Round Tables
When it comes to a specialist conference, it is not only the lecturers' quality that matters but it is also important to exchange experiences with other participants who are in similar positions and deal with similar issues. IT-Defense offers a clear framework to discuss security issues and topics with other participating security experts.
Participants can discuss their own problems and other profound issues in small groups. For this purpose, IT-Defense lecturers serve as moderators; however, it is also possible to form individual groups on specific subjects.
Simultaneous round-table discussions will be available on Friday, February 14, 2025.
SAP Cyber Security 101 – Andreas Wiegenstein & Xu Jia
In many companies, we have seen that the CISOs and security officers do not have any or much knowledge of SAP. This is why the topic of SAP security is often underrated. This round table is a highly compact crash course for SAP security. It is aimed at everyone who wants to gain an insight into important basics of SAP technologies. Don’t worry, you will only feel dizzy for about 20 minutes afterwards …
Operation Endgame – Volker Kozok and Dirk Kunze
In this round table, we will present operation Endgame. Analysis and evaluation will provide you with an insight into the offenders’ procedure, the tools used and the consequences for the victims. A short description of the procedure of investigating authorities will follow as well as a discussion about effective incident management.
Open Discussion on Cognitive Defense Techniques – Winn Schwartau
Between the UK and EU, ~5 billion Euros are spent on cognitive defense, heavily subsidized by the public sector. Since 2022, similar efforts have been decimated in the USA, and almost no research or defense exists.
What can we learn from cybersecurity awareness training? Does it work? What do we need to improve?
Let’s talk about what the security, cybersecurity, hacker, and national defense communities can come up with to defend ourselves against disinformation and malicious cognitive attacks.
We will initially cover the three major target audiences for cognitive defense:
- National Security: Strengthening the mental immune system of entire populations of communities.
- Enterprise: Protecting the cyber and mental cognitive infrastructures of organizations.
- Education: Building cognitive awareness into all aspects of education, from K-12 and for adult upskilling.
Because this is SUCH a big topic, we will pick ONE area to discuss.
See you there!
Revealing Hidden Evidence: Forensic Investigations in Physical Security – Barry Wels
Join Barry Wels for a Round Table Session exploring forensic investigations within physical security, grounded in real-life court cases that reshaped the perspectives of those involved. Designed for red and blue teamers, as well as insurance professionals, this session uncovers the deep connections between digital and physical security in complex legal battles.
We’ll spotlight the forensic potential of electronic car locks and the critical data stored in certain car keys. With the right analysis, this data can reveal pivotal evidence that can shift the entire view of an investigation. Often buried within raw log data, these insights can show anomalies that software summaries may overlook.
We’ll also examine mechanical cases like the Hitch Lock investigation, where physical locks became the center of forensic and legal scrutiny. Through precise reconstructions, we’ll demonstrate how recreating scenarios can expose damage patterns that strengthen claims and reveal hidden truths.
This session is an opportunity to learn from legal cases that tested forensic limits over years of litigation.
It’s all fun and games till someone gets popped! – Jayson E. Street
In this round table we go over the ways security Awareness programs have failed us. We will also learn how to turn creating a safer environment in your company into an exciting competitive sport!
NIS-2, CRA and the Like: What Does it Mean for Me and My Organization and How Do I Implement the Requirements Pragmatically? – Dr. Christoph Wegener
In this round table, we will discuss the participants’ questions about the requirements resulting from the NIS-2 and CRA directives as well as the “implementation aids” that already exist for these regulations. This round table does not provide legal advice for individual cases; instead, based on the legal directives that exist at the time of the round table, the aim is to start the discussion about this topic, discuss concrete questions arising in practice together with the participants and evaluate pragmatic suggestions for implementation.