Event Agenda
15th – 16th April 2026 // Frankfurt
15th – 16th April 2026 // Frankfurt
Theme: Orchestrating Cyber Resilience Through Automated Systems
5 Dynamic Panel Discussions
Join senior thought leaders as they exchange insights, compare strategies & present diverse perspectives on today’s most pressing topics.
1 Interactive Group Discussion
Be part of the conversation! Join 1 of 4 working groups to brainstorm, collaborate & bring fresh ideas to the table.
2 Real-World Case Studies
Hear powerful, firsthand accounts from peers addressing real-world challenges. Explore solutions & actionable insights to apply in your own work.
14 Insightful Presentations
Stay on the cutting edge with exclusive presentations on the latest trends, research & impactful strategies shaping tomorrow’s landscape.
1 Set of Engaging Roundtable
Choose from 3 hot topics & join a roundtable aligning with your interests to share ideas, benchmark against your peers & leave with strategic insights.
Networking
Expand your network through engaging ice-breakers and innovative networking sessions.
Collect Content
Revisit presentations, access white papers and check-out product guides post-event by saving content to your virtual swag bag.
| Day 1 // 15th April 2026 08:00 – 17:20 CET Chair by: Daniel Schatz, CISO, Qiagen |
|
![]() |
08:00Registration & Coffee |
![]() |
08:50Opening Address Chair: Daniel Schatz, CISO, Qiagen |
![]() |
09:00Panel Discussion: Cyber Security Under Pressure: Approaching and Navigating Geopolitical Risks ● How are rising geopolitical tensions globally, reshaping the cyber threat landscape for organisations in the DACH region? ● What lessons can be drawn from recent nation-state cyber operations targeting a variety of sectors and how can resilience in these industries be strengthened? ● How can DACH-based enterprises and public institutions anticipate and counter the increasing use of cyber tools as instruments of geopolitical conflict? ● In what ways can the private sector, government bodies, and international organisations foster stronger collaboration to address cyber threats driven by geopolitical interests? . – Moderator Daniel Schatz, CISO, Qiagen – Patrick Ghion, Head Regional Cyber Competence Centre for Western Switzerland, State of Geneve – Riccardo Sepe, Global CISO, Guess – Cesar Oliveira, CISO, CMS . |
![]() |
09:40Presentation: The State of Human Risk 2025 Artificial intelligence has long become part of everyday business operations. Humans and AI agents now work side by side, yet many existing security strategies are not designed for this reality. Companies are increasingly facing risks that arise both from human error and from the autonomous behavior of AI systems. Based on an international study involving 4,200 experts from 14 countries, the presentation illustrates how the risk profile of organizations is shifting. While email continues to be the most important attack channel—where people are manipulated or make mistakes—AI-related risks are emerging as the fastest-growing threat area. At the same time, employees expect the productive use of AI tools, placing additional pressure on existing security and governance models. . Key messages: 43% of organizations report incidents involving AI AI is considered the biggest challenge for cybersecurity leaders 56% of employees are dissatisfied with their company’s AI strategy . – Dr. Martin Krämer, CISO Advisor, KnowBe4 |
![]() |
10:10Networking Break |
![]() |
10:50Presentation: Beyond the Audit: What Real Resilience Looks Like in European Security Teams European security teams are under pressure from every side: more audits, more evidence requests, more supplier scrutiny, and more regulatory complexity. Compliance remains essential, but many organisations are asking a harder question: does passing audits actually mean we are more resilient? This session explores where audit-heavy operating models help, where they fall short, and what mature security leaders are doing to connect compliance activity to real operational readiness – across controls, suppliers, incident response, and ownership. . – Niya Raina, GRC Subject Matter Expert, Vanta . |
![]() |
11:20Case Study: The Strategic Facets of Cyber Security that are Frequently Overlooked in the Urgency of Tactical Firefighting This session explores the often-overlooked strategic dimensions of cyber security that get lost amid the urgency of day-to-day security routine. By examining incident readiness, threat intelligence, and long-term resilience, it highlights how organisations can move beyond reactive defence toward proactive, strategic security planning. Join us to reimagine cyber security not just as a series of firefights, but as a pathway to building your “castle on the hill”: a vision of sustained strength, foresight, and preparedness. . – Boris Awdejew, Chief Security Officer, Rakuten . |
![]() |
11:50Presentation: Code Red: When Your Tools Turn Against You As generative AI becomes a mainstream software development tool, an urgent question emerges: can AI be trusted to write secure code? This session shares findings from the 2025 GenAI Code Security Report, an assessment of over 100 language models across Java, Python, C#, and JavaScript. The research identifies weaknesses, including high failure rates on critical security tasks and no meaningful security improvement as models scale. Attendees will learn where AI introduces vulnerabilities, which issues are most common, why larger models are not safer, and other interesting statistics about AI secure code capabilities. . – Julian Totzek-Hallhuber, Senior Principal Solution Architect, Veracode . |
