28th & 29th April 2026 in Hamburg
28th & 29th April 2026 in Hamburg Contact: info@cybersecuritysumm.it or +49 40 999 993 868

Cybersecurity Summit Day 1

Cybersecurity Summit Day 1

The agenda of the Cybersecurity Summit on April 28th, 2026.

Cybersecurity Summit Day 2

Cybersecurity Summit Day 2

The agenda of the Cybersecurity Summit on April 29th, 2026.



28th Apr 2026 Cybersecurity Summit Day 1

  1. MAIN STAGE
  1. ZUGSPITZE Masterclasses
  1. MATTERHORN Masterclasses
  1. 08:30
     

    08:30 Welcome

    Our doors open at 08:30 - so you can start networking at the first coffee and secure the best seat

  1. 09:15
    Presentation

    Welcome

    Opening  of the event with a warm welcome from the organizers.

  2. 09:30
    Fireside Chat

    Digital sovereignty & cyberwarfare

    How geopolitical tensions are changing security architectures - and why ransomware has long been part of global power games.

  3. 10:30
     

    Coffee break

    Enjoy coffee and cake and make new contacts with visitors and exhibitors.

  4. 11:00
    Presentation

    PLAY TO PROTECT: How we can master cybersecurity through play

    Security is not a state, but a mindset. And that can be trained. What the Hack! introduces the concept behind serious gaming and shows how we can make ourselves cyber-resilient through play. In an interactive 20-minute game against hackers, we activate the collective knowledge of the audience. Experience live how serious gaming turns your users into a human firewall.

  5. 11:30
    Fireside Chat

    Sovereign Cloud Under Attack

    Europe’s path toward digital sovereignty is colliding with a new reality. Cyberattacks are increasingly shifting into API driven, multi cloud environments. This panel explores how organizations can combine data sovereignty, compliance and modern cloud security to stay protected.

  6. 12:00
    Presentation

    Hacked! 72 hours of a CISOs nightmare

    A ransomware attack! How should you respond?

    In this turn-based tabletop simulation, participants take on the role of the CISO and must make decisions that will influence the course of events.

    Can you minimize the damage as much as possible?

    • Turn-based simulation of a ransomware attack

    • Interactive involvement of participants

    • Teaching best practices for crisis management

    • What are the responsibilities of the board, CIO, head of communications, etc. – lessons learned from real-world experience

  1. Presentation

    10:00 Masterclass Keeper Security

  2. Presentation

    10:30 Masterclass Threatlocker

  3. Presentation

    11:00 Masterclass: baramundi software

  4. Presentation

    12:00 The Power of Transparency: Identify and Reduce Attack Surfaces

    • Eliminating Shadow IT: How Modern Exposure Management Uncovers Hidden Systems and Reduces Risk 
    • Breaking Down Silos: Why a Centralized, Holistic Approach Is Key to Attack Surface Reduction 
    • Automated Security: Detecting Threats Early and Enabling Proactive Action
  1. Presentation

    10:15 Keynote: glueckkanja

  2. Presentation

    10:45 Masterclass: Ontinue

  3. Presentation

    11:30 Masterclass: greenhats

  1. 12:30

    12:30 Networking & Lunch break

    Enjoy lunch and make new contacts with visitors and exhibitors.

  1. 14:00
    Presentation

    Cybersecurity Summit Startup Awards Part 1

    Here you can see innovative startups that present clever new solutions for digital innovations in IT security. 
    The best three will receive a Cybersecurity Summit Startup Award - you vote!

  2. 14:45
    Presentation

    ‘CISO: Criminally Involved Security Officer?’ When responsibility becomes personal in the age of information security.

    In this keynote speech, you – as a CISO or responsible manager – will learn how and why you personally can be held criminally liable, based on practical examples from consulting. You will also receive specific advice on basic rules of conduct that can be used to avoid or effectively limit liability risks.

  3. 15:15
     

    Networking & Coffee break

    Enjoy coffee and cake and make new contacts with visitors and exhibitors.

  4. 15:45
    Panel discussion

    Human Risk Factor

    Firewalls, AI and zero trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords! Firewalls, AI and Zero Trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords!

  5. 16:30
    Panel discussion

    sector update: energy, finance, health

    20-minute CISO talk on current challenges in the relevant sector

  6. 17:30
    Panel discussion

    Future of the SOC: internal vs. MSSP

    To what extent has the shortage of skilled workers already become a security risk? 
    What targeted measures can be taken to attract and promote more women in cybersecurity?

  7. 18:00
     

    Main Stage Speaker Awards ceremony

    The three best speakers on the Main Stage will be honored. You decide which speaker you found particularly inspiring, charismatic and innovative. Voting takes place via our app. Access is via your ticket code.

  1. Presentation

    14:00 Masterclass: SySS

  2. Presentation

    15:00 Masterclass: Opswat

  3. Presentation

    15:30 Masterclass: Greenbone

  4.  

    15:45 Networking & Coffee break

    Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

  5. Presentation

    16:00 Masterclass: A1 Digital

  6. Presentation

    18:00 Masterclass Akarion

  7.  

    18:30 Cybersecurity Summit Awards Ceremony 2026

    Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

  1. Presentation

    14:00 Masterclass: avodaq

  2. Presentation

    14:30 Masterclass: ibi systems

  3. Presentation

    15:00 Masterclass: Rubrik

  4.  

    15:30 Networking & Coffee break

    Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

  5. Presentation

    15:45 Masterclass: DIU & beta systems

  6. Presentation

    16:15 Masterclass: KnowBe4

  7.  

    18:30 Cybersecurity Summit Awards Ceremony 2026

    Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

  1. 18:45
     

    18:45 Cybersecurity Summit AFTERSHOW LOUNGE

    DJ, drinks & networking for all participants

  1. 23:00
     

    23:00 End of today's event

28th April 2026 Cybersecurity Summit Day 1

08:30

Welcome

Our doors open at 08:30 - so you can start networking at the first coffee and secure the best seat

09:15 MAIN STAGE:
Presentation

Welcome

Opening  of the event with a warm welcome from the organizers.

09:30 MAIN STAGE:
Fireside Chat

Digital sovereignty & cyberwarfare

How geopolitical tensions are changing security architectures - and why ransomware has long been part of global power games.

10:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass Keeper Security

10:15 MATTERHORN MASTERCLASSES:
Presentation

Keynote: glueckkanja

10:30 MAIN STAGE:

Coffee break

Enjoy coffee and cake and make new contacts with visitors and exhibitors.

10:30 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass Threatlocker

10:45 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: Ontinue

11:00 MAIN STAGE:
Presentation

PLAY TO PROTECT: How we can master cybersecurity through play

Security is not a state, but a mindset. And that can be trained. What the Hack! introduces the concept behind serious gaming and shows how we can make ourselves cyber-resilient through play. In an interactive 20-minute game against hackers, we activate the collective knowledge of the audience. Experience live how serious gaming turns your users into a human firewall.

11:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: baramundi software

11:30 MAIN STAGE:
Fireside Chat

Sovereign Cloud Under Attack

Europe’s path toward digital sovereignty is colliding with a new reality. Cyberattacks are increasingly shifting into API driven, multi cloud environments. This panel explores how organizations can combine data sovereignty, compliance and modern cloud security to stay protected.

11:30 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: greenhats

12:00 MAIN STAGE:
Presentation

Hacked! 72 hours of a CISOs nightmare

A ransomware attack! How should you respond?

In this turn-based tabletop simulation, participants take on the role of the CISO and must make decisions that will influence the course of events.

Can you minimize the damage as much as possible?

• Turn-based simulation of a ransomware attack

• Interactive involvement of participants

• Teaching best practices for crisis management

• What are the responsibilities of the board, CIO, head of communications, etc. – lessons learned from real-world experience

12:00 ZUGSPITZE MASTERCLASSES:
Presentation

The Power of Transparency: Identify and Reduce Attack Surfaces

  • Eliminating Shadow IT: How Modern Exposure Management Uncovers Hidden Systems and Reduces Risk 
  • Breaking Down Silos: Why a Centralized, Holistic Approach Is Key to Attack Surface Reduction 
  • Automated Security: Detecting Threats Early and Enabling Proactive Action
14:00 MAIN STAGE:
Presentation

Cybersecurity Summit Startup Awards Part 1

Here you can see innovative startups that present clever new solutions for digital innovations in IT security. 
The best three will receive a Cybersecurity Summit Startup Award - you vote!

14:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: SySS

14:00 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: avodaq

14:30 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: ibi systems

14:45 MAIN STAGE:
Presentation

‘CISO: Criminally Involved Security Officer?’ When responsibility becomes personal in the age of information security.

In this keynote speech, you – as a CISO or responsible manager – will learn how and why you personally can be held criminally liable, based on practical examples from consulting. You will also receive specific advice on basic rules of conduct that can be used to avoid or effectively limit liability risks.

15:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: Opswat

15:00 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: Rubrik

15:15 MAIN STAGE:

Networking & Coffee break

Enjoy coffee and cake and make new contacts with visitors and exhibitors.

15:30 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: Greenbone

15:30 MATTERHORN MASTERCLASSES:

Networking & Coffee break

Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

15:45 MAIN STAGE:
Panel discussion

Human Risk Factor

Firewalls, AI and zero trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords! Firewalls, AI and Zero Trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords!

15:45 ZUGSPITZE MASTERCLASSES:

Networking & Coffee break

Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

15:45 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: DIU & beta systems

16:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: A1 Digital

16:15 MATTERHORN MASTERCLASSES:
Presentation

Masterclass: KnowBe4

16:30 MAIN STAGE:
Panel discussion

sector update: energy, finance, health

20-minute CISO talk on current challenges in the relevant sector

17:30 MAIN STAGE:
Panel discussion

Future of the SOC: internal vs. MSSP

To what extent has the shortage of skilled workers already become a security risk? 
What targeted measures can be taken to attract and promote more women in cybersecurity?

18:00 MAIN STAGE:

Main Stage Speaker Awards ceremony

The three best speakers on the Main Stage will be honored. You decide which speaker you found particularly inspiring, charismatic and innovative. Voting takes place via our app. Access is via your ticket code.

18:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass Akarion

18:30 ZUGSPITZE MASTERCLASSES:

Cybersecurity Summit Awards Ceremony 2026

Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

18:30 MATTERHORN MASTERCLASSES:

Cybersecurity Summit Awards Ceremony 2026

Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

18:45

Cybersecurity Summit AFTERSHOW LOUNGE

DJ, drinks & networking for all participants

23:00

End of today's event

29th Apr 2026 Cybersecurity Summit Day 2

  1. MAIN STAGE
  1. ZUGSPITZE Masterclasses
  1. MATTERHORN Masterclasses
  1. 09:00
    Presentation

    09:00 Welcome

    Our doors open at 9:00 a.m. - so you can start networking with your first coffee and secure the best seat.

  1. 10:00
     

    Welcome

    Opening of the event and welcome by the moderator

  2. 10:15
    Fireside Chat

    Global Cybersecurity Outlook: Challenges, Cooperation, and the Road Ahead

    Cyber threats know no borders. This international fireside chat brings together experts from around the world to explore the evolving global cybersecurity landscape. 

  3. 10:45
    Panel discussion

    Cybersecurity in the age of quantum computers

    When will the quantum threat become real - and how are we already preparing for post-quantum cryptography?
    In this discussion, we talk to cryptography professionals, government representatives and tech thought leaders about how real the threat is, what post-quantum methods are waiting in the wings - and whether we need to act today to avoid looking old tomorrow.

  4. 11:30
    Panel discussion

    AI protects us! Or is it destroying us?

    Cybersecurity meets artificial intelligence - double agent or bodyguard?
    Artificial intelligence is both a blessing and a curse: on the one hand, it helps to detect anomalies, but on the other, it can also be used for extremely sophisticated attacks. Deepfakes, generative malware and autonomous attack tools are on the dark side - smart firewalls and adaptive threat detection on the light side. This panel clarifies: Who is currently ahead - man or machine?

