2. - 3.

April 2025 | from 9:30

12 +

Speaker

15 +

interactive sessions
Our Live Event speaker

We Are Looking Forward to the Following Speakers From the Economy & Cyber Security Sector...

Fostering Cyber Resilience: How Al is shaping the Threat Landscape

Dr. Tanja Rückert
Geschäftsführerin, CDO Digital Business & Services
Robert Bosch GmbH

How to blow an entire IT security budget without attackers noticing:
IT security often fails because time and money are invested in measures that neither effectively protect against real attacks nor reduce their damage.
Instead of focusing on the actual methods used by attackers, many rely on theoretical approaches and dubious security solutions with unclear benefits.
IT security must be based on actual attacks, not on legal regulations. We look at real cases of damage and how they could have been prevented.
And then we finally learn from the mistakes of others before we make them ourselves.
Bio: Linus Neumann is a qualified psychologist and hacker. At Berlin Security Research Labs, he is responsible for red teaming, strategic consulting and incident response.

Linus Neumann
Hacker - Consultant - Keynote Speaker - Psychologist
Security Research Labs

Cyber threat situation: How at risk is our German economy really?

Understatements such as “Why should we be the focus of attackers – we’re not that important!” do not distract from the much underestimated attractiveness of our own company. Family businesses are now also a target for cyberattacks…

Katharina Sook Hee Koch
Senior Officer
Bundesamt für Sicherheit in der IT
Florian Brandner

Global Information & Cybersecurity Director
PUMA SE

The security ABC was yesterday. With the Cyber LPA (Guideline, Policies, Awareness) to Cyber Strategy 5.0:

Without an up-to-date plan, every security strategy remains a patchwork. Find out how guidelines, policies and awareness form the basis of a stable cyber strategy – and why everything else is just poorly made infosec theater

Benjamin Bachmann

CISO
Bilfinger SE

Soon I won’t have a cyber defense team anymore!
Discover why having your own cyber defense teams will soon be a thing of the past. Find out how professional managed services, automated playbooks and new technologies can fend off hackers more efficiently and cost-effectively. Let’s take a look into the future together!

Dr. Daniel Brettschneider

CISO
Miele & Cie. KG
Stefan Würtemberger
Executive Vice President Information Technology
Marabu GmbH & Co. KG
Sandrina Rath
Head of IT Audit, Compliance & Software Asset Mgmt.
ZF Friedrichshafen AG

Protecting the receiving End

Industry and business is more or less on the receiving end of cyberattacks. Active defense is – for the time being – not an option and passive defense allows the adversary to have the initiative, choosing, time, methods. How can we deal efficiently and effectively with this situation?

Dr. Christoph Peylo

Chief Cybersecurity Officer
Robert Bosch GmbH
Inés Atug
Head of Security Threat
HypoVereinsbank
Daniel Fai
Director, Information Security Leader DACH
Procter & Gamble Company

Global synergies: “Fast setup” of an integrated cyber security management system for a networked world: Experience how information security and cyber security are efficiently integrated and rolled out worldwide in the case study of a leading global automotive supplier (ElringKlinger). Find out how OT is seamlessly integrated into the store floor and building technology as well as ‘intelligent’ products.

Translated with DeepL.com (free version)

Michael Hohl
CISO & CSO
ElringKlinger AG

Regulatory jungle: KRITIS requirements vs. procurement law in the public sector

Find out how security requirements for KRITIS and public procurement law can be reconciled in the public sector.
In doing so, we will draw on experience and lessons learned from everyday life.

Andreas Brnjic
Teamleiter Team Security Operations
Universitäsklinikum Freiburg

DORA and the SOC of a bank – what was there to do?

A concrete implementation measure for the SOC of Bausparkasse Schwäbisch Hall is presented based on the process of identifying a catalog of measures from the implementation regulations, a GAP analysis and the implementation from the “Operational Security” sub-project.

Lutz Kirsten
Exp. IT-Security - Team IBS4 - SOC
Bausparkasse Schwäbisch Hall
Wolf Richter
Chief Commercial Officer
Allurity
Our Security Days partners

...and Our Speakers From the Provider Side

Cyber security for SMEs

 

Cyber attacks are becoming more frequent, more diverse and more difficult to detect, while the associated financial risks are increasing. The biggest challenge – especially in the SME sector – is having the specialist personnel to deal with this task. This includes a holistic approach, including vulnerability analysis and remediation, monitoring and analysis of the threat situation, as well as training of internal employees – in addition to common methods such as continuous monitoring of existing systems and data via a SOC.
As an extended workbench for IT security, Arctic Wolf provides you with precisely the resources you need to take your security situation to the next level in an all-encompassing and individually flexible manner. Find out how our team of personal security specialists can support you.

