IDC IT Strategy & Cybersecurity Summit – Austria
The Modern CIO: Bridging Technology, Business, and Cybersecurity for Digital Success
REGISTER NOW
Join us at this event where CIOs, cybersecurity leaders, and industry experts converge to explore the intersection of digital transformation and security. Gain insights into fortifying security operations, protecting cloud and application environments, and leveraging AI-driven security solutions.
Learn how CIOs can strengthen their role in strategic decision-making by integrating security into business objectives, adopting zero-trust architectures, and mitigating supply chain risks.
Stay ahead of the curve—discover best practices, cutting-edge technologies, and innovative approaches to secure your organization’s digital future.
Tuesday 11th November 2025
Jacqueline Knollmayr
Moderatorin,
Thomas Meyer | IDC
General Manager and Group Vice President, EMEA Research
Thomas Meyer joined IDC in January 1999 and is currently responsible for managing IDC’s IT Research in Europe. This includes coverage of software, services and hardware markets focused on topics such as datacenter transformation, cloud computing, virtualization, business continuity, sustainability and print services. Additionally Meyer also manages IDC Europe’s cross-domain Practices which provide insight and advisory on 3rd Platform industry transformation such Internet of Things, Cloud, Mobility, Big Data and Customer Experience IT to ICT vendors and end users.
Meyer frequently speaks at IDC, industry, customer and CIO events such as CeBIT, IDC’s EMEA CIO Summit Series, IDC’s Virtualization and Cloud Conferences and the Mobile Commerce Conference. He often contributes to articles in publications across Europe, including the Wall Street Journal, Die Zeit, Focus, Le Monde Informatique, and IT Week, and has also appeared on the BBC World Business Report and Breakfast Business Update.
Before joining IDC, Thomas Meyer worked as an IT media analyst. He holds degrees from the University of London in economics and German and an MA with a focus on European management concepts.
Tuesday, November 11 2025 9:15 am | Location:
In an increasingly digitalized and interconnected world, humans remain the biggest vulnerability to cyberattacks. Traditional security measures are increasingly reaching their limits. This presentation will show you how human risk management, artificial intelligence, and adaptive security policies, as a holistic concept, can significantly improve cybersecurity. Using practical examples, it will demonstrate how human risks can be specifically identified and minimized, how AI detects threats early on, and how adaptive security policies dynamically adjust security measures to user behavior and current risk levels. You will receive concrete suggestions on how these methods can help companies ensure compliance, reduce attack surfaces, and establish a sustainable security culture.
Jakob Schuhmann
Account Executive Mid Market, Mimecast
In crisis and disaster scenarios, functioning telecommunications are essential for businesses to remain operational. The blackout on the Iberian Peninsula in April 2025 demonstrated how quickly and severely the failure of communication systems can impact organizations. This makes adequate preparation all the more crucial. Seemingly simple but often ineffective solutions frequently provide a false sense of security. A methodical approach, developed by experts in the communications industry, provides true peace of mind.
Christian Zeindlhofer
Head of Group Risk & Resilience, A1 Telekom Austria AG
Gerald Schremser
Group CISO, Prinzhorn Gruppe
Andreas Scheurle
Enterprise Account Manager, Delinea
AI is the new craze, just as the cloud was a decade ago. Back then, many companies rushed into implementation without regard for security—and spent years catching up. Today, history threatens to repeat itself. While AI is celebrated as a driver of automation and efficiency, the risk lies in leaving the AI itself unprotected. In this presentation, we draw lessons from the cloud era and examine what’s at stake if we address AI security too late.
Stefan Schachinger
Cyber Security Sales Expert, T-Systems International
Ransomware remains the biggest cyber threat to businesses worldwide, reaching unprecedented scale and impact. Despite the takedown of two major ransomware groups—LockBit and ALPHV—the overall volume of attacks remains largely unchanged, and the cost is projected to reach $265 billion annually by 2031.
Contrary to the statistics, however, ransomware doesn’t necessarily have to be a question of “when”—security teams have the power to make it a question of “if.”
In this session, David Berger, Regional Director at Pentera, will present actionable strategies to strengthen your defenses and increase your organization’s resilience.
