CISO DACH Summit | November 28, 2019 | Sheraton Munich Arabellapark Hotel - Munich, Germany

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, November 28, 2019 - CISO DACH Summit

8:00 am - 8:45 am

Registration & Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address & Opening Remarks

Presented by:

Rainer Rehm, President, (ISC)²

 
 

8:55 am - 9:25 am

Keynote Presentation

Bringing Down the Barriers

With the role of the CIO expanding, CIOs are being pushed to increase digital business by using IT in ways that deliver cost saving methods and increased levels of productivity, as well as new opportunities. However, many believe that current methods for these opportunities have reached their end. As a result, it is time to reconfigure these methods in new, unique ways.

Takeaways: 

  1. Latest strategies or methods to increase digital business 
  2. How to confront resiliency or resistance to new digital initiatives 
  3. The different types of behavioral patterns or mindsets to confront

Presented by:

Harald Greiner, Vice President IT, Technology & Sourcing, Holtzbrinck Publishing Group View details

 
 
 

9:30 am - 10:00 am

Share:

Keynote Presentation

Mobile-centric Zero Trust Security Framework

Traditional security models designed on the premise of organizations having a well-defined IT perimeter no longer apply in the perimeter-less world. Passwords based security, which assumed that users operated and accessed business information only form within the enterprise IT perimeter were adequate in the past. But in today's IT environment, where users are accessing information from a variety of untrusted devices, apps, networks, locations, and services - passwords alone are no longer sufficient. It should be no surprise that passwords are still the number 1 cause of data breaches. According to the Verizon Data Breaches Investigations report - 81% of breaches involved weak or stolen passwords. This is because passwords are easily compromised. 

In the reality of today's security world how does an organization protect itself? With a Zero Trust approach and framework to security. Zero trust assumes that bad actors are already in the network and secure access is determined by an 'always verify, never trust' approach. Zero trust approach requires that you verify the device, user, apps, networks, and presence of threats before granting access. In addition, you should have on-going enforcement. But with many theories about Zero trust how do you ensure you've taken the right approach. 

Takeaways: 

CIOs and CISOs face three big challenges: 

  1. Drive business innovation with mobile productivity by giving employees the ability to use mobile, cloud, and endpoints. 
  2. Enforce corporate security without impacting the user experience. 
  3. Redefine enterprise security strategies to address a perimeter-less environment.

Sponsored by:

MobileIron View details

 
 

Presented by:

Christof Baumgartner, VP and General Manager EMEA, MobileIron View details

 
 
 

10:05 am - 10:30 am

Executive Exchange

 

Share:

Keynote Presentation

Polaris- Lufthansa Technik's Journey towards Digital Maintenance, Repair and Overhaul (MRO)

IT increasingly penetrates all layers from workshops and machinery, across process support and documentation into new IT based products within Lufthansa Technik's Maintenance, Repair and Overhaul Services. New technologies and methodologies and strong demand for shorter delivery times put a high pressure on corporate IT functions. How can Lufthansa Technik's information management find the right balance between increasing demand and limited ressources? 

Lufthansa Technik's IT strategy Polaris focuses on three areas Platform Readiness, Organizational Fitness and Driving Innovation in order to free up the resources needed to most effectively contribute to company success.  

Takeaways: 

  1. Lufthansa Technik's concept of shaping a modern IT function 
  2. Our Experience: Successes, obstacles and failures so far on our journey

Presented by:

Dr. Andreas Dannemann, CIO for Engine & Aircraft Systems, Lufthansa Group Airlines

 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Thought Leadership

Git What? How Next Gen Software Will Rock the CISO's World

Git, GitHub, GitLab, oh my! Containers, Kubernetes, and Serverless! Why should you care? This primer on key changes in software development will discuss how containers, orchestrators, and the DevOps tool chain, embraced by your developers, will impact your security program. We'll look at 10 steps you can take to ensure your security program remains relevant in this new world.

Sponsored by:

Gitlab EMEA View details

 
 

Presented by:

Cindy Blake, Senior Product Marketing Manager - Security, Gitlab EMEA View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Think Tank

The Unpatchable Element

We have become extremely good mitigating technical attacks on systems by implementing numerous technology-based countermeasures. 

As a result, attackers are shifting their focus and are increasingly targeting people through the use of social engineering methods, often with some success by getting unnoticed access to computer systems and sensitive data. 

