The Network Group DACH Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
2026 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings and quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 8th June 2026
08:30 - 09:00

Arrival, Registration & Breakfast Networking

09:00 - 09:15

Introduction from the Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson

Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments

09:15 - 09:45

The Changing Role of the CISO: Challenges & Opportunities for 2026

  • Collaborating with senior leaders to integrate information security into enterprise strategies
  • Incorporating risk management approaches to developing information security policies
  • Strengthening security cultures to increase staff capabilities in recognising and reporting security threats
09:45 - 10:15

Evaluating and Enhancing IT Internal Control Processes to Ensure Audit-Ready Compliance Across the Company

  • Establishing continuous review cycles to align with evolving external auditor expectations and internal standards
  • Implementing consistent, transparent reporting and remediation governance for control execution and non-compliance
  • Strengthening organizational resilience and audit reliability through mature, scalable, and standardized IT control frameworks

Riccardo Bianchi, CISO, DHL

10:15 - 10:45

Developing Security Audits to Monitor Gaps in Organisational Cyber Strategies

  • Tailoring audits to ensure security strategies comply with new regulations
  • Establishing information gathering methods to deliver a comprehensive audit of security measures
  • Utilising findings from audits to secure additional investments in security resources

Boris Ortolf, Director Cyber Security, Baker Tilly

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 1

Data Governance

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

Vulnerability Management

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

Cloud Security

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
13:05 - 14:00

Networking Lunch

Stream 1 - Information Security Operations
14:00 - 14:35

Evaluating the Cyber Resilience Act to Inform Approaches to Designing Information Security Measures

  • Redesigning cyber security measures to identify and address non-compliance with the Cyber Resilience Act
  • Guidance on engaging with board members to secure resources for transitioning to compliant hardware
  • Training schemes to support staff adapt working processes to uphold the Cyber Resilience Act

Mario Hoffmann, Head of Cyber Resilience, Swissbit

Stream 2 - Information Security Awareness
14:00 - 14:35

Embedding Cyber Security Cultures to Broaden Organisation-Wide Security Capabilities

  • Key advice on securing buy-in from senior leaders to support information security strategies
  • Engaging with all employees to understand their role in upholding cyber security measures
  • Incorporating security awareness training into professional development opportunities

Patrick Ghion, Head Regional Cyber Competence Centres for Western Switzerland, State of Geneve

Stream 1 - Information Security Operations
14:35 - 15:10

Leadership Approaches to Improve Team Performances

  • Using frameworks to assign IT responsibilities to staff based on their strengths and abilities
  • Regular updates with teams during periods of significant change within IT departments
  • Creating opportunities for staff to input into IT strategy development to claim ownership of team results

Michael Fontner, Head of Global IT Security, Herrenknecht

Stream 2 - Information Security Awareness
14:35 - 15:10

Implementing Vulnerability Management Policies to Build Up Information Security Measures

  • Maintaining regular reviews of monitoring vulnerabilities of digital assets: best practice
  • Establishing procedures for staff to appropriately report security vulnerability concerns
  • Prioritising vulnerability risks to tackle gaps in security defences
15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Workshop 4

Third Party Risk Management

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

 

 

Hosted by Securiti

 

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
17:05 - 17:50

Panel Discussion: Exploring Opportunities for AI to Expand Cyber Security Operations

  • Incorporating behavioural analysis software to create a baseline of normal information security activity and increase efficiency in cyber threat detection
  • Establishing automated processes in cyber security measures to free up staff workloads
  • Creating safeguarding measures to protect security systems from AI-driven attacks

Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments (moderator)

19:00
Networking Dinner & Drinks Reception
Tuesday 9th June 2026
08:30 - 09:00

Morning Registration & Breakfast

Informal networking over breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.

Roundtable 1: AI & ML

 

Roundtable 2: Regulatory Compliance

Merwin William Godwin, Head of Cyber Security Architecture, Siemens

Roundtable 3: Risk Management

Vullnet Shkodra, Head of Information Risk, ING

Roundtable 4: Cyber Security Awareness
Roundtable 5: Cloud Security
Roundtable 6: Security Architecture

Marco Scarito, Head of Enterprise Information Security Architecture, Cembra Money Bank

10:10 - 10:45

Roundtable Wrap-Up

Each host provides a short overview of key findings from their discussion to the room. This is an opportunity for everyone to take notes from each roundtable summary.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 6

A Roundtable for Security Leaders Who Are Done With Security Theatre

 

 

Alex Goller, Principal Solutions Architect, Illumio

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 7

Malware Protection

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 8

Application Security

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
13:05 - 14:00

Networking Lunch

Stream 1 - Security Resilience
14:00 - 14:35

Designing Governance Frameworks to Strengthen Information Security Strategies

  • Establishing organisation-wide security practices for all departments to uphold cyber strategies
  • Best practice in incorporating security responsibilities into senior leadership positions
  • Creating accountability frameworks to ensure senior leaders are held responsible for security decision-making

Riccardo Riccobene, CISO, State Street

Stream 2 - Organisation-Wide Security
14:00 - 14:35

Adapting Cyber Security Policies to Strengthen Security in Supply Chains

  • Key advice on incorporating third party security policies into procurement processes
  • Implementing risk-based approaches to sharing data with suppliers
  • Collaborating with vendors to strengthen their security measures and increase cyber resilience in supply chains

Laszlo Meszaros, Executive Director – Information Security & ICT Risk, CMC Markets

Stream 1 - Security Resilience
14:35 - 15:10

Utilising Information Security Software to Support Cyber Resilience Strategies

  • Key tips on working with software developers to tailor security technology to meet company needs
  • Tools to support staff transition to new security software
  • Adapting security software to scale up cyber security operations

Johannes Valenti, Head of IT Security, RAFI

Stream 2 - Organisation-Wide Security
14:35 - 15:10

Designing Information Security Defences to Uphold Organisation-Wide Cyber Resilience

  • Tailoring information security strategies to identify and tackle gaps in cyber defences
  • Incorporating encryption software to strengthen the security measures of company devices
  • Adapting security defences to tackle increasingly sophisticated cyber threats

Jan Kominek, CISO, ING

15:10 - 15:55

Panel Discussion: Designing Emergency Response Plans to Mitigate the Impact of Cyber Attacks

  • Implementing joined-up procedures to escalate and tackle cyber security incidents
  • Developing post-attack responses to recover lost or stolen digital assets
  • Evaluating security incident data to highlight and address gaps in cyber attack response plans

Kim-Christin Zöllkau, Head of Security Policy, German Federal Ministry of Defence
Christian Keller, CISO, Syntegon

15:55 - 16:00
Closing remarks from Chairperson

Request an invitation
or book your place now

Request an invitation Book now

Munich Germany
8-9 June 2026

This site
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
Events
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages

The Network Group
51 Moorgate
London
EC2R 6LL

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy