Cyber threats are on the rise – are you prepared?
Security challenges are growing rapidly – and so are the risks for your company. Cyber attacks are becoming more targeted, complex and consequential. This makes it all the more important to understand cyber security holistically and implement it effectively. We give you a clear overview of how you can identify and minimise risks and protect your IT in the long term with modern, state-of-the-art solutions.
Lectures and speaker.
When AI automates the psychology of attack.
Keynote
When language models meet human psychology, the threat landscape for businesses changes radically. Modern cyber attacks use the power of AI to individualise social engineering with minimal resource expenditure while scaling it up massively. Psychological vulnerabilities are systematically identified based on publicly available information about individuals and organisations, and attacks are optimised to fit perfectly – even unnoticed in subtle dialogues. Since these tactics are specifically targeted at business networks and social media, conventional technical protective measures often come to nothing. In this presentation, we analyse this new modus operandi and put the effectiveness of classic awareness training to the test: Is existing knowledge still sufficient to withstand these highly personalised threats, or do we need a completely new understanding of human resilience in the digital age?
Cyber security in turbulent times.
Roundtable Bechtle
How can companies maintain data sovereignty when dealing with American cloud providers? Which IT investments are truly necessary in economically challenging times – especially against the backdrop of regulatory requirements such as NIS2 and CRA? Let's discuss which strategies, priorities and next steps your company is currently planning.
Agentic AI: The future of cyber resilience.
Cisco
The digital attack surface is growing rapidly – new vulnerabilities arise every day. Traditional, manual security approaches are reaching their limits when it comes to effectively countering highly automated and AI-supported cyber attacks.
Agentic AI is revolutionising IT security: it enables autonomous security operations that proactively protect corporate resources in data centres and hybrid clouds and ensure long-term cyber resilience.
Join Charles Kionga, Principal Consultant at the Bechtle-BISS Competence Centre, as he presents groundbreaking technologies that are paving the way for a new era of IT security.
Live demo: Data carrier detection dog – How secure is your sensitive data really?
Schwarzwald Dogs
Experience the use of internationally certified data carrier detection dogs in our presentation with live demonstration.
Our dogs reliably detect even the smallest, professionally hidden data carriers and listening devices – quickly, discreetly and independently of technical infrastructure. See live how modern security concepts and animal precision come into play where traditional methods reach their limits.
An exclusive insight into data security at the highest level.
Compliance has not made us safer – only slower.
Roundtable Bechtle
Compliance is supposed to create security – but in everyday life, many organisations experience above all increasing complexity, growing documentation requirements and a high coordination effort. At the same time, the question remains as to how much actual security this creates.
In this roundtable, we will discuss where frameworks, audits and certifications offer real added value – and where they primarily fulfil formal requirements. The focus will be on sharing practical experiences and different perspectives on the balance between verifiability, efficiency and effective security work.
Command & Control Frameworks – Hacking in Reality.
Bechtle
Modern cyber attacks follow a clear pattern: after initially compromising a system, attackers establish a covert communication link – the command and control (C2) framework. This presentation provides insights into the actual tools and techniques used in professional cyber attacks and demonstrates live how C2 frameworks work in practice.
No Risk Management - No Fun!
TrendAI
Without smart risk management, digital innovation quickly becomes a blind flight. TrendAI Cyber Risk Exposure Management creates transparency and provides a clear basis for decision-making at management level, while operational IT risks are assessed and measures implemented. The presentation deliberately takes a strategic approach: high level, clear, relevant.
MFA as standard – access management as the foundation.
Pointsharp
Why centralised control of MFA options is the real key Multi-factor authentication is quickly becoming a requirement these days. But the real challenge begins when MFA is not only activated, but must also be centrally controlled and supported by clean access management.
Micro-VM isolation – unique protection when all else fails!
HP Inc.
HP Inc. demonstrates how critical processes can be reliably isolated using micro-VM isolation, even in the event of successful attacks. Experience how a unique security approach provides protection at the hardware level – exactly when it matters most.
Backup was yesterday – cyber resilience is today.
Dell
This presentation explains why traditional backup alone is no longer sufficient and how companies can use cyber resilience – including immutability, air-gap vaults, intelligent anomaly detection and clear recovery processes – to safeguard their business capabilities after an attack.
Bechtle
Passwords are broken, and so is classic MFA. Both have already been proven with Evilginx at Security Campus.
However, if you want phishing-resistant authentication or even passwordless authentication, you have to start with the basics: SSO.
This presentation uses practical examples and a live demo to show why MFA projects fail, how to conquer the authentication jungle, and why cyber security starts with usability. Caution: it could make your everyday work much easier...
When the enterprise app becomes the attacker: Understanding and preventing cloud-based identity attacks.
Bechtle
Attackers no longer need to steal passwords to gain access to data in the Microsoft 365 cloud. They use something much simpler: the trust of your employees. Through targeted phishing, they trick users into authorising seemingly harmless applications with far-reaching permissions – often completely unnoticed by security teams.
In this presentation, we will show how a manipulated enterprise application can be used to read and exfiltrate emails, files and identity information – without any classic account compromise. We will highlight a typical attack path, provide practical insights and explain how you can effectively prevent such attacks.
HPE Networking
Dynamic and flexible for every single connection. HPE Axis lays the foundation for a modern cloud era.
With the HPE SRX Firewall, consistent protection across borders with manageable complexity in modern infrastructures.
Manufacturer.