  5. 12:15
    Fireside Chat

    Beyond Passwords: IAM, Zero Trust and Identity Security for Businesses and Government in Europe

    In this panel discussion, experts will examine how modern identity and access management and zero trust strategies have become central components of modern security architectures in Europe. The focus will be on how companies and government organisations can reliably protect digital identities, control access and meet compliance and data protection requirements. The discussion will highlight practical approaches – from passwordless authentication and strong authentication to identity governance and role management to zero trust architectures that sustainably reduce attack surfaces.
    The panel will also consider the specific challenges facing the public sector, such as federal structures, varying degrees of maturity and the implementation of EU-wide requirements such as NIS2 and DORA.

  1. Presentation

    10:00 Masterclass Corelight

  2. Presentation

    10:30 Masterclass: CoreView

  3. Presentation

    11:00 Masterclass: Akamai

  4. Presentation

    11:45 Masterclass: Ping Identity

  1. Presentation

    10:30 Secure supply chain: How information security works in supplier management

    Insight from the field: The implementation of information security in supplier management presents companies with major challenges. The increasing dependence on IT is leading to IT services being outsourced to specialised service providers. Cyber security incidents at suppliers can have a direct impact on the core business. The NIS-2 Implementation Act requires targeted protection of the supply chain in order to minimise risks. The workshop offers a practical introduction to the phases of supplier management and the associated information security measures. Let us consider together whether you are already taking the right measures.

  1. 12:45

    12:45 Networking & Lunch break

    Enjoy lunch and make new contacts with visitors and exhibitors.

  1. 13:45
    Presentation

    Artificial intelligence – From ChatGPT to GPT-4

    The breakthrough of artificial intelligence has been heralded for a long time. But now, with ChatGPT and GPT-4, the social and economic impact is becoming apparent, even to experts who do not always have a complete overview. This lecture places AI in the context of digitalisation, explains the principles and industry dynamics of digital corporations, and illustrates how artificial intelligence is both underestimated and overestimated. And yet it is changing the world.

  2. 14:30
    Presentation

    Cybersecurity Summit Startup Awards Part 2

    Here you can see innovative startups that present clever new solutions for digital innovations in customer service. The best three will receive a service Summit Startup Award - you vote!

  3. 15:15
    Panel discussion

    NIS2, DORA, CRA: New rules for cybersecurity

    This panel shows what companies can expect in terms of operations with NIS2, DORA and CRA. The focus is on practical compliance, risk management and implementation of the new EU cybersecurity requirements. Experts provide insights into challenges and solutions for everyday life.

  4. 16:00
    Fireside Chat

    Supply chain attacks, third-party risk & OT security: Trust as a weak point – when the attack comes via third parties

    Trust is good – but in networked systems, it is often the biggest weak point. This panel highlights the growing threat posed by supply chain attacks and the risks involved in dealing with third-party providers. The focus is on securing complex supply chains, industrial control systems (OT) and critical infrastructures such as energy supply.

  5. 16:30
     

    Presentation of the Main Stage Speaker Awards

    The three best speakers on the Main Stage will be honored. You decide which speaker you found particularly inspiring, charismatic and innovative. Voting takes place via our app. Access is via your ticket code.

  1. Presentation

    13:30 The growing role of artificial intelligence for greater automation and efficiency in the SOC

    Problem statement
    Security operations centres are under increasing pressure: the
    attack surface is growing, threats are becoming more extensive, while resources
    and budgets remain limited. CISOs must master three critical areas simultaneously
    :
    Strategic visibility: understanding the threat landscape and
    risk development
    Operational excellence: optimising monitoring, responsiveness and
    security levels
    Tactical effectiveness: Rapid detection and containment of current incidents
    The key question is: How can SecOps performance be improved while
    realising the principle of ‘doing more with less’?
    Five critical shortcomings of conventional SOC solutions
    The presentation identifies fundamental weaknesses in existing approaches:
    1. Speed: Slow data queries lead to delayed
    threat detection
    2. Data range: Limited historical analyses restrict threat hunting
    3. Complexity: High barriers to entry due to complex query languages and
    training requirements
    4. Robustness: Inadequate incident response and disaster recovery processes
    5. Intelligence gap: Threat indicators are not systematically correlated
    and utilised
    These shortcomings require a fundamentally new approach to cyber security.
    AI as a solution component

    Artificial intelligence systematically addresses all identified vulnerabilities:
    Data processing: AI searches petabytes in seconds instead of minutes.
    Historical analysis: Multiple years of data become fully accessible.
    User-friendliness: Natural language replaces complex query syntax.
    Proactive security: Continuous, intelligence-driven threat hunting.
    Automation: Rapid correlation, contextualisation and
    recommended actions.
    This anomaly architecture provides unified visibility across security and IT
    operations, accelerates decision-making, automates
    routine tasks and ensures continuous adaptation to new
    threat patterns.
    Strategic benefits
    AI integration enables SOC teams to move from reactive alert handling to
    proactive threat management. The platform dynamically reduces the
    attack surface, contextualises observations with global threat
    intelligence and enables precise, rapid countermeasures – while
    remaining cost-effective and scalable.

  2. Presentation

    14:00 Masterclass: SoSafe

  3.  

    15:45 Networking & Coffee break

    Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

  4.  

    16:00 Cybersecurity Summit Awards Ceremony 2026

    Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

  1.  

    15:30 Networking & Coffee break

    Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

  2.  

    16:00 Cybersecurity Summit Awards Ceremony 2026

    Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

  1. 17:00
     

    17:00 End of Cybersecurity Summit 2026

29th April 2026 Cybersecurity Summit Day 2

09:00

Welcome

Our doors open at 9:00 a.m. - so you can start networking with your first coffee and secure the best seat.

10:00 MAIN STAGE:

Welcome

Opening of the event and welcome by the moderator

10:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass Corelight

10:15 MAIN STAGE:
Fireside Chat

Global Cybersecurity Outlook: Challenges, Cooperation, and the Road Ahead

Cyber threats know no borders. This international fireside chat brings together experts from around the world to explore the evolving global cybersecurity landscape. 

10:30 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: CoreView

10:30 MATTERHORN MASTERCLASSES:
Presentation

Secure supply chain: How information security works in supplier management

Insight from the field: The implementation of information security in supplier management presents companies with major challenges. The increasing dependence on IT is leading to IT services being outsourced to specialised service providers. Cyber security incidents at suppliers can have a direct impact on the core business. The NIS-2 Implementation Act requires targeted protection of the supply chain in order to minimise risks. The workshop offers a practical introduction to the phases of supplier management and the associated information security measures. Let us consider together whether you are already taking the right measures.

10:45 MAIN STAGE:
Panel discussion

Cybersecurity in the age of quantum computers

When will the quantum threat become real - and how are we already preparing for post-quantum cryptography?
In this discussion, we talk to cryptography professionals, government representatives and tech thought leaders about how real the threat is, what post-quantum methods are waiting in the wings - and whether we need to act today to avoid looking old tomorrow.

11:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: Akamai

11:30 MAIN STAGE:
Panel discussion

AI protects us! Or is it destroying us?

Cybersecurity meets artificial intelligence - double agent or bodyguard?
Artificial intelligence is both a blessing and a curse: on the one hand, it helps to detect anomalies, but on the other, it can also be used for extremely sophisticated attacks. Deepfakes, generative malware and autonomous attack tools are on the dark side - smart firewalls and adaptive threat detection on the light side. This panel clarifies: Who is currently ahead - man or machine?

11:45 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: Ping Identity

12:15 MAIN STAGE:
Fireside Chat

Beyond Passwords: IAM, Zero Trust and Identity Security for Businesses and Government in Europe

In this panel discussion, experts will examine how modern identity and access management and zero trust strategies have become central components of modern security architectures in Europe. The focus will be on how companies and government organisations can reliably protect digital identities, control access and meet compliance and data protection requirements. The discussion will highlight practical approaches – from passwordless authentication and strong authentication to identity governance and role management to zero trust architectures that sustainably reduce attack surfaces.
The panel will also consider the specific challenges facing the public sector, such as federal structures, varying degrees of maturity and the implementation of EU-wide requirements such as NIS2 and DORA.

