Aktuell laufend:ZeitTechnikManagement05.05.2026Day 107:30Check in08:50Opening09:20🇬🇧 Opening Talk: Social Engineering Second EditionEddy Willems & Righard Zwienenberg10:10Networking10:25🇬🇧 Resistence is futile! How a Linux system is assimilated using eBPF rootkitsReinhard Kugler🇬🇧 Old Systems, New Threats: Approaches to Securing Legacy ProductsAli Mohammed Hosseini11:15Networking11:30🇬🇧 A decade of enumeration attacks in WhatsApp and other recurring vulnerability patterns in mobile appsSebastian Schrittwieser & David Schmidt & Gabriel GegenhuberSecurity Without Attack: Systemic Risk in Industrial NetworksHerbert Dirnberger12:20Lunch13:25🇬🇧 Keynote: Shhh, It’s A Secret: Preventing Sensitive Data Exposure in LogsCatherine Easdon14:40Networking14:55🇬🇧 The PKI Night Watch: The Iron Key - Domain Control via AD CS CertificatesJan-Sebastian RodeIntegration des EU CRA in Secure Development ProzesseAlexander Aigner15:45Networking16:00Livehack: Über Azure zu On-Prem. Wie Hacker die Cloud als Sprungbrett nutzenTobias WickeCloud-Dienste im Visier: Wann werden XaaS-Lösungen zum regulierten Datenverarbeitungsdienst?Corina Kruesz16:50Networking17:00Closing Talk: DDoS Reimagined: From Bandwidth Battles to Precise Layer 7 DDoS AttacksLisa Fröhlich17:50Closing Words19:00Soiree06.05.2026Day 208:30Check in09:10Opening09:40🇬🇧 Opening Talk: The Human Factor. Cybersecurity's weakest link or most adaptive defense?Yvonne Bauer & Wolfgang Ettlinger10:30Networking10:45🇬🇧 Reverse Engineers Hate This Trick: How to Bind Code to HardwareDaniel Dorfmeister & Bernhard FischerMr. Jekyll & Dr. Hyde – Cybersecurity zwischen Prüfung, Betrieb und EnergiewendeThomas Pfeiffer11:35Networking11:50Ghost in the ERP: An Offensive Approach to SAPSeverin Winkler & Benjamin Petermaier🇬🇧 When Prevention Becomes AttributionBettina Sterner12:40Lunch13:40Keynote: Cyber-Angriffe und asoziale Medien bedrohen Staat, Gesellschaft, Wohlstand und BürgerWalter Unger14:55Networking15:10🇬🇧 Beyond Honeypots: Practical Cyber Deception for Real SystemsMario KahlhoferOWASP TOP 10 mit neuem Fokus - Ein Überblick über die zentralen OT-SicherheitsrisikenFelix Eberstaller & Nino Fürthauer16:00Networking16:15🇬🇧 Pre-Closing Talk: The Tuesday Threat, Why Security Fails in the Most Ordinary MomentsMarcus Nohlberg17:05Networking17:20Closing Talk: Hands-free Lockpicking: Opening Doors Like in The MoviesClemens Stockenreitner & Werner Schober18:10Closing WordsMobile Ansicht:UntereinanderHorizontalTechnikZeitSession05.05.2026Day 107:30Check in08:50Opening09:20🇬🇧 Opening Talk: Social Engineering Second EditionEddy Willems & Righard Zwienenberg10:10Networking10:25🇬🇧 Resistence is futile! How a Linux system is assimilated using eBPF rootkitsReinhard Kugler11:15Networking11:30🇬🇧 A decade of enumeration attacks in WhatsApp and other recurring vulnerability patterns in mobile appsSebastian Schrittwieser & David Schmidt & Gabriel Gegenhuber12:20Lunch13:25🇬🇧 Keynote: Shhh, It’s A Secret: Preventing Sensitive Data Exposure in LogsCatherine Easdon14:40Networking14:55🇬🇧 