We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

DACHsec Cyber Summit

Search

Clear Expand Collapse

Addressing the Cybersecurity Talent Shortage

Arne Blum of Vitra shares innovative strategies for attracting, developing, and retaining cybersecurity talent, exploring educational pathways and industry partnerships to build resilient security teams.

Price
Course duration Duration: 25 minutes

Aligning Forensics & Cybersecurity to Reduce Risk

Alison Lester of Magnet Forensics explores how aligning digital forensics with cybersecurity strategies reduces risk, streamlines investigations and ensures legal defensibility in complex cloud environments.

Price
Course duration Duration: 30 minutes

Balancing Business Goals & Cybersecurity

Balázs Izso, Naveen Ullikashi, Florian Augthun, Dennis Pokupec and George Sokolsky explore how CISOs can transform security into a business enabler through influence, negotiation and cultural change strategies.

Price
Course duration Duration: 45 minutes

Balancing Investment & Risk in Resource Allocation

Trish McGill, Jorge Rocha of Delivery Hero, Michael Fontner of Herrenknecht and Weldon Dodd of Kandji discuss cybersecurity ROI metrics, spending efficiency and repeatable risk analysis frameworks.

Price
Course duration Duration: 45 minutes

Boosting Elite SOCs With Generative AI

Frank Lange of Anomali discusses how generative AI transforms SOC capabilities from reactive incident response to proactive threat hunting, optimizing SIEM performance and addressing response speed challenges.

Price
Course duration Duration: 25 minutes

Bridging Hype and Reality in AI-Driven SOCs

Gil Levonai of Hunters and Morten Østergaard of The Berner Group discuss practical AI implementation in SOCs, automation, transparency, and balancing AI benefits with human oversight and analyst development.

Price
Course duration Duration: 25 minutes

Considerations & Impact of AI in Application Security

Patrick Siffert of Checkmarx examines AI's dual impact on application security - from developer efficiency to automated threats, vulnerabilities, and why English is becoming the most dangerous programming language.

Price
Course duration Duration: 25 minutes

CTEM for DORA and OT Security - How Does That Fit?

John-Erik Horn of difesa explores how Continuous Threat Exposure Management aligns with DORA compliance and OT security, focusing on asset identification and unified risk management strategies.

Price
Course duration Duration: 20 minutes

Cybersecurity in Automotive Safety

Joachim Fox of ZF explores critical differences between automotive product security and IT cybersecurity, addressing resource constraints, variant management and incident response for embedded safety systems.

Price
Course duration Duration: 30 minutes

Disaster Recovery Use Case

Yannis Soupionis of MDPI shares real-world disaster recovery insights, covering decision-making processes, technical obstacles and best practices for building resilient cyber disaster recovery strategies.

Price
Course duration Duration: 25 minutes

Facing the Surge of Cyberattacks in DACH

Joshua Hunter of Information Security Forum, Gianclaudio Moresi of Forbo Group, Yannis Soupionis of MDPI and Tim Sattler of Jungheinrich discuss complex threat vectors, intelligence sharing and AI applications.

Price
Course duration Duration: 35 minutes

Rethinking Risk Quantification in Cybersecurity

Michael Beaupre of Hays challenges traditional risk quantification methods, exploring OODA loop frameworks, narrative-driven risk communication and real-time telemetry for actionable risk management.

Price
Course duration Duration: 35 minutes

Securing the Future with Post-Quantum Cryptography

Pascal Reiniger of Kanton Basel-Landschaft explores quantum computing threats, post-quantum cryptography preparation, crypto agility strategies and migration road maps to future-proof digital infrastructure.

Price
Course duration Duration: 35 minutes

Strengthening Cybersecurity in an Interconnected Landscape

Ali Baccouche of Texas Instruments explores third-party risk management, vendor assessment strategies, continuous monitoring and addressing shadow AI in complex supply chains and regulatory landscapes.

Price
Course duration Duration: 30 minutes

Tackling CISO Challenges with Security Culture

Martin Krämer of KnowBe4 explores how human risk management, non-punitive policies and security culture can reduce breaches and improve incident response when technology alone isn't enough to secure enterprises.

Price
Course duration Duration: 30 minutes

Tactical Board Method for Cyber Resilience

Timo Wandhöfer of Klöckner & Co SE demonstrates how to develop board-friendly cyber resilience frameworks that balance prevention with recovery, emphasizing routine practices and governance for enhanced business quality.

Price
Course duration Duration: 20 minutes

The Cyberwars: A New Hope - How Teams Are Going to Win

Anja Loether of GitHub discusses developer-first application security approaches, integrating security into workflows, secret scanning and automation to reduce friction while strengthening security posture.

Price
Course duration Duration: 30 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement