IT-Defense 2024Round Tables

Round Tables

When it comes to a specialist conference, it is not only the lecturers' quality that matters but it is also important to exchange experiences with other participants who are in similar positions  and deal with similar issues. IT-Defense offers a clear framework to discuss security issues and topics with other participating security experts. 

Participants can discuss their own problems and other profound issues in small groups. For this purpose, IT-Defense lecturers serve as moderators; however, it is also possible to form individual groups on specific subjects.

Simultaneous round-table discussions will be available on Friday, February 2, 2024.


“All Quiet on the Western Front” - the latest risks and trends and why giving up is no solution! - Volker Kozok und Dirk Kunze

Using the attack on the administration in Bitterfeld as an example, new attack scenarios are presented and possible solutions are discussed. Can we manage the balancing act between overregulation and complex technology as well as the lack of human and financial resources!?
 

New requirements through NIS-2 and Co. – but what does it mean for our/my company? – Dr. Christoph Wegener

There have recently been numerous new directives and regulations in the EU. From an information security perspective, the “NIS-2 Directive”, the “Critical Entities Resilience (RCE) Directive” and the “Cyber Resilience Act (CRA)” are particularly important.

This round table will mainly present the content of the European NIS-2 Directive and, as far as possible, the related German implementation act. Dr. Christoph Wegener will shed light on the requirements that result for companies and, together with the participants, discuss the possible consequences for their companies.
 

Stories from the Field: AD Tiering in Practice – Hagen Molzer and Constantin Wenz

In this round table, our experienced consultants think back over past projects and let you in on how they managed to take over Active Directory environments. They will then discuss with the participants how companies can prevent such incidents. The participants also have the opportunity to share the experiences and problems they have had in practice and to discuss possible solutions.
 

Uncovering & utilizing the quantum processors that secretly power A.I. the world over!Jayson E. Street

A.I. may be seen as a cost-effective way to replace workers. We will look closer, however, and discover the uncomfortable truth behind A.I. and what really powers it. We will also discover how to harness the hidden power propping up A.I. for ourselves & our company’s security.

One of the biggest, most advanced, and adaptive Intrusion Detection Systems available has been hiding in plain sight. Why isn’t it being implemented? Widespread failure on the part of Information Security & Management. We will pinpoint the systemic flaws and learn how to ensure correct and effective implementation and maintenance of our most powerful tool to fight illicit artificial intelligence: Human intelligence.
 

AI and Cybercrime – Prof. Dr. Dirk Labudde

The possibilities of intelligent systems pervade our daily lives. We can find artificial intelligence applications in every area of our life, including in the cybercrime field of phenomenon. Such applications are used by criminals to carry out new ways of committing “old” crimes. The grandparent scam is getting more and more technical and uses many components of AI: from voice bots and deepfake to ChatGPT and the like. Different examples are used to explain the influence intelligent systems have on crime and thus on the role of the victims and offenders. Can we easily trust our senses, for instance, in our digital communication?

What can IT security and IT forensics do to fight cybercrime phenomena together?
 

Creating fantastic visual worlds using image AI – Joerg Heidrich

Image AI offers almost endless possibilities to generate amazing images and graphics for any topic conceivable within only a few seconds. In a business context, image AI allows for the easy creation of images that exactly fit their purpose, such as for a website or presentation.

But how do I get an AI to generate an image that meets my expectations? How do I need to structure the text commands so that Midjourney understands me? And what am I even allowed to do with the images I have created? In this round table we will look at how we can skillfully use Midjourney and DALL-E.

Joerg Heidrich is a legal adviser of the German publishing house Heise Medien, he holds webinars on the use of image AI for Heise and regularly trains Heise employees.