An atacker may have to invest a lot of timet in breaking a system, but it would be much easier to persuade a person to allow admittance to a secure area or even to disclose confidential information. 

Takeaways: 

  1. Social Engineering gets hidden in the closet as a "taboo" subject, whereas the fact is that no matter who a person is, he / she is susceptible to a Social Engineering attack. 
  2. We should never forget the Human Factor in CyberSecurity

Presented by:

Francisco Gaspar, Lead CyberSecurity Architect, Telefonica (02) View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Thought Leadership

Cybersecurity at the Heart of the 4th Industrial Revolution

Over the next 10 years, digital transformation is expected to unlock an estimated $10 trillion of value for business and wider society. Davos 2019 has clearly established security as a strategic contribution for unlocking that value, putting a safe digital transformation at the heart of three major drivers; Education, Ecosystem, and Technology. Learn how Fortinet is delivering unprecedented value on those three domains setting new industry standards and helping our customers and partners realizing their digital initiatives.

Sponsored by:

Fortinet View details

 
 

Presented by:

Thorsten Henning, Regional SE Director - DACH, Fortinet

 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Think Tank

Bring on The Cloud

Research shows over the next few years, there will be an explosion of new cloud services and solutions as subscription-based software-as-a-service (SaaS), platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS) are anticipated to grow drastically. This session will cover the future of cloud developments and share how organizations take advantage of the cloud. 

 Takeaways: 

  1.  How to take advantage of the ease and high-performance of the cloud 
  2.  How to keep your data secure when implementing cloud computing technology 
  3.  What to look for when working with cloud partners

Presented by:

Jose Jorge Santos, CIO Portugal - Head of Infrastructure Iberia, DB Schenker View details

 
 
 

12:40 pm - 1:50 pm

Working Lunch & Panel

The Revitalizing Change in the Role of the CXO

A CXO's role, goals and objectives have drastically changed over the years as most CXOs supervise teams and units beyond their IT's security. Because of these changes in responsibilities, a CXO's success is measured in greater business metrics. As a result, the role of a CXO has become both more attractive and more demanding.

Takeaways:

  1. What are the significant changes regarding the role of the CXO
  2. How to keep up with the changing requirements
  3. How to properly measure a CXO's success

Moderated by:

Rainer Rehm, President, (ISC)²

 

Panelists:

Bettina Uhlich, CIO, Evonik

 

Anja English, Global Head of Digital Marketing, Bayer

 

Francisco Gaspar, Lead CyberSecurity Architect, Telefonica (02) View details

 
 

Dr. Andreas Dannemann, CIO for Engine & Aircraft Systems, Lufthansa Group Airlines

 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Share:

Thought Leadership

3 Best Practices for Application Security (and Bonus Tip)

Applications are the lifeblood of the enterprise, but as the threats multiply, as applications move to the cloud, as legacy applications need to be maintained, and as organizations seek competitive advantage with new technologies and faster release cycles, it's easy to see that application security can be a thankless, endless and challenging job. 

Imperva has distilled three best practices (and a bonus tip) that help enterprises of any size vastly improve and simplify application security, accelerate threat detection and operationalize application security in a dynamic world where change is the only constant.

Sponsored by:

Imperva View details

 
 

Presented by:

Walo Weber, Senior Sales Engineer, Imperva View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Share:

Think Tank

How to Construct a Highly Successful Digitalization Strategy
  1. Key success factors to digitalization success 
  2. Drive appetite and risk taking in the business for new technologies
  3. What can we learn from start-ups in multi-billion companies 
  4. How technology changes our ways of making business decision

Presented by:

Tamas Toth, Global Head End-to-End SC Analytics, Digital Transformation, Novartis

 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Share:

Thought Leadership

Self-Driving WAN - What Autonomous Driving and SD-WAN Have in Common

Have you ever driven an autonomous car or can you imagine how an autonomous car can drive you safely through the city traffic? What is still being developed in other industries is already part of everyday life for the IT network. A self-driving WAN automatically controls your data traffic and thus ensures the highest quality of experience for your end users and IT, no matter where the applications are located. The SD-WAN of the future enables you to fully exploit the potential of the cloud within increasingly complex infrastructures while you sit back and relax. 

Let's discuss opportunities and future challenges together. 