![]() |
12:00Presentation: Knowledge is the Best Defence: What do you Know About Identities? Identity is the new perimeter, yet many organizations remain blind to the hidden risks within their own directories. As AI transforms the threat landscape, the stakes for managing critical account permissions have never been higher. This session breaks down how to identify every identity: human or machine, and quantify their real-world risk. We will explore the intersection of AI and identity management, offering a roadmap to translate complex security intelligence into automated policies and decisive actions that harden your infrastructure without adding operational friction. . – Andreas Müller, VP Solutions Central Europe, Delinea . |
![]() |
12:30 Lunch Hosted by KnowBe4 |
![]() |
13:30Panel Discussion: Bridging the Regulatory Compliance Gap in the DACH Region
– Moderator: Eva Rustler, Head of Information Security & Deputy CISO, Allianz Global Investors |
![]() |
14:10Presentation: The AI SOC: Lessons from Building a Triage-Focused Cybersecurity LLM Can an LLM master L2 depth triage? After 24 months and 60 experts, we have the answer. This session explores the technical journey of moving AI from basic filtering to deep contextual analysis. Learn to bridge the gap between human intuition and automation to redefine your SOC. Shift from alert fatigue to strategic defense. AI has finally earned its stripes . – Jaryd Hickman, Director of Solutions Development, D3 Security . |
![]() |
14:40Presentation: Driving DORA in a Decentral Organization - From Challenges to Solutions The session will focus on overarching themes and underlying challenges that DORA brings, why these are more complex for some than for other organizations, and what organizations can do to navigate them, drawing from practical experiences and insights from regulatory engagements. . Christian Götz, Deputy CISO, Deutsche Börse . |
![]() |
15:10Presentation: Tenant Resilience Without the Guesswork: Standardise and Restore Configurations In this technical session, Mischa Rohleder at DATAPROTECT AG (on behalf of CoreView) will walk through a practical approach to Microsoft 365 tenant resilience: how to continuously enforce secure baselines, detect and investigate configuration drift/tampering, and ensure you can recover your tenant configurations after an incident. You’ll see how CoreView helps teams regain control at enterprise scale with:
. |
![]() |
15:40Networking Break |
![]() |
16:10 Roundtables: T1: From Data Chaos to Control — Securing M365, Cloud & AI in the Real World – Tobias Gerhardt, Senior Solution Architect,Varonis . T2: Transforming Third Party Risk into Business Opportunity – Eric Litowsky, Regional Director, Bluevoyant & Jacques Noupoua, Client Executive, Bluevoyant . T3: AI in Development – Speed vs Security – Florian Hundhausen, Strategic Account Manager, CheckMarx . |
![]() |
16:50Panel Discussion: Closing the Gap: Addressing the Cyber Security Skills Shortage
– Moderator: Ali Baccouche, Regional CISO & Data Privacy Officer – EMEA, Texas Instruments |
![]() |
17:20Closing Remarks Chair by: Daniel Schatz, CISO, Qiagen |
![]() |
17:30 Drinks Reception |
| Day 2 // 16th April 2026 08:15 – 16:50 CET Chair: Daniel Schatz, CISO, Qiagen |
|
![]() |
08:15Registration & Coffee |
![]() |
08:50Opening Address Chair by: Daniel Schatz, CISO, Qiagen |
![]() |
09:00Panel Discussion: Securing AI Systems: Addressing the Emerging Technical Threats ● What vulnerabilities do AI models introduce, including data poisoning, model inversion, prompt injection, and adversarial attacks, and how can they be mitigated? ● How should traditional security controls evolve to cover a full AI life cycle, from model training and deployment to monitoring and retraining? ● What technical safeguards can be applied to protect training data, enforce model integrity, and ensure secure access across AI pipelines? ● How can continuous monitoring and anomaly detection be used to identify and respond to AI-specific threats in real time? ● What lessons are emerging from early technical case studies of AI exploitation, and how can these inform more resilient architectures for the future? . – Moderator: Cesar Oliveira, CISO, CMS – Daniel Maier-Johnson, CISO, Kuehne+Nagel – Ali Baccouche, Regional CISO & Data Privacy Officer – EMEA, Texas Instruments – Katarzyna Bukowska, Head of Cyber Security Operations, Continental . |
![]() |
09:40Presentation: From Alerts to Decisions: How Modern DFIR Teams Investigate Under Pressure Even the strongest cybersecurity measures can be breached, making DFIR essential to cyber resilience. This session explores today’s most pressing investigative challenges and how modern DFIR teams are tackling them, with practical lessons informed by real-world teams and their experiences. We’ll cover how teams decide which tools to use, what data truly matters, and how to accelerate workflows without sacrificing precision and completeness. Attendees will gain actionable guidance they can apply to improve speed, clarity, and outcomes during incident response and internal investigations. . – Niels Renken, Solutions Consultant, Magnet Forensics . |
![]() |
10:10 Breakfast hosted by GitGuardian (Invite Only) |
![]() |
