Germany

Events

Stellen Sie die Sicherheit und Performance Ihres SAP-Systems sicher [Webinar]
Date: 06 Sep 2016

Stellen Sie die Sicherheit und Performance Ihres SAP-Systems sicher. Erfahren Sie in unserem Live-Webinar, wie das geht.

70% der Unternehmen überspringen regelmäßig Sicherheits- und Compliance-Audits ihres selbstgeschriebenen ABAP-Codes und setzen dadurch ihr SAP-System großen Gefahren aus.

Statistiken belegen, dass selbstgeschriebene Anwendungen im Durchschnitt einen kritischen Fehler pro 1.000 Codezeilen produzieren. Dies schafft Schwachstellen, verstößt gegen Compliance-Regeln und beeinträchtigt die Performance Ihres SAP-Systems.

Stellen Sie die Sicherheit und Performance Ihres SAP-Systems sicher. Erfahren Sie in unserem Webinar, wie Sie:

- Ein Basislevel an Security in Ihrem ABAP® Code errichten.
- Sicherstellen, dass Ihre Anwendungen keine Lücken in der Security, der Compliance oder dem Schutz vor Datenverlust haben.
- Die Beseitigung von Security- und Compliance-Lücken mit effizienten Testfunktionalitäten optimieren.
- Langfristige Entwicklungs-Best-Practices mit automatisierter Code-Überprüfung aufbauen

Dienstag, 6. September 2016, 11:00 Uhr in deutscher Sprache
Jetzt kostenlos anmelden: http://bit.ly/2b6lIOr

Sie sind zu diesem Termin verhindert? Melden Sie sich trotzdem an und wir senden Ihnen nach dem Webinar den Link zur Aufzeichnung.

Training for Economy Protection Officers
Date: 08 Sep 2016

Digitalization and networking of the economy creates points of vantage for cybercriminals. Every second company in Germany has become a victim of digital ecomonic espionage, sabotage or data theft in recent years. The resulting loss adds up to approximately 51 billion euros per year. With this training, you can encourage professional and sustainable economic protection in your company.

DiNa-Webinar "Basics of Internet security"
Date: 08 Sep 2016

In this webinar you will learn about the advantages the Internet offers for the everyday and associative life of your pupils.

Online

IT security @ Small and medium-sized enterprises
Date: 14 Sep 2016

Cybercrime - Practical advice on the protection on the Internet
Date: 16 Sep 2016

Class in the community college Darmstadt (VHS) in cooperation with the police headquarters of Southern Hesse and the University of Technology within the project KMU AWARE which was sponsored by the Federal Ministry for Economic Affairs and Energy. Information on possibilities for protection as well as excercises on attack detection/phishing.

Barcamp of the "Digital neighbourhood"
Date: 16 Sep 2016

We are looking forward to having a lively exchange and diverse discussions with an impulse on the topic of digital security as well as the closing panel „Safe on the Internet – That’s an act of honour“ with Stefan Will (DVV,  German Association of AdultEducation), Hanno Terbuyken (EKD, German Lutheran Church), Thomas Becker (Hessian Football Association), Sonja Lessing Rümpler (Lutheran Church of Kurhesse-Waldeck) and Markus Winkler (WWF).

Economic espionage and sabotage - A real danger?
Date: 20 Sep 2016

Espionage of industry and economy, IT attacks and sabotage are no exception in the age of digitalization. They have become serious reality that threatens the success of German companies. Our live seminar describes different scenarios of endangerment and illustrates the variety of potential targets and techniques of attacks. Our consultant describes the dangers by reference to functions, processes and business transactions of a company.

Online

DiNa-Webinar "Shop and pay securely on the Internet 1"
Date: 20 Sep 2016

In this webinar you will learn how your pupils can shop safely on the Internet.

Video - Security solutions explained simply
Date: 21 Sep 2016

In this video, F5 explains how you can protect your company from hacker attacks

Online

Video "Who’s watching who? "
Date: 21 Sep 2016

Today’s „explosion“ of applications, cloud-based services and remote workstations implies that your company is more vulnerable than ever to become a victim of cyber attacks. At F5, we use the latest technology to monitor potential threats and global hacking activities around the clock. Our mission ist o keep a close eye on the enemy. Watch our short video and learn how we can support your company in always being one step ahead.

Online, Video on youtube including landing page with further information

5. IT Security Day Mittelstand 2016
Date: 22 Sep 2016

The 5th IT Security Day Mittelstand shows how to effectively protect enterprise data in a practical and coherent way. At the end of the event, the methods of hacking IT systems are demonstrated in a "live hacking" demonstration.

Solutions for SMEs in the cloud - but safe
Date: 22 Sep 2016

DiNa-Webinar "Legal compliance on the Internet: Copyright and licenses"
Date: 22 Sep 2016

In this webinar you will learn everything about the basiscs of copyright and the ancilliary copyright.

DiNa-Webinar "Communicate securely via e-mail 1"
Date: 23 Sep 2016

In this webinar you will learn about the opportunities for your pupils to communicate on the Internet.

Safe on the net with smartphone, tablet and PC
Date: 27 Sep 2016

Smartphones, tablets and PCs are now standard equipment of today’s youth. But do the young people know about all the dangers and risks of the use of those devices and do they have enough media competence? This webinar presents the current risk situation and informs about safety hazards of the use of mobile devices and PCs. Related issues, such as safe browsing, the safe use of social networking sites and the handling of one’s own data will be taken up. The webinar is a cooperation of klicksafe and BSI.

Online

DiNa-Webinar "Shop and pay securely on the Internet 2"
Date: 27 Sep 2016

In this webinar you will learn about how you can rate the level of security of various payment methods online.

DiNa-Webinar "Education and didactics
Date: 28 Sep 2016

In this webinar you will learn about the general educational orientation of the project "Digital neighbourhood".

Live Hacking: Good versus evil
Date: 29 Sep 2016

Experience in real time how a hacker is trying to break into an IT system and how a security specialist wants to prevent him from doing so.

Netzgestalten. Podium 2016 in Berlin
Date: 29 Sep 2016

Four expert lectures on IT security and digitization.