13:30 ZUGSPITZE MASTERCLASSES:
Presentation

The growing role of artificial intelligence for greater automation and efficiency in the SOC

Problem statement
Security operations centres are under increasing pressure: the
attack surface is growing, threats are becoming more extensive, while resources
and budgets remain limited. CISOs must master three critical areas simultaneously
:
Strategic visibility: understanding the threat landscape and
risk development
Operational excellence: optimising monitoring, responsiveness and
security levels
Tactical effectiveness: Rapid detection and containment of current incidents
The key question is: How can SecOps performance be improved while
realising the principle of ‘doing more with less’?
Five critical shortcomings of conventional SOC solutions
The presentation identifies fundamental weaknesses in existing approaches:
1. Speed: Slow data queries lead to delayed
threat detection
2. Data range: Limited historical analyses restrict threat hunting
3. Complexity: High barriers to entry due to complex query languages and
training requirements
4. Robustness: Inadequate incident response and disaster recovery processes
5. Intelligence gap: Threat indicators are not systematically correlated
and utilised
These shortcomings require a fundamentally new approach to cyber security.
AI as a solution component

Artificial intelligence systematically addresses all identified vulnerabilities:
Data processing: AI searches petabytes in seconds instead of minutes.
Historical analysis: Multiple years of data become fully accessible.
User-friendliness: Natural language replaces complex query syntax.
Proactive security: Continuous, intelligence-driven threat hunting.
Automation: Rapid correlation, contextualisation and
recommended actions.
This anomaly architecture provides unified visibility across security and IT
operations, accelerates decision-making, automates
routine tasks and ensures continuous adaptation to new
threat patterns.
Strategic benefits
AI integration enables SOC teams to move from reactive alert handling to
proactive threat management. The platform dynamically reduces the
attack surface, contextualises observations with global threat
intelligence and enables precise, rapid countermeasures – while
remaining cost-effective and scalable.

13:45 MAIN STAGE:
Presentation

Artificial intelligence – From ChatGPT to GPT-4

The breakthrough of artificial intelligence has been heralded for a long time. But now, with ChatGPT and GPT-4, the social and economic impact is becoming apparent, even to experts who do not always have a complete overview. This lecture places AI in the context of digitalisation, explains the principles and industry dynamics of digital corporations, and illustrates how artificial intelligence is both underestimated and overestimated. And yet it is changing the world.

14:00 ZUGSPITZE MASTERCLASSES:
Presentation

Masterclass: SoSafe

14:30 MAIN STAGE:
Presentation

Cybersecurity Summit Startup Awards Part 2

Here you can see innovative startups that present clever new solutions for digital innovations in customer service. The best three will receive a service Summit Startup Award - you vote!

15:15 MAIN STAGE:
Panel discussion

NIS2, DORA, CRA: New rules for cybersecurity

This panel shows what companies can expect in terms of operations with NIS2, DORA and CRA. The focus is on practical compliance, risk management and implementation of the new EU cybersecurity requirements. Experts provide insights into challenges and solutions for everyday life.

15:30 MATTERHORN MASTERCLASSES:

Networking & Coffee break

Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

15:45 ZUGSPITZE MASTERCLASSES:

Networking & Coffee break

Enjoy some coffee and cake and make new contacts with other visitors and exhibitors of the Cybersecurity Summit.

16:00 MAIN STAGE:
Fireside Chat

Supply chain attacks, third-party risk & OT security: Trust as a weak point – when the attack comes via third parties

Trust is good – but in networked systems, it is often the biggest weak point. This panel highlights the growing threat posed by supply chain attacks and the risks involved in dealing with third-party providers. The focus is on securing complex supply chains, industrial control systems (OT) and critical infrastructures such as energy supply.

16:00 ZUGSPITZE MASTERCLASSES:

Cybersecurity Summit Awards Ceremony 2026

Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

16:00 MATTERHORN MASTERCLASSES:

Cybersecurity Summit Awards Ceremony 2026

Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.

16:30 MAIN STAGE:

Presentation of the Main Stage Speaker Awards

The three best speakers on the Main Stage will be honored. You decide which speaker you found particularly inspiring, charismatic and innovative. Voting takes place via our app. Access is via your ticket code.

17:00

End of Cybersecurity Summit 2026