  1. SD-WAN for connecting to cloud services, highest voice and video quality and reliable application performance 
  2. Comparison of two SD-WAN models: router-centric vs. business-oriented 
  3. Highest end-user experience through an autonomous system, supported by AI and machine learning

Sponsored by:

Silver Peak Systems Germany GmbH View details

 
 

Presented by:

Christian Scherf, Sales Director DACH, Silver Peak Systems Germany GmbH View details

 
 
 

3:20 pm - 3:30 pm

Afternoon Networking Coffee Break

 

3:35 pm - 4:00 pm

Executive Exchange

 

Share:

Think Tank

What Comes Next and Who Waits For it? Strategic Developments in Beyond-5G Mobile Networks Addressing AI, Big Data, and Privacy

We shall discuss some strategic developments in next generation mobile networks beyond 5G or 6G. Key is how they incorporate AI and big data processing into cloud-native solutions from scratch and how learning strategies will be adapted to secure trust and privacy. We shall critically review the role of blockchains, smart contracts in trust management platforms in different application contexts. 

Take aways: 

  1. New generation of mobile networks beyond will natively provide AI and big data processing solutions 
  2. Distributed learning strategies that incorporate privacy and trust will be predominant. Blockchains can help but scale badly 
  3. Trust management overlays support regulatory and administrative relationships as well as complex decision-making between stakeholders

Presented by:

Dr. Gerhard Wunder, Head of CIT Group - Heisenberg Associate Professor, Freie Universität Berlin

 
 

4:05 pm - 4:30 pm

Executive Exchange

 

Share:

Think Tank

Changing role of CIOs and CISOs

The role of modern IT Executives is more challenging than it has ever been before, not only because the technology landscape has become more complex, but also because IT execs had to become more business-focused. The role has moved from being merely a technologist and a service provider to being a digital business instigator, an ambassador of transformation and a leader. This is the role that most of IT executives are not prepared for. 

Modern businesses want to leverage technology to gain that competitive edge which not only secure their market-share but also generate more revenue, reduce costs, avoid risks and incorporate innovation. Now all eyes are fixed upon IT and enterprises are demanding that their technology executives join them in this journey and get involved in shaping business strategy, but are CIxOs ready to take their rightful place at the top table? To be successful, CIxOs not only need to invest in their staff, procure right technologies, adopt and align IT strategy with business but most importantly they must invest in themselves, in their brand and leadership skills. 

Takeaways: 

  1. Only strong CIxOs can lead their enterprise to success: to lead digital business initiatives, to act as a bridge between IT and business strategy, to gain the confidence of board and stakeholders, CIxO must work on their personal brand and skills. 
  2. IT leaders must master the art of "Communicating Strategy" by applying the basics of Marketing & Publicity to their communication tactics.  
  3. Dark side and light side of the force: CIxOs must master the ways of power, manipulation, warfare and storytelling to protect their reputation, build strong alliances, inspire loyalty and guarantee their own success and that of their team. 
  4. IT executives can no longer be reactive to business demands, and merely play defense while focusing on operational excellence, cost optimization and risk reduction, but rather play offense, hack the culture, affect the decision making process within the organization and coach stakeholders to win in turns.

Presented by:

Ali Farahani, Group CIO, ROXCEL Holding GmbH View details

 
 
 

4:35 pm - 5:00 pm

Executive Exchange

 

Share:

Think Tank

Success Factors of the Digital Transformation at Airbus

The space and defence industry is facing unprecedented opportunities and challenges in a world that is becoming more complex and less predictable. Airbus is right at the centre of this once-in-a-generation change. Digital and data is core to this multi-year transformation. 

Takeaways  

In his talk, Jürgen Urbanski, VP Digital at Airbus Defence and Space, will share a few of the lessons learned from transformations such as the one experienced by Airbus. He will focus on systemic issues there are prevalent in many large enterprises. The actionable insights for the audience will focus on how to make digital & data teams more self-sufficient with respect to extracting business value from their data, how to accelerate the digital transformation across the enterprise, and how to best leverage the value of a software ecosystem, using examples from aerospace and defence.

Presented by:

Juergen Urbanski, VP Digital at Airbus Defence and Space, Airbus Defence & Space

 
 

5:00 pm - 5:15 pm

What's the Next Stop On the Transformation Journey?

Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CISOs where common issues can be addressed and success stories can be shared.

Takeaways:

  1. Building an ongoing community with your peers can be an invaluable resource for tackling the digital transformation projects ahead of you
  2. Sharing stories of success (and failures) is not reserved to a one-day CISO Summit, but should be shared on a regular basis with your peers
 

5:15 pm - 6:30 pm

Summit Happy Hour