Program Round Tables

Round Tables

When it comes to a specialist conference, it is not only the lecturers' quality that matters but it is also important to exchange experiences with other participants who are in similar positions  and deal with similar issues. IT-Defense offers a clear framework to discuss security issues and topics with other participating security experts. 

Participants can discuss their own problems and other profound issues in small groups. For this purpose, IT-Defense lecturers serve as moderators; however, it is also possible to form individual groups on specific subjects.

Simultaneous round-table discussions will be available on Friday, February 2, 2018.

Something about something - New and old threats and the story behind – Volker Kozok

After a short overview of current threats and risks, various questions on recent trends will be discussed:

  • How state-sponsored are APTs really?
  • How does ransomware work without ransom?
  • Who really needs cyber intelligence tools?
  • Are the AI approaches of the cloud and the big data world rather A or I?
  • Do we need even more laws, or are the IT Security Act and the General Data Protection Regulation not (too) demanding enough already?

Modern malware: current threat situation and new approaches – Stefan Strobel

This round table will present and discuss current issues related to malware, ransomware and new approaches:

  • Why are traditional anti-virus solutions no longer capable of providing proper protection from modern malware?
  • What are the weak points of present protection concepts?
  • What new technical approaches are available today?
  • What are the benefits and deficits/problems of those new approaches?
  • How do we get a new, future-proof malware protection concept?

Patching the Human: Defending against Social Engineering via Teachable Moments – Jayson E. Street

I'll discuss how to create internal security-awareness trainings for executives and users. To help them better understand the evolving threats and how to take precautions so they do not become a victim of social-engineering attacks!