Use #itsaexpo #itsa365

25 - 27 October 2022 // Nuremberg, Germany

Supporting Programme 2019

Open Forums

Knowledge Forum F10

In each of the halls (9, 10.0, 10.1, 11), trade and professional associations, manufacturers and practitioners will offer a rapid introduction to the field and present solutions to all security-related questions.

The programme includes more than 350 presentations providing free insights into the latest developments, strategies, legal frameworks and trends in information security and data protection.

The individual presentations are aimed at visitors with an interest in technology or for management levels, depending on the subject matter in each case, and are identified accordingly. Visitors can thus match their learning opportunities to their own areas of activity.

Hall 10.0 / stand 10.0-640

All events

Tuesday 08 October
it-sa insights: Cyber security as a location parameter
it-sa insights: Cyber Security Competence at VDE
Link11 - The Future of Cyber Security
BeyondTrust/Bomgar - P?M - to understand Privileged Access Management (PAM)
Verizon - Automation, AI and Shared Resource Concepts in the Security Operations Center
NTT / Dimension Data - Impact of skills shortage on Cyber Defense & Response Center
NEVIS/AdNovum - Digital Identities 4.0 - Stress over, password-free
VdS - VdS 10000 und VdS 10010 – Information Security and Data Protection (GDPR) as an integrated...
telent - Operation Technology (OT) vs. Information Technology (IT), Become a Business Enabler
genua - Inside the perimeter: Security defined networking, a necessity for critical infrastructures?
r-tec - Fast threat detection in industrial plants - Use cases as a guarantee for success
it-sa insights: Organizational resilience - How to make your business safer and more resilient
SonicWall - Your account has been hacked!
Compass - Cheerful to cloudy - penetration tests in the cloud
RadarPlatform: How to set up your own Cyber Defense Center - with the know-how of the European...
Tufin - Establish zero trust in the cloud using microsegmentation
Keysight-IXIA - Hack yourself before others do – Breach and Attack Simulation
Utimaco - Block-safe - Hardware Security for Distributed Ledger Technology
Varonis - Understanding Hackers and How Varonis Makes Them Miserable
it-sa insights: Presentation of the IT Security Award
msg - Information Security for Container Orchestration with Kubernetes and Docker
AXA - Was ein IT-Leiter über die Cyber-Versicherung wissen muss
Kaspersky Threat Management and Defense - The Threat Hunting Catalyst
essendi it / SwissSign - The seven success factors in PKI Management
COMPUTACENTER - Cyber Defence Maturity Assessment - attack methods and protective measures put to...
TAROX/Microsoft - Information Protection with Microsoft M365
it-sa insights: Field report from the weekly Cyber Security Competence Center of the VOICE
Wednesday 09 October
EY - Industrial Cyber Security – A no-nonsense approach to securing your production
BSI - The community draft of the revised C5 catalogue of requirements
COMPUTACENTER - Cloud Security goes Commodity - or how DevOps environments can be secured
ESET - The 5 greatest security fairy tales of modern times
ECOS - Trend theme home office - Requirements for IT and IT security
Paessler - The underestimated admin – rescuer in distress when the network or IT systems go on...
DriveLock - Secure authentication without insecure passwords
Kaspersky - SOC - launched, failed?
Net at Work - E-Mail Security Best Practices
LogRhythm - NextGen SIEM vs. traditional SIEM solutions
Splunk - Early detection & repulsion of cyber attacks with the MITRE ATT&CK Framework
G+H - daccord - Focus on Access Permissions - Relax with Access Governance "made in Germany"
Virtual Solution - New Work makes mobile - What makes employees happy and admins as well?
Datto - Ransomware in numbers: How bad is it really? The results of the 2019 Datto Ransomware Survey
Okta - Identities are the new perimeter" Identity and access management as a basis for Zero Trust...
F-Secure - Been hacked today?
Acronis - Total protection against Cyber threats with Acronis Cyber Protection
Goriscon - Integrated management systems - information security and data protection combined
NTT / NTT DATA - How to secure Container Environments
NCP - Secure communications for the Industrial Internet of Things (IIoT)
MTRIX - Multi-Factor Authentication - Stand der Technik und Best Practices
Extreme Networks - Fabrics - Microsegmentation for secure, smooth network operation
Netwrix - Know your data to protect what matters and ensure compliance
G Data - Coffee fetched - data gone. Security awareness for employees saves companies.
genua - Sleeping with the enemy - remote maintenance with a clear conscience
Barracuda MSP - Are your customers secure?
CYQUEO - What should your cyber security portfolio look like for 2020
TÜV Rheinland i-sec - Cybersecurity Defense Center for the protection of industrial facilities
Akamai - Credential Stuffing – Protection against account takeover and fraud
Blancco - Efficient deletion processes - how do we link 100% secure data deletion
CISCO - Insight into the Secure Internet Gateway (SIG) from Cisco Umbrella
COGNITUM - Taming the Beast - Standardizing Identity Management
SySS - Live Hacking - The Future of Hacking. Attacks on current and future technologies
Thursday 10 October
SySS - Live Hacking - The Future of Hacking. Attacks on current and future technologies
Logicalis - Smart Devices under fire - How to get IoT devices & Co safely under control
Virtual Solution - New Work makes mobile - What makes employees happy and admins as well?
SIZ - Implement financial supervision requirements in a practicable way - is this possible?
AIrlock/Ergon Informatik - From a spoilsport to a pioneer
Cloud&Heat - Future of Compute: Making the digital future secure and green
TÜV Rheinland i-sec - Efficient Data Protection Management
Splunk - Early detection & repulsion of cyber attacks with the MITRE ATT&CK Framework
COMPUTACENTER - Automated vulnerability managemen -
mgm - Lean Application Security - Sustainable security at calculable costs
Utimaco - Quantum Computer - The End of Cryptography?
PCS - The hand vein recognition as an important component of your security concept in the data...
it-sa insights: The data center as the decisive IT infrastructure.
it-sa insights: A Sustainable Strategy for More IT Security in the EU Market - Quality...
it-sa insights: Backup technology for industrial control systems
Live-Hacking: Security Awareness 2020 - Hacking like it's 2005?

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.