EPN Live
  • Home
  • Future Events
    • 2026 Events
      • Bespoke Events
      • AITech Events
      • CyberSec Events
      • InfoTech Events
      • EPN Dining Club
        • CyberSec Dining Club
        • Infotech Dining Club
      • Thought Leadership Weeks
        • Munich
        • Stockholm
        • Zurich
        • London May
        • Milan
        • Amsterdam
        • Boston
        • Frankfurt
        • New York
        • London October
        • Dubai
        • Madrid
        • Paris
        • Berlin
  • Previous Events
    • 2026 Events
    • 2025 Events
      • Bespoke Evenings
      • CyberSec Events
      • AITech Events
      • InfoTech Events
      • Virtual Events
  • Testimonials
  • Solutions
    • Bespoke Dinners
    • Business Intelligence
    • EPN Virtual
    • One-to-One, C-Level, Virtual Meetings
  • Register Interest
  • EPN TV

CyberSec 2026, Munich

  • Home
  • >> 2026 Events>>
  • CyberSec 2026, Munich

WELCOME TO CYBERSEC MUNICH 2026 The Strategic Summit for Cybersecurity Leaders

In an era where cyber risk is business risk, CyberSec Munich 2026 is where critical decisions are shaped, strategies are challenged, and next-gen solutions are discovered.

Join senior cybersecurity and technology leaders across Munich and beyond for a high-impact day of insight, intelligence, and interaction. CyberSec is purpose-built for CISOs and security leaders navigating today’s complex digital environment—from regulatory pressure and board-level accountability to AI-fuelled threats and fractured global supply chains.

Why Attend?

At CyberSec, attendees curate their own experience by building a personalised agenda tailored to their strategic priorities. From thought-provoking keynotes delivered by global security leaders to focused round table discussions tackling sector-specific challenges, every session is designed to spark actionable insight. Delegates also have the opportunity to engage in 1-2-1 meetings with cutting-edge cybersecurity innovators—making CyberSec not just a conference, but a dynamic platform for solving real-world security problems, discovering new technologies, and accelerating strategic outcomes.

• Cut through the noise: Gain practical insight into what really matters in threat detection, AI defence, zero trust, incident response, and more.

• Shape the agenda: Contribute to interactive roundtables and candid conversations that tackle real-world security challenges.

• Stay ahead of disruption: Learn how your peers are managing risk, aligning security with business priorities, and scaling secure innovation.

• Build your network: Connect with fellow CISOs, policy influencers, and industry pioneers in an exclusive, executive setting.


SOME OF OUR PARTNERS...


SOME OF OUR ATTENDEES...


SPEAKERS, WORKSHOP & ROUNDTABLE LEADERS:

Dr Daniel Lemmer

Dr Daniel Lemmer

Corporate Cyber and Information Technology Security Officer

Elena Zerner-Kaening

Elena Zerner-Kaening

Head of IT Infrastructure

Aenova Group

Konstantin Bittig

Konstantin Bittig

Head of Underwriting, Germany

Coalition Inc

Klaus-E. Klingner

Klaus-E. Klingner

Information Security Officer

Asam Beauty

Ali Baccouche

Ali Baccouche

Regional Information Security & Data Privacy Officer, EMEA

Texas Instruments

Naveen Ullikashi

Naveen Ullikashi

CISO

Allianz Direct

Dr. Gunnar Siebert

Dr. Gunnar Siebert

Chief Cyber Advisor

Howden Broking

Marko Schlensok

Marko Schlensok

Account Manager

Keeper Security

Sebastian Pini

Sebastian Pini

NinjaOne

Senior Solutions Engineer

Darren James

Darren James

Specops Software

Senior Product Manager


150 +
Thought Leaders on Site

20 +
Solutions on Show


Who Should Attend?

