Arrival, Registration & Breakfast Networking
Introduction from the Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson
Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments
Designing Security Strategies to Support Business Growth
- Engaging with board members to advocate for additional resources
- Embedding information security credentials into organisation profiles to create competitive advantages
- Communicating with other departments to uphold cyber security processes & ensure operational efficiency
Owais Ahmed, SVP, IT Governance, Risk & Compliance, Nexent Bank
Exploring the Role of the CISO in 2025 & Beyond
- Methods of moving from a technical security function to a strategic leadership position with influence across the entire business
- Key advice on capitalising on your unique skillset in order to expose yourself to new opportunities
- A breakdown on how to keep up with the expanding mandate of the CISO
Gideon Knocke, CISO, Pro Medicus
Panel Discussion: Driving Cultural Transformation to Widen Team Cyber Security Skillsets
- Resources to empower staff to recognise & appropriately report security concerns
- Tailoring cyber training initiatives to tackle increasingly sophisticated information security threats
- Designing security breach training exercises to ensure staff understand how to respond to cyber attacks
Robert Hellwig, CISO, Siegen University
Edd Barber, CISO, WEL Networks
Melanie Hendrickx, Head of Information Security Governance, Risk & Compliance, Metro
Boris Ortolf, Director Cyber Security, Baker Tilly
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments
Coffee Break & Networking
Workshop 1
Monitoring Emergency Privacy Threats
Workshop 2
AI Assistants Help if Organizations Manage the Business Risk
Boris Cipot, Senior Sales Engineer, Black Duck
Workshop 3
Hermann Kramer, Founder & Strategic Advisor, Squalify
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Cyber Security in the Age of Deepfakes & the Metaverse
- Guidance on determining cyber security priorities when selecting AI tools
- Evaluating information security systems to identify areas where generative AI can increase operational efficiency
- Resources to support staff in utilising generative AI as part of working processes
Patrick Ghion, Chief Cyber Strategy Officer, Geneva State Police
Creating Recruitment Programmes & Developing Retention Policies to Build High-Performing Teams
- Evaluating recruitment schemes to tackle unconscious bias in processes & build diverse workforces
- Establishing job roles at multiple levels of seniority to reach a wider range of applicants
- Resources for soft skills training to support employees applying for internal promotion
Mario Hoffmann, Head of Cyber Resilience, ARRK Engineering
Embedding Compliance Strategies to Meet New Information Security Regulations
- EU Cyber Resilience Act: Implementing changes to information security measures to comply with new legislation
- Guidance on working with other senior leaders to secure additional resources to fulfil regulations
- Establishing regular reviews of information security processes & tools to address areas of non-compliance
Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government
Making AI Work for Cyber Security
- Exploring AI risk management & governance
- Engaging with interactive scenarios & controls to discover strategies for managing AI non-determinism
- Discussing the role of autonomous AI agents in cyber security operations
Joshua Hunter, Regional Director, DACH, Information Security Forum
Luka Ivezic, Practice Lead, Regulations & Emerging Technologies, Information Security Forum
Coffee Break & Networking
Workshop 4
Building Cyber Resilience
Workshop 5
Zero Trust
15:25 – 17:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Panel Discussion: Implementing Emergency Procedures in Response to Malware Attacks
- Establishing joined-up responses for staff to alert senior leaders about information security concerns
- Developing post-attack processes to recover stolen & damaged company assets
- Adapting response plans to mitigate the impact of human error on cyber security measures
Bartosz Prill, Head of Cyber Security, Gretsch-Unitas Group
Reinhard Bertram, Head of IT & Group Cyber Security, Softing
Andre Adelsbach, CISO, SES Satellites
Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government
Morning Registration & Breakfast
Informal networking over breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Joshua Hunter, Regional Director, DACH, Information Security Forum
Luka Ivezic, Practice Lead, Regulations & Emerging Technologies, Information Security Forum
Neethu Balan, Head of Application Assurance, Allianz
Edd Barber, CISO, WEL Networks
Máté Lendvai, BISO, Jedox
Kudakwashe Magwenzi, Deputy CISO, Moss
Mario Hoffmann, Head of Cyber Resilience, ARKK Engineering
Roundtable Wrap-Up
Each host provides a short overview of key findings from their discussion to the room. This is an opportunity for everyone to take notes from each roundtable summary.
Coffee Break & Networking
Workshop 6
Ransomware & Cyber Attacks
Workshop 7
Employee Training & Security Awareness
Workshop 8
Ransomware
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Evaluating Information Security Measures to Strengthen Cyber Resilience
- Defining objectives for security controls to inform performance measures
- Guidance on introducing additional security measures to ensure smooth transitions to new systems
- Collecting feedback from staff on useability of security measures to increase uptake of security tools
Máté Lendvai, BISO, Jedox
Tailoring Internal Information Security Policies to Tackle Insider Threats
- Key tips on incorporating security checks as part of recruitment processes
- Establishing information security clearance levels to control access to company data
- Implementing procedures for removing internal security access for staff after leaving organisations
Manuel Ressel, CISO, Sauter
Adapting Information Security Strategies to Strengthen Security in Supply Chains
- Incorporating background security checks into procurement processes for securing new suppliers
- Establishing information security & privacy agreements as part of vendor contracts
- Engaging with vendors to strengthen their own security measures & build up cyber resilience in supply chains
Boris Ortolf, Director Cyber Security, Baker Tilly
Developing Leadership Approaches to Improve Cyber Security Team Performance
- Collaborating with other senior leaders to define targets for information security teams
- Engaging with all staff to understand their role in contributing towards cyber security objectives
- Creating intervention policies to support staff struggling to manage their workloads
Robert Hellwig, CISO, Siegen University
Panel Discussion: Managing a Fractured IT Landscape in the Age of AI
- Exploring the challenges of a fractured IT landscape driven by hybrid, multi-cloud environments, shadow IT & legacy systems
- Real-world strategies to simplify operations, improve visibility & enhancing governance across complex infrastructures.
- Practical insights on future-proofing your IT landscape, enabling agility, innovation & resilience in the evolving age of AI.
Romeo Ayemele Djeujo, Head of Corporate Business Information Security, Zeiss
Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments