Cyber Security tech Summit Europe 13.-14.03.2019, WCCB BONN
#cstse2019

Discover the Cyber-Security heartbeat of Europe

The ongoing digitization of our society and economy put an increasing focus on the need to safeguard the associated developments. As cyber attacks continue to get more complex and refined, we are literally forced to spend a lot of time and resources on topics like data/information security and the protection of critical infrastructure. 

Under the motto “The Cyber Heartbeat of Europe“, the Cyber Security Tech Summit #CSTSE19 aims to set new standards. We will be showing you the most up-to-date approaches to boost cyber security in the economy and in society overall. The entire event in the plenum is interpreted simultaneously for the languages English and German and along with top-class speakers we have more highlights like:

We were very pleased to welcome you in Bonn.  We offer you the presentations as a download so you can read through the exciting contents of the past 2 days. Please simply click on the corresponding speaker in the "Speakers" section to download the presentation, or simply scroll down to our "Agenda".

If you have any further questions or suggestions, please contact us at FMB Cyber Security Tech Summit Europe.

An initiative of

Our 2019 Review

On March 13th and 14th, 2019 roughly 1,500 Cyber Security Tech Summit attendees from Germany and all over the world discussed the future of cyber security. 

Read more about it in our review.

Speakers

Adel Al-Saleh
CEO T-Systems
Adel Al-Saleh
CEO T-Systems

On January 1 2018, Adel B. Al-Saleh, born in 1963, started in his role as Member of the Board of Management at Deutsche Telekom AG and Chief Executive Officer (CEO) of T-Systems. 

Adel spent the first 19 years of his professional life at IBM holding a variety of senior leadership roles. His last role at IBM was vice president and general manager, Sales and Industries, IBM Northeast Europe Integrated Operating Team, responsible for IBM sales across all industries and products. Adel spent 4 years at IMS Health, world leading healthcare informatics company, as President of EMEA and President of the North America. In December 2011 Al-Saleh joined Northgate as Chief Executive Officer of Northgate Information Solutions (NIS) Group until he took over his new responsibilities at Deutsche Telekom. Adel graduated from Boston University in 1987, he earned a Bachelor of Science degree in Electrical Engineering and received his Masters of Business and Administration from Florida Atlantic University in 1990. 

Download the presentation "Let's power higher performance"

Achim Berg
President des BITKOM
Achim Berg
President des BITKOM

Achim Berg has been president of the Bitkom digital association since 2017. He speaks for 2,600 companies with more than 2 million employees. The companies he represents achieve domestic sales of 150 billion euros and export more than 50 billion euros a year. Berg is also Chairman of the Advisory Board of Flixbus, Control Expert and a member of the Supervisory Boards of Allianz and Giesecke & Devrient. As an Operating Partner of General Atlantic, he represents one of the world's largestgrowthinvestors in Germany. Previously, Berg was CEO of Arvato and Bertelsmann, was responsible for the group's global mobility business on Microsoft's Global Management Board and managed the business of Microsoft Germany. As a member of the board of T-Com, he was responsible for Telekom's fixed-network business in Germany, and from 1999 to 2001 he was CEO of Fujitsu Siemens Computers GmbH. 

no download available

Dr. Orna Berry
Entrepreneur & Industrial Executive
Dr. Orna Berry
Entrepreneur & Industrial Executive

Dr. Orna Berry is an Israeli scientist and high-tech entrepreneur and recognized as the “first lady of Israeli High Tech” due to her work in promoting excellence, entrepreneurship and innovation in Israeli society and is known as the first woman to serve as a Chief Scientist and head of the industrial R&D operation of the Israeli Ministry of Industry, Trade and Labor. She was chair of several companies including PrimeSense, the creator of the sensor technology for Microsoft Xbox Kinect. In 2011 she joined EMC Corporation as Corporate Vice President Innovation of EMC Centers of Excellence and R&D Centers, and General Manager of its Israel Center of Excellence and was appointed as the Vice President Dell EMC General Manager until March 2018. Since 2018 Dr. Berry has been focusing on various activities and lectures in academic entities and participated in forums related to security and policy.

Dr. Orna Berry is a recipient of various awards – one of them being the “Cyber Protector Award” during the Israeli Cyber Week in June 2018 for her outstanding contribution to Cyber Research. 

no download available

Keren Elazari
Cyber Security Analyst, Author & Researcher
Keren Elazari
Cyber Security Analyst, Author & Researcher

Keren Elazari is an internationally recognized security analyst, researcher, writer and speaker. Since 2000, Keren has worked with leading Israeli security firms, government organizations, big 4 and fortune 500 companies. Keren covers emerging security technologies as an independent strategic analyst and advisor. In 2014, Keren became the first Israeli woman to speak at the prestigious TED Conference. Keren’s talk has been viewed by millions, translated to 30 languages, and chosen for TED’s ‘Most Powerful Ideas’ and ‘Top Ted Talks Of 2014’. In 2019, Keren’s TED talk is still one of TED’s most watched talks on the topic of security and hacking. Keren holds a CISSP certification, an MA in Security Studies, and is currently a senior researcher with the prestigious Interdisciplinary Cyber Research Center at Tel Aviv University . Keren is also a visiting faculty member on topics of cyber security with Singularity University, a private think tank in California, and the founder of Israel’s largest security community event, BSidesTLV, part of the global SecurityBSides movement.

no download available

Timotheus Höttges 
CEO, Deutsche Telekom AG
Timotheus Höttges 
CEO, Deutsche Telekom AG

Timotheus Höttges, born in 1962, is Chief Executive Officer (CEO) of Deutsche Telekom AG since January 2014. From 2009 until his appointment as CEO, he has been member of the Group Board of Management responsible for Finance and Controlling.
From 2006 to 2009 he was member of the Board of Management responsible for the T-Home unit. In this position, he was in charge of fixed-network and broadband business, as well as integrated sales and service in Germany. Under his leadership, T-Home became the market leader in terms of new wDSL customers and developed its Internet TV service, Entertain, into a mass-market product while at the same time stabilizing its profitability.
After successfully implementing various cost-cutting programs at T-Home and in the European mobile communications subsidiaries, Mr. Höttges became responsible for the Group-wide Save for Service efficiency enhancement program. From 2005 until being appointed to the Group Board of Management, Mr. Höttges headed European operations as member of the Board of Management, T-Mobile International. From 2000 until the end of 2004, he was Managing Director, Finance and Controlling, before becoming Chairman of the Managing Board of T-Mobile Deutschland.
Mr. Höttges studied business administration at Cologne University, after which he spent three years with a business consulting company, latterly as a project manager. At the end of 1992, he moved to the VIAG Group in Munich. He became divisional manager in 1997 and, later, a member of the extended management board responsible for controlling, corporate planning, and mergers and acquisitions. As project manager, he played a central role in the merger of VIAG AG and VEBA AG to form E.on AG, which became effective on September 27, 2000.

no download available

Ludwig Leinhos
Chief of the German Cyber and Information Domain Service
Ludwig Leinhos
Chief of the German Cyber and Information Domain Service

Since April 2017, Lieutenant General Ludwig Leinhos has been the first inspector of the Bundeswehr's (Federal Defence) Cyber and Information Domain Service in Bonn. He is a member of the Advisory Councel of the Network Centric Operations Industry Consortium (NCOIC). He has been in the Bundeswehr since 1975 and, after completing his basic training in Air Force Training Regiment 3 in Roth, completed an officer's course in electrical engineering in Nuremberg at the Bundeswehr University of Applied Sciences in Neubiberg as a graduate engineer. From 1988 to 1990, he attended the General Staff Course at the German Armed Forces Command and Staff Academy in Hamburg. Until February 2016, he worked for 3 years as Director NATO Headquarters C3 Staff in the International Military Staff in Brussels. Since the beginning of 2016, he has been in service in the Armed Forces Base Command in Bonn and is Head of the CIR Development Staff, which is dedicated to the expansion of the Cyber/IT department.

no download available

Prof. Dr. Peter Martini
Full Professor, Universität Bonn, Institut für Informatik 4
Prof. Dr. Peter Martini
Full Professor, Universität Bonn, Institut für Informatik 4

Prof. Dr. Peter Martini has studied computer science and electrical engineering at the Aachen University of Technology where he received his Ph.D. degree in computer science in 1988. 

After serving as professor at the University of Paderborn from 1990 to 1996, he changed to the University of Bonn where he became head of the department 4 (communication and networked systems) of the institute of computer science. In his research, he focusses on mobile communication and cyber security.

Since 2010 Prof. Martini additionally is director of the Fraunhofer Institute for communication, information processing and ergonomics (Fraunhofer FKIE). 

Peter Martini is deputy chair of the Fraunhofer Group for Defense and Security and member of the R&D council of the German ministry of defense. Since 2018 he is deputy chair of the Cyber Security Cluster Bonn. 

Prof. Martini is author of more than 200 scientific publications.

Download the presentation "The Future is Now!" 

Arne Schönbohm
President Federal Office for Information Security (BSI)
Arne Schönbohm
President Federal Office for Information Security (BSI)

Arne Schönbohm took up his position as president of the Federal Office for Information Security (BSI) in February 2016. Born in Hamburg, he studied international business administration at the International School of Management in Dortmund, as well as in London and Taipei. For more than ten years, he has held senior positions in the field of IT security. Prior to his appointment as president of the BSI, he served as president of Cyber-Sicherheitsrat Deutschland e. V. He is the author of various books, including „Deutschlands Sicherheit – Cybercrime und Cyberwar (2011)“.

Download the presentation "The state of cyber security"

Ashok Sridharan
Lord Mayor Bonn, City of Bonn
Ashok Sridharan
Lord Mayor Bonn, City of Bonn

The Bonn CDU nominated him in November 2014 as a candidate for the office of mayor. On 13th September 2015, he won the mayoral election in Bonn, which took place in the course of the local elections in North Rhine-Westphalia in 2015. In the first ballot, Sridharan was elected successor to Jürgen Nimptsch (SPD) with 50.06 percent of the votes (45.1 percent turnout in Bonn). His opponent Peter Ruhenstroth-Bauer (SPD) received 23.7 percent of the votes. The Green candidate Tom Schmidt received 22.1 percent. The remaining 4.1 percent were distributed among three other candidates. 

Sridharan is Catholic and married. Together with his wife Petra, he has three sons. From 1998 he lived in his own house in Bornheim, and in 2015 he moved to Bonn (Röttgen district).

no download available

Dirk Backofen

Chairman of the Board Cyber Se…

Dirk Backofen

Chairman of the Board Cyber Security Cluster Bonn e.V. Head of Telekom Security, T-Systems International GmbH

Dirk Backofen is the Senior Vice President & Head of Telekom Security. In this role, he is accountable for P&L of the business unit Telekom Security with its 1,500 employees. 

Telekom Security protects the critical infrastructure of the Deutsche Telekom Group against cyber attacks worldwide and offers the same highly professional tools as Managed Security Service Provider to customers in the external market.

Dirk Backofen studied at technical university of Chemnitz (Germany) and has a master’s degree in information technology. He has been working for Deutsche Telekom since 1991 in various executive positions. In December 2016 he took over the overall leadership of Telekom Security.”

Download the presentation  "Welcome Cluster"
Download the presentation "Europe’s largest CDC & SOC"

André Beltz
Director Integrity Services, Telefonica Germany GmbH & Co. OHG
André Beltz
Director Integrity Services, Telefonica Germany GmbH & Co. OHG

André Beltz has been active in the telecommunications industry since 2001. He is currently responsible for corporate security, compliance and data protection at Telefonica Deutschland GmbH & Co. OHG. Before working in the telecommunications industry, he held various functions and management positions in other companies.

no download available 

Martin Borrett
CTO, IBM Security Europe
Martin Borrett
CTO, IBM Security Europe

Martin Borrett is an IBM Distinguished Engineer and CTO IBM Security Europe. He advises at the most senior level in clients on policy, business, technical and architectural issues associated with security. Martin leads IBM's Security Blueprint work and is co-author of the IBM Redbooks "Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security" and "Understanding SOA Security". He is Chairman of the European IBM Security Board of Advisors, represents IBM at GFCE, ECSO and the Industry Advisory Board of LORCA, the London Office for Rapid Cybersecurity Advancement, is a Fellow of the British Computer Society, a Chartered Engineer (CEng) and member of the IET. Martin has a passion for sailing and has represented Great Britain; he is also a keen tennis player.

