-
Hands-On: Detecting security gaps in networked devices
Done
-
Chronology of a cyber attack
Andreas BrückDone
-
Cyber Analysis and Defense - Protecting critical systems and infrastructure from cyber attacks
Done
-
Conclusion and outlook on the further course of the project
Georg WasserloosDone
-
Cooperation in the event of a threat
Jens MehrfeldDone
-
Hands-On: Detecting security gaps in networked devices
Done
-
Panel discussion
Georg WasserloosDone
-
Welcome and introduction Federal Office for Information Security
Done
-
Feedback from participants
Georg WasserloosDone
-
OT goes to Cloud: Requirements and possibilities
Heiko AdamczykDone
Current attack vectors by industry 4.0 and countermeasures
Location: Gruppe E
-
11/07/2019, 04:15
-
11/07/2019, 05:45
(Eastern Daylight Time)
(1 hour 30 minutes)