Networking, Exchange and Strategic Update for Cybersecurity Professionals

Cybersecurity is a never-ending war game. New tech trends – like 5G, AI, Web3, IoT, remote work and a vastly scaling cloud infrastructure – cause a further increase of touchpoints, data, speed, applications and complexity – offering new opportunities for attackers, as well as for defenders. On top of the tech challenges erupting military and economic conflicts cause a more heterogenous and capable spectrum of attackers - urging security professionals to tackle powerful state players, organized crime and untrustworthy companies even more. Last, but not least the ongoing shortage of internal cybersecurity skills remains to be a challenge. At this intensive 1-day networking conference corporate executives, scientists, experts and solution providers exchange views on the latest cybersecurity developments, models, threats, strategies and technologies in various formats: Assembly, one-on-one meetings, group meetings and workshops. Meetings can be prepared with our networking app.

Interactive Networking Format

  • Inspiring talks (Cutting-edge business cases, strategies, technology, best management practices, analysis, methods)
  • Workshops
  • Networking meetings
  • Online archive and community

Topics (Selection)

  • Current Strategic Threats
  • Strategic Models
  • Cybersecurity Management Models
  • MDR (Managed Detection and Response)
  • Realistic and feasible ways to create more awareness and skills
  • E-Learning and Gamification to build skills
  • XDR (Extended Detection and Response)
  • SIEM (Security Information and Event Management)
  • SOAR (Security Orchestration, Automation and Response)
  • Cybersecurity Technology Stack (Visibility, Boundary Defense, Access Control, Device Handling, Threat Detection and Response)
  • Cyber Defense Matrix
  • Critical Infrastructure
  • IAM (Identity and Access Management)
  • AI / ML Impacts on Cybersecurity (good and bad)
  • Threat Intelligence
  • Application Security
  • User & Entity Behavioral Analytics
  • Endpoint Protection
  • Cloud Security
  • Data Security
  • Zero Trust
  • SASE (Secure Access Service Edge)
  • CIEM (Cloud Infrastructure Entitlements Management)
  • CSPM (Cloud Security Posture Management)
  • PAM (Privileged Access Management)
  • Ransomware
  • New Challenges in Mobile Security / 5G
  • IS / OS Convergence
  • IoT Threats
  • Major Regulation and Compliance Trends
  • Securing Remote Work and Distributed Teams

Clara Maathuis, PhD, Assistant Professor in AI & Cyber Operations, Open University of the Netherlands

Offensive Glasses in Cyber Security and AI

  • Current major security threats
  • Offensive cybersecurity
  • AI security and privacy attacks
  • AI generation and detection of social media manipulation
  • Cyber warfare

Alina Matyukhina, PhD, Head of Cybersecurity, Siemens Smart Infrastructure Building Products

Emerging IoT Security Threats and Effective Defense Strategies

  • How a cross-organisational IoT security governance should look like
  • Cybersecurity in product development
  • Risk-based asset management
  • The role of cybersecurity standards

Manfred Rieck, VP Individual Solution Development, DB Systel (Deutsche Bahn)

Post Quantum Cryptography in Practice - an Answer Towards Quantum Threats

  • Quantum computing progress – the worldwide ecosystem becomes mature: I’ll give some details about the worldwide development of the systems for the hardware and the software stack
  • Threats through quantum computing for the IT: The threat for asymmetric encryption is already known, the adoption of our PKI systems needs to be initiated
  • Answers and call for action today: There are worldwide activities on how to proceed, e.g. from NIST and the German Federal Office for Security in Information Technology. I’ll give some good practices how to start.

