security essen: 
		Festplatte

DNS Conference

The Digital Networking Security Conference will take place on the first and second day of security essen in Hall 7.

Programme

Here we briefly introduce all (keynote) speakers. Currently the page is under construction - it will be updated regularly.

Thomas R. Köhler
Between cybercrime and cyberwarfare - why cybersecurity is a matter for the boss

security essen: 
		security_Koehler

Internet entrepreneur and author of "Chefsache Cybersicherheit"

With his company CE21, Thomas R. Köhler advises companies and public institutions on secure infrastructures and applied data protection. The business informatics graduate founded his first company - a software company for web applications - at the end of the 1990s as a university spin-off, later focussed on securing and automating logistics processes with his own software company, before - almost 10 years ago - focusing exclusively on cyber security. Köhler is known as the author of numerous books in the subject area, including the bestseller "Die Internetfalle" (FAZ-BUCH 2010), the English-language standard work "Understanding Cyber Risk" (Routledge 2017) and - most recently "Chefsache Cybersicherheit" (CAMPUS).

Köhler is an assistant lecturer for cybercrime in the master's degree programme in criminalistics at the Brandenburg Police University and has also been a research professor at the Institute for International Innovation at Hankou University (Wuhan, China) since 2019.

Picture: Author "Chefsache Cybersicherheit"

Peter Varenhorst
Roundtable: Cyber security in the security world: How far have we come and what still needs to be done?

security essen: 
		security_Vahrenhorst -LKA

Chief Detective Inspector - Deputy Head of Department, North Rhine-Westphalia State Criminal Police Office
Cybercrime Competence Center

After graduating from the University of Applied Sciences for Public Administration NRW, Peter Vahrenhorst first worked as an IT investigator for 10 years. After that, he worked in the field of police prevention on the topic of the Internet. For three years he was also a lecturer at the University of Bielefeld. Peter Vahrenhorst was awarded the "Kooperation Konkret" prize by the NRW Ministry of Education in 2009 and the NRW Ministry of the Interior and Local Government in 2010.

Prof. Timo Kob
Roundtable: Cyber security in the security world: How far have we come and what still needs to be done?

security essen: 
		security_Kob

Board of directors, HiSolutions AG

Albert Einstein once said, "What costs nothing is worth nothing. If he had known about IT-Grundschutz and Wirtschaftsgrundschutz, he probably would not have said this.

With IT-Grundschutz, the BSI has created a work that is probably unique in its breadth and depth and free of charge in order to provide organizations of all types and sizes with an indispensable tool for increasing their own IT security. On the initiative of the ASW Bundesverband in cooperation with the BSI and the BfV, this work was supplemented by security aspects beyond IT in the basic business protection.

The lecture presents the two works and their use in combination.

Sascha M. Zaczyk
Successful attack detection in accordance with IT Security Act 2.0

security essen: 
		security_Zaczyk

Manager information security, EnBW Cyber Security GmbH

The IT Security Act 2.0 requires CRITIS institutions to introduce attack detection systems on time and also specifies requirements for operation. But the road to this goal is rocky. The associated presentation sees itself as a pilot that illuminates key success factors, provides practical set-up assistance and useful tips for lasting success in attack detection. From practice for practice.

David Walkiewicz
DDOS-Attacks by IOT-Devices

security essen: 
		security_David_Walkiewicz

Director Test Research, AV-TEST

There David Walkiewicz investigates and tests IT security across all topics. He comes from Magdeburg, holds a Master's degree from Kings College London and has been working at AV-TEST for more than 10 years. He tests and researches in topic prayers like VPN security, parental control, data leak protection and APT.

David is an amateur scuba diver and Brazilian Jiu-Jitsu brown belt.

Martin Wundram
Got hacked? How to learn from penetration tests, real attacks and even own mistakes

security essen: 
		security_Wundram

CEO/Partner, DigiTrace GmbH

Martin Wundram is a publicly appointed and sworn expert for information processing systems and applications, in particular IT security and IT forensics, a lecturer at the University of Cologne and has been active in IT security and IT forensics for over 15 years. As a freelance author, he writes technical articles for the German IT magazines iX and c't, for example. He also shares his expertise in occasional TV and radio reports.