Daniel Dilg
Senior Presales Engineer
Arctic Wolf

Highly complex, highly effective: Why a SOC is not a simple solution

A Security Operations Center (SOC) offers 24/7 protection by
integration of complex technologies and expertise in different areas. It requires constant adaptation to new threats. Highly complex, but indispensable: find out why a SOC is the decisive solution for your IT security.

Robin Dillmann
Sales Coordinator
8com GmbH & Co. KG

Accelerate your defense! Attack detection
and defense in the network using AI

 

Corelight’s Open NDR platform provides an integrated generative AI capability to help security analysts accelerate MTTD.
Corelight’s approach is to use AI where it can make our customers more productive in their daily beauty operations.
And to do so in a way that is both responsible and secure towards our clients’ data privacy

Marc Honore
Inside Sales Representative
Corelight

Incident response: why every second counts

 

And to do so in a way that is both responsible and secure towards our clients’ data privacy

Sandro Bachmann
Senior Incident Responder
InfoGuard AG

Proactive security strategies for your company – Learn how DriveLock neutralizes threats before they arise!

 

Cyber-attacks today are more sophisticated and persistent than ever before – and your defense strategy must be too! In this presentation, you will learn how DriveLock takes preventive cybersecurity measures to a new level and how intelligent combinations of Allow-Listing, Application Behavior Control and Device Control neutralize attacks before they occur. We also show how endpoints and data are protected by proactive security strategies and user-friendly policies without limiting productivity.
Take the next step in prevention: security starts today – before the first attack is launched!

Falk Trümner, Kevin Limburger
Principal PreSales Consultant, Senior Sales Manager
DriveLock SE

‘Fortify Your Cybersecurity’ in the Age of Artificial Intelligence

 

AI technologies are revolutionizing cyber security and making
making security products increasingly effective. However, the hype and the rapid spread of LLM systems bring with them new challenges. Find out in this presentation how we can meet these challenges and make our security fit for the future!

Carsten Hoffmann
Sr. Manager Systems Engineering
Fortinet

Real-Time Cloud Security with Cortex Cloud

Breaches happen when security teams can’t connect the dots fast enough. Imagine a world, though, where runtime context informs cloud posture decisions during peace time, ensuring vulnerabilities and other risks are prioritized before they become active threats. Automation then closes the loop on critical issues, resolving risks before attackers exploit them.

At the same time, envision SOC teams with the full picture – seeing not just an attack in progress but the cloud exposures that made it possible. With runtime insights mapped to cloud risk, investigations become faster, more precise and tied to real-world attack paths.

Cortex Cloud changes the equation, setting new benchmarks for simplicity and effectiveness. From smart prioritization that manages millions of security findings to automation that streamlines remediation, organizations can take back control.

Rainer Singer
Manager Solutions Consulting Germany
Palo Alto Networks

IT operations after the turnaround – resilience to large-scale crises and conflicts

 

Based on a brief overview of the risk situation in Germany, the necessary building blocks for an extended resilience strategy are discussed in order to continue IT operations in a crisis or conflict scenario.

Michael Strobl
Associate Director Security Consulting
Kyndryl

Dangerous Transparency – Why Indicators of
Compromise & forensic results are worth protecting

 

Successful cyberattacks not only unsettle your own company, but also third parties such as service providers and partners. The volume of requests received while the incident is being dealt with can severely block the restart. Due to this additional stress, sensitive information such as indicators of compromise, forensic findings and information on the detailed attack process are often passed on in an undifferentiated manner.
Why does this pose a risk? How can you prepare yourself? And what information can you pass on safely?

Kira Groß-Bölting
Deputy Head of CSIRT
G DATA Cyberdefense AG

Managed detection and response: recognizing attacks before it’s too late

How can modern cyber attacks be stopped effectively when resources are limited and the attack surface is growing? Find out how the right combination of technology and human expertise can detect and eliminate threats around the clock.

Roland Meier
Specialist Sales Manager MDR
Crowdstrike

Countering NIS2 and AI-driven attacks with external SOC services

With current challenges in IT security such as NIS2 and AI-driven attacks, many IT departments are reaching their limits, as security tools need to be operated by specialist staff around the clock. We show you how you can make your IT security future-proof and resilient, what role humans and AI play and how you can benefit from a managed SOC service in all of this.

Michael Veit
Technology Evangelist
Sophos

Increase your AppSec program maturity with developer-friendly SAST and DAST tools.

