20th & 21st May 2026 in Hamburg
20th & 21st May 2026 in Hamburg Contact: info@cybersecuritysumm.it or +49 40 999 993 868

Cybersecurity Summit Day 1

Cybersecurity Summit Day 1

The agenda of the Cybersecurity Summit on May 20th, 2026.

Cybersecurity Summit Day 2

Cybersecurity Summit Day 2

The agenda of the Cybersecurity Summit on May 21st, 2026.



20th May 2026 Cybersecurity Summit Day 1

  1. MAIN STAGE
  1. ZUGSPITZE Masterclasses
  1. MATTERHORN Masterclasses
  1. 08:30
     

    08:30 Welcome

    Our doors open at 08:30 - so you can start networking at the first coffee and secure the best seat

  1. 09:15
    Presentation

    Welcome

    Opening  of the event with a warm welcome from the organizers.

  2. 09:30
    Fireside Chat

    Global Cybersecurity Outlook: Challenges, Cooperation, and the Road Ahead

    Cyber threats know no borders. This international fireside chat brings together experts from around the world to explore the evolving global cybersecurity landscape. 

  3. 10:00
     

    Coffee break

    Enjoy coffee and breakfast and make new contacts with the visitors and exhibitors of the Cybersecurity Summit.

  4. 11:00
    Panel discussion

    Digital sovereignty & cyberwarfare

    How geopolitical tensions are changing security architectures - and why ransomware has long been part of global power games.

  5. 11:45
    Panel discussion

    Bank robber 2.0 - When the attack doesn't come through the door, but through the cloud

    This panel discusses how companies can identify new attack vectors in dynamic, API-based cloud infrastructures and effectively secure them with modern security strategies.

  1. Presentation

    11:00 Masterclass: baramundi software

  1. Presentation

    10:15 Keynote: glueckkanja

  2. Presentation

    10:45 Masterclass: Ontinue

  3. Presentation

    11:30 Masterclass: greenhats

  1. 12:30

    12:30 Lunch break

    Enjoy lunch and make new contacts with visitors and exhibitors.

  1. 14:00
    Presentation

    Cybersecurity Summit Startup Awards Part 1

    Here you can see innovative startups that present clever new solutions for digital innovations in IT security. 
    The best three will receive a Cybersecurity Summit Startup Award - you vote!

  2. 14:45
    Presentation

    ‘CISO: Criminally Involved Security Officer?’ When responsibility becomes personal in the age of information security.

    In this keynote speech, you – as a CISO or responsible manager – will learn how and why you personally can be held criminally liable, based on practical examples from consulting. You will also receive specific advice on basic rules of conduct that can be used to avoid or effectively limit liability risks.

  3. 15:15
     

    Coffee Break

    Enjoy coffee and cake and make new contacts with visitors and exhibitors.

  4. 15:45
    Panel discussion

    Human Risk Factor

    Firewalls, AI and zero trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords! Firewalls, AI and Zero Trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords!

  5. 16:30
    Panel discussion

    sector update: energy, finance, health

    20-minute CISO talk on current challenges in the relevant sector

  6. 17:30
    Panel discussion

    Future of the SOC: internal vs. MSSP

    To what extent has the shortage of skilled workers already become a security risk? 
    What targeted measures can be taken to attract and promote more women in cybersecurity?

  7. 18:00
     

    Main Stage Speaker Awards ceremony

    The three best speakers on the Main Stage will be honored. You decide which speaker you found particularly inspiring, charismatic and innovative. Voting takes place via our app. Access is via your ticket code.

  1. Presentation

    14:00 Masterclass: SySS

  2. Presentation

    15:00 Masterclass: Opswat

  3.  

    15:30 Coffee Break

    Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

  4. Presentation

    16:00 Masterclass: A1 Digital

  5.  

    17:15 Cybersecurity Summit Awards Ceremony 2026

    Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

  1. Presentation

    14:00 Masterclass: avodaq

  2.  

    15:15 Coffee Break

    Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

  3. Presentation

    15:30 Masterclass: DIU & beta systems

  4. Presentation

    16:00 Masterclass: KnowBe4

  5.  

    17:15 Cybersecurity Summit Awards Ceremony 2026

    Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

  1. 18:15
     

    18:15 Cybersecurity Summit AFTERSHOW LOUNGE

    DJ, drinks & networking for all participants

  1. 23:00
     

    23:00 End of today's event

20th May 2026 Cybersecurity Summit Day 1

08:30

Welcome

Our doors open at 08:30 - so you can start networking at the first coffee and secure the best seat

09:15 MAIN STAGE:
Presentation

Welcome

Opening  of the event with a warm welcome from the organizers.

09:30 MAIN STAGE:
Fireside Chat

Global Cybersecurity Outlook: Challenges, Cooperation, and the Road Ahead

Cyber threats know no borders. This international fireside chat brings together experts from around the world to explore the evolving global cybersecurity landscape. 

10:00 MAIN STAGE:

Coffee break

Enjoy coffee and breakfast and make new contacts with the visitors and exhibitors of the Cybersecurity Summit.

10:15 MATTERHORN MASTERCLASSES:
Presentation

Keynote: glueckkanja

10:45 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: Ontinue

11:00 MAIN STAGE:
Panel discussion

Digital sovereignty & cyberwarfare

How geopolitical tensions are changing security architectures - and why ransomware has long been part of global power games.

11:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: baramundi software

11:30 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: greenhats

11:45 MAIN STAGE:
Panel discussion

Bank robber 2.0 - When the attack doesn't come through the door, but through the cloud

This panel discusses how companies can identify new attack vectors in dynamic, API-based cloud infrastructures and effectively secure them with modern security strategies.

14:00 MAIN STAGE:
Presentation

Cybersecurity Summit Startup Awards Part 1

Here you can see innovative startups that present clever new solutions for digital innovations in IT security. 
The best three will receive a Cybersecurity Summit Startup Award - you vote!

14:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: SySS

14:00 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: avodaq

14:45 MAIN STAGE:
Presentation

‘CISO: Criminally Involved Security Officer?’ When responsibility becomes personal in the age of information security.

In this keynote speech, you – as a CISO or responsible manager – will learn how and why you personally can be held criminally liable, based on practical examples from consulting. You will also receive specific advice on basic rules of conduct that can be used to avoid or effectively limit liability risks.

15:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: Opswat

15:15 MAIN STAGE:

Coffee Break

Enjoy coffee and cake and make new contacts with visitors and exhibitors.

15:15 MATTERHORN MASTERCLASSES:

Coffee Break

Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

15:30 ZUGSPITZE MASTERCLASSES:

Coffee Break

Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

15:30 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: DIU & beta systems

15:45 MAIN STAGE:
Panel discussion

Human Risk Factor

Firewalls, AI and zero trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords! Firewalls, AI and Zero Trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords!

16:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: A1 Digital

16:00 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: KnowBe4

16:30 MAIN STAGE:
Panel discussion

sector update: energy, finance, health

20-minute CISO talk on current challenges in the relevant sector

17:15 ZUGSPITZE MASTERCLASSES:

Cybersecurity Summit Awards Ceremony 2026

Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

17:15 MATTERHORN MASTERCLASSES:

Cybersecurity Summit Awards Ceremony 2026

Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

17:30 MAIN STAGE:
Panel discussion

Future of the SOC: internal vs. MSSP

To what extent has the shortage of skilled workers already become a security risk? 
What targeted measures can be taken to attract and promote more women in cybersecurity?

18:00 MAIN STAGE:

Main Stage Speaker Awards ceremony

The three best speakers on the Main Stage will be honored. You decide which speaker you found particularly inspiring, charismatic and innovative. Voting takes place via our app. Access is via your ticket code.

18:15

Cybersecurity Summit AFTERSHOW LOUNGE

DJ, drinks & networking for all participants

23:00

End of today's event

21st May 2026 Cybersecurity Summit Day 2

  1. MAIN STAGE
  1. ZUGSPITZE Masterclasses
  1. MATTERHORN Masterclasses
  1. 09:00
    Presentation

    09:00 Welcome

    Our doors open at 9:00 a.m. - so you can start networking with your first coffee and secure the best seat.

  1. 10:15
     

    Welcome

    Opening of the event and welcome by the moderator

  2. 10:30
    Presentation

    Modern attacks | Modern defence - A war story on cultural change

    Modern attacks are demonstrated on site and viewers are interactively guided through a real cyber attack. The simulation shows how security measures can be effectively applied today to prevent real damage. A particular focus is placed on a security-conscious culture and modern approaches to security awareness.

  3. 11:00
    Panel discussion

    AI protects us! Or is it destroying us?

    Cybersecurity meets artificial intelligence - double agent or bodyguard?
    Artificial intelligence is both a blessing and a curse: on the one hand, it helps to detect anomalies, but on the other, it can also be used for extremely sophisticated attacks. Deepfakes, generative malware and autonomous attack tools are on the dark side - smart firewalls and adaptive threat detection on the light side. This panel clarifies: Who is currently ahead - man or machine?

  4. 11:45
    Fireside Chat

    Cybersecurity in the age of quantum computers

    When will the quantum threat become real - and how are we already preparing for post-quantum cryptography?
    In this discussion, we talk to cryptography professionals, government representatives and tech thought leaders about how real the threat is, what post-quantum methods are waiting in the wings - and whether we need to act today to avoid looking old tomorrow.

  5. 12:15
    Fireside Chat

    Supply chain attacks, third-party risk & OT security: Trust as a weak point – when the attack comes via third parties

    Trust is good – but in networked systems, it is often the biggest weak point. This panel highlights the growing threat posed by supply chain attacks and the risks involved in dealing with third-party providers. The focus is on securing complex supply chains, industrial control systems (OT) and critical infrastructures such as energy supply.

  1. 12:45

    12:45 Lunch break

    Enjoy lunch and make new contacts with visitors and exhibitors.

  1. 13:45
    Presentation

    Cybersecurity Summit Startup Awards Part 2

    Here you can see innovative startups that present clever new solutions for digital innovations in customer service. The best three will receive a service Summit Startup Award - you vote!