Decision-makers, strategic influencers, and technical leaders responsible for organisational cybersecurity, risk management, infrastructure, and data protection:

  • Chief Information Security Officer (CISO)
  • Chief Security Officer (CSO)
  • Chief Information Officer (CIO)
  • Chief Technology Officer (CTO)
  • Chief Risk Officer (CRO)
  • Chief Data Officer (CDO)
  • Chief Compliance Officer (CCO)

KEY TOPICS TO INCLUDE

  • Next-Gen Threats & AI-Powered Attacks
  • Zero Trust Architecture in Action
  • Securing the Cloud & Hybrid Infrastructure
  • Incident Response Readiness & Crisis Management
  • Regulatory Compliance & Governance at Scale
  • Cyber Risk Quantification & Business Alignment
  • Insider Threats & Identity Access Management
  • Board-Level Reporting & CISO Leadership Strategy
  • Resilience in Critical Infrastructure & OT Security
  • The Role of Cybersecurity in Innovation & Growth

YOUR AGENDA (CLICK BELOW TO EXPAND)

Registration and Coffee

Opening Keynote Panel: Leading Secure Digital Transformation in an AI-Defined Era

AI is redefining how businesses operate, innovate, and defend themselves. This keynote explores how leaders can enable intelligent transformation that accelerates value creation while ensuring resilience and compliance across every layer of the enterprise. 

– Embedding AI governance frameworks aligned with the EU AI Act 

– Integrating automation and analytics into secure IT and OT environments 

– Balancing innovation with risk, ethics, and human oversight 

Moderated by: 
Ali Baccouche, Regional Information Security & Data Privacy Officer, EMEA, Texas Instruments
 

Panellists: 
Naveen Ullikashi, CISO, Allianz Direct

Elena Zerner-Kaening, Head of IT Infrastructure, Aenova Group
Dr Daniel Lemmer, Corporate Cyber and Information Technology Security Officer, ZF Group 

A Short History of Security Awareness

In this session, you will travel on a journey through the history of security awareness, starting with the ancient Greeks and the original Trojan Horse, through the scams of the Middle Ages, and into the digital age of phishing, social engineering, and AI-generated threats. Together, we’ll explore how organisations have addressed human risk over time, what strategies have failed, and what lessons remain relevant today. 

The session concludes with a modern approach to security awareness, moving beyond fear and compliance towards methods rooted in positive psychology, enablement, and gamification. Participants will leave with historical insights, practical ideas, and inspiration to evolve their own security awareness programs into engaging, culture-driven initiatives. 

Klaus-E. Klingner, Information Security Officer, Asam Beauty 

Solution Spotlight Sessions

Solution spotlight #1 – From Vulnerability Lists to Business Outcomes: Aligning IT Operations and Security by Sebastian Pini, Senior Solutions Engineer, NinjaOne

Solution spotlight #2 – How I Met Your… Access Breach: The Unexpected Story of Zero Trust, Identity & Device Security by Darren James, Senior Product Manager, Specops Software 

Solution spotlight #3 – Reserved for KeyFactor 

Morning Coffee and Networking

NIS-2 and Operational Technology: From Regulation to Resilient OT Security

Dr. Gunnar Siebert, Chief Cyber Advisor, Howden Broking 

Interactive Roundtable A1: From Blind Spot to Board Priority: Cryptographic Risk in the Age of AI and Quantum

Cryptography secures every identity, transaction, and connection — yet most organisations can’t see all the keys, certificates, and algorithms they rely on. This hidden gap is a growing target for threat actors, especially with AI-driven attacks and post-quantum disruption on the horizon. Learn how to discover and prioritise vulnerabilities, automate cryptographic inventory, and make cryptographic risk a measurable part of your security strategy. 

Zubin Dastoor, Head of Cryptographic Posture Management, Keyfactor 

Interactive Roundtable B1: How To Adjust Your PAM Strategy for Growth

The best way to adjust your Privileged Access Management (PAM) strategy for growth is to choose a modern PAM solution that scales with your organisation. You may face many challenges when adjusting your PAM strategy as your organisation grows, including more complex infrastructure, a higher number of login credentials to manage and increased security risks, so you need to have a flexible PAM solution. 

