Program
The program is preliminary and may be subject to change. Updates to session times or the overall schedule may be made as the conference approaches.
Thursday, May 21nd, 2026
| Time | Program | Details |
|---|---|---|
| 09:00–10:00 | Keynote | Managing Cybersecurity of an Energy Utility Dr. Tim Dorau, Technische Werke Dresden / SachsenEnergie |
| 10:00–11:15 | Block 1: Remote signing and trust services | Illuminating Current Practices in European Remote Signing Solutions (Full) Stefan Genchev, Nina Schwanke and Georg Carle Confidential, Web-based PDF Signing Approvals for Remote Signing Solutions (Full) Stefan Genchev, Nina Schwanke and Georg Carle WANTED - Wallet-frieNdly elecTronic rEgistered Delivery (Short) Tina Hühnlein, Detlef Hühnlein, Tobias Wich, Michael Rauh, Neil Crossley, Florian Otto, Mike Prechtl, Marina Artis and Pranav Sharma |
| 11:15–11:30 | Coffee Break | |
| 11:30–12:45 | Block 2: Identity protocols, tokens, and interoperability | Towards a Choreography for the Protocol Jungle (Full) Simon Tobias Lund and Sebastian Alexander Mödersheim Deterministic Homomorphic Identity Tokens for Privacy-Preserving Attribute-based Authentication (Full) Shashank Tripathi, Kai-Hendrik Woehnert and Volker Skwarek A Multi-Tenant Identity Governance Model for Data Spaces Based on OpenID Connect (Short) Zuhaitz Ibarbia, Gonzalo Gil and Mariví Higuero |
| 12:45–13:30 | Lunch | |
| 13:30–14:30 | Block 3: Critical infrastructure and continuous assurance | Critical Infrastructure Risk Assessment: Current Practices and Emerging Challenges (Full) Rachelle Sellung, Lennart Kiss, Christian Schunck, Matthias Winterstetter and Sirish Kalubhai Savaliya Integration of a SACM process in a critical infrastructure environment (Full) Matthias Winterstetter and Robert Abe |
| 14:30–14:45 | Coffee Break | |
| 14:45–15:45 | Block 4: User-facing trust and credential use | Usability Improvements for PGP-Secured Email Communication Using OIDC² (Full) Jonas Primbs and Michael Menth FIDO4VC: A User-Friendly, Wallet-Less Framework for Decentralized Identity Using FIDO and OpenID4VC Protocols (Short) Hira Siddiqui, Mujtaba Idrees and Ivan Gudymenko Trust evaluation on demand: Dynamic Loading of Trust Protocol Drivers (Short) Eric Biele and Jürgen Anke |
| 15:45–16:30 | Hotel Check-In / Individual transfer to Social Event | |
| 16:30–18:00 | Social Event | Festung Xperience (Festung Dresden, Brühlsche Terrasse, Terrassenufer, 01067 Dresden) |
| 18:30–21:30 | Conference Dinner | Restaurant "Umami Bliss" (Altmarkt 5-6, 01067 Dresden) |
Friday, May 22nd, 2026
| Time | Program | Details |
|---|---|---|
| 09:00–10:00 | Keynote |
Security in Train Infrastructures Prof. Lukas Iffländer, HTW Dresden & PROBAHN |
| 10:00–11:00 | Block 5: Privacy-preserving digital identity and eligibility | From Evidence to Eligibility: A Privacy-First Architecture for Interoperable Eligibility Verification (Full) Gustavo Valverde Tensions Between Data Minimisation and Legal Proof Obligations: Zero-Knowledge Proofs in the EUDI Wallet (Full) Alen Horvat, Steffen Schwalm, Johannes Sedlmeir and Hakan Yildiz |
| 11:00–11:15 | Coffee Break | |
| 11:15–12:15 | Block 6: Governance and compliance engineering | Transferability of High-Risk Safety Concepts to Information Security - An Analysis of Established Security Concepts from Aviation and Healthcare (Full) Sinem Coskun, Hamza Keskin, Jan Czemmel and Jochen Günther Engineering a Web-Based Generator for GDPR-Compliant Privacy and Legal Notices: A Case Study in a Large Research Organization (Full) Christopher Ruff |
| 12:15–13:00 | Lunch | |
| 13:00–14:15 | Block 7: AI, privacy, and socio-technical trust | The Privacy-Utility Trade-Off in Artificial Intelligence Contexts: A Systematic Literature Review (Full) Constantin Brîncoveanu, Aaron Witzki and K. Valerie Carl Designing Stakeholder Personas with LLMs – Insights from a Research Project on Collaborative Cyber Threat Intelligence (Full) Michael Kubach and Andrea Horch Trustworthy AI in Decentralized Ecosystems: State of the Art, Gaps, and Transition to an Agentic Society (Short) Isaac Henderson Johnson Jeyakumar, Michael Kubach, Rashmi P. Sarode, John Augustine, Rammohan Srinivasan and Sirish Kalubhai Savaliya |
| 14:15–14:30 | Coffee Break | |
| 14:30–15:30 | Block 8: Emerging security architectures and authentication | Securing Quantum-as-a-Service (QaaS): Technical and Organizational Challenges (Full) Christian H. Schunck Zero Trust Architecture: Layers, Measures, and Interactions with a Focus on the Data Layer (Short) Tobias Schubert and Thomas Wieland LightSafeAuth: Authentication during key-establishment for IoT devices via visible optical light bursts (Short) Henrich C. Pöhls and Tobias Marktscheffel |