AGENDA – IT DEFENSE 2025
Monday, February 10, 2025 | |||
09:00 am | Hacking and Hardening of Windows Infrastructures – Special Edition | ||
09:00 am | System Forensics, Incident Handling and Threat Hunting with Entra ID Management | ||
Tuesday, February 11, 2025 | |||
09:00 am | Hacking and Hardening of Windows Infrastructures – Special Edition | ||
09:00 am | System Forensics, Incident Handling and Threat Hunting with Entra ID Management | ||
09:00 am | Incident Handling & Response | ||
09:00 am | Malware and Ransomware – Background, Detection, Protection | ||
up to 07:00 pm | Reception and welcome in the conference hotel Westin Leipzig with food and drinks | ||
Wednesday, February 12, 2025 | |||
09:00 am | Welcome from Stefan Strobel CEO cirosec GmbH | ||
09:15 am | Hacker’s Perspective on New Risks: Revising the Cybersecurity Priorities for 2025 Paula Januszkiewicz | ||
10:15 am | Break | ||
10:45 am | AD Security Dirk jan Mollema | ||
11:45 am | Break | ||
12:00 pm | Your Copilot Is My Insider Michael Bargury | ||
01:00 pm | Lunch | ||
02:00 pm | 20 years of SAP Cyber Security Andreas Wiegenstein & Xu Jia | ||
03:00 pm | Break | ||
03:15 pm | How Big Is Our Cyber Risk? Peter Wimmer & Stefan Koppold | ||
04:15 pm | Break | ||
04:45 pm | Do Not Believe Everything You Think: on Fallacies and Other Confusions of our Brain Prof. Dr. Martin Korte | ||
05:45 pm | End of the first conference day | ||
06:45 pm | An evening in Leipzig At the end of the first conference day we will take you on a journey of exploration through the city center of Leipzig. In the worldwide well-known restaurant Auerbachs Keller (5th place in the top ten best-known restaurants worldwide) we will enjoy the end of the evening with tasty food. The cellar restaurant, which was established in 1528, became famous by Goethe’s „Faust“. The poet was inspired by a picture of the legend of Dr. Faustus in the cellar vault. | ||
Thursday, February 13, 2025 | |||
09:00 am | Cybersecurity’s New Imperative: Defending Enterprise and National Cognitive Infrastructures Winn Schwartau | ||
10:00 am | Break | ||
10:30 am | Vulnerabilities in TETRA:BURST Jos Wetzels | ||
11:30 am | Break | ||
11:45 am | Vishing > Phishing: Initial Access Made Simple Hagen Molzer | ||
12:45 pm | Lunch | ||
02:00 pm | NIS-2, RCE and CRA - on Tour through the Jungle of Regulations Dr. Christoph Wegener | ||
03:00 pm | Break | ||
03:15 pm | Who Controls the Network, Controls the Universe Nate Warfield | ||
04:15 pm | Break | ||
04:45 pm | The Imposter’s Guide to Hacking… Without Technical Talent! Jayson E. Street | ||
05:45 pm | End of the second conference day | ||
06:30 pm | Evening in Gondwanaland Entering Gondwanaland will appeal to all of your senses as you come into close contact with the tropical rainforest of Africa, Asia and South America. Under a covered area (larger than two football pitches) there are 90 exotic animal species and approx. 500 different plant and animal species. Follow the jungle paths or treetop trail. Afterwards we invite you to to culinary delights in the associated restaurant Patakan and most certainly interesting conversations. | ||
Friday, February 14, 2025 | |||
09:00 am | Round Tables | ||
10:30 am | Break | ||
11:00 am | Round Tables - continuation | ||
12:30 pm | Lunch | ||
01:30 pm | End of the event | ||
More will be announced soon. Status: November 14, 2024 |