Attend this round table session to learn more about the challenges your organisation may face when adjusting its PAM strategy and why you should choose a PAM strategy that grows with you. You will come away with the following learning outcomes: 

  • What are the challenges in adjusting your PAM strategy as you grow 
  • Keeping up with compliance requirements 
  • How to choose a PAM solution that grows with you 

Marko Schlensok, Account Manager, Keeper Security 

Interactive Roundtable A2: Ransomware in 2026: How Attack Models and Negotiations are Evolving

  • Cyber as a Business Enabler: Balancing resilience, innovation, and speed
  • From Technical Risk to Business Risk: How CISOs are reframing cyber conversations for boards and CEOs  

Dr Daniel Lemmer, Corporate Cyber and Information Technology Security Officer, ZF Group 

Interactive Roundtable B2: The Human Firewall: Transforming Security Awareness from Compliance to Culture

  • Shifting security awareness from check-the-box training to behaviours that reflect shared ownership, accountability, and everyday decision-making 
  • Re-engineering awareness programmes to be continuous, contextual, and role-specific  
  • Embedding security mindsets into culture through leadership modelling and real-world scenario practice 
  • Using data and behavioural analytics to measure risk reduction and identify emerging human-factor vulnerabilities 

Ali Baccouche, Regional Information Security & Data Privacy Officer, EMEA, Texas Instruments 

Lunch and Networking

Cyber Claims Trends 2026 - What IT Decision Makers Need to Know

Konstantin Bittig, Head of Underwriting, Germany, Coalition Inc 

Interactive Roundtable A3: Strategy, Risk & the Board

  • Cyber as a Business Enabler: Balancing resilience, innovation, and speed 
  • From Technical Risk to Business Risk: How CISOs are reframing cyber conversations for boards and CEOs  

Dr Daniel Lemmer, Corporate Cyber and Information Technology Security Officer, ZF Group 

Interactive Roundtable B3: Third-Party Cyber Risk in the Age of Hyper-Connected Supply Chains

Understanding how expanding digital ecosystems, cloud partnerships and outsourced services are reshaping third-party cyber exposure 

  • Moving beyond periodic vendor assessments towards continuous assurance and real-time risk visibility 
  • Balancing operational agility with robust security oversight across complex supply chains 
  • Clarifying accountability and shared responsibility between organisations and their partners 

Dr. Gunnar Siebert, Chief Cyber Advisor, Howden Broking 

Afternoon Coffee and Networking

The Survival Mandate: From Protection to Persistence - Mastering the Cyber Survivability Spectrum

Dr Daniel Lemmer, Corporate Cyber and Information Technology Security Officer

End of Conference

Expert Insights

20 + technology leaders will be delivering data, debate & discussions. Learn from the mistakes & successes of experts from some of the UK’s largest organisations…

Exclusive Features

Match-made meetings, a full day of interactive roundtables, complimentary access to co-located events, and much more to take advantage of…

Like-minded Senior Peers

Meet with CIOs, CISO, CDOs, & CTOs to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities…

New Technologies

Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you…


Who Should Sponsor CyberSec?

CyberSec is the definitive platform for cybersecurity solution providers to connect with senior security decision-makers actively seeking new tools, strategies, and partnerships. If your company supports enterprise security, digital resilience, or compliance, this is where you need to be. By sponsoring CyberSec, vendors gain direct access to CISOs, security architects, and enterprise buyers—positioning their solutions at the heart of the industry’s most influential decision-making forum.

  • Threat Detection & Response
    • XDR / EDR / NDR providers
    • SIEM and SOAR platforms
    • Incident response and threat hunting tools
  • Identity & Access Management (IAM)
    • Single sign-on (SSO) solutions
    • Multi-factor authentication (MFA)
    • Privileged Access Management (PAM)
  • Cloud & Application Security
    • Cloud workload protection (CWP)
    • CASBs and CNAPP platforms
    • Secure application development tools (DevSecOps)
  • Network & Endpoint Security
    • Next-generation firewalls (NGFW)
    • Endpoint protection platforms (EPP)
    • Secure web gateways (SWG) and VPNs
  • Zero Trust Architecture
    • ZTNA and microsegmentation providers
    • Continuous access evaluation platforms
  • Data Security & Privacy
    • Encryption and tokenization tools
    • Data loss prevention (DLP)
    • Data classification and governance platforms
  • Governance, Risk & Compliance (GRC)
    • Risk assessment and audit tools
    • Compliance automation platforms
    • Policy and regulatory change management
  • AI & Automation in Cybersecurity
    • AI-driven threat analytics
    • Automation for security operations
    • Behavioural analytics platforms
  • Security Awareness & Human Risk Management
    • Employee training and phishing simulation tools
    • Insider threat prevention platforms
  • Managed Security Services (MSSPs) & Consulting
    • Managed detection and response (MDR)
    • Cybersecurity consulting and advisory firms
    • Red/blue/purple team providers

