plc-post-img

18. November 2024

SECURITY UNTER KONTROLLE in review

OT security? Is under control! It was a great two days in which all the speakers and exhibitors were able to show the 140 participants on both days why cyber security in production is so important and that automation specialists, engineers and practitioners can take security into their own hands.

We are in the midst of planning a new edition of SECURITY UNTER KONTROLLE soon. Find out when, how and where here:

admeritia Blogposts


Sarah Fluchs' Blog "Fluchsfriction":

blog-img

Cyber Resilience Act in 5 minutes

How it works, what it requires, and 3 steps to take now

29. October 2024

post-icon
blog-img

Product security regulation in 2024

An overview

24. September 2024

post-icon
blog-img

Almost a master key to the Internet: The xz utils backdoor

Why everyone is so upset and what we can learn from the near-disaster

24. September 2024

post-icon
blog-img

Almost a master key to the Internet: The xz utils backdoor

Why everyone is so upset and what we can learn from the near-disaster

26. May 2024

post-icon
blog-img

What the Cyber Resilience Act requires from manufacturers

Documentation, documentation, documentation (that’s actually better than it sounds)

20. March 2024

post-icon
blog-img

Beyond principles: How to finally get a handle on security by design

Start making model-based cybersecurity decisions in 3 steps

26. February 2024

post-icon
blog-img

New US CISA recommendations on Security by Design

The answers are not perfect, but the questions are good...

07. November 2023

post-icon
blog-img

What cybersecurity standards will products in the EU soon have to meet?

Standardisation for the Cyber Resilience Act (CRA) has begun

31. August 2023

post-icon
blog-img

We built and tested a Security by Design tool

Here’s what we learned (so far)

26. June 2023

post-icon
blog-img

Four security engineering simplifiers

We need to decide which security measures NOT to take

22. February 2023

post-icon
blog-img

#Cyberclown: Hype mechanisms in public OT security discourse

And why it’s our job to name them

07. November 2022

post-icon

Dietmar Marggraff's Blog:

blog-img

How is a system attacked?

Remodelling cyber security attacks

16. September 2024

post-icon
blog-img

Almost nobody likes Penetration Tests

Cyber security considerations for Minerals Processing

14. May 2024

post-icon
blog-img

Minerals Processing

Cyber security considerations for Minerals Processing

24. January 2024

post-icon
blog-img

Energy Management Systems

07. September 2023

post-icon
blog-img

Substation Automation Systems

Cyber security considerations for Substation Automation Systems

02. August 2023

post-icon
blog-img

Nuclear Power Stations

Cyber security considerations for Nuclear Power Stations

04. Juli 2023

post-icon
blog-img

System Protection

Cyber security considerations for system protection

31. Mai 2023

post-icon
blog-img

Process Control

Cyber security considerations for Process Control

27. April 2023

post-icon
blog-img

Substations

Cyber security considerations for Substations

27. März 2023

post-icon

Peter Breidbach's Blog:

blog-img

Die Kritische Infrastruktur ist tot. Lang lebe die kritische Anlage!

12. Juni 2023

post-icon
blog-img

Die neue ISO/IEC 27001 ist da – Was muss ich als zertifiziertes Unternehmen nun tun?

11. November 2022

post-icon
blog-img

Cybersecurity im Sicherheitsbericht von Störfallbetrieben

5. April 2022

post-icon
blog-img

Bundestag verabschiedet IT-SiG 2.0

03. März 2021

post-icon

Stephan's Vulnerability Corner


Date Vulnerabilities
07.06.2024 Checkpoint Security Gateways: Abfluss von Zugangsdaten möglich (CSW-Nr. 2024-248589-10F2) Icon
kontaktperson-foto
Your contact person

Sarah Fluchs
Chief Technology Officer

Medium: @fluchsfriction
Linkedin: Linkedin

Tel.: +49 21 73 20363-0
Email: info-at-admeritia.de

hard hat icon

Subscribe to our German security briefing for hard hats!

Security unter Kontrolle


The congress for everyone involved in security in the industry. SECURITY? ...let's get it under control together!

The digitalisation of industry is constantly opening up new gateways for cyber threats. SECURITY UNTER KONTROLLE, launched by admeritia GmbH and Vulkan Verlag, would like to work with you to bring together, promote and make visible the German-speaking automation community that deals with security.

admeritia GmbH heads the congress advisory board and coordinates the content of the programme.

