Use #itsaexpo #itsa365

25. - 27. Oktober 2022 // Nürnberg, Germany

Rahmenprogramm 2019

Offene Foren

International Forum 10.1

Zusätzlich zu den vier deutschsprachigen Foren, finden in Halle 10.1 im International-Forum Themenübergreifend alle Präsentationen ausschließlich in englischer Sprache statt.

Unabhängige Experten bieten gratis Einblicke in aktuelle Entwicklungen, Strategien, rechtliche Rahmenbedingungen und Trends in der Informationssicherheit sowie im Datenschutz.

Besucher können sich in allen fünf Foren gratis und unverbindlich informieren.


Halle 10.1 / Standnummer 10.1-830

Alle Vorträge im Überblick

Dienstag 08. Oktober
it-sa insights: German IT Security Law 2.0 loading and connecting to European cybersecurity legal...
Datto - Minimise your customers’ downtime – experience Datto’s technology live in action!
SPRI - Cybersecurity as a Compefitiveness Enabler and Local Employment Key Driver: A practical...
Countercraft - Tool up your threat hunting team with deception technology
Tosibox - Cyber Security must be transparent and built-in
EY - Business centric managed security services" - bridging the gap between business and technology
Spike Reply - Secure Clouding with Reply International
Fraunhofer IEM - Enabling DevSecOps with the new Generation of Static Analysis
Tanium - How to Answer the Hard Questions about your IT Infrastructure
LogMeIn - Modern Identity: Unifying Access and Authentication
Lucy - Crime in the 21st Century
it-sa insights: Risk and Challenges of Cyber Attacks for the European Economy
Darktrace - Using AI in Cyber Attacks – The Next Arms Race?
CLAROTY - The Challenges and lessons learned in Running an OT SOC
CenturyLink - Stemming the tide on DDoS: Protecting today’s critical businesses
Globetesting - SecDevOps, secury always goes first
SOFTPROM - Cyber Security Solutions for Industrial Control Systems (ICS)
One Identity - Can you protect your privileged accounts in the cloud?
Forescout - Security in the IT-OT Era: Device Visibility and Control
SySS - Live Hacking: The Future of Hacking. Attacks on current and future technologies
Mittwoch 09. Oktober
Live-Hacking: Security Awareness 2020 - Hacking like it's 2005?
Proofpoint - One always clicks... Employees in the focus of the attacker
Uniscon/TÜV Süd - Master the challenges of regtech-compliance with zero-knowledge cloud technology
Extreme Networks - Secure networks through AI / ML, proper access protection, micro segmentation...
CYOSS - Where blue teams often go wrong: Lessons learned in 2 years of cyber simulation training
NTT / NTT Security - New cyber risks on the way to smart society and a new social model Society 5.0
dacoso/ID Quantique - How can quantum technologies be integrated into a future proof security...
RUCON - Raising Resilience - Why it's the Management's Job
CenturyLink - Stemming the tide on DDoS: Protecting today’s critical businesses
it-sa insights: Heavyweight-Meeting: European approach for a common digital market
Datto - Ransomware in numbers: How bad is it really? The results of the 2019 Datto Ransomware Survey
Juniper - The game of cybercat and cybermouse: Improving the mousetrap
KUDELSKI - How CISOs gain trust in the boardroom
BeyondTrust/Bomgar - P?M - to understand Privileged Access Management (PAM)
IKERLAN - Industrial Cybersecurity Challenges in the Basque Industry: blockchain applications in...
Tecnalia - Building Trust in the Machine Economy
KEYNETIC - Hardening of industrial networks, decreasing the attack surface of Industry 4.0
Secardeo - Office 365 OME or S/MIME with an automated certificate management -
Veracode - Mitigating the risk of using Open Source code in Application Development
Compass - Live Hacking - Hackers: What do they want and how do they get it?
Donnerstag 10. Oktober
it-sa insights: Project - **CANCELLED**
RSA Security - 5 Ways to Transform Access and Secure the Digital Enterprise
Rhebo - Cyberwar and Downtimes - How industry 4.0 challenges Critical Infrastructures
S21SEC - Where does my ATM infrastructure fit and how to approach Cybersecurity?
One Identity - Privileged Account Governance - Close the gap between privileged access and...
SaltStack - Security is the responsibility of every member of your IT organisation
Synack - How Offensive Security Testing with Crowdsourced Teams Replaces Pen Testing as More...
Verizon - Quantifying Risk Reduction: From War Room to Board Room
SPECIAL SPEAKER: The Vitruvian Paradox - The Changing Face of the Human in Cyber Security
Oneconsult - PowerShell for Post-Exploitation Activities – Basics, Attacks, Forensic Analysis and...
it-sa insights: Blockchain and the new data security paradigm

Der gewählte Eintrag wurde auf Ihre Merkliste gesetzt!

Wenn Sie sich registrieren, sichern Sie Ihre Merkliste dauerhaft und können alle Einträge selbst unterwegs via Laptop oder Tablett abrufen.

Hier registrieren Sie sich, um Daten der Aussteller- und Produkt-Plattform sowie des Rahmenprogramms dauerhaft zu speichern. Die Registrierung gilt nicht für den Ticket- und AusstellerShop.

Jetzt registrieren

Ihre Vorteile auf einen Blick

  • Vorteil Sichern Sie Ihre Merkliste dauerhaft. Nutzen Sie den sofortigen Zugriff auf gespeicherte Inhalte: egal wann und wo - inkl. Notizfunktion.
  • Vorteil Erhalten Sie auf Wunsch via Newsletter regelmäßig aktuelle Informationen zu neuen Ausstellern und Produkten - abgestimmt auf Ihre Interessen.
  • Vorteil Rufen Sie Ihre Merkliste auch mobil ab: Einfach einloggen und jederzeit darauf zugreifen.