-
MAIN STAGE
-
ZUGSPITZE Masterclasses
-
MATTERHORN Masterclasses
-
08:30
-
09:15
-
09:30Fireside Chat
Digital sovereignty & cyberwarfare
How geopolitical tensions are changing security architectures - and why ransomware has long been part of global power games.
Presentation:
Sandra Heger
NISHS.NRW / Universität Siegen
-
10:30
-
11:00Presentation
PLAY TO PROTECT: How we can master cybersecurity through play
Security is not a state, but a mindset. And that can be trained. What the Hack! introduces the concept behind serious gaming and shows how we can make ourselves cyber-resilient through play. In an interactive 20-minute game against hackers, we activate the collective knowledge of the audience. Experience live how serious gaming turns your users into a human firewall.
Presentation:
Nona Brodersen
Cybersecurity Summit Moderation
-
11:30Fireside Chat
Sovereign Cloud Under Attack
Europe’s path toward digital sovereignty is colliding with a new reality. Cyberattacks are increasingly shifting into API driven, multi cloud environments. This panel explores how organizations can combine data sovereignty, compliance and modern cloud security to stay protected.
Presentation:
Isabelle Ewald
BDO
-
12:00Presentation
Hacked! 72 hours of a CISOs nightmare
A ransomware attack! How should you respond?
In this turn-based tabletop simulation, participants take on the role of the CISO and must make decisions that will influence the course of events.
Can you minimize the damage as much as possible?
• Turn-based simulation of a ransomware attack
• Interactive involvement of participants
• Teaching best practices for crisis management
• What are the responsibilities of the board, CIO, head of communications, etc. – lessons learned from real-world experience
Presentation:
Nona Brodersen
Cybersecurity Summit Moderation
-
Presentation
10:00 Masterclass Keeper Security
Presentation:
Lisa Winkler
Cybersecurity Summit Moderation
-
Presentation
11:00 Masterclass: baramundi software
Presentation:
Lisa Winkler
Cybersecurity Summit Moderation
-
Presentation
12:00 The Power of Transparency: Identify and Reduce Attack Surfaces
- Eliminating Shadow IT: How Modern Exposure Management Uncovers Hidden Systems and Reduces Risk
- Breaking Down Silos: Why a Centralized, Holistic Approach Is Key to Attack Surface Reduction
- Automated Security: Detecting Threats Early and Enabling Proactive Action
Presentation:
Lisa Winkler
Cybersecurity Summit Moderation
-
12:30
-
14:00Presentation
Cybersecurity Summit Startup Awards Part 1
Here you can see innovative startups that present clever new solutions for digital innovations in IT security.
The best three will receive a Cybersecurity Summit Startup Award - you vote!Presentation:
Nona Brodersen
Cybersecurity Summit Moderation
-
14:45Presentation
‘CISO: Criminally Involved Security Officer?’ When responsibility becomes personal in the age of information security.
In this keynote speech, you – as a CISO or responsible manager – will learn how and why you personally can be held criminally liable, based on practical examples from consulting. You will also receive specific advice on basic rules of conduct that can be used to avoid or effectively limit liability risks.
Presentation:
Nona Brodersen
Cybersecurity Summit Moderation
-
15:15
-
15:45Panel discussion
Human Risk Factor
Firewalls, AI and zero trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords! Firewalls, AI and Zero Trust - but the biggest security risk remains: the human factor. Between phishing fails, password post-its and clicks on “open now!”, our panel guests discuss how companies can use the human factor not just as a weak point, but as a security booster. A talk with plenty of humor, hard truths and surprisingly practical solutions. Only for strong nerves and weak passwords!
Dennis Buroh
Minimax
Luna-Marika Dahl
E.ON Digital Technology
Sandra Heger
NISHS.NRW / Universität Siegen
Kari-Ann Mentoft-Pommer
Schnellecke Logistics
Patricia Köpfer
Schwarz
Presentation:
Lisa Fröhlich
Women4Cyber Germany / Link11
-
16:30Panel discussion
sector update: energy, finance, health
20-minute CISO talk on current challenges in the relevant sector
Presentation:
Isabelle Ewald
BDO
-
17:30Panel discussion
Future of the SOC: internal vs. MSSP
To what extent has the shortage of skilled workers already become a security risk?
What targeted measures can be taken to attract and promote more women in cybersecurity?
Mike Zimmermann
Universitätsklinikum Carl Gustav Carus
Lisa Fröhlich
Women4Cyber Germany / Link11
Hendrik Janßen
Biotronik
Presentation:
Dr. Georgia Papaioannou
Microsoft
-
18:00
Main Stage Speaker Awards ceremony
The three best speakers on the Main Stage will be honored. You decide which speaker you found particularly inspiring, charismatic and innovative. Voting takes place via our app. Access is via your ticket code.
Presentation:
Nona Brodersen
Cybersecurity Summit Moderation
-
Presentation
15:30 Masterclass: Greenbone
Presentation:
Lisa Winkler
Cybersecurity Summit Moderation
-
Presentation
16:00 Masterclass: A1 Digital
Presentation:
Lisa Winkler
Cybersecurity Summit Moderation
-
18:30 Cybersecurity Summit Awards Ceremony 2026
Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.
Presentation:
Lisa Winkler
Cybersecurity Summit Moderation
-
18:30 Cybersecurity Summit Awards Ceremony 2026
Vote in our app for the most inspiring, charismatic or innovative speakers. The top three speakers on each stage will receive a Cybersecurity Summit Speaker Award.
Presentation:
Susan Zare
Trailblazer Summits