-
Feedback, summary and outlook for the 2nd day
Georg WasserloosDone
-
Communication and coffeebreak
Done
-
Panel discussion
Georg WasserloosDone
-
Feedback from participants
Georg WasserloosDone
-
Arrival & Networking
Done
-
Welcome and introduction Federal Office for Information Security
Done
-
Current developments and initiatives - an overview
Done
-
Cyber Analysis and Defense - Protecting critical systems and infrastructure from cyber attacks
Done
-
Communication and coffeebreak
Done
-
Welcome and introduction of agenda
Georg WasserloosDone