YOUR TECHNOLOGY SHOWCASE

If you are focused on the following, then talk to us today about partnership opportunities: Contact the sponsorship team

TITANIUM

  • Exhibition Space in Tier 1 Area
  • Product Demo
  • Host a Roundtable
  • 5 x 121 meetings in the build up and over the course of the day
    Co-branding on All Literature
  • Priority networking
  • Bespoke Thought Leadership Dinner the night before

PLATINUM

  • Exhibition Space in Tier 1 Area
  • Product Demo/ Keynote Speech
  • 5 x 121 meetings in the build up and over the course of the day
  • Co-branding on All Literature
  • Priority networking
  • Host a Roundtable

GOLD

  • Exhibition Space in Tier 1 Area
  • Product Demo
  • 5 x 121 Meetings in the build up and over the course of the day
  • Co-Branding on All Literature
  • Priority Networking

SILVER

  • Exhibition space in Tier 2 Area
  • 3 x 121 Meetings in the build-up and over the course of the day
  • Co-Branding on Some Literature, Networking Sponsorship

BRONZE

  • Exhibition space in Tier 3 Area
  • Co-Branding on Some Literature
  • Networking Sponsorship

ENTRY-LEVEL SPONSORS

  • Branded Table in the Coffee Area
  • Networking Sponsorship

CyberSec Munich 2026 is where leadership meets action, and the future of cybersecurity is mapped.

Top 3 ways you can gain exposure

1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.

2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.

3: We know the power of face-to-face business networking. You should be part of the conversation.

Thought-Leadership

Position yourself among the leading experts of IT development & application. Let the IT community know that you are integral expert in the conversation.

Brand Visibility

Get your foot in the door as IT leaders seek for new applications & technologies by showing the solution is out there… they just need to know what it is.

Demonstrating Value

Take part in the Product Demonstrations & showcase your capabilities, so that your potential clients can learn that you are right for them

Maintain Relationships

Attending our conferences offers invaluable face-to-face networking opportunities, fostering meaningful connections with industry leaders and peers. Additionally, engaging in live discussions enhances learning experiences, ensuring attendees stay ahead in their fields.

Reserve your place at CyberSec 2026 in Munich—your next big move starts here!



Register

SECURE YOUR SEAT

Date: 18th March 2026
  • Call us on 0204 540 4484 & we can process your registration over the phone.
  • Or contact Kate Wood on kwood@epnlive.com
Are you busy on the dates? You can refer a colleague by filling out the recommendation form using the button below & we will get in touch soon.

VENUE:
The Westin Grand Munich
Arabellastrasse 6
81925 Munich, Germany

MEET THE TEAM


For delegate enquiries:
Kate Wood
kwood@epnlive.com


For operational enquiries:
Robert Lawrence
rlawrence@epnlive.com

About Us

EPN is a network of C-Level professionals across all functions - IT, IT Security, HR, Finance, Marketing and Operations.

info@epnlive.com

Upcoming Events

  • InfoTec London February 2026
  • CyberSec London February 2026
  • AITech London 2026
  • InfoTec Munich 2026
  • CyberSec Munich 2026
  • Infotech Amsterdam 2026
  • CyberSec Amsterdam 2026

Info Links

  • Home
  • Events
  • About Us
  • Solutions
  • Contact us

Follow Us

  • Youtube
  • Linkedin
  • Copyright © 2025 EPN Ltd – All Rights Reserved.
  • Privacy Policy and Terms and Conditions
  • EPN Live is a member of The CPD Certification Service
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT