PROGRAM

Round Tables

An important aspect of a specialist conference is not only the quality of the lecturers but also the exchange of experiences with other participants in similar positions and with similar problems.

IT-Defense offers a clear framework for discussion with other participating security experts. Participants can discuss their own problems and other in-depth issues in small groups. For this purpose IT-Defense lecturers are available as moderators, but spontaneous formation of individual groups on specific subjects is also possible.

Simultaneous round-table discussions are available on Friday, February 5th 2010.

Fixed round tables:

Karsten Nohl   Security of digital access cards
Barry „The Key“ Wels  Lock Picking
Saumil Shah  Browser Exploits
Starbug  Hacking Biometric Systems
Volker Kozok  Bulletproof-Hosting: Risikoanalyse - Awarenessschulung - Maßnahmen,  
 Handlungsoptionen für den CIO