-
MAIN STAGE
-
MASTERCLASSES
-
08:30
-
09:15
-
09:30Presentation
Secure application development of the future
Almost every company today has to develop its own customized software, build a development team, and ultimately ensure that this software is developed securely. But how do we achieve this, and what are the current and future developments leading to this goal? What role do large language models, static source code analysis, fuzzing, continuous integration, and so on play in this process? This keynote provides an overview of what is truly important, what might be a waste of resources, and the direction of future trends.Presentation:
Inken März Cybersecurity Summit Moderation -
10:00
-
10:30Presentation
Cybersecurity strategy of a fast growing e-commerce startup
In this presentation, Vladyslav Cherednychenko as Director of IT Security Engineering at ABOUT YOU discusses how cybersecurity is integrated into the development and business processes of a fast growing company. Together, we will explore how security maturity within the company has evolved since the beginning, what it is like now, and what may be next.
Presentation:
Inken März Cybersecurity Summit Moderation -
11:00Panel discussion
The Future of IT Security
IT security chiefs from leading companies discuss their strategies and measures to ensure cybersecurity today and in the future.Katharina Sook Hee Koch Federal Office for Information Security Florian Battenfeld Flender Hendrik Janßen Bauer Media Group Martin Brünn ADVANCED Systemhaus Vicky Sorge Kaufland e-commercePresentation:
Isabelle Ewald Mind the Tech -
11:45Panel discussion
Mobile work, clouds and other challenges
For a long time now, security has no longer been confined to a company's own data center. What strategies are successful IT security managers pursuing to get to grips with the new challenges?Ugur Simsek HUGO BOSS Wolfgang Witerzens Condor Dr. Ingo Bente Fielmann Ralf Kleinfeld Otto Kai Furtwängler tesaPresentation:
Robert Hellwig Universität Siegen
-
Presentation
10:00 A new operating model for cloud security
A successful cloud security strategy must adapt to the requirements of the business and the growth of the cloud.
As the cloud usually grows faster than the budget and size of the security team, it is important to find new approaches to cloud security that scale with growth. In this masterclass, you will learn how to overcome the point solutions for security and the different data models of the individual cloud platforms and establish a uniform operating model for cloud security.Presentation:
Sandra Balz kiwiko eG -
Presentation
10:30 Cybercrime trends you should know in 2024
Artificial intelligence changed everything last year, which presents us with a real challenge this year: Who will make better use of new technologies and the psychology of human behaviour - us or the cybercriminals?
In our talk, we'll take a closer look at the key cybercrime trends for 2024 so you and your security team can stay ahead of the curve and protect your organisation from attack. Together, we'll explore the increasing involvement of AI in cyberattacks, which is changing the rules of the game for everyone involved. We'll also take a look at technologies such as 5G and quantum computing, which offer innovative opportunities but also create new points of attack for hackers.
We also talk about the rise of hacktivism and the role of cyberattacks in global political tensions. We also look at the evolution from phishing attacks to more sophisticated, multi-channel threats, the increasing use of disinformation campaigns to influence public opinion and the worrying burnout rates in security teams. But we don't just want to highlight the issues, we also want to give you proven security strategies to stay one step ahead in an era that will shape cyber security for good.
Presentation:
Sandra Balz kiwiko eG -
Presentation
11:00 Artificial intelligence and cybersecurity - risk or opportunity?
Discussions about the use of generative artificial intelligence (AI) are currently omnipresent. What are the risks posed by AI for cyber security? And how can we turn the tables and use AI to protect against cyber attacks?
In the lecture, we will explain the basics of generative AI and show how AI algorithms recognise threats at an early stage. We will shed light on the advantages and challenges of this technology and provide tips on how generative AI can protect companies and data despite all the risks.Presentation:
Sandra Balz kiwiko eG -
Presentation
11:30 Threat-based Risk Assessment – Safety through Security
This masterclass presents the security risk assessment method commonly used at Airbus, which can also be used in other areas for comprehensive threat analysis.
