CISO DACH Summit | November 28, 2019 | Sheraton Munich Arabellapark Hotel - Munich, Germany

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, November 28, 2019 - CISO DACH Summit

8:00 am - 8:45 am

Registration & Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address & Opening Remarks

Presented by:

Rainer Rehm, President, (ISC)²

 
 

8:55 am - 9:25 am

Keynote Presentation

Bringing Down the Barriers

With the role of the CIO expanding, CIOs are being pushed to increase digital business by using IT in ways that deliver cost saving methods and increased levels of productivity, as well as new opportunities. However, many believe that current methods for these opportunities have reached their end. As a result, it is time to reconfigure these methods in new, unique ways.

Takeaways: 

  1. Latest strategies or methods to increase digital business 
  2. How to confront resiliency or resistance to new digital initiatives 
  3. The different types of behavioral patterns or mindsets to confront

Presented by:

Harald Greiner, Vice President IT, Technology & Sourcing, Holtzbrinck Publishing Group View details

 
 
 

9:30 am - 10:00 am

Share:

Keynote Presentation

Mobile-centric Zero Trust Security Framework

Traditional security models designed on the premise of organizations having a well-defined IT perimeter no longer apply in the perimeter-less world. Passwords based security, which assumed that users operated and accessed business information only form within the enterprise IT perimeter were adequate in the past. But in today's IT environment, where users are accessing information from a variety of untrusted devices, apps, networks, locations, and services - passwords alone are no longer sufficient. It should be no surprise that passwords are still the number 1 cause of data breaches. According to the Verizon Data Breaches Investigations report - 81% of breaches involved weak or stolen passwords. This is because passwords are easily compromised. 

In the reality of today's security world how does an organization protect itself? With a Zero Trust approach and framework to security. Zero trust assumes that bad actors are already in the network and secure access is determined by an 'always verify, never trust' approach. Zero trust approach requires that you verify the device, user, apps, networks, and presence of threats before granting access. In addition, you should have on-going enforcement. But with many theories about Zero trust how do you ensure you've taken the right approach. 

Takeaways: 

CIOs and CISOs face three big challenges: 

  1. Drive business innovation with mobile productivity by giving employees the ability to use mobile, cloud, and endpoints. 
  2. Enforce corporate security without impacting the user experience. 
  3. Redefine enterprise security strategies to address a perimeter-less environment.

Sponsored by:

MobileIron View details

 
 

Presented by:

Christof Baumgartner, VP and General Manager EMEA, MobileIron View details

 
 
 

10:05 am - 10:30 am

Executive Exchange

 

Share:

Keynote Presentation

Polaris- Lufthansa Technik's Journey towards Digital Maintenance, Repair and Overhaul (MRO)

IT increasingly penetrates all layers from workshops and machinery, across process support and documentation into new IT based products within Lufthansa Technik's Maintenance, Repair and Overhaul Services. New technologies and methodologies and strong demand for shorter delivery times put a high pressure on corporate IT functions. How can Lufthansa Technik's information management find the right balance between increasing demand and limited ressources? 

Lufthansa Technik's IT strategy Polaris focuses on three areas Platform Readiness, Organizational Fitness and Driving Innovation in order to free up the resources needed to most effectively contribute to company success.  

Takeaways: 

  1. Lufthansa Technik's concept of shaping a modern IT function 
  2. Our Experience: Successes, obstacles and failures so far on our journey

Presented by:

Dr. Andreas Dannemann, CIO for Engine & Aircraft Systems, Lufthansa Group Airlines

 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Thought Leadership

Git What? How Next Gen Software Will Rock the CISO's World

Git, GitHub, GitLab, oh my! Containers, Kubernetes, and Serverless! Why should you care? This primer on key changes in software development will discuss how containers, orchestrators, and the DevOps tool chain, embraced by your developers, will impact your security program. We'll look at 10 steps you can take to ensure your security program remains relevant in this new world.

Sponsored by:

Gitlab EMEA View details

 
 

Presented by:

Cindy Blake, Senior Product Marketing Manager - Security, Gitlab EMEA View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Think Tank

The Solution for Your Legacy System's Security: The Cloud

Over the lifespan of an organization, CIOs/CISOs have developed and implemented technologies that have been key to the organization's success. However, CISOs and their security teams today find themselves stuck ensuring that legacy systems are secure. The solution is cloud-delivered security products that are more agile with the ability to implement new detection methods and services faster than on-site solutions.

