- Chief Information Officer (CIO)
- Chief Technology Officer (CTO)
- Chief Digital Officer (CDO)
- Chief Information Security Officer (CISO)
- Chief Data Officer (CDO)
- Chief Innovation Officer
- Chief Transformation Officer




WELCOME TO INFOTECH MUNICH 2026 Navigating Enterprise IT in a New Era of Innovation
As every business becomes a digital business, InfoTech Munich 2026 is your strategic compass for what’s next in enterprise technology. From scalable architectures and cloud-first strategies to AI, automation, and data-driven decision-making, this is where the IT leaders of Munich come to rethink what’s possible.
InfoTech is the essential meeting ground for technology leaders driving enterprise transformation. Designed for CIOs, CTOs, CDOs, and senior IT executives, the event delivers cutting-edge insights on modernizing IT architectures, enabling data-driven innovation, and navigating the complexities of digital acceleration. Attendees build their own agenda from visionary keynotes, focused round table discussions, and curated 1-2-1 meetings with technology pioneers—ensuring every interaction is aligned with their strategic goals. This flexible format empowers senior IT and digital leaders to focus on what matters most—discovering solutions, forging strategic partnerships, and accelerating transformation across their organisations.
Whether you're leading cloud migration, embedding AI across the business, or future-proofing your data infrastructure, InfoTech is where meaningful progress begins.
Why Attend?
• Cut through complexity: Discover how leading organisations are modernising tech stacks, managing data at scale, and driving performance through innovation.
• Share and shape strategy: Engage in open, off-the-record discussions with peers facing similar transformation challenges.
• Bridge business and IT: Explore how technology leaders are aligning digital investments with strategic growth.
• Make meaningful connections: Build relationships with top-tier IT executives, solution providers, and transformation partners.
SOME OF OUR PARTNERS..
SOME OF OUR ATTENDEES...
SPEAKERS, WORKSHOP & ROUNDTABLE LEADERS:
150 +
Thought Leaders on Site
20 +
Solutions on Show
Who Should Attend?
KEY TOPICS TO INCLUDE
- AI, Automation & the Future of IT Operations
- Enterprise Cloud Strategies & Cost Optimisation
- Digital Transformation & Organisational Change
- Modern Data Architectures & Governance
- Cybersecurity Integration in IT Strategy
- Application Modernisation & Tech Debt Reduction
- Hybrid Work Infrastructure & Collaboration Tools
- Edge Computing, 5G & Next-Gen Connectivity
- The Role of the CIO in Driving Business Innovation
- Sustainable IT & Green Technology Strategies
YOUR AGENDA (CLICK BELOW TO EXPAND)
Registration and Coffee
Opening Keynote Panel: Leading Secure Digital Transformation in an AI-Defined Era
AI is redefining how businesses operate, innovate, and defend themselves. This keynote explores how leaders can enable intelligent transformation that accelerates value creation while ensuring resilience and compliance across every layer of the enterprise.
– Embedding AI governance frameworks aligned with the EU AI Act
– Integrating automation and analytics into secure IT and OT environments
– Balancing innovation with risk, ethics, and human oversight
Ali Baccouche, Regional Information Security & Data Privacy Officer, EMEA, Texas Instruments
Naveen Ullikashi, CISO, Allianz Direct
Elena Zerner-Kaening, Head of IT Infrastructure, Aenova Group
Dr Daniel Lemmer, Corporate Cyber and Information Technology Security Officer, ZF Group
A Short History of Security Awareness
In this session, you will travel on a journey through the history of security awareness, starting with the ancient Greeks and the original Trojan Horse, through the scams of the Middle Ages, and into the digital age of phishing, social engineering, and AI-generated threats. Together, we’ll explore how organisations have addressed human risk over time, what strategies have failed, and what lessons remain relevant today.
The session concludes with a modern approach to security awareness, moving beyond fear and compliance towards methods rooted in positive psychology, enablement, and gamification. Participants will leave with historical insights, practical ideas, and inspiration to evolve their own security awareness programs into engaging, culture-driven initiatives.
