious or weaponized software lurks as an everyday risk. Join Seamus Lennon, VP of Operations EMEA of ThreatLocker for a deep look at the evolution of ransomware. We'll explore the real stories of rogue code, the impact of an attack, and how you can protect your organization today.
Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
11:30 Detection by Deception - the efficient Intrusion Detection. A success story.
The central element in intrusion detection is the detection of anomalies:
- A user account suddenly performs actions that do not correspond to its usual tasks. Is it really the employee who is behind this? Or is it another person who is misusing their account?
- A system, process or application suddenly sends data to unknown destinations. Is this intentional?
- Access to the central system and user directory (e.g. Active Directory) is increasing. What is behind this?
Recognizing this on productive systems is difficult and often involves false alarms. The additional provision of IT systems and data as sensors, which are not exposed to a productive load, simplifies and accelerates intrusion detection considerably with reliable alarms.
In this presentation, we will show how Cybersense implements this as an MDR and what successes we achieve with it.Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
12:00 Cyber security in action: interplay of governance & managed detection
Cyber attacks have long been a reality. The decisive factor is how companies react to them. In this masterclass, DIGITALL and Grant Thornton will jointly examine the cyber security lifecycle from two perspectives: preventive governance & compliance meets managed security services. Using practical examples, we will show how this interaction works in reality and which success factors make the difference.
Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
10:15 Airbus Protect - Mastering intelligence-led security operations
During the Masterclass we will explore the critical role of Threat Intelligence as a Managed Security Service Provider (MSSP) in the evolving landscape of cybersecurity. It will provide insights into the latest mission-driven methodologies in information collection, examining how we as an MSSP can proactively defend against emerging threats. This session offers valuable perspectives on intelligence-led security operations.
Presentation:
Sandra Balz kiwiko eG
-
Presentation
11:00 Cybercrime & Cyberwar
In today's digital world, companies are increasingly falling victim to ransomware attacks. In these attacks, criminals gain access to company data, encrypt it and demand a ransom payment to release the data. This poses a serious threat that goes far beyond the mere loss of business-critical information. Attackers are now also threatening to expose confidential data, which puts additional pressure on affected companies.
Such security incidents not only lead to considerable financial losses, but also to massive reputational damage. In addition, there are often severe fines under the General Data Protection Regulation (GDPR), which can be imposed if personal data is not adequately protected.
In this Masterclass, we will discuss the effects of ransomware attacks and possible strategies for protection and damage limitation. Find out how you can better protect your company against attacks and what measures should be taken in an emergency to minimise the damage and secure your data.Presentation:
Sandra Balz kiwiko eG
-
Presentation
11:15 Prioritising real risks by combining developer security & AI-supported cloud security. How organisations can benefit from the advantages of AI-powered cloud security from development to runtime.
Staying one step ahead of threats requires real-time visibility and intelligent prioritisation. Learn how SentinelOne's Singularity Cloud Workload Security solution for real-time threat detection and response integrates with Snyk to enable developers to secure applications from code to cloud.
Together, Snyk and SentinelOne provide organisations with a comprehensive view of risk across their entire application portfolio, prioritised by real-world vulnerability and runtime context.Presentation:
Sandra Balz kiwiko eG
-
Presentation
11:45 Intelligent security: How AI and platform strategies with Cisco & XM minimise cyber risks
Cyber threats are constantly evolving - companies therefore need a smart and proactive security proactive security strategy. This presentation shows how the AI-powered Cisco Security Platform and Continuous Threat Exposure Management with XM Cyber help to detect vulnerabilities early and prevent attacks. Find out how an intelligent, platform-based security architecture makes your company more resilient and reduces risks in the long term.
Presentation:
Sandra Balz kiwiko eG
-
Presentation
12:15 ORC4 Genetic AI
As a speaker at the Cybersecurity Summit 2025 in Hamburg, I will be presenting the revolutionary possibilities of ORC4 Genetic AI. In my masterclass, I will show how this self-learning security solution reacts dynamically to new threats, prevents zero-day attacks and takes cyber defence to a new level. Experience how Genetic AI is shaping the future of cyber security.
Presentation:
Sandra Balz kiwiko eG
-
12:30
-
14:00Panel discussion
Cybersecurity Summit Startup Awards - Part 1
You will see innovative startups presenting their clever new solutions in the cybersecurity business. The best three will receive a Cybersecurity Summit Startup Award – you decide!