DiNa-Webinar "Communicate securely via e-mail 2"
Date: 29 Sep 2016

In this webinar you will learn why alertness for security in e-mail communication is still important, also for experienced e-mailers.

Cyber security tomorrow
Date: 29 Sep 2016

The German Federal Printing Office invites you to a discussion forum on the topic of „Cyber security tomorrow – challenges and approaches to a solution“. Participants in the discussion are: Arne Schönbohm, president of the German Federal Office for Information Security Technology (Bundesamt für Sicherheit in der Informationstechnik, BSI), Dr. Kim Nguyen, Executive director of D-TRUST GmbH (provider of security solutions), Dr. Hans-Joachim Popp, IT Manager and Chief Information Officer of the German Institute for Transport Research of the German Aerospace Center (DLR), Mario Ohoven, President of the Association for Mid-Sized Businesses (BVMW)

All warnings at a glance
Date: 01 Oct 2016

On October 1st, we will start a new internet portal. Onlinewarnungen.de, we want to make the Internet a little safer. Most of scam tactics only work because users fall into the trap due to uncertainty. And this is exactly where onlinewarnungen.de comes into play. We inform users in a compressed manner about new dangers on the Internet and safety risks related tot he use of software and hardware. Furthermore, we care about the offline world and inform about product recalls from companies or scam tactics on your doorstep. With our guides and the tips and hints contained, every Internet user can browse more safely.

Online

Cybercrime can affect anyone, at any time! - Tips on prevention regarding PC and Smartphone
Date: 01 Oct 2016

Publication of articles on prevention of cybercrime on PC and smartphone via the website polizei-praevention.de and sharing of the articles on the Facebook page of the LKA Lower Saxony.

E-Learning „Security Awareness“
Date: 01 Oct 2016

The security consultancy SIUS Consulting offers innovative security awareness training via e-learning. To obtain a free online access within the ECSM 2016 ,send an e-mail with the subject "ECSM 2016 - Free access" to kundenservice@sicher-gebildet.de

Mousepads with mnemonics on the topic of IT security
Date: 01 Oct 2016

Accompanying the presentations, mousepads with a hidden meaning concerning IT-Security will be distributed in the PC-Pools of the Gauß IT Centre (GITZ). You can find further information on the website of GITZ. Only for members of the TU Braunschweig!

Posters on the topic of awareness
Date: 01 Oct 2016

Throughout the month of October, posters with mnemonics on the topic of IT-security will be displayed at various locations on the TU Braunschweig campus. The posters originate from the German Federal Office for Information Security (BSI) and from the Centre for Communication and Information Processing in Teaching and Research e.V. (ZKI) and are used with the respective permission.

Online quiz on IT-security
Date: 01 Oct 2016

Accompanying the presentations there is the opportunity to take part in an online quiz on IT security issues during the entire month of October. A fun, original way to test and refresh your own knowledge. Only for members of TU Braunschweig!

Twelve questions for more security against cyber crime
Date: 01 Oct 2016

Which recommendations for more security do Internet users implement? Are they able to detect a potential criminal act on the Internet and how do they act in situations like that? Answering these and further questions, the Police Crime Prevention of the Federal Republic and the Federal States (ProPK) and the  German Federal Office for Information Security (BSI) want to find out about the citizen’s competence in dealing with dangers of our everyday digital lives. The online survey on occasion of the European Cyber Security Month (ECSM) in October aims to raise people’s awareness of this topic – and to improve the information supply of the two partners. The two partners carried out the survey already during the ECSM in 2015. Due to the remake, the results of the surveys can be compared and classified. The survey will be published on www.bsi.bund.de. The exact link will be posted after the activation of the survey on October 1st 2016.

Online

Now everybody can encrypt data - with SimpleumSafe for Mac OS X
Date: 01 Oct 2016

Simpleum Media GmbH wants to promote a secure and safe handling of personal and professional data. Under the motto „Now everybody can encrypt“, the German company offers a Software for Mac OSX since June 2016 which enables users to encrypt data without any technical knowledge. During the European Cyber Security Month (ECSM), Simpleum Media GmbH halves the price of their software to facilitate the access in the encryption also in terms of price.

Online

Secure online banking - made in Germany
Date: 01 Oct 2016

As part of the ECSM, we as Outbank GmbH would like to inform with a blogpost about security measures when banking online. Linked to this initial blogpost, a series of small posts will be published which explain fundamental concepts of online-security in a simple manner and the posts will define what should be taken into account. You can find a rough schedule of how Outbank guarantees the security of user data on http://outbankapp.com/security/.

Online / blogpost

Video for the ECSM
Date: 01 Oct 2016

Product overview

Online

SAP Security QUICK-CHECK
Date: 01 Oct 2016

Initial analysis of the security status of your SAP system

IT Security Month on Twitter
Date: 04 Oct 2016

Campaign on Twitter with important hints and tips on the topic of infrastructure security, cloud security, cyber defence and compliance management. You can find the campaign online on our Twitter channel.

Online

Digital regulars' table "Cybercrime - felony on the Internet"
Date: 04 Oct 2016

More and more frequently, criminals also use the Internet. From spying business data to fraudulent online shops, the range of traps in which you can fall as an inexperienced user is large. In the course of this event, we will join the Land Office of Criminal Investigation virtually via video broadcast and they will inform us about the methods criminals use and how we can prevent that, also in advance.

On Location and Online

FIDO (Fast IDentity Online)
Date: 05 Oct 2016

Information event in cooperation with the D-Trust GmbH. With the aid of standards, the authentication online should be secure, quick and easy, and a user no longer has to rely on a variety of strong passwords, to create secure connections.

