Lectures
- Beckert_Darius_Copy-and-Paste_APT.pdf
- Bogner_Florian_Auch_Cyberkriminelle_haben_Fachkräftemangel.pdf
- Eberstaller_Felix_House_of_Br1cks.pdf
- Fraißler_Walter_Cyber_Defense_in_einem_Unternehmen_der_kritischen_Infrastruktur.pdf
- Gattermeyer_Harald_Spannungsfeld_Cybersecurity_und_Quality-Compliance.pdf
- Gierlinger_Markus_Conquering_the_jungle_of_kubernetes_Compliance.pdf
- Longin_Timo_Melting_the_DNS_Iceberg.pdf
- Mohamad_Hassan_Praktische_Angriffe_auf_Full_Disk_Encryption.pdf
- Prinz_Stefan_One_does_not_simply_rely_solely_on_a_managed_SOC.pdf
- Reisinger_Philipp_Die_Grenzen_der_Digitalisierung.pdf
- Stockinger_Johann_Lessons_learned_10_years_ir.pdf
- Strametz_Michael_Hacking_More_Secure_Portable_Storage_Devices.pdf
- Tauber_Alexander_War_Games.pdf
- Teubert_Gideon_Puh_schon_wieder_ein_Incident_Response_Talk.pdf
- Weippl_Edgar_Security_Forschung_in_Österreich.pdf
- Zivanovic_Jovan_RVM_Security.pdf
- Weber_Thomas_Faking_at_Level_1.pdf