Klaus-E. Klingner, Information Security Officer, Asam Beauty
Solution Spotlight Sessions
Solution spotlight #1 – From Vulnerability Lists to Business Outcomes: Aligning IT Operations and Security by Sebastian Pini, Senior Solutions Engineer, NinjaOne
Solution spotlight #2 – How I Met Your… Access Breach: The Unexpected Story of Zero Trust, Identity & Device Security by Darren James, Senior Product Manager, Specops Software
Solution spotlight #3 – Reserved for KeyFactor
Morning Coffee and Networking
NIS-2 and Operational Technology: From Regulation to Resilient OT Security
Dr. Gunnar Siebert, Chief Cyber Advisor, Howden Broking
Interactive Roundtable A1: From Blind Spot to Board Priority: Cryptographic Risk in the Age of AI and Quantum
Cryptography secures every identity, transaction, and connection — yet most organisations can’t see all the keys, certificates, and algorithms they rely on. This hidden gap is a growing target for threat actors, especially with AI-driven attacks and post-quantum disruption on the horizon. Learn how to discover and prioritise vulnerabilities, automate cryptographic inventory, and make cryptographic risk a measurable part of your security strategy.
Zubin Dastoor, Head of Cryptographic Posture Management, Keyfactor
Interactive Roundtable B1: How To Adjust Your PAM Strategy for Growth
The best way to adjust your Privileged Access Management (PAM) strategy for growth is to choose a modern PAM solution that scales with your organisation. You may face many challenges when adjusting your PAM strategy as your organisation grows, including more complex infrastructure, a higher number of login credentials to manage and increased security risks, so you need to have a flexible PAM solution.
Attend this round table session to learn more about the challenges your organisation may face when adjusting its PAM strategy and why you should choose a PAM strategy that grows with you. You will come away with the following learning outcomes:
- What are the challenges in adjusting your PAM strategy as you grow
- Keeping up with compliance requirements
- How to choose a PAM solution that grows with you
Marko Schlensok, Account Manager, Keeper Security
Interactive Roundtable A2: Ransomware in 2026: How Attack Models and Negotiations are Evolving
- Cyber as a Business Enabler: Balancing resilience, innovation, and speed
- From Technical Risk to Business Risk: How CISOs are reframing cyber conversations for boards and CEOs
Dr Daniel Lemmer, Corporate Cyber and Information Technology Security Officer, ZF Group
Interactive Roundtable B2: The Human Firewall: Transforming Security Awareness from Compliance to Culture
- Shifting security awareness from check-the-box training to behaviours that reflect shared ownership, accountability, and everyday decision-making
- Re-engineering awareness programmes to be continuous, contextual, and role-specific
- Embedding security mindsets into culture through leadership modelling and real-world scenario practice
- Using data and behavioural analytics to measure risk reduction and identify emerging human-factor vulnerabilities
Ali Baccouche, Regional Information Security & Data Privacy Officer, EMEA, Texas Instruments
Lunch and Networking
Cyber Claims Trends 2026 - What IT Decision Makers Need to Know
Konstantin Bittig, Head of Underwriting, Germany, Coalition Inc Group
Interactive Roundtable A3: Strategy, Risk & the Board
- Cyber as a Business Enabler: Balancing resilience, innovation, and speed
- From Technical Risk to Business Risk: How CISOs are reframing cyber conversations for boards and CEOs
Dr Daniel Lemmer, Corporate Cyber and Information Technology Security Officer, ZF Group
Interactive Roundtable B3: Third-Party Cyber Risk in the Age of Hyper-Connected Supply Chains
Understanding how expanding digital ecosystems, cloud partnerships and outsourced services are reshaping third-party cyber exposure
- Moving beyond periodic vendor assessments towards continuous assurance and real-time risk visibility
- Balancing operational agility with robust security oversight across complex supply chains
- Clarifying accountability and shared responsibility between organisations and their partners
Dr. Gunnar Siebert, Chief Cyber Advisor, Howden Broking
Afternoon Coffee and Networking
The Survival Mandate: From Protection to Persistence - Mastering the Cyber Survivability Spectrum
Dr Daniel Lemmer, Corporate Cyber and Information Technology Security Officer, ZF Group
End of Conference
Expert Insights
20 + technology leaders will be delivering data, debate & discussions. Learn from the mistakes & successes of experts from some of the UK’s largest organisations…
Exclusive Features
Match-made meetings, a full day of interactive roundtables, complimentary access to co-located events, and much more to take advantage of…
Like-minded Senior Peers
Meet with CIOs, CISO, CDOs, & CTOs to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities…
New Technologies
Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you…
Partnership Opportunities
InfoTech brings together the most influential IT and digital transformation leaders from across industries—decision-makers who are actively shaping the future of enterprise technology. If your solutions support IT modernisation, data-driven innovation, or digital transformation, sponsoring InfoTech gives you direct access to the buyers and influencers who matter most. It’s where real conversations happen, challenges are unpacked, and strategic partnerships are forged.