Aviation is subject to special requirements in terms of the reliability and availability of functions and systems. Applied to digital systems, this results in the highest requirements for integrity and availability in terms of information security. These are countered by the need for weight reduction and limited connectivity. As a result, the usual methods of cyber risk management cannot be applied without violating at least one of the criteria.
The solution lies in the combination of functional consideration, impact assessment and individual threat analysis.
A weighted quantitative calculation method based on an effectiveness principle enables a comprehensive assessment of the risk. The method is scalable, can be readjusted and supports both actual and target analyses of the residual risk.
This approach is presented using an example, showing how the same method can be used for all levels of detail.Presentation:
Sandra Balz kiwiko eG -
Presentation
12:00 The human risk factor: How current threats put employees at the centre of your security strategy
In an age of increasingly complex security threats and growing compliance risks, attackers are targeting your most valuable asset: Your employees! Recognising that people play a central role in the success or failure of security measures, a people-centric approach to your security strategy is crucial to mitigating risk. Using current threats as examples, we will show you the dimensions of human risk and provide guidance on how to place employees at the centre of your security strategy in the long term.
Presentation:
Sandra Balz kiwiko eG
-
12:30
-
13:45
Cybersecurity Summit Startup Awards
You will see innovative startups presenting their clever new solutions in the Cybersecurity business. The best three will receive a Cybersecurity Summit Startup Award – you decide!
Alexander Feldmann LocateRisk Aleksander Groshev Autobahn Security Dr. Dominik Schürmann heylogin Roman Kuznetsov Systola Kai Fehling Cosanta Patrick Ghys aixpedIT Alexander Subbotin ByteSnipersPresentation:
Inken März Cybersecurity Summit Moderation -
14:30Panel discussion
Shortage of specialists in IT
How much has the shortage of skilled workers already become a security risk? How can understaffed cybersecurity departments still do their jobs?Presentation:
Robert Hellwig Universität Siegen
-
Presentation
13:30 How To Create Successful Malware and How to Defend with Zero Trust
In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.
Presentation:
Sandra Balz kiwiko eG -
Presentation
14:15 Data is Dope! - Automated data security posture management with Varonis
Data has been the fuel of our business for a long time. Over the last few years, companies have been working hard to build up the castle walls around their most valuable asset. Nevertheless, we still have to ask ourselves why we still have a blind spot on data in security? Why are we not focusing on what we really want to protect? In this presentation you will learn how to close this blind spot with the automated Varonis Data Security Platform to find risks, automatically eliminate them and react to threats at an early stage. Find! Fix! Alert!
Presentation:
Sandra Balz kiwiko eG -
Presentation
14:30 Trotz Cyber Angriffen gut schlafen. Business Continuity Management at its Best.
Presentation:
Sandra Balz kiwiko eG -
Presentation
14:45 Phases of an OT security programme - Challenges and solutions
Security in the area of operational technology (OT) is becoming increasingly important. While the concepts for securing this technology are generally the same as in IT, there are significant differences between the two worlds that lead to a number of challenges. This presentation provides a comprehensive overview of the differences between IT and OT and the different phases of an OT security programme. It describes the basic steps, continuous improvement and the implementation of risk-based and proactive measures. Special attention is given to the specific challenges and effective solutions at each stage to ensure the security and resilience of OT environments.
Presentation:
Sandra Balz kiwiko eG -
Presentation
15:00 Creating an effective security operations platform
Cyber resilience has been an important aspect of cybersecurity for many years, yet most organizations struggle with building effective cyber security operations. During this presentation we will look at the reasons of this situation and show how to effectively manage your cybersecurity infrastructure using automated risk management, AI and a consolidated platform to get the full visibility of your cyber posture and the ability to automate your SOC operations. With NIS2 and DORA around the corner, we will present how to effectively tackle compliance requirements without sacrificing security.
Presentation:
Sandra Balz kiwiko eG
-
15:15
-
15:45Presentation
Incident Response – Have I been hacked??