The PKI Night Watch: The Iron Key - Domain Control via AD CS CertificatesJan-Sebastian Rode15:45Networking16:00Livehack: Über Azure zu On-Prem. Wie Hacker die Cloud als Sprungbrett nutzenTobias Wicke16:50Networking17:00Closing Talk: DDoS Reimagined: From Bandwidth Battles to Precise Layer 7 DDoS AttacksLisa Fröhlich17:50Closing Words19:00Soiree06.05.2026Day 208:30Check in09:10Opening09:40🇬🇧 Opening Talk: The Human Factor. Cybersecurity's weakest link or most adaptive defense?Yvonne Bauer & Wolfgang Ettlinger10:30Networking10:45🇬🇧 Reverse Engineers Hate This Trick: How to Bind Code to HardwareDaniel Dorfmeister & Bernhard Fischer11:35Networking11:50Ghost in the ERP: An Offensive Approach to SAPSeverin Winkler & Benjamin Petermaier12:40Lunch13:40Keynote: Cyber-Angriffe und asoziale Medien bedrohen Staat, Gesellschaft, Wohlstand und BürgerWalter Unger14:55Networking15:10🇬🇧 Beyond Honeypots: Practical Cyber Deception for Real SystemsMario Kahlhofer16:00Networking16:15🇬🇧 Pre-Closing Talk: The Tuesday Threat, Why Security Fails in the Most Ordinary MomentsMarcus Nohlberg17:05Networking17:20Closing Talk: Hands-free Lockpicking: Opening Doors Like in The MoviesClemens Stockenreitner & Werner Schober18:10Closing WordsManagementZeitSession05.05.2026Day 107:30Check in08:50Opening09:20🇬🇧 Opening Talk: Social Engineering Second EditionEddy Willems & Righard Zwienenberg10:10Networking10:25🇬🇧 Old Systems, New Threats: Approaches to Securing Legacy ProductsAli Mohammed Hosseini11:15Networking11:30Security Without Attack: Systemic Risk in Industrial NetworksHerbert Dirnberger12:20Lunch13:25🇬🇧 Keynote: Shhh, It’s A Secret: Preventing Sensitive Data Exposure in LogsCatherine Easdon14:40Networking14:55Integration des EU CRA in Secure Development ProzesseAlexander Aigner15:45Networking16:00Cloud-Dienste im Visier: Wann werden XaaS-Lösungen zum regulierten Datenverarbeitungsdienst?Corina Kruesz16:50Networking17:00Closing Talk: DDoS Reimagined: From Bandwidth Battles to Precise Layer 7 DDoS AttacksLisa Fröhlich17:50Closing Words19:00Soiree06.05.2026Day 208:30Check in09:10Opening09:40🇬🇧 Opening Talk: The Human Factor. Cybersecurity's weakest link or most adaptive defense?Yvonne Bauer & Wolfgang Ettlinger10:30Networking10:45Mr. Jekyll & Dr. Hyde – Cybersecurity zwischen Prüfung, Betrieb und EnergiewendeThomas Pfeiffer11:35Networking11:50🇬🇧 When Prevention Becomes AttributionBettina Sterner12:40Lunch13:40Keynote: Cyber-Angriffe und asoziale Medien bedrohen Staat, Gesellschaft, Wohlstand und BürgerWalter Unger14:55Networking15:10OWASP TOP 10 mit neuem Fokus - Ein Überblick über die zentralen OT-SicherheitsrisikenFelix Eberstaller & Nino Fürthauer16:00Networking16:15🇬🇧 Pre-Closing Talk: The Tuesday Threat, Why Security Fails in the Most Ordinary MomentsMarcus Nohlberg17:05Networking17:20Closing Talk: Hands-free Lockpicking: Opening Doors Like in The MoviesClemens Stockenreitner & Werner Schober18:10Closing Words× 🇬🇧 Vortrag in EnglischAuf Vortrag klicken, um Details anzuzeigen. Änderungen an Agenda vorbehalten.