-
Hands-On: Detecting security gaps in networked devices
Done
-
Chronology of a cyber attack
Andreas BrückDone
-
Arrival & Networking
Done
-
Communication and coffeebreak
Done
-
Chronology of a cyber attack
Andreas BrückDone
-
Cyber security - Threats and challenges
Markus HartmannDone
-
Welcome and introduction of agenda
Georg WasserloosDone
-
Communication and coffeebreak
Done
-
OT goes to Cloud: Requirements and possibilities
Heiko AdamczykDone
-
Current attack vectors by industry 4.0 and countermeasures
Jens MehrfeldDone
Current attack vectors by industry 4.0 and countermeasures
Location: Gruppe A
-
11/07/2019, 06:45
-
11/07/2019, 08:15
(Eastern Daylight Time)
(1 hour 30 minutes)