7th Pader­born Day of IT Se­cur­ity, 22 March 2012

Programme

09:00 Get together
 
09:30 Welcome
Professor Dr. Gregor Engels, Paderborn University, Paderborn Forum "Industry meets Computer Science"
 
09:40 Keynote lecture
The future of privacy protection
Professor Dr. Mchael Waidner, Fraunhofer Institute for Secure Information Technology, Darmstadt
 
10:30 Break
 
11:00 Presentation of the workshops
 
11:30

Workshops 1 to 3 parallel:
 
Workshop 1:
Current developments in basic IT protection
Moderation: Thomas Biere, Federal Office for Information Security (BSI), Bonn
In the first part of the workshop an overview of the approach and methodology as well as the current developments of BSI basic protection will be given. The second part of the workshop takes up current questions of the participants and presents a best-practice approach with which access to areas and documents with different security levels can be realised on a workstation.
 
Workshop 2:
Necessary infrastructure for the practical use of the new identity card
Moderation: Holger Funke, HJP Consulting GmbH, Borchen
Since the introduction of the new electronic identity card, more than 10 million citizens are now equipped with an identity card. This workshop will explain what infrastructure is needed in companies and organizations to actually use the new possibilities offered by the electronic ID card. Which technical components does a company need to access the data of the identity card? Which legal requirements exist? What costs are incurred by a company? Is it sufficient to consider only the technical components? Such questions will be clarified in this workshop.
Holger Funke is Technical Director at HJP Consulting and has been working on specifications for sovereign documents such as passports and ID cards since 2004.
 
Workshop 3:
Privacy in the cloud
Moderation: Manfred Schneider, pro DS Data protection and data security consulting, Paderborn
Google, Telekom, Apple, DATEV and others offer us to process our data cost-effectively in their "clouds". Dynamic and scalable use of external hardware and software, including the necessary know-how, can be good reasons to choose cloud computing. If, however, personal data of employees, business partners, customers or even patients are processed in this way, it must be checked in advance whether and which data protection regulations might conflict with this type of processing. The aim of the workshop is to classify various cloud computing offerings (SaaS, IaaS, etc.) in terms of data protection law and to develop concrete recommendations for action.
 

13:30 Lunch break with snack
  
14:15

Workshops 4 to 6 parallel:
 
Workshop 4:
Protection of smartphones in the business sector

Moderation: Niko Rabke, neam IT-Services GmbH, Paderborn
Today almost everyone owns a smartphone. It is also hard to imagine the business world without them, but few people know what risks this entails. Not only computers, but also mobile devices require consistent care and maintenance in order not to present a security risk. In this workshop you will learn about the possibilities for securing technologies such as smartphones and tablet PCs.
 
Workshop 5:
Requirements for cloud offerings from the perspective of SMEs and the BSI
Moderation: Sabrina Eßer, unilab AG, Paderborn; Dr. Gudrun Oevel, Paderborn University
In the first part of the workshop, requirements for cloud computing in SMEs from project practice will be presented and discussed. In the second part, the topic "Security in the Cloud" will be discussed based on the requirements from the point of view of the BSI and finally, the opportunities will be compared to the risks in the area of security.
 
Workshop 6:
Data protection in social networks
Moderation: Carola Sieling, lawyer and specialist lawyer for information technology law, Law Office Sieling, Paderborn
Social networks are an indispensable part of B2C business. However, there are also dangers lurking here, such as being warned by competitors or attracting the attention of data protection supervisory authorities. In this workshop you will learn what you have to consider when using social media marketing tools such as Facebook, Google+, XING and Co. in terms of data protection. What needs to be considered, for example, when web tracking or personalized advertising to customers? Can the Like button of Facebook be used or not?
 

16:15 Reports of the working groups in plenary
 
16:30 Summary, closing words
 
16:45 End of the event