Hörsaal 1 Reverse Engineering Custom ASICs by Exploiting Potential Supply-Chain Leaks Thomas Weber | SEC Consult Vertrauen ist gut, Pentests sind besser: Sicherheitsprobleme in Active Directory Forests Reinhard Kugler & Andreas Bernauer | SBA Research Take All my Money! – Advanced Spear Phishing Attacks David Wind | A1 Digital International You think your internal network is secure? René Freingruber | Kapsch BusinessCom Angriff auf die BitLocker Verschlüsselung mit TPM-Sniffing (Live-Demo) Roland Pucher & Stepan Grebeniuk | BDO IT & Risk Advisory Wenn Modellzüge Amok fahren Florian Bogner | Bee IT Security