Mathias Conradt
Principal Solutions Engineer
Snyk

Session 1:

If the CFO would pay the ransom…
In the first German Cyber Experience Center of Orange Cyberdefense, top management experiences first-hand what a ransomware attack feels like, what effects are to be expected and what decisions have to be made. Götz Weinmann provides insights into the Cyber Experience Center and gives participants a taste of what to expect in the Cyber Experience Center.

Session 2:

ThreatVision: Kill the Noise – with confidence

Threat Informed Defense in practice: Our expert Götz Weinmann gives a practical demonstration of how you can get the most out of your security infrastructure with a good threat intelligence platform, what threat intelligence (TI) is all about and why TI should always be part of security services. Want to get started? Bring your Indicator of Compromise (IoC) to the talk and hear live what our CERT experts have to say about it…

 

Götz Weinmann
Senior Business Development Manager
Orange Cyberdefense Germany

Autonomous cyber security: How AI detects threats in real time
detects and neutralizes

With more sophisticated attacks that also make use of AI
more and more traditional security solutions are reaching their limits. But autonomous
AI systems also promise faster and more effective threat
threat detection. But are they really reliable? We take a look
look at the opportunities, challenges and real-life use cases.

Andreas Mammitzsch
Enterprise Account Manager
SentinelOne
Thorsten Jakoby
Director Technology Expertise
Novatec GmbH

To an end with the Data Silos!

Zrinka Maslic
Solutions Architect
Kudelski Security
Josef Meier
Director Sales Engineering CEMEA
SentinelOne
Tickets

Get Your Ticket for the Event

Please understand that we do not accept cybersecurity providers as participants. 

What to Expect

Agenda

Event Location, Directions, hotel recommendations

How To Find Us

For those arriving by car

The following parking facilities are available for a fee:

For those arriving by train

Ludwigsburg can be reached from Stuttgart in 12 minutes with the S-Bahn lines S4 (direction Marbach) and S5 (direction Bietigheim). It is about 600 m from the station to the Reithaus.

You can either walk or take bus line 420 from the station to the bus stop at the Forum.

For those arriving from Stuttgart Airport

Ludwigsburg is around 30 kilometers from Stuttgart Airport. Take the S-Bahn lines S2 or S3 to Stuttgart main station, then the S4 or S5 to Ludwigsburg.

Our hotel recommendations

You can choose from a wide range of hotels around the Reithaus and book the hotels with our hotel contigent:

Get Your Answers Here

Frequently Asked Questions

Easily here

The ticket costs 300€. With the code SECURITYDAYS4FREE you will get your ticket for free.

No, but please register early as spots are limited.

Yes, that’s no problem. Just contact us at cybercompare@bosch.com or by phone at +49 711 811-91494

No, just come as you feel best. If you are unsure what to wear: business casual is always a good choice.

On the 02.04.2025 the doors open at 08:30 am for the check in. The event it self starts at 09:00 am.

On the second day, the 03.04. we will also open the doors at 08:30 am.

Yes of course. You can find the full agenda here

Yes.

Yes.

You can choose from a wide range of hotels around the Reithaus and book the hotels with our hotel contigent:

No, we do not offer an official shuttle service. However, the venue is easily accessible by public transport or taxi. It is about 600 meters on foot from Ludwigsburg train station to the Reithaus. Alternatively, there are several taxi and ride service providers in the region.

For those arriving by car

The following parking facilities are available for a fee:

For those arriving by train

Ludwigsburg can be reached from Stuttgart in 12 minutes with the S-Bahn lines S4 (direction Marbach) and S5 (direction Bietigheim). It is about 600 m from the station to the Reithaus.

You can either walk or take bus line 420 from the station to the bus stop at the Forum.

For those arriving from Stuttgart Airport

Ludwigsburg is around 30 kilometers from Stuttgart Airport. Take the S-Bahn lines S2 or S3 to Stuttgart main station, then the S4 or S5 to Ludwigsburg.

The following parking facilities are available for a fee:

As the parking slots are limited, we recommend to come via train.

  • Karlsplatz
  • Bärenwiese

The number is limited. 

In German.

No.

No.

You can find all speakers and participating companies here.

Yes.

The event focuses on current trends and challenges in cybersecurity under the theme “strategy.community.excellence”

We place great importance on the protection of personal data. You can find our privacy policy here. Our terms of participation are available here.

Yes of course! Don’t forget to tag us on LinkedIn  :)

For further information, please contact the CyberCompare team via email at cybercompare@bosch.com or by phone at +49 711 811-91494.

Scroll to Top