EPN Live
  • Home
  • Future Events
    • 2023 Events
      • InfoTech
      • CyberSec
      • Bespoke Evenings
      • Virtual Roundtables
    • 2024 Events
      • InfoTech
      • CyberSec
  • Previous Events
    • 2022 Events
      • InfoTech
      • CyberSec
      • Bespoke Evenings
    • 2023 Events
      • CyberSec
      • InfoTech
      • Bespoke Evenings
      • Virtual Roundtable
  • About Us
  • Solutions
    • Bespoke Dinners
  • Register your Interest
  • EPN TV

CyberSec 2023, Munich

  • Home
  • >> 2023 CyberSec Events>>
  • CyberSec 2023, Munich
alt
alt
alt

WELCOME! / Network & Learn with the CIO Community

The modern IT leader must navigate an ever-changing ever-growing minefield to be ahead of the curve. To deliver business value & reinforce an organisation’s posture, the CIO, CTO, CDO & CISO must have an impenetrable partnership alongside the full board. No challenge is too big or too small for the IT professional including; the new opportunities in technology, overcoming cumbersome infrastructure, an increasing IT skill shortage, the acceleration of cyberattacks, steep rises in data & the possibilities of what can come of it. With many organisations experiencing mergers, demergers, or acquisitions, complexity is exponentially obscuring your path to growth.

This March, senior IT thought-leaders will gather for the unmissable opportunity to benchmark your progress & sense-check your strategies. Join us to listen, learn & share your experiences & solve the most pertinent challenges of today.

200
Thought Leaders on Site

30 +
Solutions on Show

57%

of IT leaders have been given extra budget to cope with the post-Covid WHF scenario

71%

of IT leaders prefer physical events to virtual events

42%

of IT leaders identify data security as a top priority


CONSTRUCT A PERSONALISED AGENDA

With EPN Live, you create your own interactive agenda, having complete control over the day from start to finish.

Choose between:

  • Plenary Speeches. Discover the strategies of the industry’s top IT leaders. Find the answers to your own questions using Sli.do & the roaming mics.
  • Roundtable Discussions. These interactive discussions enable you to get involved with the debate. Share your experiences, gain feedback, & learn from the leading experts of the industry.
  • Vendor Meetings. Make the most of your day with personal 121 pre-determined meetings based on your business needs
  • Open Networking Area. Join informal networking to get time with your peers.
  • Advanced Technology Expo. Discover the latest technologies transforming the IT environment.
  • Product Demos. See tech in action so you can unlock product potential

Who Should Attend?

FIELD

IT Security, 50%
IT, 20%
Technology, 15%
Data, 10%
Governance, 5%

SENIORITY

C-Level, 60%
Directors/VP, 25%
Project Leads, 15%

  • WFH & Hybrid
  • Digital Transformation
  • Cloud
  • Collaboration
  • Security
  • Tooling
  • Leadership

“Great discussions with other like-minded experts” – EAO

“A super opportunity to take a step back, reflect, see“A super opportunity to take a step back, reflect, see & learn things from other industries.”& learn things from other industries.” – IQVIA

“The room was truly world class. You could not imagine a better group to discuss what we discussed” – RightCrowd


EPN CyberSec at a Glance / Top 3 reasons you should attend

1: Save time & money by meeting your peers & discovering new technologies all in one place

2: Take part in dynamic discussions, tailored to you and your specific business concerns

3: 10+ hours of networking opportunities. Coordinate meetings, share your experiences, listen to talks.

You have full control of your agenda.

Expert Insights

20 + technology leaders will be delivering data, debate & discussions. Learn from the mistakes & successes of experts from some of the UK’s largest organisations…

Exclusive Features

A new awards show, match-made meetings, a full day of interactive roundtables, complimentary access to co-located events, and much more to take advantage of…

Like-minded Senior Peers

Meet with CIOs, CISO, CDOs, & CTOs to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities…

New Technologies

Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you…


JUST SOME OF OUR CONFIRMED VENDORS...

