{"id":10043,"date":"2021-10-04T12:00:14","date_gmt":"2021-10-04T10:00:14","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=10043"},"modified":"2023-05-17T09:28:47","modified_gmt":"2023-05-17T07:28:47","slug":"it-security-awareness-days","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2021\/10\/04\/it-security-awareness-days\/","title":{"rendered":"IT-SAD: The IT Security Awareness Days in the winter semester 2021!"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_10043 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_10043')){$('.twoclick_social_bookmarks_post_10043').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2021\\\/10\\\/04\\\/it-security-awareness-days\\\/\",\"post_id\":10043,\"post_title_referrer_track\":\"IT-SAD%3A+The+IT+Security+Awareness+Days+in+the+winter+semester+2021%21\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_9022\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9022\" class=\"wp-image-9022 size-medium\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021-300x72.png\" alt=\"IT Security Awareness Days 2021: nehme kostenlos und ohne Registrierung teil\" width=\"300\" height=\"72\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021-300x72.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021.png 768w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-9022\" class=\"wp-caption-text\">Online and without any registration \u2013 the IT Security Awareness Days <br \/>Source: <a href=\" https:\/\/www.tu-braunschweig.de\/\">TU Braunschweig<\/a><\/p><\/div><\/p>\n<p>IT is all around us. We use it in our free time and at work, both at home and on the road. The possibilities it offers us are almost unlimited. But with these possibilities also comes great responsibility, as the use of IT is not always without risks. Cyberattacks are no longer isolated incidents and can affect anyone. With more attacks, there is a need for more IT security and a higher level of awareness. For this reason, several German universities are campaigning for greater awareness in this field.<\/p>\n<p>In order to raise awareness, several German universities have now joined forces for the second time to organise the IT Security Awareness Days. During this online event series, a total of 24 lectures on the topic of information security will be held from 4 October to 12 November 2021. The following universities are actively involved: TU Braunschweig, TU Darmstadt, Uni Hildesheim, KU Eichst\u00e4tt-Ingolstadt, Uni G\u00f6ttingen\/GWDG, Uni Marburg, Uni Osnabr\u00fcck, Leuphana Universit\u00e4t L\u00fcneburg, Uni Duisburg-Essen, Uni K\u00f6ln. The series of events is open to the public. A registration is not required.<\/p>\n<p><!--more--><\/p>\n<h1><strong>The schedule<\/strong><\/h1>\n<p>The following lectures (german only) are planned as part of the IT Security Awareness Days:<\/p>\n<ul>\n<li>04.10., 14:00: <strong>Information Security in the Home Office<\/strong> <em>(Arne Windeler, TU Braunschweig)<\/em><\/li>\n<li>05.10., 10:00: <strong>Cyber-Security Escape Room<\/strong> <em>(Eric Lanfer, Ren\u00e9-Maximilian Malsky, Uni Osnabr\u00fcck)<\/em><\/li>\n<li>06.10., 10:00: <strong>Password Manager<\/strong> <em>(Ren\u00e9-Maximilian Malsky, Uni Osnabr\u00fcck<\/em><em>)<\/em><\/li>\n<li>06.10., 13:00: <strong>2-factor authentication in a few minutes<\/strong> <em>(Lars Kiesow, Uni Osnabr\u00fcck)<\/em><\/li>\n<li>08.10., 10:00: <strong>The 11 &#8220;Golden Rules&#8221; of IT Security<\/strong> <em>(Christian B\u00f6ttger, TU Braunschweig)<\/em><\/li>\n<li>11.10., 14:00: <strong>Guided Online Tours of the Online Tools of the GITZ<\/strong> <em>(Leonard Jari Zurek, TU Braunschweig)<\/em><\/li>\n<li>13.10., 13:00: <strong>Cyber-Security<\/strong> <strong>Escape-Room<\/strong> <em>(Eric Lanfer, Ren\u00e9-Maximilian Malsky, Uni Osnabr\u00fcck)<\/em><\/li>\n<li>14.10., 10:00: <strong>Secure Passwords<\/strong> <em>(Christian B\u00f6ttger, TU Braunschweig)<\/em><\/li>\n<li>18.10., 14:00: <strong>Pitfalls of everyday life<\/strong> <em>(Bernhard Brandel, KU Eichst\u00e4dt-Ingolstadt)<\/em><\/li>\n<li>19.10, 10:00: <strong>How do I protect my (research) data?