25. April 2023 - Tag 1
Technik
Uhrzeit | Inhalt | ||
---|---|---|---|
08:15 | Check-In | ||
09:00 | Opening | ||
09:15 | Opening Talk – Rocky road ahead-first steps and challenges in security testing within the automotive domain Reinhard Kugler | ||
10:05 | Networking | ||
10:25 | Cookie Monster – Another way of cookie hijacking Michael Knoll & Markus Sojer | ||
11:15 | Networking | ||
11:35 | Security in Machine Learning by Plausible Deniablility Stefan Rass | ||
12:25 | Lunch | ||
13:15 | Keynote: Deciphering 50 Secret Letters from Mary Queen of Scots 1578-1584 with Modern Algorithms
🇬🇧 George Lasry | ||
14:30 | Networking | ||
14:50 | Adventures with Zyxel Routers Gerhard Hechenberger & Steffen Robertz | ||
15:40 | Networking | ||
16:00 | Analysing the Quantum Threat – a perspective from the industry 🇬🇧 Natalie Kilber | ||
16:50 | Networking | ||
17:00 | Closing Talk – OT Security – das unfassbar Unsichere Felix Eberstaller & Bernhard Lorenz | ||
17:50 | Closing Words | ||
19:00 | Soiree |
Management
Uhrzeit | Inhalt | ||
---|---|---|---|
08:15 | Check-In | ||
09:00 | Opening | ||
09:15 | Opening Talk – Rocky road ahead-first steps and challenges in security testing within the automotive domain Reinhard Kugler | ||
10:05 | Networking | ||
10:25 | Forensik und Incident Response Readiness – Der Teufel steckt nicht nur im technischen Detail Olaf Schwarz | ||
11:15 | Networking | ||
11:25 | ISO/IEC27001:2022 Viktoria Hauser & Florian Schilchegger | ||
12:15 | Lunch | ||
13:15 | Keynote: Deciphering 50 Secret Letters from Mary Queen of Scots 1578-1584 with Modern Algorithms
🇬🇧 George Lasry | ||
14:30 | Networking | ||
14:50 | Building an effective cyber defense team – Do’s and don’ts 🇬🇧 Daniel Kästle | ||
15:40 | Networking | ||
16:00 | NIS2 – eine Tsunami-Warnung! Stefan Bumerl | ||
16:50 | Networking | ||
17:00 | Closing Talk – OT Security – das unfassbar Unsichere Felix Eberstaller & Bernhard Lorenz | ||
17:50 | Closing Words | ||
19:00 | Soiree |
26. April 2023 - Tag 2
Technik
Uhrzeit | Inhalt | ||
---|---|---|---|
08:30 | Check-In | ||
09:15 | Opening | ||
09:30 | Opening Talk – Identity Management im digitalen Stromnetz Stefan Gonda | ||
10:20 | Networking | ||
10:40 | Von der EDR Evasion über Certificate Authorities zum Domain Admin: Red Teaming 2023 Benjamin Petermaier & Severin Winkler | ||
11:30 | Networking | ||
11:40 | Supply Chain Security für moderne Cloud-Anwendungen Andreas Vogl | ||
12:30 | Lunch | ||
13:40 | Keynote: Secure to know 🇬🇧 Marcus Nohlberg | ||
14:55 | Networking | ||
15:15 | Cryptanalysis of Cipher Machines with the Help of Artificial Neural Networks Robert Landrichinger & Vasily Mikhalev | ||
16:05 | Networking | ||
16:15 | Closing Talk – Deep Fake – Die neue Realität?
Roland Pucher | ||
17:05 | Closing Words |
Management
Uhrzeit | Inhalt | ||
---|---|---|---|
08:30 | Check-In | ||
09:15 | Opening | ||
09:30 | Opening Talk – Identity Management im digitalen Stromnetz Stefan Gonda | ||
10:20 | Networking | ||
10:40 | Microsoft Cloud Security Governance Bernhard Heinzle | ||
11:30 | Networking | ||
11:50 | Wie Sie ihre Cyberrisiken erfolgreich managen Elmar Jilka | ||
12:40 | Lunch | ||
13:40 | Keynote: Secure to know 🇬🇧 Marcus Nohlberg | ||
14:55 | Networking | ||
15:15 | Das Purdue Referenz Modell auf dem Prüfstand – In die Jahre gekommene Pyramide vs. Internet of Unsecure Things Herbert Dirnberger | ||
16:05 | Networking | ||
16:15 | Closing Talk – Deep Fake – Die neue Realität? Roland Pucher | ||
17:05 | Closing Words |