The G DATA Software AG offers an evening program, accompanying the "Offensive Security Course" at the Ruhr University of Bochum.

Every participant is welcome to meet the speakers and the organizing crew in the G DATA Academy. Excellent food and drink invite everybody to exchange thoughts and ideas in a comfortable atmosphere.

Whoever is seeking for the opportunity to get in touch with the external speakers or wants to speak at ease and talk shop with team members of G DATA's technical departments is just in the right place.


Location: G DATA Academy

Route: Download

Time: Starting at 6 p.m.

The following events are planned for the summer term 2015:

  • will be announced soon


(no responsibility can be taken for this information)


Please contact Karsten Tellmann for further information regarding G DATA and the "Offensive Security Course".

Previous Events

Joern SchneeweiszBug TalesVideo
Sebastian SchinzelRemote Timing AttacksVideo
Johannes DahseStatic Detection of Vulnerabilities in Modern PHP ApplicationsVideo
Collin MullinerHidden GEMs: Automated Discovery of Access Control Vulnerabilities in GUIsVideo
Alex InführAdobe Reader - Pictures and Text on SteroidsVideo
Mathias KarlssonPolyglot payloads in practiceVideo
Steven Van AckerA Hero´s guide to taming the JavaScript beastVideo
Mathias BynensHacking with UnicodeVideo
Felix GröbertSecurity Analysis of Apple FileVault2Video
Mike WestUser Agent LockdownVideo
Stefan EsseriOS 7 Security OverviewVideo
Miroslav StamparCurious Case of SQLiVideo
Fabian YamaguchiInformation Retrieval and Machine Learning for Interactive Bug HuntingVideo
Andreas KurtzPentesting IOs Apps - Runtime Analysis and ManipulationVideo
Karsten NohlIn-depth crypto attacks - It always takes two bugsVideo
Giorgio MaoneDefending the Indefensible - The Unsung Battles & Legacy of NoScriptVideo
Jeremiah GrossmanThe real state of website security and the truth about accountability and "Best-Practices."Video
Matthias KaiserRecent Java Exploitation TechniquesVideo
Jürgen PabelInformation Security ManagementVideo
Felix LindnerSecurity is PrivacyVideo
Svetlana GaivoronskiShellcode detection techniquesVideo
Arthur GerkisDynamic PHP web-appliaktion analysisVideo
Roberto Suggi LiveraniCross Context Scripting (XCS) - Attacks and ExploitationVideo
Soroush DaliliFile Uploaders Vulnerabilities - Fire in the hole!Video
Tuomas KärkkäinenFuzzing scale and in styleVideo
Jonas MagaziniusCrossing Origins by Crossing Formats Video
Ange AlbertiniA challenge in your pocket, an introduction to brainteasersVideo
Sandro GauciWebapp Exploit Payloads - tools built for & during the job Video
Alexey SintsovLotus Domino: Penetration Through the Controller Video
Vladimir VorontsovBlind XXE injections Video
Michele OrruBeef, what a tasty piece of meat Video
Paul StoneBrowser Timing Attacks via the Graphics Stack Video
Nicolas GregoireAttacking xml processing Video