Alexander Subbotin ByteSnipers
Roman Kuznetsov Systola
Stefan Steinberg RedMimicry
Dominik Tomek Binary Bunker
Richard Ranftl SIGN8
Simon Holl MindBytes
Matthias Roehr aDvens
Mia Neethling aikido
Presentation:
Inken März Cybersecurity Summit
-
14:45Panel discussion
Ransomware: prevention and response strategies
How can companies respond to the challenges of ransomware attacks and protect themselves against them?
How can zero-trust architectures help?Maria Kober Barmer
Dr. Tim Sattler Jungheinrich
Prof. Dr. Ronny Bodach Hochschule Mittweida
Janka Kreißl Dunkelblau
Stefan Pilarczyk Cyberwald
Presentation:
Sandra Heger NISHS.NRW / Universität Siegen
-
Presentation
14:00 Hackers love on-prem! Why cloud security is the real game changer
Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
14:15 The Future of Hacking: Attacks on current and future technologies
IT is everywhere these days. The number of connections between IT components is exploding and the attack surface is increasing massively as a result. Isn't this exactly the scenario that hackers have always dreamed of?
Sebastian Schreiber, founder and CEO of the IT security company SySS GmbH, demonstrates in a live hacking session how IT networks can be taken over, passwords cracked, anti-virus programs bypassed and data extracted. He will demonstrate how easily and quickly current wireless alarm systems, locking systems and wireless presenters, as well as fingerprint-protected USB sticks, can be hacked. He also shows how paywalls can be outwitted and how household and other IoT devices can be manipulated by hacking thermostats.Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
14:45 Now or never: dotBrands as a safe harbour for your domains
Find out in our masterclass what advantages a dotBrand has from an IT security perspective, how you can increase the trust of your customers and users, create the best conditions for the strategic growth of your company and demonstrate your market leadership to the outside world by taking advantage of the unique opportunity in 2025/2026 to apply to ICANN for a top level domain with your company name.
Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
15:00 A day in the life of a file
Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
14:00 From cost factor to business enabler - repositioning cyber security
How does cyber security go from being necessary to strategic?
This presentation is about the transformation from isolated IT security to a company-wide business process. With a holistic view of continuity, posture and threat, it will show how security actively contributes to value creation. Automation, AI and modern detection strategies ensure agility and efficiency. This turns cyber security into a central control element.
Presentation:
Sandra Balz kiwiko eG
-
Presentation
14:30 Current trends and strategies for digital workplaces
Bernhard Dunst from Pointsharp highlights key trends such as the return to on-premises and the growing importance of zero trust in the face of increasing and serious phishing attacks. He provides companies with practical strategies on how they can counter these threats, secure their digital workplace holistically and thus strengthen their resilience to current challenges. Specific use cases from identity and access management will be presented.
Presentation:
Sandra Balz kiwiko eG
-
Presentation
15:00 Complex, expensive, ineffective? - Efficiency as the key to cyber defence
Establishing a functioning cybersecurity system is an important investment that secures a company's existence.
Despite numerous tools and measures, companies are increasingly falling victim to attacks. Why is that? Because protection is often provided in the wrong places - and because many solutions are effective but not efficient.
In this masterclass, Paul Werther (CTO, greenhats) and Giovanni Serpi (CEO, INS Systems) show how modern companies can make their security strategy not only effective but also efficient.
Learn how to do the right thing right in the future. With a clear focus on the real threats, with intelligent orchestration and thus with targeted use of resources.
In this way, you can strengthen your company's resilience, reduce the burden on your IT and cut costs.
The solutions presented are based on the most common and critical vulnerabilities identified in the course of white hacking - practical, proven and immediately realisable.Ideal for IT managers, CISOs and decision-makers who take a pragmatic approach to security.
Presentation:
Sandra Balz kiwiko eG
-
15:30
-
16:00Presentation
Synergies between humans and AI: a critical look into the future of cybersecurity
In this keynote, we highlight the growing collaboration between human expertise and artificial intelligence in the field of cybersecurity. We discuss both the opportunities and challenges arising from this synergy and analyze how this collaboration can impact the future of digital security. We also take a critical look at ethical issues and the need to continuously develop both technical and human capabilities to withstand ever-changing threats.
Presentation:
Inken März Cybersecurity Summit
-
16:30Panel discussion
Security awareness in Cybersecurity
What effective methods and tools can be used to raise awareness of cyber security in companies?
What exciting challenges and opportunities does this present?Andrea Hornung PwC
Alina Obermann-Smith Aroundtown
Hendrik Janßen Bauer Media Group
Noèl Funke Hackers4Good
Martin Hampel EY-Parthenon
Presentation:
Susann Bartels The Strongest Link
-
17:15Presentation
Navigating Enterprise Security in the Cloud: Overcoming Todays Challenges
In this keynote, we will explore the evolving landscape of cloud security and the critical strategies enterprises must adopt to safeguard their digital assets. As organizations increasingly migrate to the cloud, they face a myriad of security threats and compliance issues. This session will delve into the latest trends in cloud security, identify common vulnerabilities, and provide actionable insights on how to mitigate risks. Attendees will gain a deeper understanding of best practices for securing cloud environments, the importance of a robust security framework, and how to stay ahead of emerging threats.
Presentation:
Inken März Cybersecurity Summit
-
17:45
Speaker Awards Prizegiving
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
Presentation:
Inken März Cybersecurity Summit
-
Presentation
15:45 Predicting threats with AI - rethinking cyber security
Risk management in cyber security poses particular challenges. Assessing the probability of occurrence and potential impact is often difficult. Artificial intelligence opens up new possibilities that facilitate the management of cyber security risks and strategic planning. How will AI revolutionise risk management in cyber security? We talk about new possibilities and potentials.
Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
16:15 Cyber defence made in Germany - digital resilience and maximum data sovereigntys
State-sponsored attackers are increasingly targeting high-tech companies, operators of critical infrastructures and the innovation centres of the economy.
In this masterclass, we will shed light on how professional attackers proceed, which patterns can be recognised early on and which IT security strategies have proven themselves in practice - based on findings from cooperation with over 60 security authorities.
You will also learn why the origin and independence of German providers are crucial for trustworthy and resilient cybersecurity.
Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
16:45 From Complexity to Clarity: Understanding your Software Product Health
In this masterclass we will first give an overview of the challenges in assessing and communicating the current state of a software product to different stakeholder. Therefore, we introduce the term of software product health, an aggregation of information about a product’s security, quality, sustainability, and compliance. Afterwards, we show how we have built the Software Product Health Assistant (SPHA) as an open-source tool to automatically assess a product’s health score and communicate it effectively to decision-makers while enabling developers to act upon the score.
Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
17:30 Speaker Awards Prizegiving
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
Presentation:
Nona Brodersen Cybersecurity Summit Moderation
-
Presentation
15:45 Threat Intelligence Report: Trends and defence strategies for CISOs
In this presentation, the latest findings from the Ontinue Threat Intelligence Report will be presented. The focus will be on the rapid rise in ransomware attacks and the changes in ransom demands as well as the threatening increase in vishing attacks, supported by GenAI technologies. Find out how hackers are adapting their tactics and what practical measures companies need to take to optimise their cyber defences.
Presentation:
Sandra Balz kiwiko eG
-
Presentation
16:15 Clickbait vs. reality: the cyber threats you should really be worried about
Als Managed Security Service Provider sichern wir bei glueckkanja über 1 Mio Entities in 52 Ländern bei diversen kritischen europäischen Firmen ab und erleben jeden Tag welche Angriffe stattfinden und welche Gegenmaßnahmen sowohl proaktiv als auch reaktiv sinnvoll sind.
Lassen sie uns einen Blick auf ein paar repräsentative Fälle aus der letzten Zeit werfen und über die sich aus diesen Vorfällen abgeleiteten notwendigen Maßnahmen sprechen. Unserer Erfahrung nach gibt es hier eine hohe Schnittmenge aller Unternehmen und wir können mit unseren Services schnell das Fundament stabilisieren, um anschließend zusammen in einen kontinuierlichen Verbesserungsprozess einzusteigen.
Presentation:
Sandra Balz kiwiko eG
-
Presentation
16:45 SECURITY-OUT-OF-THE-BOX: Users are unique. Security should be too.
Security, risk and compliance are often complicated and one of the biggest challenges in cyber security is effectively managing the attack surface. Traditional attack surface management and endpoint security tools rely on static, generic, or role-based policies. 60% of organizations struggle to keep up with changing compliance requirements. 67% of companies have seen an increase in their attack surface in the last two years. Sound familiar? Move to proactively manage risk, achieve compliance with ease and focus on growth.
Presentation:
Sandra Balz kiwiko eG
-
17:30 Speaker Awards Prizegiving
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
Presentation:
Sandra Balz kiwiko eG