An anonymized real case is used to interactively illustrate why an emergency plan is important and which points must/should be considered.Presentation:
Inken März Cybersecurity Summit Moderation -
16:15Panel discussion
How do we embed IT Security in the organization - is the employee the weakest link?
As we all know, IT security is not just about software, tools and processes - employees are often seen as the weakest links in the security chain. How do leading companies increase awareness of security issues through employee training, knowledge management and similar measures?Dr. Tim Sattler Jungheinrich Stefan van Eijden Hamburg Port Authority (HPA) Ralf Kleinfeld Otto Hauke Hunger Lehmann&VossPresentation:
Robert Hellwig Universität Siegen -
17:00Presentation
Live-Podcast | Mind the Tech
Mind the Tech is the podcast that broadcasts live from the basement of the Internet. From cybercrime-as-a-service to hacked sex robots - Catrin and Isa take a look at what's going on behind the beautiful facade of digitalization. And at the Cybersecurity Summit, they're even doing it live and in color for the first time.
Presentation:
Inken März Cybersecurity Summit Moderation -
17:30
Main Stage Speaker Awards Ceremony
The top three speakers from our Main Stage will be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. Voting will take place using our app. Access is via your ticket code.
Presentation:
Inken März Cybersecurity Summit Moderation
-
Presentation
15:45 No more individual solutions for cyber security - they cost too much money, time and nerves.
Forget individual security solutions. You deserve better: ONE cybersecurity solution that can do (almost) everything. This allows you to maintain transparency and control in your network while also covering the technical requirements of NIS2. With All-in-one you save up to 80% time on implementation, training and operation.
Get comprehensive control and security for your IT with Enginsight:
ü Visualise IT infrastructures
ü Monitor networks
ü Detect attacks incl. alarms & automatic response
ü Simulate attacks
ü Document & analyse event logs
ü Create reports
Max Tarantik shows you how much more cybersecurity you can achieve in just 15 minutes with Enginsight.
Hack your IT before someone else does!Presentation:
Sandra Balz kiwiko eG -
Presentation
16:00 AI in the SOC: The revolution is an evolution
This session will look at how AI will evolve in the SOC and how the technology will help, not replace, analysts. You'll learn how AI will evolve from using automation to build a base knowledge layer that AI agents will learn from to ultimately providing humans with information on how to effectively and successfully respond to threats. The session will present the three phases of AI's evolution and explore how the technical features of each phase will ultimately create a SOC that's human-driven and AI-powered.
Presentation:
Sandra Balz kiwiko eG -
Presentation
16:15 The DevSecOps odyssey: closing the communication gap
The transition from DevOps to DevSecOps is crucial for security, but often suffers from a lack of communication. This is a major obstacle on this important journey. Where DevOps focussed on speed and efficiency, DevSecOps seamlessly integrates security practices into the entire development cycle.
Presentation:
Sandra Balz kiwiko eG -
Presentation
16:30 Masterclass
Speaker Andreas Dondera will provide additional material (Banko emergency plan, emergency map) and answer questions from the audience.
Presentation:
Sandra Balz kiwiko eG -
Presentation
17:00 Cybersecurity put to the test: EU NIS2 Directive & EU Cyber Resilience Act - what companies need to consider
The NIS2 Directive sets new standards in the classification of companies within the EU and categorises them according to their economic criticality. Many companies that were not previously affected are now covered - what can a company do to comply with this directive? Who is the EU Cyber Resilience Act aimed at, what does it describe and what standards can be used to fulfil the requirements? Which products are affected and is there a state of the art in cybersecurity? We will shed light on these questions using individual examples in the presentation on standardisation in cybersecurity.
Presentation:
Sandra Balz kiwiko eG -
17:30 Masterclasses Speaker Award Ceremony
The top three speakers from our Masterclasses will be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. Voting will take place using our app. Access is via your ticket code.
Presentation:
Sandra Balz kiwiko eG