protectit security convention - bayern innovativ

6
INVITATION: 26 th SEPTEMBER 2019 2 nd ProtectIT Security Convention - ProSecCon ProtectIT

Upload: others

Post on 24-Mar-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

INVITATION: 26th SEPTEMBER 20192nd ProtectIT Security Convention - ProSecCon

ProtectIT

2nd ProtectIT Security Convention - ProSecCon, September 26th 2019Deggendorf Institute of TechnologyInstitute ProtectIT / Germany

Topics:

• Industrial and Automotive Cyber Security, trustworthiness and resilience in IoT, con-fidential and integrity protected embedded communications, identity and access manage-ment, security architectures and frameworks

• Cyber attacks, countermeasures and protection schemes, security engineering, real-time cyber threat detection and mitigation strategies, incident response, digital foren-sics, threat intelligence and threat hunting

• Current developments that advance the areas of applied cryptography, especially in the areas of post-quantum cryptography, lightweight cryptography as well as distributed ledger technology

Conference language:English

We are looking forward to meeting you at the 2nd ProtectIT Security Convention.

Yours sincerely,

Prof. Dr. Peter Sperber Prof. Dr. Martin Schramm President of Deggendorf Head of Institute ProtectIT Institute of Technology Protection for Industrial Technology

I N S T I T U T E OF

T ECHNOLOGY

DEGGENDORF

2nd ProtectIT Security Convention

WELCOME2nd ProtectIT Security Convention

Chair: Prof. Dr. Martin Schramm, DIT Prof. Dr.-Ing. Andreas Grzemba, DIT

Schedule:

12:15 - 13:00: Check-In

13:00 - 13:15: Welcome

13:15 - 13:55: Keynote Trustworthy Internet of Things: Mission Possible Ekaterina Rudina, Kaspersky Lab

3:55 - 14:25: AUTOSAR Classic Platform / AUTOSAR Adaptive Platform: Architecture Comparison with regards to Security Concepts Thomas Dirscherl, AVL Software and Functions GmbH

14:25 - 14:55: Break

14:55 - 15:25: Towards an Effective Security Engineering Process for Cyber-Physical Systems - A Research Proposal Andreas Aigner, Landshut University of Applied Sciences

15:25 - 15:55: Mastering the Art of Cyber Threat Intelligence Markus Auer, ThreatQuotient Inc.

15:55 - 16:25: Break

16:25 - 16:55: Securing Optival Networks against Quantum Attacks Joo Cho, ADVA Optical Networking

16:55 - 17:25: Towards Quantum-resistant Virtual Private Networks Daniel Loebenberger, Fraunhofer AISEC / OTH Amberg-Weiden

17:25 - 18:00: Networking & End

2nd ProtectIT Security Convention

PROGRAM2nd ProtectIT Security Convention

Ekaterina Rudina

Ekaterina Rudina is a Senior System Analyst in Kaspersky Lab’s Industrial Control Systems Cyber Emergency Response Team (ICS CERT) where she focuses on threat modeling, risk assessment and secure architecture network design. She also regularly works on standards with the Institute of Electrical and Electronic Engineers. Ekaterina contributes to recommendations developed by the ITU Study Group 20 - Internet of Things, smart cities and communities. Ekaterina is Kaspersky Lab’s representative in the Industrial Internet Consortium (IIC).

Ekaterina has a PhD in Computer Science with a concentration in network protocol analysis from the Peter the Great St. Petersburg Polytechnic University. Recently Ekaterina has co-authored and contributed to a number of IIC documents including the Industrial Internet Security Framework by IIC (2016), IoT Security Maturity Model (2018), and the Security Maturity Model: Practitioner’s Guide (Feb 2019).

Ekaterina first joined the Future Technologies Department in Kaspersky Lab in 2013 as a system analyst responsible for threat analysis and developing ‚secure by design‘ solutions for risk mitigation. She then joined the newly formed ICS CERT team in 2017.

Trustworthy Internet of Things: Mission Possible

Shifting the focus from security to trustworthiness, survivability, dependability, and similar concepts characterizing IIoT system behavior is one of the current trends. These concepts determine the varying sets of basic characteristics and requirements for the IIoT system such as security, safety, reliability, and others. The complicated concepts must also address the dependencies and inconsistencies of the separate aspects of IIoT system behavior.

The keynote will approach understanding the place and role of trustworthiness in ubiquitous IoT scenarios and technologies used to implement them. Will the trustworthiness replace security, safety, reliability and other concerns regarding IoT, or this is just one of the current trends and the well-recognized approaches should not change? And what does it mean to build a trustworthy IoT?

2nd ProtectIT Security Convention

KEYNOTE2nd ProtectIT Security Convention

Registration:

Please register before September 13th 2019. The seminar fee is EUR 100, incl. VAT.https://survey.th-deg.de/index.php/972359

Conference location:

Deggendorf Institute of TechnologyInstitute ProtectITDieter-Görlitz-Platz 194469 DeggendorfDirections can be found at https://www.th-deg.de/en/protectit/location-protectit

Hotel recommendations amongst other fine places:

Stadthotel Deggendorf:Östlicher Stadtgraben 13, 94469 DeggendorfPhone: +49 991 371640E-mail: [email protected]: www.stadthotel-deggendorf.de

Hotel Donauhof:Hafenstraße 1, 94469 DeggendorfPhone: +49 991 38990E-mail: [email protected]: www.hotel-donauhof.de

Hotel Gasthof Höttl:Luitpoldpl. 22, 94469 DeggendorfPhone: +49 991 3719960E-mail: [email protected]: www.hoettl.de

2nd ProtectIT Security Convention

INFORMATION2nd ProtectIT Security Convention

Organisation Contact

THD - Technische Hochschule Deggendorf Institute ProtectITInstitut ProtectIT Prof. Dr. Martin SchrammDieter-Görlitz-Platz 1 Phone +49 (0)991 3615-57894469 Deggendorf, Germany [email protected]://www.th-deg.de/en/protectit

Announcement:

3rd ProtectIT Security Convention, September 16th 2020Deadline for abstract submission: June 30th 2020

2nd ProtectIT Security Convention

CONTACT2nd ProtectIT Security Convention

ProtectIT