-
MAIN STAGEHosted by:
Nona Brodersen
-
ZUGSPITZE MasterclassesHosted by:
Lisa Winkler
-
MATTERHORN MasterclassesHosted by:
Susan Zare
-
08:30
-
09:15
-
09:30Presentation
2035: How Much Humanity Can the Future Handle?
Digitalization and automation are advancing rapidly. Janszky presents a future in which we live better, healthier, and longer lives – but only if we embrace these developments. All these great promises will only come true if we accept that, in many areas, computers can act more effectively than we humans can, says Janszky.
-
10:15Fireside Chat
Digital sovereignty & cyberwarfare
How geopolitical tensions are changing security architectures - and why ransomware has long been part of global power games.
Presentation:
Sandra Heger
NISHS.NRW / Universität Siegen
-
10:45
-
11:00Presentation
PLAY TO PROTECT: How we can master cybersecurity through play
Security is not a state, but a mindset. And that can be trained. What the Hack! introduces the concept behind serious gaming and shows how we can make ourselves cyber-resilient through play. In an interactive 20-minute game against hackers, we activate the collective knowledge of the audience. Experience live how serious gaming turns your users into a human firewall.
-
11:30Fireside Chat
Sovereign Cloud Under Attack
Europe’s path toward digital sovereignty is colliding with a new reality. Cyberattacks are increasingly shifting into API driven, multi cloud environments. This panel explores how organizations can combine data sovereignty, compliance and modern cloud security to stay protected.
Dr. Viktoria Schmittmann
Zuhorn & Partner Rechtsanwälte
Harald Joos
Deutsche Rentenversicherung Bund
Presentation:
Isabelle Ewald
BDO
-
12:00Presentation
Hacked! 72 hours of a CISOs nightmare
A ransomware attack! How should you respond?
In this turn-based tabletop simulation, participants take on the role of the CISO and must make decisions that will influence the course of events.
Can you minimize the damage as much as possible?
• Turn-based simulation of a ransomware attack
• Interactive involvement of participants
• Teaching best practices for crisis management
• What are the responsibilities of the board, CIO, head of communications, etc. – lessons learned from real-world experience
-
Presentation
10:00 Securing Your Network with Zero-Trust
This presentation examines why the traditional layered defense model is no longer sufficient in today’s threat landscape.
With attackers increasingly targeting privileged credentials and exploiting gaps created by fragmented tools, organisations must shift to a security framework built on zero-trust and zero knowledge.
This session explains how continuous authentication, least-privilege access, and device-level encryption prevent unauthorized movement across networks, and why zero-trust is critical for protecting sensitive data.
-
Presentation
11:00 The Next Wave of Cyberattacks Is Coming – Are Your Endpoints Ready? - Old but still dangerous: Log4Shell, PrintNightmare, and others as a blueprint for defending against tomorrow's cyberattacks
Well-known vulnerabilities, such as Log4Shell and PrintNightmare, impressively demonstrate what we can learn from previous attacks for tomorrow's cyber defense.
Key topics:
- Zero Days in Reality Check: What known exploits reveal about today's threats.
- When vulnerabilities collide: Understanding combined attack scenarios.
- Structured endpoint management: Inventory, analyze, patch.
- Unified endpoint management: Simplify processes, reduce risks, secure standards.
- Blueprint for sustainable resilience: Which measures are crucial now?
-
Presentation
12:00 The Power of Transparency: Identify and Reduce Attack Surfaces
- Eliminating Shadow IT: How Modern Exposure Management Uncovers Hidden Systems and Reduces Risk
- Breaking Down Silos: Why a Centralized, Holistic Approach Is Key to Attack Surface Reduction
- Automated Security: Detecting Threats Early and Enabling Proactive Action
-
Presentation
10:45 Trends in Cyber Threat Scenarios – Why AI in the SOC Is More Important Than Ever
- The Evolution of Hackers: New methods, tactics, and technologies
- Current Attack Trends: From ransomware to AI‑driven attacks
- Real Threats, Real Response: Insights from real‑world SOC operations
- Agentic AI in the SOC: How modern AI helps proactively defend against today’s threats
- The Evolution of Hackers: New methods, tactics, and technologies
-
14:00
-
14:45Presentation
‘CISO: Criminally Involved Security Officer?’ When responsibility becomes personal in the age of information security.
In this keynote speech, you – as a CISO or responsible manager – will learn how and why you personally can be held criminally liable, based on practical examples from consulting. You will also receive specific advice on basic rules of conduct that can be used to avoid or effectively limit liability risks.
