-
Welcome and introduction of agenda
Georg WasserloosDone
-
Panel discussion
Georg WasserloosDone
-
Communication and coffeebreak
Done
-
Cyber Analysis and Defense - Protecting critical systems and infrastructure from cyber attacks
Done
-
OT goes to Cloud: Requirements and possibilities
Heiko AdamczykDone
-
Arrival & Networking
Done
-
Communication and coffeebreak
Done
-
Member companies report - Our experience in dealing with cyber security
Done
-
Feedback from participants
Georg WasserloosDone
-
Cyber security - Threats and challenges
Markus HartmannDone