- Sophisticated Cyber Threats and Attacks: As the cyber threat landscape continues to evolve with increasingly sophisticated and persistent attacks, learn how to defend against advanced threats that can bypass traditional security measures
- Supply Chain and Third-Party Risk: Brainstorm the best ways to assess and manage the security posture of vendors, partners, and suppliers to prevent potential vulnerabilities from compromised systems
- Zero Trust Implementation: How can you rethink traditional security models, establish strict access controls, and ensure seamless user experiences?
- Regulatory and Compliance Complexities: Navigate a web of regulations, from GDPR and CCPA to emerging laws, and ensure their organization’s data handling practices align with these requirements
- Talent Acquisition and Retention: The persistent shortage of skilled IT professionals continues to challenge CIOs in building and maintaining high-performing teams. What do you need to do to attract top-tier talent, upskill existing employees, and foster a culture of continuous learning to navigate talent scarcity?
WELCOME TO CYBERSEC 2024 Where Visionary Cybersecurity Leaders Unite
to Fortify Tomorrow's Digital Frontier!
Discover the ultimate gathering ground for trailblazing CISOs and cybersecurity leaders at CyberSec 2024. As the technology ecosystem continues to evolve at an unprecedented pace, and every digital interaction carries unprecedented importance, the role of the CISO has never been more critical.
Join us at CyberSec 2024 and discover the insights, strategies, and connections that will empower you to safeguard the digital landscape of the future.
CyberSec 2024 is not just a conference; it's a nexus of innovation, collaboration, and forward-thinking insight.
Our high-level keynote presentations, interactive panels and round table discussions, led by industry luminaries and visionaries, will delve into the most pressing challenges and emerging trends in the cybersecurity landscape.
From AI-powered threat detection to blockchain-driven data integrity, our agenda is tailored to empower you with the tools and knowledge to stay ahead of the cyber curve.
Engage with a community of like-minded professionals who share your passion for defending against digital threats, and explore innovative solutions that will shape the future of cybersecurity.
Your seat at the CyberSec 2024 table awaits – let's shape the future together!
150
Thought Leaders on Site
30 +
Solutions on Show
57%
of IT leaders have been given extra budget to cope with the post-Covid WFH scenario
71%
of IT leaders prefer physical events to virtual events
42%
of IT leaders identify data security as a top priority
TOPICS TO BE COVERED INCLUDE:
Who Should Attend?
FIELD
IT Security, 50%
IT, 20%
Technology, 15%
Data, 10%
Governance, 5%
SENIORITY
C-Level, 60%
Directors/VP, 25%
Project Leads, 15%
- WFH & Hybrid
- Digital Transformation
- Cloud
- Collaboration
- Security
- Tooling
- Leadership
“Great discussions with other like-minded experts” – EAO
“A super opportunity to take a step back, reflect, see“A super opportunity to take a step back, reflect, see & learn things from other industries.”& learn things from other industries.” – IQVIA
“The room was truly world class. You could not imagine a better group to discuss what we discussed” – RightCrowd
EPN IT Vision at a Glance / Top 3 reasons you should attend
1: Save time & money by meeting your peers & discovering new technologies all in one place
2: Take part in dynamic discussions, tailored to you and your specific business concerns
3: 10+ hours of networking opportunities. Coordinate meetings, share your experiences, listen to talks.
You have full control of your agenda.
Expert Insights
20 + technology leaders will be delivering data, debate & discussions. Learn from the mistakes & successes of experts from some of the UK’s largest organisations…
Exclusive Features
A new awards show, match-made meetings, a full day of interactive roundtables, complimentary access to co-located events, and much more to take advantage of…
Like-minded Senior Peers
Meet with CIOs, CISO, CDOs, & CTOs to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities…
New Technologies
Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you…
JUST SOME OF OUR CONFIRMED VENDORS...
SPEAKERS, WORKSHOP & ROUNDTABLE LEADERS
YOUR AGENDA FOR THE DAY (Click below to expand)
Open Keynote Presentation
08:30 – 09:00: The Small States Problem: Ensuring a Fleet’s Cyber Resiliences
Industries are all faced with the increased challenge of bolstering cyber security resilience across enterprise-wide infrastructure and processes. For asset-intensive industries, it is about managing the very different lifecycles of physical assets and their components. By comparing the standardisation and harmonisation of cybersecurity guidelines and regulations in different branches at a European level, Andreas Hamprecht will discuss strategies on how to ensure cyber resilience in a focused and cost-effective manner. He will illustrate various learnings referring to use cases from the European mobility environment.
– Andreas Hamprecht, Chief Information Officer and Chief Digital Officer, Deutsche Bahn Regio
Keynote Presentation
Outwitting Emerging Cyber Threats in the Generative AI Era
- How to generate value with Generative AI
- Data leaks, phishing attacks and misinformation
- Employee-centric risks
- Recommendations for executives
– Kevin Weber, Enterprise Architecture Consultant, Accenture
Solution Spotlight Sessions
This focused session is your opportunity to learn more about the cutting edge technologies transforming the future of the IT and Cybersecurity markets. Each solution spotlight lasts just ten minutes.
