What a welcome. Thank you for that. And thanks for coming. Welcome to cyberevolution. Warwick already mentioned that it's our inaugural conference, but it doesn't feel like this because obviously we had Cyber Security Leadership Summit beforehand. But under the new name, this is the first time that we have this event. So thanks again for coming and sharing this experience with us. When I look around, I do see a lot of familiar faces.
Welcome, but also welcome to those who are the first time here. I do hope that at the end of this conference, we all will be cyber security buddies. So I will check on a Thursday whether we know each other's first name. When I did a little bit of research of who is participating today, I could see a diverse group of people. CIS and CISOs, techies, even Brits, journalists. We do have our research team students, quite a number of students. It's really refreshing to see so many young people here. And altogether, 700 people have registered.
We will have around about 400 distributed over the three days here in Frankfurt. And I also welcome very much the roundabout 300 online watchers of this event who will also follow what we are doing here.
Now, when I looked at the long list, I asked myself, why are you here? Well, those of you who are here in Frankfurt, the one or the other may be here because of the Hessian food tonight, which is a valid reason. So that's OK. But I do think there is something else which unites us here at the conference. And that's our passion for cybersecurity. I know that many of you who work in cybersecurity, it isn't just a job. It's really a passion.
Of course, most of you are here because you want to protect your organizations, your companies, perhaps also your family and friends. But ultimately, what we do all together here is we protect the future of our free society. Hang on. You will ask yourself now the question, what is this guy talking about? Why is he talking about society? Who is this guy? And I tell you what, you are absolutely right. There are people who can talk much better about this topic than I can. And we have actually invited one of them. But he regretted that he couldn't come.
However, he sent a video, which I would like now to share with all of you. Can you please play the video? Ladies and gentlemen, it's a true honor to connect with each and every one of you as you come together at the Cyber Evolution Conference. Your drive towards innovation and standing strong in the face of cyber challenges is not just admirable. It's crucial in this rapidly changing world of ours. I got to tell you, I'd sincerely love to be there with you folks in person today.
However, the call of duty as president has me tethered to the goings on here in Washington. Although I'm held back by the duties in these halls, rest assured, my spirit is right there with you all, navigating through the digital frontiers alongside each and every one of you. In the face of deepfake technology, let's stay anchored to the truth and not let fabricated videos rewrite our shared reality. I want to thank the people at Cuppinger Coal who made this event possible. And may God bless you all. How does it make you feel? Isn't it a bit unsettling? But think about it.
I just talked to Victor who produced this video. How long do you think it took him to do it? How long do you think it took him to do it? Ten minutes is a little bit fast.
One hour, one to two hours. So it's surprisingly simple to produce something like that.
Now, think about it. If someone spent a bit more time, did a little bit more research, etc.,
etc., how convincing it would be. And if you then show it to people who are less educated than you are, and you are also high security guys, you are familiar with this kind of stuff. Isn't that dangerous? Isn't it something we need to do something about it? I think we should.
Now, our future, let me talk a little bit about the conference now, what you can expect the next two and a half days. Our future undeniably will be digital and it will be AI driven. This is why we selected this conference logo or motto like AI driven digital world. And we also played, as you probably noticed with these two words, evolution and revolution. So what's the background of that? Evolution talks about all the good things we have been done in the past successfully to protect ourselves. And the message is we need to continue to do this, probably further improve it.
And this will be covered here in the conference. But of course, at the same time, we also will have to pay attention to the new stuff, to the quantum, to the metaphors, of course, to AI, which has the potential to revolutionize our industry, revolutionize cybersecurity. And with your help, we would like to explore all this and dig deeper into it. You can expect 80 speakers in the next couple of days, some of them with, I would say, rock star potential. So really heroes of the industry. They come from enterprises, government, NGOs, university, etc. And they play in four tracks.
So we have the anticipate track where we look a little bit further ahead into the future. We have the innovate track where we talk about recent or ongoing innovation. And then we have the together track, which is all about sharing with each other, learning from each other, best exchange, best practices. And finally, we do have the interactive track. This is where we want your active participation. So what are the highlights from a content perspective?