Nouri Alnahawi, PHD Candidate, Darmstadt University of Applied Sciences, Department of Computer Sciences & Nils von Nethen, IT Security Manager, Finanz Informatik

Anticipating Cryptographic Risks in the Dawning Age of Quantum Computing

  • Crypto-Agility Maturity Model (CAMM)
  • Agile replacement of cryptographic building blocks is enabling long-term context-aware security
  • CAMM can determine the crypto-agility of IT ecosystems
  • Cryptographically relevant quantum computers (CRQC) will soon be able to break today’s prevalent classic cryptography
  • Post-quantum cryptography (PQC) must be available before CRQC enter the market
  • Migration from classic cryptography to PQC

Daniel Pauly, LL.D., Partner, Linklaters

Suntka von Halen, Director, Brunswick Group

Marko Polunic, Director Business Development EMEA, CrowdStrike

Three Perspectives on Cyberattacks and an Offer for a Simulation

  • Operational and tactical response
  • Communicative response
  • Legal response

Monika Atanasova, Senior Information Security Officer, Raiffeisen Banking Group

Best Practice Examples: Cyber TPRM Automation and Digitalisation

  • Security assessments workflow automation
  • Comprehensive cyber TPRM profiling
  • Reporting: KPIs and KRIs/Cyber Risk Cockpit
  • AI & threat intelligence

Jakub Ptáčník, Cyber Security Manager, MONETA Money Bank

Jiří Vaněk, Head of Security Division, Unicorn Systems

Bank Hack Testimony

  • Behind the scenes of red teaming operation in a bank
  • Combining virtual and physical spying activities
  • Red and blue team perspective of a cyber attack
  • Do’s and don’ts when planning and applying ethical hacking attacks
  • How did we get hacked and what we learned from it

Dana Guran, Head of Strategic Program, IAM, Novartis

Key Strategies and Capabilities for the Future of IAM

  • Centralisation to eliminate shadow systems
  • Passwordless approaches
  • Use Cases and outlook

Olivier Eyries, Co-Founder & CEO, Saporo

How to Anticipate Cyber Attacks Better by Focusing on Identity Configuration

  • Identity is the single common denominator in all cyber attacks today
  • What it the problem? Internal attack surface complexitiy and lack of resources
  • Focusing on identity and lateral movement to prevent successful attacks
  • Attack paths and compliance: the differences between contextual and security frameworks approaches

Great setup and organisation enabled high level networking and an open-minded exchange. Exciting presentations showed new perspectives.

Axel Vogelbruch, Global Head of Digitalization (CDO), BYK-Chemie GmbH

Very meaningful and relevant for me as a speaker as well as in the delegate role. In a relaxed atmosphere and a flexible setting I was happy to meet a lot of interesting new contacts during networking time. Thanks a lot.

Katharina Uribe Casillas, VP Global Business Development Automotive & Industrial, Kuehne + Nagel

Thank you for two exciting days in Zurich. Perfectly organized with an ideal number of attendees which allowed many inspiring meetings among decision makers.

Dr. Axel Thoma, Lecturer, University of St.Gallen

Outstanding opportunity to network with like-minded. Excellent Organization. Very interesting topics.

Domonkos Gaspar, Digital Solutions Leader, Roche

Very well organized event with practice-oriented, relevant presentations and time for extensive networking

Thomas Röttinger, CEO, Pewatron AG

TimeActivity
08:00Start Registration
08:30Opening by the chairman
08:45Offensive Glasses in Cyber Security and AI
  • Current major security threats
  • Offensive cybersecurity
  • AI security and privacy attacks
  • AI generation and detection of social media manipulation
  • Cyber warfare
    Clara Maathuis, PhD, Assistant Professor in AI & Cyber Operations, Open University of the Netherlands

  • 09:15How to Anticipate Cyber Attacks Better by Focusing on Identity Configuration
  • Identity is the single common denominator in all cyber attacks today
  • What it the problem? Internal attack surface complexitiy and lack of resources
  • Focusing on identity and lateral movement to prevent successful attacks
  • Attack paths and compliance: the differences between contextual and security frameworks approaches
    Olivier Eyries, Co-Founder & CEO, Saporo
  • 09:45Post Quantum Cryptography in Practice - an Answer Towards Quantum Threats
  • Quantum computing progress – the worldwide ecosystem becomes mature
  • Threats through quantum computing for the IT
  • Answers and call for action today
    Manfred Rieck, VP Individual Solution Development, DB Systel (Deutsche Bahn)
  • 10:15Three Perspectives on Cyberattacks and an Offer for a Simulation
  • Operational and tactical response
  • Communicative response
  • Legal response
    Daniel Pauly, LL.D., Partner, Linklaters
    Suntka von Halen, Director, Brunswick Group
    Marko Polunic, Director Business Development EMEA, CrowdStrike




