Closed-door exchange for CISOs, CIOs & senior security leaders

#24 Cyber Intelligence

No sales pitches. No vendor slide marathons. Just real conversations.
A curated online exchange on how AI is reshaping cyber threats, defense, and decision-making.

  • Designed for CISOs, CIOs & senior security leaders

  • Vendor participation is limited and curated

Apply to join
Prime Tower Zürich
Thursday
Sept. 10, 2026
Start: 13:30
End: 17:00
English

#23 - Event overview

From DDoS Annoyance to Infrastructure Warfare

Location:
Online

Theme:
Critical Infrastructure Protection (CIP)

Focus:
Understanding threats

Time horizon:
Future + patterns

View:
External threat landscape

Output:
Insights, predictions


Question:
“Who will attack us next and how?”

The recent cyberattack on Deutsche Bahn disrupted booking systems and online services.

But security experts are clear:

Red Line:
DDoS attacks are nerve-racking — attacks on electricity grids are strategic weapons.

In the same interview, experts pointed to attacks on electricity suppliers in Poland as far more concerning than temporary website outages.

The real risk is not inconvenience.
The real risk is critical infrastructure destabilization.

What This Means
> Hybrid warfare now includes energy and transport systems
> Infrastructure operators are prime targets
> AI changes both attack and defense dynamics
> Boards must understand operational cyber risk

#23: Speakers

Who’s Invited?

Among the participants you will meet senior managers from critical infrastructures who are responsible for ensuring business continuity and operational safety.

In addition, leading CISOs, CIOs, and their direct reports from major Swiss companies and organizations will be present to share their perspectives.

CISO & CIO Event

A curated gathering of CISOs, CIOs, and senior security leaders to discuss current threats, real-world incidents, and practical defense strategies - in a trusted, peer-level environment.

👉 This event is designed primarily for CISOs, CIOs and senior security leaders

👉 Participation of vendors is limited and curated

CEO at Evolution Security GmbH
Benjamin Mejri
Benjamin Kunz Mejri is a German cybersecurity researcher, penetration tester, and entrepreneur. He is the founder and CEO of Vulnerability Lab, one of the world’s largest platforms for responsible vulnerability disclosure, and of Evolution Security GmbH, a specialist firm for penetration testing and security assessments. Over the past two decades, he has uncovered and responsibly disclosed hundreds of critical zero-day vulnerabilities in products and services from Microsoft, Apple, PayPal, Skype, BMW, and many more. His discoveries have led to major security improvements in cloud services, banking systems, airports, and millions of IoT devices worldwide. Benjamin is a regular speaker at leading international conferences such as HITB, where he shares deep insights into cloud security, e-payment risks, identity and access flaws, and critical infrastructure protection. He is widely recognized for making highly technical issues accessible and for driving stronger cooperation between security researchers and vendors.
Associate Professor at Northeastern University
Prof. Dr. Aanjhan Ranganathan
Aanjhan is an associate professor (with tenure) in the Khoury College of Computer Sciences at Northeastern University in Boston, USA. He is also an affiliate faculty in the Department of Electrical and Computer Engineering. His current research revolves around the security and privacy of wireless networks with a strong focus on autonomous cyber-physical systems and smart ecosystems. He has worked on a wide variety of topics including physical-layer security of wireless systems, secure localization and proximity verification, trusted computing architectures, and side-channels. He is a recipient of several awards including the outstanding dissertation award from ETH Zurich, regional winner of European Space Agency’s Satellite Navigation competition and the Cyber Award from Armasuisse (Switzerland’s Department of Defense). Prior to joining Northeastern, he was a senior researcher in the System Security group at ETH Zurich and has over 3 years of industry research experience as a senior engineer at Robert Bosch GmbH’s Car Multimedia Division “Blaupunkt” where he was involved in the development of embedded modules for top automotive manufacturers including Audi and Volkswagen. He holds an M.Sc with specialization in Electronics and Microelectronics from EPFL, Switzerland and a Ph.D in Computer Science from ETH Zurich, Switzerland.
ICS-OT-IIoT Cyber Security Consultant | Certified Lead Auditor
Daniel Ehrenreich
Daniel Ehrenreich, B.Sc. Engineering, MBA for Engineers, CISSP, ISO27001 Lead Auditor, SCCE- Secure Communications and Control Experts. Daniel has over 35 years of experience with ICS-OT systems for electric power, water, sewage, oil, and gas industries. Daniel is an active member of several ISA-IEC 62443 committees and has published over 150 professional & short papers in Israel and abroad. Since 2010, Daniel has combined his ICS-OT-IIoT engineering activities with cybersecurity, consulting and delivering training sessions in Israel and worldwide. Daniel previously held senior positions in Israel at Waterfall Security, Siemens, and Motorola Solutions, dealing with cyber defense for industrial operations. Since 2016, Daniel has been the permanent Chairperson for the ICS CyberSec Conference in Israel.
President High-Tech Connect
Ralf Haller
With 25+ years in high-tech, I’ve been fortunate to help companies grow by combining data-driven marketing, strategic partnerships, and practical go-to-market execution. My journey has taken me from Silicon Valley to Switzerland, across roles in product marketing, product management, business development, and innovation leadership. I’ve worked with B2B companies in AI, data engineering, legal tech, and IT infrastructure, always with a focus on delivering measurable results, building trust, and creating lasting market impact. Along the way, I’ve built and led international marketing teams, launched high-ROI campaigns, and learned the value of staying hands-on. My background mixes deep technical training (MSc EE from KIT, MSc Data Science from MIT) with executive education (INSEAD) and three decades of real-world experience. Today, I’m passionate about scaling AI-first platforms and supporting the adoption of transformative technologies in Europe.