Alex Wyllie
Next Level Security Awareness Training

security essen: 
		security_Wyllie

Cofounder IT-Seal GmbH

Alex Wyllie is Cofounder of cybersecurity training experts IT-Seal. Founded in 2016, the technology company analyses human IT security behaviour and trains on a metrics-based and demand-driven basis with intelligent, automated learning paths. More than 800 customers rely on the award-winning technology, including the Deutsche Bundesbank, BMW and FC Bayern München.

Abstract:

It is well known that in 9 out of 10 cases, a cyberattack within a company is due to the ignorance of the employees. IT security managers are faced with the challenge of creating and constantly maintaining a heightened IT security awareness among their employees. However, measures such as e-learning or online training are far from sufficient for effective attack detection by your workforce. Learn what additional measures are needed and how to get your staff on board to build a sustainable security culture.

Stefan Kiese
Live Hack: IoT - gaping security holes lure data-hungry hackers

Head of Embedded Systems Security, NSIDE ATTACK LOGIC GmbH

Abstracts:

For years, more and more Internet of Things devices have been flooding the markets. There is no strict definition for "IoT". Thus, those IoT devices can now be found in all areas of life - be it at home for home automation, in business for building automation or for monitoring systems through sensor technology. Sometimes the devices are simply used for comfort, to switch the light by voice command from the TV chair, sometimes they are used for security, as in surveillance technology by means of cameras or as a vital insulin pump directly on people.

Often the profit margins for the manufacturer are low - whether due to competitive pressure, the fast-moving market, low sales or other reasons. Consequently, development budgets are usually severely limited, and the IT security of the products often suffers as a result, since this is not given the necessary relevance in the development and, moreover, in the entire product life cycle.

Hostile actors know how to take advantage of this: Attackers penetrate the manufacturer's network through poorly secured backend systems, which form the backbone of IoT devices, and cause great damage, steal operational information, that of customers, or blackmail the operating companies. Others invade third-party networks directly through the devices, or at least use the devices themselves to obtain surveillance images from cameras, for example. This potentially makes the user vulnerable to blackmail, or facilitates physical intrusions.

In this talk, NSIDE will explain the problems and dangers that can arise from the operation of IoT devices and demonstrate this on stage using live examples of publicly discoverable IoT devices on the Internet, as well as the live hacking of a surveillance camera that serves as a springboard into a foreign network.

Dr. Holger Kaschner
The Seven Deadly Sins of Cyber Crisis Management

Information Security Consulting, DCSO German Cyber Security Organization GmbH

Kaschner has 20 years of hands-on experience in crisis management. He consults across industries with a clear business focus in managing crises as well as dovetailing crisis, information security and continuity management. Part of his multidisciplinary training includes certifications as a Certified Information Security Manager (CISM), ISO 27032 Lead Cybersecurity Manager and ISO 22301/27001 Lead Auditor. Kaschner is an ex-officer of the German Armed Forces (Tank Troops, PsyOps) with crisis experience from KUNDUZ/Afghanistan and author of the currently only German-language practice manual for Cyber Crisis Management.

Abstract:

Cyber attacks are ubiquitous in the media and increasingly endanger the business existence of their victims - not to mention human lives. Crisis teams of companies and authorities, however, are rarely oriented towards the management of cyber attacks and their effects along the supply chain due to their traditional problem definitions, while classic IT emergency organizations, in turn, sometimes lack the strategic perspective. Do you provide the traditional crisis team with necessary cyber competencies, or is it better to provide the IT emergency organization with a strategic lens? Or does the truth lie somewhere in between, for example at the interfaces between the individual disciplines and committees? All variants are possible - but each comes with pitfalls. Knowing these pitfalls is a good first step in avoiding the seven deadly sins in cyber crisis management.

Dipl. Inform. Werner Metterhausen:
Cybersecurity for buildings

security essen: 
		security_Metterhausen

Senior Consultant, VZM - VON ZUR MÜHLEN'SCHE GmbH, BdSI

Werner Metterhausen is a graduate computer scientist and senior consultant at VON ZUR MÜHLEN'SCHE GmbH, BdSI. ISMS ISO 27001 Lead Auditor.

