EventEmpalis at the Cyber Security Summit KRITIS (CSK Summit) of IT Security: Emergency planning BCM/backup and incident detection and recovery

07. – 08. May 2025 — Online | Registration required

Empalis beim Cyber Security Summit KRITIS 2025 der IT-Sicherheit

Prepare specifically for attacks by making your backup strategies more cyber-resilient. Cyber Security Summit KRITIS of IT Security Online: Emergency planning BCM/backup and attack detection and response

By registering for the Summit, you will have access to all presentations on both days.

Track “Attack detection and response”

Empalis presentation “Game Changer Cyber Recovery: How Threat Hunting and Monitoring Optimize Cyber RTO”

07.05.2025, 10:00 to 10:25 a.m.

At a time when cyber attacks on critical infrastructures continue to increase dramatically, it is essential to identify vulnerabilities in storage and backup systems at an early stage.

Our expert talk “Game-Changer Cyber Recovery”, together with our partner Rubrik, sheds light on how attackers specifically exploit these vulnerabilities to sabotage recoveries and extort ransoms.

Using real-life scenarios, our speakers will demonstrate how Rubrik Security Cloud uses continuous data monitoring to identify threats and detect attacks at an early stage. Finally, they will explain how forensic analysis supports fast and clean recovery.

Agenda

  • Current threat situation: case studies, targets and methods of cyber attacks on companies
  • Differences between cyber recovery and conventional backup
  • Presentation of the Security Cloud section: cyber-resilient architecture based on the Zero Trust approach
  • Effective threat hunting with the Security Cloud section
  • Forensics and recovery after an attack.

The presentation will take place as part of the Cyber Security Summit KRITIS of IT Sicherheit within the topic track “Attack Detection and Response” and is aimed in particular at those responsible in the KRITIS area who want to strengthen their cyber defense and find out about modern recovery strategies.

Speakers

  • Philip Röder, Key Account Manager & Business Development, Empalis
  • Gürkan Ars, Channel Development Manager, Rubrik

Track “Emergency planning: BCM /Backup”

Empalis presentation “Resilience instead of risk: How KRITIS organizations effectively protect themselves”

08.05.2025, 13:30 to 13:55

In the face of increasing cyber threats, operators of critical infrastructures (KRITIS) are faced with the challenge of making their systems more resilient. A robust cyber resilience strategy is not only essential for compliance with the new regulations of NIS2 and DORA, but also indispensable for maintaining operations in the event of an attack.

In this presentation, Michael Melcher explains the importance of solid backup and recovery strategies for KRITIS organizations. He discusses specific requirements, cost factors and legal framework conditions and shows how process-oriented concepts can be developed.

With the VIKING strategy, he also presents a flexible consulting, solution and service approach that combines proven data protection concepts such as the 3-2-1 rule with modern security approaches such as zero trust, immutability and hybrid cloud solutions.

Agenda

  • Cyber resilience strategies for KRITIS
  • Effective application and optimization of backup strategies
  • Current compliance and legal requirements for backups such as NIS2 and DORA
  • Implementation of a backup continuity plan with support from service providers
  • The VIKING strategy: A comprehensive approach to consulting, solutions and services

The presentation will take place as part of the Cyber Security Summit KRITIS of IT Sicherheit within the topic track “BCM / Backup” and is aimed specifically at KRITIS organizations that want to strengthen their resilience to cyber threats.

Speaker

  • Michael Melcher, Senior Consultant, Empalis

The Cyber Security Summit KRITIS offers operators of critical infrastructures a total of twelve thematic tracks over two days, each comprising three to four presentations. The morning will begin with a keynote speech that will shed light on the current situation and provide initial advice on choosing a solution.

The IT security agenda is currently under construction. Click here for the agenda from 2024.

Registration for the Summit

Participation in the summit is free of charge. The event language is German. You can register for the Summit here:

Register now