EPN Live
  • Home
  • Future Events
    • 2025 Events
      • Bespoke Evenings
      • CyberSec Events
      • CyberSec Virtual
      • Infotech Events
      • InfoTech Virtual
      • Pharma Europe
      • Virtual Round Tables
  • Previous Events
    • 2022 Events
      • 2022 Bespoke Evening
      • 2022 CyberSec Events
      • 2022 InfoTech Events
    • 2023 Events
      • 2023 Bespoke Evening
      • 2023 CyberSec Events
      • 2023 InfoTech Events
    • 2024 Events
      • 2024 Bespoke Evenings
      • 2024 CyberSec Events
      • 2024 InfoTech Events
      • 2024 Virtual Events
    • 2025 Events
      • Bespoke Evenings
      • CyberSec Events
      • InfoTech Events
      • Virtual Events
  • Testimonials
    • Solutions
      • Bespoke Dinners
      • Business Intelligence
      • EPN Virtual
      • One-to-One, C-Level, Virtual Meetings
  • Register Interest
  • EPN TV

CyberSec 2025, DACH

  • Home
  • >> 2025 Events>>
  • CyberSec 2025, DACH

Welcome to CyberSec DACH (Virtual) Where Visionary CISOs Shape Tomorrow's Digital Landscape

Welcome to the Virtual DACH CyberSec Conference, where the foremost experts in cybersecurity converge to forge the path ahead. Join an elite group of C-level executives from Germany, Austria, and Switzerland, gathered in a digital environment dedicated to advancing cybersecurity strategies and solutions.

Take part in state-of-the-art discussions, where keynote speakers reveal the latest cybersecurity trends and breakthroughs, and interactive round table sessions spark dynamic exchanges of ideas. From addressing emerging cyber threats to ensuring compliance with data protection regulations, this conference is your portal to invaluable knowledge and networking opportunities.
Settle into your virtual workspace, prepared to connect with industry leaders, acquire actionable insights, and explore practical solutions tailored to the unique challenges of the DACH region. Welcome to a day of learning, collaboration, and empowerment. Welcome to the Virtual DACH CyberSec Conference.


Benefits of the Virtual Event:
• Global Accessibility: No matter where you are located, you can participate in this event without the need for travel. Attend from your office or home, eliminating the hassle and cost of commuting.
• Flexibility: Our online format allows you to design your schedule efficiently. Attend live sessions or access recordings later, ensuring you won't miss any critical insights even if your daily responsibilities demand your attention.
• Enhanced Networking Opportunities: Connect with C-level peers from diverse industries virtually. Engage in meaningful conversations and build valuable connections through our virtual networking platform, offering seamless interaction opportunities.
• Interactive Round Table Discussions: Our online platform facilitates small group discussions, ensuring every attendee's voice is heard, and valuable insights are exchanged.
• Expert Speakers and Content: Access presentations and keynote sessions from top industry experts, all carefully curated to provide actionable insights and up-to-date knowledge on cybersecurity.
• One-to-One Meetings: take the opportunity to connect with solution providers in pre-scheduled one-to-one meetings to delve into tailored solutions for your specific information technology challenges


Key Takeaways for C-Level Attendees:
• Comprehensive Understanding: Gain a holistic view of the latest trends, challenges, and best practices in Cybersecurity to make informed decisions for your organisation's protection.
• Real-World Solutions: Explore case studies and success stories from industry leaders who have effectively navigated cybersecurity threats and implemented robust security measures.
• Strategic Insights: Obtain valuable guidance on crafting a proactive cybersecurity strategy tailored to your company's unique requirements and risk appetite.
• Incident Response Preparedness: Learn about the latest incident response techniques to effectively mitigate and manage cyber-attacks, minimizing potential damages.
• Peer Learning: Engage in discussions with fellow C-level executives, sharing experiences, and learning from their approaches to information security and cybersecurity challenges.


JUST SOME OF OUR PARTNERS...


