Conference Programme 2024

Subpage Hero

     

Loading
CYBER SECURITY KEYNOTE THEATRE
Crowdstrike
  1. CYBER SECURITY KEYNOTE THEATRE
  2. CYBER SECURITY KEYNOTE THEATRE
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY KEYNOTE THEATRE
    A ransomware attack! How to react? In this turn-based table top simulation, participants take on the role of the CISO and have to make decisions that influence the further course of events.   Will you ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY KEYNOTE THEATRE
    Cloud Security Consolidation Extends Protection from Code to Runtime
    Join Florian Hartmann, Sales Engineering Manager at CrowdStrike, for a review of the current state of application security, a deeper dive into the challenges of securing applications, and see how CrowdStrike’s AI-native modern cloud security platform protects applications from code to runtime.
    • Human Factors of Cyber Security
    CYBER SECURITY KEYNOTE THEATRE
    It's more than phishing - how to supercharge your security awareness program
    Tell people not to click a link, pat each other on the back, and ride off into the sunset. If only security awareness training was that simple.In this session, Javvad Malik, Lead Security Awareness Ad ...
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY KEYNOTE THEATRE
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY KEYNOTE THEATRE
    • Ensuring and Applying Cloud Security
    CYBER SECURITY KEYNOTE THEATRE
    Browser security – the proven prevention layer for enterprise cybersecurity
    According to Google, 98% of attacks originate from internet usage and 80% of those target end user browsers – sadly all too successfully. Combine this stark reality, with users’ relentless demand for ...
    • DevSecOps: Embracing a Collaborative Approach
    CYBER SECURITY KEYNOTE THEATRE
    In July 2022, new cybersecurity regulations came into effect in Europe, demanding that the automotive industry has robust cyber security to protect vehicles from design to end-of-life. Great news for ...
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY KEYNOTE THEATRE
    The session will provide an overview which cybersecurity measures should be considered when: using AI off-the-shelf tools, in AI creation, in AI implementation in business processes, and which questio ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY KEYNOTE THEATRE
    As organisations transition to the cloud, navigating the complexities of security, compliance, and operational efficiency becomes paramount. Our panel today will explore how organisations can not only ...
  3. CYBER SECURITY KEYNOTE THEATRE
    MyFest is the ultimate after-work networking event that promises to be fun, relaxed and unforgettable.
CYBER SECURITY THEATRE 2
    • Human Factors of Cyber Security
    CYBER SECURITY THEATRE 2
    The Password Heist: Why Passkeys are the Future
    As cybercriminals continue to exploit weak passwords, it’s evident that companies need a new approach to ensure robust security. Join LastPass to see how vulnerable password protected accounts are and ...
  1. CYBER SECURITY THEATRE 2
    There are numerous challenges in building effective incident response capabilities within the automotive industry. Vehicles are complex environments and this creates difficulties in monitoring and con ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    Confidence in Cloud Security: One Step Ahead of the Madness
    In the era of rapid digital transformation, organizations are increasingly leveraging public cloud infrastructure to host their applications and workloads. However, the dynamic nature of cloud environ ...
    • Human Factors of Cyber Security
    CYBER SECURITY THEATRE 2
    In this session Hila Meller will cover several aspects of Human factors in Cyber Security: from myth-busting trues and lies about Biometrics trough sharing her personal story and insights about Divers ...
    • DevSecOps: Embracing a Collaborative Approach
    CYBER SECURITY THEATRE 2
    The DEV, The SEC and The OPS: A developer’s guide to modern security
    Legacy application security solutions like SAST and DAST miss the point of modern application development. Findings are riddled with false positives, results arrive too late for fixing and take way to ...
    • DevSecOps: Embracing a Collaborative Approach
    CYBER SECURITY THEATRE 2
    From Source to Production: Navigating Supply Chain Risks in Software Development and Strategies for Mitigation
    Ensuring the integrity of software is imperative for safeguarding against security threats and ensuring compliance. In this talk, we will explore the pivotal role of Software Bill of Materials (SBOM), ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    When the Sky Is Falling: Secure Communication in Cyber-Security and BCM
    Why do you need cloud security? In this presentation, Tom Hofmann illustrates the extent to which our daily communication runs via the cloud and shows what consequences arise if the usual communicatio ...
    • Human Factors of Cyber Security
    CYBER SECURITY THEATRE 2
    • Emphasising the human factors in cybersecurity and their influence on security risks. • Analysing case studies that show how human decisions have influenced cyberattacks. • Approaches to strengthen ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    Continuous Exposure Management - Wie man mit einem kontinuierlichen Management von Bedrohungen den Angreifern einen Schritt voraus ist
    Unternehmen haben es mit einer zunehmend komplexen Bedrohungslandschaft zu tun. Viele scheitern an der Selbsteinschätzung von Sicherheitsrisiken aufgrund isolierter Bedrohungsinformationen sowie einer ...
