Securing Industrial IoT

On August 29, 2019, experts from research and practice will meet in Bremen to discuss how industry companies and CIP operators can actively protect themselves when using Industrial IoT. Visit us for a persnal talk at our booth.

The IT Security Day in Bremen, organized by HEISE Events, focuses on the use and networking of industrial IoT devices - because "Industry 4.0" confronts the IT security with new challenges.


Visit the conference with its numerous talks: 

  • Rechtemanagement für (I)IoT mit TPM 2.0
  • Anforderungen an die IT-Sicherheit in der DSGVO
  • Manufacturing security: Bridging the gap between IT and OT
  • Alarmstufe Rot - Viele IT-Sec Teams kurz vor dem Burnout, Ressourcenengpässe schwächen auch die Behörden
  • Wirtschaftsspionage: Betroffenheit, Sicherheit, Machbarkeit
  • Intelligente Cyberangriffe: Von der Prävention über die Untersuchung bis zur Sanierung
  • Smart Home - Smart Hack: Wie der Weg ins digitale Zuhause zum Spaziergang wird
  • Sicheres Edge-Computing mit Blockchain-Anbindung - neue Anwendungen für die Produktion


First-hand Knowledge

Compass Security Deutschland is a partner of Heise Event. At our booth you can discuss with Managing Director Jan-Tilo Kirchhoff the conference topics as well as your open questions regarding the IT protection of your company.


Date: Thursday, August 29, 2019

Venue: Hochschule Bremen, (ZIMT), Flughafenallee 10, 28199 Bremen


You will find all information on the event website: IT-Sicherheitstages in Bremen  - Sign up right know



References: / Bgeralt, 29.08.2017


Vulnerability in "The Scheduler" Plugin for Jira

Thierry Viaccoz has identified an XML External Entity (XXE) vulnerability in "The Scheduler" plugin for Jira. Read more

Vulnerability in the Email+ iOS Application from MobileIron

Sylvain Heiniger has identified a "Cleartext Storage of Sensitive Information" vulnerability in the MobileIron application Email+. Read more

Vulnerabilities in Universal Automation Center (UAC)

Michael Fisler and Felix Aeppli have identified vulnerabilities in the Universal Automation Center (UAC). Read more


Compass Security Blog

Privilege escalation in Windows Domains (2/3)

This second article about privilege escalation in Windows domains describes how to propagate by aiming for passwords that are lying around. mehr

Privilege escalation in Windows Domains (1/3)

This first article of our series about privilege escalation in Windows domains demonstrates how to get a foothold by relaying credentials from users. mehr