  • 10:45Coffee break with networking
    11:15Individual networking – arrange meetings with our app

    11:30Individual networking – arrange meetings with our app

    11:45Individual networking – arrange meetings with our app

    12:00Lunch with networking
    13:00Bank Hack Testimony
  • Behind the scenes of red teaming operation in a bank
  • Combining virtual and physical spying activities
  • Red and blue team perspective of a cyber attack
  • Do’s and don’ts when planning and applying ethical hacking attacks
  • How did we get hacked and what we learned from it
    Jakub Ptáčník, Cyber Security Manager, MONETA Money Bank
    Jiří Vaněk, Head of Security Division, Unicorn Systems

  • 14:00Anticipating Cryptographic Risks in the Dawning Age of Quantum Computing
  • Crypto-Agility Maturity Model (CAMM)
  • Agile replacement of cryptographic building blocks is enabling long-term context-aware security
  • CAMM can determine the crypto-agility of IT ecosystems
  • Cryptographically relevant quantum computers (CRQC) will soon be able to break today’s prevalent classic cryptography
  • Post-quantum cryptography (PQC) must be available before CRQC enter the market
  • Migration from classic cryptography to PQC
    Nouri Alnahawi, PHD Candidate, Darmstadt University of Applied Sciences, Department of Computer Sciences
    Nils von Nethen, IT Security Manager, Finanz Informatik

  • 14:30Key Strategies and Capabilities for the Future of IAM
  • Centralisation to eliminate shadow systems
  • Passwordless approaches
  • Use Cases and outlook
    Dana Guran, Head of Strategic Program, IAM, Novartis
  • 15:00Coffee break with networking
    15:15
    15:30Emerging IoT Security Threats and Effective Defense Strategies
  • How a cross-organisational IoT security governance should look like
  • Cybersecurity in product development
  • Risk-based asset management
  • The role of cybersecurity standards
    Alina Matyukhina, PhD, Head of Cybersecurity, Siemens Smart Infrastructure Building Products
  • 16:00Best Practice Examples: Cyber TPRM Automation and Digitalisation
  • Security assessments workflow automation
  • Comprehensive cyber TPRM profiling
  • Reporting: KPIs and KRIs/Cyber Risk Cockpit
  • AI & threat intelligence
    Monika Atanasova, Senior Information Security Officer, Raiffeisen Banking Group
  • 16:30Closing discussion and wrap-up
    TimeActivity
    08:00Start Registration
    08:30Opening by the chairman
    08:45Offensive Glasses in Cyber Security and AI
  • Current major security threats
  • Offensive cybersecurity
  • AI security and privacy attacks
  • AI generation and detection of social media manipulation
  • Cyber warfare
    Clara Maathuis, PhD, Assistant Professor in AI & Cyber Operations, Open University of the Netherlands

  • 09:15How to Anticipate Cyber Attacks Better by Focusing on Identity Configuration
  • Identity is the single common denominator in all cyber attacks today
  • What it the problem? Internal attack surface complexitiy and lack of resources
  • Focusing on identity and lateral movement to prevent successful attacks
  • Attack paths and compliance: the differences between contextual and security frameworks approaches
    Olivier Eyries, Co-Founder & CEO, Saporo
  • 09:45Post Quantum Cryptography in Practice - an Answer Towards Quantum Threats
  • Quantum computing progress – the worldwide ecosystem becomes mature
  • Threats through quantum computing for the IT
  • Answers and call for action today
    Manfred Rieck, VP Individual Solution Development, DB Systel (Deutsche Bahn)
  • 10:15Three Perspectives on Cyberattacks and an Offer for a Simulation
  • Operational and tactical response
  • Communicative response
  • Legal response
    Daniel Pauly, LL.D., Partner, Linklaters
    Suntka von Halen, Director, Brunswick Group
    Marko Polunic, Director Business Development EMEA, CrowdStrike




