-
MAIN STAGE
-
ZUGSPITZE Masterclasses
-
MATTERHORN Masterclasses
-
08:30
-
09:15
-
09:30Fireside Chat
Digital sovereignty & cyberwarfare
How geopolitical tensions are changing security architectures - and why ransomware has long been part of global power games.
Presentation:
Sandra Heger
NISHS.NRW / Universität Siegen
-
10:00Presentation
2035: How Much Humanity Can the Future Handle?
Digitalization and automation are advancing rapidly. Janszky presents a future in which we live better, healthier, and longer lives – but only if we embrace these developments. All these great promises will only come true if we accept that, in many areas, computers can act more effectively than we humans can, says Janszky.
Presentation:
Nona Brodersen
Trailblazer Summits Moderation
-
10:45
-
11:00Presentation
PLAY TO PROTECT: How we can master cybersecurity through play
Security is not a state, but a mindset. And that can be trained. What the Hack! introduces the concept behind serious gaming and shows how we can make ourselves cyber-resilient through play. In an interactive 20-minute game against hackers, we activate the collective knowledge of the audience. Experience live how serious gaming turns your users into a human firewall.
Presentation:
Nona Brodersen
Trailblazer Summits Moderation
-
11:30Fireside Chat
Sovereign Cloud Under Attack
Europe’s path toward digital sovereignty is colliding with a new reality. Cyberattacks are increasingly shifting into API driven, multi cloud environments. This panel explores how organizations can combine data sovereignty, compliance and modern cloud security to stay protected.
Presentation:
Isabelle Ewald
BDO
-
12:00Presentation
Hacked! 72 hours of a CISOs nightmare
A ransomware attack! How should you respond?
In this turn-based tabletop simulation, participants take on the role of the CISO and must make decisions that will influence the course of events.
Can you minimize the damage as much as possible?
• Turn-based simulation of a ransomware attack
• Interactive involvement of participants
• Teaching best practices for crisis management
• What are the responsibilities of the board, CIO, head of communications, etc. – lessons learned from real-world experience
Presentation:
Nona Brodersen
Trailblazer Summits Moderation
-
Presentation
10:00 Masterclass Keeper Security
Presentation:
Lisa Winkler
Trailblazer Summits Moderation
-
Presentation
11:00 The Next Wave of Cyberattacks Is Coming – Are Your Endpoints Ready? - Old but still dangerous: Log4Shell, PrintNightmare, and others as a blueprint for defending against tomorrow's cyberattacks
Well-known vulnerabilities, such as Log4Shell and PrintNightmare, impressively demonstrate what we can learn from previous attacks for tomorrow's cyber defense.
Key topics:
- Zero Days in Reality Check: What known exploits reveal about today's threats.
- When vulnerabilities collide: Understanding combined attack scenarios.
- Structured endpoint management: Inventory, analyze, patch.
- Unified endpoint management: Simplify processes, reduce risks, secure standards.
- Blueprint for sustainable resilience: Which measures are crucial now?
Presentation:
Lisa Winkler
Trailblazer Summits Moderation
-
Presentation
12:00 The Power of Transparency: Identify and Reduce Attack Surfaces
- Eliminating Shadow IT: How Modern Exposure Management Uncovers Hidden Systems and Reduces Risk
- Breaking Down Silos: Why a Centralized, Holistic Approach Is Key to Attack Surface Reduction
- Automated Security: Detecting Threats Early and Enabling Proactive Action
Presentation:
Lisa Winkler
Trailblazer Summits Moderation
-
14:00Presentation
Cybersecurity Summit Startup Awards Part 1
Here you can see innovative startups that present clever new solutions for digital innovations in IT security.
The best three will receive a Cybersecurity Summit Startup Award - you vote!Presentation:
Nona Brodersen
Trailblazer Summits Moderation
-
14:45Presentation
‘CISO: Criminally Involved Security Officer?’ When responsibility becomes personal in the age of information security.
In this keynote speech, you – as a CISO or responsible manager – will learn how and why you personally can be held criminally liable, based on practical examples from consulting. You will also receive specific advice on basic rules of conduct that can be used to avoid or effectively limit liability risks.
Presentation:
Nona Brodersen
Trailblazer Summits Moderation
-
15:15
-
15:45Panel discussion
Human Risk Factor
Firewalls, AI and zero trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords! Firewalls, AI and Zero Trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords!
Dennis Buroh
Minimax
Luna-Marika Dahl
E.ON Digital Technology
Sandra Heger
NISHS.NRW / Universität Siegen
Kari-Ann Mentoft-Pommer
Schnellecke Logistics
Patricia Köpfer
Schwarz
Presentation:
Lisa Fröhlich
Women4Cyber Germany / Link11
-
16:30Panel discussion
sector update: energy, finance, health
20-minute CISO talk on current challenges in the relevant sector
Presentation:
Isabelle Ewald
BDO
-
17:30Panel discussion
Future of the SOC: internal vs. MSSP
To what extent has the shortage of skilled workers already become a security risk?
What targeted measures can be taken to attract and promote more women in cybersecurity?
Benjamin Pätzoldt
Zentrum für Cybersicherheit der Bundeswehr
Mike Zimmermann
Universitätsklinikum Carl Gustav Carus
Lisa Fröhlich
Women4Cyber Germany / Link11
Hendrik Janßen
Biotronik
Presentation:
Dr. Georgia Papaioannou
Microsoft
-
18:00
Main Stage Speaker Awards Ceremony
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
App-DownloadPresentation:
Nona Brodersen
Trailblazer Summits Moderation
-
Presentation
14:00 Attacks on current and future technologies
IT is everywhere. The amount of connections among IT components increases explosively and thus the attack surface extends severely. Isn’t that the exact scenario hackers have always been dreaming of? Founder and CEO of SySS GmbH Sebastian Schreiber is going to demonstrate a speed hacking live on stage. He is going to show how easy and fast the latest wireless alarm systems, electronic locking systems, and wireless presenters, as well as fingerprint secure USB can be hacked. He is also going to show how easily SMS can be faked and thermostat-regulated IoT devices be manipulated.
Presentation:
Lisa Winkler
Trailblazer Summits Moderation
-
Presentation
16:00 Masterclass: A1 Digital
Presentation:
Lisa Winkler
Trailblazer Summits Moderation
-
18:30 Cybersecurity Summit Awards Ceremony 2026
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
App-DownloadPresentation:
Lisa Winkler
Trailblazer Summits Moderation
-
Presentation
14:00 AI Everything: The AI's Double Game – Weapon of the Attackers & Shield of the Defenders
Artificial intelligence plays a dual role in the IT security landscape – as an increasingly sophisticated attack tool and as an indispensable defensive instrument.
Vendors are outdoing each other in promoting their AI features, but in practice, they face a complex challenge that can be summarized in one question: How can AI be meaningfully integrated into existing security architectures without creating vendor lock-ins or losing control?
As a technology-agnostic service provider, avodaq demonstrates how AI-powered detection, intelligent orchestration, and adaptive response systems can be integrated into heterogeneous environments.
The impact of AI on software supply chain security is also steadily increasing. Software is being written by LLMs (Limited Librarians) and is also being used to automatically answer queries.
Expertise in selecting and evaluating LLMs is therefore becoming just as important as the potentially necessary sovereign operation of AI infrastructures.
Together we will find the right AI solutions for you, ensuring you are well-positioned for the future.
Presentation:
Susan Zare
Trailblazer Summits Moderation
-
Presentation
15:45 Masterclass: DIU & beta systems
Presentation:
Susan Zare
Trailblazer Summits Moderation
-
18:30 Cybersecurity Summit Awards Ceremony 2026
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
App-Download.Presentation:
Susan Zare
Trailblazer Summits Moderation