-
Chronology of a cyber attack
Andreas BrückDone
-
Current attack vectors by industry 4.0 and countermeasures
Jens MehrfeldDone
-
Cyber security - Threats and challenges
Markus HartmannDone
-
Cooperation in the event of a threat
Jens MehrfeldDone
-
Member companies report - Our experience in dealing with cyber security
Done
-
Hands-On: Detecting security gaps in networked devices
Done
-
Cyber Analysis and Defense - Protecting critical systems and infrastructure from cyber attacks
Done
-
Feedback, summary and outlook for the 2nd day
Georg WasserloosDone
-
Hands-On: Detecting security gaps in networked devices
Done
-
Current developments and initiatives - an overview
Done