Skip to content Skip to sidebar Skip to footer

IT Managers Meeting Darmstadt: IT Security Monitoring along the Cyber Kill Chain

Recap: IT Managers Meeting at IHK Darmstadt (22 January 2026)

On-site event · Thursday, 22 January 2026 · 14:00–17:00 · IHK Darmstadt, Rheinstraße 89, Darmstadt

The IT Managers Meeting organized by the IHK Darmstadt Rhein Main Neckar
brought together IT managers, system administrators, and service providers for a practical exchange on
current IT challenges. FeldmannCyber participated as an invited speaker with a contribution on
IT security monitoring.

Key takeaway
Monitoring is most effective when it is designed along the attack chain,
rather than driven by individual tools: clear objectives, clear signals, clear responsibilities.

FeldmannCyber presentation: IT security monitoring along the Cyber Kill Chain

The presentation illustrated how cyber risk monitoring can be structured along the
Cyber Kill Chain. The focus was on how monitoring measures can be placed deliberately
at different stages of an attack to make risks visible early and support timely response.

Covered building blocks:

  • Preventive scans to reduce known attack surfaces
  • Active security monitoring to detect suspicious behavior early
  • SIEM for correlation, prioritization, and traceability of security events

What was intentionally not the focus

The session was not a product presentation. Instead, it provided a
decision-oriented framework: which signals matter, where noise is created,
and how monitoring can be operated in a sustainable and auditable way.

Event context

In addition to FeldmannCyber’s presentation, the agenda included two further independent talks:

  • Cloud cost optimization (adconova GmbH)
  • Third-party risks and business continuity in the context of NIS2 (DENIC Services GmbH & Co. KG)

These sessions were separate contributions by the respective speakers and not directly related
to the monitoring topic, but they provided valuable additional perspectives during the discussions.

Thanks

Many thanks to Richard Jordan for the organization, moderation, and the invitation.
The discussions before and after the sessions were a valuable part of the event.

Links

Official event page:

https://event.darmstadt.ihk.de/b?p=itleitertreff_20260122w

Conclusion

IT security monitoring creates value when it is planned, measurable, and operable.
Thinking along the Cyber Kill Chain helps organizations treat monitoring as
systematic risk management rather than a collection of isolated alerts.

Leave a comment

0.0/5