I mean, with almost 100 sessions, it's really hard to give you a complete overview. But of course, my highlights I can share with you. I already enjoyed the workshops in the morning very much.
So here, clear highlights were the ransomware exercise. We had the SAFIRE scenarios. You will hear more about that later. We had the Zero Trust workshop and a couple of more things. And what I got from the people who attended, it was very engaging and people enjoyed it. Thanks for making this already a success. Now in the evening or in the next couple of hours, we will very much focus on the future of cybersecurity. And we will also talk a little bit about the importance of identity in our new cybersecurity world.
And at the end of today, we will get a welcome note from the Hessens Minister of the Interior, Peter Boyd, who will also talk about what government is doing to protect us and what that means to us. And then, of course, we are looking forward to the Hessen evening with good typical food and drinks framed by a pitch night. And we will talk about the format of this evening later today.
Tomorrow, what are my favorites for tomorrow? We're looking forward to a talk from the BKA, Bundeskriminalamt, about the latest that they are seeing. I would certainly not miss the presentation from Ralf Schneider from Allianz AI, the new weapon in the arsenal of the hackers. Or later in the evening, Henry Furker's presentation on cloud security. In the evening, again, we are having a wonderful night with good food and drinks and a pitch night.
No, not a pitch night, sorry, a pub quiz. Mix that up. On Thursday, again, lots of topics. We will further look into the future. We will present some of the research of Köppinger Coal regarding cybersecurity trends in the future. Talk more about securing the metaverse, for example. So we have Stefan Württemberger here from Macrolab. He will bring his VRs with him. You can actually use them and see how Macrolab used the metaverse to automate their service business in a company. Very interesting. Since he's the CISO, we can also talk to him about what he's doing to secure it.
And then at the end of Thursday, Thomas Jassy, CISO from Silicon, will talk about AI is important but will not do the CISO's job. Of course, there are lots of opportunities to network.
Hopefully, you can exchange on which password is the most overused in cybersecurity, for example. But remember, the star of the conference is sitting here. It's really you. We are making this conference for you. And I already mentioned that so many experts around this room. There's a big, big opportunity to talk to each other, to learn from each other, much more than just receive information from the stage.
So please, do me a favor and make use of that. We also support this.
So, for example, in every session, you can participate and ask questions via the conference app. Hopefully, everyone has it now. During lunch tomorrow and on Thursday, we have certain desks where we talk about special topics. We call it cyber bites.
So, just look for the topic you're interested in and then it's motivated by one of our analysts and then you can talk about this topic with your peers. Our analysts are around. You can get in contact with them two ways. They offer interactive sessions where they talk about their recent research.
So, join these sessions and you get information from them. But you can also, again, using the app and call for a one-on-one session and have a discussion with them individually. I talked already about PitchNerd and PubQuiz. On Wednesday, there's another very interesting and for us, at least, very new format. We host a capture the flag competition.
So, more than, I actually forget it, 12 or how many teams, more than 12 teams compete with each other from enterprises, but also from universities. And you can actually watch them working.
So, please watch out and see what they're doing. And we're looking forward to who will be the winner. And we will then award the winner Thursday at the final closing keynote. And last but not least, don't forget to engage with our security providers out there. I've talked to them and they promised me they will be friendly. They will not be ugly. They don't bite. And sometimes they are even very, very knowledgeable.
So, please make use of that. And when you depart from this conference, we do hope that you not only carry away good memories, you should also carry away all the presentations, etc.
So, they will be available in the web. Also, those sessions which you couldn't attend personally, because obviously with four parallel sessions, you can't attend everything, but you can watch the recorded videos even after the conference, and you can benefit so from what you've learned here, even for longer. And for a couple of weeks more, you have also access to KubingerCode's research. Please make use of that.
We, of course, are proud of it, but we are very keen to receive your feedback to improve even further. Now, I do hope you will enjoy the next two and a half days. And without further ado, I suggest we now get started.