22. Mai 2024 - Tag 1
Technik
Zeit | Inhalt | ||
---|---|---|---|
08:15 | Check-In | ||
09:00 | Opening | ||
09:30 | Opening Talk – Backup worst practices – How you lose your data for sure (English) Hannes Kasparick | ||
10:20 | Networking | ||
10:40 | Qnap als Köder: Erforschungen im Botnetz-Dschungel Andreas Petker | ||
11:30 | Networking | ||
11:50 | BPF – Linux/Windows Kernel „God-Mode“ Carsten Strotmann | ||
12:40 | Lunch | ||
13:25 | Keynote: Let’s Chat about Gross Public Text generation
(English) Eddy Willems, Righard Zwienenberg | ||
14:40 | Networking | ||
14:55 | Einführung in den aktuellen Stand der Malwareentwicklung Tobias Wicke | ||
15:45 | Networking | ||
16:00 | A Glimpse into Kubernetes Security based on a Realistic Attack Scenario Markus Gierlinger, Mario Kahlhofer | ||
16:50 | Networking | ||
17:00 | Closing Talk – Linux secure platform – IoT system integrity and security Frank Rehberger | ||
17:50 | Closing Words | ||
19:00 | Soiree |
Management
Zeit | Inhalt | ||
---|---|---|---|
08:15 | Check-In | ||
09:00 | Opening | ||
09:30 | Opening Talk – Backup worst practices – How you lose your data for sure (English) Hannes Kasparick | ||
10:20 | Networking | ||
10:40 | ISMS nach ISO 27001 für KMU’s sinnvoll und umsetzbar? Beatrice Dietrichsteiner, Matthias Zwittag | ||
11:30 | Networking | ||
11:45 | Datenschutz-Update – Entscheidungen 2023 und deren Auswirkungen auf die Verantwortlichen Thomas Schweiger | ||
12:35 | Lunch | ||
13:25 | Keynote: Let’s Chat about Gross Public Text generation (English) Eddy Willems, Righard Zwienenberg | ||
14:40 | Networking | ||
14:55 | Digital Operational Resilience Act (DORA) Katrin Repic, Nino Tlapak | ||
15:45 | Networking | ||
16:00 | Unlocking Agile Security: Success Stories from the Security Community of Practice (English) Christian Buchinger, Marco Macala, Florian Schier | ||
16:50 | Networking | ||
17:00 | Closing Talk – Linux secure platform – IoT system integrity and security Frank Rehberger | ||
17:50 | Closing Words | ||
19:00 | Soiree |
23. Mai 2024 - Tag 2
Technik
Zeit | Inhalt | ||
---|---|---|---|
08:30 | Check-In | ||
09:00 | Opening | ||
09:15 | Opening Talk:
NIS2 und CRA – ein Überblick
Robert Kolmhofer | ||
10:30 | Networking | ||
10:45 | Solving prehistoric problems in IR with dinosaurs Michael Popovtschak | ||
11:35 | Networking | ||
11:50 | Will it crash? Kubernetes and Containers in your Car Reinhard Kugler | ||
12:40 | Lunch | ||
13:50 | Keynote: Whistleblowing: Wie Sie operative Security-Chancen nutzen, die sich aus der neuen gesetzlichen Pflicht ergeben Georg Jeitler | ||
14:40 | Networking | ||
15:05 | Automatisierung von Forensik Workflows: Neue Wege in der Kryptoasset-Forensik zur Bekämpfung von Cyberkriminalität Bernhard Haslhofer | ||
15:55 | Networking | ||
16:05 | Closing Talk: Automated phishing detection and mitigation (English) Joachim Kerschbaumer | ||
16:55 | Closing Words |
Management
Zeit | Inhalt | ||
---|---|---|---|
08:30 | Check-In | ||
09:00 | Opening | ||
09:15 | Opening Talk:
NIS2 und CRA – ein Überblick
Robert Kolmhofer | ||
10:30 | Networking | ||
10:45 | Supply Chain Cybersecurity: Challenges, solutions and legal requirements (English) Michael Herburger | ||
11:35 | Networking | ||
12:00 | Secure Development Lifecycle von OT Produkten mit IEC 62443 im Kontext des EU CRA Stephan Hutterer | ||
12:50 | Lunch | ||
13:50 | Keynote: Whistleblowing: Wie Sie operative Security-Chancen nutzen, die sich aus der neuen gesetzlichen Pflicht ergeben Georg Jeitler | ||
14:40 | Networking | ||
15:05 | Challenges of Digital Forensics and Incident Response (DFIR) in OT Environments Stephan Mikiss, Gerhard Hechenberger | ||
15:55 | Networking | ||
16:05 | Closing Talk: Automated phishing detection and mitigation (English) Joachim Kerschbaumer | ||
16:55 | Closing Words |
25. April 2023 - Tag 1
Technik
Uhrzeit | Inhalt | ||
---|---|---|---|
08:15 | Check-In | ||
09:00 | Opening | ||
09:15 | Opening Talk – Rocky road ahead-first steps and challenges in security testing within the automotive domain Reinhard Kugler | ||
10:05 | Networking | ||
10:25 | Cookie Monster – Another way of cookie hijacking Michael Knoll & Markus Sojer | ||
11:15 | Networking | ||
11:35 | Security in Machine Learning by Plausible Deniablility Stefan Rass | ||
12:25 | Lunch | ||
13:15 | Keynote: Deciphering 50 Secret Letters from Mary Queen of Scots 1578-1584 with Modern Algorithms
🇬🇧 George Lasry | ||
14:30 | Networking | ||
14:50 | Adventures with Zyxel Routers Gerhard Hechenberger & Steffen Robertz | ||
15:40 | Networking | ||
16:00 | Analysing the Quantum Threat – a perspective from the industry 🇬🇧 Natalie Kilber | ||
16:50 | Networking | ||
17:00 | Closing Talk – OT Security – das unfassbar Unsichere Felix Eberstaller & Bernhard Lorenz | ||
17:50 | Closing Words | ||
19:00 | Soiree |
Management
Uhrzeit | Inhalt | ||
---|---|---|---|
08:15 | Check-In | ||
09:00 | Opening | ||
09:15 | Opening Talk – Rocky road ahead-first steps and challenges in security testing within the automotive domain Reinhard Kugler | ||
10:05 | Networking | ||
10:25 | Forensik und Incident Response Readiness – Der Teufel steckt nicht nur im technischen Detail Olaf Schwarz | ||
11:15 | Networking | ||
11:25 | ISO/IEC27001:2022 Viktoria Hauser & Florian Schilchegger | ||
12:15 | Lunch | ||
13:15 | Keynote: Deciphering 50 Secret Letters from Mary Queen of Scots 1578-1584 with Modern Algorithms
🇬🇧 George Lasry | ||
14:30 | Networking | ||
14:50 | Building an effective cyber defense team – Do’s and don’ts 🇬🇧 Daniel Kästle | ||
15:40 | Networking | ||
16:00 | NIS2 – eine Tsunami-Warnung! Stefan Bumerl | ||
16:50 | Networking | ||
17:00 | Closing Talk – OT Security – das unfassbar Unsichere Felix Eberstaller & Bernhard Lorenz | ||
17:50 | Closing Words | ||
19:00 | Soiree |
26. April 2023 - Tag 2
Technik
Uhrzeit | Inhalt | ||
---|---|---|---|
08:30 | Check-In | ||
09:15 | Opening | ||
09:30 | Opening Talk – Identity Management im digitalen Stromnetz Stefan Gonda | ||
10:20 | Networking | ||
10:40 | Von der EDR Evasion über Certificate Authorities zum Domain Admin: Red Teaming 2023 Benjamin Petermaier & Severin Winkler | ||
11:30 | Networking | ||
11:40 | Supply Chain Security für moderne Cloud-Anwendungen Andreas Vogl | ||
12:30 | Lunch | ||
13:40 | Keynote: Secure to know 🇬🇧 Marcus Nohlberg | ||
14:55 | Networking | ||
15:15 | Cryptanalysis of Cipher Machines with the Help of Artificial Neural Networks Robert Landrichinger & Vasily Mikhalev | ||
16:05 | Networking | ||
16:15 | Closing Talk – Deep Fake – Die neue Realität?
Roland Pucher | ||
17:05 | Closing Words |
Management
Uhrzeit | Inhalt | ||
---|---|---|---|
08:30 | Check-In | ||
09:15 | Opening | ||
09:30 | Opening Talk – Identity Management im digitalen Stromnetz Stefan Gonda | ||
10:20 | Networking | ||
10:40 | Microsoft Cloud Security Governance Bernhard Heinzle | ||
11:30 | Networking | ||
11:50 | Wie Sie ihre Cyberrisiken erfolgreich managen Elmar Jilka | ||
12:40 | Lunch | ||
13:40 | Keynote: Secure to know 🇬🇧 Marcus Nohlberg | ||
14:55 | Networking | ||
15:15 | Das Purdue Referenz Modell auf dem Prüfstand – In die Jahre gekommene Pyramide vs. Internet of Unsecure Things Herbert Dirnberger | ||
16:05 | Networking | ||
16:15 | Closing Talk – Deep Fake – Die neue Realität? Roland Pucher | ||
17:05 | Closing Words |