#23: Event-agenda

Cyber Intelligence Focus Theme

Critical Infrastructure Protection (CIP)

Time - CET
Type
speaker, company
ThemE
13:30
Welcome & Context
Ralf Haller
Welcome & Introduction
13:40
Expert talk
Prof. Dr. Aanjhan Ranganathan
Invisible Threats: GNSS, 5G & Autonomous Systems Under Attack
14:10
Expert Talk
Daniel Ehrenreich
Are you truly prepared for the worst case?
14:40
Expert Talk
Benjamin Mejri
CIP attacks in Germany - Lessons learned
15:10-16:00
Panel discussion
Benjamin Mejri, Aanjhan Ranganathan, Daniel Ehrenreich
What are new lessons to be learned from the latest attacks in Germany, Denmark and other NATO countries?

Expert Advisory Team

Expert Advisory Team

Our advisory team helps select the topics and speakers, ensuring that all content is valuable and highly relevant to you.

Daniel Ehremreich
ICS-OT-IIoT Cyber Security Consultant | Certified Lead Auditor
Daniel Ehrenreich, B.Sc. Engineering, MBA for Engineers, CISSP, ISO27001 Lead Auditor, SCCE- Secure Communications and Control Experts. Daniel has over 35 years of experience with ICS-OT systems for electric power, water, sewage, oil, and gas industries. Daniel is an active member of several ISA-IEC 62443 committees and has published over 150 professional & short papers in Israel and abroad. Since 2010, Daniel has combined his ICS-OT-IIoT engineering activities with cybersecurity, consulting and delivering training sessions in Israel and worldwide. Daniel previously held senior positions in Israel at Waterfall Security, Siemens, and Motorola Solutions, dealing with cyber defense for industrial operations. Since 2016, Daniel has been the permanent Chairperson for the ICS CyberSec Conference in Israel.
Prof. Dr. Aanjhan Ranganathan
Associate Professor at Northeastern University
Aanjhan is an associate professor (with tenure) in the Khoury College of Computer Sciences at Northeastern University in Boston, USA. He is also an affiliate faculty in the Department of Electrical and Computer Engineering. His current research revolves around the security and privacy of wireless networks with a strong focus on autonomous cyber-physical systems and smart ecosystems. He has worked on a wide variety of topics including physical-layer security of wireless systems, secure localization and proximity verification, trusted computing architectures, and side-channels. He is a recipient of several awards including the outstanding dissertation award from ETH Zurich, regional winner of European Space Agency’s Satellite Navigation competition and the Cyber Award from Armasuisse (Switzerland’s Department of Defense). Prior to joining Northeastern, he was a senior researcher in the System Security group at ETH Zurich and has over 3 years of industry research experience as a senior engineer at Robert Bosch GmbH’s Car Multimedia Division “Blaupunkt” where he was involved in the development of embedded modules for top automotive manufacturers including Audi and Volkswagen. He holds an M.Sc with specialization in Electronics and Microelectronics from EPFL, Switzerland and a Ph.D in Computer Science from ETH Zurich, Switzerland.

