Program

The program is preliminary and may be subject to change. Updates to session times or the overall schedule may be made as the conference approaches.

Thursday, May 21nd, 2026

Time Program Details
09:00–10:00 Keynote Managing Cybersecurity of an Energy Utility
Dr. Tim Dorau, Technische Werke Dresden / SachsenEnergie
10:00–11:15 Block 1: Remote signing and trust servicesIlluminating Current Practices in European Remote Signing Solutions (Full)
Stefan Genchev, Nina Schwanke and Georg Carle

Confidential, Web-based PDF Signing Approvals for Remote Signing Solutions (Full)
Stefan Genchev, Nina Schwanke and Georg Carle

WANTED - Wallet-frieNdly elecTronic rEgistered Delivery (Short)
Tina Hühnlein, Detlef Hühnlein, Tobias Wich, Michael Rauh, Neil Crossley, Florian Otto, Mike Prechtl, Marina Artis and Pranav Sharma
11:15–11:30 Coffee Break
11:30–12:45 Block 2: Identity protocols, tokens, and interoperabilityTowards a Choreography for the Protocol Jungle (Full)
Simon Tobias Lund and Sebastian Alexander Mödersheim

Deterministic Homomorphic Identity Tokens for Privacy-Preserving Attribute-based Authentication (Full)
Shashank Tripathi, Kai-Hendrik Woehnert and Volker Skwarek

A Multi-Tenant Identity Governance Model for Data Spaces Based on OpenID Connect (Short)
Zuhaitz Ibarbia, Gonzalo Gil and Mariví Higuero
12:45–13:30 Lunch
13:30–14:30 Block 3: Critical infrastructure and continuous assuranceCritical Infrastructure Risk Assessment: Current Practices and Emerging Challenges (Full)
Rachelle Sellung, Lennart Kiss, Christian Schunck, Matthias Winterstetter and Sirish Kalubhai Savaliya

Integration of a SACM process in a critical infrastructure environment (Full)
Matthias Winterstetter and Robert Abe
14:30–14:45 Coffee Break
14:45–15:45 Block 4: User-facing trust and credential useUsability Improvements for PGP-Secured Email Communication Using OIDC² (Full)
Jonas Primbs and Michael Menth

FIDO4VC: A User-Friendly, Wallet-Less Framework for Decentralized Identity Using FIDO and OpenID4VC Protocols (Short)
Hira Siddiqui, Mujtaba Idrees and Ivan Gudymenko

Trust evaluation on demand: Dynamic Loading of Trust Protocol Drivers (Short)
Eric Biele and Jürgen Anke
15:45–16:30 Hotel Check-In / Individual transfer to Social Event
16:30–18:00 Social Event Festung Xperience (Festung Dresden, Brühlsche Terrasse, Terrassenufer, 01067 Dresden)
18:30–21:30 Conference Dinner Restaurant "Umami Bliss" (Altmarkt 5-6, 01067 Dresden)

Friday, May 22nd, 2026

Time Program Details
09:00–10:00 Keynote Security in Train Infrastructures
Prof. Lukas Iffländer, HTW Dresden & PROBAHN
10:00–11:00 Block 5: Privacy-preserving digital identity and eligibilityFrom Evidence to Eligibility: A Privacy-First Architecture for Interoperable Eligibility Verification (Full)
Gustavo Valverde

Tensions Between Data Minimisation and Legal Proof Obligations: Zero-Knowledge Proofs in the EUDI Wallet (Full)
Alen Horvat, Steffen Schwalm, Johannes Sedlmeir and Hakan Yildiz
11:00–11:15 Coffee Break
11:15–12:15 Block 6: Governance and compliance engineeringTransferability of High-Risk Safety Concepts to Information Security - An Analysis of Established Security Concepts from Aviation and Healthcare (Full)
Sinem Coskun, Hamza Keskin, Jan Czemmel and Jochen Günther

Engineering a Web-Based Generator for GDPR-Compliant Privacy and Legal Notices: A Case Study in a Large Research Organization (Full)
Christopher Ruff
12:15–13:00 Lunch
13:00–14:15 Block 7: AI, privacy, and socio-technical trustThe Privacy-Utility Trade-Off in Artificial Intelligence Contexts: A Systematic Literature Review (Full)
Constantin Brîncoveanu, Aaron Witzki and K. Valerie Carl

Designing Stakeholder Personas with LLMs – Insights from a Research Project on Collaborative Cyber Threat Intelligence (Full)
Michael Kubach and Andrea Horch

Trustworthy AI in Decentralized Ecosystems: State of the Art, Gaps, and Transition to an Agentic Society (Short)
Isaac Henderson Johnson Jeyakumar, Michael Kubach, Rashmi P. Sarode, John Augustine, Rammohan Srinivasan and Sirish Kalubhai Savaliya
14:15–14:30 Coffee Break
14:30–15:30 Block 8: Emerging security architectures and authenticationSecuring Quantum-as-a-Service (QaaS): Technical and Organizational Challenges (Full)
Christian H. Schunck

Zero Trust Architecture: Layers, Measures, and Interactions with a Focus on the Data Layer (Short)
Tobias Schubert and Thomas Wieland

LightSafeAuth: Authentication during key-establishment for IoT devices via visible optical light bursts (Short)
Henrich C. Pöhls and Tobias Marktscheffel