10:50Presentation: NIS2, CRA, ISO, IEC, DSA, GDPR – How many hats can one CISO wear? The regulatory landscape is expanding, yet corporate resilience often lags, fostering a compliance-heavy mindset. Responsibility remains fragmented: GDPR sits in Legal, ISO27001 in Risk, and the CRA in Product, while NIS2 and AI demand holistic oversight. As the primary orchestrator, the CISO must lead across silos, despite often being anchored within IT departments. This session explores how CISOs can bridge these functional gaps and transition from technical influencers to strategic business leaders. Join us for practical, cross-vertical insights on navigating this increasingly complex governance maze. . – John-Erik Horn, CEO, Difesa . |
![]() |
11:20Presentation: AI-Powered Threats: Responding to the Rising Pace of Cyber Attacks As AI technology advances, cybercriminals are using it to increase the speed, scale, and sophistication of attacks, from generative AI and automated phishing to deepfakes and agentic AI. This session examines how these AI-enabled threats exploit vulnerabilities faster than ever, and explores strategies for real-time detection, anomaly monitoring, and automated defenses. Attendees will learn how to adapt security architectures and incident response processes, while gaining practical insights on leveraging AI defensively to anticipate, respond to, and mitigate rapidly evolving cyber threats. . – Roger Klose, CISO, Heidelberger Druckmaschinen . |
![]() |
11:50Presentation: SASE in a world of AI/ML and Sovereignty needs How can enterprises grow their business with a scalable SASE solution while protecting their applications and data with a common platform? Since work and the use of applications/data do not take place in a secure location, a consolidated and flexible security environment is essential for protecting corporate communications and intellectual property. A centrally managed platform forms the basis for relieving the burden on NOC/SOC and keeping pace with increasing threats and demanding corporate initiatives. In addition to the usual cloud-based offerings, a truly sovereign solution is becoming increasingly important. . – Richard Kunkel, DACH Solutions Consultant, Versa Networks . |
![]() |
12:00Spotlight Presentation: Cyber Lessons From 225.000 Pentests: Why Continuous Adversarial Testing is the Only Way to Be Ready To defeat the adversary, we must move beyond tracking their tools—we must understand their mind. The traditional approach to cybersecurity has focused relentlessly on the technical what (malware signatures, TTPs) and the macro why (geopolitical tension, economic drivers). However, the next decisive frontier in intelligence and defence requires a pivot to the who: the personality dynamics that fuel cyber threat actor groups and using autonomous tools to follow in their footsteps. .
. |
![]() |
12:30Lunch |
![]() |
13:30Group Discussion: Security Project Management: Common Pitfalls and Why Security Projects Often Miss the Mark Many organisations commit substantial resources to security programmes, yet find that the final outcomes do not meet anticipated value. In most cases, the challenge is not the technology or the strategic intent, but weaknesses in execution and operationalisation. This session will focus on how to better align implementation with long-term security performance by embedding operational considerations at every stage of the project lifecycle. . – Moderator: Oğuz Şirin, CISO, RMR – mbh . |
![]() |
14:10Presentation: Resilience for Everything: How to Ensure Business Continuity Across Cloud, Identity, and AI .
. |
![]() |
14:40Group Discussion: Managing Risk and Leveraging Opportunities with AI AI is rapidly reshaping the cyber security landscape, creating both sophisticated threats and novel defensive capabilities. This session examines technical risks arising from generative AI, agentic AI, automated phishing, deepfake attacks, and other AI-driven cybercrime techniques. This session will outline practical strategies for mitigating these threats, including model monitoring, anomaly detection, and secure deployment practices, while also demonstrating how AI can be harnessed to enhance defensive operations. Attendees will gain actionable insights on implementing AI securely and effectively within their security architecture. . – Moderator: Tim Estermann, CISO, Thalia Bücher . |
![]() |
15:10Networking Break |
![]() |
15:40Presentation: BCI Interface: Opportunities and Risks in Cyber Security Brain–computer interfaces (BCIs) are offering exciting opportunities in healthcare, accessibility, and human–machine interaction. Yet this innovation brings new cyber security challenges. Neural data transmission introduces unique vulnerabilities, from privacy breaches and data manipulation to threats against cognitive integrity. This session examines the dual nature of BCIs: how they may strengthen authentication and adaptive systems, while also creating unprecedented risks. Attendees will explore emerging threats, ethical considerations, and strategies for resilience. . – Patrick Ghion, Head Regional Cyber Competence Centre for Western Switzerland, State of Geneve . |
![]() |
16:10Panel Discussion: Cloud Sovereignty in the DACH Region - Securing Sensitive Data in the Cloud . ● What are the key cyber security threats to sensitive data in cloud environments, and how are attackers evolving their tactics? ● How can organisations with limited resources prioritise breach prevention while IT and security teams are stretched thin? ● How can organisations in the DACH region achieve cloud sovereignty through local or EU-based providers, strong data residency and encryption controls, and compliance with CRA, DORA, and NIS2? . – Moderator Romain Pradelle, CISO, Roland Berger – Daniel Lemmer, CISO, Confidential – Riccardo Sepe, Global CISO, Guess – Roger Klose, CISO, Heidelberger Druckmaschinen . |
![]() |
16:50 End of Conference |