Agenda 2026 zum Rückblick: Agenda 2024 Aktuell laufend:ZeitTechnikManagement05.05.2026Day 107:30Check in08:50Opening09:20Opening Talk: Social Engineering Second EditionEddy Willems & Righard Zwienenberg10:10Networking10:25Resistence is futile! How a Linux system is assimilated using eBPF rootkitsReinhard KuglerOld Systems, New Threats: Approaches to Securing Legacy ProductsAli Mohammed Hosseini11:15Networking11:30A decade of enumeration attacks in WhatsApp and other recurring vulnerability patterns in mobile appsSebastian Schrittwieser & David Schmidt & Gabriel GegenhuberIntegration des EU CRA in Secure Development ProzesseAlexander Aigner12:20Lunch13:25Keynote: Shhh, It’s A Secret: Preventing Sensitive Data Exposure in LogsCatherine Easdon14:40Networking14:55The PKI Night Watch: The Iron Key - Domain Control via AD CS CertificatesJan-Sebastian RodeSecurity Without Attack: Systemic Risk in Industrial NetworksHerbert Dirnberger15:45Networking16:00Livehack: Über Azure zu On-Prem. Wie Hacker die Cloud als Sprungbrett nutzenTobias WickeCloud-Dienste im Visier: Wann werden XaaS-Lösungen zum regulierten Datenverarbeitungsdienst?Nino Tlapak16:50Networking17:00Closing Talk: DDoS neu gedacht: Von Bandbreitenschlachten zu präzisen Layer-7-DDoS-AngriffenLisa Fröhlich17:50Closing Words19:00Soiree06.05.2026Day 208:30Check in09:10Opening09:40Opening Talk: The Human Factor. Cybersecurity's weakest link or most adaptive defense?Yvonne Bauer & Wolfgang Ettlinger10:30Networking10:45Reverse Engineers Hate This Trick: How to Bind Code to HardwareDaniel DorfmeisterMr. Jekyll & Dr. Hyde – Cybersecurity zwischen Prüfung, Betrieb und EnergiewendeThomas Pfeiffer11:35Networking11:50Ghost in the ERP: An Offensive Approach to SAPSeverin Winkler & Benjamin PetermaierFrom Trusted Access to Total Fallout: Lessons from a Real Insider IncidentSebastian Bicchi12:40Lunch13:40Keynote: Cyber-Angriffe und asoziale Medien bedrohen Staat, Gesellschaft, Wohlstand und BürgerWalter Unger14:55Networking15:10Beyond Honeypots: Practical Cyber Deception for Real SystemsMario KahlhoferOWASP TOP 10 mit neuem Fokus - Ein Überblick über die zentralen OT-SicherheitsrisikenNino Fürthauer15:50Networking16:05Pre-Closing Talk: The Tuesday Threat, Why Security Fails in the Most Ordinary MomentsMarcus Nohlberg16:55Networking17:10Closing Talk: Hands-free Lockpicking: Opening Doors Like in The MoviesClemens Stockenreitner & Werner Schober18:00Closing WordsTechnikZeitSession05.05.2026Day 107:30Check in08:50Opening09:20Opening Talk: Social Engineering Second EditionEddy Willems & Righard Zwienenberg10:10Networking10:25Resistence is futile! How a Linux system is assimilated using eBPF rootkitsReinhard Kugler11:15Networking11:30A decade of enumeration attacks in WhatsApp and other recurring vulnerability patterns in mobile appsSebastian Schrittwieser & David Schmidt & Gabriel Gegenhuber12:20Lunch13:25Keynote: Shhh, It’s A Secret: Preventing Sensitive Data Exposure in LogsCatherine Easdon14:40Networking14:55The PKI Night Watch: The Iron Key - Domain Control via AD CS CertificatesJan-Sebastian Rode15:45Networking16:00Livehack: Über Azure zu On-Prem. Wie Hacker die Cloud als Sprungbrett nutzenTobias Wicke16:50Networking17:00Closing Talk: DDoS neu gedacht: Von Bandbreitenschlachten zu präzisen Layer-7-DDoS-AngriffenLisa Fröhlich17:50Closing Words19:00Soiree06.05.2026Day 208:30Check in09:10Opening09:40Opening Talk: The Human Factor. Cybersecurity's weakest link or most adaptive defense?Yvonne Bauer & Wolfgang Ettlinger10:30Networking10:45Reverse Engineers Hate This Trick: How to Bind Code to HardwareDaniel Dorfmeister11:35Networking11:50Ghost in the ERP: An Offensive Approach to SAPSeverin Winkler & Benjamin Petermaier12:40Lunch13:40Keynote: Cyber-Angriffe und asoziale Medien bedrohen Staat, Gesellschaft, Wohlstand und BürgerWalter Unger14:55Networking15:10Beyond Honeypots: Practical Cyber Deception for Real SystemsMario Kahlhofer15:50Networking16:05Pre-Closing Talk: The Tuesday Threat, Why Security Fails in the Most Ordinary MomentsMarcus Nohlberg16:55Networking17:10Closing Talk: Hands-free Lockpicking: Opening Doors Like in The MoviesClemens Stockenreitner & Werner Schober18:00Closing WordsManagementZeitSession05.05.2026Day 107:30Check in08:50Opening09:20Opening Talk: Social Engineering Second EditionEddy Willems & Righard Zwienenberg10:10Networking10:25Old Systems, New Threats: Approaches to Securing Legacy ProductsAli Mohammed Hosseini11:15Networking11:30Integration des EU CRA in Secure Development ProzesseAlexander Aigner12:20Lunch13:25Keynote: Shhh, It’s A Secret: Preventing Sensitive Data Exposure in LogsCatherine Easdon14:40Networking14:55Security Without Attack: Systemic Risk in Industrial NetworksHerbert Dirnberger15:45Networking16:00Cloud-Dienste im Visier: Wann werden XaaS-Lösungen zum regulierten Datenverarbeitungsdienst?Nino Tlapak16:50Networking17:00Closing Talk: DDoS neu gedacht: Von Bandbreitenschlachten zu präzisen Layer-7-DDoS-AngriffenLisa Fröhlich17:50Closing Words19:00Soiree06.05.2026Day 208:30Check in09:10Opening09:40Opening Talk: The Human Factor. Cybersecurity's weakest link or most adaptive defense?Yvonne Bauer & Wolfgang Ettlinger10:30Networking10:45Mr. Jekyll & Dr. Hyde – Cybersecurity zwischen Prüfung, Betrieb und EnergiewendeThomas Pfeiffer11:35Networking11:50From Trusted Access to Total Fallout: Lessons from a Real Insider IncidentSebastian Bicchi12:40Lunch13:40Keynote: Cyber-Angriffe und asoziale Medien bedrohen Staat, Gesellschaft, Wohlstand und BürgerWalter Unger14:55Networking15:10OWASP TOP 10 mit neuem Fokus - Ein Überblick über die zentralen OT-SicherheitsrisikenNino Fürthauer15:50Networking16:05Pre-Closing Talk: The Tuesday Threat, Why Security Fails in the Most Ordinary MomentsMarcus Nohlberg16:55Networking17:10Closing Talk: Hands-free Lockpicking: Opening Doors Like in The MoviesClemens Stockenreitner & Werner Schober18:00Closing Words× Auf Vortrag klicken, um Details anzuzeigen. Änderungen vorbehalten.