Workshop "Industrial security in automation processes"
Date: 05 Oct 2016

Even before industry 4.0 was proclaimed as a new paradigm, the subject of IT security was on the agenda of manufacturing companies. However, the complexity will increase significantly due to the networking of production and the Internet of Things, which in turn means new concepts for the safety of systems and IT infrastructures. The issue of IT security is important for industrial practice these days and experts will throw light on the topic from different angles. Participants will gain an overview of current developments in the field of research on industrial safety, as well as of the challenges industrial companies have to face and latest approaches to a solution will be summarized. On this event, we would like to inform you about IT solutions for automation, highlight new dangers caused by cyberattacks, illustrate "best practice" approaches for the protection of your IT and discuss your challenges and solutions. Industry 4.0 will only work if we highlight the challenge of IT security for industrial practice as an essential topic. The workshop will afford an opportunity for the exchange of experience among the participants of the different associations and findings and approaches will be evaluated and discussed with the speakers.

BSI in dialogue with society
Date: 05 Oct 2016

Information security is not just a technical but also a political and social issue. Discussion meeting on the occasion of the European Cyber Security Month on how to organize cyber-security for society.

Cyber Security Workshop: Hacking Lab
Date: 05 Oct 2016

A workshop for students in the field of hacking and penetration testing.

In this workshop students will learn what penetration tests are, why such tests are important and which tools can be used to perform them.

Digital Talk: Safety
Date: 06 Oct 2016

The "Digital Talk" addresses current topics concerning digitization in an entertaining and informative way. Security issues are discussed with experts and personalities from the political, economic and scientific world.

Webinar Series : Recognizing Cyber Attacks - with Security Information & Event Management
Date: 07 Oct 2016

Cyber ​​attacks often go undetected. All the greater may the related damage be. The problem is usually not that no data about the attacks is available, but the difficult analysis of the unstructured information overload. The large amount of data results from the increasing number of devices, applications and users which produce a volume of log data that is hardly comprehensible. In addition, required compliance reportings and the increasing complexity of the IT environment increase control costs massively. The approach to a solution is called "Security Information & Event Management" (SIEM). This approach helps to automate attack indicators in order to better analyze and manage them.

Online Webinar

Mail - The easy way into the company - Webinar
Date: 07 Oct 2016

Spammers earn millions of euros by sending spam mails. The majority of malware is nowadays spam into the company. A mail is like a postcard, anyone can read the content. Every day sensitive data is sent via email. Let us show you how you can deal with this dilemma.

Online Webinar

1. BayWiDI Workshop IT security as a legal challenge
Date: 10 Oct 2016

The 1st BayWiDI workshop in Passau will present the research project and provide the legal basis for IT security. The workshop is primarily aimed at small and medium sized companies from Bavaria. Objective of the workshop is to provide the legal basis and thus constitutes optimization of IT security.

IT security @ Small and medium-sized enterprises
Date: 10 Oct 2016

The workshop is aimed at CEOs and IT decision makers in small and medium enterprises. The focus is on motivation, empowerment and implementation of IT security measures. Experienced speakers will give practical tips.

IT security at TUM - Raising awareness of the freshman class 2016
Date: 10 Oct 2016

This year, TUM is once again drawing attention to the issue of IT security through a wide range of services and campaigns targeting students new to the TUM community.

The campaigns are designed to raise the awareness of new TUM students regarding the secure use and handling of computers, smartphones and other electronic devices and to encourage them to be mindful of protecting their own data. We will achieve this with promotional materials, such as notepads and tote bags bearing campaign slogans, as well as giveaways and special events at “Freshman Days,” such as password card booths, brief IT security lectures and crypto parties.

euromicron Roadshow 2016 in Stuttgart
Date: 11 Oct 2016

At this year's roadshow we would like to introduce you to the current trends in the IT industry. Let yourself be inspired by new IT topics and let's look into the future together.

Webinar ViPNet Mobile Security
Date: 12 Oct 2016

Cyber attacks and vulnerabilities associated with mobile devices are no longer unusual and place new demands on IT security in companies. L We would like to invite you to the Infotecs webinar "ViPNet Mobile Security". The speaker Josef Waclaw (CEO, Infotec GmbH) will introduce you to the mobile encryption solution ViPNet Mobile Security, showing you how the business information exchange via smartphone, tablet and Co. can be protected from attacks.

Online

Security awareness and encryption of e-mail communication
Date: 13 Oct 2016

Training to sensitize the employees and to implement the encryption of e-mail communication

Security 4.0 - what is actually behind it?
Date: 13 Oct 2016

Why companies need IT security more than ever.

Why HSMs are needed to make Cloud a secure place
Date: 13 Oct 2016

This information Webcast showcase how Hardware Security Modules be used as the foundation for a secure cloud application.

While more and more companies and organizations are using cloud, either private, public or hybrid, to store and manage business data, the security of this platform is mission-critical. In general, this business data consists of a mixture of non-sensitive and sensitive data - depending on the type of business and the type of transaction. At any rate, the sensitive and classified data must be stored and managed in a regulated zone. With a sophisticated encryption and key management, cloud storage platforms can provide a professional solution for businesses to manage and store their sensitive data. Hardware Security Modules (HSM) offer an efficient and highly secure way to run cryptographic operations or applications. There is no doubt that this piece of technology is the ultimate root of trust to underpin cloud security.

Webinar: Sandboxing – effektiver Schutz gegen Ransomware in E-Mails
Date: 13 Oct 2016

Herkömmliche Virenscanner schützen oftmals nicht vollumfänglich gegen Ransomware, da sich diese beinahe minütlich verändert und deswegen in vielen Fällen nicht vom Signatur basierten Virenscanner erkannt werden. Um bisher unbekannte Ransomware als diese zu enttarnen bedarf es eine Verhaltensanalyse und damit ein Sandboxing der Files oder Links.

Geht es um IT-Security, kommt man in diesen Tagen nicht am Thema Ransomware vorbei. Viele Unternehmen wurden bereits von verschiedenen Arten der Ransomware getroffen und erlitten Datenverlust. Herkömmliche Virenscanner schützen oftmals nicht vollumfänglich gegen Ransomware, da sich diese beinahe minütlich verändert und deswegen in vielen Fällen nicht vom Signatur basierten Virenscanner erkannt werden. Dieses Webinar zeigt auf, wie Sie Ihr Unternehmen sinnvoll schützen.

Why HSMs are needed to make Cloud a secure place
Date: 13 Oct 2016

This information Webcast showcase how Hardware Security Modules be used as the foundation for a secure cloud application.