  • 10:45Coffee break with networking
    11:15Individual networking – arrange meetings with our app

    11:30Individual networking – arrange meetings with our app

    11:45Individual networking – arrange meetings with our app

    12:00Lunch with networking
    13:00Bank Hack Testimony
  • Behind the scenes of red teaming operation in a bank
  • Combining virtual and physical spying activities
  • Red and blue team perspective of a cyber attack
  • Do’s and don’ts when planning and applying ethical hacking attacks
  • How did we get hacked and what we learned from it
    Jakub Ptáčník, Cyber Security Manager, MONETA Money Bank
    Jiří Vaněk, Head of Security Division, Unicorn Systems

  • 14:00Anticipating Cryptographic Risks in the Dawning Age of Quantum Computing
  • Crypto-Agility Maturity Model (CAMM)
  • Agile replacement of cryptographic building blocks is enabling long-term context-aware security
  • CAMM can determine the crypto-agility of IT ecosystems
  • Cryptographically relevant quantum computers (CRQC) will soon be able to break today’s prevalent classic cryptography
  • Post-quantum cryptography (PQC) must be available before CRQC enter the market
  • Migration from classic cryptography to PQC
    Nouri Alnahawi, PHD Candidate, Darmstadt University of Applied Sciences, Department of Computer Sciences
    Nils von Nethen, IT Security Manager, Finanz Informatik

  • 14:30Key Strategies and Capabilities for the Future of IAM
  • Centralisation to eliminate shadow systems
  • Passwordless approaches
  • Use Cases and outlook
    Dana Guran, Head of Strategic Program, IAM, Novartis
  • 15:00Coffee break with networking
    15:15
    15:30Emerging IoT Security Threats and Effective Defense Strategies
  • How a cross-organisational IoT security governance should look like
  • Cybersecurity in product development
  • Risk-based asset management
  • The role of cybersecurity standards
    Alina Matyukhina, PhD, Head of Cybersecurity, Siemens Smart Infrastructure Building Products
  • 16:00Best Practice Examples: Cyber TPRM Automation and Digitalisation
  • Security assessments workflow automation
  • Comprehensive cyber TPRM profiling
  • Reporting: KPIs and KRIs/Cyber Risk Cockpit
  • AI & threat intelligence
    Monika Atanasova, Senior Information Security Officer, Raiffeisen Banking Group
  • 16:30Closing discussion and wrap-up

    Partners

    Efficient Networking with the Cintona App

    To network with peers from other companies and industries is an essential value-ad of conferences today. Some rank networking even higher than keynote talks or workshops. With our Cintona app you’ll find and arrange to meet dialog partners with no effort.

    Register, write a very brief intro, select your topics and you are ready to network. The app shows matchings with other attendees and when they are available. Send or accept meeting invites with just one click. The app assigns a meeting location, typically a table number. With this tool you create and manage your individual agenda. In case, your meeting partner is absent, you can establish a video call inside the app also with just one click. The app will go live two weeks prior to the event.

    Dorint Airport Zürich, Riethofstrasse 40, CH-8152 Opfikon, Phone +41 44 808 10 00


    Registration

    Payment Options

    • Credit Card / Paypal
    • Invoice (use form below):

      I book ticket/s for 349 CHF each

      First Name

      Family Name

      Company/Organisation

      Street

      Postal code

      City

      Country

      E-Mail

      Phone

      Your Ticket Includes

      • Access to all parts of the program
      • Access to our networking app (if you like) to arrange meetings
      • Access to online community with decks, videos and contacts
      • Full catering
      • Certificate of completion

      Send us a message