Agenda
CSO Conference is where you see what success looks like and learn from the best. Check back soon for 2025!

IDC Cybersecurity Summit – Germany
One day event
Lunch & Networking
Lunch & Networking
Registration & Networking
Welcome and introduction to the topic
IDC Keynote: Security and Trust in the New AI World
Cybersecurity am Puls des Business
In a world of growing digital threats and limited resources, cybersecurity is becoming a critical factor for business success.
By specifically prioritizing key risks and making optimal use of tight budgets, it creates the basis for efficiency, innovation and sustainable growth.

Michael Doerflinger
Director Cybersecurity, Exyte
Cyber Resilience in Practice: Effectively Operationalizing Strategies
Recent years have made it clear that traditional IT security approaches alone are no longer sufficient to counter the complex threat landscape of our time. Companies have begun to develop resilience strategies – but the real challenge lies in their effective operationalization.
This presentation will explore how organizations can transform their security strategies into robust, resilient processes. The focus will be on current and future threats such as automation, artificial intelligence, and quantum computing, which require a radical rethink: moving away from purely technical solutions toward a holistic understanding of resilience that encompasses all areas of the company.
It’s about more than just implementing a strategy – it requires a shared understanding, a coordinated program, and the commitment of all relevant stakeholders. This paradigm shift is evident, among other things, in the fact that people are no longer just talking about backup solutions, but rather about comprehensive disaster recovery concepts, incident handling, and integrated crisis management that goes beyond the IT area.
The presentation will demonstrate practical approaches to how this cultural change can be successful – and how resilience strategies can not only be planned but also sustainably anchored in everyday business operations.

Dr. A.S. Timo Wandhoefer
Group CISO, Klöckner & Co.
Coffee break & networking
Securing AI Framework Implementation
This Keynote will demonstrate:
- How Creating a Cross-Functional AI Network
- How Establishing an AI Demand Process
- How Developing an Awareness Concept

David Kreft
CHIEF, WAGO
AI-Powered Cybercrime: Defending Against Smarter Attacks
Inside a Real-World Cyber Breach
IDC Connect Roundtable Sessions
IDC Connect Roundtable 1:
Cloud Security: what are the top three security challenges that organizations face when moving to the cloud, and how can they overcome these challenges?
IDC Connect Roundtable 2:
Network Security: what are the top priorities when investing in zero trust architecture, next-gen firewalls, and intrusion detection systems?
IDC Connect Roundtable 3:
AI and Security: where are AI and GenAI offering the most benefit to security leaders, and where (in security) are they of less value?
Coffee break & networking
Quantum Computing: The Next Big Threat to Encryption
Insider Threats & AiTM Attacks: The Enemy Within
IT Security Regulatory Update and Challenges
Companies are increasingly confronted with threats from cyberspace. To increase the resilience of critical infrastructures and important economic sectors, legislation is developing requirements for information security for companies and their management bodies. In doing so, they are faced with a multitude of requirements from different legal instruments, which are difficult to keep track of and sometimes overlap, but also contain specific regulations.
This presentation provides an overview of the regulations arising, in particular, from the EU’s NIS2 Directive and its country-specific implementation laws. Against the backdrop of a large, heterogeneous corporation, the challenges within the group-wide information security management system are presented and recommendations for a pragmatic approach are offered.

Yvonne Knosowski
Information Security Officer, REWE Group