The Network Group DACH Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
2025 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings and quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 22nd September 2025
08:30 - 09:00

Arrival, Registration & Breakfast Networking

09:00 - 09:10

Introduction from the Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson

Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments

09:10 - 09:40

The Quantum Threat is Here: Why Must You Prepare Now?

  • Understanding the advances in quantum computing & the implications for encryption
  • Outlining risks to data, “harvest now, decrypt later”
  • Tools to prepare now & future-proof organisational resilience

Anita Wehmann, Head of Vulnerability & Digital Autonomy, Dutch Ministry of the Interior

09:40 - 10:10

Exploring the Role of the CISO in 2025 & Beyond

  • Methods of moving from a technical security function to a strategic leadership position with influence across the entire business
  • Key advice on capitalising on your unique skillset in order to expose yourself to new opportunities
  • A breakdown on how to keep up with the expanding mandate of the CISO

Gideon Knocke, CISO, Pro Medicus

10:10 - 10:50

Panel Discussion: Driving Cultural Transformation to Widen Team Cyber Security Skillsets

  • Resources to empower staff to recognise & appropriately report security concerns
  • Tailoring cyber training initiatives to tackle increasingly sophisticated information security threats
  • Designing security breach training exercises to ensure staff understand how to respond to cyber attacks

Robert Hellwig, CISO, Siegen University
Boris Ortolf, Director Cyber Security, Baker Tilly
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments

10:50 - 11:00

Coffee Break & Networking

11:00 - 11:25

Open Forum Think Tank

Monitoring Emergency Privacy Threats

Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

AI Assistants Help if Organizations Manage the Business Risk

Boris Cipot, Senior Sales Engineer, Black Duck

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

The Cyber Report Your Board Actually Wants to See


Hermann Kramer, Founder & Strategic Advisor, Squalify

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
13:05 - 14:00

Networking Lunch

Stream 1 - Evolving Threat
14:00 - 14:35

Cyber Security in the Age of Deepfakes & the Metaverse

  • Guidance on determining cyber security priorities when selecting AI tools
  • Evaluating information security systems to identify areas where generative AI can increase operational efficiency
  • Resources to support staff in utilising generative AI as part of working processes

Patrick Ghion, Chief Cyber Strategy Officer, Geneva State Police

Stream 2 - Staff Recruitment & Retention
14:00 - 14:35

Creating Recruitment Programmes & Developing Retention Policies to Build High-Performing Teams

  • Evaluating recruitment schemes to tackle unconscious bias in processes & build diverse workforces
  • Establishing job roles at multiple levels of seniority to reach a wider range of applicants
  • Resources for soft skills training to support employees applying for internal promotion

Mario Hoffmann, Head of Cyber Resilience, ARRK Engineering

Stream 1 - Evolving Threat
14:35 - 15:10

Embedding Compliance Strategies to Meet New Information Security Regulations

  • EU Cyber Resilience Act: Implementing changes to information security measures to comply with new legislation
  • Guidance on working with other senior leaders to secure additional resources to fulfil regulations
  • Establishing regular reviews of information security processes & tools to address areas of non-compliance

Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government

Stream 2 - Cyber Security & Data
14:35 - 15:10

Making AI Work for Cyber Security

  • Exploring AI risk management & governance
  • Engaging with interactive scenarios & controls to discover strategies for managing AI non-determinism
  • Discussing the role of autonomous AI agents in cyber security operations

Joshua Hunter, Regional Director, DACH, Information Security Forum
Luka Ivezic, Practice Lead, Regulations & Emerging Technologies, Information Security Forum

15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Open Forum Think Tank

Building Cyber Resilience

Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments

15:50 - 16:15
Networking
16:15 - 16:40

Open Forum Think Tank

Zero Trust

Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
17:05 - 17:50

Panel Discussion: Implementing Emergency Procedures in Response to Malware Attacks

  • Establishing joined-up responses for staff to alert senior leaders about information security concerns
  • Developing post-attack processes to recover stolen & damaged company assets
  • Adapting response plans to mitigate the impact of human error on cyber security measures

Bartosz Prill, Head of Cyber Security, Gretsch-Unitas Group
Reinhard Bertram, Head of IT & Group Cyber Security, Softing
Andre Adelsbach, CISO, SES Satellites
Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government

19:00
Networking Dinner & Drinks Reception
Tuesday 23rd September 2025
08:30 - 09:00

Morning Registration & Breakfast

Informal networking over breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.

Roundtable 1: AI & ML

Joshua Hunter, Regional Director, DACH, Information Security Forum
Luka Ivezic, Practice Lead, Regulations & Emerging Technologies, Information Security Forum

Roundtable 2: Vulnerability Management

Neethu Balan, Head of Application Assurance, Allianz

Roundtable 3: Data Governance & DLP

Andre Adelsbach, CISO, SES Satellites

Roundtable 4: Cyber Security Awareness
Roundtable 5: Third-Party Risk Management

Kudakwashe Magwenzi, Deputy CISO, Moss

Roundtable 6: Cyber Resilience

Mario Hoffmann, Head of Cyber Resilience, ARKK Engineering

10:10 - 10:45

Roundtable Wrap-Up

Each host provides a short overview of key findings from their discussion to the room. This is an opportunity for everyone to take notes from each roundtable summary.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Open Forum Think Tank

Ransomware & Cyber Attacks

Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government

11:25 - 11:50
Networking
11:50 - 12:15

Open Forum Think Tank

Employee Training & Security Awareness

Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments
Sun Robin Flamm, Head of Cyber Security, KOKI Group

12:15 - 12:40
Networking
12:40 - 13:05

Networking

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
13:05 - 14:00

Networking Lunch

14:00-14:35

Tailoring Internal Information Security Policies to Tackle Insider Threats

  • Key tips on incorporating security checks as part of recruitment processes
  • Establishing information security clearance levels to control access to company data
  • Implementing procedures for removing internal security access for staff after leaving organisations

Manuel Ressel, CISO, Sauter

Stream 1 - Security & Supply Chains
14:35 - 15:10

Adapting Information Security Strategies to Strengthen Security in Supply Chains

  • Incorporating background security checks into procurement processes for securing new suppliers
  • Establishing information security & privacy agreements as part of vendor contracts
  • Engaging with vendors to strengthen their own security measures & build up cyber resilience in supply chains

Boris Ortolf, Director Cyber Security, Baker Tilly

Stream 2: Leadership
14:35 - 15:10

Developing Leadership Approaches to Improve Cyber Security Team Performance

  • Collaborating with other senior leaders to define targets for information security teams
  • Engaging with all staff to understand their role in contributing towards cyber security objectives
  • Creating intervention policies to support staff struggling to manage their workloads

Robert Hellwig, CISO, Siegen University

15:10 - 15:55

Panel Discussion: Managing a Fractured IT Landscape in the Age of AI

  • Exploring the challenges of a fractured IT landscape driven by hybrid, multi-cloud environments, shadow IT & legacy systems
  • Real-world strategies to simplify operations, improve visibility & enhancing governance across complex infrastructures.
  • Practical insights on future-proofing your IT landscape, enabling agility, innovation & resilience in the evolving age of AI.

Romeo Ayemele Djeujo, Head of Corporate Business Information Security, Zeiss
Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments

15:55 - 16:00
Closing remarks from Chairperson

Request an invitation
or book your place now

Request an invitation Book now

FRANKFURT, GERMANY
28-29 September, 2026

This site
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
Events
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages

The Network Group
51 Moorgate
London
EC2R 6LL

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy