PROGRAM

Round Tables

An important aspect of a specialist conference is not only the quality of the lecturers but also the exchange of experiences with other participants in similar positions and with similar problems. IT-Defense offers a clear framework for discussion with other participating security experts.

Participants can discuss their own problems and other in-depth issues in small groups. For this purpose IT-Defense lecturers are available as moderators, but spontaneous formation of individual groups on specific subjects is also possible.

Simultaneous round-table discussions are available on Friday, February 10th 2012

Further information to the round-tables will follow after release by the speakers.

Volker Kozok &
Dr. Christoph Wegener         
  Current threats and risks and why cyber strategies do not work!  
  - Anonymous  - Duqu - Botnet & Co - what's new?
Jana Diesner   Data Mining Methods for Knowledge Discovery from Digital Trace Data
Chris Boehme &
Roelof Temmingh
  Maltego Machines
Matt Jonkman   Advances in IDS and Malware Detection: Suricata and Emerging Threats
Holger Arends   Angriffsvektoren auf eine Microsoftumgebung – und Gegenmaßnahmen