Download the presentation  "Inspiration from the unexpected"

Stefan Herrlich 
Managing Director, LANCOM Systems GmbH
Stefan Herrlich 
Managing Director, LANCOM Systems GmbH

Stefan Herrlich (born 1962) joined the LANCOM Systems management board in September 2012 as Managing Director of Sales.

Stefan Herrlich began his career in 1988 at Siemens AG in Cologne as a sales engineer for enterprise communication systems for large customers. Since then, he has held various management positions at Siemens AG in Munich and Freiburg and, from 1989 to 2000, also worked in international sales and marketing units in the United States, Hong Kong, China, and London.

From 2001 to 2006, Herrlich managed the global business in telecommunications solutions for business customers in the Enterprise Networks unit at Siemens AG. He worked for Siemens Enterprise Communications, a joint venture of Siemens AG with the Gores Group, from 2006 to 2012. He started off as head of Global Accounts, responsible for business growth with the 150 largest customers worldwide. Three years later as the German managing director, he transformed Direct Sales into a multi-channel organization with ever increasing market shares. Stefan Herrlich has a Master's degree in Telecommunications and Information Processing from the University of Applied Sciences in Cologne.

Download the presentation "Secure. Networks. Network meets Security"

Birte Karalus
Moderation & TV Journalist
Birte Karalus
Moderation & TV Journalist

Birte Karalus will moderate the event. She studied ecomony, German and communication psychology, and has more than 20 years of experience appearing live on television. She has been working in television since 1992 and has moderated various shows on RTL, ProSieben, ARD, DSF and VOX. She’s also no stranger to the stage, having often led the programs of large events hosted by well-known organizations.

no download available

Dr. John W. Kelly
CEO Graphika
Dr. John W. Kelly
CEO Graphika

Dr. John W. Kelly is the founder and CEO of Graphika, a social media analysis firm founded on technology he invented that blends social network analysis, content analysis, and statistics to make complex online networks understandable. Dr. Kelly is also a recognized expert on advanced computational techniques for measuring online behavior. Most recently, he was invited to provide his expert testimony on foreign interference in the U.S. presidential election before the Senate Select Committee on Intelligence. He is also an affiliate at the Berkman-Klein Center for Internet and Society at Harvard University, where he works with leading academics to design and implement empirical studies of the internet’s role in business, culture, and politics around the world. A quantitative social scientist by training, Dr. Kelly earned his Ph.D. in Communications from Columbia University, and has also studied at Stanford and at Oxford’s Internet Institute.

Download the presentation "A Global Tour of Disinformation on Social Media"

Peter Lorenz
Head of Portfolio Unit Digital Solutions, T-Systems International GmbH
Peter Lorenz
Head of Portfolio Unit Digital Solutions, T-Systems International GmbH

Since 1st January 2019, Peter Lorenz leads the Portfolio Unit Digital Solutions within T-Systems International GmbH. The Portfolio Unit Digital Solutions focuses on smart, digital consulting services, scalable solutions & digital project services and consists of 4.800 digitization experts.

Before that, Peter Lorenz acted as SVP of the Global Systems Integration (GSI) within T-Systems. The Global Systems Integration consisted of more than 8.000 employees worldwide improving existing business processes and developing new applications for different platforms. 

Peter Lorenz has more than 25 years of experience in strategy, design, development and corporate IT solutions. He started his career at Siemens Nixdorf and then moved to SAP, where he held various senior and management positions.

Download the presentation "Connecting the Digital Dots - Secure, reliable, compliant"

Manuela Mackert

Chief Compliance Officer (CCO) and Head of the Group Compliance Manageme…

Manuela Mackert

Chief Compliance Officer (CCO) and Head of the Group Compliance Management, Deutsche Telekom AG

As Chief Compliance Officer and Head of Group Compliance Management at Deutsche Telekom AG since 2010, Manuela Mackert has dealt with compliance-relevant topics such as value culture and ethical leadership as well as digital transformation and security in companies. One of her most recent concerns is the promotion of digital ethics in Europe in order to meet the emerging challenges of digitization and played a key role in the development of Telekom's guidelines for dealing with artificial intelligence (AI). Manuela Mackert is a member of the AI Labour and Industry Working Group of the “Partnership on AI” (PAI) consortium and of the AI Task Force of the “Centre for European Policy Studies” (CEPS). She is also a member of BELA, the “Business Ethics Leadership Alliance” of the Ethisphere Institute and a member of the Supervisory Board of the Group subsidiary wT-Systems International GmbH, which is responsible for Deutsche Telekom's wholesale business.

no download available

John Maynard
Vice President, Global Cyber Security Sales, CISCO Systems
John Maynard
Vice President, Global Cyber Security Sales, CISCO Systems

John Maynard is Vice President, Global Security Sales for Cisco. He leads the worldwide sales team dedicated to helping customers solve complex business issues with Cisco security solutions. Maynard is responsible for all aspects of sales, including growth initiatives, acquisitions, operations, and aligning with services and partners. His deep technology and security experience spans over 18 years in Europe, the Middle-East, Africa, the Americas, Asia-Pacific and Japan.

John most recently led security sales at Cisco for EMEAR. Prior to joining Cisco, John had a dual-role at DXC Technology (a merger of Hewlett Packard Enterprise Services and Computer Sciences Corporation) as Chief Operating Officer and VP of Cybersecurity for Product Management. John also held leadership positions at Hewlett Packard for 11+ years, including VP of Cybersecurity throughout EMEAR, Asia-Pacific & Japan and the Americas.

John earned his MBA from the London Business School in conjunction with Columbia Business School, and has a BA in Economics from the University of Sheffield, England.

Download the presentation "Effective Security for the Modern Enterprise"

Dr. Elmar Padilla
Head of Department Cyber Analysis & Defense, Fraunhofer FKIE
Dr. Elmar Padilla
Head of Department Cyber Analysis & Defense, Fraunhofer FKIE

Dr. Elmar Padilla studied computer science at the University of Bonn and graduated in 2005. From 2005 to 2010 Mr. Padilla worked as a scientific assistant at the University of Bonn. Afterwards, he changed to Fraunhofer FKIE. At Fraunhofer FKIE, Mr. Padilla established a team dealing with cybercrime and cyber espionage that finally led to the establishment of the research group Cyber Analysis in 2014 and the department Cyber Analysis & Defense in 2017. In 2012, Mr. Padilla finished his Ph.D. in computer science at the University of Bonn. With his department Mr. Padilla extensively cooperates and advises national and international public bodies including the German KdoCIR, BSI and law enforcement agencies. He is an internationally accepted expert in the field of cybercrime with more than 50 publications on international conferences and journals. Furthermore, he is the scientific representative in German delegations on a regular basis. 

Download the presentation "The Future is Now!"

Lawyer Axel Petri

Senior Vice President Group Security Governance, Deutsche Telekom

Lawyer Axel Petri

Senior Vice President Group Security Governance, Deutsche Telekom

Axel Petri (German qualified lawyer) is Senior Vice President Group Security Governance at Deutsche Telekom AG. As Group Security Coordinator he is responsible for assuring the holistic and groupwide security approach. This contains strategy, regulations and control in all security domains as well as steering the groupwide cooperation of all security departments. He is also in charge for Information Protection and Economic Security as well as Investigations and Prevention. As Security Commissioner he is responsible for the fulfillment of the legal obligations in the field of Public Safety including strategy and steering of Lawful Interception and Data Provision in Germany.

Axel is co-author of the „Rechts-Handbuch zum E-Commerce“ (Legal Compendium on E-Commerce) and author of further publications regarding Internet-/Media Law as well as Security. He is visiting lecturer at the University of Applied Sciences 'Rheinische' Cologne.Axel is Past President of the Advisory Council at ASIS’s CSO Center for Leadership & Development and member of a couple of committees in different associations eg at BDI and BITKOM.

Download the presentation "Cyber Security Regulation and Practise: Hand in hand at different speeds?"

Prof. Dr. Andreas Pinkwart

Minister for Economic Affairs, Innovation, Digitisation and Energy NRW

Prof. Dr. Andreas Pinkwart

Minister for Economic Affairs, Innovation, Digitisation and Energy NRW

Prof. Dr. Andreas Pinkwart has been Minister for Economic Affairs, Innovation, Digitisation and Energy of the State of North Rhine-Westphalia since 30 June 2017. After training as a banker, he studied economics and business administration in Münster and Bonn until 1987, where he received his doctorate in 1991. He then headed the office of the chairman of the FDP parliamentary group before continuing his scientific career with professorships in Düsseldorf and Siegen. In 2002 he became a member of the German Bundestag and state chairman of the FDP in North Rhine-Westphalia. From 2005 to 2010 he was Minister for Innovation, Science, Research and Technology and Deputy Prime Minister of North Rhine-Westphalia. In 2011 he returned to science as Rector of HHL Leipzig Graduate School of Management and Chair of Innovation Management and Entrepreneurship.

no download available

Ehud Schneorson
Former Commander of the Unit 8200, IDF Israel
Ehud Schneorson
Former Commander of the Unit 8200, IDF Israel

Brig. General (Ret) Ehud Schneorson is a 30-year veteran of the Israeli Intelligence community, most recently serving as the commander of the Unit 8200 - the Israel CYBER  and SIGINT National Unit responsible for cyber operations,collecting signal intelligence and code decryption. He has commanded units focused on intelligence gathering, special operations and technology development.
Some of his previous roles include heading the cryptanalyst center of Unit 8200 as well as overseeing the development and deployment of cutting edge cybersecurity, big data and IoT capabilities.
General Schneorson has a MSc in Geophysics and planetary science and a BA in history, both from the Tel Aviv University. He is married to Ruth and the proud father of Itay and Keren.

no download available

Thomas Tschersich
Senior Vice President Internal Security & Cyber Defense, Telekom Securi…
Thomas Tschersich
Senior Vice President Internal Security & Cyber Defense, Telekom Security, T-Systems International GmbH

Since January 2017 Thomas Tschersich is Senior Vice President and Head of Internal Security & Cyber ​​Defense at Telekom Security and is also responsible for the Managed Cyber Defense portfolio of Telekom Security. After graduating in electrical power engineering (FH Dortmund) he worked initially in the design and engineering of IT net-works in the DeTeCSM Inc. From the mid-90s, he moved in the same company in network security, which he built up. From 2001 to 2007 he was head of Security Strategy And Policy. From 2007 to 2009, he built up the Technical Security Services division, following the Group IT Security division. After assuming the lead for Group Security Services in 2014, he served as Chief Security Officer of the Deutsche Telekom Group. Tschersich also serves in numerous advisory roles, including being member of the Cybersecurity Council, the UP Kritis Council and chairman of the BITKOM Security Steering Committee. 

no download available

John van Leeuwen
CISO, Vodafone Germany
John van Leeuwen
CISO, Vodafone Germany

John Van Leeuwenmoved to Vodafone Germany in March 2015. Responsible for Information Security, Cyber Security and Resilience. Before Vodafone, John worked in similar functions for KPN, Getronics, ArcelorMittal and SWIFT (Society for Worldwide Interbank Financial Telecommunications). 

no download available

Dirk Woywod 
CTO, VERIMI GmbH
Dirk Woywod 
CTO, VERIMI GmbH

Dirk Woywod has been Chief Technical Officer (CTO) of Verimi, a cross-industry identity and data service provider, since 2018. Between 2010 and 2018, he headed the Federal Printing Office as Director, VP and SVP. Prior to that, he was COO at betterplace and worked as a project manager for IT platform, restructuring and strategy projects at McKinsey & Company. He completed his doctorate in theoretical physics at the TU Berlin.

