Ransomware and how our data ends up online
A lecture like a thriller! The biggest threat to companies at the moment is cyber-criminals, who first steal data, then encrypt it and finally demand a "ransom". If you don't pay, contracts, emails and other company secrets end up online - for everyone to see. Follow Tobias Schroedel on a foray into the dark side of the web. Look over the shoulder of ransomware 2gangs on the Darknet - LIVE. We see how these gangs are organized, how much money is involved and who is blackmailed at this very moment. Of course, there is also information on how the criminals get into the victim's company network and how you can protect yourself against this. Time flies during this presentation! I promise!
AI - ARTIFICIAL INTELLIGENCE
Why a horse (probably) has no feathers
The somewhat different Al lecture. It's not just about marveling. In this lecture on artificial intelligence, Tobias Schroedel will try out some Al tools live: from ChatGPT to image generators. What can Al do and why does it sometimes fail at simple tasks? Experience how Al works, learns and thinks - and why it doesn't actually know, but only assumes, that a horse has fur and no feathers. After this presentation, you will no longer be afraid of Al. But of those who operate it.
LIVE-HACKING - IT SECURITY WITH A DIFFERENCE
The classic and an updated "best of" all lectures - the live hacking show that has inspired thousands of people around the world. Tobias Schroedel introduces you to the world of hackers and takes a look into the poison cabinet of IT. The topics vary depending on the duration. From password crackers and callerspoofing to deepfakes and voice cloning in video conferences, everything is possible. There are not only plenty of "aha" experiences, but also just as many "a-hahaha" moments.
WHAT DATA REVEALS - THE INTERNET-DETECTIVE
I have nothing to hide. Really? You'll be surprised what you can find out about someone with just a few inconspicuous pieces of data and a few online tools. In this presentation, people and criminals are exposed.
-
Social engineering
-
Social networks
-
Internet of things
-
Big Data