Supporting Programme 2019
Knowledge Forum F9
All Lectures
© NürnbergMesse / Heiko Stahl
The individual presentations are aimed at visitors with an interest in technology or for management levels, depending on the subject matter in each case, and are identified accordingly. Visitors can thus match their learning opportunities to their own areas of activity.
Of particular interest are the daily live hacking sessions, the new ideas presented by start-ups, and the contributions under the heading of “it-sa insights”. These are where independent experts share their knowledge in the form of keynote presentations, discussion rounds and theme tracks.
Attendance at all five knowledge-building forums is free and non-binding.
_________________________________
Hall 9 / stand 9-150
All events
- Tuesday 08 October
- NSIDE ATTACK - Live Hacking - Red Team Assessments - Professional attack simulation incl. Live Hack
- G Data - Coffee fetched - data gone. Security awareness for employees saves companies.
- Juniper - Connected Security Vision
- Sophos - IT security: success is only possible through teamwork
- Kaspersky - The Human Factor in IT Security - Technology is not enough
- KPMG - More security. Your SAP S/4 HANA environment
- CYQUEO - Radically rethink network and security:
- noris - Multicloud, HyperScaler and the classical Enterprise IT
- Password Safe by MATESO: Shared Passwords - Security Vulnerability or Cool Feature?
- Zertificon - E-mail encryption: an essential cornerstone of your digitital business strategy
- MobileIron - Mobile-centric Zero Trust Security Framework
- Fraunhofer SIT - App Security - Automated Analysis for protection of enterprises
- Consistec / LogPoint - Do you know what’s happening in your network? - Why a holistic approach...
- it-sa insights: Project SIWECOS - Secure Websites and Content Management Systems for SMEs
- Tenable - Calculate, compare and communicate cyber risks
- Barracuda Total E-Mail Protection - Protection beyond the Gateway
- ESET - Advanced Persistent Threats (APTs) the constant balancing act between manual work and...
- DriveLock - Security in the age of digital transformation
- Rapid7 - Under the Hoodie: Lessons from a Season of Penetration Testing
- AirITSystems - Security Operating is attack and defense. This is not a Firewall Admins Task
- TÜV Süd - Solving the Digitalization Risk Equation
- NTT/NTT Security - Practical tips + new approaches to dealing with cyber security risks in modern...
- ibs Schreiber - "Human Weakness" - Testing Employee Awareness
- Airlock/Ergon Informatik - From a spoilsport to a pioneer
- Sentinel One - ActiveEDR - guard and hunter in one person
- Kaspersky - CYBER IMMUNITY: A glimpse into the future of EPP
- Net at Work - E-Mail Security Best Practices
- Thales - encrypt everything
- FireMon - From Security Bottleneck to Business Enabler
- it-sa insights: More than continuous penetration testing - CATS
- Wednesday 09 October
- Tanium - Company-wide real-time risk assessment: find the weakest link in the chain (live examples)
- Fraunhofer IGD - Monitoring Visual Analytics for Cyber Security
- SonicWall - Your account has been hacked!
- SecureLink - Chances & risks through artificial intelligence in IT Security
- Qualys - Know your Assets: Qualys Asset Inventory and Cloud Security
- Vectra - Using AI to Detect and Hunt Advanced Attackers
- noris - Into The Cloud-Native World of Kubernetes...
- Sophos EDR - Forensics with AI support stops emotet and co.
- Infodas - SAVe into the future
- Password Safe by MATESO: Shared Passwords - Security Vulnerability or Cool Feature?
- Thales - How to manage Cloud Encryption today
- Allegro Packets - Increased efficiency through fast network troubleshooting
- it-sa insights: Artificial Intelligence in the Security Context: Curse or Blessing?
- it-sa insights: KI und IT-Security
- Trend Micro - The Art of Cybersecurity – in the Cloud
- Aruba - Introspect: The story of security incident
- noris - Secure passwords with KeePassXC and Yubikey
- itWatch - Secure processing of data of uncertain origin - whether personnel department, marketing...
- Varonis - Compliance in 2019: What you need to know now
- Thycotic/ALSO - Privileged Access Management (PAM) and why traditional perimeter security is not...
- DTS - Current Cyber Security Challenges
- Cofense - Real Phish Remain the Real Problem – A View Into the Threat Landscape
- VdS - New information security bundle solutions by VdS – available for companies of any size
- ESET - 3..2..away: medium-sized companies on the shopping list of international eCrime syndicates.
- KPMG AG- More security. Business model e-Crime.
- Bitsight - Managing Business Risk with Security Ratings
- Kaspersky - Cloud Security for MS Office 365 and Endpoints
- Tenable - Predictive Prioritization - Effectively prioritize vulnerabilities to reduce cyber risk
- Forescout - Security in the IT-OT Era: Device Visibility and Control
- DriveLock - Live Hacking
- Thursday 10 October
- Compass - Live Hacking: How does the hacker get to his target?
- Kaspersky - SOC - launched, failed?
- Sophos - New technologies and concepts against Ransomware & Co. - Security as a system replaces...
- NTT / Dimension Data - How to build the foundation for secure cloud computing
- Trend Micro - The Art of Cybersecurity – at the Endpoint
- F-Secure - Been hacked today?
- Secardeo - Office 365 OME or S/MIME with an automated certificate management -
- Netwrix - Know your data to protect what matters and ensure compliance
- Sentinel One - Fighting the Unknown - How AI Protects Our Digital Life
- G Data - NextGen technology BEAST offers the full picture of current cyber threats
- DriveLock - Cyber Attack - A Business Model with Great Potential
- Thales - Secure your Cloud with Smart Single Sign On
- Acronis - Total protection against Cyber threats with Acronis Cyber Protection
- Paessler - Old but Gold - Monitoring made easy with SNMP
- Keysight-IXIA - Why Visibility is Key to Cloud Security
- Akamai - Secure network environments in cloud times
- F-Secure - Been hacked today?
- totemo - Email Encryption: Everything You Need to Know in 2019
- Utimaco - Block-safe - Hardware Security for Distributed Ledger Technology
- NSIDE ATTACK - Live Hacking - Bypassing current security technologies