When it comes to a specialist conference, it is not only the lecturers' quality that matters but it is also important to exchange experiences with other participants who are in similar positions and deal with similar issues. IT-Defense offers a clear framework to discuss security issues and topics with other participating security experts.
Participants can discuss their own problems and other profound issues in small groups. For this purpose, IT-Defense lecturers serve as moderators; however, it is also possible to form individual groups on specific subjects.
Simultaneous round-table discussions will be available on Friday, February 2, 2024.
“All Quiet on the Western Front” - the latest risks and trends and why giving up is no solution! - Volker Kozok
Using the attack on the administration in Bitterfeld as an example, new attack scenarios are presented and possible solutions are discussed. Can we manage the balancing act between overregulation and complex technology as well as the lack of human and financial resources!?
New requirements through NIS-2 and Co. – but what does it mean for our/my company? – Dr. Christoph Wegener
There have recently been numerous new directives and regulations in the EU. From an information security perspective, the “NIS-2 Directive”, the “Critical Entities Resilience (RCE) Directive” and the “Cyber Resilience Act (CRA)” are particularly important.
This round table will mainly present the content of the European NIS-2 Directive and, as far as possible, the related German implementation act. Dr. Christoph Wegener will shed light on the requirements that result for companies and, together with the participants, discuss the possible consequences for their companies.
In this round table, our experienced consultants think back over past projects and let you in on how they managed to take over Active Directory environments. They will then discuss with the participants how companies can prevent such incidents. The participants also have the opportunity to share the experiences and problems they have had in practice and to discuss possible solutions.
Uncovering & utilizing the quantum processors that secretly power A.I. the world over! – Jayson E. Street
A.I. may be seen as a cost-effective way to replace workers. We will look closer, however, and discover the uncomfortable truth behind A.I. and what really powers it. We will also discover how to harness the hidden power propping up A.I. for ourselves & our company’s security.
One of the biggest, most advanced, and adaptive Intrusion Detection Systems available has been hiding in plain sight. Why isn’t it being implemented? Widespread failure on the part of Information Security & Management. We will pinpoint the systemic flaws and learn how to ensure correct and effective implementation and maintenance of our most powerful tool to fight illicit artificial intelligence: Human intelligence.