IT-Defense 2025Agenda

AGENDA – IT DEFENSE 2025

Monday, February 10, 2025 
  
09:00 am Hacking and Hardening of Windows Infrastructures – Special Edition
09:00 am System Forensics, Incident Handling and Threat Hunting with Entra ID Management

 

Tuesday, February 11, 2025

 
   
09:00 am Hacking and Hardening of Windows Infrastructures – Special Edition
09:00 am System Forensics, Incident Handling and Threat Hunting with Entra ID Management
09:00 am Incident Handling & Response
09:00 am Malware and Ransomware – Background, Detection, Protection
   
up to 07:00 pm  Reception and welcome in the conference hotel Westin Leipzig with food and drinks
   

Wednesday, February 12, 2025

 
   
09:00 am Welcome from Stefan Strobel
CEO cirosec GmbH
  
09:15 am Hacker’s Perspective on New Risks: Revising the Cybersecurity Priorities for 2025
Paula Januszkiewicz
  
10:15 am Break
  
10:45 am AD Security
Dirk jan Mollema
  
11:45 am Break
  
12:00 pm Your Copilot Is My Insider
Michael Bargury
   
01:00 pm Lunch
  
02:00 pm 20 years of SAP Cyber Security
Andreas Wiegenstein & Xu Jia
   
03:00 pm Break
   
03:15 pm How Big Is Our Cyber Risk?
Peter Wimmer & Stefan Koppold
   
04:15 pm Break
   
04:45 pm Do Not Believe Everything You Think: on Fallacies and Other Confusions of our Brain
Prof. Dr. Martin Korte
   
05:45 pm End of the first conference day
   
06:45 pm An evening in Leipzig
At the end of the first conference day we will take you on a journey of exploration through the city center of Leipzig. In the worldwide well-known restaurant Auerbachs Keller (5th place in the top ten best-known restaurants worldwide) we will enjoy the end of the evening with tasty food. The cellar restaurant, which was established in 1528, became famous by Goethe’s „Faust“. The poet was inspired by a picture of the legend of Dr. Faustus in the cellar vault.
   

Thursday, February 13, 2025

 
  
09:00 am Cybersecurity’s New Imperative: Defending Enterprise and National Cognitive Infrastructures
Winn Schwartau
   
10:00 am Break
   
10:30 am Vulnerabilities in TETRA:BURST
Jos Wetzels
   
11:30 am Break
   
11:45 am Vishing > Phishing: Initial Access Made Simple
Hagen Molzer
   
12:45 pm  Lunch
   
02:00 pm NIS-2, RCE and CRA - on Tour through the Jungle of Regulations
Dr. Christoph Wegener
   
03:00 pm Break
   
03:15 pm Who Controls the Network, Controls the Universe
Nate Warfield
   
04:15 pm Break
   
04:45 pm The Imposter’s Guide to Hacking… Without Technical Talent!
Jayson E. Street
   
05:45 pm End of the second conference day
   
06:30 pm Evening in Gondwanaland
Entering Gondwanaland will appeal to all of your senses as you come into close contact with the tropical rainforest of Africa, Asia and South America. Under a covered area (larger than two football pitches) there are 90 exotic animal species and approx. 500 different plant and animal species. Follow the jungle paths or treetop trail. Afterwards we invite you to to culinary delights in the associated restaurant Patakan and most certainly interesting conversations.
   

Friday, February 14, 2025

 
   
09:00 am Round Tables
   
10:30 am Break
   
11:00 am Round Tables - continuation
   
12:30 pm Lunch
   
01:30 pm End of the event


The following round tables will be offered:

More will be announced soon.

Status: November 14, 2024