While cloud security is an ideal solution, it is important to know that using the cloud is more than moving legacy management servers to the cloud.

Takeaways:

  1. Review the status of legacy system security
  2. What cloud solutions are the best fit for their business
  3. What are the main needs in regards to system's scale, data telemetry, staff growth, machine learning, API-based access, and more

Presented by:

Francisco Gaspar, Lead CyberSecurity Architect, Telefonica (02) View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Thought Leadership

Cybersecurity at the Heart of the 4th Industrial Revolution

Over the next 10 years, digital transformation is expected to unlock an estimated $10 trillion of value for business and wider society. Davos 2019 has clearly established security as a strategic contribution for unlocking that value, putting a safe digital transformation at the heart of three major drivers; Education, Ecosystem, and Technology. Learn how Fortinet is delivering unprecedented value on those three domains setting new industry standards and helping our customers and partners realizing their digital initiatives.

Sponsored by:

Fortinet View details

 
 

Presented by:

Thorsten Henning, Regional SE Director - DACH, Fortinet

 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Think Tank

Bring on The Cloud

Research shows over the next few years, there will be an explosion of new cloud services and solutions as subscription-based software-as-a-service (SaaS), platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS) are anticipated to grow drastically. This session will cover the future of cloud developments and share how organizations take advantage of the cloud. 

 Takeaways: 

  1.  How to take advantage of the ease and high-performance of the cloud 
  2.  How to keep your data secure when implementing cloud computing technology 
  3.  What to look for when working with cloud partners

Presented by:

Jose Jorge Santos, CIO Portugal - Head of Infrastructure Iberia, DB Schenker View details

 
 
 

12:40 pm - 1:50 pm

Working Lunch & Panel

The Revitalizing Change in the Role of the CXO

A CXO's role, goals and objectives have drastically changed over the years as most CXOs supervise teams and units beyond their IT's security. Because of these changes in responsibilities, a CXO's success is measured in greater business metrics. As a result, the role of a CXO has become both more attractive and more demanding.

Takeaways:

  1. What are the significant changes regarding the role of the CXO
  2. How to keep up with the changing requirements
  3. How to properly measure a CXO's success

Moderated by:

Rainer Rehm, President, (ISC)²

 

Panelists:

Bettina Uhlich, CIO, Evonik

 

Anja English, Global Head of Digital Marketing, Bayer

 

Francisco Gaspar, Lead CyberSecurity Architect, Telefonica (02) View details

 
 

Dr. Andreas Dannemann, CIO for Engine & Aircraft Systems, Lufthansa Group Airlines

 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Share:

Thought Leadership

3 Best Practices for Application Security (and Bonus Tip)

Applications are the lifeblood of the enterprise, but as the threats multiply, as applications move to the cloud, as legacy applications need to be maintained, and as organizations seek competitive advantage with new technologies and faster release cycles, it's easy to see that application security can be a thankless, endless and challenging job. 

Imperva has distilled three best practices (and a bonus tip) that help enterprises of any size vastly improve and simplify application security, accelerate threat detection and operationalize application security in a dynamic world where change is the only constant.

Sponsored by:

Imperva View details

 
 

Presented by:

Walo Weber, Senior Sales Engineer, Imperva View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Think Tank

Machine Learning Is Here to Help, Not Replace

Over the next few years, machine learning (ML) will be a regular security practice and will offset skills and staffing shortfalls. Today though, ML is better at addressing smaller, more specific problems. Technology leaders have to understand that humans and machines complement each other and work better together than alone, as ML can assist humans in addressing uncertainty by presenting relevant information.

Takeaways:

  1. Discuss the ways machine learning can assist teams and organizations
  2. How to make the right machine learning choices for your organization
  3. The future of machine learning

Presented by:

Andreas Keiger, Executive Vice President - Business Unit IT Infrastructure, Rittal GmbhH & Co.

 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Thought Leadership

Why SD-WAN is the Future of Networking

Go Beyond the 'Software Defined' and move to 'Self Driving Network', tell the network what the business wants, then use automation and machine learning to just make it work. Learn how you can turn your network into a business accelerant and supporting your transformation to the cloud. 

