

Networking, Exchange and Strategic Update for Cybersecurity Professionals
Cybersecurity is a never-ending war game. New tech trends – like 5G, AI, Web3, IoT, remote work and a vastly scaling cloud infrastructure – cause a further increase of touchpoints, data, speed, applications and complexity – offering new opportunities for attackers, as well as for defenders. On top of the tech challenges erupting military and economic conflicts cause a more heterogenous and capable spectrum of attackers - urging security professionals to tackle powerful state players, organized crime and untrustworthy companies even more. Last, but not least the ongoing shortage of internal cybersecurity skills remains to be a challenge. At this intensive 1-day networking conference corporate executives, scientists, experts and solution providers exchange views on the latest cybersecurity developments, models, threats, strategies and technologies in various formats: Assembly, one-on-one meetings, group meetings and workshops. Meetings can be prepared with our networking app.
Interactive Networking Format
- Inspiring talks (Cutting-edge business cases, strategies, technology, best management practices, analysis, methods)
- Workshops
- Networking meetings
- Online archive and community
Topics (Selection)
- Current Strategic Threats
- Strategic Models
- Cybersecurity Management Models
- MDR (Managed Detection and Response)
- Realistic and feasible ways to create more awareness and skills
- E-Learning and Gamification to build skills
- XDR (Extended Detection and Response)
- SIEM (Security Information and Event Management)
- SOAR (Security Orchestration, Automation and Response)
- Cybersecurity Technology Stack (Visibility, Boundary Defense, Access Control, Device Handling, Threat Detection and Response)
- Cyber Defense Matrix
- Critical Infrastructure
- IAM (Identity and Access Management)
- AI / ML Impacts on Cybersecurity (good and bad)
- Threat Intelligence
- Application Security
- User & Entity Behavioral Analytics
- Endpoint Protection
- Cloud Security
- Data Security
- Zero Trust
- SASE (Secure Access Service Edge)
- CIEM (Cloud Infrastructure Entitlements Management)
- CSPM (Cloud Security Posture Management)
- PAM (Privileged Access Management)
- Ransomware
- New Challenges in Mobile Security / 5G
- IS / OS Convergence
- IoT Threats
- Major Regulation and Compliance Trends
- Securing Remote Work and Distributed Teams
Clara Maathuis, PhD, Assistant Professor in AI & Cyber Operations, Open University of the Netherlands
Offensive Glasses in Cyber Security and AI
- Current major security threats
- Offensive cybersecurity
- AI security and privacy attacks
- AI generation and detection of social media manipulation
- Cyber warfare
Alina Matyukhina, PhD, Head of Cybersecurity, Siemens Smart Infrastructure Building Products
Emerging IoT Security Threats and Effective Defense Strategies
- How a cross-organisational IoT security governance should look like
- Cybersecurity in product development
- Risk-based asset management
- The role of cybersecurity standards
Manfred Rieck, VP Individual Solution Development, DB Systel (Deutsche Bahn)
Post Quantum Cryptography in Practice - an Answer Towards Quantum Threats
- Quantum computing progress – the worldwide ecosystem becomes mature: I’ll give some details about the worldwide development of the systems for the hardware and the software stack
- Threats through quantum computing for the IT: The threat for asymmetric encryption is already known, the adoption of our PKI systems needs to be initiated
- Answers and call for action today: There are worldwide activities on how to proceed, e.g. from NIST and the German Federal Office for Security in Information Technology. I’ll give some good practices how to start.


Nouri Alnahawi, PHD Candidate, Darmstadt University of Applied Sciences, Department of Computer Sciences & Nils von Nethen, IT Security Manager, Finanz Informatik
Anticipating Cryptographic Risks in the Dawning Age of Quantum Computing
- Crypto-Agility Maturity Model (CAMM)
- Agile replacement of cryptographic building blocks is enabling long-term context-aware security
- CAMM can determine the crypto-agility of IT ecosystems
- Cryptographically relevant quantum computers (CRQC) will soon be able to break today’s prevalent classic cryptography
- Post-quantum cryptography (PQC) must be available before CRQC enter the market
- Migration from classic cryptography to PQC



Daniel Pauly, LL.D., Partner, Linklaters
Suntka von Halen, Director, Brunswick Group
Marko Polunic, Director Business Development EMEA, CrowdStrike
Three Perspectives on Cyberattacks and an Offer for a Simulation
- Operational and tactical response
- Communicative response
- Legal response
Monika Atanasova, Senior Information Security Officer, Raiffeisen Banking Group
Best Practice Examples: Cyber TPRM Automation and Digitalisation
- Security assessments workflow automation
- Comprehensive cyber TPRM profiling
- Reporting: KPIs and KRIs/Cyber Risk Cockpit
- AI & threat intelligence


Jakub Ptáčník, Cyber Security Manager, MONETA Money Bank
Jiří Vaněk, Head of Security Division, Unicorn Systems
Bank Hack Testimony
- Behind the scenes of red teaming operation in a bank
- Combining virtual and physical spying activities
- Red and blue team perspective of a cyber attack
- Do’s and don’ts when planning and applying ethical hacking attacks
- How did we get hacked and what we learned from it
Dana Guran, Head of Strategic Program, IAM, Novartis
Key Strategies and Capabilities for the Future of IAM
- Centralisation to eliminate shadow systems
- Passwordless approaches
- Use Cases and outlook
Olivier Eyries, Co-Founder & CEO, Saporo
How to Anticipate Cyber Attacks Better by Focusing on Identity Configuration
- Identity is the single common denominator in all cyber attacks today
- What it the problem? Internal attack surface complexitiy and lack of resources
- Focusing on identity and lateral movement to prevent successful attacks
- Attack paths and compliance: the differences between contextual and security frameworks approaches
Great setup and organisation enabled high level networking and an open-minded exchange. Exciting presentations showed new perspectives.
Axel Vogelbruch, Global Head of Digitalization (CDO), BYK-Chemie GmbH
Very meaningful and relevant for me as a speaker as well as in the delegate role. In a relaxed atmosphere and a flexible setting I was happy to meet a lot of interesting new contacts during networking time. Thanks a lot.
Katharina Uribe Casillas, VP Global Business Development Automotive & Industrial, Kuehne + Nagel
Thank you for two exciting days in Zurich. Perfectly organized with an ideal number of attendees which allowed many inspiring meetings among decision makers.
Dr. Axel Thoma, Lecturer, University of St.Gallen
Outstanding opportunity to network with like-minded. Excellent Organization. Very interesting topics.
Domonkos Gaspar, Digital Solutions Leader, Roche
Very well organized event with practice-oriented, relevant presentations and time for extensive networking
Thomas Röttinger, CEO, Pewatron AG
Time | Activity | ||
08:00 | Start Registration | ![]() | |
08:30 | Opening by the chairman | ||
08:45 | Offensive Glasses in Cyber Security and AI Clara Maathuis, PhD, Assistant Professor in AI & Cyber Operations, Open University of the Netherlands | ![]() | |
09:15 | How to Anticipate Cyber Attacks Better by Focusing on Identity Configuration Olivier Eyries, Co-Founder & CEO, Saporo | ![]() | |
09:45 | Post Quantum Cryptography in Practice - an Answer Towards Quantum Threats Manfred Rieck, VP Individual Solution Development, DB Systel (Deutsche Bahn) | ![]() | |
10:15 | Three Perspectives on Cyberattacks and an Offer for a Simulation Daniel Pauly, LL.D., Partner, Linklaters Suntka von Halen, Director, Brunswick Group Marko Polunic, Director Business Development EMEA, CrowdStrike | ![]() ![]() ![]() | |
10:45 | Coffee break with networking | ![]() | ![]() |
11:15 | Individual networking – arrange meetings with our app | ![]() | |
11:30 | Individual networking – arrange meetings with our app | ![]() | |
11:45 | Individual networking – arrange meetings with our app | ![]() | |
12:00 | Lunch with networking | ![]() | ![]() |
13:00 | Bank Hack Testimony Jakub Ptáčník, Cyber Security Manager, MONETA Money Bank Jiří Vaněk, Head of Security Division, Unicorn Systems | ![]() ![]() | |
14:00 | Anticipating Cryptographic Risks in the Dawning Age of Quantum Computing Nouri Alnahawi, PHD Candidate, Darmstadt University of Applied Sciences, Department of Computer Sciences Nils von Nethen, IT Security Manager, Finanz Informatik | ![]() ![]() | |
14:30 | Key Strategies and Capabilities for the Future of IAM Dana Guran, Head of Strategic Program, IAM, Novartis | ![]() | |
15:00 | Coffee break with networking | ![]() | ![]() |
15:15 | ![]() |
||
15:30 | Emerging IoT Security Threats and Effective Defense Strategies Alina Matyukhina, PhD, Head of Cybersecurity, Siemens Smart Infrastructure Building Products | ![]() | |
16:00 | Best Practice Examples: Cyber TPRM Automation and Digitalisation Monika Atanasova, Senior Information Security Officer, Raiffeisen Banking Group | ![]() | |
16:30 | Closing discussion and wrap-up | ![]() | ![]() |
Time | Activity | ||
08:00 | Start Registration | ![]() | |
08:30 | Opening by the chairman | ||
08:45 | Offensive Glasses in Cyber Security and AI Clara Maathuis, PhD, Assistant Professor in AI & Cyber Operations, Open University of the Netherlands | ![]() | |
09:15 | How to Anticipate Cyber Attacks Better by Focusing on Identity Configuration Olivier Eyries, Co-Founder & CEO, Saporo | ![]() | |
09:45 | Post Quantum Cryptography in Practice - an Answer Towards Quantum Threats Manfred Rieck, VP Individual Solution Development, DB Systel (Deutsche Bahn) | ![]() | |
10:15 | Three Perspectives on Cyberattacks and an Offer for a Simulation Daniel Pauly, LL.D., Partner, Linklaters Suntka von Halen, Director, Brunswick Group Marko Polunic, Director Business Development EMEA, CrowdStrike | ![]() ![]() ![]() | |
10:45 | Coffee break with networking | ![]() | ![]() |
11:15 | Individual networking – arrange meetings with our app | ![]() | |
11:30 | Individual networking – arrange meetings with our app | ![]() | |
11:45 | Individual networking – arrange meetings with our app | ![]() | |
12:00 | Lunch with networking | ![]() | ![]() |
13:00 | Bank Hack Testimony Jakub Ptáčník, Cyber Security Manager, MONETA Money Bank Jiří Vaněk, Head of Security Division, Unicorn Systems | ![]() ![]() | |
14:00 | Anticipating Cryptographic Risks in the Dawning Age of Quantum Computing Nouri Alnahawi, PHD Candidate, Darmstadt University of Applied Sciences, Department of Computer Sciences Nils von Nethen, IT Security Manager, Finanz Informatik | ![]() ![]() | |
14:30 | Key Strategies and Capabilities for the Future of IAM Dana Guran, Head of Strategic Program, IAM, Novartis | ![]() | |
15:00 | Coffee break with networking | ![]() | ![]() |
15:15 | ![]() |
||
15:30 | Emerging IoT Security Threats and Effective Defense Strategies Alina Matyukhina, PhD, Head of Cybersecurity, Siemens Smart Infrastructure Building Products | ![]() | |
16:00 | Best Practice Examples: Cyber TPRM Automation and Digitalisation Monika Atanasova, Senior Information Security Officer, Raiffeisen Banking Group | ![]() | |
16:30 | Closing discussion and wrap-up | ![]() | ![]() |
Partners

Efficient Networking with the Cintona App
To network with peers from other companies and industries is an essential value-ad of conferences today. Some rank networking even higher than keynote talks or workshops. With our Cintona app you’ll find and arrange to meet dialog partners with no effort.
Register, write a very brief intro, select your topics and you are ready to network. The app shows matchings with other attendees and when they are available. Send or accept meeting invites with just one click. The app assigns a meeting location, typically a table number. With this tool you create and manage your individual agenda. In case, your meeting partner is absent, you can establish a video call inside the app also with just one click. The app will go live two weeks prior to the event.

Registration
Payment Options
Credit Card / Paypal - Invoice (use form below):
Your Ticket Includes
- Access to all parts of the program
- Access to our networking app (if you like) to arrange meetings
- Access to online community with decks, videos and contacts
- Full catering
- Certificate of completion