Skip to main content
Displaying | 451 - 460 of 556

Implementing EU Cybersecurity Regulation

Faculty & Research

The 3-day course will introduce major requirements stemming from the EU Cybersecurity Policy and regulation, focusing on the EU Cybersecurity Strategy, Cybersecurity Act and NIS Directive. It will…

Digital Society Conference 2019

Faculty & Research

How should Europe position itself in the global digital arena? How can it contribute to global security and stability? How should it respond to the US-China technology rivalry? How can Europe build…

Digitale Identitäten 2020

Faculty & Research

Digitale Identitäten sind der Schlüssel zur digitalen Welt, sei es im Gesundheitswesen, in der Bildung, der öffentlichen Verwaltung oder der neuen Mobilität. Mit rechtlichen Regelungen wie der eIDAS…

C³ 2021

Faculty & Research

C³ 2021 had a particular focus on European strategies for combatting cybercrime. The development of operational and strategic concepts to fight cybercrime must not be constrained by national…

Geopolitik. Macht. Digitalpolitik.

Faculty & Research

Das Digitale hat die Fachpolitik in den letzten 25 Jahren “kolonisiert”. Ob Gesundheits-oder Familien- oder Sicherheitspolitik - ohne Mitdenken der Digitalisierung lassen sich weder Ziele noch…

Evening reception

Faculty & Research

SCHEDULE   Time    Place  18.00-19.00  Registration & Welcome Drink  Foyer 1 19.00-19.45  Welcome Dr. Sandro Gaycken Keynote Ambassador Rüdiger Bohn  Keynote Dr. Stefan Hofschen Keynote Iris Plöger …

Workshop „Das IGF 2019 und die Rolle Europas in der Internet Governance“

Faculty & Research

    Am 14. Mai von 12.30 bis 18 Uhr veranstaltete das Digital Society Institute gemeinsam mit der Stiftung Wissenschaft und Politik und dem Weizenbaum-Institut für die vernetzte Gesellschaft einen…

Thomas Jarzombek

Faculty & Research

Thomas Jarzombek started an IT service company in 1996 while being a student of Economics, until 2017 he was a partner of the firm. He has been politically active for more than 25 years, for example…

Industrial and embedded security

Faculty & Research

While these technologies bring about many benefits, they also introduce considerable security risks: Previously closed systems are now vulnerable to attacks from afar and commonplace items such as…