{"id":11595,"date":"2022-04-22T14:15:08","date_gmt":"2022-04-22T12:15:08","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=11595"},"modified":"2022-06-21T15:12:57","modified_gmt":"2022-06-21T13:12:57","slug":"it-sad-2022","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2022\/04\/22\/it-sad-2022\/","title":{"rendered":"IT-SAD: IT-Security Awareness Days 2022"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_11595 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_11595')){$('.twoclick_social_bookmarks_post_11595').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2022\\\/04\\\/22\\\/it-sad-2022\\\/\",\"post_id\":11595,\"post_title_referrer_track\":\"IT-SAD%3A+IT-Security+Awareness+Days+2022\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_11596\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/04\/IT-SAD.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11596\" class=\"wp-image-11596 size-medium\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/04\/IT-SAD-300x72.png\" alt=\"Logo of IT-SAD\" width=\"300\" height=\"72\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/04\/IT-SAD-300x72.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/04\/IT-SAD.png 768w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-11596\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/blogs.tu-braunschweig.de\/it\/wp-content\/uploads\/sites\/14\/2021\/04\/IT-SAD_Logo_Black-768x184.png\">TU Braunschweig<\/a><\/p><\/div><\/p>\n<p>From the 2nd to the 19th of May 2022, the IT Security Awareness Days will take place for the third time. During these three weeks, a total of 17 online lectures will be held on the topic of IT security (only conducted in the German language). The lectures will be organised by various universities.<\/p>\n<p>So far, the TU Braunschweig, TU Dresden, KU Eichst\u00e4tt-Ingolstadt, Uni G\u00f6ttingen\/GWDG, Uni Osnabr\u00fcck, Uni Duisburg-Essen and the Uni K\u00f6ln are actively involved.<!--more--><\/p>\n<h3><span style=\"color: #00549f;\">The Schedule<\/span><\/h3>\n<p>The following lectures are planned as part of the IT Security Awareness Days:<\/p>\n<p><strong>02.05.2022<\/strong><br \/>\n14:00: Information security in homeoffice (<em>Arne Windeler, TU Braunschweig<\/em>)<\/p>\n<p><strong>03.05.2022<\/strong><br \/>\n10:00: Anatomy of a security incident: from reporting to digital forensics <em>(Pascal Br\u00fcckner, TU Dresden)<\/em><\/p>\n<p><strong>04.05.2022<\/strong><br \/>\n10:00: Beware of the traps! Hackers, thieves, social engineers <em>(Holger Beck, Universit\u00e4t G\u00f6ttingen\/GWDG)<br \/>\n<\/em>14:00: Protecting privacy on the internet &#8211; the &#8220;best of&#8221; browser extensions <em>(Irmi Blomenkemper, Universit\u00e4t zu K\u00f6ln)<\/em><\/p>\n<p><strong>05.05.2022<\/strong><br \/>\n10:00: APT from the point of view of the attacker <em>(Marius Mertens, Uni Duisburg-Essen)<br \/>\n<\/em>14:00: The 4\u00d74 of most common IT security myths (<em>Christian B\u00f6ttger, TU Braunschweig<\/em>)<\/p>\n<p><strong>06.05.2022<\/strong><br \/>\n10:00: Guided Tours of the GITZ online services (<em>Leonard Jari Zurek, TU Braunschweig<\/em>)<\/p>\n<p><strong>09.05.2022<\/strong><br \/>\n14:00: The 11 &#8220;Golden Rules&#8221; of IT Security (<em>Christian B\u00f6ttger, TU Braunschweig<\/em>)<\/p>\n<p><strong>11.05.2022<\/strong><br \/>\n10:00: Pitfalls of everyday life (<em>Bernhard Brandel, KU Eichst\u00e4tt-Ingolstadt<\/em>)<\/p>\n<p><strong>12.05.2022<\/strong><br \/>\n10:00: (Un-) Safe passwords (<em>Christian B\u00f6ttger, TU Braunschweig<\/em>)<\/p>\n<p><strong>13.05.2022<\/strong><br \/>\n10:00: Emotet\/Trickbot \u2013 A case study of threats (<em>Christian B\u00f6ttger, TU Braunschweig)<\/em><\/p>\n<p><strong>16.05.2022<\/strong><br \/>\n14:00: E-Mail-Security \/ Phishing (<em>Christian B\u00f6ttger, TU Braunschweig<\/em>)<\/p>\n<p><strong>17.05.2022<\/strong><br \/>\n10:00: Information Security at home &#8211; Tips&amp;Tricks for Home Network Security <em>(Leonard Jari Zurek, TU Braunschweig)<\/em><\/p>\n<p><strong>18.05.2022<\/strong><br \/>\n10:00: Messenger \u2013 Data privacy and information security\u00a0(<em>Holger Beck, Universit\u00e4t G\u00f6ttingen\/GWDG<\/em>)<br \/>\n14:00: Wi-Fi security (<em>Steffen Klemer, GWDG<\/em>)<\/p>\n<p><strong>19.05.2022<\/strong><br \/>\n10:00: Cyber-Security-Escape-Room \/ Registration required* <em>(Eric Lanfer, Ren\u00e9-Maximilian Malsky, Uni Osnabr\u00fcck)<br \/>\n<\/em>14:00: Panel discussion<\/p>\n<p>Unless explicitly stated otherwise, no registration is required for participation. Participants from other universities are also welcome to participate. All lectures will be held in a <a href=\"https:\/\/tu-braunschweig.webex.com\/wbxmjs\/joinservice\/sites\/tu-braunschweig\/meeting\/download\/50498ac10b204354823023ae8ee6ba03?siteurl=tu-braunschweig&amp;MTID=me05f7654a9239bf2f225aa34688d02f2\">designated Webex conference room<\/a>. For more information on the individual lectures and on how to participate, please visit the <a href=\"https:\/\/blogs.tu-braunschweig.de\/it\/it-sad-it-security-awareness-days-sommersemester-2022\/\">TU Braunschweig blog<\/a>.<\/p>\n<p>* Since capacities are limited, registration is required for the &#8220;Cyber-Security Escape Room&#8221; event on 19 May. To register, please send an informal email with your name to <a href=\"mailto:ecsm@uos.de\">ecsm@uos.de<\/a>.<\/p>\n<p>You would like to learn more about IT security? You can find all our articles on this topic under the <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/tag\/it-sicherheit\/\">IT Security<\/a> tag.<\/p>\n<p>&nbsp;<\/p>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/IT-Center\/IT-Center\/Team\/~epvp\/Mitarbeiter-CAMPUS-\/?gguid=0x2C5E1B0A3DA32A45AB293A42E93EEC07&amp;allou=1&amp;lidx=1\">St\u00e9phanie Bauens<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":1859,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[308,314],"tags":[358,61,169],"class_list":["post-11595","post","type-post","status-publish","format-standard","hentry","category-events-jubilaen-erfolge","category-it-sicherheit","tag-it-sad","tag-it-sicherheit","tag-veranstaltung"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/11595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/1859"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=11595"}],"version-history":[{"count":7,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/11595\/revisions"}],"predecessor-version":[{"id":12115,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/11595\/revisions\/12115"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=11595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=11595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=11595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}