Download the presentation "Digital identity: Protecting and determining your own data"

Show all speakers

Agenda for the Cyber Security Tech Summit Europe

Day 1 – 13th March 2019
10:00 a.m.
Opening
Dirk Backofen – Chairman of the Management Board of the Cyber Security Cluster Bonn, Head of Telekom Security
Download the presentation "Welcome Cluster"
10:10 a.m.
Cyber Security Cluster for Europe
Dirk Backofen – Chairman of the Management Board of the Cyber Security Cluster Bonn
no download available
10:25 a.m.
Security digitalization made in Bonn
Ashok Sridharan – Lord Mayor Federal City bonn
no download available
10:30 a.m.
Cyber Security for Europe
Timotheus Höttiges – CEO Deutsche Telekom AG
no download available
10:50 a.m.
Let's power higher performance
11:10 a.m.
Cyber Security? – Digital Sovereignty!
Achim Berg – President BITKOM
no download available
11:30 a.m.
Current cyber security Situation 
12:00 p.m.
Lunch
01:15 p.m.
How we can learn from hackers
Keren Elazari – Cyber security expert and author
no download available
01:45 p.m.
Effective Security
John Maynard – Vice President of the Global Cyber Security, Sales Cisco
Download the presentation "Effective Security for the Modern Enterprise"
 
02:05 p.m.
Al & security al ethics
Dr. Orna Berry – First lady of Isareli High-Tech
Manuela Mackert – Head of Grp. Compliance DTAG
no download available
02:25 p.m.
Breakout/Exhibition/Workshops
Senior Security Specialists – Product-Partner & Telekom Security
no download available
04:00 p.m.
Coffee
04:45 p.m.
Cyber Security, Economy and Politics
Prof. Dr. Andreas Pinkwart – Minister for Economic Affairs, Innovation, Digitisation and Energy NRW
no download available
05:00 p.m.
Effects of digitalization on the armed forces
Ludwig Leinhos – Chief of the German Cyber and Information Domain Service
no download available
05:20 p.m.
Inspiration from the Unexpected
Martin Borrett – CTO, IBM Security Europe
Download the presentation "Inspiration from the unexpected"
 
05:40 p.m.
Europe's largest CDC + SOC
Dirk Backofen – Chairman of the Management Board of the Cyber Security Cluster Bonn
Download the presentation "Europe’s largest CDC & SOC"
06:00 p.m.
Secure. Networks. Network meets Security
Stefan Herrlich – Managing Director, LANCOM Systems GmbH
Download the presentation "Secure. Networks. Network meets Security"
06:20 p.m.
The Future is Now!
Prof. Peter Martini – Institute Director Fraunhofer FKIE
Dr. Elmar Padilla – Researcher Fraunhofer FKIE
Download the presentation "The Future is Now!"
06:40 p.m.
Wrap Up
Dirk Backofen – Chairman of the Management Board of the Cyber Security Cluster Bonn
no download available
07:00 p.m.
Networking
Day 2 – 14th March 2019
09:00 a.m.
Opening & Summary
Dirk Backofen – Chairman of the Management Board of the Cyber Security Cluster Bonn, Head of Telekom Security
no download available​​​​​​​
09:10 a.m.
The challenges in Cyber Security
Ehud Schneorson – Former Commander Unit 8200, IDF Israel
no download available​​​​​​​
09:30 a.m.
Connecting the Digital Dots - Secure, reliable, compliant
09:50 a.m.
Cyber Security Regulation and Practise: Hand in hand at different speeds?
10:10 a.m.
Critical telco infrastructure
John Van Leeuwen – Vodafone
André Beltz – Telefonica
Thomas Tschersich – Telekom Security
no download available​​​​​​​
10:40 a.m.
Coffee
11:10 a.m.
Breakout/Exhibition/Workshops
Senior Security Specialists – Product-Partner
no download available​​​​​​​
12:40 p.m.
A Global Tour of Disinformation on Social Media
01:00 p.m.
Cloud is a Security imperative
Roger Halbheer – Chief Security Advisor Microsoft
Download the presentation "Cloud is a Security imperative"
01:20 p.m.
Digital identity: Protecting and determining your own data
01:40 p.m.
Wrap Up & Outlook 2020
Dirk Backofen – Chairman of the Management Board of the Cyber Security Cluster Bonn, Head of Telekom Security
no download available​​​​​​​
02:00 p.m.
Coffee

Breakout Speakers

Dr. Tolga Arul
Postdoctoral research associate, Technische Universität Darmstadt
Dr. Tolga Arul
Postdoctoral research associate, Technische Universität Darmstadt

Dr. Tolga Arul has been a postdoctoral researcher in the Security Engineering Group at Technische Universität Darmstadt since 2017.  

His current research interests include trusted computing and embedded systems security in their applications in critical infrastructures, industrial control systems and IoT. Previously, he worked as a research associate in the Integrated Circuits and Systems lab and at the Center for Advanced Security Research Darmstadt (CASED). There he investigated topics related to hardware and network security as well as the security of cyber-physical systems.

Breakout-Session:
Industrie 4.0 for SME’s – a challenge for IT Security Experts

The industrial sector is still of great importance for Germany’s economy. Germany’s industry is now called upon to get ready for the digital age, taking into account cyber security risks. This challenges especially small and medium enterprises as well as IT-Security experts who support these companies. So far, the special IT security requirements of SME’s could not be met; they often lack the expert knowledge or the required resources in regard of the selection and implementation of IT security solutions. In their presentation, Goodarz Mahbobi, CEO of the IT and management consultancy axxessio GmbH, and Dr. Tolga Arul, security expert at Darmstadt Technical University, will shed light on the subject of IT security from the perspective of medium-sized industrial companies. In this context, they will also present the research activities of SME, IT-security consultants and research institutes on this issue as well as experiences from first Industrie 4.0 projects in Hesse, Germany and China.

Download the presentation "Industrie 4.0 for smes – A challenge for IT Security experts"

Boris Bannasch
Principal Consultant Unified Communications and SBC, T-Systems Multimedia S…
Boris Bannasch
Principal Consultant Unified Communications and SBC, T-Systems Multimedia Solutions

Boris Bannasch has been working in the IT and telecommunications industry for many years. Since 2014 he has been employed as a consultant at T-Systems Multimedia Solution GmbH. Since then, he has been supporting many companies from industry and medium-sized businesses in the conception and implementation of Unified Communications and All-IP projects. As technical lead, he is also responsible for the development of a Unified Communications Cloud platform for T-Systems.

Breakout-Session:
Managed Cloud SBC (Session Border Controller) - the new operating model for Enterprise SIP Security

Presentation of a new cloud approach for SBC operations, from Enterprise-/Platform-SBC (integration of Corporate SIP-Germany / International, as well as all other SIP Trunks of the different providers) to On-Premises SBC at the customer's, but operated by T-Systems. Core statement: In addition to the routing instance, an SBC is also the firewall of the communication architectures. SBC management is a professional matter and we have the expertise as well as the platforms and processes for the operation.

Download the presentation "Managed Cloud SBC: The new operating model for Enterprise SIP Security"

Maximilian Beckmann
Cyber Security Consultant, Telekom Security, T-Systems International GmbH
Maximilian Beckmann
Cyber Security Consultant, Telekom Security, T-Systems International GmbH

Curious Cyber Security Consultant from Greater Frankfurt a. Main. The focus of interest is cryptography and business models in the field of automotive and IoT security.

Breakout-Session:
IoT Security –  Secure digital Identity, enable Business Cases for IoT

The number of endpoints in IoT infrastructures will explode in the next few years, demanding simple, automated solutions and ideas that go beyond the purely technical point of view. In addition to safety and technology requirements, only the costs are usually recognized as a decision criterion. It is often overlooked that a far-sighted use of digital identities in the IoT context can be a good investment in one's own business.

Before discussing business aspects, the breakout session will show how the rollout of IoT identities works with the help of automated services. As an IoT device, we use a reasonably priced standard component, which you can order as a mass-produced item by mail order. A common problem is the lack of trust in hardware components from overseas. We show you a solution.

Download the presentation "IoT Security –  Secure digital Identity, enable Business Cases for IoT"

Helmut Deuter 
Speciality Sales, IBM Security
Helmut Deuter 
Speciality Sales, IBM Security

Helmut Deuter started his career over 20 years ago at the system integrator Claas, where he learned IT Security from scratch. After that he worked successfully as Manager Channel Sales for companies such as ncipher, RSA, Safenet and Imperva. In 2017 he joined IBM Resilient to build up the partner network in Europe.

Breakout-Session:
Fast, laser-focused incident response with intelligent orchestration

Empower your security team to outsmart, outpace and outmaneuver complex cyberattacks with the Resilient Incident Response Platform.
Help battle complex threats with the Resilient Incident Response Platform (IRP). The Resilient IRP enables your security team to integrate its security technologies and create powerful, agile workflows that can automate the response process. As a result, your analysts have the tools they need to investigate and resolve security incidents, and can continually refine their processes over time.

Download the presentation "Fast, laser-focused incident response with intelligent orchestration"

Ulrich ten Eikelder
Head of Security Risk Management and Awareness bei der Telekom Security, T-…
Ulrich ten Eikelder
Head of Security Risk Management and Awareness bei der Telekom Security, T-Systems International GmbH

Ulrich ten Eikelder has been in charge of Security Risk Management and Security Awareness for T-Systems and Telekom Deutschland since 2016. He began his career at Telekom in 1987 as a graduate engineer for general electrical engineering. In addition to various management positions, including communication and public relations, he has been working in security since 2001, where he was responsible for various specialist areas. At the same time, Ulrich ten Eikelder is a member of the advisory board and lecturer at Ingolstadt Technical University and was active as the provisional managing director of the Federal Association for Security in Business.

Breakout-Session:
Seduced by your boss - Attack vector AI

Advancing computing technology and artificial intelligence enable new threat formats, such as fake voice. What is already possible? What will come? What can we do about it? And where is the humanity? Essential questions that we will answer together with you!

Download the presentation "Seduced by your Boss – Attack vector AI"

Prof. Dr.-Ing.Ingo Elsen
Professor, FH Aachen University of Applied Sciences
Prof. Dr.-Ing.Ingo Elsen
Professor, FH Aachen University of Applied Sciences

Ingo is Professor for Big Data Analytics at FH Aachen University of Applied Sciences. He researches and lectures in the field of Big Data Processing and Data Science with a focus on Artificial Neural Networks. Formerly, he built up the Big Data and AI topic for the Digital Solutions Unit of T-Systems.

During his earlier carrer he developed and researched in the fields of parallel computers for vision, artifical neural networks and neurocomputing hardware.

Download the presentation "What Can and Can`t AI Do? Applications of AI and its`limits"

Sergej Epp
Chief Security Officer (CSO) for Central Europe, Palo Alto Networks
Sergej Epp
Chief Security Officer (CSO) for Central Europe, Palo Alto Networks

Sergej Epp is Chief Security Officer for Central Europe at Palo Alto Networks, where he develops regional cybersecurity strategy and is overseeing cybersecurity operations and threat intelligence across the region. Prior to this role, he implemented and led multiple cyber security operations groups in the financial industry sector. His functional specialities include cyber defence operations, cyber risk management and transformation management.

Breakout-Session:
AI. Ready? Go!

Artificial intelligence (AI) and machine learning is praised by many cyber security experts as the miracle weapon of the future. This should give companies a better chance to protect themselves against the growing threat situation. But where can AI really help and what challenges do companies have to face before they can use it? In his presentation, Sergej Epp first reflects on how the attacker side has increasingly made use of automation measures and what trends can be expected in the future. He then discusses practical recommendations on how companies can prepare a) to improve their security today and b) to benefit from AI in the future.

Download the presentation "AI. Ready? Go!"

Dr. Christian Gayda
Portfolio Cluster Head Mobile & Endpoint Security, T-Systems Internatio…
Dr. Christian Gayda
Portfolio Cluster Head Mobile & Endpoint Security, T-Systems International GmbH

 

Dr. Christian Gayda is Portfolio Cluster Head for Mobile and Endpoint Security at T-Systems and is responsible for the B2B security portfolio. He has over 32 years experience in telecommunications with extensive technical knowledge in Product Management. Since 2017 he leads Mobile and Endpoint Security Cluster at T-Systems.  In his previous roles he worked as the Head of Product Management Policy Control at Siemens & Nokia Siemens Networks & Head of Product System Management where he was responsible for the product strategy of the business line as well as for the worldwide Regional Product Management of Next Generation Voice & Multimedia. During his career Dr. Gayda held a number of senior positions at Siemens AG, focused on Product Line Management. Prior to joining Siemens AG, Dr. Gayda led the Product Management for the ISP FirstMark Communications, and also worked for France Telecom as a Product Manager.

Dr. Gayda graduated from the Technical University Berlin in 1986 with a degree in Computer Science. He received his PhD in 1992 in Multimedia Documents based on IP and ATM networks.

Breakout-Session:
SEPmobile – Endpoint as part of Zero Trust

Zero Trust Devices. Every endpoint device needs protection in a connected world. Your environment—everything you must defend against attack—extends to every device that touches your ecosystem. That includes both managed and unmanaged endpoints: mobile devices, tablets, and the like.

no download available

Arnd Gille
Head of Cyber Security Consulting, Cisco Germany
Arnd Gille
Head of Cyber Security Consulting, Cisco Germany

Arnd Gille brings more than 20 years of industry experience in Service Provider and Enterprise IT. Since joining Cisco in 2007, he has been leading various technical sales and systems engineering teams across all segments and technologies. In his current role he is heading the cyber security consulting team in Germany, while actively driving the security strategy for Cisco Germany.

Arnd Gille holds a master’s degree in business administration and electronic engineering from Technical University of Darmstadt.

Breakout-Session:
Deutsche Telekom and Cisco Create the Strongest Force Against Cyber Threats

Deutsche Telekom’s cyber security service portfolio provides superior protection from cyber-attacks. Cisco complements this through an integrated cyber security architecture and the world’s most comprehensive threat intelligence. Together, we form a unique combination to protect our customers in all segments and industries.

Download the presentation "Deutsche Telekom and Cisco Create the Strongest Force Against Cyber Threats"

Marco Gioanola 
Senior CE, Cloud Services Architect, NETSCOUT
Marco Gioanola 
Senior CE, Cloud Services Architect, NETSCOUT

Marco Gioanola is a Services Architect and Senior Consulting Engineer at NETSCOUT. He joined Arbor in 2006 and worked with Service Provider and Enterprise customers across Europe and the Middle East. Since 2016 he is part of the Arbor Cloud team supporting customers and partners in the EMEA and APAC territories. Previously to joining Arbor, he was a manager in a company providing Managed Security Services, and earlier to that he mostly worked on the topics of cryptography and certificate authorities.

Breakout-Session:
DDoS attacks, the Terabit era and beyond

DDoS attacks exceeding 1 Terabit are real now. What three years ago looked like incredibly large attacks are now the new normal. How did we get here? Is it only about size, though, or is there something else behind DDoS attacks? NETSCOUT presents the latest local and global DDoS statistics from Arbor ATLAS platform, the latest threat intelligence from Arbor ASERT team, and we can do about it.

Download the presentation "DDoS attacks, the Terabit era and beyond"

Tom Haak
Head of Sales & Marketing Cybertrap Software GmbH
Tom Haak
Head of Sales & Marketing Cybertrap Software GmbH

For over 31 years of his career Tom Haak gathered in depth experience in Networking, Security and the Information Technology industry. He successfully worked and contributed continued growth as Entrepreneur, Investor, Executive and Managing Director for companies like 3Com, Cisco Systems, Compaq, Inktomi, Fortinet, Aruba Networks, F5 Networks and One Identity. At CyberTrap Tom is part of the Management team and responsible as Head of Sales & Marketing for the development of the global Sales organization.

Breakout-Session:
CyberTrap & IoT Inspector - eliminating the blind spots in cyber security

With our custom tailored, highly advanced European “Deception Technology” we take control of attacks. Our goal is to always be ahead of the attacker to learn and improve. CyberTrap understands the struggle of attack prevention and created significant relief by offering a revolutionary technology that not only helps to detect attacks quickly and safely in real-time without requiring anomalies or signatures, but also to take control and lure the attackers into a Decoy environment. Using advanced forensics based on the clean data gathered on our Decoys, we want to learn their methods and goals to always be one step ahead. 90% of IoT devices base their firmware on Linux or Unix. In addition, these devices are almost always on and online, but rarely monitored and hardly maintained. Thus, they are products with questionable security standard because only very rarely - for cost reasons - for these IoT device security audits carried out. Here, the IoT Inspector provides the necessary scalability and automation of IoT security audits. Based on some concrete examples we show successes in the vulnerability detection based on the findings of the IoT Inspector.

Download the presentation "CyberTrap & IoT Inspector - eliminating the blind spots in cyber security"

Manuel Hähr
Senior Systems Engineer, F5 Networks Inc.
Manuel Hähr
Senior Systems Engineer, F5 Networks Inc.

After completing his training as a Data Processing Specialist, Manuel Hähr started his career at an Internet Provider where he learned Internet Technologies from scratch. After a very short time, he focused on the various aspects of IT-Security. For more than 20 years now, he has been advising clients as a Security Consultant on a wide range of Security topics. At F5, Manuel Hähr has focused on Security and Protection against DDoS-Attacks for the last seven years.

Breakout-Session:
Smart Defense: Learn how to use intelligent mitigation techniques against todays application DDoS attacks.

Manuel Hähr, Senior Systems Engineer at F5 demonstrates how to easily use behavior based approaches to effectively protect application from L7 DDoS attacks.

Download the presentation "Smart Defense: Learn how to use intelligent mitigation techniques against today's application DDOS Attacks"

Peter Häufel 
Channel Account Director, Exabeam
Peter Häufel 
Channel Account Director, Exabeam

Peter Häufel started his career as a scientist in Military research for pattern recognition. Later he moved to a systems integrator focused on IBM mainframe as a consultant for network and security. In October 2000 he joined Internet Security Systems, a pioneer in vulnerability management, intrusion detection and prevention as Channel and Account Manager. Through the acquisition Peter entered IBM as Channel Manager for Security and was an IBM spokesperson for Security. Since January 2018 he is now the Channel Account Director at Exabeam responsible for building up the partner network in Central, Eastern and Southern Europe.

Breakout-Session:
SIEM Modernization – The Smarter Way

Exabeam is delivering a Smarter SIEM, a modern way for your Threat Management. A technology that is trying to find attacks based on static rules can no longer catch up with modern hacking techniques and the increasing number of attacks. Even if an alarm is firing it takes hours to collect all information for taking the right decision.

Exabeam is the Smarter SIEM™ which is relying on modern technologies like Big Data, Data Science and Machine Learning to solve this problem. Exabeam is learning normal activities of users and devices and raise the risk level in case it is detection wired behavior. A SOC Analyst can click on the risk level to get a complete Smart Timeline™ with all information needed to take decision within minutes compared to hours. This boosts the efficiency of your SOC team to an unknown level and is the SOC Analyst’s Dream, as stated by a customer. The Exabeam suite can be used as augmentation for our existing SIEM / Log Management or can replace it completely. During the presentation we will guide you through the advantages of a modern SIEM solution and will open up the view on a live demo. You will learn how your SOC analyst’s dream will come true and how you can save operational costs massively.

Download the presentation "SIEM Modernization – The Smarter Way"

Prof. Dr. Dirk Helbing
Professor, ETH Zürich
Prof. Dr. Dirk Helbing
Professor, ETH Zürich

Dirk Helbing is Professor of Computational Social Science at the Department of Humanities, Social and Political Sciences and affiliate of the Computer Science Department at ETH Zurich. He studied physics and mathematics at the University of Göttingen and wrote his doctoral thesis at Stuttgart University on modeling social processes by means of game-theoretical approaches, stochastic methods, and complex systems theory. In 1996, he completed further studies on traffic dynamics and optimization. In 2000, he became a full professor and Managing Director of the Institute for Transport and Economics at Dresden University of Technology. Helbing is elected member of the German Academy of Sciences Leopoldina and of the World Academy of Art and Science. In January 2014 he received an honorary PhD from Delft University of Technology (TU Delft). Since June 2015 he is affiliate professor at the faculty of Technology, Policy and Management at TU Delft, where he leads the PhD school "Engineering Social Technologies for a Responsible Digital Future".

no download available

Eugen Hinz
Security Engineer, Check Point Software Technologies GmbH
Eugen Hinz
Security Engineer, Check Point Software Technologies GmbH

Eugen joined Check Point Software Technologies GmbH as a security engineer in January 2019 and specializes in solving complexities associated with increasing connectivity and inadequate security.

Breakout-Session:
Cloud Innovation - CloudGuard Dome9 - Transparency, Automation of Security and Compliance

An agentless SaaS solution that enables you to quickly enforce security and compliance policies in the public cloud. Dome9 offers visualization of security measures, tools for automating compliance and governance processes, protection of privileged user accounts (e.g. administrators), and analysis of cloud traffic and deviations. Dome9 is an integral part of a consolidated cyber security architecture.

Download the presentation "Cloud Innovation - CloudGuard Dome9 "

Nathan Howe
Principal ZPA architect, Zscaler
Nathan Howe
Principal ZPA architect, Zscaler

Nathan has served as the Zscaler Private Access architect and specialist across EMEA since early 2017. Nathan joined Zscaler to drive and deliver a focussed approach to the Software Defined Perimeter paradigm that is challenging the industry. Originally from Sydney, Australia, Nathan brings close to 20 years of security experience across a multitude of organisation including governments to enterprises. 

Breakout-Session:
The internet is the only network you will ever need

In an ever more app focused world, why spend time linking risks-to-risks and even to attack vectors by building out networks. The Internet connects us all, so why not leverage that network to provide the access that we need. In this session, Nathan will cover the challenges traditional networks & their ways of thinking bring, along with how Zscaler wants to attack these challenges and provide you with the the perimeter on an environment that you do not trust. 

Download the presentation "The internet is the only network you will ever need"

Dr. Philip Huisgen
Managing Director, Datakom 
Dr. Philip Huisgen
Managing Director, Datakom 

Dr. Philip Huisgen, 51, has worked for 25 years as a management consultant at major consultancies such as KPMG, Accenture and Capgemini. His main focus has always been the development of organizations in IT. He dedicated his doctoral studies to organizational sociology in companies with a special focus on the impact aspects of organizational crises. Today he is Managing Director of Datakom GmbH, a consulting and integration partner that has specialised in the introduction of IT security processes and solutions in companies since 1986.

Breakout-Session:
IT security is a process. How does it establish itself in the company?

Attacks on IT must set processes in companies in motion. All too often, however, one looks at tools. These are bought and implemented. And then what? What happens when current attacks are detected or even when successful attacks are detected in the past? How can processes be defined and anchored in the organization in a structured way? IT security as a process is a paradigm shift for companies because it pierces the structures and processes established in the company. And this is why companies often find it so difficult to anchor IT security in IT. And they are looking for tools. But if they are to help successfully, they must support the process. Completely and from start to finish, preferably self-learning and automated.

Download the presentation "IT security is a process. How does it establish itself in the company?"

Conrad Inderst 
Cyber Security Engineer, T-Systems International GmbH
Conrad Inderst 
Cyber Security Engineer, T-Systems International GmbH

Conrad Inderst is a Cyber Security Engineer at Telekom Security's Cyber Defense Center. Among other things, he is responsible for the operation and further development of Database Activity Monitoring for monitoring critical Telekom databases. He is also responsible for various customer projects in the areas of cyber defense, security operation and security management. As a CISSP and certified ISO 27001 Lead Auditor, he has in-depth expertise in both technical and procedural security topics.

Breakout-Session:
Database Security – Monitor your data directly at the source

Today, one of the high value assets in companies is data. Systems with large databases, which mainly contain customer data or other sensitive data, are a popular target for attackers. It is necessary to identify, evaluate and monitor related threats to detect and defend attacks to protect the data. With database activity monitoring and database firewalls, companies can handle threats on data directly at the source.   

Imperva SecureSphere offers a solution to identify sensitive data, monitor database user activities of administrative or high privileged accounts and alert in real-time suspicious behavior or other security violations. With a database independent monitoring concept, Imperva SecureSphere provides a broad range of coverage from traditional relational databases to big data platforms as well. In this break-out session we will introduce you to database security and give you a first impression during a live demo. 

