PROGRAM
Round Tables |
An important aspect of a specialist conference is not only the quality of the lecturers but also the exchange of experiences with other participants in similar positions and with similar problems.
IT-Defense offers a clear framework for discussion with other participating security experts. Participants can discuss their own problems and other in-depth issues in small groups. For this purpose IT-Defense lecturers are available as moderators, but spontaneous formation of individual groups on specific subjects is also possible.
Simultaneous round-table discussions are available on Friday, February 5th 2010.
Fixed round tables:
Karsten Nohl | Security of digital access cards |
Barry „The Key“ Wels | Lock Picking |
Saumil Shah | Browser Exploits |
Starbug | Hacking Biometric Systems |
Volker Kozok | Bulletproof-Hosting: Risikoanalyse - Awarenessschulung - Maßnahmen, Handlungsoptionen für den CIO |