Our Live Event speaker
We Are Looking Forward to the Following Speakers From the Economy & Cyber Security Sector...
Dr. Tanja Rückert
Geschäftsführerin, CDO Digital Business & Services
Robert Bosch GmbH
How to blow an entire IT security budget without attackers noticing:
IT security often fails because time and money are invested in measures that neither effectively protect against real attacks nor reduce their damage.
Instead of focusing on the actual methods used by attackers, many rely on theoretical approaches and dubious security solutions with unclear benefits.
IT security must be based on actual attacks, not on legal regulations. We look at real cases of damage and how they could have been prevented.
And then we finally learn from the mistakes of others before we make them ourselves.
Bio: Linus Neumann is a qualified psychologist and hacker. At Berlin Security Research Labs, he is responsible for red teaming, strategic consulting and incident response.
Linus Neumann
Hacker - Consultant - Keynote Speaker - Psychologist
Security Research Labs
Cyber threat situation: How at risk is our German economy really?
Understatements such as “Why should we be the focus of attackers – we’re not that important!” do not distract from the much underestimated attractiveness of our own company. Family businesses are now also a target for cyberattacks…
Katharina Sook Hee Koch
Senior Officer
Bundesamt für Sicherheit in der IT
Phishing simulations: Effective prevention or a waste of time?:
Phishing simulations are an important tool for strengthening cyber security. They help to sensitize employees to the dangers of phishing attacks and improve their ability to react. However, there are also points of criticism, such as the potential stress for employees and the question of their actual effectiveness.
Florian Brandner
Global Information & Cybersecurity Director
PUMA SE
The security ABC was yesterday. With the Cyber LPA (Guideline, Policies, Awareness) to Cyber Strategy 5.0:
Without an up-to-date plan, every security strategy remains a patchwork. Find out how guidelines, policies and awareness form the basis of a stable cyber strategy – and why everything else is just poorly made infosec theater
Benjamin Bachmann
CISO
Bilfinger SE
Soon I won’t have a cyber defense team anymore!
Discover why having your own cyber defense teams will soon be a thing of the past. Find out how professional managed services, automated playbooks and new technologies can fend off hackers more efficiently and cost-effectively. Let’s take a look into the future together!
Dr. Daniel Brettschneider
CISO
Miele & Cie. KG
Stefan Würtemberger
Executive Vice President Information Technology
Marabu GmbH & Co. KG
Sandrina Rath
Head of IT Audit, Compliance & Software Asset Mgmt.
ZF Friedrichshafen AG
Dr. Christoph Peylo
Chief Cybersecurity Officer
Robert Bosch GmbH
Inés Atug
Head of Security Threat
HypoVereinsbank
Daniel Fai
Director, Information Security Leader DACH
Procter & Gamble Company
Global synergies: “Fast setup” of an integrated cyber security management system for a networked world: Experience how information security and cyber security are efficiently integrated and rolled out worldwide in the case study of a leading global automotive supplier (ElringKlinger). Find out how OT is seamlessly integrated into the store floor and building technology as well as ‘intelligent’ products.
Translated with DeepL.com (free version)
Michael Hohl
CISO & CSO
ElringKlinger AG
Regulatory jungle: KRITIS requirements vs. procurement law in the public sector
Find out how security requirements for KRITIS and public procurement law can be reconciled in the public sector.
In doing so, we will draw on experience and lessons learned from everyday life.
Andreas Brnjic
Teamleiter Team Security Operations
Universitäsklinikum Freiburg
DORA and the SOC of a bank – what was there to do?
A concrete implementation measure for the SOC of Bausparkasse Schwäbisch Hall is presented based on the process of identifying a catalog of measures from the implementation regulations, a GAP analysis and the implementation from the “Operational Security” sub-project.
Lutz Kirsten
Exp. IT-Security - Team IBS4 - SOC
Bausparkasse Schwäbisch Hall
Our Security Days partners
...and Our Speakers From the Provider Side
Cyber security for SMEs
Cyber attacks are becoming more frequent, more diverse and more difficult to detect, while the associated financial risks are increasing. The biggest challenge – especially in the SME sector – is having the specialist personnel to deal with this task. This includes a holistic approach, including vulnerability analysis and remediation, monitoring and analysis of the threat situation, as well as training of internal employees – in addition to common methods such as continuous monitoring of existing systems and data via a SOC.