alt 1
alt 1
alt 1
alt 1
alt 1
alt 1
alt 1
alt 1
alt 1
alt 1
alt 1
alt 1
alt 1

SPEAKERS & ROUNDTABLE LEADERS

Dr. Andreas Hamprecht

Dr. Andreas Hamprecht

DB Regio

Konstantin Bittig

Konstantin Bittig

AON

Matthias Träger

Matthias Träger

Zerto, a Hewlett Packard Enterprise Company

Jelle Wieringa

Jelle Wieringa

KnowBe4

Stephan von Gündell-Krohne

Stephan von Gündell-Krohne

CrowdStrike GmbH

Aris Koios

Aris Koios

CrowdStrike GmbH

Wolf Oelschlegel

Wolf Oelschlegel

CTERA

Dirk Neumann

Dirk Neumann

CTERA

Christoph Bernius

Christoph Bernius

Allianz Deutschland AG

James Blake

James Blake

Cohesity

Ralf Schmitz

Ralf Schmitz

Corelight

Andreas Bechter

Andreas Bechter

Cloudflare


YOUR PLENARY SESSIONS

  • OPENING KEYNOTE
  • CLOSING KEYNOTE
  • PANEL DISCUSSION

OPENING KEYNOTE

The Business-Value First CIO – How can you set up a value-driven IT portfolio? People, process & story creation  

Dr. Andreas Hamprecht, CIO & CDO, DB Regio   

  • Overview: Challenges in digitalisation & IT management  
  • How to approach streamlining your portfolio to ensure the delivery of business value  
  • Generating corporate buy-in in your plans through simplification in your digital story-telling  

CLOSING KEYNOTE

Contradiction or evolution? Leveraging lean governance and Agile Methods within the Information Security Management

Christoph Bernius, CISO, Allianz Deutschland AG

PANEL DISCUSSION

AI. ML. Tooling – Navigating the saturated tech market & identifying the innovative technology that can streamline your techstack

  • How to effectively measure ROI before adopting new technology
  • How to build agility & useability into your tech offerings
  • An assessment of advanced technology that could be critical for your future stack

YOUR INTERACTIVE ROUNDTABLE DISCUSSIONS

  • DATA BREACH
  • RANSOMWARE AND WIPER ATTACKS
  • MITIGATING COMPLEXITY
  • NETWORK SECURITY
  • CYBER CRIME WORKSHOP
  • DATA SECURITY AND GOVERNANCE

DATA BREACH

How to avoid the next data breach 

Led by Aris Koios, Technology Strategist, CrowdStrike 

RANSOMWARE AND WIPER ATTACKS

The looming threat of ransomware and wiper attacks

Led by James Blake, EMEA CISO, Cohesity

Share best practises hosted by those who have seen what works – and what doesn’t, on the coal face of ransomware and wiper attacks

MITIGATING COMPLEXITY

How can you maintain simplicity of your security infrastructure & tactics whilst contending with a growingly complex environment

  • How can we achieve a reduction in complexity & increased agility without sacrificing the robustness of your security infrastructure?
  • Traversing the wealth of strategic & technical knowledge & translating for an effective plan the whole organisation can get behind
  • How much sense does strict security policies support a complex & agile world?

NETWORK SECURITY

Network Transparency with Open NDR

Led by Ralf Schmitz, Corelight

  • What are the drivers for NDR technologies?
  • What does Gartner say about the SOC Visibility Triad?
  • What are the advantages of an “Open NDR” versus “Closed NDR” solution?
  • How can an NDR solution support encrypted data?
  • On-Prem versus Cloud Einsatzbereiche

CYBER CRIME WORKSHOP

Mitigating your exposure to cyber risk through cyber risk quantification

Led by Konstantin Bittig, Director Cyber Risk and Security, DACH, AON 

  • Best practice approaches to quantitative risk assessment in cyber security
  • Determining where and what to priorise in clear business term
  • Evaluating the most effective data-driven metrics 
  • Translating data into strategic decision-making 

DATA SECURITY AND GOVERNANCE

Leverage Data Security and Governance Best Practices to Secure your Mission Critical Data 

Led by Jeff Sizemore, Chief Governance Officer, Egynte and Robert Warner, Commercial Account Executive EMEA, Egynte 

This session will walk you through findings from Egnyte’s “Cybersecurity Trends for Mid-Sized Organisations,” study, an independent analysis of data governance and cybersecurity practices at 400 mid-sized companies. We will also discuss the importance of having secure data enclaves in helping you attain your cybersecurity goals and adhering to the latest compliance regulations. 

