2. - 3.

April 2025 | from 9:30

12 +

Speaker

15 +

interactive sessions
Our Live Event speaker

We Are Looking Forward to the Following Speakers From the Economy & Cyber Security Sector...

Dr. Tanja Rückert
Geschäftsführerin, CDO Digital Business & Services
Robert Bosch GmbH

How to blow an entire IT security budget without attackers noticing:
IT security often fails because time and money are invested in measures that neither effectively protect against real attacks nor reduce their damage.
Instead of focusing on the actual methods used by attackers, many rely on theoretical approaches and dubious security solutions with unclear benefits.
IT security must be based on actual attacks, not on legal regulations. We look at real cases of damage and how they could have been prevented.
And then we finally learn from the mistakes of others before we make them ourselves.
Bio: Linus Neumann is a qualified psychologist and hacker. At Berlin Security Research Labs, he is responsible for red teaming, strategic consulting and incident response.

Linus Neumann
Hacker - Consultant - Keynote Speaker - Psychologist
Security Research Labs

Cyber threat situation: How at risk is our German economy really?

Understatements such as “Why should we be the focus of attackers – we’re not that important!” do not distract from the much underestimated attractiveness of our own company. Family businesses are now also a target for cyberattacks…

Katharina Sook Hee Koch
Senior Officer
Bundesamt für Sicherheit in der IT

Phishing simulations: Effective prevention or a waste of time?:

Phishing simulations are an important tool for strengthening cyber security. They help to sensitize employees to the dangers of phishing attacks and improve their ability to react. However, there are also points of criticism, such as the potential stress for employees and the question of their actual effectiveness.

Florian Brandner

Global Information & Cybersecurity Director
PUMA SE

The security ABC was yesterday. With the Cyber LPA (Guideline, Policies, Awareness) to Cyber Strategy 5.0:

Without an up-to-date plan, every security strategy remains a patchwork. Find out how guidelines, policies and awareness form the basis of a stable cyber strategy – and why everything else is just poorly made infosec theater

Benjamin Bachmann

CISO
Bilfinger SE

Soon I won’t have a cyber defense team anymore!
Discover why having your own cyber defense teams will soon be a thing of the past. Find out how professional managed services, automated playbooks and new technologies can fend off hackers more efficiently and cost-effectively. Let’s take a look into the future together!

Dr. Daniel Brettschneider

CISO
Miele & Cie. KG
Stefan Würtemberger
Executive Vice President Information Technology
Marabu GmbH & Co. KG
Sandrina Rath
Head of IT Audit, Compliance & Software Asset Mgmt.
ZF Friedrichshafen AG
Dr. Christoph Peylo

Chief Cybersecurity Officer
Robert Bosch GmbH
Inés Atug
Head of Security Threat
HypoVereinsbank
Daniel Fai
Director, Information Security Leader DACH
Procter & Gamble Company

Global synergies: “Fast setup” of an integrated cyber security management system for a networked world: Experience how information security and cyber security are efficiently integrated and rolled out worldwide in the case study of a leading global automotive supplier (ElringKlinger). Find out how OT is seamlessly integrated into the store floor and building technology as well as ‘intelligent’ products.

Translated with DeepL.com (free version)

Michael Hohl
CISO & CSO
ElringKlinger AG

Regulatory jungle: KRITIS requirements vs. procurement law in the public sector

Find out how security requirements for KRITIS and public procurement law can be reconciled in the public sector.
In doing so, we will draw on experience and lessons learned from everyday life.

Andreas Brnjic
Teamleiter Team Security Operations
Universitäsklinikum Freiburg

DORA and the SOC of a bank – what was there to do?

A concrete implementation measure for the SOC of Bausparkasse Schwäbisch Hall is presented based on the process of identifying a catalog of measures from the implementation regulations, a GAP analysis and the implementation from the “Operational Security” sub-project.

Lutz Kirsten
Exp. IT-Security - Team IBS4 - SOC
Bausparkasse Schwäbisch Hall
Our Security Days partners

...and Our Speakers From the Provider Side

Cyber security for SMEs

 

Cyber attacks are becoming more frequent, more diverse and more difficult to detect, while the associated financial risks are increasing. The biggest challenge – especially in the SME sector – is having the specialist personnel to deal with this task. This includes a holistic approach, including vulnerability analysis and remediation, monitoring and analysis of the threat situation, as well as training of internal employees – in addition to common methods such as continuous monitoring of existing systems and data via a SOC.
As an extended workbench for IT security, Arctic Wolf provides you with precisely the resources you need to take your security situation to the next level in an all-encompassing and individually flexible manner. Find out how our team of personal security specialists can support you.