<\/strong> <em>(Lukas H\u00e4rter, University of Marburg)<\/em><\/li>\n<li>21.10., 10:00: <strong>Emotet &#8211; A case study in threats<\/strong> <em>(Christian B\u00f6ttger, TU Braunschweig)<\/em><\/li>\n<li>26.10., 10:00: <strong>APT from the attacker&#8217;s point of view<\/strong> <em>(Marius Mertens, Uni Duisburg-Essen)<\/em><\/li>\n<li>27.10., 14:00: <strong>Safe surfing &#8211; Best of Privacy AddOns<\/strong> <em>(Irmgard Blomenkemper, Uni Cologne)<\/em><\/li>\n<li>02.11, 14:00: <strong>Caution Trap! Hackers, Thieves, Social Engineers<\/strong> <em>(Holger Beck, University of G\u00f6ttingen)<\/em><\/li>\n<li>03.11., 14:00: <strong>Security in the WLAN<\/strong> <em>(Steffen Klemer, GWDG)<\/em><\/li>\n<li>04.11., 10:00: <strong>The 4\u00d74 of the most widespread IT security errors<\/strong> <em>(Christian B\u00f6ttger, TU Braunschweig<\/em><em>)<\/em><\/li>\n<li>05.11., 10:00: <strong>S\/MIME &#8211; Digital Signing for E-mail and Documents<\/strong> <em>(Jochen Becker, TU Darmstadt)<\/em><\/li>\n<li>08.11., 14:00: <strong>E-mail security \/ Phishing<\/strong> <em>(Christian B\u00f6ttger, TU Braunschweig)<\/em><\/li>\n<li>09.11., 11:00: <strong>Messenger &#8211; Data Protection and IT Security<\/strong> <em>(Holger Beck, Uni G\u00f6ttingen\/GWDG)<\/em><\/li>\n<li>09.11., 14:00: <strong>cloud(e) data &#8211; Smartphones without Google and Apple<\/strong> <em>(Leonard Jari Zurek, TU Braunschweig)<\/em><\/li>\n<li>10.11., 10:00: <strong>Use of IOCs and Yara Rules in IT Forensics<\/strong> <em>(Florian Gottschalk, Uni G\u00f6ttingen)<\/em><\/li>\n<li>12.11., 10:00: <strong>Open question and answer session<\/strong><\/li>\n<li>12.11., 11:00: <strong>Panel discussion<\/strong><\/li>\n<li><strong>tba.<\/strong>, XX:XX: <strong>Backup and Restore<\/strong> <em>(Susan Roesner, Uni Hildesheim)<\/em><\/li>\n<li><strong>tba.<\/strong>, XX:XX: <strong>Security for Windows Workstations<\/strong> <em>(Susan Roesner, Uni Hildesheim)<\/em><\/li>\n<\/ul>\n<p>All lectures will be held in the <a href=\"https:\/\/tu-braunschweig.webex.com\/tu-braunschweig\/j.php?MTID=m4baddcdbb24b340e982309a281a09732\">designated Webex conference room<\/a>, unless otherwise announced. To participate in the events, you can simply enter this room without registering. You find the topic of IT security as exciting as we do? Please take a look at all our contributions on this topic under the keyword <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/tag\/it-sicherheit\/\">IT security<\/a>!<\/p>\n<p>&nbsp;<\/p>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/IT-Center\/IT-Center\/Team\/~epvp\/Mitarbeiter-CAMPUS-\/?gguid=0x2C5E1B0A3DA32A45AB293A42E93EEC07&amp;allou=1&amp;lidx=1\">St\u00e9phanie Bauens<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":2051,"featured_media":9022,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[314],"tags":[],"class_list":["post-10043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-sicherheit"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/10043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/2051"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=10043"}],"version-history":[{"count":2,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/10043\/revisions"}],"predecessor-version":[{"id":15545,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/10043\/revisions\/15545"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/9022"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=10043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=10043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=10043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}