David Berger
Regional Director, Pentera
Cyberattacks, regulatory requirements, and increasing dependencies on IT services present organizations with new challenges. This presentation demonstrates how IT Service Continuity Management (ITSCM) acts as a connecting element between Information Security Management (ISMS), Business Continuity Management (BCMS), and IT governance. Using current examples, practical approaches are presented for how companies can sustainably strengthen their digital and operational resilience through integrated ITSCM.
Contents:
Philipp Ladurner
Business Continuity Manager, Hypo Tirol Bank
Jacqueline Knollmayr
Moderatorin,
“Positiv – Laut – Charmant – Echt : Anders” mit diesen Schlagworten macht die Moderatorin, Jungschauspielerin und Sprecherin Jacqueline Knollmayr auf sich aufmerksam. Nachdem sie 2010 die Schauspielschule Elfriede Ott mit dem Staatlichen Diplom abgeschlossen hat, war sie hauptsächlich in der kreativen Branche tätig. Der Kinofilm “Friday Night Horror”, ein Werbespot für Servus TV, ein selbst geschriebenes Kabarett, sowie diverse Theater- und Kurzfilmproduktionen entstanden damals.
Ehe sie dann 2013 die Moderation für sich entdeckte. Kurzerhand absolvierte sie neben ihrem Lehramtsstudium Französisch und Psychologie & Philosophie ein Moderationstraining bei Belinda Veber vom Moderatorenpool. Seitdem moderierte Jacqueline Knollmayr bereits für den Österreichischen Integrationsfond, den ÖAS-Kongress, die UEFA Champions League Trophy Tour, die Wiener Ärztekammer, den “Ich helfe laufend”-Charityrun, das Let’s CEE Film Festival, den Junge Kunst Parcour, uvm. ….
Tuesday, November 11 2025 3:15 pm | Location:
Tuesday, November 11 2025 9:00 am | Location:
Thomas Meyer joined IDC in January 1999 and is currently responsible for managing IDC’s IT Research in Europe. This includes coverage of software, services and hardware markets focused on topics such as datacenter transformation, cloud computing, virtualization, business continuity, sustainability and print services. Additionally Meyer also manages IDC Europe’s cross-domain Practices which provide insight and advisory on 3rd Platform industry transformation such Internet of Things, Cloud, Mobility, Big Data and Customer Experience IT to ICT vendors and end users.
Meyer frequently speaks at IDC, industry, customer and CIO events such as CeBIT, IDC’s EMEA CIO Summit Series, IDC’s Virtualization and Cloud Conferences and the Mobile Commerce Conference. He often contributes to articles in publications across Europe, including the Wall Street Journal, Die Zeit, Focus, Le Monde Informatique, and IT Week, and has also appeared on the BBC World Business Report and Breakfast Business Update.
Before joining IDC, Thomas Meyer worked as an IT media analyst. He holds degrees from the University of London in economics and German and an MA with a focus on European management concepts.
Tuesday, November 11 2025 9:15 am | Location:
Tuesday, November 11 2025 11:15 am | Location:
Tuesday, November 11 2025 2:45 pm | Location:
Cyberattacks, regulatory requirements, and increasing dependencies on IT services present organizations with new challenges. This presentation demonstrates how IT Service Continuity Management (ITSCM) acts as a connecting element between Information Security Management (ISMS), Business Continuity Management (BCMS), and IT governance. Using current examples, practical approaches are presented for how companies can sustainably strengthen their digital and operational resilience through integrated ITSCM.
Contents:
Tuesday, November 11 2025 10:15 am | Location:
In crisis and disaster scenarios, functioning telecommunications are essential for businesses to remain operational. The blackout on the Iberian Peninsula in April 2025 demonstrated how quickly and severely the failure of communication systems can impact organizations. This makes adequate preparation all the more crucial. Seemingly simple but often ineffective solutions frequently provide a false sense of security. A methodical approach, developed by experts in the communications industry, provides true peace of mind.