His work focuses on testing and certification of data centers, data center consolidation (site evaluation), business continuity management, IT emergency management, information security and data protection.

Oliver Dehning
Secure use of cloud applications

security essen: 
		security_Dehning

Head of TeleTrusT AG Cloud Security

Cloud computing has become a widely accepted IT operating model. At the same time, the threat situation has also changed: Cloud platforms are increasingly in the sights of cybercrime. For users, the security of cloud applications is therefore coming into focus. The presentation discusses the specific risks of cloud computing and shows measures for secure use.

Philipp C. Rothmann
Cybercrime in the corporate context and solutions for installer companies

security essen: 
		security_Rothmann

Founder and Executive Coach, itsecuritycoach

Philipp-Christopher Rothmann, computer scientist, studied business informatics (diploma) at the University of Applied Sciences in Cologne until 2004, then IT manager at a medium-sized chemical company with the topics ITIL processes and SAP implementation. From 2007, IT consultant and auditor at the German Federal Office for Information Security (BSI), focusing on secret protection and information security. In addition, studies in Computer Science (Master) at the Distance University in Hagen. From 2010 IT auditor and then IT risk manager at a major international bank. From 2014 senior manager at an auditing company for IT consulting and auditing. Now independent coach and consultant (itsecuritycoach) with the gravitational fields of information security, cyber security and data protection. Professional certifications as Certified Information Systems Auditor (CISA), ISO27001 audit team leader and BSI-IT-Grundschutz consultant. Member of the Information Systems Audit and Control Association (ISACA). Author of the BSI IT-Grundschutz building block on Microsoft Exchange. Co-author of the BSI standards and the publications "Optimized ITIL Management" and "Digital Sovereignty: Trust in the Network Society".

Dr. Stefan Jöster
Cyber Insurance and the "State of the Art" - Current Developments in Cyber Insurance

security essen: 
		security_Joester

Specialist Lawyer for Insurance Law, HEUKING KÜHN LÜER WOJTEK

Our law firm Heuking Kühn Lüer Wojtek: With more than 400 attorneys, tax advisors and notaries at eight locations in Germany and an office in Zurich, Heuking Kühn Lüer Wojtek is one of Germany's large business consulting firms. Founded more than 50 years ago, Heuking Kühn Lüer Wojtek is one of the TOP 10 law firms in Germany in terms of revenue, according to industry publisher JUVE.

The scope of our legal advice ranges from medium-sized companies based in Germany and abroad to large international (also listed) companies in all commercial law matters.

Dr. Stefan Jöster specializes in insurance law, in particular financial lines (D&O, Cyber, VSV, Professional Indemnity) and special solutions for large risks (railroads, utilities).

Dr. Lutz M. Keppeler
Cyber Insurance and the "State of the Art" - Current Developments in Cyber Insurance

security essen: 
		security_Lutz

Specialist Lawyer for Information Technology Law , HEUKING KÜHN LÜER WOJTEK

Our law firm Heuking Kühn Lüer Wojtek: With more than 400 attorneys, tax advisors and notaries at eight locations in Germany and an office in Zurich, Heuking Kühn Lüer Wojtek is one of the largest German business consulting firms. Founded more than 50 years ago, Heuking Kühn Lüer Wojtek is one of the TOP 10 law firms in Germany in terms of revenue, according to industry publisher JUVE.

The scope of our legal advice ranges from medium-sized companies based in Germany and abroad to large international (also listed) companies in all commercial law matters.

Dr. Lutz M. Keppeler Has been an attorney at HEUKING KÜHN LÜER WOJTEK in Cologne in the IP, Media & Technology practice group since 2014. Previously, he worked as a lawyer at a US law firm in Düsseldorf. His practice focuses on data protection law, IT security law and open source licensing law. Dr. Keppeler advises national and international clients in the above-mentioned areas of law, publishes extensively in this field and regularly gives lectures focusing on the above-mentioned topics. In addition, he lectures on data protection law at the TH-Köln.

Further speakers

In addition to the keynotes, the DNS Conference offers numerous other exciting and informative presentations by top-class experts from the security industry.

×