Community icon
Practical security knowledge.
Creation Icon
Understanding current cyber threats.
Apply online Icon
Holistic cyber security.

Cyber threats are on the rise – are you prepared?

Security challenges are growing rapidly – and so are the risks for your company. Cyber attacks are becoming more targeted, complex and consequential. This makes it all the more important to understand cyber security holistically and implement it effectively. We give you a clear overview of how you can identify and minimise risks and protect your IT in the long term with modern, state-of-the-art solutions.

Lectures and speaker.

Stefan Sütterlin
Prof. Dr. Stefan Sütterlin

When AI automates the psychology of attack.

Keynote

When language models meet human psychology, the threat landscape for businesses changes radically. Modern cyber attacks use the power of AI to individualise social engineering with minimal resource expenditure while scaling it up massively. Psychological vulnerabilities are systematically identified based on publicly available information about individuals and organisations, and attacks are optimised to fit perfectly – even unnoticed in subtle dialogues. Since these tactics are specifically targeted at business networks and social media, conventional technical protective measures often come to nothing. In this presentation, we analyse this new modus operandi and put the effectiveness of classic awareness training to the test: Is existing knowledge still sufficient to withstand these highly personalised threats, or do we need a completely new understanding of human resilience in the digital age?

Michael Thumann
Michael Thumann

Cyber security in turbulent times.

Roundtable Bechtle

How can companies maintain data sovereignty when dealing with American cloud providers? Which IT investments are truly necessary in economically challenging times – especially against the backdrop of regulatory requirements such as NIS2 and CRA? Let's discuss which strategies, priorities and next steps your company is currently planning.

Charles Kionga
Charles Kionga

Agentic AI: The future of cyber resilience.

Cisco

The digital attack surface is growing rapidly – new vulnerabilities arise every day. Traditional, manual security approaches are reaching their limits when it comes to effectively countering highly automated and AI-supported cyber attacks.

Agentic AI is revolutionising IT security: it enables autonomous security operations that proactively protect corporate resources in data centres and hybrid clouds and ensure long-term cyber resilience.

Join Charles Kionga, Principal Consultant at the Bechtle-BISS Competence Centre, as he presents groundbreaking technologies that are paving the way for a new era of IT security.

Martin Wernet
Martin Wernet & Ace

Live demo: Data carrier detection dog – How secure is your sensitive data really?

Schwarzwald Dogs

Experience the use of internationally certified data carrier detection dogs in our presentation with live demonstration.

Our dogs reliably detect even the smallest, professionally hidden data carriers and listening devices – quickly, discreetly and independently of technical infrastructure. See live how modern security concepts and animal precision come into play where traditional methods reach their limits.

An exclusive insight into data security at the highest level.

 

Boris Drogja
Boris Drogja

Compliance has not made us safer – only slower.

Roundtable Bechtle

Compliance is supposed to create security – but in everyday life, many organisations experience above all increasing complexity, growing documentation requirements and a high coordination effort. At the same time, the question remains as to how much actual security this creates.

In this roundtable, we will discuss where frameworks, audits and certifications offer real added value – and where they primarily fulfil formal requirements. The focus will be on sharing practical experiences and different perspectives on the balance between verifiability, efficiency and effective security work.

 

Michael Thumann
Michael Thumann
Boris Drogja
Boris Drogja

Command & Control Frameworks – Hacking in Reality.

Bechtle

Modern cyber attacks follow a clear pattern: after initially compromising a system, attackers establish a covert communication link – the command and control (C2) framework. This presentation provides insights into the actual tools and techniques used in professional cyber attacks and demonstrates live how C2 frameworks work in practice.

 

Jan Phillip Mertens
Jan Philip Mertens
Phillip Seemann
Philip Seemann

No Risk Management - No Fun!

TrendAI

Without smart risk management, digital innovation quickly becomes a blind flight. TrendAI Cyber Risk Exposure Management creates transparency and provides a clear basis for decision-making at management level, while operational IT risks are assessed and measures implemented. The presentation deliberately takes a strategic approach: high level, clear, relevant.

Florian Pölsterl
Florian Pölsterl

MFA as standard – access management as the foundation.

Pointsharp

Why centralised control of MFA options is the real key Multi-factor authentication is quickly becoming a requirement these days. But the real challenge begins when MFA is not only activated, but must also be centrally controlled and supported by clean access management.

Danny Uhrmann
Danny Uhrmann

Micro-VM isolation – unique protection when all else fails!

HP Inc.

HP Inc. demonstrates how critical processes can be reliably isolated using micro-VM isolation, even in the event of successful attacks. Experience how a unique security approach provides protection at the hardware level – exactly when it matters most.

Jürgen Schubert
Jürgen Schubert

Backup was yesterday – cyber resilience is today.

Dell

This presentation explains why traditional backup alone is no longer sufficient and how companies can use cyber resilience – including immutability, air-gap vaults, intelligent anomaly detection and clear recovery processes – to safeguard their business capabilities after an attack.

Manuel Mehltretter
Manuel Mehltretter
Passwordless for Admins – Why We Need to Talk About Authentication.

Bechtle

Passwords are broken, and so is classic MFA. Both have already been proven with Evilginx at Security Campus.

However, if you want phishing-resistant authentication or even passwordless authentication, you have to start with the basics: SSO.

This presentation uses practical examples and a live demo to show why MFA projects fail, how to conquer the authentication jungle, and why cyber security starts with usability. Caution: it could make your everyday work much easier...

Tim Fischinger
Tim Fischinger
Huriye Nur Arli
Huriye Nur Arli

When the enterprise app becomes the attacker: Understanding and preventing cloud-based identity attacks.

Bechtle

Attackers no longer need to steal passwords to gain access to data in the Microsoft 365 cloud. They use something much simpler: the trust of your employees. Through targeted phishing, they trick users into authorising seemingly harmless applications with far-reaching permissions – often completely unnoticed by security teams.

In this presentation, we will show how a manipulated enterprise application can be used to read and exfiltrate emails, files and identity information – without any classic account compromise. We will highlight a typical attack path, provide practical insights and explain how you can effectively prevent such attacks.

Markus Gross
Markus Gross
From VPN to Universal ZTNA.

HPE Networking

Dynamic and flexible for every single connection. HPE Axis lays the foundation for a modern cloud era.

 

Self-Driven Network: Future security in hybrid mesh and with AI.

With the HPE SRX Firewall, consistent protection across borders with manageable complexity in modern infrastructures.


Are you interested?

Register now using our external form.

Manufacturer.

Manufacturer