While more and more companies and organizations are using cloud, either private, public or hybrid, to store and manage business data, the security of this platform is mission-critical. In general, this business data consists of a mixture of non-sensitive and sensitive data - depending on the type of business and the type of transaction. At any rate, the sensitive and classified data must be stored and managed in a regulated zone. With a sophisticated encryption and key management, cloud storage platforms can provide a professional solution for businesses to manage and store their sensitive data. Hardware Security Modules (HSM) offer an efficient and highly secure way to run cryptographic operations or applications. There is no doubt that this piece of technology is the ultimate root of trust to underpin cloud security.

Why HSMs are needed to make Cloud a secure place
Date: 13 Oct 2016

This information Webcast showcase how Hardware Security Modules be used as the foundation for a secure cloud application.

While more and more companies and organizations are using cloud, either private, public or hybrid, to store and manage business data, the security of this platform is mission-critical. In general, this business data consists of a mixture of non-sensitive and sensitive data - depending on the type of business and the type of transaction. At any rate, the sensitive and classified data must be stored and managed in a regulated zone. With a sophisticated encryption and key management, cloud storage platforms can provide a professional solution for businesses to manage and store their sensitive data. Hardware Security Modules (HSM) offer an efficient and highly secure way to run cryptographic operations or applications. There is no doubt that this piece of technology is the ultimate root of trust to underpin cloud security.

Webinar Series : Recognizing Cyber Attacks - with Security Information & Event Management
Date: 14 Oct 2016

Cyber attacks often go undetected. All the greater may the related damage be. The problem is usually not that no data about the attacks is available, but the difficult analysis of the unstructured information overload. The large amount of data results from the increasing number of devices, applications and users which produce a volume of log data that is hardly comprehensible. In addition, required compliance reportings and the increasing complexity of the IT environment increase control costs massively. The approach to a solution is called "Security Information & Event Management" (SIEM). This approach helps to automate attack indicators in order to better analyze and manage them.

Online Webinar

Basic requirements for Industry 4.0 and IT security
Date: 14 Oct 2016

Digital regulars' table "Cybercrime - felony on the Internet"
Date: 15 Oct 2016

More and more frequently, criminals also use the Internet. From spying business data to fraudulent online shops – the range of traps in which an inexperienced user can fall is large. In the course of this event we will join the Land Office of Criminal Investigation virtually via video broadcast and they will inform us about the methods of the criminals and how you can prevent it - also in advance.

On Location and online

Security strategies and techniques in transition
Date: 16 Oct 2016

The event highlights the current situation in IT security from a technical and strategic point of view. It introduces modern techniques of prevention and explains how to detect attacks and respond appropriately. The advantages and disadvantages of the various approaches will be discussed and the participants get an outlook of meaningful security strategies for the coming years.

Digital regulars' table: "Online Banking"
Date: 17 Oct 2016

Many people use online banking. Basically, online banking can be more secure than making a withdrawal at the cash machine or directly with a representative. Cash machines are also the target of criminals as they manipulate the machines – so-called skimming. And the chances of getting robbed on the way back from the bank are real and hardly more improbable than becoming a victim of online banking fraud.

On location and online

"Die Hacker kommen!"
Date: 17 Oct 2016

Tatsachen, Techniken und Tipps für jeden, der Computer nutzt.

In der Veranstaltung des Sächsischen Staatsministerium des Innern in Zusammenarbeit mit der Volkshochschule Leipzig zeigen Ihnen Computerexperten leicht verständlich einfache Tricks und Handgriffe, damit Sie Ihre Informationen und Daten vor fremden Zugriff geschützt halten und kein leichtes Opfer für Cyberkriminelle werden. Denn selbst der beste Virenscanner oder die stärkste Firewall bügelt nicht alle Fehler aus, die der Mensch vor dem Computer, Tablet oder Smartphone begehen kann.

In dem 2-stündigen Programm bekommen Sie in einer unterhaltsamen Mischung aus Vorträgen und Technikdemonstrationen ("Live-Hacking") Informationen und Tipps zu folgenden Themengebieten:
- Gefährdungen durch die Nutzung der modernen Informationstechnik
- Tücken der Internetnutzung
- Mobilität mit Sicherheitslücken
- Der Mensch als Angriffsziel von Hackern
- Digitale Identitäten (Schutz bei Facebook und Co)

Die Veranstaltung wird durch Mittel der Strategie "Sachsen Digital" (https://publikationen.sachsen.de/bdb/artikel/25926 ) der Sächsischen Staatsregierung ermöglicht.

"Die Hacker kommen!"
Date: 17 Oct 2016

Tatsachen, Techniken und Tipps für jeden, der Computer nutzt.

In der Veranstaltung des Sächsischen Staatsministerium des Innern in Zusammenarbeit mit der Volkshochschule Leipzig zeigen Ihnen Computerexperten leicht verständlich einfache Tricks und Handgriffe, damit Sie Ihre Informationen und Daten vor fremden Zugriff geschützt halten und kein leichtes Opfer für Cyberkriminelle werden. Denn selbst der beste Virenscanner oder die stärkste Firewall bügelt nicht alle Fehler aus, die der Mensch vor dem Computer, Tablet oder Smartphone begehen kann.

In dem 2-stündigen Programm bekommen Sie in einer unterhaltsamen Mischung aus Vorträgen und Technikdemonstrationen ("Live-Hacking") Informationen und Tipps zu folgenden Themengebieten:
- Gefährdungen durch die Nutzung der modernen Informationstechnik
- Tücken der Internetnutzung
- Mobilität mit Sicherheitslücken
- Der Mensch als Angriffsziel von Hackern
- Digitale Identitäten (Schutz bei Facebook und Co)

Die Veranstaltung wird durch Mittel der Strategie "Sachsen Digital" (https://publikationen.sachsen.de/bdb/artikel/25926 ) der Sächsischen Staatsregierung ermöglicht.

it-sa trade fair in Nuremberg
Date: 18 Oct 2016

At the it-sa 2016 in Nuremberg, F5 Networks will show you how to effectively protect apps on your mobile device. Here you will experience how hybrid DDos defense mechanisms protect your entire network as well as all sessions and application layers. Furthermore, you can learn how coded incoming and outgoing traffic can be analyzed

Datenschutz geht zur Schule
Date: 18 Oct 2016

Event to raise awareness when dealing with the Internet and modern communication media: By means of relevant topics such as Social Networking Sites like Facebook, Twitter and Co., downloads of video and music, mobile devices (mobile phone, smartphones, tablet computer, apps and mp3 player), IT-security and cyber mobbing, students will learn about the opportunities and risks in dealing with new media.

it-sa 2016 - The IT Security Expo and Congress
Date: 18 Oct 2016

it-sa 2016 is meanwhile Europe's largest trade show on IT security solutions and technologies. More than 470 exhibitors from 19 countries are showcasing their expertise. More than 230 forum presentations on three days plus a comprehensive congress programme give deep inside knowledge to face cybercrime challenges and to make data and business processes safe.

Industrie 4.0 Industrial Internet Summit
Date: 18 Oct 2016

With 62 presentations, a workshop, and a panel discussion, all centered around the lead theme “Automation encounters Electronics and IT”, the Industrie 4.0 Industrial & Internet Summit taking place in Munich on October 18-19 will set the scene for an extremely insightful debate. The event will be held in parallel with the Security Symposium and the Embedded Cloud Symposium. A joint keynote will open the working sessions for all three events.

In the age of connected production and Industrie 4.0, manufacturers and service providers still have a long way to go before they can implement the new paradigm cost-effectively and securely. The interdisciplinary exchange will focus on areas like security for Industrie 4.0 and networked services, attack vectors and threats, security concepts and strategies, protection of the intellectual property, and product protection.

Wibu-Systems will be leading the discussion with three separate lectures:

- Oliver Winzenried, CEO and founder of Wibu-Systems, will cover “Security in Industrie 4.0: Requirements and Current Status of Research Activities” at the Security Symposium, on October 18th, at 2.00 pm
- and “Cloud-based License Management for IoT Devices” at the Industrie 4.0 and Industrial Internet Summit, on October 18th, at 5.00 pm
- Guenther Fischer, Senior Consultant Licensing and Protection at Wibu-Systems, will address “Protection and Licensing of IIoT Devices with Binding to Secure Elements” at the Security Symposium, on October 18th, at 2.30 pm

With its versatile technology, CodeMeter is a perfect fit for the monetization needs of forward-looking business managers and for the robust cybersecurity requirements of even the most demanding technical experts.

IT forensics - criminal cases in the digital world
Date: 18 Oct 2016

Due to the increasing number of economic crimes, such as misuse of data, insider trading or attacks by hackers, the investigation which is carried out by IT forensic analysts is becoming increasingly necessary. The speaker Thorsten Logemann (chairman of Intersoft consulting services AG) is going to illustrate the search for digital evidence by reference to practical examples and will introduce helpful methods for the detection of evidence.

IT-security at work
Date: 19 Oct 2016

Information event as part of the European Cyber Security Month (ECSM) on the subject of IT-security for all members and employees of the University of Hohenheim. The focus is on illustrating the threats the University of Hohenheim has to face and to give specific recommendations e.g. to repel attacks of cyber engineering, how to behave in the event of damage or loss or how to deal with data and documents.

Warum Whitelisting die Zukunft de Netzwerksicherheit ist
Date: 19 Oct 2016

Vortrag und Fragerunde zum Thema Whitelisting und Praxislösungen

Softwarewhitelisting ist das "New Kid on the Block" in der IT Sicherheit. Obwohl keine neue Erfindung, fristet das Prinzip der Positivliste von erwünschter Software ein Schattendasein neben den bekannten Antiviruslösungen die seit 30 Jahren den Markt der Netzwerksicherheit dominieren. Fakt ist allerdings, dass durch eine funktionierende Whitelist-Lösung die meisten, selbst aktuellsten Angriffe durch Ransomware, verhindert worden wären.

it-sa auditorium "Industry 4.0 and IT security" (talks and panel discussions in the main auditorium of the IT Security Expo and Congress it-sa in Nuremberg)
Date: 19 Oct 2016

The federal association for IT security (TeleTrusT) will be concerned with “industry 4.0 and IT security” during this year’s it-sa auditorium. The one-hour lecture will deal with this topic within the frame of three keynote speeches and one panel discussion. The focus will be on challenges of IT security within the context of industry 4.0. “Industry 4.0” and the networking of systems it implies offers opportunities to increase efficiency and reduce costs. However industry 4.0 also increases the complexity of industrial application. The volume of security related information grows. Contingent upon the individuality of the systems, standardized security concepts from the Office environment are not transferable. The penetration of various corporate divisions (shop, office, production) entails additional risks. Apart from the necessary condition, the aspect of “digital sovereignity” and the required reliable components for the transformation, the practical application of IT security for industry 4.0 will be discussed.

Digital regulars' table: "How does payment via the smartphone work? How secure is it?"
Date: 19 Oct 2016

First steps on PC, tablet and smartphone.

On location and online

Presentation: "IT-forensics for domestic use"
Date: 19 Oct 2016

In contrast to the obtaining of document evidence, which is in the focus of conventional IT-forensics, IT-forensics „for domestic use“ focuses on technological findings on the evolution of the attack and the amount of damage. The presentation gives a short introduction on the most important methods and tools for Linux and Windows and is dedicated to all technically oriented employees, researchers and students.

8th DsiN trade fair @it-sa
Date: 20 Oct 2016

The year-round career fair for all IT students.

Cyber Security Day
Date: 20 Oct 2016

Information day on cyber security with conference, industry workshops, press conference and a fireside chat to enable the exchange between science, business and politics

10:30 to 11:45: Press conference "Cyber Security Research at
Fraunhofer"
12:45 to 16:00: Conference "Safe in the digital future"
16:15 to 17:30: Industry workshops on "Security in the Industry 4.0",
"Automotive Security", "Digital Services", "Security for
Critical Infrastructures"

Fraunhofer-Tag der Cybersicherheit
Date: 20 Oct 2016

Die Konferenz bringt Fraunhofer-Wissenschaftler sowie Experten aus Wirtschaft und Politik zusammen, informiert über aktuelle Entwicklungen in der Cybersicherheitsforschung, über Herausforderungen und Lösungen für sicherheitskritische Systeme.

