The G DATA Software AG offers an evening program, accompanying the "Offensive Security Course" at the Ruhr University of Bochum.

Every participant is welcome to meet the speakers and the organizing crew in the G DATA Academy. Excellent food and drink invite everybody to exchange thoughts and ideas in a comfortable atmosphere.

Whoever is seeking for the opportunity to get in touch with the external speakers or wants to speak at ease and talk shop with team members of G DATA's technical departments is just in the right place.


Location: G DATA Academy

Route: Download

Time: Starting at 6 p.m.

The following events are planned for the summer term 2014:

  • 16.04.2014 - Mike West
  • 30.04.2014 - Felix Gröbert
  • 21.05.2014 - Mathias Bynens
  • 18.06.2014 - Mathias Karlsson
  • 02.07.2014 - Steven Van Acker


(no responsibility can be taken for this information)


Please contact Karsten Tellmann for further information regarding G DATA and the "Offensive Security Course".

Previous Events

Mathias BynensHacking with UnicodeWatch Video
Felix GröbertSecurity Analysis of Apple FileVault2Watch Video
Mike WestUser Agent LockdownWatch Video
Stefan EsseriOS 7 Security OverviewWatch Video
Miroslav StamparCurious Case of SQLiWatch Video
Fabian YamaguchiInformation Retrieval and Machine Learning for Interactive Bug HuntingWatch Video
Andreas KurtzPentesting IOs Apps - Runtime Analysis and ManipulationWatch Video
Karsten NohlIn-depth crypto attacks - It always takes two bugsWatch Video
Giorgio MaoneDefending the Indefensible - The Unsung Battles & Legacy of NoScriptWatch Video
Jeremiah GrossmanThe real state of website security and the truth about accountability and "Best-Practices."Watch Video
Matthias KaiserRecent Java Exploitation TechniquesWatch Video
Jürgen PabelInformation Security ManagementWatch Video
Felix LindnerSecurity is PrivacyWatch Video
Svetlana GaivoronskiShellcode detection techniquesWatch Video
Arthur GerkisDynamic PHP web-appliaktion analysisWatch Video
Roberto Suggi LiveraniCross Context Scripting (XCS) - Attacks and ExploitationWatch Video
Soroush DaliliFile Uploaders Vulnerabilities - Fire in the hole!Watch Video
Michel AubizziereFuzzing scale and in styleWatch Video
Jonas MagaziniusCrossing Origins by Crossing Formats Watch Video
Ange AlbertiniA challenge in your pocket, an introduction to brainteasersWatch Video
Sandro GauciWebapp Exploit Payloads - tools built for & during the job Watch Video
Alexey SintsovLotus Domino: Penetration Through the Controller Watch Video
Vladimir VorontsovBlind XXE injections Watch Video
Michele OrruBeef, what a tasty piece of meat Watch Video
Paul StoneBrowser Timing Attacks via the Graphics Stack Watch Video
Nicolas GregoireAttacking xml processing Watch Video