-
Current attack vectors by industry 4.0 and countermeasures
Jens MehrfeldDone
-
Chronology of a cyber attack
Andreas BrückDone
-
Hands-On: Detecting security gaps in networked devices
Done
-
Lunch
Done
-
Chronology of a cyber attack
Andreas BrückDone
-
Communication and coffeebreak
Done
-
Panel discussion
Georg WasserloosDone
-
Current attack vectors by industry 4.0 and countermeasures
Jens MehrfeldDone
-
Hands-On: Detecting security gaps in networked devices
Done
-
Feedback from participants
Georg WasserloosDone