Keynotes
            
            
                
                    
                        
                            
                                
                                    
                                        
                                            
                                                
                                            
                                        
                                            
                                                
                                                    
                                                    
                                                        
                                                        We have access to your company and we don't want anything in return... yet
                                                    
                                                    
                                                        
                                                 
                                            
                                        
                                            
                                                
                                                    
                                                    
                                                        
                                                        NDR! Not a Paradise for Trabants, but Network Detection & Response 😊
                                                    
                                                    
                                                        
                                                 
                                            
                                        
                                            
                                                
                                            
                                        
                                            
                                                
                                                    
                                                    
                                                        
                                                        Harnessing quantum security
                                                    
                                                    
                                                        
                                                 
                                            
                                        
                                            
                                                
                                                    
                                                    
                                                        
                                                        Ransomware attacks in the public sector
                                                    
                                                    
                                                        
                                                 
                                            
                                        
                                            
                                                
                                                    
                                                    
                                                        
                                                        Backup security as a key strategy in the age of cyber threats
                                                    
                                                    
                                                        
                                                 
                                            
                                        
                                            
                                                
                                                    
                                                    
                                                        
                                                        OT Safety: Ensuring industrial security beyond the buzzwords
                                                    
                                                    
                                                        
                                                 
                                            
                                        
                                            
                                                
                                                    
                                                    
                                                        
                                                        SOC and how to maximise its potential
                                                    
                                                    
                                                        
                                                 
                                            
                                        
                                            
                                                
                                                    
                                                    
                                                        
                                                        Cybersecurity and legislation
                                                    
                                                    
                                                        
                                                 
                                            
                                        
                                            
                                                
                                                    
                                                    
                                                        
                                                        Cybersecurity regulations in practice