Lectures and publications 2011-2015

Vorträge und Publikationen Icon

Lectures and publications

Our bundled expertise

KISK Logo

IT Security Law - What is in store for you

Lecture | 2. Kölner IT-Security Konferenz
November 2015 | Cologne

sps-ipc-drives Logo

Operational security for remote maintenance and service access (RAS)

Lecture | SPS IPC Drives
November 2015 | Nuremberg

sps-ipc-drives Logo

Risk Assessment according to IEC 62443

Lecture | SPS IPC Drives
November 2015 | Nuremberg

Security Symposium Logo

End-to-end security management with the help of central services

Lecture | Mark & Technik Security Symposium
October 2015 | Munich

It-sa cybersecurity Logo

IT Security Law: What is in store for you

Lecture | it-sa 2015
October 2015 | Nuremberg

Gremien Logo

Livehacking

Lecture | IT-Security sensitization
October 2015 | Datteln

IT Administrator Logo

Administration with a view

Article | IT Administrator
September 2015

VKU Logo

The benefits of a security test for the implementation of the IT security catalog

Lecture | VKU Infotag
September 2015 | Berlin

VKU Logo

The benefits of a security test for the implementation of the IT security catalog

Lecture | VKU Infotag
August 2015 | Cologne

Wirtschaftsinformatik und Management Logo

IT Security Law - What is in store for you

Article | Business informatics & Management
August 2015

Allianz fuer Cyber-Sicherheit Logo

Operationalization - How to technically implement ITSiG

Lecture| Cyber security da
June 2015 | Frankfurt am Main

VDI Wissensforum Logo

Recommended implementation of a detailed risk assessment according to IEC 62443 - 2 - 1

Lecture | VDI Automation
June 2015 | Baden-Baden

VDI Wissensforum Logo

Recommended implementation of a detailed risk assessment according to IEC 62443 - 2 - 1

Paper | VDI Automation
Juni 2015 | Baden-Baden

Deutscher IT-Sicherheitskongress Logo

Technical tests for ICS-systems

Lecture | 14. German IT Security Congress
May 2015 | Bonn

Deutscher IT-Sicherheitskongress Logo

Technical tests for ICS-systems

Paper | 14. German IT Security Congress
May 2015 | Bonn

EW Medien und Kongresse Logo

ISMS: Pure paperwork or technically effective?

Article | EW
April 2015

Rathausconsult Logo

IT security catalogue: Not wasting time during implementation

Article | Rathausconsult
March 2015

CeBIT Logo

IT Security Law - What is in store for you

Lecture | CeBIT 2015
March 2015 | Hannover

E-world Logo

Panel discussion "How are energy- and customer data protected against access or manipulation?"

Lecture | E-world Forum Smart Tech
February 2015 | Essen

IT Administrator Logo

Bad USB

Article | IT-Administrator
January 2015

Gremien Logo

Regulatory requirements for the energy industry

Lecture | Regulatory requirements for the energy industry
December 2014 | Großräschen

sps-ipc-drives Logo

Technical tests for ICS-systems

Lecture | SPS IPC Drives Kongress
November | Nuremberg

sps-ipc-drives Logo

Technical tests for ICS-systems

Paper | SPS IPC Drives Kongress
November 2014 | Nuremberg

Gremien Logo

ISMS IT-SK/EnWG for network operators

Lecture | AK IT-SiBe EVU
November 2014 | Düsseldorf

Cybersicherheitsrat Logo

Cyber Security for Utilities & Critical Infrastructure Operators

Lecture | Cybersicherheitsrat LiveHacking
September 2014 | Leipzig

Gremien Logo

End-to-end security management with the help of central services

Lecture | AK IT-SiBe EVU
June 2014 | Hamburg

bdew Energie Wasser Leben Logo

End-to-end security management with the help of central services

Lecture | IT-Sicherheitsanforderung für die Energiewirtschaft
May 2014 | Düsseldorf

Hannover Messe Logo

IT-Security in the ICS environment

Lecture | HMI Forum Industrielle IT-Sicherheit
April 2014 | Hannover

IT Administrator Logo

Correct protection for industrial environments - Industrially hardened

Article | IT-Administrator
April 2014

Hannover Messe Logo

Operational security for remote maintenance and service access (RAS)

Lecture | HMI Industrial IT Forum
April 2014 | Hannover

bitkom Logo

Security Level Monitoring - Monitoring and visualizing security

Lecture | BITKOM Security Conference
March 2014 | Hannover

CeBIT Logo

Security Level Monitoring - Monitoring and visualizing security

Lecture | CeBIT Heise Security Forum
March 2014 | Hannover

Allianz fuer Cyber-Sicherheit Logo

Audit methodology for ICS installations

Lecture | Cyber-Security Day 2014
February 2014 | Augsburg

ZVEI Logo

IT security in production weaknesses and incidents

Lecture | ZVEI/BSI Forum
November 2013 | Nuremberg

sps-ipc-drives Logo

End-to-end security management with the help of central services

Lecture | SPS IPC Drives Kongress
November 2013 | Nuremberg

Gremien Logo

Overview of the current smart meter location in Germany

Lecture | AK IT-SiBe EVU
October 2013 | Windeck

It-sa cybersecurity Logo

"Access Control Authentication and Authorization" in industrial IT with integrated account management

Lecture | Industrial IT Security - Congress @ it-sa
October 2013 | Nuremberg

IT SEC Logo

Operational security for remote maintenance and service access (RAS)

Lecture | ITSEC Konferenz
September 2013 | Essen

CeBIT Logo

Security Level Monitoring - Monitoring and visualizing security

Lecture | CeBIT Heise Security Forum
March 2013 | Hannover

sps-ipc-drives Logo

End-to-end security management with the help of central services

Lecture | SPS IPC Drives Kongress
November 2012 | Nuremberg

sps-ipc-drives Logo

End-to-end security management with the help of central services

Paper | SPS IPC Drives Kongress
November 2012 | Nuremberg

ThinkSmart Logo

Audit methodology ICS

Lecture | 2. think smart
November 2012 | Düsseldorf

Allianz fuer Cyber-Sicherheit Logo

End-to-end security management with the help of central services

Lecture | 1st IT Security Industrial & Automation
November 2012 | Leipzig

Gremien Logo

Project Security Process (I) - IT Security in Practice

Lecture | AK IT SiBe EVU
October 2012 | Kiel

It-sa cybersecurity Logo

Security Level Monitoring - Monitoring and visualizing security

Lecture | it-sa 2012
October 2012 | Nuremberg

Gremien Logo

Control technology from a SiBE perspective

Lecture | AK IT-SiBe EVU
June 2012 | Coesfeld

CeBIT Logo

Security Level Monitoring - Monitoring and visualizing security

Lecture | CeBIT Heise Security Forum
March 2012 | Hannover

a+s zeitschrift für automation und security Logo

Risk situation and safety of pump stations in open-cast mining operations

Article | a+s - automation und security
February 2012

Gremien Logo

IT-Security norms

Lecture | AK IT-SiBe EVU
November 2011 | Mannheim

Gremien Logo

Network segmentation in process control networks

Article | SCADA-Sicherheit
October 2011