Audience Takeaways: 

  • Find out about best practices your industry peers are utilising 
  • Learn the latest data governance trends 
  • Learn about secure data enclave  
  • Advance Privacy & Compliance  

LIVE ON STAGE PRODUCT DEMONSTRATIONS & TALKS

  • CLOUDFLARE
  • CTERA
  • APPVIEWX
  • CROWDSTRIKE
  • KNOWBE4
  • RISKRECON
  • DARKTRACE
  • BLUEJEANS

CLOUDFLARE

Don’t be the next victim in the news – how you can get ahead of the attacker!

Andreas Bechter, Senior Solutions Engineer

CTERA

Secure and Cost-Effective NAS Migrations to the Cloud with CTERA

Wolf Oelschlegel, Director of Sales DACH and Dirk Neumann, SE Director DACH

Join our demo session led by Wolf Oelschlegel, Director of Sales DACH and Dirk Neumann, SE Director DACH who will be answering all of the above and conducting a demo of our award-winning global files system

Are you wanting to migrate your legacy NAS data to the cloud, but have concerns about:

  • Loss of control?
  • Maintaining security, data sovereignty, and GDPR compliance?
  • Increased risk of ransomware attacks?
  • Costs of migrating to the cloud?
  • Costs of accessing data once in the cloud?

APPVIEWX

Reducing Software Supply Chain Risk with Certificate Lifecycle Management 

Govind Yadav, Senior Solutions Engineer, AppViewX

Software supply chain cyberattacks like what we saw with SolarWinds are on the rise as bad actors take advantage of every available weakness to exploit organizations. While digital certificates are foundational for enterprise security, they have also become an attack vector when not properly managed. With growing multi/hybrid cloud environments, organizations have more machine and application identities to govern and protect than ever before. It’s not surprising that more than a year after the SolarWinds software supply chain attack, nearly 65% of organizations still remain vulnerable according to new Ponemon research.

Lack of visibility continues to challenge organizations with uncertainty about the number of machine identities, where certificates are deployed and how they are governed. Tracking digital certificates manually is error-prone, costly and inefficient – placing organizations at risk of unplanned outages and security breaches.

Join this session for best-practice guidelines to managing machine identities with automated certificate lifecycle management, which provides you with:

  • Visibility: Shift to a proactive security mode with a holistic view into certificates deployed across your complex environment
  • Control: Improve governance by enforcing business-specific policies and enabling centralized secure provisioning certificates
  • Automation: Achieve crypto-agility at scale while maintaining security standards and compliance mandates

CROWDSTRIKE

CrowdStrike, an overview – Innovating for the Future of Security

Stephan von Gündell-Krohne, Regional Sales Director Enterprise, CrowdStrike

KNOWBE4

Security Culture; Making Cybersecurity an Active part of Your Organization  

Jelle Wieringa, Security Awareness Advocate, KnowBe4

Having a successful security posture is more easily said than done. It takes a well-designed strategy for a host of multi-faceted parameters to come together to truly bring security to an organization.

Security Culture, being the ideas, customs, and social behaviors of an organization that influence security, is a powerful tool to help nurture and sustain that which keeps your organization safe.

In this session, we’ll hear from industry expert Jelle Wieringa about how to use security culture to your advantage. Based on statistics from academic research, combined with real-world experience, you’ll hear everything you need to know to better understand what it can bring you and your organization.

In this session you will learn:

  • What defines a Security Culture;
  • How can you measure and better understand your existing security culture;
  • What are proven and practical ways to grow your security culture?

RISKRECON

Overcoming Threats in Your Digital Supply Chain 

Mirco Rohr, Director, Solutions Consulting, RiskRecon 

Every organization is experiencing risks in its digital supply chain.  Whether that risk is seen or unseen, there is a weak link somewhere.  As these risks continue to rise, it is critical that firms effectively assess, monitor, and manage supply chain risk to prioritize the threats that would have the largest impact on their business operations. 