SPEAKERS, WORKSHOP & ROUNDTABLE LEADERS (TO BE ANNOUNCED SOON)


150
Thought Leaders online

20 +
Solutions on Show

57%

of IT leaders have been given extra budget to cope with the post-Covid WFH scenario

42%

of IT leaders identify data security as a top priority


Topics to be covered include:

Sessions Include: 

  • Understanding the Current Cyber Threat Landscape 
  • Strengthening Your Organization’s Cyber Defense 
  • Building a Resilient Cybersecurity Culture 
  • Cybersecurity Investment Strategies for Business Continuity 
  • Managing Third Party Risk 
  • Ransomware 

Who Should Attend?

FIELD

IT Security, 78%
Data, 12%
Governance, 10%

SENIORITY

C-Level, 60%
Directors/VP, 25%
Project Leads, 15%

  • WFH & Hybrid
  • Digital Transformation
  • Cloud
  • Collaboration
  • Security
  • Tooling
  • Leadership

“Great discussions with other like-minded experts” – EAO

“A super opportunity to take a step back, reflect, see“A super opportunity to take a step back, reflect, see & learn things from other industries.”& learn things from other industries.” – IQVIA

“The room was truly world class. You could not imagine a better group to discuss what we discussed” – RightCrowd


EPN IT Vision at a Glance / Benefits of the Virtual Event:

1: Save time & money by meeting your peers & discovering new technologies all in one place

2: Take part in dynamic discussions, tailored to you and your specific business concerns

3: 10+ hours of networking opportunities. Coordinate meetings, share your experiences, listen to talks.

You have full control of your agenda.

Expert Insights

20 + technology leaders will be delivering data, debate & discussions. Learn from the mistakes & successes of experts from some of the US largest organisations…

Like-minded Senior Peers

Meet with CIOs, CISO, CDOs, & CTOs to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities…

New Technologies

Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you…


YOUR AGENDA FOR THE DAY (CLICK BELOW TO EXPAND)

Opening Keynote

Keynote Presentation: The Evolving Threat Landscape: Understanding the New Breed of Cyberattacks

The cybersecurity landscape is constantly shifting, with attackers leveraging new technologies and tactics. This presentation will explore the latest trends in cyberattacks, including the rise of ransomware-as-a-service (RaaS), supply chain attacks, and attacks targeting the Internet of Things (IoT).

  1. Understand the evolving nature of cyber threats.
  2. Identify the most prevalent attack vectors impacting US businesses.
  3. Gain insights into the motivations and tactics of modern attackers.

 

Presentation: Building a Proactive Security Posture: Strategies for Mitigating Risk

In today’s complex threat environment, a reactive security approach is no longer sufficient. This session will explore strategies for building a proactive security posture, including threat intelligence gathering, vulnerability management, and incident response planning.

  1. Learn how to leverage threat intelligence to make informed security decisions.
  2. Implement effective vulnerability management practices to prioritize patching efforts.
  3. Develop a robust incident response plan to minimize the impact of cyberattacks.

Roundtables

Roundtable Discussions

Attendees will rotate through five concurrent roundtable discussions facilitated by industry experts. These sessions will provide an opportunity for in-depth discussion on critical cybersecurity topics.

 

Roundtable 1: Cybersecurity Workforce Challenges: Strategies for Recruitment and Retention

Roundtable 2: Zero Trust Security: Implementation Considerations and Best Practices

Roundtable 3: The Future of Security: How Emerging Technologies are Shaping the Landscape

Roundtable 4: Navigating Data Privacy Regulations: A Compliance Roadmap for CISOs

Roundtable 5: Integrating Security with Business Objectives: Building Collaborative Relationships

Closing Keynote

Presentation: Securing the Cloud: Best Practices for Managing Cloud Security Risks

Cloud adoption has become ubiquitous, but it also introduces new security challenges. This presentation will explore best practices for managing cloud security risks, including securing cloud infrastructure, data encryption, and identity and access management (IAM).

  1. Understand the shared responsibility model in cloud security.
  2. Identify key strategies for securing cloud infrastructure and data.
  3. Learn how to implement robust IAM controls for cloud environments.

 

Presentation: Human Factor in Cybersecurity: Building a Culture of Security Awareness

Employees can be a critical security vulnerability if they are not aware of cyber threats and best practices. This presentation will explore strategies for building a culture of security awareness, including employee training, phishing simulations, and incident reporting programs.

  1. Develop an effective security awareness training program for your organization.
  2. Implement ongoing phishing simulations to assess employee susceptibility.
  3. Create a culture of security where employees feel empowered to report suspicious activity.

YOUR TECHNOLOGY SHOWCASE

Are you looking to showcase what you have on offer? Connect with the leading decision-makers in IT through thought-leadership, brand awareness, & personal 1-on-1 time. Build your trust & demonstrate your value at EPN IT Vision 2025.

Sponsorship packages can be tailored-made to meet your requirements. Contact the sponsorship team to find out how you can utilise your opportunity to meet the CIO community.

  • ITSM
  • Identity & Access Management
  • Communications
  • API
  • IOT
  • Remote IT
  • CRM & ERP
  • DevOps
  • Network Infrastructure
  • 3rd Party Risk
  • Cloud Management
  • Data Management
  • AI & Automation
  • Mobile & Applications
  • Monitoring & Reporting
  • Security

TITANIUM

  • Exhibition Space in Tier 1 Area
  • Solution Spotlight Slot
  • Host a Roundtable
  • 5 x 121 meetings in the build up and over the course of the day
    Co-branding on All Literature
  • Priority networking
  • Bespoke Thought Leadership Dinner the night before

PLATINUM

  • Exhibition Space in Tier 1 Area
  • Solution Spotlight Slot
  • Host a Roundtable
  • 5 x 121 meetings in the build up and over the course of the day
  • Co-branding on All Literature
  • Priority networking

GOLD

  • Exhibition Space in Tier 1 Area
  • Solution Spotlight Slot
  • 5 x 121 Meetings in the build up and over the course of the day
  • Co-Branding on All Literature
  • Priority Networking

SILVER

  • Exhibition space in Tier 2 Area
  • 3 x 121 Meetings in the build-up and over the course of the day
  • Co-Branding on Some Literature, Networking Sponsorship

BRONZE

  • Exhibition space in Tier 3 Area
  • Co-Branding on Some Literature
  • Networking Sponsorship

ENTRY-LEVEL SPONSORS

  • Branded Table in the Coffee Area
  • Networking Sponsorship

Take Part in the Expo / Top 3 ways you can gain exposure

1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.

2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.

3: We know the power of face-to-face business networking. You should be part of the conversation.

Thought-Leadership

Position yourself among the leading experts of IT development & application. Let the IT community know that you are integral expert in the conversation.

Brand Visibility

Get your foot in the door as IT leaders seek for new applications & technologies by showing the solution is out there… they just need to know what it is.

Demonstrating Value

Take part in the Product Demonstrations & showcase your capabilities, so that your potential clients can learn that you are right for them

Maintain Relationships

Attending our conferences offers invaluable networking opportunities, fostering meaningful connections with industry leaders and peers. Additionally, engaging in live discussions enhances learning experiences, ensuring attendees stay ahead in their fields.


Register

REGISTER NOW

Date: 20th March
  • Call us on 0204 540 4484 & we can process your registration over the phone
  • Contact Kate Wood on kwood@epnlive.com
Are you busy on the dates? You can refer a colleague by filling out the recommendation form using the button below & we will get in touch soon.

Secure your spot now to be part of this prestigious Virtual C-Level Summit. Register today and empower yourself with the knowledge and connections needed to safeguard your organization's digital future.

MEET THE TEAM


For delegate enquiries:
Kate Wood
kwood@epnlive.com


For operational enquiries:
Natalia Jankowska
njankowska@epnlive.com

About Us

EPN is a network of C-Level professionals across all functions - IT, IT Security, HR, Finance, Marketing and Operations.

info@epnlive.com

Upcoming Events

  • CyberSec Berlin 2025
  • CyberSec Zurich 2025
  • Infotech Zurich 2025

Info Links

  • Home
  • Events
  • About Us
  • Solutions
  • Contact us

Follow Us

  • Youtube
  • Linkedin
  • Copyright © 2022 EPN Ltd – All Rights Reserved.
  • Privacy Policy and Terms and Conditions
  • EPN Live is a member of The CPD Certification Service
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT