14th & 15th May 2025 in Hamburg

19th June 2024 Cybersecurity Summit

  1. MAIN STAGE
  1. MASTERCLASSES
  1. 08:30
     

    08:30 Entrance

    The doors open at 8.30 am - so you can start networking over your first coffee or find yourself a good seat.
  1. 09:15
     

    Welcome

    Event opening and welcome from organizers
  2. 09:30
    Presentation

    Secure application development of the future

    Almost every company today has to develop its own customized software, build a development team, and ultimately ensure that this software is developed securely. But how do we achieve this, and what are the current and future developments leading to this goal? What role do large language models, static source code analysis, fuzzing, continuous integration, and so on play in this process? This keynote provides an overview of what is truly important, what might be a waste of resources, and the direction of future trends.
  3. 10:00
     

    Coffee break

    Enjoy coffee and breakfast and make new contacts with the visitors and exhibitors of the Cybersecurity Summit.

  4. 10:30
    Presentation

    Cybersecurity strategy of a fast growing e-commerce startup

    In this presentation, Vladyslav Cherednychenko as Director of IT Security Engineering at ABOUT YOU discusses how cybersecurity is integrated into the development and business processes of a fast growing company. Together, we will explore how security maturity within the company has evolved since the beginning, what it is like now, and what may be next.

  5. 11:00
    Panel discussion

    The Future of IT Security

    IT security chiefs from leading companies discuss their strategies and measures to ensure cybersecurity today and in the future.
  6. 11:45
    Panel discussion

    Mobile work, clouds and other challenges

    For a long time now, security has no longer been confined to a company's own data center. What strategies are successful IT security managers pursuing to get to grips with the new challenges?
  1. Presentation

    10:00 A new operating model for cloud security

    A successful cloud security strategy must adapt to the requirements of the business and the growth of the cloud. 
    As the cloud usually grows faster than the budget and size of the security team, it is important to find new approaches to cloud security that scale with growth. In this masterclass, you will learn how to overcome the point solutions for security and the different data models of the individual cloud platforms and establish a uniform operating model for cloud security. 

  2. Presentation

    10:30 Cybercrime trends you should know in 2024

    Artificial intelligence changed everything last year, which presents us with a real challenge this year: Who will make better use of new technologies and the psychology of human behaviour - us or the cybercriminals?

    In our talk, we'll take a closer look at the key cybercrime trends for 2024 so you and your security team can stay ahead of the curve and protect your organisation from attack. Together, we'll explore the increasing involvement of AI in cyberattacks, which is changing the rules of the game for everyone involved. We'll also take a look at technologies such as 5G and quantum computing, which offer innovative opportunities but also create new points of attack for hackers.

    We also talk about the rise of hacktivism and the role of cyberattacks in global political tensions. We also look at the evolution from phishing attacks to more sophisticated, multi-channel threats, the increasing use of disinformation campaigns to influence public opinion and the worrying burnout rates in security teams. But we don't just want to highlight the issues, we also want to give you proven security strategies to stay one step ahead in an era that will shape cyber security for good.

  3. Presentation

    11:00 Artificial intelligence and cybersecurity - risk or opportunity?

    Discussions about the use of generative artificial intelligence (AI) are currently omnipresent. What are the risks posed by AI for cyber security? And how can we turn the tables and use AI to protect against cyber attacks?
    In the lecture, we will explain the basics of generative AI and show how AI algorithms recognise threats at an early stage. We will shed light on the advantages and challenges of this technology and provide tips on how generative AI can protect companies and data despite all the risks.

  4. Presentation

    11:30 Threat-based Risk Assessment – Safety through Security

    This masterclass presents the security risk assessment method commonly used at Airbus, which can also be used in other areas for comprehensive threat analysis.
    Aviation is subject to special requirements in terms of the reliability and availability of functions and systems. Applied to digital systems, this results in the highest requirements for integrity and availability in terms of information security. These are countered by the need for weight reduction and limited connectivity. As a result, the usual methods of cyber risk management cannot be applied without violating at least one of the criteria.
    The solution lies in the combination of functional consideration, impact assessment and individual threat analysis.
    A weighted quantitative calculation method based on an effectiveness principle enables a comprehensive assessment of the risk. The method is scalable, can be readjusted and supports both actual and target analyses of the residual risk.
    This approach is presented using an example, showing how the same method can be used for all levels of detail.

  5. Presentation

    12:00 The human risk factor: How current threats put employees at the centre of your security strategy

    In an age of increasingly complex security threats and growing compliance risks, attackers are targeting your most valuable asset: Your employees! Recognising that people play a central role in the success or failure of security measures, a people-centric approach to your security strategy is crucial to mitigating risk. Using current threats as examples, we will show you the dimensions of human risk and provide guidance on how to place employees at the centre of your security strategy in the long term.

  1. 12:30
     

    12:30 Lunch break

    Enjoy the lunch and make new contacts with the visitors and exhibitors at the Cybersecurity Summit.

  1. 13:45
     

    Cybersecurity Summit Startup Awards

    You will see innovative startups presenting their clever new solutions in the Cybersecurity business. The best three will receive a Cybersecurity Summit Startup Award – you decide!

  2. 14:30
    Panel discussion

    Shortage of specialists in IT

    How much has the shortage of skilled workers already become a security risk? How can understaffed cybersecurity departments still do their jobs?
  1. Presentation

    13:30 How To Create Successful Malware and How to Defend with Zero Trust

    In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.

  2. Presentation

    14:15 Data is Dope! - Automated data security posture management with Varonis

    Data has been the fuel of our business for a long time. Over the last few years, companies have been working hard to build up the castle walls around their most valuable asset. Nevertheless, we still have to ask ourselves why we still have a blind spot on data in security? Why are we not focusing on what we really want to protect? In this presentation you will learn how to close this blind spot with the automated Varonis Data Security Platform to find risks, automatically eliminate them and react to threats at an early stage. Find! Fix! Alert!

  3. Presentation

    14:30 Trotz Cyber Angriffen gut schlafen. Business Continuity Management at its Best.

  4. Presentation

    14:45 Phases of an OT security programme - Challenges and solutions

    Security in the area of operational technology (OT) is becoming increasingly important. While the concepts for securing this technology are generally the same as in IT, there are significant differences between the two worlds that lead to a number of challenges. This presentation provides a comprehensive overview of the differences between IT and OT and the different phases of an OT security programme. It describes the basic steps, continuous improvement and the implementation of risk-based and proactive measures. Special attention is given to the specific challenges and effective solutions at each stage to ensure the security and resilience of OT environments.

  5. Presentation

    15:00 Creating an effective security operations platform

    Cyber resilience has been an important aspect of cybersecurity for many years, yet most organizations struggle with building effective cyber security operations. During this presentation we will look at the reasons of this situation and show how to effectively manage your cybersecurity infrastructure using automated risk management, AI and a consolidated platform to get the full visibility of your cyber posture and the ability to automate your SOC operations. With NIS2 and DORA around the corner, we will present how to effectively tackle compliance requirements without sacrificing security.

  1. 15:15
     

    15:15 Coffee break

    Enjoy coffee and cake and make new contacts with the visitors and exhibitors of the Cybersecurity Summit.

  1. 15:45
    Presentation

    Incident Response – Have I been hacked??

    An anonymized real case is used to interactively illustrate why an emergency plan is important and which points must/should be considered.
  2. 16:15
    Panel discussion

    How do we embed IT Security in the organization - is the employee the weakest link?

    As we all know, IT security is not just about software, tools and processes - employees are often seen as the weakest links in the security chain. How do leading companies increase awareness of security issues through employee training, knowledge management and similar measures?
  3. 17:00
    Presentation

    Live-Podcast | Mind the Tech

    Mind the Tech is the podcast that broadcasts live from the basement of the Internet. From cybercrime-as-a-service to hacked sex robots - Catrin and Isa take a look at what's going on behind the beautiful facade of digitalization. And at the Cybersecurity Summit, they're even doing it live and in color for the first time.

  4. 17:30
     

    Main Stage Speaker Awards Ceremony

    The top three speakers from our Main Stage will be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. Voting will take place using our app. Access is via your ticket code.

  1. Presentation

    15:45 No more individual solutions for cyber security - they cost too much money, time and nerves.

    Forget individual security solutions. You deserve better: ONE cybersecurity solution that can do (almost) everything. This allows you to maintain transparency and control in your network while also covering the technical requirements of NIS2. With All-in-one you save up to 80% time on implementation, training and operation.
    Get comprehensive control and security for your IT with Enginsight:
    ü Visualise IT infrastructures
    ü Monitor networks
    ü Detect attacks incl. alarms & automatic response
    ü Simulate attacks
    ü Document & analyse event logs
    ü Create reports
    Max Tarantik shows you how much more cybersecurity you can achieve in just 15 minutes with Enginsight.  
    Hack your IT before someone else does!

