Current – English

Fairs 2026


Hanover Fair – April 20th to 24th 2026, Hanover
Cybersecurity Summit – April 28th to 29th 2026, Hamburg
ISX2026 – June 3rd Frankfurt, June 9th Munich, June 16th Hamburg, June 23th 2026 Dusseldorf

5th CSK SUMMIT 2026 – July 1st to 2nd, 2026, virtual

Cybersecurity Summit Hessen – August 13th 2026, Marburg Lokschuppen
it-sa 2026 – October 27th to 29th 2026, Nuremberg
protekt – November 10th to 11th 2026, Leipzig
E-world energy & water – February 16th to 18th 2027, Essen
SWISS CYBER SECURITY DAYS – February 23th to 24th 2027, Bern
Hanover Fair – April 5th to 9th 2027, Hannover
Cybersecurity Summit – April 21th to 22th 2027, Hamburg
AFCEA – May 25th to 26th 2027, Bonn
it-sa 2027 – October 2027, Nuremberg

April 2026

Amidst innovations, machines, and future technologies – and suddenly the crucial question arises: How secure is it all, really? 🔐 That’s exactly what we should be talking about.

I’ll be at Hannover Messe 2026 – and I’m looking forward to connecting with you there! The trade fair is one of the most important meeting places for product innovations and new technologies. And one thing is clear: Cybersecurity is absolutely essential these days. 💻⚠️

📍 I’ll be in Hannover on Wednesday, April 22nd, and Thursday, April 23rd. 📞 Let’s have a spontaneous or scheduled chat – just send an email with a suggested time to m.betz@bcm5.de

I’m looking forward to engaging conversations, new perspectives, and real-world insights! 👉 Who else will be there and interested in discussing cybersecurity?

Drones fly undetected over a country. False corruption allegations spread virally and influence elections. A state creates artificial islands to secure power and resources… Sounds like breaking news – but it’s a scenario.

👉 Welcome to „Zero Day.“

On Monday, April 20, 2026, „Locked Shields,“ one of the world’s largest cyber defense exercises, began:

🌍 45 countries
👥 4,000 experts

🎯 One goal: Protecting critical infrastructure from highly complex attacks. In the „Blue Team,“ countries including Germany, Austria, Switzerland, and Luxembourg jointly defend systems such as power plants and air defenses against a highly specialized „Red Team.“

💡 The reality behind it: Cyberattacks have changed. No longer just simple DDoS attacks – but AI-powered attacks, fast, precise, and daily.

➡️ The answer? Defense is also becoming more intelligent: more AI, more collaboration, more innovation.

Cybersecurity is no longer just an IT issue – it’s a central pillar of our security.

March 2026

February 2026

January 2026

In June, the ISX IT Security Conference will once again offer a mix of expert presentations and practical insights on highly topical cybersecurity issues, with ample opportunity for professional exchange. The target audience includes managers and service providers focused on IT security and cloud security, data security/data protection, IT consulting and integration, and (managed) security services.

Excerpt from the program:

RESILIENCE & CRISIS MANAGEMENT
Emergency Management • Cyber ​​Incident Simulation • Business Continuity Plan • Crisis Communication • Human Resilience • Focus on Compliance: NIS2 and DORA • Focus on Supply Chain: Supply Chain Security & Vendor Risk Management

ATTACK SURFACE MANAGEMENT
Hacker Tools • Insider Risk Management • Hybrid Attack Scenarios • Prioritization of Security Measures • Microsegmentation • Managed Security Services

DIGITAL SOVEREIGNTY
Selection, Availability, Autonomy • Sovereign Security • Digital Sovereignty & Hyperscalers in Cybersecurity: Opportunities and Risks • Security Solutions from Europe/Germany

AI SECURITY
Attack Vectors • Manipulation of AI Agents • Cloud and Data Strategies for AI • Risk Scores, Firewall and Security Concepts • AI Guidelines • Technical Safeguards • AI-Powered Awareness Programs

by KI

AI-powered attacks, automated exploit chains, and highly professional cybercrime groups are massively increasing the speed, reach, and impact of attacks. Modern ransomware operates in a modular, lateral, and data-driven manner – focusing on exfiltration, persistence, and targeted extortion.

The figures for the end of 2025 are alarming: Since 2020, the number of successful cyberattacks has tripled, with an increase of 44.5% in 2025 alone (see press releases). Reported attacks include ransomware, data theft, supply chain compromises, unauthorized access, as well as AI-powered phishing and deepfakes that bypass traditional security mechanisms.

Critical infrastructure (KRITIS) is no longer the only sector affected. Attacks affect companies of all sizes and sectors – from industry and trade to SMEs and craft businesses. Hybrid IT, legacy systems, and a lack of transparency in the supply chain increase the attack surface.

With NIS-2, cybersecurity definitively becomes a management responsibility.

Resilient zero-trust architectures, continuous monitoring, incident response capabilities, and measurable security governance are required. Modern attacks no longer target individual systems but entire IT and OT infrastructures. At the same time, phishing campaigns and deepfakes are reaching a new level of sophistication through the use of artificial intelligence – traditional detection mechanisms are increasingly reaching their limits.

‼️ Cybersecurity is no longer an IT project – it’s a strategic resilience issue. ‼️

More and more solar parks are supplying the necessary energy and playing a key role in Germany’s energy transition. This rapidly growing importance of photovoltaics simultaneously requires a greater focus on comprehensive security concepts. The rapid expansion significantly increases the need for action on the part of grid operators and municipalities.

With the increasing grid relevance of solar parks, the demands on their IT and OT security are rising. Many photovoltaic systems now perform functions that place them within the context of critical infrastructure.

The ongoing digitalization – for example, through networked inverters, remote maintenance, and monitoring systems – simultaneously increases the attack surface. Common vulnerabilities include unsecured remote access, a lack of separation between IT and OT, and outdated firmware.

The German Federal Office for Information Security (BSI) regularly warns of cyber risks in the energy supply sector. For operators and municipal utilities, this means that cybersecurity must be continuously and systematically integrated into operations

⚠️ Attacks on critical infrastructure affect innocent people.

Like the recent power outage in Berlin or the cyberattack on the Roth district hospital – the emergency room had to be closed!

People are left in distress, with no support – THAT is inhumane. Customers can hardly protect themselves in these and many other situations. The responsibility lies with the operators.

The recent incident at the beginning of the year – a cyberattack on ‘The Länd’ – once again demonstrates that security vulnerabilities can compromise sensitive customer data. The online shop of the Baden-Württemberg state marketing campaign was attacked – and this was only discovered through customer reports.

👉 Shop operators also have a responsibility: IT security, regular updates, and preventative checks are not optional extras, but a legally binding obligation to their customers.

‼️ Data protection begins with prevention. Act now.

🔐 Greater awareness of cyber threats

🛡️ A sustainably high level of security awareness

🚨 Early and successful detection of attacks

👉 Use the start of the year to review your security strategy:

Are your awareness, detection, and response capabilities truly up to date with the current threat level?

💬 Let’s talk – about practical IT security that is not only compliant but also effective in a real-world scenario.