Frankfurt

March 27, 2025

Media Partners

Click on the Fast Link buttons to learn more

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Critical Infrastructure in DACH – Why Now and Why Here

Complex regulatory compliance/universe – Unified Solutions Needed

Zero Trust implementation for 3rd Party security risks

AI and Automation in Security – Consolidation to augment human capabilities for incident response and threat detection

Shared Responsibility Model – Issues & Solutions

Expert Speakers
0 +
Delegates
0 +
Minutes Of Networking
0 +

Ticket Price

990 €

Have a promo code?
Get your FREE ticket !!!

Apply for The C-Suite Edition

27th of March 2025


Agenda

08:00

Registration

08:15

POWER BREAKFAST

Let's open the conference with a power breakfast where you will have the opportunity for the first morning networking with colleagues from different industries and a chance to make new acquaintances and exchange business cards.

09:00

  •  In 2025, cyberattacks on critical infrastructure—ranging from power grids to healthcare systems—are expected to increase exponentially. The DACH region is already a prime target for sophisticated cyber adversaries.
  •  The intersection of IoT, smart infrastructure, and cyber vulnerabilities necessitates immediate strategic investments. Cyber threats are now not only technical but are deeply tied to national security and economic stability.
  •  Attendees will hear about how enhanced security investments not only protect critical infrastructure but also serve as catalysts for national growth and resilience. By safeguarding operations, organizations gain a competitive advantage in securing public trust and ensuring service continuity in the face of evolving threats.
  •  This keynote will highlight why prioritizing cybersecurity investments in critical infrastructure is the most pressing issue for the DACH region.

Helmut Spoecker

Vice President, Chief Security Officer ECS Partner Management
SAP

09:25

As cyber threats escalate, protecting critical infrastructure in the DACH region demands more than traditional security measures. With IoT and smart systems expanding, organizations must embrace cutting-edge innovations to stay ahead.

This session will showcase how AI-driven threat detection, zero-trust architectures, and next-gen security solutions are transforming resilience in energy, healthcare, and transportation sectors. Investing in cybersecurity not only mitigates risks but also drives operational efficiency and public trust.

Ola Pontén

CISO
SCA

09:50

  • Cyberattacks are increasingly targeting essential services like energy grids, healthcare, and transportation, creating major disruptions in the DACH region.
  •  This expert panel will cover the intersection of regulatory compliance and operational resilience, offering insights from CISOs who have successfully navigated recent threats to critical infrastructure. With KRITIS and NIS2 mandating specific measures for essential services, this session provides critical knowledge for compliance and threat mitigation.
  •  Discover how to build a resilient defense strategy that aligns with evolving regulations and addresses the unique vulnerabilities of critical infrastructure. Hear expert advices on how companies can successfully thwart attacks on essential services.
  • After this session you will be equipped with strategies to cope with emerging threats while ensuring uninterrupted operations.

10:20

Coffee Break & 1:1 meetings

10:50

Supply chain attacks have surged in recent years, and third-party vendors often represent a significant weak link in security defenses.

With Zero Trust, every interaction is verified, and access is restricted to only what is necessary.

This keynote will feature practical insights into implementing Zero Trust across third-party vendors, with real-world examples from organizations that have successfully minimized risk. you will gain a clear understanding of how to implement a Zero Trust model.

Learn to safeguard your network by ensuring every interaction—whether from an external supplier or an internal employee—is treated with the highest level of scrutiny.

Benjamin Bachman

CISO
Bilfinger

Florian Jörgens

CISO
Vorwerk Gruppe

11:25

  • With increasing external security threats in 2025, Zero Trust principles offer a way to redefine organizational security from the inside out.
  • Zero Trust is not just a buzzword—it’s a necessity for organizations looking to mitigate risks posed by external threats. This session will discuss how adopting a Zero Trust framework minimize risks of breach.
  • CISOs will learn practical steps for implementing a Zero Trust framework, cultivating a security-centric culture across employees and third-party partners. Discover how Zero Trust can enhance your overall security posture by ensuring that every user, device, and system is verified before access is granted.
  • Attendees will get empowered with actionable strategies to adopt and implement Zero Trust principles that reduce external threats.

Henrik Thomsson

Head of IT Security at Lidl Sverige

Mikael Varverud

CISO
Iptor

11:50

As organizations increasingly rely on third-party vendors, partners, and contractors, the attack surface expands, making them vulnerable to supply chain breaches and unauthorized access. Traditional perimeter-based security models are no longer sufficient to protect critical assets.

This session explores how implementing a Zero Trust approach can effectively mitigate third-party security risks by enforcing continuous verification, least privilege access, and strict segmentation. Attendees will gain insights into real-world use cases, key implementation strategies, and common pitfalls to avoid. Learn how Zero Trust can help organizations secure third-party interactions without compromising operational efficiency.

