• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2019
Edition logo

Elbsides 2024

2024-09-13
  • Video not yet published
    Opening
    - Morton Swimmer
  • Thumbnail for the video - click to play

    ►

    AI (In)security: How to (Still) Successfully Attack an AI System
    - Katharine Jarmul
  • Thumbnail for the video - click to play

    ►

    Unveiling the Reality: The True Impact of GenAI on Cybercrime
    - Candid Wüest
  • Thumbnail for the video - click to play

    ►

    Ready to Respond - Plan, Prepare, Try & Train
    - Christian Kollee
  • Thumbnail for the video - click to play

    ►

    Protecting the energy transition
    - Marc Ratfeld
  • Thumbnail for the video - click to play

    ►

    Help, my application is vulnerable, but how bad is it?
    - Michael Helwig and Álvaro Martínez
  • Thumbnail for the video - click to play

    ►

    Detection And Response for Linux without EDR
    - Hilko Bengen
  • Thumbnail for the video - click to play

    ►

    Far beyond the perimeter - exploring external attack surfaces
    - Stefan Hager
  • Thumbnail for the video - click to play

    ►

    Key Steps to Achieving an Application Security Program
    - Timo Pagel
  • Thumbnail for the video - click to play

    ►

    Dealing With Imposter Syndrome
    - Sam Macdonald
  • Thumbnail for the video - click to play

    ►

    Protectors of the Realm: Breaking and Fixing Keycloak Configurations
    - Max Maaß and Tim Walter
  • Thumbnail for the video - click to play

    ►

    The evolution of cloud security
    - Paul Vixie
  • Thumbnail for the video - click to play

    ►

    How to implement data protection - fulfilling the (not so new) requirement of the GDPR
    - Marit Hansen
  • Video not yet published
    Closing
    - Morton Swimmer