This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

Use #itsa19

6 - 8 October 2020 // Nuremberg

Supporting Programme 2019

Open Forums

Knowledge Forum F9

The individual presentations are aimed at visitors with an interest in technology or for management levels, depending on the subject matter in each case, and are identified accordingly. Visitors can thus match their learning opportunities to their own areas of activity.

Of particular interest are the daily live hacking sessions, the new ideas presented by start-ups, and the contributions under the heading of “it-sa insights”. These are where independent experts share their knowledge in the form of keynote presentations, discussion rounds and theme tracks.

Attendance at all five knowledge-building forums is free and non-binding.

_________________________________

Hall 9 / stand 9-150

All events

Tuesday 08 October
NSIDE ATTACK - Live Hacking - Red Team Assessments - Professional attack simulation incl. Live Hack
G Data - Coffee fetched - data gone. Security awareness for employees saves companies.
Juniper - Connected Security Vision
Sophos - IT security: success is only possible through teamwork
Kaspersky - The Human Factor in IT Security - Technology is not enough
KPMG - More security. Your SAP S/4 HANA environment
CYQUEO - Radically rethink network and security:
noris - Multicloud, HyperScaler and the classical Enterprise IT
Password Safe by MATESO: Shared Passwords - Security Vulnerability or Cool Feature?
Zertificon - E-mail encryption: an essential cornerstone of your digitital business strategy
MobileIron - Mobile-centric Zero Trust Security Framework
Fraunhofer SIT - App Security - Automated Analysis for protection of enterprises
Consistec / LogPoint - Do you know what’s happening in your network? - Why a holistic approach...
it-sa insights: Project SIWECOS - Secure Websites and Content Management Systems for SMEs
Tenable - Calculate, compare and communicate cyber risks
Barracuda Total E-Mail Protection - Protection beyond the Gateway
ESET - Advanced Persistent Threats (APTs) the constant balancing act between manual work and...
DriveLock - Security in the age of digital transformation
Rapid7 - Under the Hoodie: Lessons from a Season of Penetration Testing
AirITSystems - Security Operating is attack and defense. This is not a Firewall Admins Task
TÜV Süd - Solving the Digitalization Risk Equation
NTT/NTT Security - Practical tips + new approaches to dealing with cyber security risks in modern...
ibs Schreiber - "Human Weakness" - Testing Employee Awareness
Airlock/Ergon Informatik - From a spoilsport to a pioneer
Sentinel One - ActiveEDR - guard and hunter in one person
Kaspersky - CYBER IMMUNITY: A glimpse into the future of EPP
Net at Work - E-Mail Security Best Practices
Thales - encrypt everything
FireMon - From Security Bottleneck to Business Enabler
it-sa insights: More than continuous penetration testing - CATS
Wednesday 09 October
Tanium - Company-wide real-time risk assessment: find the weakest link in the chain (live examples)
Fraunhofer IGD - Monitoring Visual Analytics for Cyber Security
SonicWall - Your account has been hacked!
SecureLink - Chances & risks through artificial intelligence in IT Security
Qualys - Know your Assets: Qualys Asset Inventory and Cloud Security
Vectra - Using AI to Detect and Hunt Advanced Attackers
noris - Into The Cloud-Native World of Kubernetes...
Sophos EDR - Forensics with AI support stops emotet and co.
Infodas - SAVe into the future
Password Safe by MATESO: Shared Passwords - Security Vulnerability or Cool Feature?
Thales - How to manage Cloud Encryption today
Allegro Packets - Increased efficiency through fast network troubleshooting
it-sa insights: Artificial Intelligence in the Security Context: Curse or Blessing?
it-sa insights: KI und IT-Security
Trend Micro - The Art of Cybersecurity – in the Cloud
Aruba - Introspect: The story of security incident
noris - Secure passwords with KeePassXC and Yubikey
itWatch - Secure processing of data of uncertain origin - whether personnel department, marketing...
Varonis - Compliance in 2019: What you need to know now
Thycotic/ALSO - Privileged Access Management (PAM) and why traditional perimeter security is not...
DTS - Current Cyber Security Challenges
Cofense - Real Phish Remain the Real Problem – A View Into the Threat Landscape
VdS - New information security bundle solutions by VdS – available for companies of any size
ESET - 3..2..away: medium-sized companies on the shopping list of international eCrime syndicates.
KPMG AG- More security. Business model e-Crime.
Bitsight - Managing Business Risk with Security Ratings
Kaspersky - Cloud Security for MS Office 365 and Endpoints
Tenable - Predictive Prioritization - Effectively prioritize vulnerabilities to reduce cyber risk
Forescout - Security in the IT-OT Era: Device Visibility and Control
DriveLock - Live Hacking
Thursday 10 October
Compass - Live Hacking: How does the hacker get to his target?
Kaspersky - SOC - launched, failed?
Sophos - New technologies and concepts against Ransomware & Co. - Security as a system replaces...
NTT / Dimension Data - How to build the foundation for secure cloud computing
Trend Micro - The Art of Cybersecurity – at the Endpoint
F-Secure - Been hacked today?
Secardeo - Office 365 OME or S/MIME with an automated certificate management -
Netwrix - Know your data to protect what matters and ensure compliance
Sentinel One - Fighting the Unknown - How AI Protects Our Digital Life
G Data - NextGen technology BEAST offers the full picture of current cyber threats
DriveLock - Cyber Attack - A Business Model with Great Potential
Thales - Secure your Cloud with Smart Single Sign On
Acronis - Total protection against Cyber threats with Acronis Cyber Protection
Paessler - Old but Gold - Monitoring made easy with SNMP
Keysight-IXIA - Why Visibility is Key to Cloud Security
Akamai - Secure network environments in cloud times
F-Secure - Been hacked today?
totemo - Email Encryption: Everything You Need to Know in 2019
Utimaco - Block-safe - Hardware Security for Distributed Ledger Technology
NSIDE ATTACK - Live Hacking - Bypassing current security technologies
top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.