From Static Defense to Adaptive Cyber Warfare

Cybersecurity is entering a new phase.

Attackers are no longer just exploiting vulnerabilities — they are using automation, AI, and scale to continuously adapt.
Defenders, on the other hand, are still largely operating with static architectures, fragmented tooling, and slow decision cycles.

The gap is no longer about tools— it is about speed, intelligence, and decision-making under uncertainty.

What this means

  • Attacks evolve in real time, not in cycles

  • AI lowers the barrier to sophisticated attacks

  • Detection alone is no longer sufficient

  • Response speed becomes the critical factor

  • Security leaders must operate under uncertainty and pressure

Event parameters

  • Location: Online

  • Theme: AI-driven cyber threats & defense

  • Focus: Decision-making, response, and real-world lessons

  • View: External threat landscape + internal readiness

  • Output: Practical insights and peer exchange

  • Key question: How do we defend when attackers adapt faster than our systems?

#24: Speakers

Who’s Invited?

This event brings together senior leaders responsible for cybersecurity, resilience, and operational risk across Switzerland and Europe.

Participation is curated to ensure a high-quality peer group and open exchange.

Audience
  • CISOs / Heads of Cyber Security

  • CIOs & senior IT leaders

  • OT / ICS security leaders

  • Risk & resilience executives

  • Critical infrastructure and enterprise security leaders

Note: Vendor participation is limited and by invitation only.

President High-Tech Connect
Ralf Haller
With 25+ years in high-tech, I’ve been fortunate to help companies grow by combining data-driven marketing, strategic partnerships, and practical go-to-market execution. My journey has taken me from Silicon Valley to Switzerland, across roles in product marketing, product management, business development, and innovation leadership. I’ve worked with B2B companies in AI, data engineering, legal tech, and IT infrastructure, always with a focus on delivering measurable results, building trust, and creating lasting market impact. Along the way, I’ve built and led international marketing teams, launched high-ROI campaigns, and learned the value of staying hands-on. My background mixes deep technical training (MSc EE from KIT, MSc Data Science from MIT) with executive education (INSEAD) and three decades of real-world experience. Today, I’m passionate about scaling AI-first platforms and supporting the adoption of transformative technologies in Europe.

This is not a traditional cybersecurity event

Most cybersecurity events are driven by vendor presentations.
This one is not.

What you will NOT find

  • No vendor presentation line-up

  • No product pitches on stage

  • No “death by PowerPoint”

  • No superficial panel discussions

What you WILL experience

  • Peer-level discussions among CISOs and decision-makers

  • Honest conversations about real incidents and challenges

  • Practical insights instead of marketing narratives

  • Interactive format with active participation

Designed for interaction, not presentation

  • Curated group of senior participants (approx. 30–50)

  • Moderated discussion format

  • Short impulse inputs (max. 10 minutes, no product slides)

  • Real incident and scenario discussions

  • Open exchange and Q&A throughout

Every participant contributes -not just listens.

Enabling open and honest dialogue

  • Chatham House Rule

  • No recording of sessions

  • No media presence during discussions

  • Confidentiality as a core principle

A space where security leaders can speak openly about challenges, failures, and lessons learned.

