Agenda

Agenda

CSO Conference is where you see what success looks like and learn from the best. Check back soon for 2025!

DOWNLOAD AGENDA
Agenda

IDC Cybersecurity Summit – Germany

One day event

12:05 am

Lunch & Networking

12:05 am

Lunch & Networking

8:30 am

Registration & Networking

9:00 am

Welcome and introduction to the topic

9:10 am

IDC Keynote: Security and Trust in the New AI World

9:40 am

Cybersecurity am Puls des Business

In a world of growing digital threats and limited resources, cybersecurity is becoming a critical factor for business success.

By specifically prioritizing key risks and making optimal use of tight budgets, it creates the basis for efficiency, innovation and sustainable growth.

Michael Doerflinger

Michael Doerflinger

Director Cybersecurity, Exyte

10:00 am

Cyber ​​Resilience in Practice: Effectively Operationalizing Strategies

Recent years have made it clear that traditional IT security approaches alone are no longer sufficient to counter the complex threat landscape of our time. Companies have begun to develop resilience strategies – but the real challenge lies in their effective operationalization.

This presentation will explore how organizations can transform their security strategies into robust, resilient processes. The focus will be on current and future threats such as automation, artificial intelligence, and quantum computing, which require a radical rethink: moving away from purely technical solutions toward a holistic understanding of resilience that encompasses all areas of the company.

It’s about more than just implementing a strategy – it requires a shared understanding, a coordinated program, and the commitment of all relevant stakeholders. This paradigm shift is evident, among other things, in the fact that people are no longer just talking about backup solutions, but rather about comprehensive disaster recovery concepts, incident handling, and integrated crisis management that goes beyond the IT area.

The presentation will demonstrate practical approaches to how this cultural change can be successful – and how resilience strategies can not only be planned but also sustainably anchored in everyday business operations.

Dr. A.S. Timo Wandhoefer

Dr. A.S. Timo Wandhoefer

Group CISO, Klöckner & Co.

10:20 am

Coffee break & networking

11:00 am

Securing AI Framework Implementation

 This Keynote will demonstrate:

  • How Creating a Cross-Functional AI Network
  • How Establishing an AI Demand Process
  • How Developing an Awareness Concept

David Kreft

David Kreft

CHIEF, WAGO

11:20 am

AI-Powered Cybercrime: Defending Against Smarter Attacks

11:40 am

Inside a Real-World Cyber Breach

1:05 pm

IDC Connect Roundtable Sessions

IDC Connect Roundtable 1:

Cloud Security: what are the top three security challenges that organizations face when moving to the cloud, and how can they overcome these challenges?

IDC Connect Roundtable 2:

Network Security: what are the top priorities when investing in zero trust architecture, next-gen firewalls, and intrusion detection systems?

IDC Connect Roundtable 3:

AI and Security: where are AI and GenAI offering the most benefit to security leaders, and where (in security) are they of less value?

1:55 pm

Coffee break & networking

2:25 pm

Quantum Computing: The Next Big Threat to Encryption

2:45 pm

Insider Threats & AiTM Attacks: The Enemy Within

3:00 pm

IT Security Regulatory Update and Challenges

Companies are increasingly confronted with threats from cyberspace. To increase the resilience of critical infrastructures and important economic sectors, legislation is developing requirements for information security for companies and their management bodies. In doing so, they are faced with a multitude of requirements from different legal instruments, which are difficult to keep track of and sometimes overlap, but also contain specific regulations.

This presentation provides an overview of the regulations arising, in particular, from the EU’s NIS2 Directive and its country-specific implementation laws. Against the backdrop of a large, heterogeneous corporation, the challenges within the group-wide information security management system are presented and recommendations for a pragmatic approach are offered.

Yvonne Knosowski

Yvonne Knosowski

Information Security Officer, REWE Group

3:25 pm

IT Security Regulatory Update and Challenges

3:50 pm

Summary & Conclusion

4:00 pm

Get-together with delicious drinks & canapés