Am 20. Oktober 2016 veranstaltet die Fraunhofer-Gesellschaft gemeinsam mit dem Fraunhofer-Verbund IUK-Technologie den Tag der Cybersicherheit in Berlin. Die Konferenz bringt Fraunhofer-Wissenschaftler sowie Experten aus Wirtschaft und Politik zusammen, informiert über aktuelle Entwicklungen in der Cybersicherheitsforschung, über Herausforderungen und Lösungen für sicherheitskritische Systeme.

In anschließenden Branchenworkshops können Sie Ihren
Wissensvorsprung zu aktuellen Forschungs- und Entwicklungsaktivitäten in den Bereichen Automotive, Energie, Industrie 4.0 oder Digitale Services ausbauen und sich direkt mit unseren Forschern austauschen. Der Tag der Cybersicherheit findet im Rahmen des European Cyber Security Month statt. Die Veranstaltung ist kostenlos.

Digital regulars' table: "Data security on the Internet"
Date: 20 Oct 2016

These days almost nothing works without data. Due tot he Internet, they became a ressource that is demanded worldwide. What happens with my e-mails? Which data is an online shop allowed to collect? What are my rights as a citizen?

On Location and online

Presentation: "Tips on IT-security for users"
Date: 20 Oct 2016

Lecture event with demonstration and question time on the topic of cyber-security: The Ten Commandments of IT-security (Markus Dietrich) The 4x4 most common errors in IT-security (Dr. Christian Böttger) (In)secure passwords and how to do it better (with interactive section)

Webinar Series : Recognizing Cyber Attacks - with Security Information & Event Management
Date: 21 Oct 2016

Cyber attacks often go undetected. All the greater may the related damage be. The problem is usually not that no data about the attacks is available, but the difficult analysis of the unstructured information overload. The large amount of data results from the increasing number of devices, applications and users which produce a volume of log data that is hardly comprehensible. In addition, required compliance reportings and the increasing complexity of the IT environment increase control costs massively. The approach to a solution is called "Security Information & Event Management" (SIEM). This approach helps to automate attack indicators in order to better analyze and manage them.

Online Webinar

Live-Hacking zum Landespräventionstag
Date: 21 Oct 2016

Der 3. Landespräventionstag Sachsen steht unter dem Motto "Opfer...?!" Der zweite Kongresstag wird dabei mit einem Live-Hacking eröffnet, in dem Computerexperten zeigen, welche Gefahren im Cyberraum existieren und wie man vermeiden kann "Opfer" zu werden.

Ist Opferwerdung überhaupt vermeidbar? Welche Ansätze und Präventionsprogramme sind am wirksamsten? Wie gut funktionieren Opferschutz und Opferhilfe?
Kennen Sie die staatlichen und nichtstaatlichen Opferhilfeeinrichtungen? Mehr Prävention – weniger Opfer? Diskutieren Sie mit uns und finden Sie Antworten
auf Ihre Fragen beim LandesPräventionstag. Gewinnen Sie neue Erkenntnisse, knüpfen Sie interessante Kontakte und vernetzen Sie sich mit Vertretern aus den
Beratungsstellen, der Polizei, der Verwaltung, der Politik, der Wissenschaft, der Rechtspflege sowie der Vereins- und Verbandslandschaft. Das Spektrum reicht dabei
von Opferhilfe bzw. Opferschutz, Erwerb von Lebenskompetenzen bis hin zur Gewalt-, Missbrauchs-, Extremismus- und Suchtprävention, Verkehrssicherheitsarbeit
sowie Kompetenzen im Umgang mit digitalen Medien u. v. a. m.

Presentation: "The evolution of harmful Android apps"
Date: 21 Oct 2016

Daiel Arp + Erwin Quiring Insititute for System Security, TU Braunschweig With the rising popularity of Google’s operating system Chrome OS for mobile devices, Android has simultaneously become a popular target for producers of malicious software. This presentation gives an overview of Android’s malicious code in recent years and shows how one can protect oneself against this application.

Funkkolleg security - Kick-off event
Date: 24 Oct 2016

Kick-off event of the learning and training programm, which gives insights into the latest security research which has long been organized across disciplines and sucessfully links aspects of politics, art and psychology.

IT security @ Small and medium-sized enterprises
Date: 25 Oct 2016

Based on an online check the individual risk situation within the company is analyzed in the workshop. This analysis is used to impart practical and coherent knowledge of digital protection and IT security within the company.

Digital regulars' table: "Payment via tablet"
Date: 25 Oct 2016

Meeting on the topic of payment via tablet computer.

Workshop on interoperable and secure platform strategies
Date: 26 Oct 2016

Creating successful platform strategies, interoperable but also auditable and fully to economic conditions

The human being as the key factor in IT-security
Date: 26 Oct 2016

Collaboratively advance digitalization for a powerful region. That is the aim of IT for Work e.V. and of this networking event. The month of October is European Cyber Security Month (ECSM) and that is why the third meet and greet of the Darmstadt IT sector is dedicated completely to the topic of IT-security. In collaboration with the high security data centre DARZ and IT Seal, IT for Work e.V. cordially invites you to take part in the event. This time with the slogan „The human being as the key factor in IT-security“.

Cybercrime - Security situation, preventions, emergency management
Date: 26 Oct 2016

Cybercrime is also a threat for small and medium-sized enterprises. The free information day together with Networker NRW provides an overview on the subject.

"Die Hacker kommen!"
Date: 26 Oct 2016

Tatsachen, Techniken und Tipps für jeden, der Computer nutzt.

