An important aspect of a specialist conference is not only the quality of the lecturers but also the exchange of experiences with other participants in similar positions and with similar problems. IT defense offers a clear framework for discussion with other participating security experts.
Participants can discuss their own problems and other in-depth issues in small groups. For this purpose IT-Defense lecturers are available as moderators, but spontaneous formation of individual groups on specific subjects is also possible.
Simultaneous round-table discussions are available on Friday, February 3rd 2006:
| Tobias Klein:
| Computer Forensic
| Ofir Arkin:
| Voice over IP Security
| John Viega:
| Secure Software
| Joanna Rutkowska:
| The Future of Stealth Malware: Detection and Anti-Detection
| Darrin Miller:
| IPv6-Security Threats – A Comparison to IPv4