Round Tables
An important aspect of a specialist conference is not only the quality of the lecturers but also the exchange of experiences with other participants in similar positions and with similar problems. IT defense offers a clear framework for discussion with other participating security experts.
Participants can discuss their own problems and other in-depth issues in small groups. For this purpose IT-Defense lecturers are available as moderators, but spontaneous formation of individual groups on specific subjects is also possible.
Simultaneous round-table discussions are available on Friday, February 3rd 2006:
Tobias Klein: |
Computer Forensic |
Ofir Arkin: |
Voice over IP Security |
John Viega: |
Secure Software |
Joanna Rutkowska: |
The Future of Stealth Malware: Detection and Anti-Detection |
Darrin Miller: |
IPv6-Security Threats – A Comparison to IPv4 |
|