  2. 14:30
    Panel discussion

    NIS2, DORA, CRA: New rules for cybersecurity

    This panel shows what companies can expect in terms of operations with NIS2, DORA and CRA. The focus is on practical compliance, risk management and implementation of the new EU cybersecurity requirements. Experts provide insights into challenges and solutions for everyday life.

  3. 15:15
    Panel discussion

    IT security and sustainability: synergies and challenges

    What challenges and opportunities arise from the integration of sustainability goals into IT security measures?

  1. 15:30
     

    15:30 Coffee Break

    Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

  1. 16:00
     

    Presentation of the Main Stage Speaker Awards

    The three best speakers on the Main Stage will be honored. You decide which speaker you found particularly inspiring, charismatic and innovative. Voting takes place via our app. Access is via your ticket code.

  2. 16:30
    Presentation

    Artificial intelligence – From ChatGPT to GPT-4

    The breakthrough of artificial intelligence has been heralded for a long time. But now, with ChatGPT and GPT-4, the social and economic impact is becoming apparent, even to experts who do not always have a complete overview. This lecture places AI in the context of digitalisation, explains the principles and industry dynamics of digital corporations, and illustrates how artificial intelligence is both underestimated and overestimated. And yet it is changing the world.

  1.  

    16:00 Cybersecurity Summit Awards Ceremony 2026

    Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

  1.  

    16:00 Cybersecurity Summit Awards Ceremony 2026

    Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

  1. 17:00
     

    17:00 End of Cybersecurity Summit 2026

21st May 2026 Cybersecurity Summit Day 2

09:00

Welcome

Our doors open at 9:00 a.m. - so you can start networking with your first coffee and secure the best seat.

10:15 MAIN STAGE:

Welcome

Opening of the event and welcome by the moderator

10:30 MAIN STAGE:
Presentation

Modern attacks | Modern defence - A war story on cultural change

Modern attacks are demonstrated on site and viewers are interactively guided through a real cyber attack. The simulation shows how security measures can be effectively applied today to prevent real damage. A particular focus is placed on a security-conscious culture and modern approaches to security awareness.

11:00 MAIN STAGE:
Panel discussion

AI protects us! Or is it destroying us?

Cybersecurity meets artificial intelligence - double agent or bodyguard?
Artificial intelligence is both a blessing and a curse: on the one hand, it helps to detect anomalies, but on the other, it can also be used for extremely sophisticated attacks. Deepfakes, generative malware and autonomous attack tools are on the dark side - smart firewalls and adaptive threat detection on the light side. This panel clarifies: Who is currently ahead - man or machine?

11:45 MAIN STAGE:
Fireside Chat

Cybersecurity in the age of quantum computers

When will the quantum threat become real - and how are we already preparing for post-quantum cryptography?
In this discussion, we talk to cryptography professionals, government representatives and tech thought leaders about how real the threat is, what post-quantum methods are waiting in the wings - and whether we need to act today to avoid looking old tomorrow.

12:15 MAIN STAGE:
Fireside Chat

Supply chain attacks, third-party risk & OT security: Trust as a weak point – when the attack comes via third parties

Trust is good – but in networked systems, it is often the biggest weak point. This panel highlights the growing threat posed by supply chain attacks and the risks involved in dealing with third-party providers. The focus is on securing complex supply chains, industrial control systems (OT) and critical infrastructures such as energy supply.

13:45 MAIN STAGE:
Presentation

Cybersecurity Summit Startup Awards Part 2

Here you can see innovative startups that present clever new solutions for digital innovations in customer service. The best three will receive a service Summit Startup Award - you vote!

14:30 MAIN STAGE:
Panel discussion

NIS2, DORA, CRA: New rules for cybersecurity

This panel shows what companies can expect in terms of operations with NIS2, DORA and CRA. The focus is on practical compliance, risk management and implementation of the new EU cybersecurity requirements. Experts provide insights into challenges and solutions for everyday life.

15:15 MAIN STAGE:
Panel discussion

IT security and sustainability: synergies and challenges

What challenges and opportunities arise from the integration of sustainability goals into IT security measures?

15:30

Coffee Break

Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

16:00 MAIN STAGE:

Presentation of the Main Stage Speaker Awards

The three best speakers on the Main Stage will be honored. You decide which speaker you found particularly inspiring, charismatic and innovative. Voting takes place via our app. Access is via your ticket code.

16:00 ZUGSPITZE MASTERCLASSES:

Cybersecurity Summit Awards Ceremony 2026

Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

16:00 MATTERHORN MASTERCLASSES:

Cybersecurity Summit Awards Ceremony 2026

Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

16:30 MAIN STAGE:
Presentation

Artificial intelligence – From ChatGPT to GPT-4

The breakthrough of artificial intelligence has been heralded for a long time. But now, with ChatGPT and GPT-4, the social and economic impact is becoming apparent, even to experts who do not always have a complete overview. This lecture places AI in the context of digitalisation, explains the principles and industry dynamics of digital corporations, and illustrates how artificial intelligence is both underestimated and overestimated. And yet it is changing the world.

17:00

End of Cybersecurity Summit 2026