-
15:15
-
15:45Panel discussion
Human Risk Factor
Firewalls, AI and zero trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords! Firewalls, AI and Zero Trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords!
Dennis Buroh
Minimax
Sandra Heger
NISHS.NRW / Universität Siegen
Kari-Ann Mentoft-Pommer
Schnellecke Logistics
Dr. Patricia Köpfer
Schwarz Digits
Mike Zimmermann
Universitätsklinikum Carl Gustav Carus
Presentation:
Lisa Fröhlich
Women4Cyber Germany / Link11
-
16:30Panel discussion
sector update: energy, finance, health
20-minute CISO talk on current challenges in the relevant sector
Presentation:
Isabelle Ewald
BDO
-
17:30Panel discussion
Future of the SOC: internal vs. MSSP
To what extent has the shortage of skilled workers already become a security risk?
What targeted measures can be taken to attract and promote more women in cybersecurity?
Benjamin Pätzoldt
Zentrum für Cybersicherheit der Bundeswehr
Lisa Fröhlich
Women4Cyber Germany / Link11
Hendrik Janßen
Biotronik
Matthias Wyss
BWI
Gül Sabab
Emschergenossenschaft / Lippeverband
Presentation:
Dr. Georgia Papaioannou
Microsoft
-
18:15
Main Stage Speaker Awards Ceremony
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
App-Download
-
Presentation
14:00 Attacks on current and future technologies
IT is everywhere. The amount of connections among IT components increases explosively and thus the attack surface extends severely. Isn’t that the exact scenario hackers have always been dreaming of? Founder and CEO of SySS GmbH Sebastian Schreiber is going to demonstrate a speed hacking live on stage. He is going to show how easy and fast the latest wireless alarm systems, electronic locking systems, and wireless presenters, as well as fingerprint secure USB can be hacked. He is also going to show how easily SMS can be faked and thermostat-regulated IoT devices be manipulated.
-
Presentation
15:00 AI Based attacks, the big shift. Ransomware resilience in 2026 and onwards
How is AI reshaping cyber defense—and ransomware specifically? This keynote explores both sides of the equation. We examine the rapidly evolving ransomware threat landscape and the critical shifts required in both our security tools and our mindset. As AI-powered attacks emerge, traditional approaches are no longer sufficient. Drawing on insights from the Halcyon Ransomware Research Center, we'll outline what's ahead—and how defenders can proactively build resilience against tomorrow's threats.
-
Presentation
16:00 No Data Leaks Allowed: Mastering EASM with Private Cloud LLMs
As external attack surfaces expand, traditional EASM (External Attack Surface Management) tools are creating an overwhelming amount of noise and alert fatigue. Artificial Intelligence offers a clear solution to analyze, contextualize, and prioritize these findings. However, sending sensitive infrastructure and vulnerability data to public LLM APIs introduces an unacceptable security risk.
This presentation explores the powerful fusion of open-source EASM and sovereign AI. We will dive into how to build a highly automated, privacy-first reconnaissance pipeline using modern open-source tools like Openclaw and Hexstrike-AI. Crucially, we will demonstrate how to power this ecosystem using open-source LLMs hosted entirely on a private European cloud (Exoscale) as the inference provider.
-
Presentation
16:30 Need for Speed: Narrowing the Attackers’ Lead with an Adaptive Security Culture.
While many awareness programs are still based on static, generic scenarios, attack techniques today are evolving at AI speed. This discrepancy creates a dangerous gap between training and real-world threats.
Jungheinrich has firsthand experience with just how precise and dangerous modern attackers are: In this masterclass, Christian Reinhardt and Sebastian Graeber discuss real-life deepfake attacks and the insights gained from them.
Together, they take a behind-the-scenes look at real-world practice: Drawing on psychological insights and Jungheinrich’s concrete experiences, they demonstrate how security culture can be dynamically shaped and adapted in real time to current attack patterns. Because in today’s threat landscape, speed simply means security.
-
Presentation
17:00 The growing role of artificial intelligence for greater automation and efficiency in the SOC
Problem statement
Security operations centres are under increasing pressure: the
attack surface is growing, threats are becoming more extensive, while resources
and budgets remain limited. CISOs must master three critical areas simultaneously
:
Strategic visibility: understanding the threat landscape and
risk development
Operational excellence: optimising monitoring, responsiveness and
security levels
Tactical effectiveness: Rapid detection and containment of current incidents
The key question is: How can SecOps performance be improved while
realising the principle of ‘doing more with less’?