In der Veranstaltung des Sächsischen Staatsministerium des Innern in Zusammenarbeit mit der Volkshochschule Hoyerswerda zeigen Ihnen Computerexperten leicht verständlich einfache Tricks und Handgriffe, damit Sie Ihre Informationen und Daten vor fremden Zugriff geschützt halten und kein leichtes Opfer für Cyberkriminelle werden. Denn selbst der beste Virenscanner oder die stärkste Firewall bügelt nicht alle Fehler aus, die der Mensch vor dem Computer, Tablet oder Smartphone begehen kann.

In dem 2-stündigen Programm bekommen Sie in einer unterhaltsamen Mischung aus Vorträgen und Technikdemonstrationen ("Live-Hacking") Informationen und Tipps zu folgenden Themengebieten:
- Gefährdungen durch die Nutzung der modernen Informationstechnik
- Tücken der Internetnutzung
- Mobilität mit Sicherheitslücken
- Der Mensch als Angriffsziel von Hackern
- Digitale Identitäten (Schutz bei Facebook und Co)

Die Veranstaltung wird durch Mittel der Strategie "Sachsen Digital" (https://publikationen.sachsen.de/bdb/artikel/25926 ) der Sächsischen Staatsregierung ermöglicht.

Cyber crime and the effects on your company
Date: 27 Oct 2016

An analysis from practice with various focus areas: - targeted data theft, computer sabotage and malware - overview of the legal situation - practical cases

Symposium "Safety & Security meets digital Medical World"
Date: 27 Oct 2016

The symposium "Safety & Security" meets digital Medical World" aims at showing its participants from health sector how to protect against the latest threats in the field of attacks on IT infrastructures.

Annual conference "10 years of DsiN"
Date: 27 Oct 2016

Conference with festive evening event

Digital regulars' table: "Cybercrime - felony on the Internet"
Date: 27 Oct 2016

More and more frequently, criminals also use the Internet. From spying business data to fraudulent online shops – the range of traps in which an inexperienced user can fall is large. In the course of this event we will join the Land Office of Criminal Investigation virtually via video broadcast and they will inform us about the methods of the criminals and how you can prevent it - also in advance.

On Location and online

Parents / educators ONLINE - Social Networks
Date: 27 Oct 2016

Experiment on easy-to-use tablet PCs, get information on the privacy and functionality of social networks, discuss their fascination, privacy issues and the transformation of communication channels: Parents and educators can expect all of the above at the workshop "Parents / educators ONLINE" on October 27, 2016 at the Federal Agency for Civic Education in the media Centre in Bonn.

Award presentation of the youth competition "myDigitalWorld"
Date: 27 Oct 2016

As part of the anniversary event "10 years of DsiN"

Conference on IT security as a challenge for the economy and the state
Date: 28 Oct 2016

Given the use of IT in all sectors of economy and state, the protection of IT systems is an increasingly important issue. Without a functioning IT the economy and the state would not be able to function. IT security deficiencies can lead to large damages for companies and the society. Because of this, the German legislature has reacted with the IT Security Act and obliged operators of critical infrastructures to secure their IT systems. At European level, the legislative process to install an information security guideline is almost completed. The need for a secure IT in the economic and the public interest must be reconciled with economically viable and technically feasible measures. The conference is dedicated to the new rules from a scientific and practical point of view. The aim is in particular to address the implementation from the perspective of the sectors concerned and the cooperation with the government agencies. With speakers from academia, business and government a versatile access to the identified themes was chosen.

Presentation: "IT-security for academics"
Date: 28 Oct 2016

Dipl.-Ing. (FH) Jörg Peine-Paulsen, Lower Saxonian Ministry for the Interior and Sport, Dept. 5 protection authority and protection of the economy The amount of sensitive information rises especially in the course of the digitalization. Unforeseen opportunites arose you do not want to miss. At the same time, the number of attacks and unwanted leaks of information is steadily increasing.

Sicherheit und Vertrauen in der vernetzten Welt
Date: 28 Oct 2016

Beim 32. AIK-Symposium „Sicherheit und Vertrauen in der vernetzten Welt“ am 28. Oktober 2016 in Karlsruhe tauschen Fachleute aus Wissenschaft und Wirtschaft ihre Ideen aus, wie man in der digitalen Welt mit zuverlässigen Sicherheitskonzepten und durchdachten Schutzprodukten Vertrauen schaffen kann. Die Expertinnen und Experten betrachten Daten- und Systemsicherheit als entscheidenden Faktor für die erfolgreiche Zukunft softwaregesteuerter und netzbasierter Produkte und Dienstleistungen sowie von vernetzten Systemen, wie sie z.B. im Rahmen von PaaSword entstehen. Die Vorträge wenden sich an Fachleute, das Symposium steht jedoch allen Interessierten offen.

„Je vernetzter die Welt und die Wirtschaft werden, umso wichtiger wird es, dass man den Systemen und den mit ihrer Hilfe gewonnenen Daten und Informationen vertrauen kann. Wir sind überzeugt, dass Plattformen und Dienstleistungen im Internet ebenso wie vernetzte Produkte nur dann dauerhaft akzeptiert werden, wenn sie sicher und zuverlässig sind“, erklärt Professor Dr. Andreas Oberweis. Doch obwohl die Fachwelt Sicherheit als einen entscheidenden Erfolgsfaktor einstufe, würden Sicherheitsanwendungen und -verfahren im Augenblick oft eher als Bremse wahrgenommen und als belastend empfunden, berichtet Oberweis. Der Professor für betriebliche Informationssysteme lehrt und forscht am Institut für Angewandte Informatik und Formale Beschreibungsverfahren (AIFB) des Karlsruher Instituts für Technologie (KIT) und am FZI Forschungszentrum Informatik, z.B. im Projekt PaaSword - A Holistic Data Privacy and Security by Design Platform-as-a-Service Framework.
Zuverlässige Sicherheitskonzepte und durchdachte Schutzprodukte stehen ganz weit oben auf der Forschungsagenda des Instituts AIFB und seiner Partner aus Wirtschaft und Wissenschaft. Auf dem Symposium tauschen sie ihre Ideen dazu aus, informieren über rechtliche und betriebliche Herausforderungen, diskutieren ihre Lösungsansätze mit den Teilnehmenden und stellen ihnen Produkte und Verfahren aus der Wirtschaft vor, die dort bereits zum Systemschutz eingesetzt oder gerade dafür vorbereitet werden. Auf der Veranstaltung gibt es auch Informationen zum Kompetenzzentrum IT-Sicherheit am FZI, vom Land Baden-Württemberg dort als Anlaufstelle für den baden-württembergischen Mittelstand eingerichtet.