    • Human Factors of Cyber Security
    CYBER SECURITY THEATRE 2
    Simplify CVE Remediation
    Last year 28,902 critical vulnerabilities were published by NIST, each specific to a device and enabled features. These vulnerabilities provide bad actors an entry point to the network. The volume and ...
  2. CYBER SECURITY THEATRE 2
    Eviden – Detection Core
    Trotz Fachkräftemangel im Cybersicherheitsbereich: Der Detection Core mit Anomalieerkennung und KI-gesteuertem maschinellem Lernen als Managed Service löst effizient gestiegene Compliance-Anforderunge ...
CYBER SECURITY KEYNOTE THEATRE
Crowdstrike
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY KEYNOTE THEATRE
    Cybersicherheit im Zeitalter von KI - Wie erreichen Sie die nächste Stufe der IT Sicherheit
    Die Diskussion über Künstliche Intelligenz (AI) und mögliche Anwendungsfälle ist omnipräsent und auch im Security Kontext sind diese aktueller denn je. In diesem Vortrag beleuchten wir die jüngsten En ...
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY KEYNOTE THEATRE
    The evolving landscape of fraud in the age of e-commerce, highlighting the ever-changing threats that come with the digital era. We stress the importance of agility, preparedness, and the constant nee ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY KEYNOTE THEATRE
    Future-proofing cloud security: A new operating model
    A successful cloud security strategy needs to evolve to meet the changing needs of the business and growth of the cloud. Cutting-edge security teams are coming up with new approaches and initiatives t ...
  1. CYBER SECURITY KEYNOTE THEATRE
    Securing Tomorrow’s Software: Emerging trends in Application Security, AI Generated Code and the Software Supply Chain
    The Application Security landscape is constantly evolving. AI has become a major disruptor, both for development and security teams. Meanwhile, software supply chains continue to grow in complexity.   ...
  2. CYBER SECURITY KEYNOTE THEATRE
    Most cyber security threats have the potential to be encountered regardless of the size of organisations involved. However, the organisation’s ability to face and manage the resulting challenges can v ...
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY KEYNOTE THEATRE
    Will application security become obsolete? Will we even need security teams now that AI is supporting developers in writing code?Join Anja Loether, Application Security @ GitHub, EMEA, to see how larg ...
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY KEYNOTE THEATRE
    This session will address these FAQs for anyone new to AI or who wants a structured overview of this rapidly evolving field. What is AI? What is generative AI and other AI flavours and techniques? How ...
    • AI Security: A Threat or Opportunity?
    • Human Factors of Cyber Security
    CYBER SECURITY KEYNOTE THEATRE
    How AI can stabilize user’s behavior and awareness as a silent force in the background. It can even support people not being IT specialists or IT lovers without making them feel infantilized.
CYBER SECURITY THEATRE 2
    • Addressing the Evolving Threat Landscape
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    In this presentation, I will share my experience of using established standards and frameworks to construct a robust security program for an electronics manufacturing company with a growing SaaS divis ...
    • AI Security: A Threat or Opportunity?
    CYBER SECURITY THEATRE 2
    Security Testing Reinvented: Embracing the Era of AI-Generated Code
    Join us for an insightful discussion on reshaping security testing in response to the growing prevalence of AI-generated code in today’s software landscape. As we navigate this shift, maintaining reli ...
    • DevSecOps: Embracing a Collaborative Approach
    CYBER SECURITY THEATRE 2
  1. CYBER SECURITY THEATRE 2
    This session will explore the transformative potential of AI-driven OSINT and its implications. In cybersecurity, Open Source Intelligence (OSINT) is pivotal, providing crucial insights into threats a ...
    • Addressing the Evolving Threat Landscape
    CYBER SECURITY THEATRE 2
    Uncover the adversaries hiding in plain sight
    Tracking 230+ adversaries and noting a record eCrime breakout time, the 2024 Global Threat Report unveils an alarming rise in covert activity and a cyber threat landscape dominated by stealth. Dominik ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    Cloud Data Breaches – Leading Cause in 2023 & Prevention
    In today’s digital landscape, where cloud adaption is pervasive, ensuring robust security measures across the entire lifecycle is paramount. Join us in this insightful session as we delve into the cru ...
    • Ensuring and Applying Cloud Security
    CYBER SECURITY THEATRE 2
    5 Ways Data Will Supercharge your Cloud and Network Security
    Security teams constantly have urgent “challenges” (a nice way of saying disasters) thrown at them, and each one needs to be solved immediately. Given the scope, complexity and total lack of visibilit ...
  2. CYBER SECURITY THEATRE 2
    Empowering Efficiency in the Cloud Era
    As cloud computing advances, businesses navigate the intricate balance of efficiency and data security. Delve into how pioneering solutions are revolutionizing efficiency and security paradigms in the ...

Sponsors Included

Platinum Sponsors



 

Gold Sponsors

Silver Sponsors


 

Content Stream Sponsors



 

Partners Included

Platinum Partner

PARTNER

PARTNER

PARTNER

Partner

Partner


 

Partner


 

Partner

Partner

Partner

Partner

Partner

Partner

Partner

Travel Partner