-
Opening
- Morton Swimmer
-
AI (In)security: How to (Still) Successfully Attack an AI System
- Katharine Jarmul
-
Unveiling the Reality: The True Impact of GenAI on Cybercrime
- Candid Wüest
-
Ready to Respond - Plan, Prepare, Try & Train
- Christian Kollee
-
Protecting the energy transition
- Marc Ratfeld
-
Help, my application is vulnerable, but how bad is it?
- Michael Helwig and Álvaro Martínez
-
Detection And Response for Linux without EDR
- Hilko Bengen
-
Far beyond the perimeter - exploring external attack surfaces
- Stefan Hager
-
Key Steps to Achieving an Application Security Program
- Timo Pagel
-
Dealing With Imposter Syndrome
- Sam Macdonald
-
Protectors of the Realm: Breaking and Fixing Keycloak Configurations
- Max Maaß and Tim Walter
-
The evolution of cloud security
- Paul Vixie
-
How to implement data protection - fulfilling the (not so new) requirement of the GDPR
- Marit Hansen
-
Closing
- Morton Swimmer