Arrival, registration & breakfast networking
Introduction from the Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson.
Robert Hellwig, CISO, University of Siegen
Aligning Information Security Strategies to Meet Business Purposes
- Defining outcomes for information security strategies to ensure they contribute towards company objectives
- Working with all employees to incorporate information security measures into working practices
- Engaging with senior leaders to secure resources to strengthen cyber security policies
Alexander Zhitenev, Group CISO, IFCO Systems
Preparing Response Plans to Strengthen Defences against Cyber Attacks
- Developing incident response guidelines to contain the spread of ransomware attacks
- Procedures to eradicate cyber threats and recover damaged resources
- Learning lessons from ransomware attacks to inform future cyber resilience strategies
Captain Benjamin Bartels, Security Policy, German Federal Ministry of Defence
Expanding Staff Information Security Skills to Strengthen Cyber Resilience
- Defining the responsibilities of all employees to uphold cyber security measures
- Professional development opportunities to expand information security knowledge
- Developing cyber resilience initiatives to reduce human error
Máté Lendvai, Senior IT Security Manager, Jedox
Tobias Schöps, IT & Information Security Officer, Jedox
Coffee break & networking
Workshop 1
Unblocking the SOC – You can’t fight what you can’t see
Felix Blanke, Senior Manager & Security Engineering, Exabeam
Workshop 2
Break the Attack Chain – Why it’s effective to use a People Centric Approach
Simon Riehle, Sales Engineer—DACH, Proofpoint
Workshop 3
Hosted by Cribl
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking lunch
Embedding Cyber Security Cultures into Working Processes
- Incorporating procedures for raising and escalating security concerns into working practices
- Resources to increase staff awareness of information security terminology and processes
- Key tips on developing leadership approaches to strengthen cyber resilience
Jawad Merchant, Director of IT & Information Security, Xeneta
Collaborative Approaches to Strengthening Organisation-Wide Cyber Security
- Engaging with departments to evaluate and address gaps in respective cyber defences
- Internal communication strategies to develop joined-up approaches to raising security concerns
- Key tips on using new technology to strengthen company-wide security controls
Captain Patrick Ghion, Head Regional Cyber Competence Centres for Western Switzerland, State of Geneve
Data & Machine Learning for a Scaling Organisation
Sanchit Juneja, Director-Product (Data Science & Machine Learning Platform), Booking.com
Maintaining Privacy as part of Widening Security Controls
- Guidance on upholding data privacy legislation when expanding information security controls
- Implementing encryption software to deliver company privacy and data protection policies
- Adapting information security policies to maintain privacy in hybrid working environments
Bernd Vellguth, Head of Risk Management, Compliance & Privacy, Microsoft
Coffee break & networking
Workshop 4
Context is King… Prioritising complex risks in the cloud
Workshop 5
Upholding Information Security in Hybrid Working Environments
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Panel Discussion: Working in Partnership to Monitor and Tackle External Threats
- Tools and resources to detect emerging security trends and inform future information security policies
- Developing interventions to prevent cyber security events escalating to become security breach incidents
- Engaging with staff to raise awareness of new external threats and how to report them
Lyzia van Iterson, Regional ISO, LKQ Group
Jan Kominek, CISO, ING Bank
Bart Pieters, Head of Information Security & Privacy, Ministry of the Interior, Central Dutch Government
Morning registration & breakfast
Informal networking over breakfast
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Aleksandra Rybak, Information Security Officer, Vice President, State Street
Shantanu Kumar Das, Information Security Officer, Sportfive
Dusan Tomic, IT Security Product Manager & Project Coordinator, International Atomic Energy Agency (IAEA)
Nitesh Gaikwad, Global CISO, Raisin
Máté Lendvai, Senior IT Security Manager, Jedox
Rainer Rehm, President, (ISC)² Germany Chapter
Wrap-up session
Each host provides a short overview of key findings from their discussion to the room. This is an opportunity for everyone to take notes from each roundtable summary.
Coffee break & networking
Open Forum Think Tank
Vulnerability Management
Johannes Valenti, Head of IT Security, RAFI
Open Forum Think Tank Session
Risk Management Compliance
Veselin Monev, ISO, Pilatus Aircraft
Workshop 8
Bridging the cyber security skills gap
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking lunch
Working with Partner Organisations to Build Up Cyber Security within Supply Chains
- Implementing third party risk assessments when securing new vendor companies
- Regular reviews of data sharing frameworks with vendors to strengthen supply chain security measures
- Collaborating with suppliers to improve their security arrangements and reduce risk within supply chains
Tobias Kilga, Head of Corporate IT, MED-EL
Using Reporting Frameworks to Inform Future Information Security Controls
- Implementing a robust reporting system to benchmark the performance of security controls
- Designing a dashboard to visualise and monitor results from security reporting
- Utilising reports to secure additional security resources from senior leaders
Measuring the Success of Security Measures to Identify Areas for Improvement
- Key advice on designing KPIs to determine the objectives for security measures
- Embedding security metrics programmes to evaluate trends in reported security incidents
- Using incident data to tackle gaps in security measures and inform cyber resilience strategies
Zarija Milic, Managing Director Information Technology, Addiko Bank
Identifying Vulnerabilities in Chatbots
- Threat modeling machine learning software
- Vulnerability classes
- Challenges of testing non-deterministic generative AI
Cezary Cerekwicki, Senior Director of Security, Opera
Panel Discussion: Developing Talent Recruitment and Retention Policies to Grow Workforce Capabilities
- Broadening recruitment strategies to create a diverse workforce, including graduate schemes and apprenticeships
- Designing individualised progression plans to support staff achieve professional goals and reduce employee turnover
- Adapting staff training schemes to tackle workforce skills shortages and prepare for emerging cyber security challenges
Ali Baccouche, IT Security & Data Protection Officer, EMEA, Texas Instruments
Melanie Krull, Head of Security Operations, Tui
Johannes Valenti, Head of IT Security, RAFI