As an extended workbench for IT security, Arctic Wolf provides you with precisely the resources you need to take your security situation to the next level in an all-encompassing and individually flexible manner. Find out how our team of personal security specialists can support you.
Daniel Dilg
Senior Presales Engineer
Arctic Wolf
Highly complex, highly effective: Why a SOC is not a simple solution
A Security Operations Center (SOC) offers 24/7 protection by
integration of complex technologies and expertise in different areas. It requires constant adaptation to new threats. Highly complex, but indispensable: find out why a SOC is the decisive solution for your IT security.
Götz Schartner
Chief Executive Officer
8com GmbH & Co. KG
Accelerate your defense! Attack detection
and defense in the network using AI
Corelight’s Open NDR platform provides an integrated generative AI capability to help security analysts accelerate MTTD.
Corelight’s approach is to use AI where it can make our customers more productive in their daily beauty operations.
And to do so in a way that is both responsible and secure towards our clients’ data privacy
Richard Wieneke
Regional Sales Director
Corelight
Incident response: why every second counts
And to do so in a way that is both responsible and secure towards our clients’ data privacy
Sandro Bachmann
Senior Incident Responder
InfoGuard AG
Proactive security strategies for your company – Learn how DriveLock neutralizes threats before they arise!
Cyber-attacks today are more sophisticated and persistent than ever before – and your defense strategy must be too! In this presentation, you will learn how DriveLock takes preventive cybersecurity measures to a new level and how intelligent combinations of Allow-Listing, Application Behavior Control and Device Control neutralize attacks before they occur. We also show how endpoints and data are protected by proactive security strategies and user-friendly policies without limiting productivity.
Take the next step in prevention: security starts today – before the first attack is launched!
Falk Trümner, Kevin Limburger
Principal PreSales Consultant,
Senior Sales Manager
DriveLock SE
‘Fortify Your Cybersecurity’ in the Age of Artificial Intelligence
AI technologies are revolutionizing cyber security and making
making security products increasingly effective. However, the hype and the rapid spread of LLM systems bring with them new challenges. Find out in this presentation how we can meet these challenges and make our security fit for the future!
Carsten Hoffmann
Sr. Manager Systems Engineering
Fortinet
The quantum leap: preparing for a post-quantum cybersecurity world
Arnd Gille
Senior Manager Solutions Consulting Germany
Palo Alto Networks
IT operations after the turnaround – resilience to large-scale crises and conflicts
Based on a brief overview of the risk situation in Germany, the necessary building blocks for an extended resilience strategy are discussed in order to continue IT operations in a crisis or conflict scenario.
Michael Strobl
Associate Director Security Consulting
Kyndryl
Dangerous Transparency – Why Indicators of
Compromise & forensic results are worth protecting
Successful cyberattacks not only unsettle your own company, but also third parties such as service providers and partners. The volume of requests received while the incident is being dealt with can severely block the restart. Due to this additional stress, sensitive information such as indicators of compromise, forensic findings and information on the detailed attack process are often passed on in an undifferentiated manner.
Why does this pose a risk? How can you prepare yourself? And what information can you pass on safely?
Kira Groß-Bölting
Deputy Head of CSIRT
G DATA Cyberdefense AG
Managed detection and response: recognizing attacks before it’s too late
How can modern cyber attacks be stopped effectively when resources are limited and the attack surface is growing? Find out how the right combination of technology and human expertise can detect and eliminate threats around the clock.
Robert Meier
Specialist Sales Manager MDR
CrowdStrike
Countering NIS2 and AI-driven attacks with external SOC services
With current challenges in IT security such as NIS2 and AI-driven attacks, many IT departments are reaching their limits, as security tools need to be operated by specialist staff around the clock. We show you how you can make your IT security future-proof and resilient, what role humans and AI play and how you can benefit from a managed SOC service in all of this.
Michael Veit
Technology Evangelist
Sophos
Increase your AppSec program maturity with developer-friendly SAST and DAST tools.
Mathias Conradt
Principal Solutions Engineer
Snyk
Tickets
Get Your Ticket for the Event
Please understand that we do not accept cybersecurity providers as participants.
