-
Chronology of a cyber attack
Andreas BrückDone
-
Hands-On: Detecting security gaps in networked devices
Done
-
Member companies report - Our experience in dealing with cyber security
Done
-
Chronology of a cyber attack
Andreas BrückDone
-
Conclusion and outlook on the further course of the project
Georg WasserloosDone
-
Panel discussion
Georg WasserloosDone
-
Feedback from participants
Georg WasserloosDone
-
Feedback, summary and outlook for the 2nd day
Georg WasserloosDone
-
Hands-On: Detecting security gaps in networked devices
Done
-
Lunch
Done
Current attack vectors by industry 4.0 and countermeasures
Location: Gruppe A
-
11/07/2019, 06:45
-
11/07/2019, 08:15
(Eastern Daylight Time)
(1 hour 30 minutes)