Agenda
Die Präsentationen bereits bestätigt enthalten:
►Beyond the Algorithm: How Human Factors Can Make or Break AI Adoption
Meri Roboci, AI Security Strategist, DWS Group
- Why trust is not a given, and how to build AI literacy across your organisation
- Behavioural Resistance & Organisational Culture
- Ethical Decision-Making & Oversight
- The Human-AI Collaboration Interface
- Real-world examples from finance-what went right, what went wrong, and why
►Panel Discussion: Securing Future Architectures
Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England (moderator)
Alexander Zhitenev, Director of Corporate Systems & Head of IT Security, IFCO MANAGEMENT GmbH
Klaus-E. Klingner, Information Security Officer, Asambeauty
Prashant Joshi, Head of Enterprise IT Security Architecture, Volvo Group
- How can security teams design resilient architectures to integrate and leverage emerging technologies such as AI, quantum computing, and IoT?
- What role does AI play in developing proactive rather than reactive security strategies?
- What are the best practices for integrating AI without disrupting legacy systems and existing workflows?
- How can organisations implement zero-trust principles and adaptive access controls to secure ever-evolving environments driven by AI and edge computing?
►OT Security – A Structured Approach to Securing Industrial Assets
Prashant Joshi, Head of Enterprise IT Security Architecture, Volvo Group
- Understanding the growing sophistication of threats targeting industrial systems.
- Building a multi-layered defence tailored to OT environments.
- Common Pitfalls and Lessons Learned
►Panel Discussion: Battling Nation-State Hackers: Winning the Cyber War
Andreas Englisch, IT Security Officer, European Aero Engine Consortium (moderator)
Sreedevi Jay, Global Head of CERT, PagoNxt (a Santander company)
- How can organisations effectively leverage threat intelligence to proactively counter nation-state attacks? Can they?
- Do regulatory standards actually enhance defence against nation-state actors, or do they merely add compliance burdens without
improving security? - Are we doing enough to address supply chain vulnerabilities, or is this an overlooked entry point for nation-state threats?
- What strategic, forward-looking investments are essential for effectively countering the evolving tactics of APTs?
►Insights into current cybersecurity threats impacting individuals and organisations
Ulrich Baumann, Partner & COO, Oikon LAW
- Regulatory obligations and legal strategies for safeguarding sensitive information
- AI and Cyber Risk Governance and navigating the implications of the EU AI Act
- Streamlining legal and technical requirements to meet evolving standards for cyber resilience (NIS2 and ISO 27001)
►Leveraging DORA TLPT (Threat-Led Penetration Testing) to enhance Cyber Resilience
Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
- How DORA TLPT aligns seamlessly with TIBER-EU, CBEST & DORA to enhance cyber risk management
- Discover the benefits of an EU-standard approach to threat-led testing
- See how DORA TLPT boosts readiness for live system testing
- Learn how to start using DORA TLPT for ongoing cyber resilience and regulatory compliance
►Navigating the Cloud Responsibly
Rainer Giedat, Cyber Security Officer, Scalable GmbH
- The cloud provider outlined my responsibilities - but how do I actually make it work?
- I've assigned roles within my DevOps team, but can they truly carry them out?
- What happens to cloud security if we don’t have a firm grasp on our responsibilities?
- Services and workloads are people too, you know…