  2. Presentation

    16:00 AI in the SOC: The revolution is an evolution

    This session will look at how AI will evolve in the SOC and how the technology will help, not replace, analysts. You'll learn how AI will evolve from using automation to build a base knowledge layer that AI agents will learn from to ultimately providing humans with information on how to effectively and successfully respond to threats. The session will present the three phases of AI's evolution and explore how the technical features of each phase will ultimately create a SOC that's human-driven and AI-powered.

  3. Presentation

    16:15 The DevSecOps odyssey: closing the communication gap

    The transition from DevOps to DevSecOps is crucial for security, but often suffers from a lack of communication. This is a major obstacle on this important journey. Where DevOps focussed on speed and efficiency, DevSecOps seamlessly integrates security practices into the entire development cycle.

  4. Presentation

    16:30 Masterclass

    Speaker Andreas Dondera will provide additional material (Banko emergency plan, emergency map) and answer questions from the audience. 

  5. Presentation

    17:00 Cybersecurity put to the test: EU NIS2 Directive & EU Cyber Resilience Act - what companies need to consider

    The NIS2 Directive sets new standards in the classification of companies within the EU and categorises them according to their economic criticality. Many companies that were not previously affected are now covered - what can a company do to comply with this directive? Who is the EU Cyber Resilience Act aimed at, what does it describe and what standards can be used to fulfil the requirements? Which products are affected and is there a state of the art in cybersecurity? We will shed light on these questions using individual examples in the presentation on standardisation in cybersecurity.

  6.  

    17:30 Masterclasses Speaker Award Ceremony

    The top three speakers from our Masterclasses will be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. Voting will take place using our app. Access is via your ticket code.

  1. 18:00
     

    18:00 Cybersecurity Summit After Work

    Drinks, networking & Public Viewing for all participants.

19th June 2024 Cybersecurity Summit Cybersecurity Summit

08:30

Entrance

The doors open at 8.30 am - so you can start networking over your first coffee or find yourself a good seat.
09:15 MAIN STAGE:
 

Welcome

Event opening and welcome from organizers
09:30 MAIN STAGE:
Presentation

Secure application development of the future

Almost every company today has to develop its own customized software, build a development team, and ultimately ensure that this software is developed securely. But how do we achieve this, and what are the current and future developments leading to this goal? What role do large language models, static source code analysis, fuzzing, continuous integration, and so on play in this process? This keynote provides an overview of what is truly important, what might be a waste of resources, and the direction of future trends.
10:00 MAIN STAGE:
 

Coffee break

Enjoy coffee and breakfast and make new contacts with the visitors and exhibitors of the Cybersecurity Summit.

10:00 MASTERCLASSES:
Presentation

A new operating model for cloud security

A successful cloud security strategy must adapt to the requirements of the business and the growth of the cloud. 
As the cloud usually grows faster than the budget and size of the security team, it is important to find new approaches to cloud security that scale with growth. In this masterclass, you will learn how to overcome the point solutions for security and the different data models of the individual cloud platforms and establish a uniform operating model for cloud security. 

10:30 MAIN STAGE:
Presentation

Cybersecurity strategy of a fast growing e-commerce startup

In this presentation, Vladyslav Cherednychenko as Director of IT Security Engineering at ABOUT YOU discusses how cybersecurity is integrated into the development and business processes of a fast growing company. Together, we will explore how security maturity within the company has evolved since the beginning, what it is like now, and what may be next.

10:30 MASTERCLASSES:
Presentation

Cybercrime trends you should know in 2024

Artificial intelligence changed everything last year, which presents us with a real challenge this year: Who will make better use of new technologies and the psychology of human behaviour - us or the cybercriminals?

In our talk, we'll take a closer look at the key cybercrime trends for 2024 so you and your security team can stay ahead of the curve and protect your organisation from attack. Together, we'll explore the increasing involvement of AI in cyberattacks, which is changing the rules of the game for everyone involved. We'll also take a look at technologies such as 5G and quantum computing, which offer innovative opportunities but also create new points of attack for hackers.

