Round Tables
When it comes to a specialist conference, it is not only the lecturers' quality that matters but it is also important to exchange experiences with other participants who are in similar positions and deal with similar issues. IT-Defense offers a clear framework to discuss security issues and topics with other participating security experts.
Participants can discuss their own problems and other profound issues in small groups. For this purpose, IT-Defense lecturers serve as moderators; however, it is also possible to form individual groups on specific subjects.
Simultaneous round-table discussions will be available on Friday, February 6, 2026.
Cyber Intelligence - Hype or Help? – Volker Kozok
How tools for analysis and evaluation help us with our work, when OSINT, SIEM, etc. actually make sense and why the most crucial question is not what the tools can do, but rather whether they help us in making decisions. We will discuss the question of how many dashboards, heat maps and animated interfaces are needed, how we can prevent an information overkill and why OSINT in the machine will not work without HUMINT in front of the machine.
In this talk, various cyber intelligence tools will be presented, their advantages and disadvantages will be discussed, and possible and most importantly sensible use cases will be explained.
As always, a critical view on the world of “solution providers”.
NIS-2 and the Like: Now Everything Is Clear – Or Isn’t It?!?? – Dr. Christoph Wegener
In this round table, we discuss the open questions of the participants regarding the requirements that result from the specifications of the NIS-2 Directive and the German implementation act as well as the corresponding “implementation aides” that already exist.
This round table is no legal counsel for individual cases. Instead, it wants to join the discussion about this topic based on the legal requirements that exist at the time of this round table, discuss concrete questions from everyday practice and evaluate practical suggestions for implementation.
Cybercrime and Ransomware – Current Threat Situation and New Trends – Stefan Strobel
Both the threat situation and techniques of attackers as well as the measures and products available to protect enterprises from attacks or detect a compromise are constantly evolving. Risk management and the development of security architectures require a current understanding of these trends because the challenges of tomorrow cannot always be handled using yesterday’s solutions. This presentation addresses some of these developments and provides an overview of the latest trends.
How to Respond to and Prepare for an IT Security Incident with Malware and Ransomware – Stefan Strobel
Malware and ransomware attacks have become the most common cyberattacks and, in many cases, result in serious security incidents on a business level. If such an incident occurs, urgent action must be taken.
But what are the correct measures to stop or limit an attack? What are the aspects that must be considered? How should you prepare yourself?
In this round table, we will discuss these as well as other questions and I will tell you about real-life incidents.