-
Hands-On: Detecting security gaps in networked devices
Done
-
Chronology of a cyber attack
Andreas BrückDone
-
Welcome and introduction of agenda
Georg WasserloosDone
-
Hands-On: Detecting security gaps in networked devices
Done
-
Lunch
Done
-
Current developments and initiatives - an overview
Done
-
Chronology of a cyber attack
Andreas BrückDone
-
Member companies report - Our experience in dealing with cyber security
Done
-
Chronology of a cyber attack
Andreas BrückDone
-
Cyber Analysis and Defense - Protecting critical systems and infrastructure from cyber attacks
Done
Current attack vectors by industry 4.0 and countermeasures
Location: Gruppe D
-
11/07/2019, 02:15
-
11/07/2019, 03:45
(Eastern Daylight Time)
(1 hour 30 minutes)