By sponsoring InfoTech, your brand is positioned directly in front of senior decision-makers looking for solutions to transform legacy systems, drive efficiency, and future-proof their technology stack. It’s not just visibility—it’s meaningful engagement with the enterprise technology community.
Enterprise IT Infrastructure & Cloud Solutions
- Cloud service providers (IaaS, PaaS, SaaS)
- Hybrid and multi-cloud management platforms
- Data center and edge infrastructure providers
- Network and connectivity solutions
Cloud Transformation & DevOps
- Cloud migration and orchestration tools
- Infrastructure-as-Code (IaC) platforms
- DevOps and continuous delivery (CI/CD) solutions
- Containerisation and Kubernetes platforms
AI, Automation & Analytics
- AI and machine learning platforms
- Data analytics and business intelligence tools
- Robotic Process Automation (RPA) providers
- AI Ops and intelligent automation solutions
Enterprise Architecture & Integration
- Application integration and middleware platforms
- API management and service mesh solutions
- Enterprise Architecture management tools
- Low-code / no-code development platforms
Security & Compliance
- Identity and access management (IAM)
- Cloud security platforms
- Zero Trust architecture and network security
- Data privacy and compliance automation tools
Data Management & Governance
- Data lakes and warehousing platforms
- Master data management (MDM) solutions
- Data quality and lineage tools
- Metadata management and governance platforms
IT Operations & Service Management
- IT service management (ITSM) platforms
- IT operations analytics (ITOA)
- Digital experience monitoring (DEM)
- Observability and AIOps solutions
Digital Transformation & Innovation
- Digital strategy and transformation consulting
- Innovation and product lifecycle platforms
- Agile delivery and project portfolio management (PPM) tools
Sustainability & ESG Tech
- Green IT and energy-efficient infrastructure
- Carbon accounting and ESG reporting platforms
YOUR TECHNOLOGY SHOWCASE
If you have a presence in any of the following areas, talk to us today about partnership opportunities: Contact the sponsorship team
TITANIUM
- Exhibition Space in Tier 1 Area
- Product Demo
- Host a Roundtable
- 5 x 121 meetings in the build up and over the course of the day
Co-branding on All Literature - Priority networking
- Bespoke Thought Leadership Dinner the night before
PLATINUM
- Exhibition Space in Tier 1 Area
- Product Demo/ Keynote Speech
- 5 x 121 meetings in the build up and over the course of the day
- Co-branding on All Literature
- Priority networking
- Host a Roundtable
GOLD
- Exhibition Space in Tier 1 Area
- Product Demo
- 5 x 121 Meetings in the build up and over the course of the day
- Co-Branding on All Literature
- Priority Networking
SILVER
- Exhibition space in Tier 2 Area
- 3 x 121 Meetings in the build-up and over the course of the day
- Co-Branding on Some Literature, Networking Sponsorship
BRONZE
- Exhibition space in Tier 3 Area
- Co-Branding on Some Literature
- Networking Sponsorship
ENTRY-LEVEL SPONSORS
- Branded Table in the Coffee Area
- Networking Sponsorship
InfoTech Munich 2026 will position you ahead of the curve enabling you to walk away with actionable ideas, proven frameworks, and new connections that will shape your technology roadmap in 2026 and beyond.
Top 3 ways you can gain exposure
1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.
2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.
3: We know the power of face-to-face business networking. You should be part of the conversation.
Thought-Leadership
Position yourself among the leading experts of IT development & application. Let the IT community know that you are integral expert in the conversation.
Brand Visibility
Get your foot in the door as IT leaders seek for new applications & technologies by showing the solution is out there… they just need to know what it is.
Demonstrating Value
Take part in the Product Demonstrations & showcase your capabilities, so that your potential clients can learn that you are right for them