Takeaways: 

  1. Not all SDN Solutions are created equal 
  2. Automation is key to the Self Driving Network 
  3. Machine to Machine learning is critical for Cloud based application success 
  4. The Network is now a Business Enabler

Sponsored by:

Silver Peak Systems Germany GmbH View details

 
 
 

3:20 pm - 3:30 pm

Afternoon Networking Coffee Break

 

3:35 pm - 4:00 pm

Executive Exchange

 

Think Tank

Preparing for the Inevitable

Employees are consumers of digital technologies such as IoT, AR and VR and the plethora of mobile devices has enabled them to work flexibly. This has raised the bar on employee expectations for tools and capabilities from their employers. In order for companies to retain the best and get the most out of their employees, it is vital to design and continually update the digital workplace. While defense is mandatory, preparing for that inevitable data breach is very critical for organizations' survival. 

Takeaways: 

  1. As the role of the CISO has evolved, senior leaders and board of directors are now becoming aware of the impact of data breaches to the organization and they look up to the CISO for guidance. 
  2. Cyber security responsibilities are also shifting and spreading as they are now part of Data Breach Response Teams. 
  3. Where do you start on data breach preparedness? Who should be involved in planning? How frequent do we need to test or do exercises? Do we involve government agencies? Do we get retainer services? Do we need to hire someone? How much money do we allocate?

 

4:05 pm - 4:30 pm

Executive Exchange

 

Share:

Think Tank

Changing role of CIOs and CISOs

The role of modern IT Executives is more challenging than it has ever been before, not only because the technology landscape has become more complex, but also because IT execs had to become more business-focused. The role has moved from being merely a technologist and a service provider to being a digital business instigator, an ambassador of transformation and a leader. This is the role that most of IT executives are not prepared for. 

Modern businesses want to leverage technology to gain that competitive edge which not only secure their market-share but also generate more revenue, reduce costs, avoid risks and incorporate innovation. Now all eyes are fixed upon IT and enterprises are demanding that their technology executives join them in this journey and get involved in shaping business strategy, but are CIxOs ready to take their rightful place at the top table? To be successful, CIxOs not only need to invest in their staff, procure right technologies, adopt and align IT strategy with business but most importantly they must invest in themselves, in their brand and leadership skills. 

Takeaways: 

  1. Only strong CIxOs can lead their enterprise to success: to lead digital business initiatives, to act as a bridge between IT and business strategy, to gain the confidence of board and stakeholders, CIxO must work on their personal brand and skills. 
  2. IT leaders must master the art of "Communicating Strategy" by applying the basics of Marketing & Publicity to their communication tactics.  
  3. Dark side and light side of the force: CIxOs must master the ways of power, manipulation, warfare and storytelling to protect their reputation, build strong alliances, inspire loyalty and guarantee their own success and that of their team. 
  4. IT executives can no longer be reactive to business demands, and merely play defense while focusing on operational excellence, cost optimization and risk reduction, but rather play offense, hack the culture, affect the decision making process within the organization and coach stakeholders to win in turns.

Presented by:

Ali Farahani, Group CIO, ROXCEL Holding GmbH View details

 
 
 

4:35 pm - 5:00 pm

Executive Exchange

 

Share:

Think Tank

Success Factors of the Digital Transformation at Airbus

The space and defence industry is facing unprecedented opportunities and challenges in a world that is becoming more complex and less predictable. Airbus is right at the centre of this once-in-a-generation change. Digital and data is core to this multi-year transformation. 

Takeaways  

In his talk, Jürgen Urbanski, VP Digital at Airbus Defence and Space, will share a few of the lessons learned from transformations such as the one experienced by Airbus. He will focus on systemic issues there are prevalent in many large enterprises. The actionable insights for the audience will focus on how to make digital & data teams more self-sufficient with respect to extracting business value from their data, how to accelerate the digital transformation across the enterprise, and how to best leverage the value of a software ecosystem, using examples from aerospace and defence.

Presented by:

Juergen Urbanski, VP Digital at Airbus Defence and Space, Airbus Defence & Space

 
 

5:00 pm - 5:15 pm

What's the Next Stop On the Transformation Journey?

Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CISOs where common issues can be addressed and success stories can be shared.

Takeaways:

  1. Building an ongoing community with your peers can be an invaluable resource for tackling the digital transformation projects ahead of you
  2. Sharing stories of success (and failures) is not reserved to a one-day CISO Summit, but should be shared on a regular basis with your peers
 

5:15 pm - 6:30 pm

Summit Happy Hour