Keynotes
            
                
                
                    
                        
                            
                                
                                    
                                        
                                            
                                        
                                    
                                        
                                            
                                                
                                                
                                                    We have access to your company and we don't want anything in return... yet
                                                
                                                
                                                    
                                             
                                        
                                    
                                        
                                            
                                                
                                                
                                                    NDR! Not a Paradise for Trabants, but Network Detection & Response 😊
                                                
                                                
                                                    
                                             
                                        
                                    
                                        
                                            
                                        
                                    
                                        
                                            
                                                
                                                
                                                    Harnessing quantum security
                                                
                                                
                                                    
                                             
                                        
                                    
                                        
                                            
                                                
                                                
                                                    Ransomware attacks in the public sector
                                                
                                                
                                                    
                                             
                                        
                                    
                                        
                                            
                                                
                                                
                                                    Backup security as a key strategy in the age of cyber threats
                                                
                                                
                                                    
                                             
                                        
                                    
                                        
                                            
                                                
                                                
                                                    OT Safety: Ensuring industrial security beyond the buzzwords
                                                
                                                
                                                    
                                             
                                        
                                    
                                        
                                            
                                                
                                                
                                                    SOC and how to maximise its potential
                                                
                                                
                                                    
                                             
                                        
                                    
                                        
                                            
                                                
                                                
                                                    Cybersecurity and legislation
                                                
                                                
                                                    
                                             
                                        
                                    
                                        
                                            
                                                
                                                
                                                    Cybersecurity regulations in practice