-
MAIN STAGEHosted by:
Nona Brodersen
-
ZUGSPITZE MasterclassesHosted by:
Lisa Winkler
-
MATTERHORN MasterclassesHosted by:
Susan Zare
-
08:30
-
09:15
-
09:30Presentation
2035: How Much Humanity Can the Future Handle?
Digitalization and automation are advancing rapidly. Janszky presents a future in which we live better, healthier, and longer lives – but only if we embrace these developments. All these great promises will only come true if we accept that, in many areas, computers can act more effectively than we humans can, says Janszky.
-
10:15Fireside Chat
Digital sovereignty & cyberwarfare
How geopolitical tensions are changing security architectures - and why ransomware has long been part of global power games.
Presentation:
Sandra Heger
NISHS.NRW / Universität Siegen
-
10:45
-
11:00Presentation
PLAY TO PROTECT: How we can master cybersecurity through play
Security is not a state, but a mindset. And that can be trained. What the Hack! introduces the concept behind serious gaming and shows how we can make ourselves cyber-resilient through play. In an interactive 20-minute game against hackers, we activate the collective knowledge of the audience. Experience live how serious gaming turns your users into a human firewall.
-
11:30Fireside Chat
Sovereign Cloud Under Attack
Europe’s path toward digital sovereignty is colliding with a new reality. Cyberattacks are increasingly shifting into API driven, multi cloud environments. This panel explores how organizations can combine data sovereignty, compliance and modern cloud security to stay protected.
Dr. Viktoria Schmittmann
Zuhorn & Partner Rechtsanwälte
Harald Joos
Deutsche Rentenversicherung Bund
Presentation:
Isabelle Ewald
BDO
-
12:00Presentation
Hacked! 72 hours of a CISOs nightmare
A ransomware attack! How should you respond?
In this turn-based tabletop simulation, participants take on the role of the CISO and must make decisions that will influence the course of events.
Can you minimize the damage as much as possible?
• Turn-based simulation of a ransomware attack
• Interactive involvement of participants
• Teaching best practices for crisis management
• What are the responsibilities of the board, CIO, head of communications, etc. – lessons learned from real-world experience
-
Presentation
11:00 The Next Wave of Cyberattacks Is Coming – Are Your Endpoints Ready? - Old but still dangerous: Log4Shell, PrintNightmare, and others as a blueprint for defending against tomorrow's cyberattacks
Well-known vulnerabilities, such as Log4Shell and PrintNightmare, impressively demonstrate what we can learn from previous attacks for tomorrow's cyber defense.
Key topics:
- Zero Days in Reality Check: What known exploits reveal about today's threats.
- When vulnerabilities collide: Understanding combined attack scenarios.
- Structured endpoint management: Inventory, analyze, patch.
- Unified endpoint management: Simplify processes, reduce risks, secure standards.
- Blueprint for sustainable resilience: Which measures are crucial now?
-
Presentation
12:00 The Power of Transparency: Identify and Reduce Attack Surfaces
- Eliminating Shadow IT: How Modern Exposure Management Uncovers Hidden Systems and Reduces Risk
- Breaking Down Silos: Why a Centralized, Holistic Approach Is Key to Attack Surface Reduction
- Automated Security: Detecting Threats Early and Enabling Proactive Action
-
Presentation
10:45 Trends in Cyber Threat Scenarios – Why AI in the SOC Is More Important Than Ever
- The Evolution of Hackers: New methods, tactics, and technologies
- Current Attack Trends: From ransomware to AI‑driven attacks
- Real Threats, Real Response: Insights from real‑world SOC operations
- Agentic AI in the SOC: How modern AI helps proactively defend against today’s threats
- The Evolution of Hackers: New methods, tactics, and technologies
-
14:00
-
14:45Presentation
‘CISO: Criminally Involved Security Officer?’ When responsibility becomes personal in the age of information security.
In this keynote speech, you – as a CISO or responsible manager – will learn how and why you personally can be held criminally liable, based on practical examples from consulting. You will also receive specific advice on basic rules of conduct that can be used to avoid or effectively limit liability risks.
-
15:15
-
15:45Panel discussion
Human Risk Factor
Firewalls, AI and zero trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords! Firewalls, AI and Zero Trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords!
Dennis Buroh
Minimax
Sandra Heger
NISHS.NRW / Universität Siegen
Kari-Ann Mentoft-Pommer
Schnellecke Logistics
Dr. Patricia Köpfer
Schwarz Digits
Mike Zimmermann
Universitätsklinikum Carl Gustav Carus
Presentation:
Lisa Fröhlich
Women4Cyber Germany / Link11
-
16:30Panel discussion
sector update: energy, finance, health
20-minute CISO talk on current challenges in the relevant sector
Presentation:
Isabelle Ewald
BDO
-
17:30Panel discussion
Future of the SOC: internal vs. MSSP
To what extent has the shortage of skilled workers already become a security risk?
What targeted measures can be taken to attract and promote more women in cybersecurity?
Benjamin Pätzoldt
Zentrum für Cybersicherheit der Bundeswehr
Lisa Fröhlich
Women4Cyber Germany / Link11
Hendrik Janßen
Biotronik
Matthias Wyss
BWI
Gül Sabab
Emschergenossenschaft / Lippeverband
Presentation:
Dr. Georgia Papaioannou
Microsoft
-
18:15
Main Stage Speaker Awards Ceremony
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
App-Download
-
Presentation
14:00 Attacks on current and future technologies
IT is everywhere. The amount of connections among IT components increases explosively and thus the attack surface extends severely. Isn’t that the exact scenario hackers have always been dreaming of? Founder and CEO of SySS GmbH Sebastian Schreiber is going to demonstrate a speed hacking live on stage. He is going to show how easy and fast the latest wireless alarm systems, electronic locking systems, and wireless presenters, as well as fingerprint secure USB can be hacked. He is also going to show how easily SMS can be faked and thermostat-regulated IoT devices be manipulated.
-
Presentation
16:30 Need for Speed: Narrowing the Attackers’ Lead with an Adaptive Security Culture.
While many awareness programs are still based on static, generic scenarios, attack techniques today are evolving at AI speed. This discrepancy creates a dangerous gap between training and real-world threats.
Jungheinrich has firsthand experience with just how precise and dangerous modern attackers are: In this masterclass, Christian Reinhardt and Sebastian Graeber discuss real-life deepfake attacks and the insights gained from them.
Together, they take a behind-the-scenes look at real-world practice: Drawing on psychological insights and Jungheinrich’s concrete experiences, they demonstrate how security culture can be dynamically shaped and adapted in real time to current attack patterns. Because in today’s threat landscape, speed simply means security.
-
Presentation
17:00 The growing role of artificial intelligence for greater automation and efficiency in the SOC
Problem statement
Security operations centres are under increasing pressure: the
attack surface is growing, threats are becoming more extensive, while resources
and budgets remain limited. CISOs must master three critical areas simultaneously
:
Strategic visibility: understanding the threat landscape and
risk development
Operational excellence: optimising monitoring, responsiveness and
security levels
Tactical effectiveness: Rapid detection and containment of current incidents
The key question is: How can SecOps performance be improved while
realising the principle of ‘doing more with less’?
Five critical shortcomings of conventional SOC solutions
The presentation identifies fundamental weaknesses in existing approaches:
1. Speed: Slow data queries lead to delayed
threat detection
2. Data range: Limited historical analyses restrict threat hunting
3. Complexity: High barriers to entry due to complex query languages and
training requirements
4. Robustness: Inadequate incident response and disaster recovery processes
5. Intelligence gap: Threat indicators are not systematically correlated
and utilised
These shortcomings require a fundamentally new approach to cyber security.
AI as a solution componentArtificial intelligence systematically addresses all identified vulnerabilities:
Data processing: AI searches petabytes in seconds instead of minutes.
Historical analysis: Multiple years of data become fully accessible.
User-friendliness: Natural language replaces complex query syntax.
Proactive security: Continuous, intelligence-driven threat hunting.
Automation: Rapid correlation, contextualisation and
recommended actions.
This anomaly architecture provides unified visibility across security and IT
operations, accelerates decision-making, automates
routine tasks and ensures continuous adaptation to new
threat patterns.
Strategic benefits
AI integration enables SOC teams to move from reactive alert handling to
proactive threat management. The platform dynamically reduces the
attack surface, contextualises observations with global threat
intelligence and enables precise, rapid countermeasures – while
remaining cost-effective and scalable. -
18:30 Cybersecurity Summit Awards Ceremony 2026
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
App-Download
-
Presentation
14:00 AI Everything: The AI's Double Game – Weapon of the Attackers & Shield of the Defenders
Artificial intelligence plays a dual role in the IT security landscape – as an increasingly sophisticated attack tool and as an indispensable defensive instrument.
Vendors are outdoing each other in promoting their AI features, but in practice, they face a complex challenge that can be summarized in one question: How can AI be meaningfully integrated into existing security architectures without creating vendor lock-ins or losing control?
As a technology-agnostic service provider, avodaq demonstrates how AI-powered detection, intelligent orchestration, and adaptive response systems can be integrated into heterogeneous environments.
The impact of AI on software supply chain security is also steadily increasing. Software is being written by LLMs (Limited Librarians) and is also being used to automatically answer queries.
Expertise in selecting and evaluating LLMs is therefore becoming just as important as the potentially necessary sovereign operation of AI infrastructures.
Together we will find the right AI solutions for you, ensuring you are well-positioned for the future.
-
Presentation
14:30 Information Security beyond Compliance
Growing regulatory requirements (DORA, NIS-2, etc.), numerous stakeholders, and increasing cyber risks are presenting companies with increasingly complex challenges. This is exactly why the ISMS and GRC software ibi systems iris was developed. It supports companies not only in the structured implementation audit of internal and external cybersecurity requirements, but also beyond that. In his presentation, Dr. Stefan Wagner will show how you can make information security part of your everyday work with the help of ibi systems iris:
- Involvement of all stakeholders, including suppliers
- Documentation of information security incidents
- Risk management, including measures
- Continuous evaluation, monitoring, and improvement
And all of this based on a consistent data landscape in a central tool.
-
18:30 Cybersecurity Summit Awards Ceremony 2026
The best speakers on our stages are to be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. At the end of the day, we will honor the best speaker of the day on each stage. Voting takes place via our app. Access is via your ticket code.
App-Download.