IT-SECX

Hörsaal 1

Reverse Engineering Custom ASICs by Exploiting Potential Supply-Chain Leaks
Thomas Weber | SEC Consult
Vertrauen ist gut, Pentests sind besser: Sicherheitsprobleme in Active Directory Forests
Reinhard Kugler & Andreas Bernauer | SBA Research
Take All my Money! – Advanced Spear Phishing Attacks
David Wind | A1 Digital International
You think your internal network is secure?
René Freingruber | Kapsch BusinessCom
Angriff auf die BitLocker Verschlüsselung mit TPM-Sniffing (Live-Demo)
Roland Pucher & Stepan Grebeniuk | BDO IT & Risk Advisory
Wenn Modellzüge Amok fahren
Florian Bogner | Bee IT Security