Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Joshua Hunter of Information Security Forum, Gianclaudio Moresi of Forbo Group, Yannis Soupionis of MDPI and Tim Sattler of Jungheinrich discuss complex threat vectors, intelligence sharing and AI applications.
Martin Krämer of KnowBe4 explores how human risk management, non-punitive policies and security culture can reduce breaches and improve incident response when technology alone isn't enough to secure enterprises.
Patrick Siffert of Checkmarx examines AI's dual impact on application security - from developer efficiency to automated threats, vulnerabilities, and why English is becoming the most dangerous programming language.
Yannis Soupionis of MDPI shares real-world disaster recovery insights, covering decision-making processes, technical obstacles and best practices for building resilient cyber disaster recovery strategies.
Alison Lester of Magnet Forensics explores how aligning digital forensics with cybersecurity strategies reduces risk, streamlines investigations and ensures legal defensibility in complex cloud environments.
Arne Blum of Vitra shares innovative strategies for attracting, developing, and retaining cybersecurity talent, exploring educational pathways and industry partnerships to build resilient security teams.
Frank Lange of Anomali discusses how generative AI transforms SOC capabilities from reactive incident response to proactive threat hunting, optimizing SIEM performance and addressing response speed challenges.
John-Erik Horn of difesa explores how Continuous Threat Exposure Management aligns with DORA compliance and OT security, focusing on asset identification and unified risk management strategies.
Trish McGill, Jorge Rocha of Delivery Hero, Michael Fontner of Herrenknecht and Weldon Dodd of Kandji discuss cybersecurity ROI metrics, spending efficiency and repeatable risk analysis frameworks.
Timo Wandhöfer of Klöckner & Co SE demonstrates how to develop board-friendly cyber resilience frameworks that balance prevention with recovery, emphasizing routine practices and governance for enhanced business quality.
Joachim Fox of ZF explores critical differences between automotive product security and IT cybersecurity, addressing resource constraints, variant management and incident response for embedded safety systems.
Balázs Izso, Naveen Ullikashi, Florian Augthun, Dennis Pokupec and George Sokolsky explore how CISOs can transform security into a business enabler through influence, negotiation and cultural change strategies.
Pascal Reiniger of Kanton Basel-Landschaft explores quantum computing threats, post-quantum cryptography preparation, crypto agility strategies and migration road maps to future-proof digital infrastructure.
Gil Levonai of Hunters and Morten Østergaard of The Berner Group discuss practical AI implementation in SOCs, automation, transparency, and balancing AI benefits with human oversight and analyst development.
Ali Baccouche of Texas Instruments explores third-party risk management, vendor assessment strategies, continuous monitoring and addressing shadow AI in complex supply chains and regulatory landscapes.
Michael Beaupre of Hays challenges traditional risk quantification methods, exploring OODA loop frameworks, narrative-driven risk communication and real-time telemetry for actionable risk management.