The Network Group DACH Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
2025 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings and quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 22nd September 2025
08:30 - 09:00

Arrival, Registration & Breakfast Networking

09:00 - 09:10

Introduction from the Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson

Bart Pieters, Head of Information Security & Privacy, Central Dutch Government
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments

09:10 - 09:40

Designing Security Strategies to Support Business Growth

  • Engaging with board members to advocate for additional resources
  • Embedding information security credentials into organisation profiles to create competitive advantages
  • Communicating with other departments to uphold cyber security processes & ensure operational efficiency

Michael Beaupre, CISO, Hays

09:40 - 10:10

Exploring the Role of the CISO in 2025 & Beyond

  • Methods of moving from a technical security function to a strategic leadership position with influence across the entire business
  • Key advice on capitalising on your unique skillset in order to expose yourself to new opportunities
  • A breakdown on how to keep up with the expanding mandate of the CISO

Gideon Knocke, CISO, Pro Medicus

10:10 - 10:50

Panel Discussion: Driving Cultural Transformation to Widen Team Cyber Security Skillsets

  • Resources to empower staff to recognise & appropriately report security concerns
  • Tailoring cyber training initiatives to tackle increasingly sophisticated information security threats
  • Designing security breach training exercises to ensure staff understand how to respond to cyber attacks

Robert Hellwig, CISO, Siegen University
Marc Vallotton, CISO, Banque Internationale à Luxembourg Suisse
Edd Barber, CISO, WEL Networks
Melanie Hendrickx, Head of Information Security Governance, Risk & Compliance, Metro
Boris Ortolf, Director Cyber Security, Baker Tilly

10:50 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 1

Monitoring Emergency Privacy Threats

 

 

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

Hosted by Black Duck

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

AI Security

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
13:05 - 14:00

Networking Lunch

Stream 1 - Evolving Threat
14:00 - 14:35

Case Study: Cyber Security in Geneva State Police

  • Guidance on determining cyber security priorities when selecting AI tools
  • Evaluating information security systems to identify areas where generative AI can increase operational efficiency
  • Resources to support staff in utilising generative AI as part of working processes

Patrick Ghion, Chief Cyber Strategy Officer, Geneva State Police

Stream 2 - Cyber Security & Data
14:00 - 14:35

The Convergence of Security, AI & Trust

  • Driving a systems-based certification strategy that enables organisations to build lasting digital trust
  • Unifying controls to streamline requirements & accelerate innovation
  • Demonstrate proactive governance to boost stakeholder confidence

Christian Gerling, Head of Information & Data Security, DQS

Stream 1 - Evolving Threat
14:35 - 15:10

Embedding Compliance Strategies to Meet New Information Security Regulations

  • EU Cyber Resilience Act: Implementing changes to information security measures to comply with new legislation
  • Guidance on working with other senior leaders to secure additional resources to fulfil regulations
  • Establishing regular reviews of information security processes & tools to address areas of non-compliance

Bart Pieters, Head of Information Security & Privacy, Central Dutch Government

Stream 2 - Staff Recruitment & Retention
14:35 - 15:10

Creating Recruitment Programmes & Developing Retention Policies to Build High-Performing Teams

  • Evaluating recruitment schemes to tackle unconscious bias in processes & build diverse workforces
  • Establishing job roles at multiple levels of seniority to reach a wider range of applicants
  • Resources for soft skills training to support employees applying for internal promotions
15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Workshop 4

Building Cyber Resilience

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

Zero Trust

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
17:05 - 17:50

Panel Discussion: Implementing Emergency Procedures in Response to Malware Attacks

  • Establishing joined-up responses for staff to alert senior leaders about information security concerns
  • Developing post-attack processes to recover stolen & damaged company assets
  • Adapting response plans to mitigate the impact of human error on cyber security measures

Bartosz Prill, Head of Cyber Security, Gretsch-Unitas Group

19:00
Networking Dinner & Drinks Reception
Tuesday 23rd September 2025
08:30 - 09:00

Morning Registration & Breakfast

Informal networking over breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.

Roundtable 1: AI & ML
Roundtable 2: Ransomware Protection
Roundtable 3: Aligning InfoSec & Business Strategy

Edd Barber, CISO, WEL Networks

Roundtable 4: Cyber Security Awareness

Máté Lendvai, BISO, Jedox

Roundtable 5: Cloud Security
Roundtable 6: Security Governance
10:10 - 10:45

Roundtable Wrap-Up

Each host provides a short overview of key findings from their discussion to the room. This is an opportunity for everyone to take notes from each roundtable summary.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 6

Ransomware & Cyber Attacks

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 7

Employee Training & Security Awareness

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 8

Ransomware

11:00 – 13:05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
13:05 - 14:00

Networking Lunch

Stream 1 - Security Measures
14:00 - 14:35

Evaluating Information Security Measures to Strengthen Cyber Resilience

  • Defining objectives for security controls to inform performance measures
  • Guidance on introducing additional security measures to ensure smooth transitions to new systems
  • Collecting feedback from staff on useability of security measures to increase uptake of security tools

Máté Lendvai, BISO, Jedox

Stream 2 - Insider Threats
14:00 - 14:35

Tailoring Internal Information Security Policies to Tackle Insider Threats

  • Key tips on incorporating security checks as part of recruitment processes
  • Establishing information security clearance levels to control access to company data
  • Implementing procedures for removing internal security access for staff after leaving organisations

Manuel Ressel, CISO, Sauter

Stream 1 - Security & Supply Chains
14:35 - 15:10

Adapting Information Security Strategies to Strengthen Security in Supply Chains

  • Incorporating background security checks into procurement processes for securing new suppliers
  • Establishing information security & privacy agreements as part of vendor contracts
  • Engaging with vendors to strengthen their own security measures & build up cyber resilience in supply chains

Boris Ortolf, Director Cyber Security, Baker Tilly

Stream 2: Leadership
14:35 - 15:10

Developing Leadership Approaches to Improve Cyber Security Team Performance

  • Collaborating with other senior leaders to define targets for information security teams
  • Engaging with all staff to understand their role in contributing towards cyber security objectives
  • Creating intervention policies to support staff struggling to manage their workloads

Robert Hellwig, CISO, Siegen University

15:10 - 15:55

Panel Discussion: Implementing Vulnerability Management Policies to Address Gaps in Information Security Systems

  • Staff training schemes to embed procedures for recognising & notifying colleagues about potential gaps in cyber security systems
  • Evaluating performance data of information security measures to highlight emerging trends in cyber security vulnerabilities
  • Regular reviews of information security technology & software to identify & tackle risks to organisation-wide cyber security

Neethu Balan, Head of Compliance, Allianz

15:55 - 16:00
Closing remarks from Chairperson

Request an invitation
or book your place now

Request an invitation Book now

FRANKFURT, GERMANY
22-23 September, 2025

This site
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
Events
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages

The Network Group
6 Snow Hill
London
EC1A 2AY

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy