Agenda DACH March 2025

08:00

Registration

08:15

POWER BREAKFAST

Let's open the conference with a power breakfast where you will have the opportunity for the first morning networking with colleagues from different industries and a chance to make new acquaintances and exchange business cards.

09:00

  •  In 2025, cyberattacks on critical infrastructure—ranging from power grids to healthcare systems—are expected to increase exponentially. The DACH region is already a prime target for sophisticated cyber adversaries.
  •  The intersection of IoT, smart infrastructure, and cyber vulnerabilities necessitates immediate strategic investments. Cyber threats are now not only technical but are deeply tied to national security and economic stability.
  •  Attendees will hear about how enhanced security investments not only protect critical infrastructure but also serve as catalysts for national growth and resilience. By safeguarding operations, organizations gain a competitive advantage in securing public trust and ensuring service continuity in the face of evolving threats.
  •  This keynote will highlight why prioritizing cybersecurity investments in critical infrastructure is the most pressing issue for the DACH region.

09:25

  • CISOs and IT leaders across the DACH region face a growing labyrinth of overlapping regulatory requirements. In 2025, companies must comply with a myriad of regulations, including NIS2, DORA, GDPR, KRITIS and others.
  •  In this expert panel, top experts will dissect the complexities of these overlapping regulations and discuss the real-world implications for organizations that fail to unify their approach to compliance. Fines, legal battles, and operational risks are just some of the consequences faced by companies not fully compliant.
  •  Companies need scalable compliance solutions to stay agile and ahead of evolving regulatory demands. This session will cover practical, cutting-edge strategies for integrating these frameworks into your organization’s operations. Learn how to avoid the regulatory pitfalls.
  • You will walk away with actionable strategies to simplify compliance processes, reduce operational risk, and create a unified compliance framework.

Ola Pontén

CISO
SCA

10:00

Supply chain attacks have surged in recent years, and third-party vendors often represent a significant weak link in security defenses.

With Zero Trust, every interaction is verified, and access is restricted to only what is necessary.

This keynote will feature practical insights into implementing Zero Trust across third-party vendors, with real-world examples from organizations that have successfully minimized risk. you will gain a clear understanding of how to implement a Zero Trust model.

 Learn to safeguard your network by ensuring every interaction—whether from an external supplier or an internal employee—is treated with the highest level of scrutiny.

10:20

Coffee break & 1-1 meetings

10:50

  • In 2025, AI and machine learning are no longer “future technologies”—they’re essential. With cyberattacks increasing in frequency and sophistication, human security teams cannot keep pace alone.
  •  This session will delve into how AI enhances human capabilities, analyzing vast datasets to detect patterns and anomalies that human eyes might miss. German organizations have seen notable success in deploying AI to predict and mitigate cyber threats in real-time.
  •  Attend and hear from experts using AI to augment their security operations, improving threat detection rates, reducing response times, and freeing up human resources to tackle complex threats. 
  •  This keynote will inspire you to adopt AI-driven solutions to improve efficiency, resilience, and threat mitigation.

11:15

  • Compliance management is one of the most critical areas in cybersecurity today, especially as regulations grow more complex.
  •  This session will discuss the development of unified compliance approach, addressing how to simplify the management of multiple regulations like NIS2, DORA, GDPR and others.
  •  Discover how you can streamline compliance efforts, reduce redundancies, and meet regulatory demands more efficiently by fostering cross-functional collaboration and leveraging compliance management technologies.
  •  You will leave this session with actionable insights into developing a unified, scalable approach to regulatory compliance.

Henrik Thomsson

Head of IT Security at Lidl Sverige

Mikael Varverud

CISO
Iptor

11:40

  • Cyberattacks are increasingly targeting essential services like energy grids, healthcare, and transportation, creating major disruptions in the DACH region.
  •  This expert panel will cover the intersection of regulatory compliance and operational resilience, offering insights from CISOs who have successfully navigated recent threats to critical infrastructure. With KRITIS and NIS2 mandating specific measures for essential services, this session provides critical knowledge for compliance and threat mitigation.
  •  Discover how to build a resilient defense strategy that aligns with evolving regulations and addresses the unique vulnerabilities of critical infrastructure. Hear expert advices on how companies can successfully thwart attacks on essential services.
  • After this session you will be equipped with strategies to cope with emerging threats while ensuring uninterrupted operations.

12:10

Lunch Break & 1-1 Meetings

13:10

  • As cloud adoption continues to grow across DACH, so too do concerns about shared responsibility. Recent incidents highlight the confusion over where a service provider’s responsibility ends and the client’s begins.
  •  This session will examine best practices for defining clear roles and responsibilities between cloud service providers and clients. 
  •  Attendees will gain insights into how to manage risk in multi-cloud environments, conduct joint risk assessments, and establish communication protocols that reduce the chance of the costly consequences of blurred lines.
  •  Attendees will get practical advice on forging partnerships with cloud providers to secure their environments and ensure compliance.

13:35

  •  The shared responsibility model remains a critical challenge as organizations move their data and applications to the cloud.
  •  This panel will explore how DACH companies can clearly define responsibilities, manage risks, and establish accountability in cloud environments. Organizations that have failed to clearly delineate roles between their internal teams and cloud providers have suffered significant breaches.
  •  Learn from real-world examples and discover best practices for maintaining security and compliance in multi-cloud ecosystems.
  •  This panel is essential for CISOs managing cloud-based operations in the DACH region.

14:10

  • Regulations such as NIS2, DORA and KRITIS place increased scrutiny on the security of critical infrastructure.
  •  Learn how to conduct holistic risk assessments to ensure compliance with these regulations. Recent incidents, involving critical infrastructure breaches, underscore the importance of staying ahead of evolving regulatory requirements.
  •  Attendees will discover how to leverage advanced technologies and collaborate with public sector entities to protect critical services.
  •  This session will provide the strategic knowledge about fostering a culture of collaboration between compliance, security, and operational teams ensures that regulatory demands are met while simultaneously addressing broader business risks.

14:30

Coffee Break & 1-1 meetings

15:00

  • With new regulatory frameworks being enforced, the protection of critical infrastructure is at the top of every CISO’s agenda in the DACH region.
  •  This keynote will explore the importance of conducting comprehensive evaluations of critical infrastructure, helping organizations not only meet new regulatory requirements but also identify existing vulnerabilities that need urgent attention.
  •  Gain expert insights who have successfully adapted to new regulatory demands, leveraging advanced security technologies and fostering collaboration with government bodies and industry partners. Real-world advices will demonstrate how cross-sector collaboration enhances infrastructure protection.
  •  Attendees will walk away with actionable strategy for implementing holistic risk assessment and utilizing cutting-edge security technologies to safeguard their critical infrastructure against evolving threats.

15:25

  • Cyber threats are becoming increasingly sophisticated, and traditional security teams are finding it harder to keep up. Enter AI—ready to enhance human capabilities in 2025.
  •  This session will explore how AI tools are transforming security operations, from real-time threat detection to automated incident response. DACH organizations that have adopted AI-driven solutions have seen significant improvements in efficiency and threat mitigation, allowing human teams to focus on high-level strategic tasks.
  •  Learn how AI can complement your security team by analyzing vast amounts of data in real-time, automating routine tasks, and continuously adapting to emerging threats. This session will showcase how machine learning algorithms help identify patterns and anomalies that could indicate potential security risks, giving human teams the upper hand in fighting advanced threats.
  •  Attendees will get a clear understanding of how to integrate AI tools into their cybersecurity operations, enhancing both detection and response capabilities.

15:50

  • With increasing external security threats in 2025, Zero Trust principles offer a way to redefine organizational security from the inside out.
  •  Zero Trust is not just a buzzword—it’s a necessity for organizations looking to mitigate risks posed by external threats. This session will discuss how adopting a Zero Trust framework minimize risks of breach.
  •  CISOs will learn practical steps for implementing a Zero Trust framework, cultivating a security-centric culture across employees and third-party partners. Discover how Zero Trust can enhance your overall security posture by ensuring that every user, device, and system is verified before access is granted.
  •  Attendees will get empowered with actionable strategies to adopt and implement Zero Trust principles that reduce external threats.

16:10

Leg Stretcher

16:15

  • Cyberattacks continue to increase in scale and complexity, and automation is no longer a luxury—it’s a necessity. In 2025, AI-driven automation is changing the game for cybersecurity operations.
  •  This expert panel will focus on the collaboration between human security teams and AI algorithms in automating threat response. By analyzing vast amounts of data in real-time, AI tools can identify potential security incidents more quickly, suggest and even execute responses.
  •  Learn from leading CISOs in the DACH region who have successfully integrated AI into their security operations, streamlining detection, response, and mitigation efforts. Discover how automation can significantly reduce response times and limit damage, while continuous learning algorithms improve security strategies over time.
  •  Attendees will gain insights on how to balance automation and human oversight in their cybersecurity operations, ensuring quicker, more effective threat responses.

16:50

  •  Collaborative security models are increasingly necessary as cyber threats grow more sophisticated.
  •  This session will delve into the importance of trust, data sharing, and interoperability between organizations in the DACH region, offering insights into successful partnerships.
  •  Discover how to foster a collaborative security culture that enhances resilience and mitigates shared risks.
  •  The closing keynote will inspire organizations to adopt collaborative security models to protect their digital ecosystems.

17:10

Book signing by

17:30

Official Dinner Banquet

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event