Five critical shortcomings of conventional SOC solutions
The presentation identifies fundamental weaknesses in existing approaches:
1. Speed: Slow data queries lead to delayed
threat detection
2. Data range: Limited historical analyses restrict threat hunting
3. Complexity: High barriers to entry due to complex query languages and
training requirements
4. Robustness: Inadequate incident response and disaster recovery processes
5. Intelligence gap: Threat indicators are not systematically correlated
and utilised
These shortcomings require a fundamentally new approach to cyber security.
AI as a solution componentArtificial intelligence systematically addresses all identified vulnerabilities:
Data processing: AI searches petabytes in seconds instead of minutes.
Historical analysis: Multiple years of data become fully accessible.
User-friendliness: Natural language replaces complex query syntax.
Proactive security: Continuous, intelligence-driven threat hunting.
Automation: Rapid correlation, contextualisation and
recommended actions.
This anomaly architecture provides unified visibility across security and IT
operations, accelerates decision-making, automates
routine tasks and ensures continuous adaptation to new
threat patterns.
Strategic benefits
AI integration enables SOC teams to move from reactive alert handling to
proactive threat management. The platform dynamically reduces the
attack surface, contextualises observations with global threat
intelligence and enables precise, rapid countermeasures – while
remaining cost-effective and scalable. -
18:30 Cybersecurity Summit Awards Ceremony 2026
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
App-Download
-
Presentation
14:00 AI Everything: The AI's Double Game – Weapon of the Attackers & Shield of the Defenders
Artificial intelligence plays a dual role in the IT security landscape – as an increasingly sophisticated attack tool and as an indispensable defensive instrument.
Vendors are outdoing each other in promoting their AI features, but in practice, they face a complex challenge that can be summarized in one question: How can AI be meaningfully integrated into existing security architectures without creating vendor lock-ins or losing control?
As a technology-agnostic service provider, avodaq demonstrates how AI-powered detection, intelligent orchestration, and adaptive response systems can be integrated into heterogeneous environments.
The impact of AI on software supply chain security is also steadily increasing. Software is being written by LLMs (Limited Librarians) and is also being used to automatically answer queries.
Expertise in selecting and evaluating LLMs is therefore becoming just as important as the potentially necessary sovereign operation of AI infrastructures.
Together we will find the right AI solutions for you, ensuring you are well-positioned for the future.
-
Presentation
14:30 Information Security beyond Compliance
Growing regulatory requirements (DORA, NIS-2, etc.), numerous stakeholders, and increasing cyber risks are presenting companies with increasingly complex challenges. This is exactly why the ISMS and GRC software ibi systems iris was developed. It supports companies not only in the structured implementation audit of internal and external cybersecurity requirements, but also beyond that. In his presentation, Dr. Stefan Wagner will show how you can make information security part of your everyday work with the help of ibi systems iris:
- Involvement of all stakeholders, including suppliers
- Documentation of information security incidents
- Risk management, including measures
- Continuous evaluation, monitoring, and improvement
And all of this based on a consistent data landscape in a central tool.
-
Presentation
15:00 Resilience for everything: How to ensure Business Continuity across Cloud, Identity and AI
- Ensure recoverable backups for on-premises, cloud, and SaaS data
- Protect, analyze, and restore identity systems—from AD to Entra ID and Okta Accelerate
- AI transformation while maintaining control and rolling back when necessary
-
Presentation
16:15 The State of Human Risk: Building Trust for the Hybrid Workforce
Artificial intelligence has long been part of everyday business life. People and AI agents work side by side, yet existing security strategies are often not designed to address this reality. Companies are increasingly facing risks arising from both human error and the autonomous behavior of AI systems. Based on an international study of 4,200 experts from 14 countries, the presentation shows how the risk profile of companies is shifting. While email remains the primary attack vector and people are manipulated or make mistakes, AI risks are emerging as the fastest-growing threat area. At the same time, employees expect the productive use of AI tools, which puts pressure on existing security and governance models. The presentation explains why human risk management is becoming a central component of modern cybersecurity strategies. Key takeaways:
- 43% of organizations report incidents involving AI
- AI is considered the biggest challenge for cybersecurity leaders
- 56% of employees are dissatisfied with their company’s AI strategy
-
Presentation
16:45 Pre-emptive security, European-made – better safe than sorry
Cyberattacks, ransomware and regulatory requirements make IT risk management a top priority. Why react when you can prevent attacks? This presentation demonstrates how pre-execution security detects and stops threats before they cause damage. The focus is on preventive protection mechanisms that block attacks before they are executed, without restricting functionality. Last but not least, a reduced attack surface takes the pressure off IT teams, reduces operational overhead and creates greater security – proactively rather than reactively.
-
18:30 Cybersecurity Summit Awards Ceremony 2026
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
App-Download.