-
Current attack vectors by industry 4.0 and countermeasures
Jens MehrfeldDone
-
Chronology of a cyber attack
Andreas BrückDone
-
OT goes to Cloud: Requirements and possibilities
Heiko AdamczykDone
-
Lunch
Done
-
Cyber security - Threats and challenges
Markus HartmannDone
-
Conclusion and outlook on the further course of the project
Georg WasserloosDone
-
Chronology of a cyber attack
Andreas BrückDone
-
Feedback, summary and outlook for the 2nd day
Georg WasserloosDone
-
Chronology of a cyber attack
Andreas BrückDone
-
Current attack vectors by industry 4.0 and countermeasures
Jens MehrfeldDone