BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Dev-Techl - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Dev-Techl
X-ORIGINAL-URL:https://www.techl.eu
X-WR-CALDESC:Events for Dev-Techl
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Berlin
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20241027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20250918T153000
DTEND;TZID=Europe/Berlin:20250918T170000
DTSTAMP:20260423T191907
CREATED:20250402T102024Z
LAST-MODIFIED:20250402T102024Z
UID:43116-1758209400-1758214800@www.techl.eu
SUMMARY:Insights: OT-Security
DESCRIPTION:Agenda\n					\n					\n				\n								\n				\n				\n				\n					\n	Insights: OT-Security				\n				\n				\n				\n					\n	\n	Date & Time:	\n			18.09.2025\n\n	\n\n	  |  \n\n\n15:30\n\n		\n\n\n\n	\n	  -  \n\n17:00\n\n\n\n	\n				\n				\n				\n				\n									Online-Session 								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					\n	Insights: OT-Security				\n				\n				\n				\n									Online-Session\, Datum und Uhrzeit: 								\n				\n				\n				\n					\n		\n			18.09.2025\n\n	\n\n	  |  \n\n\n15:30\n\n		\n\n\n\n	\n	  -  \n\n17:00\n\n\n\n	\n				\n				\n				\n						\n					\n			\n						\n				\n									\n					\n						\n									Anmeldung\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n									\n					\n						\n									Kontakt\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					\n	\n		\n\n	\n	Add to calendar	\n		\n	\n\n		\n			\n									\n	Google Calendar\n\n									\n	iCalendar\n\n									\n	Outlook 365\n\n									\n	Outlook Live\n\n							\n		\n\n		\n	\n\n				\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Agenda 				\n				\n				\n				\n							\n			\n						\n		\n						\n				\n				\n						\n					\n			\n						\n				\n					15.30 – 15.35 Uhr I Begrüßung und Vorstellung der Teilnehmer:innen				\n				\n				\n				\n					Dr. Gerd GroßeVorstandsvorsitzender GFFT e.V.\, Head of United Innovations 				\n				\n					\n		\n					\n		\n				\n				\n							\n			\n						\n		\n						\n				\n				\n						\n					\n			\n						\n				\n					15.35 – 15.50 Uhr I Einführung in das Thema				\n				\n				\n				\n					Christian KochSenior Vice President Cybersecurity – IoT/OT\, Innovations & Business\, NTT DATA Deutschland SE 				\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n			\n						\n		\n						\n				\n				\n				\n					15.50 – 16.05 Uhr I Moderne Ansätze zur NIS-2 Compliance in industriellen Umgebungen: Beispiele aus der Praxis				\n				\n				\n				\n					Cassian Ewert Solution Engineer Central Europe\, Claroty GmbH 				\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n							\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					16.05 – 16.50 Uhr I  Gemeinsame Diskussion u.a. mit				\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Michael LooseInformation Security Manager\, Salzgitter AG 				\n				\n				\n				\n					Ragnar SchierholzGlobal Cyber Security Portfolio Manager\, ABB AG 				\n				\n					\n		\n				\n			\n						\n				\n					Olaf MackensCISO\, Panasonic Europe 				\n				\n				\n				\n					Dr. Timo WandhöferGroup CISO\, Klöckner & Co. SE\n 				\n				\n					\n		\n					\n		\n				\n				\n							\n			\n						\n		\n						\n				\n				\n						\n					\n			\n						\n				\n					16.50 – 17.00 Uhr I Next Steps				\n				\n					\n		\n					\n		\n				\n				\n							\n			\n						\n		\n						\n				\n				\n				\n					\n	\n		\n\n				Insights: Leitfaden und Methodensammlung zur Einführung von DORA im Softwaretest	\n\n\n		\n	\n		Insights: Post-Quantum Kryptografie			\n\n	\n\n				\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n					\n	Insights: OT-Security				\n				\n				\n						\n					\n			\n						\n				\n									\n					\n						\n									Anmeldung\n					\n					\n				\n								\n				\n				\n				\n							\n							\n					\n						Linkedin\n											\n				\n							\n					\n						Youtube
URL:https://www.techl.eu/event/insights-ot-security-2/
CATEGORIES:Cybersecurity
END:VEVENT
END:VCALENDAR