Solution Spotlight #1: Deepfakes and Security Awareness Training – Dr. Martin Krämer, Security Awareness Advocate KnowBe4
Solution Spotlight #2: LeanIX – Make Transformation Fast, Not Furious – Dominik Söhnle, Senior Solutions Engineer LeanIX
Solution Spotlight #3: Passkeys are Key – the Future is Passwordless – Hena Kless, Solutions Consultant, LastPass
Solution Spotlight #4: Zero Trust: Password- & Key-less securing of critical IT/OT infrastructure – in the context of NIS 2.0 / DORA / IEC 62443 – Dietmar Wyhs, Sales Director DACH & CEE, SSH Communications Security
Coffee Break
1-2-1 Meetings/Conference Roundtables/Networking
Cyber Resilience Unleashed: Mastering the Art of the Comeback
- How to protect your backups against ransomware
- Get up and running after a cyber-attack in a clean state
- Integration of backup in SIEM and incident response strategy
- Automated tests of disaster recovery plans
– Felix Wandhoff, Enterprise Systems Engineer, VEEAM
How to Reduce your Downtime from Days to Minutes
- Disaster risk assessment and identification of critical asset
- Business impact of downtime and quantifying data loss
- Disaster Recovery (DR) Planning – best practices
- Evaluating on-premises, public and private cloud for DR
– Özer Bazar, Channel and Cloud GTM Leader Zerto – EMEA
Practical Ways to Achieve Cyber Detection and Response Related to the Feared ITSiG2.0, SzA, NIS2, DORA Regulations
Cyber incident detection and response is a category which has been included in KRITIS regulations. Although SzA should already be in use, many organisations are still in preparation phase. And the next big wave with NIS2 and DORA is just about to kick the door in. Let’s discuss how are you managing this question so far, what are possible strategies and what systems and organisational capabilities shall be brought up. After all, regulation is for the resilience of our society and so it’s useful to look at this topic from a practical aspect
– Greg Lesku, Head of International Operations, OT Security Consultant, Euro One
Lunch
Closing Keynote Presentation
CISOs and CIOs vs. Cyber Insurance: Friends or Foes? – How Balance Sheet Protection Drives the Digital Agenda
- Is it still necessary to focus on Cyber Security if coverage is available?
- How is actual cyber risk estimated/quantified and communicated to boards and decision-makers
- How do insurance requirements steer organisations into more security
- Lessons for organisations from current market discussion
– Konstantin Bittig, Director Cybersecurity & Risk DACH, Aon
Closing Keynote Panel
The Future Role of Technology Leaders: Connecting Business Value to Security
- The C-level role as a digital business leader: promoting the value proposition of information technology and cyber security
- The increasing importance of diversity in achieving business goals
- How to articulate cyber and information security’s business value to non-technical stakeholders
- Minimising threats and vulnerabilities AND driving business enablement at an acceptable and cost-effective level of risk
- Talking the language of business in communicating risk
Moderated by:
– Konstantin Bittig, Director Cybersecurity & Risk DACH, Aon
Panellists:
– Max Imbiel, Deputy Group CISO, N26
– Dr Matthias Orthwein, Partner, SKW Schwarz
– Fawsy Bendeck, Senior Principal, Accenture
YOUR TECHNOLOGY SHOWCASE
Are you looking to showcase what you have on offer? Connect with the leading decision-makers in IT through thought-leadership, brand awareness, & personal 1-on-1 time. Build your trust & demonstrate your value at EPN IT Vision 2022.
Sponsorship packages can be tailored-made to meet your requirements. Contact the sponsorship team to find out how you can utilise your opportunity to meet the CIO community.
- ITSM
- Identity & Access Management
- Communications
- API
- IOT
- Remote IT
- CRM & ERP
- DevOps
- Network Infrastructure
- 3rd Party Risk
- Cloud Management
- Data Management
- AI & Automation
- Mobile & Applications
- Monitoring & Reporting
- Security
TITANIUM
- Exhibition Space in Tier 1 Area
- Solution Spotlight Slot
- Host a Roundtable
- 5 x 121 meetings in the build up and over the course of the day
Co-branding on All Literature - Priority networking
- Bespoke Thought Leadership Dinner the night before
PLATINUM
- Exhibition Space in Tier 1 Area
- Solution Spotlight Slot
- Host a Roundtable
- 5 x 121 meetings in the build up and over the course of the day
- Co-branding on All Literature
- Priority networking
- Host a Roundtable
GOLD
- Exhibition Space in Tier 1 Area
- Solution Spotlight Slot
- 5 x 121 Meetings in the build up and over the course of the day
- Co-Branding on All Literature
- Priority Networking
SILVER
- Exhibition space in Tier 2 Area
- 3 x 121 Meetings in the build-up and over the course of the day
- Co-Branding on Some Literature, Networking Sponsorship
BRONZE
- Exhibition space in Tier 3 Area
- Co-Branding on Some Literature
- Networking Sponsorship
ENTRY-LEVEL SPONSORS
- Branded Table in the Coffee Area
- Networking Sponsorship
Take Part in the Conference / Top 3 ways you can gain exposure
1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.
2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.
3: We know the power of face-to-face business networking. You should be part of the conversation.
Thought-Leadership
Position yourself among the leading experts of IT development & application. Let the IT community know that you are integral expert in the conversation.
Brand Visibility
Get your foot in the door as IT leaders seek for new applications & technologies by showing the solution is out there… they just need to know what it is.
Demonstrating Value
Take part in the Product Demonstrations & showcase your capabilities, so that your potential clients can learn that you are right for them
Maintain Relationships
With f2f being too long missed, reconnect with your existing clients & show that you are ready & wanting more.