International top speakers

International speakers and thought leaders will transform the ICM - International Congress Center Munich from March 3–4, 2020 into a top-class think tank. At Command Control, speakers from business, politics and science will bring together the latest insights, case studies and future perspectives.

Suzanna Randall
The first female German astronaut
"The final frontier of cybersecurity! "

The first female German astronaut,
"The final frontier of cybersecurity! "

Suzanna Randall

Suzanna Randall goes into space

What happens when there’s a cyber attack in space? Would the International Space Station have an Incident Response Plan? Suzanna Randall knows the answers! She is an astrophysicist and will possibly be the first female German astronaut to go into space by 2021!

We are happy to announce that Suzanna Randall will be joining Command Control as a speaker from 3rd – 4th March 2020 in Munich, Germany. She will be giving her keynote speech, “Cyber Resilience and Trust in Space”. Suzanna Randall works at the European Southern Observatory in Garching near Munich, as well as for the ALMA telescope project in Chile. She asserted herself in the multi-stage selection process of the private initiative “The First female German astronaut” and is currently being prepared for a flight into space.
When she will make it into space, her scientific assignment will be to investigate the effects of isolation, confinement and monotony in space.

The final frontier of cybersecurity!

Brittany Kaiser
Brittany Kaiser | Whistleblower
Opening speaker at Command Control

Brittany Kaiser | Whistleblower,
Opening speaker at Command Control

Brittany Kaiser

If you’ve seen ‘The Great Hack’ on Netflix, you’ll know who she is. If you haven’t seen it, you’ll find out now!

She is the whistleblower who helped expose Cambridge Analytica’s activities into data harvesting of personal data on Facebook. Before becoming a whistleblower, Ms Kaiser worked for Obama’s presidential campaign in 2007. She then went on to volunteer for the “Ready for Hilary” campaign. Afterwards, she spent several years engaged with human right projects including Amnesty International.

Recently, Brittany Kaiser started the #OwnYourData campaign and looks for ways to empower individuals to protect and take back control of their digital rights.

Jimmy Sanders
Netflix | Head of Information Security
"Beyond the Security Looking Glass"

Netflix | Head of Information Security,
"Beyond the Security Looking Glass"

Jimmy Sanders

Jimmy Sanders is Head of Information Security at Netflix and President of the San Francisco Chapter of ISSA. The security professional says about himself: “Essentially, I design, implement, and operationalize security infrastructures.” This self-portrait does not adequately describe his day-to-day work at one of the world's largest streaming providers—trust, mutual support and resilient structures play an important role here.

His motivational executive talk will not be technical but about new ideas and techniques at the speed of business. His session will consist of ideas that are changing security practices and company culture that various industry leaders are working towards. Information security professionals and digital transformation leaders will profit most from his ideas and techniques.

Be curious about the essential insights of the person who ensures the business continuity of your favorite series!

"Beyond the Security Looking Glass"

Dominik Schiener
IOTA | CEO
“Trust in Technology”

IOTA | CEO,
“Trust in Technology”

Dominik Schiener

Dominik Schiener is co-founder and CEO of IOTA, a novel cryptocurrency that focuses on secure communication and payment between two machines on the Internet of Things, which is not based on a blockchain.

As in some TV appearances, he will also provide the Command Control attendees with his vision for the IOTA project in a vivid and understandable manner, giving them a business-oriented insight into the impressive tangle technology.

The partnership with Jaguar Land Rover, which was signed in April 2019, is just the beginning of his plans for the IOTA project—look forward to seeing exciting new use cases from the real use of the cryptocurrency in his keynote address. Discuss with him in the attached panel about future uses and opportunities.

“Trust in Technology”

Adam Banks
Maersk | CIO
"Empowering the CISO after the breach"

Maersk | CIO,
"Empowering the CISO after the breach"

Adam Banks

Adam Banks is Chief Technology & Information Officer of the world’s biggest shipping company AP Moller-Maersk. Prior to his role as CIO, Adam was Vice President and Head of Simplification, an IT role that demands a high-level view of systems and processes and ensuring they can be done with a smaller, future-proof range of hardware and software. When the company was hit by the largest malicious cyberattack to date, he was at the heart of efforts to both keep the company going and repair the damage. Maersk, one of the world’s largest companies, responsible for moving almost every conceivable type of object all over the world, runs on technology. Systems that track the whereabouts of millions of tonnes of cargo every minute of every day, anywhere on Earth.

After the attack, Maersk moved risk governance from a central corporate function to a CISO function, so the CISO makes policy as well as enforces it. In his insightful talk he’ll explain the details of this enforcement—and when he expects the CISO to kick down the door.

"Empowering the CISO after the breach"

Viktor Mayer-Schönberger
Oxford Internet Institute | Professor of Internet Governance
“Rethink Cyber-Security – Cyber-Resilience demands a new Mindset!”