Download the presentation "Database Security – Monitor your data directly at the source"

Jens Kamionka

Head of Big Data & Data Analytics, T-Systems Multimedia Solutio…

Jens Kamionka

Head of Big Data & Data Analytics, T-Systems Multimedia Solutions GmbH 

Jens Kamionka has been working at T-Systems Multimedia Solutions GmbH since 2008. During this time he has been involved in the strategic development of new focus topics and the development of new markets. In 2016, he took over the management of the Big Data and Data Analytics division and since then has supported a large number of companies from industry and medium-sized businesses in the strategic implementation of digital transformation.

no download available

M.A. Reinhard Karger
Corporate Spokesperson, Deutsches Forschungszentrum für Künstliche Int…
M.A. Reinhard Karger
Corporate Spokesperson, Deutsches Forschungszentrum für Künstliche Intelligenz GmbH (DFKI)

Reinhard Karger (1961), M.A., studied theoretical linguistics and philosophy in Wuppertal. He worked for the Chair of Computational Linguistics at Saarland University, moved to the German Research Center for Artificial Intelligence, DFKI, in Saarbrücken in 1993. Reinhard Karger has been the head of corporate communications since 2000, and has been DFKI's company spokesperson since 2011.

Reinhard Karger is a member of the jury of the "Landmarks" competition of "Germany - Land of Ideas”. He was the President of the German Association of Information and Knowledge (DGI) from May 2014 to June 2017, and has been a STEM Ambassador of Saarland since February 2017. In March 2018 he was appointed as a Fellow of the Competence Centre for Cultural and Creative Industries of the Federal Republic of Germany.

no download available

Ingo Kruckewitt
CTO EMEA, Symantec
Ingo Kruckewitt
CTO EMEA, Symantec

With now 30 years of experience in the IT industry Ingo Kruckewitt took over the role of a global service provider architect at Symantec. After high school and studies at TU Darmstadt covering electrical and communications engineering his way led over relational database applications, server- and network technology, industrial automation and robot operation systems to product development of B2B projects for customers of the Deutsche Telekom at P&I in Darmstadt, where he worked the last 8 years in Business Services/ Security Services before moving to his actual position.

The knowledge about the increasing importance of cybersecurity for the success of modern industries led him from development of P&I security solutions to work for one of the largest IT security providers on the planet. Ingo Kruckewitt supports global acting service providers with the  selection and realization of security solutions for their customers. Target hereby is to provide innovative and powerful solutions to customers, that allow all users to profit from the most up to date cybersecurity solutions in a comfortable way, independent of the size of the customer. An indispensable part is the offering of managed services through the service providers.

Breakout-Session 1:
Zero Trust

Zero Trust and Symantec. Security built on one simple premise: Trust no one. One integrated platform to achieve Zero Trust: Integrated Cyber Defense. Coined by Forrester Research, the Zero Trust model is built on the reality that threats are everywhere, both inside and outside your organization. A multi-layered approach to prevention, detection and response is vital, and Symantec's Integrated Cyber Defense (ICD) platform is leading the way.

Download the presentation "Zero Trust"

Breakout-Session 2:
SEPmobile – Endpoint as part of Zero Trust

Zero Trust Devices. Every endpoint device needs protection in a connected world. Your environment—everything you must defend against attack—extends to every device that touches your ecosystem. That includes both managed and unmanaged endpoints: mobile devices, tablets, and the like.

no download available

Mirko Kurten
Strategic Sales Manager Infinity Europe, Check Point Software Technologies …
Mirko Kurten
Strategic Sales Manager Infinity Europe, Check Point Software Technologies GmbH 

Mirko has been with Check Point Software Technologies GmbH for 8 years and specializes in solving complexities related to increasing connectivity and inadequate security.  Mirko brings extensive international security and IT consolidation experience to a variety of global companies.

Breakout-Session:
Check Point Infinity - the first fully consolidated cyber security architecture

Check Point Infinity is the fully consolidated cyber security architecture that provides unprecedented protection against large-scale, 5th-generation cyber attacks and future threats in networks, on endpoints, in the cloud, and on mobile devices. The architecture is modular and offers customers a flexible entry point.

Download the presentation "Check Point Infinity"

Dr. Sven Lachmund
Expert in ICT Security, Deutsche Telekom AG
Dr. Sven Lachmund
Expert in ICT Security, Deutsche Telekom AG

In the last almost twenty years, Sven Lachmund gained broad and deep expertise in the area of ICT security, focusing on network security. During his studies, he already specialised on ICT security. All his professional career is dedicated to this area. After he graduated in computer science, he worked for Technical University of Munich and the industrial research lab of the Japanese mobile network operator NTT docomo. In 2011, he joined Deutsche Telekom Group. His major tasks at Deutsche Telekom are security of newly introduced components and technologies on the mobile network and international standardisation of security for the mobile network.

Breakout-Session:
5G-Network-Security

While tech media are abuzz with 5G features like low latency, high throughput, massive IoT etc., very little is published about new security aspects of a 5G network. Vendors, operators, and other stakeholders have been developing 5G security for about five years within various fora. This talk will give an impression of Deutsche Telekom's commitment to the ongoing 5G security work.

Download the presentation "5G-Network-Security"

Sascha Lambert
Business Owner Artificial Intelligence (Digital Hub Robotics & AI) …
Sascha Lambert
Business Owner Artificial Intelligence (Digital Hub Robotics & AI) Deutsche Telekom IT GmbH

Married, two children. Completed studies in computer science with specialization in Artificial Intelligence and Data Bases (Dipl. Inf.). Since 2010 employed at Deutsche Telekom AG (Telekom IT). Consistently active in different roles and responsibilities. Certified project manager according to IPMA and Lean Six Sigma Green Belt. Since beginning of 2017 engaged in the topic Artificial Intelligence within Deutsche Telekom. One of the co-founders and co-lead of the company-wide Artificial Intelligence Community, with the purpose to facilitate an interdisciplinary and general exchange about Artificial Intelligence. Since November 2018 in the role Business Owner Artificial Intelligence in the Digital Hub Robotics & AI (SAFe).

no download available

Andreas Lang
Expert Cyber Security T-Systems Multimedia Solutions GmbH
Andreas Lang
Expert Cyber Security T-Systems Multimedia Solutions GmbH

Dr. Andreas Lang has been working in the field of IT and cyber security for over 25 years. At T-Systems Multimedia Solutions, Mr. Lang has been active for over 10 years in the roles of IT security auditor, IT security officer and trainer for a large number of customers both nationally and internationally. Mr. Lang completed his doctorate in 2008 at the Otto-von-Guericke University in Magdeburg in the field of multimedia and IT security, where he dealt with digital watermarks in audio signals.

Breakout-Session:
Seduced by your Boss – Attack vector AI

Advancing computing technology and artificial intelligence enable new threat formats, such as fake voice. What is already possible? What will come? What can we do about it? And where is the humanity? Essential questions that we will answer together with you!

Download the presentation "Seduced by your Boss – Attack vector AI"

Dr. Kim Larsen

Chief Technical & Information Officer

Dr. Kim Larsen

Chief Technical & Information Officer

Kim K. Larsen has more than 18 years of experience in the telecommunication industry, with national, as well as international senior management roles. He is the CTIO in T-Mobile Netherlands. Previously he worked as CTIO in Magyar Telekom, Hungary’s market leading telco operator as well as starting up Ooredoo Myanmar in 2013 after winning one of two new telecom licenses for best network vision. He has worked for Deutsche Telekom as Senior Vice President of Technology Economics, Transformation, Architecture and Innovation reporting directly to the Deutsche Telekom’s Group CTO. He holds a Ph.D. degree in Physics and a master degree in Physics & Mathematics. 

Among many things, Kim has been developing a blue print for Deutsche Telekom’s Network-centric big data architecture supporting all network needs including the diverse use cases & requirements in a modern telecommunications network. He is driving various applied machine learning initiatives, aggressive network automation and how to get more data science competences into the telecom industry. He actively contributes to the debate on the economical framework of 5G for mass markets, the rightful expectations to its potential and last but not least the economic impact on the telecom industry. 

no download available

Dr. Janina Loh
University Assistant (PostDoc), University of Vienna
Dr. Janina Loh
University Assistant (PostDoc), University of Vienna

Dr. Janina Loh (née Sombetzki) is university assistant (Post-Doc) in the field of philosophy of technology and media at the University of Vienna. She studied at the Humboldt University Berlin and wrote her dissertation (2009-2013) on the issue of responsibility – Verantwortung als Begriff, Fähigkeit, Aufgabe. Eine Drei-Ebenen-Analyse (Springer 2014) as a fellow at the graduate school Verfassung jenseits des Staates, supervised by Prof. Volker Gerhardt and Prof. Rahel Jaeggi. After a post-doc position at the Christian-Albrechts-University Kiel (2013-2016), Janina Loh is now (since April 2016) in Vienna. She just published the first German Introduction to Trans- and Posthumanism (Junius 2018) and currently writes an Introduction to Robot Ethics (Suhrkamp 2019). She habilitates on the Posthumanist Elements in Hannah Arendt's Thinking and Work (working title). Janina Loh's main research interests lie in the field of trans- and posthumanism, responsibility research, Hannah Arendt, feminist philosophy of technology, ethics in the sciences, and robot ethics.

no download available

Prof. Dr. iur. Melinda Lohmann
Assistant Professor of Business Law with special emphasis on Information La…
Prof. Dr. iur. Melinda Lohmann
Assistant Professor of Business Law with special emphasis on Information Law / Director of the Research Center for Information Law, University of St. Gallen

Prof. Dr. iur. Melinda F. Lohmann is an Assistant Professor of Business Law with special emphasis on Information Law at the University of St. Gallen and Director of the Research Center for Information Law. In her research she deals with legal questions concerning robotics, selfdriving cars and Artificial Intelligence (AI).

Download the presentation "Framework: Should AI be Controlled and How?"

Lisa Lübke
Program Manager Cyber Security Professional (IHK) and Specialist for Profes…
Lisa Lübke
Program Manager Cyber Security Professional (IHK) and Specialist for Professional Development, Telekom Security, T-Systems International GmbH

Lisa Lübke holds a diploma in education, has studied pedagogy, sociology and psychology and has many years of experience in organizational and personnel development in various organizations and companies. She has been with Deutsche Telekom since 1996 and is responsible for concepts and projects in the area of personnel and organizational development as well as continuing education. These include the project "Entrepreneurial Thinking and Acting" in the former Networks Technology Division. During a long stay abroad from 2004 to 2012 in France and Brazil, she gained experience in international and intercultural contexts and projects. 

On behalf of and together with Thomas Tschersich and Rüdiger Peusquens, Lisa developed a unique training concept to counteract the shortage of IT security specialists. Piloted in 2014, the 6th class will already start in 2019. Since 2018, employees of other companies and organizations have also been able to participate in the program. Lisa Lübke represents the company at various events (e.g. MINT Congress, CyberSecurityTag) and participates in working groups of various organizations (e.g. Bitkom), e.g. to derive recommendations for action for the German economy.  

Breakout-Session:
Women in Cyber Security – Standard not exception! Strategies against shortage of specialists

The development program "Cyber Security Professional (IHK)" is a measure against the shortage of specialists and an ideal introduction for motivated people to the exciting and challenging field of IT security. The hybrid concept "Cyber Security Professional (IHK)" is supported by the Group Management Board and is also attracting a great deal of attention outside the Group. In 2016, it was awarded the DIHK Education Prize by the Association of German Chambers of Industry and Commerce as a finalist. We show how it is structured, which requirements lead to participation and what you can do with it. We will also discuss approaches to motivating more young women to work in IT security and will present two role models.

no download available

Goodarz Mahbobi
CEO IT- and management consultancy, axxessio GmbH
Goodarz Mahbobi
CEO IT- and management consultancy, axxessio GmbH

Dipl.-Ing. Goodarz Mahbobi is CEO of the IT- and management consultancy axxessio GmbH and Deputy Chairman of the Cyber Security Cluster Bonn e.V.

Goodarz Mahbobi started his career by studying computer science at the Technical University of Vienna in Austria and at UC Berkeley in the USA. Afterwards he was active for the Generali Group Austria and the UNIQA Group Austria in Vienna and led major projects with up to 150 employees as independent consultant. Due to many years of experience as an operational IT-architect, strategic consultant and as a project and program manager, he has an extensive know-how especially in the areas of telecommunications, logistics and change management. In 2006, he founded the consultancy axxessio GmbH with offices in Bonn and Darmstadt. The company is specialized in the conception and implementation of large IT systems, digital transformation processes as well as in the field of voice recognition.

In 2016, he started the initiative “Digital Bonn” together with the Lord Mayor of Bonn which lay the foundation for the Cyber Security Cluster Bonn. Furthermore, he is board member of IT FOR WORK, a leading IT-Cluster in Germany.

Breakout-Session:
Industrie 4.0 for SME’s – a challenge for IT Security Experts

The industrial sector is still of great importance for Germany’s economy. Germany’s industry is now called upon to get ready for the digital age, taking into account cyber security risks. This challenges especially small and medium enterprises as well as IT-Security experts who support these companies. So far, the special IT security requirements of SME’s could not be met; they often lack the expert knowledge or the required resources in regard of the selection and implementation of IT security solutions. In their presentation, Goodarz Mahbobi, CEO of the IT and management consultancy axxessio GmbH, and Dr. Tolga Arul, security expert at Darmstadt Technical University, will shed light on the subject of IT security from the perspective of medium-sized industrial companies. In this context, they will also present the research activities of SME, IT-security consultants and research institutes on this issue as well as experiences from first Industrie 4.0 projects in Hesse, Germany and China.

Download the presentation "Industrie 4.0 for smes – A challenge for IT Security experts"

Ramak Molavi 
Advisor Legal Affairs, iRights.Lab
Ramak Molavi 
Advisor Legal Affairs, iRights.Lab

Ramak Molavi is Advisor Legal Affairs at iRights Lab and Innovation Law Expert (The Law Technologist). As Head of Legal & Regulatory Affairs, she is also part of the management team of GameDuell, a game developer and publisher based in Berlin. 

She is speaker and lecturer. Her topics cover Digital Rights, Artificial Intelligence, Distributed Ledger Technologies, Privacy, Robotics, AR/VR, Platform & Innovation Regulation.

iRights.Lab is an independent think tank that develops strategies and practical solutions for positively shaping the changes in the digital world. We support public institutions, foundations, enterprises, research performing institutions and policy makers to master the challenges of digitalization and to make the most of its many-layered potential. We bring in legal, technical, economic and socio-political expertise to bear on this work.

no download available

Stijn Paumen
VP Sales & BD at Wandera
Stijn Paumen
VP Sales & BD at Wandera

Stijn Paumen, VP Sales & BD at Wandera. Stijn is responsible for Wandera sales in EMEA and APAC as well as global strategic partnerships. He has 15 years of experience in Cloud Security. He holds an MBD from INSEAD and MSc from Oxford University.

Breakout-Session:
Device centric security strategies for the modern workplace

Mobile devices now generate more corporate traffic than a traditional laptop or PC. However traditional security investments such as SWG and EPP don't pay off in this world as devices connect from anywhere at any time. Many enterprises are looking to unify their mobile and traditional devices under one Unified Endpoint Management (UEM strategy). This is the perfect opportunity to rethink your workspace security strategy and benefit from device-centric technologies such as MTD, and Mobile SWG that are better suited to mobile deployment models.

Download the presentation "Device centric security strategies for the modern workplace"

Dr. Rüdiger Peusquens
Head Cyber Defense Response, T-Systems 
Dr. Rüdiger Peusquens
Head Cyber Defense Response, T-Systems 

Dr. Rüdiger Peusquens heads the Cyber Defense Response division of Telekom Security. After completing his doctorate in nuclear physics, Mr. Peusquens began his career as an IT security consultant at Debis Systemhaus. During this time, he built a vulnerability reporting service and conducted White Hat hacking on behalf of customers as part of penetration tests.

With the takeover of Debis Systemhaus by T-Systems, Mr. Peusquens moved to Deutsche Telekom AG, and after six years of consulting work he used the opportunity to bring his experience into corporate security with Deutsche Telekom group. He was responsible for the development of the internal pentesting team for quality assurance of technical security. 

2014 Mr. Peusquens switched to detection and defense of attacks. His current responsibilities combine the reactive forces of cyber security and situation management with the focus on identifying security incidents at Deutsche Telekom AG and its customers at an early stage and combating them quickly.

Breakout-Session:
Professional handling of cyber attacks

We are all going more and more into digitalization. But how do we deal with the risk of possible attacks? Anyone can be affected! Dr. Alexander Schinner and Dr. Rüdiger Peusquens will interactively present how attackers penetrate step by step and what the defenders contain. The result is an overall picture of effective moderating incident response.

Download the presentation "Professional handling of cyber attacks"

Dr. Bruno Quint 
Director Cloud Encryption at Rohde & Schwarz Cybersecurity
Dr. Bruno Quint 
Director Cloud Encryption at Rohde & Schwarz Cybersecurity

Dr. Bruno Quint is Director Cloud Encryption at Rohde & Schwarz Cybersecurity. He has been working in the IT industry for more than two decades. During this time, he has held a variety of management positions in well-known European companies – from the development to the board position. He is co-founder of the CORISECIO GmbH and was most recently Managing Director.

Breakout-Session:
Public clouds in companies: future-proof, necessary and secure

Using Microsoft®Office 365®as an example, this presentation highlights the advantages of cloud platforms and the resulting challenges with regard to data security. A completely new, data-centric security approach, which enables companies to transparently use existing Microsoft®Office 365®applications in Microsoft®Azure, while data and documents can be stored simultaneously securely and encrypted in definable storage systems in German data centers, will be presented. R&S®Trusted Gate, a patent-pending process that allows companies to combine the advantages of public clouds with the highest security requirements, illustrates this solution.

Download the presentation "Public clouds in companies: future-proof, necessary and secure"

Rainer M. Richter
Director Channels, SEC Technologies GmbH
Rainer M. Richter
Director Channels, SEC Technologies GmbH

Rainer M. Richter has more than 35 years of experience in IT, networking and cyber security. In 1997, he was the first employee of Ipsilon Networks in the CEE region. Following the acquisition by Nokia, he first led the growth of the security business in the CEE and later EMEA region. Subsequently, he was responsible for the go-to-market of all of Nokia’s new security technologies in EMEA and APAC. He then built the sales and channel structures for various IT and cybersecurity companies in EMEA and also held strategic cybersecurity advisory mandates. With SEC Technologies, Rainer M. Richter is responsible for setting up all channel activities.

Breakout-Session:
CyberTrap & IoT Inspector - eliminating the blind spots in cyber security

With our custom tailored, highly advanced European “Deception Technology” we take control of attacks. Our goal is to always be ahead of the attacker to learn and improve. CyberTrap understands the struggle of attack prevention and created significant relief by offering a revolutionary technology that not only helps to detect attacks quickly and safely in real-time without requiring anomalies or signatures, but also to take control and lure the attackers into a Decoy environment. Using advanced forensics based on the clean data gathered on our Decoys, we want to learn their methods and goals to always be one step ahead. 90% of IoT devices base their firmware on Linux or Unix. In addition, these devices are almost always on and online, but rarely monitored and hardly maintained. Thus, they are products with questionable security standard because only very rarely - for cost reasons - for these IoT device security audits carried out. Here, the IoT Inspector provides the necessary scalability and automation of IoT security audits. Based on some concrete examples we show successes in the vulnerability detection based on the findings of the IoT Inspector.

Download the presentation "CyberTrap & IoT Inspector - eliminating the blind spots in cyber security"

Christian Schallenberg 
Chief Technology Officer, LANCOM Systems GmbH
Christian Schallenberg 
Chief Technology Officer, LANCOM Systems GmbH

Christian Schallenberg (born 1966) became authorized signatory and CTO on the Management Board responsible for the products and solutions of LANCOM Systems in 2010.

In 1996 he joined the Workstation Computer Graphics Development department at ELSA AG and later researched the first commercial ADSL router. He moved on to various positions in product management, and has headed this department at LANCOM Systems since its foundation in 2002.

Christian Schallenberg studied communications engineering (graduate engineer) at the RWTH Aachen University and business administration (MBA) at the WHU in Vallendar, the Kellogg School of Management in Chicago, and the HKUST in Hong Kong. He is married and has two children.

Breakout-Session:
Secure. Networks. – Network meets Security

A powerful, agile network infrastructure is essential for efficient workflows, easy integration of modern applications, establishing new and digital business models, and to ensure customer satisfaction. It is the cornerstone of entrepreneurial success. At the same time, the threat that the Internet poses to companies is greater than ever before: Data is sent and received over a variety of channels - e-mail, social media, cloud services, or P2P portals - and from there it enters the company's own networks. Reliable protection against viruses, hacker attacks, malware or simply improper use of work equipment is therefore absolutely crucial.

As a result, there is dramatic growth in the need for integrated solutions for routing, switching, wireless LAN and IT security. What used to be the separate areas of networking and security is now growing together - both from a market and technology point of view. Suppliers are evolving from pure network manufacturers to network and security providers. Working in close cooperation, LANCOM and Rohde & Schwarz are creating trusted network infrastructures and IT security “Made in Germany” - a combination that is unique on the market.

The presentation focuses on the changing market and the demands of users for modern, integrated network and security solutions. Building on this, we present the path from being a supplier of pure network solutions to being a provider of highly integrated network and security solutions based on SDN technology.

Download the presentation "Secure. Networks. Network meets Security"

Alexander Schinner
Principal Security Consultant, T-Systems 
Alexander Schinner
Principal Security Consultant, T-Systems 

Dr. Schinner (Telekom Security) is a physicist and has been active in IT security for over 30 years. As Principal Security Consultant he works in the areas of forensics, incident response, IDS and penetration testing. He advises clients on preparation and protection against cyber attacks. In the event of successful break-ins, he helps to limit damage and stop attackers by analyzing digital traces.

Breakout-Session:
Professional handling of cyber attacks

We are all going more and more into digitalization. But how do we deal with the risk of possible attacks? Anyone can be affected! Dr. Alexander Schinner and Dr. Rüdiger Peusquens will interactively present how attackers penetrate step by step and what the defenders contain. The result is an overall picture of effective moderating incident response.

Download the presentation "Professional handling of cyber attacks"

Dominik Schneider
Business Analyst (Junior Consultant), Deutsche Telekom Group/ Detecon …
Dominik Schneider
Business Analyst (Junior Consultant), Deutsche Telekom Group/ Detecon International GmbH

Dominik Schneider advises strategy, innovation and transformation projects within and outside Deutsche Telekom Group. He holds a degree in business informatics and has more than 5 years of experience in the telecommunication industry. His focus is on the value creation of Artificial Intelligence, the Internet of Things and Smart Cities. He has gained experience in various projects on these topics and has written several publications.

Download the presentation "The Bottom Line: The Economic Benefits of Digital Ethics"

Paul Schöber
Portfolio Clusterhead Cloud, Data & Application Security, T-System…
Paul Schöber
Portfolio Clusterhead Cloud, Data & Application Security, T-Systems International GmbH

Paul Schöber is responsible for offering modules Cloud, Data & Application Security at Telekom Security. He has several years of experience as a product manager in the cyber security environment. He managed projects and products in the consumer up to the enterprise segment.

Breakout-Session:
Secure Cloud Transition for Software as a Service

The use of cloud services is steadily increasing, especially software as a service offerings are widespread and allow an efficient outsourcing of business processes and applications. The challenge is to take advantage of SaaS services without sacrificing security. In this Breaktout Session two approaches are presented how security can be implemented in the SaaS environment. The central question is how to control and prevent sensitive company data from being processed in unsafe services. A second aspect is the possibility to build up Data Loss Prevention or extend it to 3rd party SaaS services.

Download the presentation "Secure Cloud Transition for Software as a Service"

Stefan Schröder
Senior Expert Mobile Network Security, Deutsche Telekom AG
Stefan Schröder
Senior Expert Mobile Network Security, Deutsche Telekom AG

Stefan Schröder has been the primary delegate of Deutsche Telekom in the 3GPP security group SA3 for fifteen years. During this time, Stefan has been working on security standards for UMTS, LTE, IMS, Femtocells, 5G, and others. Stefan also lead the security design for LTE in Deutsche Telekom networks, with a major feature being an automatically secure plug-and-play IPsec backhaul deployment. In earlier positions within Siemens (and various subsidiaries), Stefan was responsible for Intelligent Networks planning, PC system design, and hardware design and testing of communications controllers.

Breakout-Session:
5G-Network-Security

While tech media are abuzz with 5G features like low latency, high throughput, massive IoT etc., very little is published about new security aspects of a 5G network. Vendors, operators, and other stakeholders have been developing 5G security for about five years within various fora. This talk will give an impression of Deutsche Telekom's commitment to the ongoing 5G security work.

Download the presentation "5G-Network-Security"

Univ. Prof. Dr. Sarah Spiekermann
Head of the Institute, Vienna University of ecnomics and business
Univ. Prof. Dr. Sarah Spiekermann
Head of the Institute, Vienna University of ecnomics and business

Since 2009 Sarah Spiekermann is chairing the Institute for Information Systems & Society at Vienna University of Economics and Business (WU Vienna). She is a well-regarded scientist, author, speaker and advisor on digital ethics. She published several books, including “Digital Ethics – A Value System for the 21st Century” (Droemer, 2019), “Ethical IT Innovation: A Value-based System Design Approach” (Taylor & Francis, 2015), as well as “Networks of Control” (Facultas, 20116). In 2016 Sarah founded the Privacy & Sustainable Computing Lab at WU Vienna. To date she has published over 100 scientific articles on the social and ethical implications of computer systems and given more than 200 talks about her work. She has co-authored US/EU privacy regulation and worked as an expert and advisor to companies and governmental institutions, including the EU Commission and the OECD. Sarah also maintains a blog on “The Ethical Machine” at Austria’s leading daily newspaper Standard.at and is on the advisory board of the Austrian Digitalization Agency.

Download the presentation "On the Nature and Limits of AII"

Robert Vattig
Senior Security Consultant, T-Systems
Robert Vattig
Senior Security Consultant, T-Systems

Robert Vattig is part of T-Systems Multimedia Solutions GmbH in the area of Security since 2011.

Breakout-Session:
Psychology in Social Engineering

Why and how we are influenced by others.

Download the presentation "Psychology in Social Engineering"

Carl Villis
Senior Business Development Manager, T-Systems International GmbH
Carl Villis
Senior Business Development Manager, T-Systems International GmbH

Carl Villis was born in Gelsenkirchen, Germany and works at T-Systems International as Senior Business Development Manager. He has more than 25 years’ experience in the Telco & IT industry holding various positions.  He led several teams in Product Management, Marketing-  & Segment Management launching and managing a variety of international propositions. Currently he has a strong focus on developing new Mobile Enterprise Services.

Breakout-Session:
Manage mobile Security in a zero Trust world

New corporate initiatives and processes have also created new targets for which the classic security approach no longer makes sense. Applications, users and devices are increasingly located outside a separate and trusted corporate network. The session will briefly discuss this "new" world and what the answer might be. A live demo will show how great the potential danger is in the mobile world if the right security solutions are not on board.

Download the presentation "Manage mobile Security in a zero Trust world"

Eric Vocke
Systems Engineer, McAfee Germany GmbH
Eric Vocke
Systems Engineer, McAfee Germany GmbH

With more than 25 years of experience in the high-tech industry, Eric has worked in technical software solution sales for telecoms and service provider industry for the past 15 years. He came to McAfee in 2016 from Intel where he had focused on IoT solutions. At McAfee, Eric’s main expertise is on device protection and cloud security.

Breakout-Session:
Unified Data Protection from Enterprise to the Cloud

As applications and infrastructure move from traditional on-premise approaches to the cloud, often via a hybrid-cloud route, so data security needs to move as well, remaining in lock-step at all times. Easier said than done – as many data-breach victims will attest. In this presentation we will examine best practice approaches to data security transformation, examining many of the common challenges faced during the cloud adoption process, and looking at how to leverage hybrid and full-cloud infrastructure to protect data across all vectors – delivered with a single policy and incident view approach. 

Download the presentation "Unified data protection from Enterprise to the Cloud"

Dr. Ulli Waltinger
Head Machine Intelligence Research Group / Co-Head of Siemens AI Lab, …
Dr. Ulli Waltinger
Head Machine Intelligence Research Group / Co-Head of Siemens AI Lab, Siemens AG – Corporate Technology

Ulli Waltinger is the Head of the Machine Intelligence Research Group and the Founder and Co-Head of the Siemens AI Lab at Siemens Corporate Technology, Siemens’ global research organization. Prior he worked at the Artificial Intelligence department and the Center of Excellence of Cognitive Interaction Technology at the University of Bielefeld. His primary interests are combining data-driven and semantic technology-driven machine learning algorithms for AI, information retrieval and NLP challenges. Ulli Waltinger has more than 40 peer-reviewed publications in the field of computer science, artificial intelligence, computational linguistics, and cognitive science. Over the last years, he pushed and led, within Siemens, various AI initiatives, such as the Core Technology Initiative on Deep Learning and Artificial Intelligence, various Hackathons and Bootcamps on AI, and founded in 2017 the Siemens Artificial Intelligence Lab in Munich. Data is the new Source Code.

no download available

Ralf Weber
Regional Sales Director at Gigamon
Ralf Weber
Regional Sales Director at Gigamon

As Regional Sales Director, Ralf Weber is responsible for Gigamon's sales activities in Central & Eastern Europe. He supports customers and partners in the implementation of security projects and the successful introduction of the Gigamon Visibility Platform to make data streams from physical and virtual networks as well as from the cloud 100% visible and to trim security and monitoring tools to maximum efficiency. With 20 years of experience in the national and international hardware and software business, he can look back on many years of successful sales experience in solution sales at Sun Microsystems, Netapp, SanDisk and Microsoft in various industries.

Breakout-Session:
Data Visibility: You can only protect, what you can see!

Download the presentation "Data visibility: You can only protect, what you can see!"

Walo Weber
Sales Engineering Manager, Imperva
Walo Weber
Sales Engineering Manager, Imperva

Walo Weber leads Imperva's sales engineering team for Germany, Austria, Switzerland and Eastern Europe. During his almost 6 years with Imperva, he has gained expert knowledge in the areas of data and application security in various customer projects. In the past, he has successfully managed the operational operation as well as the implementation of large IT and security environments.

Breakout-Session:
Database Security – Monitor your data directly at the source

Today, one of the high value assets in companies is data. Systems with large databases, which mainly contain customer data or other sensitive data, are a popular target for attackers. It is necessary to identify, evaluate and monitor related threats to detect and defend attacks to protect the data. With database activity monitoring and database firewalls, companies can handle threats on data directly at the source.   

Imperva SecureSphere offers a solution to identify sensitive data, monitor database user activities of administrative or high privileged accounts and alert in real-time suspicious behavior or other security violations. With a database independent monitoring concept, Imperva SecureSphere provides a broad range of coverage from traditional relational databases to big data platforms as well. In this break-out session we will introduce you to database security and give you a first impression during a live demo. 

Download the presentation "Database Security – Monitor your data directly at the source"

Thomas Wendt
Regional Manager Post Sales DACH bei Qualys
Thomas Wendt
Regional Manager Post Sales DACH bei Qualys

Thomas Wendt has more than 12 years of experience in IT security, including more than 6 years as an IT security consultant and pentester. Since 2014 with Qualys in Post-Sales and since July 2018 Regional Manager Post-Sales.  In Enterprise Post-Sales we support our customers processually and technically in the successful implementation of IT security processes with Qualys.

Breakout-Session:
Know your Assets - Create visibility, evaluate security level

Environments are becoming increasingly hybrid and complex. Qualys supports current environments to create and evaluate visibility of assets, software and configurations. 

The scalability and flexibility of the Qualys Platform has the advantage of allowing on-premise, cloud and dev-ops to jointly evaluate assets and easily derive actions on a single platform. Using the example of Qualys Asset Inventory and Cloud Security Assessment, we show various sensors to collect metadata, correlate it and trigger necessary actions.

Download the presentation "Know your Assets - Create Visibility, Evaluate Security Level"

Stephan Wollny
Cluster Head Identity Security, Telekom Security, T-Systems International G…
Stephan Wollny
Cluster Head Identity Security, Telekom Security, T-Systems International GmbH

Stephan Wollny, studied electrical engineering, specializing in communications engineering (Dipl.-Ing.) and economics, specializing in B2B marketing (MBM). Active since 1999 in the context of IT security with a focus on IAM and PKI. Involved in the establishment of the Telekom Trust Center and later Managing Consultant. Since April 2018 responsible for the ID security offering of Telekom Security.

Breakout-Session:
IoT Security –  Secure digital Identity, enable Business Cases for IoT

The number of endpoints in IoT infrastructures will explode in the next few years, demanding simple, automated solutions and ideas that go beyond the purely technical point of view. In addition to safety and technology requirements, only the costs are usually recognized as a decision criterion. It is often overlooked that a far-sighted use of digital identities in the IoT context can be a good investment in one's own business.

Before discussing business aspects, the breakout session will show how the rollout of IoT identities works with the help of automated services. As an IoT device, we use a reasonably priced standard component, which you can order as a mass-produced item by mail order. A common problem is the lack of trust in hardware components from overseas. We show you a solution.

Download the presentation "IoT Security –  Secure digital Identity, enable Business Cases for IoT"

Dr. Ir. Frank Wisselink
Managing Consultant (Junior Partner), Deutsche Telekom Group/ Detecon …
Dr. Ir. Frank Wisselink
Managing Consultant (Junior Partner), Deutsche Telekom Group/ Detecon International GmbH

Dr. Frank Wisselink manages and advises strategy, innovation & transformation programs within and outside the Deutsche Telekom Group. His focus is on the Value Creation of Artificial Intelligence, the Internet of Things, Smart Cities and the associated Agile Organizational Transformation. He has more than 20 years international experience in consulting, managing large organizations and leading key programs within ICT, energy, high tech and consumer electronics.

Download the presentation "The Bottom Line: The Economic Benefits of Digital Ethics"

Show all speakers

Breakout Sessions

Day 1 – 13th March 2019
02:35 p.m.
1. Session

AI. Ready? Go!
Sergej Epp – CSO for Central Europe, Palo Alto Network
Download the presentation "AI. Ready? Go!"

#Breakout 1   #GER

Fast, laser-focused incident response with intelligent orchestration
Helmut Deuter – Speciality Sales, IBM Security
Download the presentation "Fast, laser-focused incident response with intelligent orchestration"

#Breakout 2   #GER

CyberTrap & IoT Inspector - eliminating the blind spots in cyber security
Tom Haak – Head of Sales & Mktg., Cybertrap Software
Rainer M. Richter – Director Channels, SEC Technologies
Download the presentation "CyberTrap & IoT Inspector - eliminating the blind spots in cyber security"

#Breakout 3   #GER

Managed Cloud SBC: The new operating model for Enterprise SIP Security
Boris Bannasch – Senior Consultant Unified Communications, T-Systems
Download the presentation "Managed Cloud SBC: The new operating model for Enterprise SIP Security"

#Breakout 4   #GER

IT Security is a process rather than a solution. How to install it within the organization.
Dr. Philip Huisgen – Managing Director, Datakom
no download available

#Breakout 5   #GER

Zero Trust
Ingo Kruckewitt – CTO EMEA, Symantec
Download the presentation "Zero Trust"

#Breakout 6   #GER

Deutsche Telekom and Cisco Create the Strongest Force Against Cyber Threats
Arnd Gille  – Head of Cyber Security Consulting, Cisco Germany
Download the presentation "Deutsche Telekom and Cisco Create the Strongest Force Against Cyber Threats"

#Breakout 7

03:20 p.m.
2. Session

Device centric security strategies for the modern workplace
Stijn Paumen – VP Sales & BD at Wandera
Download the presentation "Device centric security strategies for the modern workplace"

#Breakout 1

The blind Spot in the SAP-User-Administration
Michael Kleist – Regional Director DACH, Cyberark
Download the presentation "The blind Spot in the SAP-User-Administration"

#Breakout 2   #GER

The internet is the only network you will ever need
Nathan Howe – ZPA Principal Architect, Zscaler
Download the presentation "The internet is the only network you will ever need"

#Breakout 3

5G-Network-Security
Stefan Schröder – Senior Expert Mobile Network Security, T-Systems
Dr. Sven Lachmund – Senior Expert Mobile Network Security, T-Systems
Download the presentation "5G-Network-Security"

#Breakout 4

Check Point Infinity
Mirko Kurten – Strategic Sales Manager Infinity Europe, Check Point Software Technologies GmbH
Download the presentation "Check Point Infinity"

#Breakout 5   #GER

Public clouds in companies: future-proof, necessary and secure
Dr. Bruno Quint – Director Cloud Encryption, Rohde & Schwarz, Cybersecurity
Download the presentation "Public clouds in companies: future-proof, necessary and secure"

#Breakout 6   #GER

DDoS attacks, the Terabit era and beyond
Marco Gioanola – Senior CE, Cloud Services Architect, Netscout
Download the presentation "DDoS attacks, the Terabit era and beyond"

#Breakout 7

Day 2 – 14th March 2019
11:20 a.m.
1. Session

Cloud Innovation - CloudGuard Dome9
Eugen Hinz – Security Engineer, Check Point Software Technologies GmbH
Download the presentation "Cloud Innovation - CloudGuard Dome9 "

#Breakout 1   #GER

IoT Security –  Secure digital Identity, enable Business Cases for IoT
Stephan Wollny – Cluster Head Identity Security, Telekom Security, T-Systems International GmbH
Maximilian Beckmann – Cyber Security Consultant, Telekom Security, T-Systems International GmbH
Download the presentation "IoT Security –  Secure digital Identity, enable Business Cases for IoT"

#Breakout 2   #GER

Know your Assets - Create Visibility, Evaluate Security Level
Thomas Wendt – Regional Manager, Post-Sales, DACH, Qualys
Download the presentation "Know your Assets - Create Visibility, Evaluate Security Level"

#Breakout 3   #GER

Manage mobile Security in a zero Trust world
Carl Villis – Senior Business Development Manager, T-Systems International GmbH
Markus Speicher – Technical Account Director EMEA MobileIron
Download the presentation "Manage mobile Security in a zero Trust world"

#Breakout 4

Data visibility: You can only protect, what you can see!
Ralf Weber – Sales Director, Gigamon
Download the presentation "Data visibility: You can only protect, what you can see!"

#Breakout 5

The Endpoint as integrated part of Zero Trust Eco System
Ingo Kruckewitt – CTO EMEA - Symantec
Christian Gayda – Offering Manager, Telekom Security
no download available

#Breakout 6   #GER

Smart Defense: Learn how to use intelligent mitigation techniques against today's application DDOS Attacks
Manuel Hähr – Senior Systems Engineer, F5 Networks Inc
Download the presentation "Smart Defense: Learn how to use intelligent mitigation techniques against today's application DDOS Attacks"

#Breakout 7

Secure Cloud Transition for Software as a Service
Paul Schöber – Offering Manager, Telekom Security, T-Systems
Download the presentation "Secure Cloud Transition for Software as a Service"

#Breakout 8   #GER

11:20 a.m.
Workshop

Women in Cyber Security – Standard not exception! Strategies against shortage of specialists
Lisa Lübke – Program Manager Cyber Security Professional, T-Systems
no download available

#Room H2-01

12:00 p.m.
2. Session

Psychology in Social Engineering
Robert Vattig – Senior Security Consultant, T-Systems
Download the presentation "Psychology in Social Engineering"

#Breakout 1   #GER

Database Security – Monitor your data directly at the source
Walo Weber – Imperva
Conrad Inderst – T-Systems
Download the presentation "Database Security – Monitor your data directly at the source"

#Breakout 2   #GER

SIEM Modernization – The Smarter Way
Peter Häufel – Channel Account Director, Exabeam
Download the presentation "SIEM Modernization – The Smarter Way"

#Breakout 3   #GER

Seduced by your Boss – Attack vector AI
Ulrich ten Eikelder – Head of Risk Mngt. and Awareness
Andreas Lang – Expert Cyber Security
Download the presentation "Seduced by your Boss – Attack vector AI"

#Breakout 4   #GER

Secure. Networks. Network meets Security
Christian Schallenberg – Chief Technology Officer, LANCOM Systems GmbH
Download the presentation "Secure. Networks. Network meets Security"

#Breakout 5   #GER

Unified data protection from Enterprise to the Cloud
Eric Vocke – Systems Engineer, McAfee Germany GmbH
Download the presentation "Unified data protection from Enterprise to the Cloud"

#Breakout 6   #GER

Industrie 4.0 for smes – A challenge for IT Security experts
Goodarz Mohbobi – CEO IT- and Management Consultancy, axxession GmbH
Dr. Tolga Arul – Postdoct. research associate, TU Darmstadt
Download the presentation "Industrie 4.0 for smes – A challenge for IT Security experts"

#Breakout 7   #GER

Professional handling of cyber attacks
Dr. Rüdiger Peusquens – Head Cyber Defense Response, T-Systems 
Alexander Schinner – Principal Security Consultant, T-Systems 
Download the presentation "Professional handling of cyber attacks"

#Breakout 8   #GER

Digital Ethics conference 2019

Many of our speakers will be speaking at the CSTSE as well as at the Digital Ethics

Partner

Platinpartner
Cisco

Cisco designs and sells a broad range of technologies that have been powering the Internet since 1984. Across networking, security, collaboration, and the cloud, our evolving intent-based technologies are constantly learning and adapting to provide customers with a highly secure, intelligent platform for their digital business. The company is focused on the market segments Enterprise (large companies, small and medium-sized enterprises as well as public authorities) and Service Providers. Cisco relies on indirect sales through around 2,200 certified partners in Germany.

IBM Security
Goldpartner
Symantec
Check Point

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and  mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Microsoft
Silberpartner
NetScout Arbor

In today’s connected world, people expect a seamless, secure digital experience—a complex undertaking that relies on your ability to pull vital intelligences from huge volumes of operational data derived from myriad sources. Few can successfully manage the task, however. Taming the data deluge requires smart data: Data that is prepared and organized at the collection point such that it is ready and optimized for analytics at the highest quality and speed.

 At NETSCOUT, we create Smart Data by distilling real time, precise intelligence from the noise of traffic data, simplifying the complex without losing the details. NETSCOUT Smart Data instantly provides the intelligence you need to drive network and application performance, deliver unmatched user experience, and find and fix advanced cyber and DDoS threats.

For more information, please visit www.netscout.com

CyberArk

Privileged accounts, credentials and confidential credentials are available everywhere - on-premise, in the cloud, on endpoints and in DevOps environments. That's what attackers are after. Right now.

More than 3,650 of the world's leading companies in 90 countries rely on CyberArk, including more than 50% Fortune 100 and nearly 30% of Global 2000 companies.

To deliver holistic, fully integrated security solutions to its customers, CyberArk has built a powerful global network of more than 300 channel partners and globally trained integration partners. The Technology Alliance Program consists of more than 70 partners and includes over 200 certified integrations.

For more information, please visit www.cyberark.de

F5 Networks

F5 (NASDAQ: FFIV) makes apps faster, smarter and more secure for the world's largest corporations, service providers, governments and consumer brands. F5 delivers cloud and security solutions that enable organizations to leverage their chosen application infrastructure without sacrificing speed and control.

For more information about F5, its partners and technologies, visit f5.com and follow F5 on Twitter or visit us on LinkedIn und Facebook.

Qualys

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions. The company has more than 10,300 customers in over 130 countries, including the majority of Forbes Global 100 and Fortune 100 companies. Qualys helps organizations optimize and consolidate their security and compliance solutions on a single platform, fundamentally secure digital transformation initiatives, and achieve greater agility, better business results, and significant cost savings. The Qualys cloud platform and its integrated cloud applications continuously deliver critical security insights to enterprises, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and Web applications in on-premises, endpoint and elastic cloud environments. Qualys was founded in 1999 as one of the first SaaS security companies and has strategic partnerships with leading managed service providers and consulting firms such as Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. Qualys is also a founding member of the Cloud Security Alliance.

For more information, please visit www.qualys.com and follow us on LinkedIn and Twitter.

Rohde & Schwarz Cybersecurity
DATAKOM

DATAKOM is a consultancy and integration partner in IT security and metrology. Since 1986 it develops custom solutions for its clients in the DACH-states. With a comprehensive knowledge of complex network structures, data flows and protection of which, DATAKOM ensures the increase of reliability, quality, availability and security of the customers IT environment.  

Therefore, the company specialized in the consultation at the process-oriented implementation of its IT solutions: This way, DATAKOM is supporting its clients holistically, from choosing to integrating the appropriate systems to their environment. As a Managed Service Provider, it is happy to also inherit the operative responsibility.

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler operates a massive, global cloud security platform that protects thousands of enterprises and government agencies from cyberattacks and data loss.

Palo Alto Networks

We are the global cybersecurity leader, known for always challenging the security status quo. Our mission is to protect our way of life in the digital age by preventing successful cyberattacks. This has given us the privilege of safely enabling tens of thousands of organizations and their customers. Our pioneering Security Operating Platform safeguards your digital transformation with continuous innovation that combines the latest breakthroughs in security, automation, and analytics. By delivering you a true platform and empowering a growing ecosystem of change-makers like us, we provide you highly effective and innovative cybersecurity across clouds, networks, and mobile devices.

For more information, please visit www.paloaltonetworks.com

Wandera

Wandera helps enterprise security leaders manage mobile risk and is the experts’ choice in mobile security. Founded in 2012, Wandera is headquartered in London and San Francisco.

For more information visit wandera.com. Follow Wandera on LinkedIn and Twitter.

Gigamon
Imperva

Recognized by industry analysts as a cybersecurity leader, Imperva champions the fight to secure data and applications wherever they reside. In today’s fast-moving cybersecurity landscape, your assets require continuous protection, but analyzing every emerging threat taxes your time and resources. For security to work, it has to work for you. By accurately detecting and effectively blocking incoming threats, we empower you to manage critical risks, so you never have to choose between innovating for your customers and protecting what matters most. At Imperva, we tirelessly defend your business as it grows, giving you clarity for today and confidence for tomorrow.
Imperva — Protect the pulse of your business.

For more information, please visit www.imperva.com

McAfee

McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place. By building solutions that work with other companies' products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.

For more information, please visit www.mcafee.com

Sec Consult
Axxession
Lancom Systems
Bronzepartner
FireEye
Fortinet Arrow

Fully integrated, high-performance IT security. Fortinet offers award-winning network and content security and secure access products that work together in a collaborative security fabric. The fabric combines security processors, intuitive operating system and threat intelligence. This provides proven security, performance and simplified administration.

Independent test institutes confirm the solution efficiency and the majority of the Fortune-500-companies are Fortinet customers. 

NCP engineering GmbH

NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios.

Trend Micro
genua GmbH

genua GmbH is a German specialist for IT security. Our range of services includes the protection of sensitive interfaces in the public authority and industrial sectors, the networking of highly critical infrastructures, reliably encrypted data communication via the Internet, remote maintenance systems and remote access solutions for mobile employees and home offices. genua is a company of the Bundesdruckerei Group.

For more information, please visit www.genua.de

Exabeam
Anomali
Bundesamt für Sicherheit in der Informationstechnik
Stadt Bonn
Frauenhofer Institut

Contact

Are you interested in actively supporting the summit, for example as a speaker? Or do you have any questions related to the summit? If so, please contact us.
Contact us

Press

Journalists are welcome to get in touch with our press contact for further information.
Press Requests
Location

The World Conference Center is located about 10-15 minutes by car from the main station and 20-30 minutes by car from the airport. 

You can find a description of how to get to us here PDF.
Please try to use the parking garage in Karl-Carstens-Straße, or alternatively the one in Charles-de-Gaulle-Straße. A third parking garage you can find in Emil-Nolde-Straße. A day pass is € 15.

World Confernce Center
Platz der Vereinten Nationen 2
53113 Bonn