Online security for seniors
Date: 30 Oct 2016

Workshop for internet users

- What is the Internet?
- How to use the Internet?
- Entertainment on the Internet , e-mails
avoid risks in the network
- Securely online with mobile phones, smartphones and tablets
- Internet privacy
- Travel booking on the net, online banking, payment on the net

IT-security at work
Date: 31 Oct 2016

Increasingly, smartphones and tablets are used. This is convenient but dangerous since the protection of the desktop computer often does not come into play. With every action, personal and sensitive data are sent to third parties in an uncontrolled manner and they might get analyzed. In addition to that, functions such as GPRS or WiFi display the current location. This seminar shows dangers and gives advice on how to protect your mobile device - and yourself.

IT-Sicherheit am Arbeitsplatz
Date: 31 Oct 2016

Vermehrt werden Smartphones und Tablets genutzt. Das ist praktisch aber gefährlich, denn die Schutzeinrichtungen des stationären PCs kommen dabei häufig nicht zur Geltung. Mit jeder Aktion werden unkontrolliert persönliche oder sensible Daten an Dritte gesendet und möglicherweise ausgewertet. Funktionen wie GPS und WLAN zeigen zusätzlich den aktuellenStandort an. Dieses Seminar zeigt Gefahren auf und gibt Hinweise wie Sie das mobiles Gerät und sich selbst schützen können.

IT-Sicherheit am Arbeitsplatz
Date: 31 Oct 2016

Informationsveranstaltung im Rahmen des ECSM zum Thema IT-Sicherheit für alle Mitglieder und Angehörige der Universität Hohenheim. Inhaltlich geht es um die Darstellung der Bedrohungslage für die Universität Hohenheim und konkrete Maßnahmenempfehlungen wie zum Beispiel Social
Engineering-Angriffe abzuwehren, Verhalten im Schadensfall,
Passwort-Management, Umgang mit Daten und Dokumenten, etc.

Cyber resilience through insurance?
Date: 01 Nov 2016

IT security incidents in the past reveal that the industrial IT environment (which is connected to the Internet) can be misused as a gateway for cyber attacks for instance to the IT of the electricity generation plant and other critical infrastructures. As an example, we will pursue the question with which IT risks the operators of critical infrastructures are confronted and how cyber insurances is an issue as part of entrepreneurial risk-management processes.

Human beings as security risks - social engineering in application development
Date: 03 Nov 2016

Amazing examples of real life problems and how they can be avoided in advance.

European Cyber Security Challenge
Date: 07 Nov 2016

The Conference Following the nation-wide contests, the European Cyber Security Challenge (ECSC) selects the most talented hackers of Europe. Last year the young talents competed against each other in a brilliant final round in Switzerland. The difficult tasks and challenges were solved with excellent answers and enthralled the jury and companies. The final competition 2016 is hosted in Germany on Nov 9th in Duesseldorf. In parallel to the Challenge, it is possible to visit an IT Security Conference. The program is provided by TeleTrusT - IT Security Association Germany and is directed at decision-makers, entrepreneurs, security representatives and IT experts. Also, a recruiting fair matches employers with the IT-professionals of tomorrow - Germany wide and/or transnational. The Challenge Today, most countries lack sufficient IT security professionals to protect their IT infrastructure. To help mitigate this problem, many of them set up national cyber security competitions for finding young cyber talents and for encouraging them to pursue a career in cyber security. The European Cyber Security Challenge (ECSC) leverages these competitions in that it adds a pan-European layer to them: The top cyber talents from each country meet to network and collaborate and finally compete against each other to determine which country has the best cyber talents. To find out which country's team is the best, contestants have to solve security related tasks from domains such as web security, mobile security, crypto puzzles, reverse engineering and forensics and collect points for solving them.

Educational radio broadcasts "Concern for security - perceived and real threat"
Date: 07 Nov 2016

Launch of the training program which gives insight into current security research. This field of research is organized in an interdisciplinary manner and links aspects of politics, engineering and psychology.

European Cyber Security Challenge
Date: 07 Nov 2016

Today, most countries lack sufficient IT security professionals to protect their IT infrastructure. To help mitigate this problem, many of them set up national cyber security competitions for finding young cyber talents and for encouraging them to pursue a career in cyber security.

The European Cyber Security Challenge (ECSC) leverages these competitions in that it adds a pan-European layer to them: The top cyber talents from each country meet to network and collaborate and finally compete against each other to determine which country has the best cyber talents. To find out which country's team is the best, contestants have to solve security related tasks from domains such as web security, mobile security, crypto puzzles, reverse engineering and forensics and collect points for solving them.

Concern for security - perceived and real threats
Date: 07 Nov 2016

Broadcasting start of the learning and training programm, which gives insights into the latest security research which has long been organized across disciplines and sucessfully links aspects of politics, art and psychology.

Online

Economic espionage and sabotage - A real danger?
Date: 14 Nov 2016

Espionage of industry and economy, IT attacks and sabotage are no exception in the age of digitalization. They have become serious reality that threatens the success of German companies. Our live seminar describes different scenarios of endangerment and illustrates the variety of potential targets and techniques of attacks. Our consultant describes the dangers by reference to functions, processes and business transactions of a company.

Online

Kick-off event of the educational radio broadcast
Date: 24 Nov 2016

Kick-off event of the training program which gives insight into current security research. This field of research is organized in an interdisciplinary manner and links aspects of politics, engineering and psychology.

Economic espionage and sabotage - A real danger?
Date: 13 Dec 2016

Espionage of industry and economy, IT attacks and sabotage are no exception in the age of digitalization. They have become serious reality that threatens the success of German companies. Our live seminar describes different scenarios of endangerment and illustrates the variety of potential targets and techniques of attacks. Our consultant describes the dangers by reference to functions, processes and business transactions of a company.