On Friday evening, more than 600 participants attended the annual IT-security conference, IT-Security Community Exchange (IT-SECX) at St. Pölten UAS. During the conference, international security specialists presented current developments in the field.
The keynote address was delivered by Kevin Jones, head of Cyber Security Architecture, Innovation and Scouting at Airbus. He presented trends and technical evolutions in the field of IT-security and spoke about a "Cyber Wild West". "IT-security is changing and evolving very rapidly due to increasing digitalisation and improvements in IT. New threats, security solutions and techniques are continually emerging", said Jones.
Call for caution
The speed of development was highlighted by Colombian IT-security expert Sebastián Castro. "In the future we will have fascinating devices for the Internet of Things. However, they will not be as secure as they should be. We should balance the benefits of the Internet of Things with the risks”, said Castro. Latvian IT-security researcher Kiril Solovjovs took personal responsibility seriously. According to Solvjoys: "People should be cautious and know what programmes and things do. What information do I share on social media and through devices on the Internet of Things, and what happens to the information?"
Further lectures were given by representatives of companies such as Kapsch or Bosch as well as by IT-research institutions and consulting firms. Topics included among others, IT-security of machines, autonomous driving, blockchain and forensics.
Protection of critical infrastructure
A key topic of the conference was the protection of critical systems. "The protection of critical infrastructures is more important than ever", said Thomas Brandstetter, Lecturer in the Department of Computer Science and Security at St. Pölten UAS and organiser of the event. Digitalisation has become a core issue for industry as well. Industrial companies are networking their systems to a greater degree and increasingly equipping them with software components to generate data, which can be used to improve operation. This opens a gateway for malware and continues to be an enormous challenge for IT-security.