Agenda
08.30 - 09.30 |
Breakfast Networking & Registration |
09.30 - 09.40 |
Chair's Welcome |
09.40 - 10.00 |
►Strengthening Cybersecurity Competence in Austria and the EU Marlies Hofmann, Legal and Policy Officer, NCC-AT
|
10.00 - 10.20 |
►Wie türkische Escort-Websites den Schutz des Eurovision Song Contests möglich gemacht haben. Cyber-Security in der global vernetzten Welt Matthias Lutz, Senior Account Manager, Cloudflare Die große Kunst der Cybersecurity ist es, Muster in komplexen Zusammenhängen erkennen zu können. Erfahren Sie die Geschichte, was türkische Escort-Websites, der Eurovision Song Contest, der Chef der staatlichen iranischen Cyber-Angriffs-Truppe und das Einreiseverbot unseres CEOs nach Russland verbindet. Weshalb ist es auch für regionale Unternehmen wichtig, globale Sicherheitsmechanismen zu installieren.
|
10.20 - 10.40 |
►Widerstandsfähig statt nur sicher: Cyber Resilience für die Cloud Jerry Rijnbeek, Vice President Cloud & Security Technology, Rubrik
|
10.40 - 11.00 |
►AI-Enhanced Cybersecurity at Banco Sabadell Eduardo Gonzalez, Global Advanced Cybersecurity Director, Banco Sabadell
|
11.00 - 11.30 |
Networking Break |
11.30 - 12.00 |
►Fireside Chat: Mitigating Personal Liability: The Changing Climate for Security Professionals Jonathan Armstrong, Partner, Punter Southall Law
|
12.00 - 12.20 |
►Cybersecurity im Zeitalter von genAI – Human Centric Security zum Schutz von modernen Cyberrisiken Proofpoint-Kunden-Session Michael Krüger, Senior Sales Engineer, Proofpoint In dieser Session werden wir versteckte Risiken von GenAI aufdecken und Sie informieren, wie Sie Ihre Mitarbeiter & Daten schützen können.
|
12.20 - 13.00 |
►Education Seminars Delegates will be able to choose from a range of topics:
|
13.00 - 14.00 |
Lunch & Networking Break |
14.00 - 14.20 |
►Securing Critical Infrastructure with IAM in an elevated threat landscape Sachin Loothra, Lead Solutions Architect, Telia
|
14.20 - 14.40 |
►Defending against multi-channel and multi-media AI-fuelled social engineering Dr. Martin Krämer, Security Awareness Advocate, KnowBe4
|
14.40 - 15.00 |
►How CyberProof and Google Transformed a Healthcare Provider’s Security Operations with Adaptive MxDR Christopher Schrauf, Senior SIEM & Cybersecurity Architekt, CyberProof
|
15.00 - 15.30 |
►Panel Discussion: Future-Proofing Security Architectures Marian Kühnel, Information Security Architect, ÖBB
|
15.30 - 16.00 |
Networking Break |
16.00 - 16.20 |
►Herding Cats: Building a Security Governance Structure That Actually Works Florian Polt, Head of Group Security & Resilience, UNIQA Insurance Group
|
16.20 - 16.50 |
►Panel Discussion: Battling Nation-State Hackers: Winning the Cyber War Utz Nisslmüller, Security Specialist, City of Vienna
|
16.50 - 17.00 |
Chair's Closing Remarks |
Bildungsseminare
Protection of Service Accounts: A Luxury or an Urgent Necessity for Highly Privileged Non-Human Identities?
Michael Lindner, Regional Sales Manager, Silverfort
Machine-to-Machine (M2M)-Accounts, auch Service- oder Non-Human-Accounts genannt, spielen eine zentrale Rolle in der IT-Infrastruktur, bergen jedoch erhebliche Sicherheitsrisiken, wenn sie nicht ausreichend geschützt werden.
Die Teilnehmer erfahren:
- Warum sind Service Accounts ein bevorzugtes Ziel für Angreifer?
- Wie können kompromittierte Service Accounts für laterale Bewegungen genutzt werden?
- Warum bleibt ihre Absicherung oft unzureichend, und wie schaffen Unternehmen Transparenz?
- Welche Strategien ermöglichen eine nachhaltige Absicherung dieser privilegierten Identitäten?
Understanding DORA – Aligning Cybersecurity and Compliance
Nico Richters, Account Director, Recorded Future
DORA is a new EU regulation requiring companies to make their digital systems more resilient to disruptions and cyberattacks. It affects not only banks, but all key players in the financial system. DORA brings cybersecurity and compliance closer together than ever before. For security and IT teams, this means new priorities and increased responsibility. The requirements are complex: companies must adapt processes, reporting, and technical controls. One of the toughest parts is identifying and documenting risks in real time. Recorded Future provides the threat intelligence needed to detect risks early and support compliance reporting. This helps organisations meet regulatory demands more efficiently.
Attendees will Learn:
- What the Digital Operational Resilience Act (DORA) is all about
- Why DORA is a game changer for security and IT teams
- Key challenges organisations face when implementing DORA
- How Recorded Future helps meet DORA compliance requirements