2015 Conference Programme

ISSE 2015 Programme

Please select Day 1 or 2

Day 1 – 10th November 2015                                                                   Day 2 – 11th November 2015

09:00-10:15 Registration
Open Morning Coffee
10:15-11:30 Welcome & Moderation
Norbert Pohlmann, Chairman/Director, TeleTrusT/if(is), GermanyOpening Keynotes“Requirements on new regulations and current changing needs from the view of the EDPS”  B
Giovanni Buttarelli, The European Data Protection Supervisor, Belgium“Engaging Small Companies in Cyber Security”
Emma Philpott, CEO, The IASME Consortium Ltd, UK

Bordeaux Room

11:30-12:00 Coffee Break
12:00-12:30 Opening Sponsor Keynote, Moderation: Jon Shamah, Chair, EEMA, UKCompliance is More Than Just a “Documentation Effort”
Jim Hong, Security Group Technical Program Manager, Adobe, USA

Bordeaux Room

12:30-13:30 Opening Panel, Moderation: Malte Kahrs, CEO, MTRIX, GermanyFuture Ecosystems for Secure Authentification and Identification: FIDO, TPM and more  B
Tord Fransson, VP Sales EMEA, Yubico, Sweden
Kim Nguyen, Managing Director, D-Trust, Germany
Sandro Gianella, Google Germany, Germany
Bernd Kowalski, Federal Office for Information Security (BSI), Germany
Michael Kranawetter, National Security Officer Germany, Head of Information Security, Microsoft, Germany

Bordeaux Room

13:30-14:20 Lunch
14.20 – 14.50 Sponsor Keynote, Moderation: Rick Chandler, Treasurer, EEMA, UKEmbracing and protecting consumers and citizens through B2C as a Service  S
Kim Cameron, Architect of Identity, Microsoft Corporation

Bordeaux Room

Cloud Security
Erik R. Van Zuuren, TrustCore.EU, Board Member / Vice-Chairman, EEMA, Belgium

Industrial Security
Wolfgang Schneider, Senior Adviser, Fraunhofer Institute for Secure Information Technology – SIT, Germany
Encrypted Communication
Ammar Alkassar, Board Member/Chairman, TeleTrusT/Sirrix AG, Germany
Bordeaux Room Burgund I Room Burgund II Room
14:50-16:20 On location-determined cloud management for legally compliant outsourcing  B
Bernhard Doll, Research Assistant, University of Passau, Germany
Industry 4.0 – Challenges in anti-counterfeiting  B
Christoph Thiel, Professor, FH Bielefeld – University of Applied Sciences, Germany
Christian Thiel, Professor, Institute for Information and Process Management at the University of Applied Sciences in St. Gallen, Switzerland
The Public Key Muddle – How to manage transparent end-to-end encryption in organizations  B
Gunnar Jacobson, CEO, Secardeo GmbH, Germany
Cloud Deployments: Is this the end of n-tier architectures  B
David Frith, Principal Security Consultant, Info-Assure Ltd, UK
Industrial Control System (ICS) security risk management
Franky Thrasher, Information Systems Security Officer, GDF-Suez, Belgium
Encryption for everyone! Overcoming obstacles of Public Key Encryption  B
Mechthild Stöwer, Head of Department Security Management, Fraunhofer Institute for Secure Information Technology – SIT, Germany
Secure Partitioning of application Logic In a Trustworthy Cloud (SPLITCloud)  B
Sirrix AG security technologies, Germany
Monitoring critical infrastructure traffic on fresh networks
Nathan Bates, Lead Security Engineer, Adobe Systems, Inc., USA
Securing enterprise communication on both sides of the firewall with state-of-the-art end-to-end encryption  B
Burkhard Wiegel, CEO, Zertificon Solutions GmbH, Germany
16:20-16:45 Coffee Break
eID and Trust Services
Marc Sel, Director, PricewaterhouseCoopers, Belgium
Cybersecurity and Cybercrime
Michael Hartmann, Security Expert, SAP, Germany
Internet of Things
Franky Thrasher, Information Systems Security Officer, GDF-Suez, Belgium
Bordeaux Room Burgund I Room Burgund II Room
16:45-18:15 Summary and conclusions of the IAS² study to support the implementation of a pan-European framework on electronic identification & trust services for electronic transactions in the EU internal market  B
Olivier Delos, Senior e-Security & e-Solutions consultants, SEALED
Making sense of future cybersecurity technologies: Using ontologies for multidisciplinary domain analysis  B
Marcello Balduccini, Professor, Drexel University, UKClaire Vishik, Trust & Security Director, Intel, UK
Identity use cases and conundrums in an IoT world
Philip Hoyer, Director Strategic Innovation, HID Global, UK
Signature Validation – A Dark Art?  B
Peter Lipp, Assistant Professor, Graz University of Technology, Austria
How the God particle will help you securing your assets  B
Thomas Punz, Manager, Itecor, Switzerland
& Roger Bollhalder, Lecturer, Fernfachhochschule Schweiz (FFHS), Switzerland
Scalable security for IoT
Geert-Jan Schrijen, CTO, Intrinsic-ID, The Netherlands
PixInk: A novel way to deliver strong WYSIWYS functionality using advanced image processing techniques
Guillaume Forget, Senior Vice President, Cryptomathic, Germany
The Evolution of Cybersecurity: Continuous Active Threat Protection  S
Craig Bird, Senior Territory Manager, eSentire, UK
Trust Evidence for IoT: Trust Establishment from servers to sensors  B
David Ott, Research Director, Intel, USA
Drinks Reception
Dinner Speech: Building Security, Protection and Trust within Society and the Economy
Klaus Vitt, IT Commissioner of the federal government and Secretary of State at the Ministry of the Interior, GermanySkIDentity Award Ceremony – Landmark in the Land of Ideas
Alexander Tettenborn, Federal Ministry of Economics and Energy, Germany 

 B This presentation is featured within your ISSE 2015 book
 Vendor Session

Programme is correct at time of publication. In the event of any changes, these will be made at the earliest opportunity or can be accessed on the ISSE ‘Superevent’ app.

Click here for the Day 2 Programme

Click here to Register


Click here to advertise in the 2017 Conference Planner




  • We speak on ISSE, because ISSE is one of the major european conferences which brings together both decision-makers and practitioners and researchers.
    Christian and Christoph Thiel, Professor, Institute for Information and Process Management at the University of Applied Sciences in St. Gallen (Switzerland) / Professor, FH Bielefeld – University of Applied Sciences (Germany)







  • I have attended EEMA events across Europe for several years, both as an attendee, as a speaker, and in representing IdenTrust as a corporate sponsor. Invariably the agendas and the calibre of speakers have been good, and most importantly these events allow all attendees (whether from governments, or from the business/financial/technology/legal communities) to interact together, to discuss best practices and to understand where we compete and where we collaborate in this evolving marketplace.
    John Bullard, Global Ambassador for IdenTrust (UK)


  • “We are delighted to be invited to speak at this year’s conference in Berlin. ISSE is unique in bringing together policymakers and industry insiders and we consider it one of the premier security events in Europe”
    Pim Tuyls, CEO, Intrinsic ID (The Netherlands)