Daniel Dilg
Senior Presales Engineer
Arctic Wolf

Highly complex, highly effective: Why a SOC is not a simple solution

A Security Operations Center (SOC) offers 24/7 protection by
integration of complex technologies and expertise in different areas. It requires constant adaptation to new threats. Highly complex, but indispensable: find out why a SOC is the decisive solution for your IT security.

Götz Schartner
Chief Executive Officer
8com GmbH & Co. KG

Accelerate your defense! Attack detection
and defense in the network using AI

 

Corelight’s Open NDR platform provides an integrated generative AI capability to help security analysts accelerate MTTD.
Corelight’s approach is to use AI where it can make our customers more productive in their daily beauty operations.
And to do so in a way that is both responsible and secure towards our clients’ data privacy

Richard Wieneke
Regional Sales Director
Corelight

Incident response: why every second counts

 

And to do so in a way that is both responsible and secure towards our clients’ data privacy

Sandro Bachmann
Senior Incident Responder
InfoGuard AG

Proactive security strategies for your company – Learn how DriveLock neutralizes threats before they arise!

 

Cyber-attacks today are more sophisticated and persistent than ever before – and your defense strategy must be too! In this presentation, you will learn how DriveLock takes preventive cybersecurity measures to a new level and how intelligent combinations of Allow-Listing, Application Behavior Control and Device Control neutralize attacks before they occur. We also show how endpoints and data are protected by proactive security strategies and user-friendly policies without limiting productivity.
Take the next step in prevention: security starts today – before the first attack is launched!

Falk Trümner, Kevin Limburger
Principal PreSales Consultant, Senior Sales Manager
DriveLock SE

‘Fortify Your Cybersecurity’ in the Age of Artificial Intelligence

 

AI technologies are revolutionizing cyber security and making
making security products increasingly effective. However, the hype and the rapid spread of LLM systems bring with them new challenges. Find out in this presentation how we can meet these challenges and make our security fit for the future!

Carsten Hoffmann
Sr. Manager Systems Engineering
Fortinet

The quantum leap: preparing for a post-quantum cybersecurity world

Arnd Gille
Senior Manager Solutions Consulting Germany
Palo Alto Networks

IT operations after the turnaround – resilience to large-scale crises and conflicts

 

Based on a brief overview of the risk situation in Germany, the necessary building blocks for an extended resilience strategy are discussed in order to continue IT operations in a crisis or conflict scenario.

Michael Strobl
Associate Director Security Consulting
Kyndryl

Dangerous Transparency – Why Indicators of
Compromise & forensic results are worth protecting

 

Successful cyberattacks not only unsettle your own company, but also third parties such as service providers and partners. The volume of requests received while the incident is being dealt with can severely block the restart. Due to this additional stress, sensitive information such as indicators of compromise, forensic findings and information on the detailed attack process are often passed on in an undifferentiated manner.
Why does this pose a risk? How can you prepare yourself? And what information can you pass on safely?

Kira Groß-Bölting
Deputy Head of CSIRT
G DATA Cyberdefense AG

Managed detection and response: recognizing attacks before it’s too late

How can modern cyber attacks be stopped effectively when resources are limited and the attack surface is growing? Find out how the right combination of technology and human expertise can detect and eliminate threats around the clock.

Robert Meier
Specialist Sales Manager MDR
CrowdStrike

Countering NIS2 and AI-driven attacks with external SOC services

With current challenges in IT security such as NIS2 and AI-driven attacks, many IT departments are reaching their limits, as security tools need to be operated by specialist staff around the clock. We show you how you can make your IT security future-proof and resilient, what role humans and AI play and how you can benefit from a managed SOC service in all of this.

Michael Veit
Technology Evangelist
Sophos

Increase your AppSec program maturity with developer-friendly SAST and DAST tools.

Mathias Conradt
Principal Solutions Engineer
Snyk
Tickets

Get Your Ticket for the Event

Please understand that we do not accept cybersecurity providers as participants. 

Event Location, Directions, hotel recommendations

How To Find Us

For those arriving by car

The following parking facilities are available for a fee:

For those arriving by train

Ludwigsburg can be reached from Stuttgart in 12 minutes with the S-Bahn lines S4 (direction Marbach) and S5 (direction Bietigheim). It is about 600 m from the station to the Reithaus.

You can either walk or take bus line 420 from the station to the bus stop at the Forum.

For those arriving from Stuttgart Airport

Ludwigsburg is around 30 kilometers from Stuttgart Airport. Take the S-Bahn lines S2 or S3 to Stuttgart main station, then the S4 or S5 to Ludwigsburg.

Our hotel recommendations

You can choose from a wide range of hotels around the Reithaus and book the hotels with our hotel contigent:

Scroll to Top