protectit security convention - bayern innovativ
TRANSCRIPT
2nd ProtectIT Security Convention - ProSecCon, September 26th 2019Deggendorf Institute of TechnologyInstitute ProtectIT / Germany
Topics:
• Industrial and Automotive Cyber Security, trustworthiness and resilience in IoT, con-fidential and integrity protected embedded communications, identity and access manage-ment, security architectures and frameworks
• Cyber attacks, countermeasures and protection schemes, security engineering, real-time cyber threat detection and mitigation strategies, incident response, digital foren-sics, threat intelligence and threat hunting
• Current developments that advance the areas of applied cryptography, especially in the areas of post-quantum cryptography, lightweight cryptography as well as distributed ledger technology
Conference language:English
We are looking forward to meeting you at the 2nd ProtectIT Security Convention.
Yours sincerely,
Prof. Dr. Peter Sperber Prof. Dr. Martin Schramm President of Deggendorf Head of Institute ProtectIT Institute of Technology Protection for Industrial Technology
I N S T I T U T E OF
T ECHNOLOGY
DEGGENDORF
2nd ProtectIT Security Convention
WELCOME2nd ProtectIT Security Convention
Chair: Prof. Dr. Martin Schramm, DIT Prof. Dr.-Ing. Andreas Grzemba, DIT
Schedule:
12:15 - 13:00: Check-In
13:00 - 13:15: Welcome
13:15 - 13:55: Keynote Trustworthy Internet of Things: Mission Possible Ekaterina Rudina, Kaspersky Lab
3:55 - 14:25: AUTOSAR Classic Platform / AUTOSAR Adaptive Platform: Architecture Comparison with regards to Security Concepts Thomas Dirscherl, AVL Software and Functions GmbH
14:25 - 14:55: Break
14:55 - 15:25: Towards an Effective Security Engineering Process for Cyber-Physical Systems - A Research Proposal Andreas Aigner, Landshut University of Applied Sciences
15:25 - 15:55: Mastering the Art of Cyber Threat Intelligence Markus Auer, ThreatQuotient Inc.
15:55 - 16:25: Break
16:25 - 16:55: Securing Optival Networks against Quantum Attacks Joo Cho, ADVA Optical Networking
16:55 - 17:25: Towards Quantum-resistant Virtual Private Networks Daniel Loebenberger, Fraunhofer AISEC / OTH Amberg-Weiden
17:25 - 18:00: Networking & End
2nd ProtectIT Security Convention
PROGRAM2nd ProtectIT Security Convention
Ekaterina Rudina
Ekaterina Rudina is a Senior System Analyst in Kaspersky Lab’s Industrial Control Systems Cyber Emergency Response Team (ICS CERT) where she focuses on threat modeling, risk assessment and secure architecture network design. She also regularly works on standards with the Institute of Electrical and Electronic Engineers. Ekaterina contributes to recommendations developed by the ITU Study Group 20 - Internet of Things, smart cities and communities. Ekaterina is Kaspersky Lab’s representative in the Industrial Internet Consortium (IIC).
Ekaterina has a PhD in Computer Science with a concentration in network protocol analysis from the Peter the Great St. Petersburg Polytechnic University. Recently Ekaterina has co-authored and contributed to a number of IIC documents including the Industrial Internet Security Framework by IIC (2016), IoT Security Maturity Model (2018), and the Security Maturity Model: Practitioner’s Guide (Feb 2019).
Ekaterina first joined the Future Technologies Department in Kaspersky Lab in 2013 as a system analyst responsible for threat analysis and developing ‚secure by design‘ solutions for risk mitigation. She then joined the newly formed ICS CERT team in 2017.
Trustworthy Internet of Things: Mission Possible
Shifting the focus from security to trustworthiness, survivability, dependability, and similar concepts characterizing IIoT system behavior is one of the current trends. These concepts determine the varying sets of basic characteristics and requirements for the IIoT system such as security, safety, reliability, and others. The complicated concepts must also address the dependencies and inconsistencies of the separate aspects of IIoT system behavior.
The keynote will approach understanding the place and role of trustworthiness in ubiquitous IoT scenarios and technologies used to implement them. Will the trustworthiness replace security, safety, reliability and other concerns regarding IoT, or this is just one of the current trends and the well-recognized approaches should not change? And what does it mean to build a trustworthy IoT?
2nd ProtectIT Security Convention
KEYNOTE2nd ProtectIT Security Convention
Registration:
Please register before September 13th 2019. The seminar fee is EUR 100, incl. VAT.https://survey.th-deg.de/index.php/972359
Conference location:
Deggendorf Institute of TechnologyInstitute ProtectITDieter-Görlitz-Platz 194469 DeggendorfDirections can be found at https://www.th-deg.de/en/protectit/location-protectit
Hotel recommendations amongst other fine places:
Stadthotel Deggendorf:Östlicher Stadtgraben 13, 94469 DeggendorfPhone: +49 991 371640E-mail: [email protected]: www.stadthotel-deggendorf.de
Hotel Donauhof:Hafenstraße 1, 94469 DeggendorfPhone: +49 991 38990E-mail: [email protected]: www.hotel-donauhof.de
Hotel Gasthof Höttl:Luitpoldpl. 22, 94469 DeggendorfPhone: +49 991 3719960E-mail: [email protected]: www.hoettl.de
2nd ProtectIT Security Convention
INFORMATION2nd ProtectIT Security Convention
Organisation Contact
THD - Technische Hochschule Deggendorf Institute ProtectITInstitut ProtectIT Prof. Dr. Martin SchrammDieter-Görlitz-Platz 1 Phone +49 (0)991 3615-57894469 Deggendorf, Germany [email protected]://www.th-deg.de/en/protectit
Announcement:
3rd ProtectIT Security Convention, September 16th 2020Deadline for abstract submission: June 30th 2020
2nd ProtectIT Security Convention
CONTACT2nd ProtectIT Security Convention
ProtectIT