Oxford Internet Institute | Professor of Internet Governance,
“Rethink Cyber-Security – Cyber-Resilience demands a new Mindset!”

Viktor Mayer-Schönberger

Viktor Mayer-Schönberger is Professor of Internet Governance and Regulation at the Oxford Internet Institute. The studied lawyer, futurologist and author of over a dozen books focuses his research on BigData, digital economy, as well as institutions and governance in the data age.

In his current project, he is researching the determinants of individual cybersecurity behavior: Why many people know what is right but behave differently. He also believes that there can be no100 percent cyber security, but that more resilient structures are urgently needed.

Listen to his entertaining, inspiring keynote on the necessary mindshift in companies and learn what resilience has in common with judo!

“Rethink Cyber-Security – Cyber-Resilience demands a new Mindset!”

Kai Roer
The Security Culture Framework | Cybersecurity Culture Measurement Advocat
"Measuring Security Culture"

The Security Culture Framework | Cybersecurity Culture Measurement Advocat,
"Measuring Security Culture"

Kai Roer

Kai Roer is the mastermind for cybersecurity culture. He is a strong voice advocating science and fact-based understanding of the human factors that influence risk and security. He invented an approach to measure security culture and created the Security Culture Index, a global index showcasing how different industry sectors perform in human factors. His work resulted in the now global de-facto standard Security Culture Framework. Experience him in conversation with CISO Espen Otterstad about security culture and how it can be measured, maintained and improved—shown on practical Abax examples.

"Measuring Security Culture"

Espen Otterstad
ABAX | CISO
"Measuring Security Culture"

ABAX | CISO,
"Measuring Security Culture"

Espen Otterstad

Espen Otterstad is the Chief Information Security Officer at ABAX, a leading telematics company in Norway. Espen has been with ABAX since the early days and built the IT infrastructure and organization from the ground up. Now he focuses mostly on information security with security culture as an area of particular interest. To him, keeping the balance between rapid business growth and a good information security culture is an exciting challenge. Espen has focused more and more on the human aspect in cybersecurity and how things like rapid changes in headcount and organizational changes affect the security culture. Experience him in conversation with “Cybersecurity Culture Advocat” Kai Roer about cybersecurity culture and how it can be measured, maintained and improved—shown on practical ABAX examples. Espen is measuring the security culture right now for the third time in a row, reporting the KPI together with measurements to his board and improving the KPI year-to-year.

"Measuring Security Culture"

Philipp Amann
European Cybercrime Center der Europol | Head of Strategy
"Current cyber threat landscape across Europe – latest insights from leading European police authorities"

European Cybercrime Center der Europol | Head of Strategy,
"Current cyber threat landscape across Europe – latest insights from leading European police authorities"

Philipp Amann

Intergovernmental cooperation is the big topic of Philipp Amann, Head of Strategy at Europol's European Cybercrime Center (EC3). Together with his team, he is responsible for analyzing and strategically assessing current and future threats and trends in cybercrime. Other tasks include the preparation of the EC3's main strategic report for the EU—the Internet Organized Crime Threat Assessment (IOCTA).

After nearly twenty years of experience in information and cybersecurity management, anti-cybercrime and information analysis and management, he is the right person to talk to other European security agencies about interesting insights into the current state of cybercrime in cybercrime EU.

"Current cyber threat landscape across Europe – latest insights from leading European police authorities"

Heiko Löhr
Federal Criminal Police Office Wiesbaden | Criminal Director
"Current cyber threat landscape across Europe – latest insights from leading European police authorities"

Federal Criminal Police Office Wiesbaden | Criminal Director,
"Current cyber threat landscape across Europe – latest insights from leading European police authorities"

Heiko Löhr

Heiko Löhr is Criminal Director at the Federal Criminal Police Office Wiesbaden and heads the department "Cyber crime - Principle, situation and cooperation". He knows all the current challenges, illegal activities and criminal offenses in the field of cybercrime from a police perspective. In a team keynote, he and Philipp Amann give an insight into their work, explain the pan-European threat situation and show how Europol and BKA support German companies.

"Current cyber threat landscape across Europe – latest insights from leading European police authorities"

Magda Chelly
Responsible Cyber | CISO on Demand
“Digital security and privacy in an interconnected ecosystem”

Responsible Cyber | CISO on Demand,
“Digital security and privacy in an interconnected ecosystem”

Magda Chelly

As “CISO on demand” Magda Chelly, Ph.D., CISSP spends most of her time supporting chief information security officers in their cyber security strategy and roadmap. The Singapore based Cyber Security Evangelist holds a Masters degree in Telecommunication Engineering and is seen as a Cyberfeminist in the industry. With her technical background and experience from various worldwide projects she’s able to support companies with a 360 degrees view on cybersecurity.

Magda is fascinated by the human aspect of cybersecurity, diversity and cultural influences on privacy and security. She has been awarded Top 10 cybersecurity experts to follow on Twitter in 2018 as well as Top 17 Cybersecurity Influencers in 2018 worldwide.

Look forward to Magda Chelly's keynote on cybersecurity—challenges for businesses and how to ensure that they are cyber ready and cyberresilient.

“Digital security and privacy in an interconnected ecosystem”

Prof. Dr. Mark Dominik Alscher
Robert Bosch Hospital | Medical Director of the General Clinics
"Growth Area: Secure Digitization of the Health Sector"

Robert Bosch Hospital | Medical Director of the General Clinics,
"Growth Area: Secure Digitization of the Health Sector"

Prof. Dr. Mark Dominik Alscher

Prof. Alscher is Medical Director of the General Clinics of the Robert Bosch Hospital in Stuttgart, author of more than 250 medical articles and book contributions, and Chairman of the Board of Directors of Digital Health Baden-Württemberg (e.V.).

Together with representatives from politics, administration and business, he will discuss the opportunities and risks offered by digital transformation for the healthcare industry.

Prof. Alscher stands for data security at the highest quality level with rapid introduction of digitization in medicine - for the benefit of the patients. An exciting discussion based on current examples from the state-of-the-art Robert Bosch Hospital on the current trend topic “Security in the healthcare sector” awaits you!

"Growth Area: Secure Digitization of the Health Sector"

Dr. Anna Zeiter
eBay Inc | Chief Privacy Officer
"Managing secure privacy programs now and in the future"

eBay Inc | Chief Privacy Officer,
"Managing secure privacy programs now and in the future"

Dr. Anna Zeiter

Anna Zeiter is Chief Privacy Officer of eBay Inc and leading the Global Privacy Program. Before joining in 2014 as the Head of Data Protection for the EMEA region and making sure that the personal data of the users stays safe while buying and selling, she graduated with honors from the LL.M. Program in Law, Science & Technology at Stanford Law School. From 2009 until 2013 Anna gained experience as a lawyer for two international law firms in Hamburg, specializing in data protection, IT and ecommerce law. Besides that, Anna Zeiter, teaches at universities, holds the CIPP/E and the CIPM certification and is member of the editorial board of Delphi.

In the IAPP- Panel on March 4. Together with Dr. Raether and Mr. Jordan, she will for sure bring up some points that you haven’t known about and show how important a good data protection is when you’re the world’s biggest online marketplace– stay curious!

"Managing secure privacy programs now and in the future"

Paul Jordan
IAPP | European Managing Director
"Managing secure privacy programs now and in the future"

IAPP | European Managing Director,
"Managing secure privacy programs now and in the future"

Paul Jordan

As the European Managing Director of the IAPP office in Brussels, Paul Jordan is responsible for implementing strategy and planning for Europe as well as leading efforts in expanding the European presence of the International Association of Privacy Professionals.

A native of Dublin, Ireland, Paul has been living and working in Brussels for most of his life and has an in-depth knowledge of European Public Affairs, having managed large international projects for the European Commission, Deloitte Europe, and other leading European consultancies.

In the Panel with Dr. Raether and Dr. Zeiter, he will discuss his experiences and best - practices when it comes to managing secure privacy programs now and in the future. He also might share some insights that haven’t been known in public yet. A must session for privacy professionals—not just because of the credit points.

"Managing secure privacy programs now and in the future"

Dr. Philipp Raether
Allianz SE | Group Chief Data Protection Officer
"Managing secure privacy programs now and in the future"

Allianz SE | Group Chief Data Protection Officer,
"Managing secure privacy programs now and in the future"

Dr. Philipp Raether

The lawyer Dr. Philipp Raether is a specialist in IP/IT/Data Protection and the Group Chief Data Protection Officer of Allianz SE, one of the world’s largest financial services company handling more than 56 million consumer data. In this capacity he advises the DAX company, including the board, on all privacy and data protection matters globally. Philipp is also in charge of designing and implementing a global privacy program. Previously, Philipp was an Executive Director and the Global Lead for Data Protection & Management of UBS based in London for eight years. For his goal to shape the future of privacy, he took an important step by winning the IAPP- price for the most innovative privacy program.

Together with Dr. Anna Zeiter and Paul Jordan he will provide not only IAPP member with the latest insights to data protection and governance. Don’t miss his contribution, where he will present the fundamentals of his awarded privacy program!

"Managing secure privacy programs now and in the future"

Edith Huber
Donau-University Krems | Author, Cybercrime Expert, Head of Research and International Affairs Unit
“Trust on the inside—Mitigating the insider threat”

Donau-University Krems | Author, Cybercrime Expert, Head of Research and International Affairs Unit,
“Trust on the inside—Mitigating the insider threat”

Edith Huber

Dr. Edith Huber is head of the department for research and international affairs at one of the leading universities in Austria. Together with Bettina Pospisil, she will offer a workshop on the subject of “Cybercrime In-House perpetrators” on an exclusive basis and will present her latest research from extensive case—analyzes of in-sider attacks of recent years, reconstruct the typical course of events as well discuss targeted Awareness and Resilience activities with you.

As an expert in cybercrime, legal and criminal sociology, Edith Huber has 10 years of research experience in the field of security research, continues to work as a reviewer for the European Commission for Security Research Programs and is a member of the German Association of Criminologists.

“Trust on the inside—Mitigating the insider threat”

Ryan Heartfield
University of Greenwich | Research Fellow Cyber Security
“Active Cyber Defence with the human sensor: Leveraging users as the strongest link in security operations against social engineering threats”

University of Greenwich | Research Fellow Cyber Security,
“Active Cyber Defence with the human sensor: Leveraging users as the strongest link in security operations against social engineering threats”

Ryan Heartfield

Dr. Ryan Heartfield received his BSc degree in computer systems and completed a PhD in cybersecurity focusing on semantic social engineering attacks in computer systems in 2017. He is one of the leading researcher at the University of Greenwich involved in multiple UK and EU Horizon2020 research projects in cybersecurity, ranging from the security of autonomous vehicles, measuring the trustworthiness of human sensor platforms, as well as studying cyber threats and the emotional impact of security breaches in smart home environments.

In his keynote on “Active Cyber Defence with the human sensor: Leveraging users as the strongest link in security operations against social engineering threats” he will also share latest insights from the Horizon2020 project ACCEPT in which he is eamining new innovations by exploring the “feedback-loop” of user threat detection. Whilst the bulk of conclusions have been made from academic studies, his experiments made were empirical outside of usual lab environments and conducted with users real working and technology environments. In that sense, the benefits for the Command Control attendees is taking away insights that apply practically in industry. The objective is here to provide a set of key principles for how organizations can leverage the methodologies.

“Active Cyber Defence with the human sensor: Leveraging users as the strongest link in security operations against social engineering threats”

Tim Cook
Inventor of the CISO & information Risk Officer Model (CIRO)
„Cybersecurity Leadership - Assessing and Developing CISOs with the CIRO-model"

Inventor of the CISO & information Risk Officer Model (CIRO),
„Cybersecurity Leadership - Assessing and Developing CISOs with the CIRO-model"

Tim Cook

How would you rate yourself as cybersecurity leader? Based on 20 years of executive search and as-sessment experience, covering both Egon Zehnder and Russell Reynolds where he co-led the Global Cyber and CIO Practices, Tim invented a maturity model for cyber security leadership. The CIRO Ma-turity ModelTM, is designed to help organisations and individuals understand what good looks like in cyber leadership and has been widely used internationally in search and assessment assignments. By taking you on a journey to a comprehensive cyber risk management strategy, where cyber protection is balanced with digital innovation and various risk appetites, the model will show what level of CISO is needed in your organisation.

For his keynote, he will bring along a use case – and the people that were involved. Hear about their experience and don’t miss the chance to rate yourself according to his model.

„Cybersecurity Leadership - Assessing and Developing CISOs with the CIRO-model"

Marcus Beyer
Thought Leader Security and Awareness Campaigns

Thought Leader Security and Awareness Campaigns,

Marcus Beyer

Marcus Beyer has more than 14 years of experience as a communicator, change manager, moderator, social engineer and IT and information security consultant. Internal (project) communication with a focus on Information security, IT and/or BCM processes is his métier, security awareness his mission. He advises and accompanies companies in the implementa-tion of security or BCM awareness campaigns and supports IT departments in project com-munication or in change and team building processes in the company.

His workshop „LEGO Serious Play“ is a thinking, communication and problem solving tech-nology for use with individuals, teams and organizations. It helps to discover the biggest chal-lenges in planning of security awareness campaigns, like hierarchical thinking or different previous knowledge and approach in everyday professional life and helps to fight them.

Further speaker coming soon
We are currently talking to other thought leaders about exciting lectures for our participants. You will find them here soon!

We are currently talking to other thought leaders about exciting lectures for our participants. You will find them here soon!,

Further speaker coming soon

Take Back Control

Now book your ticket for Command Control 2020.

Buy your ticket now
Visitors
One ticket—full (Command) Control

Secure your discounted online ticket. These services are included: 35 international speaker, best-practice workshops, matchmaking, speaker...

Tickets & Prices
Visitors
Your contacts

Advice and contacts for Command Control: Our employees would be pleased to advise you personally.

Advice & Contacts
Visitors
Guided Networking: digital and analog

As a summit visitor, you can use our various matchmaking options free of charge. That way you are guaranteed relevant contact - with the right people.

Matchmaking