security essen: 

The Digital Networking Security Congress will take place during the entire duration of security essen in Hall 8.

IOT devices and Internet connections of products and services, which were previously purely physical or self-sufficient, are creating new possible targets for cyber criminals. Smart homes, digital company buildings, video surveillance and access control in the cloud are just a few examples of the fact that the confrontation with data protection and information security is inevitable in the future - even for the previously purely physical world of security.

At the Digital Networking Security Congress, experts will report on current incidents, important interfaces between corporate and IT security, legal requirements that affect both worlds and practical implementation examples - both for those responsible for security in companies and public authorities - and for providers and installers of security technology.

Target groups

  • Large companies, industry, municipalities and authorities
  • Installers, planners, engineers, general contractors
  • Small and medium-sized enterprises, security service providers, security trade

Four congress days at a glance

Tuesday: Digital Networking Security - Overarching Challenge for Security and IT Security Managers

The topics: Creating awareness for cyber security | Risks in general | Attacks particularly in the corporate sec environment | Cooperation of all departments | Social engineering | Legal and compliance requirements | Measures and assistance offered by the authorities

Wednesday: Business protection in Smart Building - Current cyber threats and danger prevention

The topics: Future Smart Buildings / Smart Cities | Hacking and protection of IOT devices, remote maintenance, access control | Network security | Cloud applications | Identity and access management

Thursday: Smart safety engineering - safe installation and operation

The topics: Attacks on Smart Homes | Hacking and protection of alarm transmission (video, access control, biometrics, radio) | Network security | Basic protection | IP-based control center | Liability for IOT devices | Data protection | BIM

Friday: Secure the Crown Jewels - Cyber Defense for Economic Protection

The topics: Business protection | Know-how protection | Trade secrets law | Encryption | Logging | Internal offenders'