21st & 22nd April 2027 in Hamburg
21st & 22nd April 2027 in Hamburg Contact: info@cybersecuritysumm.it or +49 40 999 993 868

Review of the Cybersecurity Summit 2026

We are delighted that we were able to organise the Cybersecurity Summit together with you. Exciting presentations, stimulating discussions, innovative exhibitors and start-ups and many insightful conversations with familiar and new faces from the cybersecurity industry lie behind us. To review all of this, we are providing the recordings of the stage programme as well as the Photowall images here.

Day 1 - MAIN STAGE

Day 1 - MAIN STAGE

PLAY TO PROTECT: How we can master cybersecurity through play

YouTube video thumbnail
Day 1 - MAIN STAGE

Sovereign Cloud Under Attack

YouTube video thumbnail
Day 1 - MAIN STAGE

Hacked! 72 hours of a CISOs nightmare

YouTube video thumbnail
Day 1 - MAIN STAGE

Cybersecurity Summit Startup Awards Part 1 - Binary Bunker

YouTube video thumbnail
Day 1 - MAIN STAGE

Cybersecurity Summit Startup Awards Part 1 - Pentaris Security

YouTube video thumbnail
Day 1 - MAIN STAGE

Cybersecurity Summit Startup Awards Part 1 - AlpenShield

YouTube video thumbnail
Day 1 - MAIN STAGE

Cybersecurity Summit Startup Awards Part 1 - Vantarion

YouTube video thumbnail
Day 1 - MAIN STAGE

Cybersecurity Summit Startup Awards Part 1 - Cyfidelity Security Services

YouTube video thumbnail
Day 1 - MAIN STAGE

Cybersecurity Summit Startup Awards Part 1 - Qumasoft

YouTube video thumbnail
Day 1 - MAIN STAGE

Cybersecurity Summit Startup Awards Part 1 - RedMimicry

YouTube video thumbnail
Day 1 - MAIN STAGE

‘CISO: Criminally Involved Security Officer?’ When responsibility becomes personal in the age of information security.

YouTube video thumbnail

Day 1 - ZUGSPITZE MASTERCLASSES

Day 1 - ZUGSPITZE MASTERCLASSES

Securing Your Network with Zero-Trust

YouTube video thumbnail
Day 1 - ZUGSPITZE MASTERCLASSES

Make your business a hard target for cybercriminals

YouTube video thumbnail
Day 1 - ZUGSPITZE MASTERCLASSES

The Next Wave of Cyberattacks Is Coming – Are Your Endpoints Ready? - Old but still dangerous: Log4Shell, PrintNightmare, and others as a blueprint for defending against tomorrow's cyberattacks

YouTube video thumbnail
Day 1 - ZUGSPITZE MASTERCLASSES

The discipline of Cyber Resilience. Aligning Technology, Data and your people.

YouTube video thumbnail
Day 1 - ZUGSPITZE MASTERCLASSES

The Power of Transparency: Identify and Reduce Attack Surfaces

YouTube video thumbnail
Day 1 - ZUGSPITZE MASTERCLASSES

AI Based attacks, the big shift. Ransomware resilience in 2026 and onwards

YouTube video thumbnail
Day 1 - ZUGSPITZE MASTERCLASSES

No Data Leaks Allowed: Mastering EASM with Private Cloud LLMs

YouTube video thumbnail
Day 1 - ZUGSPITZE MASTERCLASSES

Need for Speed: Narrowing the Attackers’ Lead with an Adaptive Security Culture.

YouTube video thumbnail

Day 1 - MATTERHORN MASTERCLASSES

Day 1 - MATTERHORN MASTERCLASSES

From vulnerability lists to measurable results: combining IT operations and security

YouTube video thumbnail
Day 1 - MATTERHORN MASTERCLASSES

Trends in Cyber Threat Scenarios – Why AI in the SOC Is More Important Than Ever

YouTube video thumbnail
Day 1 - MATTERHORN MASTERCLASSES

Secure File Flow in Critical Infrastructure

YouTube video thumbnail
Day 1 - MATTERHORN MASTERCLASSES

Knowledge is the best defense: What do you know about identities?

YouTube video thumbnail
Day 1 - MATTERHORN MASTERCLASSES

AI Everything: The AI's Double Game – Weapon of the Attackers & Shield of the Defenders

YouTube video thumbnail
Day 1 - MATTERHORN MASTERCLASSES

Information Security beyond Compliance

YouTube video thumbnail
Day 1 - MATTERHORN MASTERCLASSES

Resilience for everything: How to ensure Business Continuity across Cloud, Identity and AI

YouTube video thumbnail
Day 1 - MATTERHORN MASTERCLASSES

Claude Mythos hacks your identities in under 24 hours. What now?

YouTube video thumbnail
Day 1 - MATTERHORN MASTERCLASSES

The State of Human Risk: Building Trust for the Hybrid Workforce

YouTube video thumbnail
Day 1 - MATTERHORN MASTERCLASSES

Pre-emptive security, European-made – better safe than sorry

YouTube video thumbnail
Day 1 - MATTERHORN MASTERCLASSES

ISMS and Generative AI – Practical examples of the use of generative AI in ISMS

Day 2 - MAIN STAGE

Day 2 - MAIN STAGE

AI protects us! Or is it destroying us?

YouTube video thumbnail
Day 2 - MAIN STAGE

Beyond Passwords: IAM, Zero Trust and Identity Security for Businesses and Government in Europe

YouTube video thumbnail
Day 2 - MAIN STAGE

Artificial intelligence – From ChatGPT to GPT-4

YouTube video thumbnail
Day 2 - MAIN STAGE

NIS2, DORA, CRA: New rules for cybersecurity

YouTube video thumbnail
Day 2 - MAIN STAGE

Supply chain attacks, third-party risk & OT security: Trust as a weak point – when the attack comes via third parties

YouTube video thumbnail

Day 2 - ZUGSPITZE MASTERCLASSES

Day 2 - ZUGSPITZE MASTERCLASSES

Table-top exercise (TTX) – What’s the point of that?!

YouTube video thumbnail
Day 2 - ZUGSPITZE MASTERCLASSES

Tenant Resilience Without the Guesswork: Standardise and Restore Configurations

YouTube video thumbnail
Day 2 - ZUGSPITZE MASTERCLASSES

Implementing Zero Trust in a pragmatic way: From network visibility to AI-driven policy

YouTube video thumbnail
Day 2 - ZUGSPITZE MASTERCLASSES

Eclipsed Identites: Creating a Partner Identity Fabric

YouTube video thumbnail
Day 2 - ZUGSPITZE MASTERCLASSES

The Architecture of Resilience: Eliminating Complexity

YouTube video thumbnail

Day 2 - MATTERHORN MASTERCLASSES

Day 2 - MATTERHORN MASTERCLASSES

NIS-2 and the secure supply chain: How to ensure information security in supplier management

YouTube video thumbnail
Day 2 - MATTERHORN MASTERCLASSES

Staying ahead in the AI cyber race – Why security leaders must act now

YouTube video thumbnail
Day 2 - MATTERHORN MASTERCLASSES

From MSP to MIP: AI, Agents and the future of Managed Services

YouTube video thumbnail