Events


post-img

ONE Conference

01. - 02. October 2024

Conference, The Hague

post-icon
post-img

MCTTP 2024

17. - 19. September 2024

Conference, Munich

post-icon
post-img

SECURITY UNTER KONTROLLE 2024

04. - 05. September 2024

Congress, Dusseldorf

post-icon
post-img

OTCEP 2024

20. - 21. August 2024

Conference, Singapore

post-icon
post-img

ISA OT Cybersecurity Summit 2024

18. - 19. June 2024

Conference, London

post-icon
post-img

Phish-Bot 2024

10. - 12. June 2024

Conference, Bochum

post-icon
post-img

DSLAM II

04. June 2024

Conference, Leipzig

post-icon
post-img

Safety und Security in der Anlagensicherheit 2024

22. February 2024

Conference, Essen

post-icon
post-img

Industrial Security Conference 2023

14. - 15. November 2023

Conference, Copenhagen

post-icon
post-img

OTCEP 2023

22. - 23. August 2023

Conference, Singapore

post-icon
post-img

AUTOMATION 2023

27. - 28. June 2023

Congress, Baden-Baden

post-icon
post-img

Safety und Security in der Anlagensicherheit

21. - 23. May 2023

Conference, Essen

post-icon
post-img

SECURITY UNTER KONTROLLE 2023

10. - 11. May 2023

Congress, Dusseldorf

post-icon
post-img

S4x23

13. - 16. February 2023

Conference, Miami South Beach

post-icon
post-img

IECON22

17. - 20. October 2022

Conference, Brussels

post-icon
post-img

OTCEP 2022

12. - 13. July 2022

Conference, Singapore

post-icon
post-img

EKA 2022

23. - 24. June 2022

Conference, Magdeburg

post-icon
post-img

HHU Campusmesse 2021

19. May 2021

Job fair, Dusseldorf

post-icon
post-img

HMI 2021 Online

12. - 16. April 2021

Trade fair, Hanover

post-icon

Lecture and papers


post-img

Security by Design — A Communication Problem?

18. June 2024

Keynote | ISA OT Cybersecurity Summit 2024

post-icon
post-img

Evolution of Carhacking - from Past 2 Future

12. June 2024

Lecture | Phish-Bot 2024

post-icon
post-img

Mythbusting CyberAv3ngers

11. June 2024

Lecture | Phish-Bot 2024

post-icon
post-img

White hat? Black hat? All you need is a hard hat! Was IT von OT lernen kann.

04. June 2024

Lecture | DSLAM II

post-icon
post-img

Von Anfang an sicher: So funktioniert Security by Design

27. May 2024

Podcast | Episode 25 - Cybersecurity ist Chefsache

post-icon
post-img

IT-RB in der Praxis

22. February 2024

Lecture | Safety und Security in der Anlagensicherheit 2024

post-icon
post-img

IT-Risikobeurteilung

22. February 2024

Lecture | Safety und Security in der Anlagensicherheit 2024

post-icon
post-img

Cybersicherheit im Stromnetz - eine 360°-Ansicht | Teil 5

11. January 2024

Podcast | Omicron-Podcast "Energy Talks"

post-icon
post-img

Industrial Security Conference 2023

14. - 15. November 2023

Lecture | Industrial Security Conference 2023

post-icon
post-img

How to Turn Security by Design from Myth to Reality

22. - 23. August 2023

Lecture | OTCEP 2023

post-icon
post-img

Security By Design Decision

13. - 16. February 2023

Lecture | S4x23

post-icon
post-img

Security by Design Integration Mechanisms for Industrial Control Systems

17. - 20. October 2023

Lecture | IECON22

post-icon
post-img

Securing PLC Code Practices

12. - 13. July 2022

Lecture | OTCEP 2022

post-icon
post-img

AUTOMATION 2022

28. - 29. June 2022

Lecture | VDI Wissensforum

post-icon
blog-img

Security unter Kontrolle: Call for Contributions

22. June 2022

Press release | Security unter Kontrolle

post-icon
post-img

Safety and security in plant safety

22. - 24. March 2022

Lecture | IT risk assessment at the KAS‑51

post-icon
post-img

S4x22 ICS Security Event

25. - 27. January 2022

Lecture | S4x22

post-icon
blog-img

Security by Design - Safety und Security als Herausforderung für Hersteller

16. September 2021

Lecture | CE-Fachkonferenz

post-icon
blog-img

Wie geht Security Engineering? Part 2

14. September 2021

Lecture | Safety ON

post-icon
blog-img

Secure Coding Practices for PLCs

08. August 2021

Lecture | Def Con ICS Village

post-icon
blog-img

Security engineering has to grow up

22. July 2021

Lecture | Kompetenzzentrum Digitale Wasserwirtschaft

post-icon
blog-img

Security muss Zeichnen lernen

29. June 2021

Lecture | AUTOMATION 2021

post-icon
blog-img

Community-Project "Top 20 Secure PLC Coding Practices"

15. June 2021

Press release | PLC Security Top 20 List

post-icon
blog-img

Wie geht Security Engineering? Teil 1

15. June 2021

Lecture | Safety ON

post-icon
blog-img

Sicherheit in der Cloud: Es ist möglich!

03. May 2021

Article | atp-magazin

post-icon
blog-img

Energy Shield-Workshop

15. April 2021

Workshop | Energy Shield

post-icon
post-img

OT security and safety: Two perspectives, shared objective

11. February 2021

Lecture | ICS CyberSec 2021

post-icon
blog-img

On Modelling for Security Engineering

as a Submodel of the Digital Twin

04. January 2021

post-icon

Infographics


Videos


kontaktperson-foto
Your contact person

Andreas Eichmann
Senior Account Manager

Tel.: +49 2173 20363-0
Email: info-at-admeritia.de

... and how do you want to improve your security?

News


news-img

11. June 2024

News – admeritia at Phish‑Bot 2024

news-img

29. May 2024

News – White hat? Black hat? All you need is a hard hat! What IT can learn from OT

news-img

27. May 2024

Podcast – Von Anfang an sicher: So funktioniert Security by Design

news-img

14. May 2024

Blog – Almost nobody likes Penetration Tests