Event Location, Directions, hotel recommendations
How To Find Us
For those arriving by car
The following parking facilities are available for a fee:
For those arriving by train
Ludwigsburg can be reached from Stuttgart in 12 minutes with the S-Bahn lines S4 (direction Marbach) and S5 (direction Bietigheim). It is about 600 m from the station to the Reithaus.
You can either walk or take bus line 420 from the station to the bus stop at the Forum.
For those arriving from Stuttgart Airport
Ludwigsburg is around 30 kilometers from Stuttgart Airport. Take the S-Bahn lines S2 or S3 to Stuttgart main station, then the S4 or S5 to Ludwigsburg.
Our hotel recommendations
You can choose from a wide range of hotels around the Reithaus and book the hotels with our hotel contigent:
- Nestor Hotel Ludwigsburg
Contingent with the code: SD2025 - Campus Zwei Ludwigsburg
- HARBR. Hotel Ludwigsburg

10:20 - 10:55
How can medium-sized companies with limited personnel resources achieve continuous monitoring of their IT systems, while at the same time constantly increasing protective measures and reducing the attack surface? We show in a practical way how the IT security specialists at Arctic Wolf focus on this challenge and work together with companies to overcome it.
12 years of data center sales engineering and IT security consulting. Since 2024: Senior Sales Engineer, Arctic Wolf

11:00 - 11:25
Targeted cyberattacks on companies in Europe are on the rise. At first, the hackers enter the company network quietly, until they suddenly strike with full force and often hit the affected company at its vital nerve. This is what has happened to numerous companies in Germany, Austria and Switzerland in recent months. InfoGuard provides you with interesting insights into real cyber attacks of the last few months and tells you how the InfoGuard SOC & CSIRT has helped the affected companies out of the crisis. Look forward to exciting insights from real security incidents and learn first-hand how you can master a cyberattack thanks to a 24/7 SOC with integrated CSIRT!
Ernesto Hartmann has been with InfoGuard since 2009 and is a member of the management team and one of the co-owners. As Chief Cyber Defense Officer, he leads a team of over 80 experienced cyber security analysts and incident responders. He is the initiator of InfoGuard’s Cyber Defense Center and is responsible for the establishment and further development of cyber defense and cyber crime services. Before joining InfoGuard AG, he worked as a security specialist at UBS and has over 23 years of experience in IT security. Find him on LinkedIn.

11:30 - 11:55
Integrated managed security services for comprehensive protection and resilience
Larissa Rabe is a Customer Technology Advisor at Kyndryl, responsible for offensive security. She works with customers across industries to help them understand the broad spectrum of cybersecurity disciplines, including penetration testing, red team operations, vulnerability assessments and threat intelligence. The goal is to uncover and fix cybersecurity vulnerabilities before real attackers can exploit them. Ms. Rabe has worked in the IT services industry at IBM and Kyndryl for over nine years.
Dr. Özgür İL has been Senior Sales Manager for Security & Resiliency Services at Kyndryl for three years. In this role, he advises customers from the financial and industrial sectors on security and resilience. His focus is on Security Operation Center (SOC) Services, including Security Operations as a Service, Managed Detection and Response Services, Vulnerability Management, and Incident Response and Forensic. In total, he can look back on over 10 years of professional experience in the context of managed security services at various companies in the DACH region.

12:00 - 12:25
It is not uncommon for companies to rely on existing protective measures. But even highly developed security solutions cannot reliably prevent the impairment of cannot reliably limit the disruption to business-critical processes or the financial damage or limit the resulting financial damage. Rather, the ability to quickly assess the situation and establish effective establish effective measures to restore normal operations. However unprepared to assess the situation under high time pressure and derive measures is proving to be almost impossible. The solution is the establishment of a modern incident response organization: companies must the right tools, processes and the necessary specialist knowledge, as well as sufficient resources. In our presentation, we will use our many years of experience from hundreds of cyberattacks, we will show you how you can prepare for dealing with cyberattacks and which resources, technologies and capabilities are are crucial for the rapid restoration of normal operations.
The topics at a glance:
- Why speed is (survival) important in cyber attacks
- Phases of security incident management
- Essential components of an effective incident response organization
- Optimal preparation for an emergency
- Crucial response skills
- Training and optimization through real attack simulations