We also talk about the rise of hacktivism and the role of cyberattacks in global political tensions. We also look at the evolution from phishing attacks to more sophisticated, multi-channel threats, the increasing use of disinformation campaigns to influence public opinion and the worrying burnout rates in security teams. But we don't just want to highlight the issues, we also want to give you proven security strategies to stay one step ahead in an era that will shape cyber security for good.

11:00 MAIN STAGE:
Panel discussion

The Future of IT Security

IT security chiefs from leading companies discuss their strategies and measures to ensure cybersecurity today and in the future.
11:00 MASTERCLASSES:
Presentation

Artificial intelligence and cybersecurity - risk or opportunity?

Discussions about the use of generative artificial intelligence (AI) are currently omnipresent. What are the risks posed by AI for cyber security? And how can we turn the tables and use AI to protect against cyber attacks?
In the lecture, we will explain the basics of generative AI and show how AI algorithms recognise threats at an early stage. We will shed light on the advantages and challenges of this technology and provide tips on how generative AI can protect companies and data despite all the risks.

11:30 MASTERCLASSES:
Presentation

Threat-based Risk Assessment – Safety through Security

This masterclass presents the security risk assessment method commonly used at Airbus, which can also be used in other areas for comprehensive threat analysis.
Aviation is subject to special requirements in terms of the reliability and availability of functions and systems. Applied to digital systems, this results in the highest requirements for integrity and availability in terms of information security. These are countered by the need for weight reduction and limited connectivity. As a result, the usual methods of cyber risk management cannot be applied without violating at least one of the criteria.
The solution lies in the combination of functional consideration, impact assessment and individual threat analysis.
A weighted quantitative calculation method based on an effectiveness principle enables a comprehensive assessment of the risk. The method is scalable, can be readjusted and supports both actual and target analyses of the residual risk.
This approach is presented using an example, showing how the same method can be used for all levels of detail.

11:45 MAIN STAGE:
Panel discussion

Mobile work, clouds and other challenges

For a long time now, security has no longer been confined to a company's own data center. What strategies are successful IT security managers pursuing to get to grips with the new challenges?
12:00 MASTERCLASSES:
Presentation

The human risk factor: How current threats put employees at the centre of your security strategy

In an age of increasingly complex security threats and growing compliance risks, attackers are targeting your most valuable asset: Your employees! Recognising that people play a central role in the success or failure of security measures, a people-centric approach to your security strategy is crucial to mitigating risk. Using current threats as examples, we will show you the dimensions of human risk and provide guidance on how to place employees at the centre of your security strategy in the long term.

12:30

Lunch break

Enjoy the lunch and make new contacts with the visitors and exhibitors at the Cybersecurity Summit.

13:30 MASTERCLASSES:
Presentation

How To Create Successful Malware and How to Defend with Zero Trust

In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.

13:45 MAIN STAGE:
 

Cybersecurity Summit Startup Awards

You will see innovative startups presenting their clever new solutions in the Cybersecurity business. The best three will receive a Cybersecurity Summit Startup Award – you decide!

14:15 MASTERCLASSES:
Presentation

Data is Dope! - Automated data security posture management with Varonis

Data has been the fuel of our business for a long time. Over the last few years, companies have been working hard to build up the castle walls around their most valuable asset. Nevertheless, we still have to ask ourselves why we still have a blind spot on data in security? Why are we not focusing on what we really want to protect? In this presentation you will learn how to close this blind spot with the automated Varonis Data Security Platform to find risks, automatically eliminate them and react to threats at an early stage. Find! Fix! Alert!

14:30 MAIN STAGE:
Panel discussion

Shortage of specialists in IT

How much has the shortage of skilled workers already become a security risk? How can understaffed cybersecurity departments still do their jobs?
14:30 MASTERCLASSES:
Presentation

Trotz Cyber Angriffen gut schlafen. Business Continuity Management at its Best.

14:45 MASTERCLASSES:
Presentation

Phases of an OT security programme - Challenges and solutions

Security in the area of operational technology (OT) is becoming increasingly important. While the concepts for securing this technology are generally the same as in IT, there are significant differences between the two worlds that lead to a number of challenges. This presentation provides a comprehensive overview of the differences between IT and OT and the different phases of an OT security programme. It describes the basic steps, continuous improvement and the implementation of risk-based and proactive measures. Special attention is given to the specific challenges and effective solutions at each stage to ensure the security and resilience of OT environments.