12:20

Lunch Break

13:20

  • Regulations such as NIS2, DORA and KRITIS place increased scrutiny on the security of critical infrastructure.
  • Learn how to conduct holistic risk assessments to ensure compliance with these regulations. Recent incidents, involving critical infrastructure breaches, underscore the importance of staying ahead of evolving regulatory requirements.
  • Attendees will discover how to leverage advanced technologies and collaborate with public sector entities to protect critical services.
  • This session will provide the strategic knowledge about fostering a culture of collaboration between compliance, security, and operational teams ensures that regulatory demands are met while simultaneously addressing broader business risks.

Dr. Timo Wandhöfer

Group CISO
Klöckner & Co SE

13:45

  • With new regulatory frameworks being enforced, the protection of critical infrastructure is at the top of every CISO’s agenda in the DACH region.
  • This keynote will explore the importance of conducting comprehensive evaluations of critical infrastructure, helping organizations not only meet new regulatory requirements but also identify existing vulnerabilities that need urgent attention.
  • Gain expert insights who have successfully adapted to new regulatory demands, leveraging advanced security technologies and fostering collaboration with government bodies and industry partners. Real-world advices will demonstrate how cross-sector collaboration enhances infrastructure protection.
  • Attendees will walk away with an actionable strategy for implementing holistic risk assessment and utilizing cutting-edge security technologies to safeguard their critical infrastructure against evolving threats.

14:10

  • Compliance management is one of the most critical areas in cybersecurity today, especially as regulations grow more complex.
  • This session will discuss the development of a unified compliance approach, addressing how to simplify the management of multiple regulations like NIS2, DORA, GDPR and others.
  • Discover how you can streamline compliance efforts, reduce redundancies, and meet regulatory demands more efficiently by fostering cross-functional collaboration and leveraging compliance management technologies.
  • You will leave this session with actionable insights into developing a unified, scalable approach to regulatory compliance.

14:40

  • As cloud adoption continues to grow across DACH, so too do concerns about shared responsibility. Recent incidents highlight the confusion over where a service provider’s responsibility ends and the client’s begins.
  • This session will examine best practices for defining clear roles and responsibilities between cloud service providers and clients. 
  • Attendees will gain insights into how to manage risk in multi-cloud environments, conduct joint risk assessments, and establish communication protocols that reduce the chance of the costly consequences of blurred lines.
  • Attendees will get practical advice on forging partnerships with cloud providers to secure their environments and ensure compliance.

15:00

Coffee Break & 1:1 meetings

15:30

  • Redefining Defense: Explore how AI enhances threat detection and incident response, but also introduces new attack vectors and vulnerabilities.
  • Human Intuition vs. Machine Logic: Debate the effectiveness of human judgment compared to algorithmic precision in identifying complex threats.
  • Automation vs. Accountability: Discuss the challenges of assigning responsibility when AI systems make security decisions autonomously.
  • Innovation or Risk Amplifier?: Examine whether AI-driven security tools are a safeguard or a double-edged sword, potentially exploited by sophisticated attackers.

Viktor Polic

CISO
ILO a UN agency

Team Red

Gianclaudio Moresi

Corporate CISO
Forbo Group

Team Blue

16:05

  • In 2025, AI and machine learning are no longer “future technologies”—they’re essential. With cyberattacks increasing in frequency and sophistication, human security teams cannot keep pace alone.
  • This session will delve into how AI enhances human capabilities, analyzing vast datasets to detect patterns and anomalies that human eyes might miss. German organizations have seen notable success in deploying AI to predict and mitigate cyber threats in real-time.
  • Attend and hear from experts using AI to augment their security operations, improving threat detection rates, reducing response times, and freeing up human resources to tackle complex threats. 
  • This keynote will inspire you to adopt AI-driven solutions to improve efficiency, resilience, and threat mitigation.

16:30

  • Cyberattacks continue to increase in scale and complexity, and automation is no longer a luxury—it’s a necessity. In 2025, AI-driven automation is changing the game for cybersecurity operations.
  • This expert panel will focus on the collaboration between human security teams and AI algorithms in automating threat response. By analyzing vast amounts of data in real-time, AI tools can identify potential security incidents more quickly, suggest and even execute responses.
  • Learn from leading CISOs in the DACH region who have successfully integrated AI into their security operations, streamlining detection, response, and mitigation efforts. Discover how automation can significantly reduce response times and limit damage, while continuous learning algorithms improve security strategies over time.
  • Attendees will gain insights on how to balance automation and human oversight in their cybersecurity operations, ensuring quicker, more effective threat responses.

17:00

Book signing by Florian Jörgens, CISO at Vorwerk Gruppe author of the "The Human Firewall: Wie eine Kultur der Cyber-Sicherheit geschaffen wird".

18:00

Networking dinner

STEIGENBERGER ICON FRANKFURTER HOF – YOUR LUXURY HOTEL IN FRANKFURT

In the heart of the financial district and the historical city center, we have been welcoming guests in the tradition-steeped Steigenberger Icon Frankfurter Hof since 1876. 

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event