The Network Group DACH Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
2025 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings and quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 22nd September 2025
08:30 - 09:00

Arrival, Registration & Breakfast Networking

09:00 - 09:10

Introduction from the Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson

Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments

09:10 - 09:40

Designing Security Strategies to Support Business Growth

  • Engaging with board members to advocate for additional resources
  • Embedding information security credentials into organisation profiles to create competitive advantages
  • Communicating with other departments to uphold cyber security processes & ensure operational efficiency

Owais Ahmed, SVP, IT Governance, Risk & Compliance, Nexent Bank

09:40 - 10:10

Exploring the Role of the CISO in 2025 & Beyond

  • Methods of moving from a technical security function to a strategic leadership position with influence across the entire business
  • Key advice on capitalising on your unique skillset in order to expose yourself to new opportunities
  • A breakdown on how to keep up with the expanding mandate of the CISO

Gideon Knocke, CISO, Pro Medicus

10:10 - 10:50

Panel Discussion: Driving Cultural Transformation to Widen Team Cyber Security Skillsets

  • Resources to empower staff to recognise & appropriately report security concerns
  • Tailoring cyber training initiatives to tackle increasingly sophisticated information security threats
  • Designing security breach training exercises to ensure staff understand how to respond to cyber attacks

Robert Hellwig, CISO, Siegen University
Edd Barber, CISO, WEL Networks
Melanie Hendrickx, Head of Information Security Governance, Risk & Compliance, Metro
Boris Ortolf, Director Cyber Security, Baker Tilly
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments

10:50 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 1

Monitoring Emergency Privacy Threats

 

 

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

AI Assistants Help if Organizations Manage the Business Risk

Boris Cipot, Senior Sales Engineer, Black Duck

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

Hermann Kramer, Founder & Strategic Advisor, Squalify

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
13:05 - 14:00

Networking Lunch

Stream 1 - Evolving Threat
14:00 - 14:35

Cyber Security in the Age of Deepfakes & the Metaverse

  • Guidance on determining cyber security priorities when selecting AI tools
  • Evaluating information security systems to identify areas where generative AI can increase operational efficiency
  • Resources to support staff in utilising generative AI as part of working processes

Patrick Ghion, Chief Cyber Strategy Officer, Geneva State Police

Stream 2 - Staff Recruitment & Retention
14:00 - 14:35

Creating Recruitment Programmes & Developing Retention Policies to Build High-Performing Teams

  • Evaluating recruitment schemes to tackle unconscious bias in processes & build diverse workforces
  • Establishing job roles at multiple levels of seniority to reach a wider range of applicants
  • Resources for soft skills training to support employees applying for internal promotion

Mario Hoffmann, Head of Cyber Resilience, ARRK Engineering

Stream 1 - Evolving Threat
14:35 - 15:10

Embedding Compliance Strategies to Meet New Information Security Regulations

  • EU Cyber Resilience Act: Implementing changes to information security measures to comply with new legislation
  • Guidance on working with other senior leaders to secure additional resources to fulfil regulations
  • Establishing regular reviews of information security processes & tools to address areas of non-compliance

Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government

Stream 2 - Cyber Security & Data
14:35 - 15:10

Making AI Work for Cyber Security

  • Exploring AI risk management & governance
  • Engaging with interactive scenarios & controls to discover strategies for managing AI non-determinism
  • Discussing the role of autonomous AI agents in cyber security operations

Joshua Hunter, Regional Director, DACH, Information Security Forum
Luka Ivezic, Practice Lead, Regulations & Emerging Technologies, Information Security Forum

15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Workshop 4

Building Cyber Resilience

 

 

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

Zero Trust

 

 

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
17:05 - 17:50

Panel Discussion: Implementing Emergency Procedures in Response to Malware Attacks

  • Establishing joined-up responses for staff to alert senior leaders about information security concerns
  • Developing post-attack processes to recover stolen & damaged company assets
  • Adapting response plans to mitigate the impact of human error on cyber security measures

Bartosz Prill, Head of Cyber Security, Gretsch-Unitas Group
Reinhard Bertram, Head of IT & Group Cyber Security, Softing
Andre Adelsbach, CISO, SES Satellites
Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government

19:00
Networking Dinner & Drinks Reception
Tuesday 23rd September 2025
08:30 - 09:00

Morning Registration & Breakfast

Informal networking over breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.

Roundtable 1: AI & ML

Joshua Hunter, Regional Director, DACH, Information Security Forum
Luka Ivezic, Practice Lead, Regulations & Emerging Technologies, Information Security Forum

Roundtable 2: Vulnerability Management

Neethu Balan, Head of Application Assurance, Allianz

Roundtable 3: Aligning InfoSec & Business Strategy

Edd Barber, CISO, WEL Networks

Roundtable 4: Cyber Security Awareness

Máté Lendvai, BISO, Jedox

Roundtable 5: Third-Party Risk Management

Kudakwashe Magwenzi, Deputy CISO, Moss

Roundtable 6: Cyber Resilience

Mario Hoffmann, Head of Cyber Resilience, ARKK Engineering

10:10 - 10:45

Roundtable Wrap-Up

Each host provides a short overview of key findings from their discussion to the room. This is an opportunity for everyone to take notes from each roundtable summary.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 6

Ransomware & Cyber Attacks

 

 

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 7

Employee Training & Security Awareness

 

 

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 8

Ransomware

 

 

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
13:05 - 14:00

Networking Lunch

Stream 1 - Security Measures
14:00 - 14:35

Evaluating Information Security Measures to Strengthen Cyber Resilience

  • Defining objectives for security controls to inform performance measures
  • Guidance on introducing additional security measures to ensure smooth transitions to new systems
  • Collecting feedback from staff on useability of security measures to increase uptake of security tools

Máté Lendvai, BISO, Jedox

Stream 2 - Insider Threats
14:00 - 14:35

Tailoring Internal Information Security Policies to Tackle Insider Threats

  • Key tips on incorporating security checks as part of recruitment processes
  • Establishing information security clearance levels to control access to company data
  • Implementing procedures for removing internal security access for staff after leaving organisations

Manuel Ressel, CISO, Sauter

Stream 1 - Security & Supply Chains
14:35 - 15:10

Adapting Information Security Strategies to Strengthen Security in Supply Chains

  • Incorporating background security checks into procurement processes for securing new suppliers
  • Establishing information security & privacy agreements as part of vendor contracts
  • Engaging with vendors to strengthen their own security measures & build up cyber resilience in supply chains

Boris Ortolf, Director Cyber Security, Baker Tilly

Stream 2: Leadership
14:35 - 15:10

Developing Leadership Approaches to Improve Cyber Security Team Performance

  • Collaborating with other senior leaders to define targets for information security teams
  • Engaging with all staff to understand their role in contributing towards cyber security objectives
  • Creating intervention policies to support staff struggling to manage their workloads

Robert Hellwig, CISO, Siegen University

15:10 - 15:55

Panel Discussion: Managing a Fractured IT Landscape in the Age of AI

  • Exploring the challenges of a fractured IT landscape driven by hybrid, multi-cloud environments, shadow IT & legacy systems
  • Real-world strategies to simplify operations, improve visibility & enhancing governance across complex infrastructures.
  • Practical insights on future-proofing your IT landscape, enabling agility, innovation & resilience in the evolving age of AI.

Romeo Ayemele Djeujo, Head of Corporate Business Information Security, Zeiss
Bart Pieters, Consultant Information Security & Privacy, Central Dutch Government
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments

15:55 - 16:00
Closing remarks from Chairperson

Request an invitation
or book your place now

Request an invitation Book now

FRANKFURT, GERMANY
22-23 September, 2025

This site
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
Events
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages

The Network Group
6 Snow Hill
London
EC1A 2AY

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy