Command Control 2020 cancelled

All information about the cancellation due to the spread of COVID-19.

The Cybersecurity Summit in Munich

Command Control, the European cross-sector cybersecurity dialog platform in Munich on March 3–4, 2020. Meet the most capable and visionary cybersecurity minds in Europe. Learn more about global trends and regulations at Command Control 2020.

All about Command Control 2020

What you can expect

Cyber resilience

Cyber resilience is the key topic of this year’s Command Control. Cyber resilience describes the resistance against cyber attacks in an era in which absolute cybersecurity can no longer be guaranteed. Therefore it is all the more important to design corporate structures with a focus on resilience. At Command Control you can look forward to an in-depth keynote from Brittany Kaiser, who became famous as the whistleblower at Cambridge Analytica.

Business Continuity

Business continuity covers processes which must function during a cyberattack in order to guarantee the continuous operation of a company in an emergency. You will learn how important the ideas of business continuity are in the keynote from Jimmy Sanders, the Head of Information Security at Netflix.

Teaser image of movingimage video

This is why you should attend Command Control 2020

At the Summit, you will meet world-leading thought leaders and professionals in cyber security, as well as specialists in governance, risk and compliance and digital transformation leader. The participation will directly impact your organization.

International top speakers

The Summit brings together international top speakers and thought leaders. Meet speakers from business, politics and science to gather the latest findings, case studies and future perspectives.

Dr. Suzanna Randall will be the first German woman to fly into space and at Command Control she will deliver a keynote on “Cyber Resilience and Trust in Space”. The astrophysicist works as a researcher at the European Southern Observatory in Garching near Munich and for the ALMA telescope project in Chile. Speakers at Command Control from the private sector include Jimmy Sanders (Head of Information Security at Netflix), Adam Banks (CIO at Maersk) and Dr. Anna Zeiter (Chief Privacy Officer at eBay Inc). Despina Spanou runs the cabinet of the Vice-President of the European Commission and will report at the Summit about the state of the security union. The author and cybercrime expert, Edith Huber, is the Head of Department for Research and International Affairs at one of the leading universities in Austria. In conjunction with Bettina Pospisil she will run a workshop exclusive to Command Control entitled “Cybercrime In-House Perpetrators”. Another representative from academia is Prof. Dr. Viktor Mayer-Schönberger. The qualified lawyer is of the view that 100 percent cybersecurity cannot exist which means that resilient structures are all the more important.

Suzanna Randall
The first female German astronaut
"Cyber Resilience and trust in space - Crisis Management on the ISS"

The first female German astronaut
"Cyber Resilience and trust in space - Crisis Management on the ISS"

Suzanna Randall

Suzanna Randall goes into space

What happens if there is an incident on the ISS? What about secure data transmission between the ground and the ISS? Would the International Space Station have an Incident Response Plan? Dr. Suzanna Randall has answers to these questions. She is an astrophysicist and will probably be the first German woman to fly into space in 2021.
We are happy to announce that Suzanna Randall will be joining Command Control as a speaker from 3rd – 4th March 2020 in Munich, Germany. She will be giving her keynote speech, “Cyber Resilience and trust in Space – Crisis Management on the ISS”. Suzanna Randall works at the European Southern Observatory in Garching near Munich, as well as for the ALMA telescope project in Chile. She asserted herself in the multi-stage selection process of the private initiative “The First female German astronaut” and is currently being prepared for a flight into space.
When she will make it into space, her scientific assignment will be to investigate the effects of isolation, confinement and monotony in space.

"Cyber Resilience and trust in space - Crisis Management on the ISS"

Brittany Kaiser
Cambridge Analytica | Whistleblower
"Learnings from Cambridge Analytica: How to achieve a data secure and cyber resilient future?"

Cambridge Analytica | Whistleblower
"Learnings from Cambridge Analytica: How to achieve a data secure and cyber resilient future?"

Brittany Kaiser

If you’ve seen ‘The Great Hack’ on Netflix, you’ll know who she is. If you haven’t seen it, you’ll find out now!
She is the whistleblower who helped expose Cambridge Analytica’s activities into data harvesting of personal data on Facebook. Before becoming a whistleblower, Ms Kaiser worked for Obama’s presidential campaign in 2007. She then went on to volunteer for the “Ready for Hilary” campaign. Afterwards, she spent several years engaged with human right projects including Amnesty International.
Recently, Brittany Kaiser started the #OwnYourData campaign and looks for ways to empower individuals to protect and take back control of their digital rights.

"Learnings from Cambridge Analytica: How can we achieve a data secure and cyber resilient future?"

Jimmy Sanders
Netflix | Head of Information Security
"Beyond the Security Looking Glass"

Netflix | Head of Information Security
"Beyond the Security Looking Glass"

Jimmy Sanders

Jimmy Sanders is Head of Information Security at Netflix and President of the San Francisco Chapter of ISSA. The security professional says about himself: “Essentially, I design, implement, and operationalize security infrastructures.” This self-portrait does not adequately describe his day-to-day work at one of the world's largest streaming providers—trust, mutual support and resilient structures play an important role here.

His motivational executive talk will not be technical but about new ideas and techniques at the speed of business. His session will consist of ideas that are changing security practices and company culture that various industry leaders are working towards. Information security professionals and digital transformation leaders will profit most from his ideas and techniques.

Be curious about the essential insights of the person who ensures the business continuity of your favorite series!

"Beyond the Security Looking Glass"

Adam Banks
Maersk | CIO
"Empowering the CISO after the breach"

Maersk | CIO
"Empowering the CISO after the breach"

Adam Banks

Adam Banks is Chief Technology & Information Officer of the world’s biggest shipping company AP Moller-Maersk. Prior to his role as CIO, Adam was Vice President and Head of Simplification, an IT role that demands a high-level view of systems and processes and ensuring they can be done with a smaller, future-proof range of hardware and software. When the company was hit by the largest malicious cyberattack to date, he was at the heart of efforts to both keep the company going and repair the damage. Maersk, one of the world’s largest companies, responsible for moving almost every conceivable type of object all over the world, runs on technology. Systems that track the whereabouts of millions of tonnes of cargo every minute of every day, anywhere on Earth.

After the attack, Maersk moved risk governance from a central corporate function to a CISO function, so the CISO makes policy as well as enforces it. In his insightful talk he’ll explain the details of this enforcement—and when he expects the CISO to kick down the door.

"Empowering the CISO after the breach"

Viktor Mayer-Schönberger
Oxford Internet Institute | Professor of Internet Governance
“Rethink Cyber-Security - Cyber-Resilience demands a new Mindset”

Oxford Internet Institute | Professor of Internet Governance
“Rethink Cyber-Security - Cyber-Resilience demands a new Mindset”

Viktor Mayer-Schönberger

Viktor Mayer-Schönberger is Professor of Internet Governance and Regulation at the Oxford Internet Institute. The studied lawyer, futurologist and author of over a dozen books focuses his research on BigData, digital economy, as well as institutions and governance in the data age.

In his current project, he is researching the determinants of individual cybersecurity behavior: Why many people know what is right but behave differently. He also believes that there can be no100 percent cyber security, but that more resilient structures are urgently needed.

Listen to his entertaining, inspiring keynote on the necessary mindshift in companies and learn what resilience has in common with judo!

“Rethink Cyber-Security - Cyber-Resilience demands a new Mindset”

Edith Huber
Donau-University Krems | Author, Cybercrime Expert, Head of Research and International Affairs Unit
“Trust on the inside - Mitigating the insider threat: learn and discuss the latest results of academic profiling”

Donau-University Krems | Author, Cybercrime Expert, Head of Research and International Affairs Unit
“Trust on the inside - Mitigating the insider threat: learn and discuss the latest results of academic profiling”

Edith Huber

Dr. Edith Huber is head of the department for research and international affairs at one of the leading universities in Austria. Together with Bettina Pospisil, she will offer a workshop on the subject of “Cybercrime In-House perpetrators” on an exclusive basis and will present her latest research from extensive case—analyzes of in-sider attacks of recent years, reconstruct the typical course of events as well discuss targeted Awareness and Resilience activities with you.

As an expert in cybercrime, legal and criminal sociology, Edith Huber has 10 years of research experience in the field of security research, continues to work as a reviewer for the European Commission for Security Research Programs and is a member of the German Association of Criminologists.

“Trust on the inside - Mitigating the insider threat: learn and discuss the latest results of academic profiling”

Cybersecurity training opportunities

Command Control offers you some excellent cybersecurity training opportunities. Consolidate your knowledge in subject specific presentations or attend a workshop. Take advantage of the training on offer at the Summit in the following subjects:

Exciting workshops

Command Control is offering a varied, interactive workshop program for training purposes. On March 3, the training starts with the “Live Crisis Simulation” workshop. Our aspiration is to raise interaction to a new level. Put your knowledge to the test and try to retain an overview in a simulated stress situation. The second event day will be start with “Lego Serious Play” workshop run by Marcus Beyer. “The goal of LEGO Serious Play is to create a common understanding of an issue by all parties involved. It doesn't matter whether it's an awareness and training campaign, organizational and procedural adjustments or the formation of a team” explains Bayer in an advance interview. In the afternoon OneTrust is running a workshop entitled “How to automate your Privacy Program efficiently? // How to do effective Third Party Risk Management?” The 90 minute training session is divided into two sessions.

Guided Networking – digital and analog:

The personal network is a success factor behind increased cyber resilience. And Command Control will support you in this!

For Summit visitors, the use of our diverse matchmaking options is included in the ticket. These are guaranteed to help you make relevant contacts – with the right people – and expand your network.

On the one hand, the Artificial Intelligence in our networking app generates suggestions and, on the other hand, our matchmaking team will initiate and make connections for you in person on-site. The meet-ups and speed networking sessions will enable you to discuss these issues with your peers. And then in the matchmaking area there are further meet-up opportunities over a coffee.

Start-up program:

Command Control also offers young and innovative companies the ideal platform to exchange ideas with international experts from the cybersecurity industry. In order to draw the attention of potential new customers and users to their offer, the ten start-ups will present themselves this year both in the Start-up Area on the 1st floor of the convention center and in the Lion's Den Competition on March 3 at 4:30 pm.

The ten start-ups face an expert jury and an attentive audience and present their business ideas. The Lions provide qualified and direct feedback.

The winning company can expect an exciting prize again this year.

Take a look at our agenda

We select our speakers with the utmost care so that you can learn from their experiences and also from their mistakes. You can look forward to inspiring presentations from the most capable and visionary cybersecurity heads from user companies and research institutions on digital leadership and on the key challenges of secure digitization.

In 2020 our agenda is comprised of three content streams each of which have been allocated their own platforms, namely issues on a global, company-related and individual level.

For the award of the best digital transformers in Germany 2019, the DTOY has decided to partner up with Command Control. Previously awarded in Berlin, the DTOY is now starting up in Munich, highlighting the relevance of cybersecurity in digital transformation.

Facts & Figures

You will meet these participants at Command Control 2020

  • Information Security Professionals
    Chief Information Security Officer, Chief Sales Officer, Information Security Manager
  • Governance—Risk—Compliance Professionals
    Data Protection Officer, Chief Risk Officer, Business Continuity Manager
  • Digital Transformation Leaders
    Chief Information Officer, Chief Digital Officer, Chief Executive Officer

Visitors
Command Control 2020 cancelled

All information about the cancellation due to the spread of COVID-19.

Read more!
Visitors
Renowned speakers

Top international thought leaders provide insights and perspectives, talk about experiences, trends and visions.

Speaker
Visitors
Don't miss out!

This is where #Thought Leadership becomes #Action Leadership. Our interactive workshops give you the chance to participate actively and to take...

Agenda