Join third-party risk experts from RiskRecon, a Mastercard Company for this session, where attendees will learn: 

  • Why supply chain risk management has become a priority 
  • How supply chain risk impacts your organization 
  • How you can manage supply chain risk effectively 

DARKTRACE

How AI Can Think Like an Attacker 

Christina Schex, Sales Teamlead, Darktrace

BLUEJEANS

Business Continuity for Enterprise Communication

Franziska Brandl, Sales Director DACH, BeNeLux, Nordics, BlueJeans by Verizon

  • How to maintain your enterprise communications in the event of an outage
  • How to secure and deliver your business-critical meetings with complete confidence.

YOUR TECHNOLOGY SHOWCASE

Are you looking to showcase what you have on offer? Connect with the leading decision-makers in IT through thought-leadership, brand awareness, & personal 1-on-1 time. Build your trust & demonstrate your value at EPN IT Vision 2022.

Sponsorship packages can be tailored-made to meet your requirements. Contact the sponsorship team to find out how you can utilise your opportunity to meet the CIO community.

  • ITSM
  • Identity & Access Management
  • Communications
  • API
  • IOT
  • Remote IT
  • CRM & ERP
  • DevOps
  • Network Infrastructure
  • 3rd Party Risk
  • Cloud Management
  • Data Management
  • AI & Automation
  • Mobile & Applications
  • Monitoring & Reporting
  • Security

TITANIUM

  • Exhibition Space in Tier 1 Area
  • Product Demo/ Keynote Speech
  • 5 x 121 meetings in the build up and over the course of the day
  • Co-branding on All Literature
  • Priority networking
  • Bespoke Thought Leadership Dinner the night before

PLATINUM

  • Exhibition Space in Tier 1 Area
  • Product Demo/ Keynote Speech
  • 5 x 121 meetings in the build up and over the course of the day
  • Co-branding on All Literature
  • Priority networking
  • Host a Roundtable

GOLD

  • Exhibition Space in Tier 1 Area
  • Product Demo
  • 5 x 121 Meetings in the build up and over the course of the day
  • Co-Branding on All Literature
  • Priority Networking

SILVER

  • Exhibition space in Tier 2 Area
  • 3 x 121 Meetings in the build-up and over the course of the day
  • Co-Branding on Some Literature, Networking Sponsorship

BRONZE

  • Exhibition space in Tier 3 Area
  • Co-Branding on Some Literature
  • Networking Sponsorship

ENTRY-LEVEL SPONSORS

  • Branded Table in the Coffee Area
  • Networking Sponsorship

Take Part in the Expo / Top 3 ways you can gain exposure

1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.

2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.

3: We know the power of face-to-face business networking. You should be part of the conversation.

Thought-Leadership

Position yourself among the leading experts of IT development & application. Let the IT community know that you are integral expert in the conversation.

Brand Visibility

Get your foot in the door as IT leaders seek for new applications & technologies by showing the solution is out there… they just need to know what it is.

Demonstrating Value

Take part in the Product Demonstrations & showcase your capabilities, so that your potential clients can learn that you are right for them

Maintain Relationships

With f2f being too long missed, reconnect with your existing clients & show that you are ready & wanting more.


Interested? / Check out the event brochure



Register

REGISTER NOW

Date: 9th March 2023 You can secure your place now in just one of the 3 simple ways:
  • Call us on 0204 540 4484 & we can process your registration over the phone
  • Contact Michelle Mitchell on [email protected]
Are you busy on the dates? You can refer a colleague by filling out the recommendation form using the button below & we will get in touch soon.

VENUE:
Werner-Heisenberg-Allee 25
80939
München
Germany

CONTACT US


For delegate enquiries:
Michelle Mitchell
[email protected]


For operational enquiries:
Alice Foster
[email protected]

About Us

EPN is a network of C-Level professionals across all functions - IT, IT Security, HR, Finance, Marketing and Operations.

[email protected]

Upcoming Events

  • InfoTech 2023, Manchester
  • CyberSec 2023, Manchester
  • InfoTech 2023, Zurich
  • CyberSec 2023, Zurich

Info Links

  • Home
  • Events
  • About Us
  • Solutions
  • EPN TV
  • Contact us

Follow Us

  • Youtube
  • Linkedin
  • Copyright © 2022 EPN Ltd – All Rights Reserved.
  • Privacy Policy and Terms and Conditions
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT