Die Agenda für 2025 folgt.
13. Mai 2025 - Tag 1
Technik
Zeit | Inhalt | ||
---|---|---|---|
08:15 | Check-In | ||
09:00 | Opening | ||
09:30 | Opening Talk – Backup worst practices – How you lose your data for sure (English) Hannes Kasparick | ||
10:20 | Networking | ||
10:40 | Qnap als Köder: Erforschungen im Botnetz-Dschungel Andreas Petker | ||
11:30 | Networking | ||
11:50 | BPF – Linux/Windows Kernel „God-Mode“ Carsten Strotmann | ||
12:40 | Lunch | ||
13:25 | Keynote: Let’s Chat about Gross Public Text generation
(English) Eddy Willems, Righard Zwienenberg | ||
14:40 | Networking | ||
14:55 | Einführung in den aktuellen Stand der Malwareentwicklung Tobias Wicke | ||
15:45 | Networking | ||
16:00 | A Glimpse into Kubernetes Security based on a Realistic Attack Scenario Markus Gierlinger, Mario Kahlhofer | ||
16:50 | Networking | ||
17:00 | Closing Talk – Linux secure platform – IoT system integrity and security Frank Rehberger | ||
17:50 | Closing Words | ||
19:00 | Soiree |
Management
Zeit | Inhalt | ||
---|---|---|---|
08:15 | Check-In | ||
09:00 | Opening | ||
09:30 | Opening Talk – Backup worst practices – How you lose your data for sure (English) Hannes Kasparick | ||
10:20 | Networking | ||
10:40 | ISMS nach ISO 27001 für KMU’s sinnvoll und umsetzbar? Beatrice Dietrichsteiner, Matthias Zwittag | ||
11:30 | Networking | ||
11:45 | Datenschutz-Update – Entscheidungen 2023 und deren Auswirkungen auf die Verantwortlichen Thomas Schweiger | ||
12:35 | Lunch | ||
13:25 | Keynote: Let’s Chat about Gross Public Text generation (English) Eddy Willems, Righard Zwienenberg | ||
14:40 | Networking | ||
14:55 | Digital Operational Resilience Act (DORA) Katrin Repic, Nino Tlapak | ||
15:45 | Networking | ||
16:00 | Unlocking Agile Security: Success Stories from the Security Community of Practice (English) Christian Buchinger, Marco Macala, Florian Schier | ||
16:50 | Networking | ||
17:00 | Closing Talk – Linux secure platform – IoT system integrity and security Frank Rehberger | ||
17:50 | Closing Words | ||
19:00 | Soiree |
14. Mai 2025 - Tag 2
Technik
Zeit | Inhalt | ||
---|---|---|---|
08:30 | Check-In | ||
09:00 | Opening | ||
09:15 | Opening Talk:
NIS2 und CRA – ein Überblick
Robert Kolmhofer | ||
10:30 | Networking | ||
10:45 | Solving prehistoric problems in IR with dinosaurs Michael Popovtschak | ||
11:35 | Networking | ||
11:50 | Will it crash? Kubernetes and Containers in your Car Reinhard Kugler | ||
12:40 | Lunch | ||
13:50 | Keynote: Whistleblowing: Wie Sie operative Security-Chancen nutzen, die sich aus der neuen gesetzlichen Pflicht ergeben Georg Jeitler | ||
14:40 | Networking | ||
15:05 | Automatisierung von Forensik Workflows: Neue Wege in der Kryptoasset-Forensik zur Bekämpfung von Cyberkriminalität Bernhard Haslhofer | ||
15:55 | Networking | ||
16:05 | Closing Talk: Automated phishing detection and mitigation (English) Joachim Kerschbaumer | ||
16:55 | Closing Words |
Management
Zeit | Inhalt | ||
---|---|---|---|
08:30 | Check-In | ||
09:00 | Opening | ||
09:15 | Opening Talk:
NIS2 und CRA – ein Überblick
Robert Kolmhofer | ||
10:30 | Networking | ||
10:45 | Supply Chain Cybersecurity: Challenges, solutions and legal requirements (English) Michael Herburger | ||
11:35 | Networking | ||
12:00 | Secure Development Lifecycle von OT Produkten mit IEC 62443 im Kontext des EU CRA Stephan Hutterer | ||
12:50 | Lunch | ||
13:50 | Keynote: Whistleblowing: Wie Sie operative Security-Chancen nutzen, die sich aus der neuen gesetzlichen Pflicht ergeben Georg Jeitler | ||
14:40 | Networking | ||
15:05 | Challenges of Digital Forensics and Incident Response (DFIR) in OT Environments Stephan Mikiss, Gerhard Hechenberger | ||
15:55 | Networking | ||
16:05 | Closing Talk: Automated phishing detection and mitigation (English) Joachim Kerschbaumer | ||
16:55 | Closing Words |