15:00 MASTERCLASSES:
Presentation

Creating an effective security operations platform

Cyber resilience has been an important aspect of cybersecurity for many years, yet most organizations struggle with building effective cyber security operations. During this presentation we will look at the reasons of this situation and show how to effectively manage your cybersecurity infrastructure using automated risk management, AI and a consolidated platform to get the full visibility of your cyber posture and the ability to automate your SOC operations. With NIS2 and DORA around the corner, we will present how to effectively tackle compliance requirements without sacrificing security.

15:15

Coffee break

Enjoy coffee and cake and make new contacts with the visitors and exhibitors of the Cybersecurity Summit.

15:45 MAIN STAGE:
Presentation

Incident Response – Have I been hacked??

An anonymized real case is used to interactively illustrate why an emergency plan is important and which points must/should be considered.
15:45 MASTERCLASSES:
Presentation

No more individual solutions for cyber security - they cost too much money, time and nerves.

Forget individual security solutions. You deserve better: ONE cybersecurity solution that can do (almost) everything. This allows you to maintain transparency and control in your network while also covering the technical requirements of NIS2. With All-in-one you save up to 80% time on implementation, training and operation.
Get comprehensive control and security for your IT with Enginsight:
ü Visualise IT infrastructures
ü Monitor networks
ü Detect attacks incl. alarms & automatic response
ü Simulate attacks
ü Document & analyse event logs
ü Create reports
Max Tarantik shows you how much more cybersecurity you can achieve in just 15 minutes with Enginsight.  
Hack your IT before someone else does!

16:00 MASTERCLASSES:
Presentation

AI in the SOC: The revolution is an evolution

This session will look at how AI will evolve in the SOC and how the technology will help, not replace, analysts. You'll learn how AI will evolve from using automation to build a base knowledge layer that AI agents will learn from to ultimately providing humans with information on how to effectively and successfully respond to threats. The session will present the three phases of AI's evolution and explore how the technical features of each phase will ultimately create a SOC that's human-driven and AI-powered.

16:15 MAIN STAGE:
Panel discussion

How do we embed IT Security in the organization - is the employee the weakest link?

As we all know, IT security is not just about software, tools and processes - employees are often seen as the weakest links in the security chain. How do leading companies increase awareness of security issues through employee training, knowledge management and similar measures?
16:15 MASTERCLASSES:
Presentation

The DevSecOps odyssey: closing the communication gap

The transition from DevOps to DevSecOps is crucial for security, but often suffers from a lack of communication. This is a major obstacle on this important journey. Where DevOps focussed on speed and efficiency, DevSecOps seamlessly integrates security practices into the entire development cycle.

16:30 MASTERCLASSES:
Presentation

Masterclass

Speaker Andreas Dondera will provide additional material (Banko emergency plan, emergency map) and answer questions from the audience. 

17:00 MAIN STAGE:
Presentation

Live-Podcast | Mind the Tech

Mind the Tech is the podcast that broadcasts live from the basement of the Internet. From cybercrime-as-a-service to hacked sex robots - Catrin and Isa take a look at what's going on behind the beautiful facade of digitalization. And at the Cybersecurity Summit, they're even doing it live and in color for the first time.

17:00 MASTERCLASSES:
Presentation

Cybersecurity put to the test: EU NIS2 Directive & EU Cyber Resilience Act - what companies need to consider

The NIS2 Directive sets new standards in the classification of companies within the EU and categorises them according to their economic criticality. Many companies that were not previously affected are now covered - what can a company do to comply with this directive? Who is the EU Cyber Resilience Act aimed at, what does it describe and what standards can be used to fulfil the requirements? Which products are affected and is there a state of the art in cybersecurity? We will shed light on these questions using individual examples in the presentation on standardisation in cybersecurity.

17:30 MAIN STAGE:
 

Main Stage Speaker Awards Ceremony

The top three speakers from our Main Stage will be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. Voting will take place using our app. Access is via your ticket code.

17:30 MASTERCLASSES:
 

Masterclasses Speaker Award Ceremony

The top three speakers from our Masterclasses will be honored. You decide which speakers you found particularly inspiring, charismatic and innovative. Voting will take place using our app. Access is via your ticket code.

18:00

Cybersecurity Summit After Work

Drinks, networking & Public Viewing for all participants.