Deutsche Telekom Security GmbH

Ralf Schneider

SVP Security Consulting & AI Security | Deutsche Telekom Security GmbH

Ralf Schneider is globally responsible for Cyber Security Consulting at Deutsche Telekom Security and has been responsible for the strategic topic of AI Security since 2024.
Until 2020, he worked at Detecon International in various roles, most recently as Managing Partner for Business Technology Strategy & Transformation and Interim CEO. After studying theoretical chemistry, he managed international IT outsourcing projects at T-Systems International / debis Systemhaus from 1999 to 2006.

Follow me
Focus Topics

The Focus Topics form the thematic core of the DIGITAL X– with a clear view of the opportunities and relevant challenges for companies. The speaker's focus is:

Artificial intelligence Security

Experience my sessions live.

Discover my sessions, join us live, and don't miss a single presentation at DIGITAL X!

Masterclass Artificial intelligence

AI Security für LLM und AI Agents – Identität im Fokus

13:45-14:15
Raum D1
German
Basic

Artificial intelligence is not only revolutionizing the IT & OT landscape, it is also opening an exciting new chapter in cybersecurity! How do I protect AI in the company against attacks on AI and AI agents? What essential role does Identity play? Only a combination of one-off and continuous security measures such as testing, red teaming, AI endpoint protection and seamless integration into the cyber defense chain and identity management will provide complete end-to-end security.

Masterclass Artificial intelligence

AI Security für LLM und AI Agents – Identität im Fokus

14:15-14:45
Raum H
German
Basic

Artificial intelligence is not only revolutionizing the IT & OT landscape, it is also opening an exciting new chapter in cybersecurity! How do I protect AI in the company against attacks on AI and AI agents? What essential role does Identity play? Only a combination of one-off and continuous security measures such as testing, red teaming, AI endpoint protection and seamless integration into the cyber defense chain and identity management will provide complete end-to-end security.