Because the real value is in the conversation

  • Learn how peers handle AI-driven threats

  • Gain insights not shared in public conferences

  • Exchange practical approaches to real-world problems

  • Build trusted relationships with other security leaders

  • Step away from vendor noise and focus on what matters

We are building a CISO / CIO Advisory Board

For the upcoming format, we are forming a small group of CISOs, CIOs, and senior security leaders to help shape topics, formats, and priorities.

This ensures the event remains highly relevant, practical, and peer-driven.

If you are interested in contributing, please reach out via email with your role and focus area.

info@hitechconnect.org

Apply to join the CISO/CIO Circle

To maintain the quality of the discussions, participation is curated.
Priority is given to CISOs, CIOs, and senior security leaders.
You will receive confirmation after review.

Apply to join

#24: Event-agenda

Cyber Intelligence Event Theme

AI: The New Battleground for Cybersecurity
How Generative & Agentic AI Reshape Attacks and Defenses

Time - CET
Type
speaker, company
ThemE
13:30
Welcome, Intro
Ralf Haller, High-Tech Connect
Welcome & Introduction
13:45
Intro Keynote
tbd
tbd
14:15
Tech Talk
tbd
tbd
14:45
Tech Talk
tbd
tbd
15:15
Coffee Break
15:45
Startup Pitches
tbd
tbd
15:45
Startup Pitches
tbd
tbd

#24: workshop-agenda

Cyber Intelligence Workshop Theme

AI: The New Battleground for Cybersecurity
How Generative & Agentic AI Reshape Attacks and Defenses


Time - CET

Type

speaker, company

ThemE
tbd
AI Security Workshop
tbd
tbd

Expert Advisory Team

Expert Advisory Team

Our advisory team helps select the topics and speakers, ensuring that all content is valuable and highly relevant to you.

Daniel Ehremreich
ICS-OT-IIoT Cyber Security Consultant | Certified Lead Auditor
Daniel Ehrenreich, B.Sc. Engineering, MBA for Engineers, CISSP, ISO27001 Lead Auditor, SCCE- Secure Communications and Control Experts. Daniel has over 35 years of experience with ICS-OT systems for electric power, water, sewage, oil, and gas industries. Daniel is an active member of several ISA-IEC 62443 committees and has published over 150 professional & short papers in Israel and abroad. Since 2010, Daniel has combined his ICS-OT-IIoT engineering activities with cybersecurity, consulting and delivering training sessions in Israel and worldwide. Daniel previously held senior positions in Israel at Waterfall Security, Siemens, and Motorola Solutions, dealing with cyber defense for industrial operations. Since 2016, Daniel has been the permanent Chairperson for the ICS CyberSec Conference in Israel.
Prof. Dr. Aanjhan Ranganathan
Associate Professor at Northeastern University
Aanjhan is an associate professor (with tenure) in the Khoury College of Computer Sciences at Northeastern University in Boston, USA. He is also an affiliate faculty in the Department of Electrical and Computer Engineering. His current research revolves around the security and privacy of wireless networks with a strong focus on autonomous cyber-physical systems and smart ecosystems. He has worked on a wide variety of topics including physical-layer security of wireless systems, secure localization and proximity verification, trusted computing architectures, and side-channels. He is a recipient of several awards including the outstanding dissertation award from ETH Zurich, regional winner of European Space Agency’s Satellite Navigation competition and the Cyber Award from Armasuisse (Switzerland’s Department of Defense). Prior to joining Northeastern, he was a senior researcher in the System Security group at ETH Zurich and has over 3 years of industry research experience as a senior engineer at Robert Bosch GmbH’s Car Multimedia Division “Blaupunkt” where he was involved in the development of embedded modules for top automotive manufacturers including Audi and Volkswagen. He holds an M.Sc with specialization in Electronics and Microelectronics from EPFL, Switzerland and a Ph.D in Computer Science from ETH Zurich, Switzerland.