ConCollector
our blog
|
more on thinkst
Search:
Everything
Browse:
Speakers
Conferences
Topics
Contributors
Analytics
Folklore
About
Login
ISHConference 2019
May 6, 2019 to May 6, 2019, Munich, Germany
Event Page
Tell us about missing data
Title
Speakers
Summary
Topic Types
Cyber on the agenda of the CEO
Dr. Michael Kerkloh
N/A
The ISH as a hub for the community
Michael Lindike
N/A
Protection of critical infrastructure in Germany
Dr. Harald Niggemann
N/A
Threat Landscape to both Industrial environments and critical infrastructures
Eugene Kaspersky
N/A
Real time intelligence driven decision making
Yuval Diskin
Decision making at all strategic, operational and tactic levels is always a challenge and each ...
Live Strategic Exercise
Cybexer
N/A
Watchgate
Christopher Bleckmann-dreher
In early 2018 he discovered severe vulnerabilities in some smartwatches. The talk describes the vulnerabilities ...
How to Hack a Yacht
Stephan Gerling
We owe it to a rather unusual coincidence to learn today about various possibilities of ...
Secure your digital identity
Maximillian Möhring
Let Maximilian lead you through his comprehensive and interdisciplinary talk on why not just identities, ...
Protection for directory infrastructure against modern cyber threats
Emmanuel Gras
N/A
Financially motivated threats
Adrian Nish
N/A
State sponsored threats against industrial infrastructure
Adam Meyers
N/A
The MITRE ATT&CK Framework - improve your defense in a focused manner
Rich Struse
The MITRE ATT&CK framework has gained a lot of traction in the security community as ...
What's on your mind? Collect ideas for future collaboration
Marc Lindike
N/A
What does it take to set up a Cyber Defence Center?
Freddy Dezeure
What does it take to set up a Cyber Defence Center? How do you organise ...
Use cases for your hunting and detection
Monzy Merza
Its hard enough to defend the on-prem world. The “Cloud”, presents another terrain for organizations. ...
AD Security Best Practices - Top 11 Security mistakes
Friedwart Wiederkehr
N/A
Financial Service Sector Specific Cybersecurity Profile
Hem Pant
N/A
Challenges of Incident Response in a Real Life example
Michael Pölloth
This talk gives participants an overview of practical incident response based on a real life ...
Your Biggest Cybersecurity Threat is Poor Communication
Andreas Junck
N/A
From words to action - Let's start!
Marc Lindike
N/A