Tuesday, November 11 2025 9:45 am | Location:
In an increasingly digitalized and interconnected world, humans remain the biggest vulnerability to cyberattacks. Traditional security measures are increasingly reaching their limits. This presentation will show you how human risk management, artificial intelligence, and adaptive security policies, as a holistic concept, can significantly improve cybersecurity. Using practical examples, it will demonstrate how human risks can be specifically identified and minimized, how AI detects threats early on, and how adaptive security policies dynamically adjust security measures to user behavior and current risk levels. You will receive concrete suggestions on how these methods can help companies ensure compliance, reduce attack surfaces, and establish a sustainable security culture.
Tuesday, November 11 2025 11:45 am | Location:
Tuesday, November 11 2025 1:15 pm | Location:
AI is the new craze, just as the cloud was a decade ago. Back then, many companies rushed into implementation without regard for security—and spent years catching up. Today, history threatens to repeat itself. While AI is celebrated as a driver of automation and efficiency, the risk lies in leaving the AI itself unprotected. In this presentation, we draw lessons from the cloud era and examine what’s at stake if we address AI security too late.
Tuesday, November 11 2025 1:45 pm | Location:
Ransomware remains the biggest cyber threat to businesses worldwide, reaching unprecedented scale and impact. Despite the takedown of two major ransomware groups—LockBit and ALPHV—the overall volume of attacks remains largely unchanged, and the cost is projected to reach $265 billion annually by 2031.
Contrary to the statistics, however, ransomware doesn’t necessarily have to be a question of “when”—security teams have the power to make it a question of “if.”
In this session, David Berger, Regional Director at Pentera, will present actionable strategies to strengthen your defenses and increase your organization’s resilience.
Mimecast is an AI-powered, API-enabled and connected human risk management platform. It is designed to protect organizations from the full spectrum of cyber threats. It integrates modern, user-friendly technology with risk detection and security literacy strategies that always keep the user in focus. Designed to make invisible risks visible and process data insights in such a way that they can serve as a basis for decision-making, it opens up proactive options for companies to take action. It helps to protect communication and collaboration landscapes, secure critical data, actively involve employees in risk management and promote a security culture that is in line with corporate goals such as business continuity and increased productivity. Over 42,000 organizations worldwide trust Mimecast to stay ahead of the dynamically evolving threat landscape. From internal risks to external threats, Mimecast offers customers more. More visibility. More insight. More agility. More security.
Your partner for digitalization
As a strong digitalization and IT service provider, we offer you not only the best teams of experts, but also a powerful digital portfolio at competitive prices.
Local strength with global networking
As a subsidiary of T-Systems International, we shape the connected future of business and society with innovative ICT solutions. Our globally distributed “Global Delivery Network,” with development centers near and offshore, enables our customers to optimize project execution in terms of costs, skills, and capacity.
In the Austrian market, we shape the digital future with a forward-looking perspective, innovative solutions, and valuable industry expertise. We want to not only help you discover your digital potential, but also accompany you throughout your entire digital transformation with customized end-to-end IT services, holistic concepts, and expert consulting.
Red Sift is creating a fundamentally safer internet through proactive security across email, web and PKI. Together, we are equipping security leaders to keep not just their organizations, but their customers secure.
Working across EMEA, APAC and the US. Our regional expertise means every mailbox stays protected, regardless of time zone.
Robert-Stolz-Platz 1
1010 Vienna, Austria
https://www.marriott.com/de/hotels/viemd-le-meridien-vienna/overview/
The IT Strategy & Cyber Security Summit is aimed at IT and departmental employees from IT user companies in Austria.
IT user companies, for the purposes of these terms and conditions, are all organizations that do not provide consulting services themselves and/or do not develop, manufacture, or distribute IT and communication (ITK) products or services.
Employees of outsourced IT companies exclusively working for the parent company and not engaged in third-party business are also eligible to participate. Employees of IT provider companies generally have access to our events only through sponsorship.
IT provider companies, for the purposes of these terms and conditions, include hardware, software, services, and telecommunications companies, as well as consulting firms and ITK service providers.
IDC expressly reserves the right to reject registrations from individuals who do not belong to the above-mentioned target group, even if the invitation was issued by one of our partners, mistakenly by IDC itself, or through participation in an online survey.
After your registration via the online registration form and successful verification by IDC, you will receive a binding registration confirmation by email.pa
Don’t worry! There are plenty of other events to choose from. Simply sign up for event invitations and we’ll send you a notification whenever we add a new event that matches your interests.