| Day 1 (Wed, Feb 18th, 2026) | |
| 09:30 | Registration and Coffee |
| 10:00 | |
|
Gisela Meister
|
Opening
|
| Block 1 - CRA | |
| 10:10 | |
|
Vangelis Gazis (angefragt)
Huawei
|
Wearables CRA
|
| 10:40 | |
|
Ivan Plajh
CENELEC
|
Secure Element / Smartcards / CRA
|
| 11:10 | Kaffeepause (20 min) |
| 11:30 | |
|
Cord Bartels
Editor CEN /CLC JTC 13 WG3 / WG6
|
A Risk-Based Approach to Sectoral Cybersecurity: Guidance for the application of EN 18037 in support of the Cyber Resilience Act CRA
|
| 12:00 | |
|
Jens Oberender
SRC Security Research & Consulting GmbH
|
Defining the scope for high security assurance in Cloud-based products
|
| 12:30 | Mittagspause (60 min) |
| 13:30 | |
|
Thomas Gilles
BSI / DI 22
Ralf Spenneberg
Open Source Security GmbH
|
ConformXpert - Assessment Tool ETSI EN 303 645
ETSI EN 303 645 is a world class standard for the security of Consumer IoT products. The new tool conformXpert allows to easily perform conformance assessments based on ETSI EN 303 645 with the test methodology of ETSI TS 103 701. The tool e.g., enables the simple creation of an Implementation Conformance Statements (ICS) and automatically generates the necessary IXITs for requesting documentation. conformXpert helps you complete the IXITs with guidance. The CRA product requirements will be closely aligned with EN 303 645. Therefore, you can use the tool to prepare yourself for the CRA. |
| Block 2 - Wallets | |
| 14:00 | |
|
Wijnand Machielse
SRC Security Research & Consulting GmbH
|
UPDATE zu: Connecting the dots: How Harmonised Berlin Group Open Finance Standards are empowering EU Digital Identity Wallets with payments and account information services
|
| 14:30 | Kaffeepause (20 min) |
| 14:50 | |
|
Andreas Plies
Authada GmbH
|
EUDI-Wallet – Migration as a Path, not a Switch: Transitioning from HSM-Based Concepts to Decentralised Secure Hardware Elements
|
| 15:20 | |
|
Mirko Mollik
SPRIND
|
EUDI-Wallet Status + Roadmap
|
| 15:50 | Kaffeepause (20 min) |
| Block 3 - Application | |
| 16:10 | |
|
Karsten Kochan
gematik GmbH
|
Identification mechanisms for the German healthcare system
|
| 16:40 | |
|
Olaf Henniger
Fraunhofer IGD
|
Application of new biometric data interchange formats in machine-readable travel documents
|
| 17:10 | |
|
Tim Ohlendorf
IBM Consulting
|
An Introduction to Confidential Computing
Confidential Computing secures data-in-use by leveraging hardware-based Trusted Execution Environments (TEEs) and Remote Attestation. This session explores how the technology reduces the trust gap in cloud and edge environments, covering TEE architecture principles, attestation flows, and secure secret provisioning patterns. Real-world use cases and practical implementation considerations are examined. The presentation provides security professionals with foundational knowledge for understanding and building robust Confidential Computing solutions. |
| 17:40 | Break /Hotel-Check-in |
| 19:00 | Dinner |
| Day 2 (Thu, Feb 19th, 2026) | |
| 09:00 | Opening |
| Block 4 - Side Channel/Cryptography | |
| 09:10 | |
|
Peter Günther
Utimaco IS GmbH
Volker Krummel
Utimaco IS GmbH
|
Distributed stateful hash-based signatures for applications on constrained devices
|
| 09:40 | |
|
Lukas Varnhorst
Referat T 11 - Chip-Sicherheit / BSI
|
Side Channel Attacks on a Discount?
|
| 10:10 | Kaffeepause (20 min) |
| 10:30 | |
|
Armin Lunkeit
procilon GmbH
|
Transition to PQC - challenges and approaches
Post‑quantum cryptography (PQC) migration poses significant strategic and operational challenges, as current RSA‑ and EC‑based systems risk becoming vulnerable with the advent of large‑scale quantum computers. Organizations must weigh short‑term mitigation measures against their limited long‑term effectiveness. A sustainable approach requires adopting PQC‑capable infrastructures, which includes redesigning key management architectures, updating chip‑card–based processes, and renewing the public key infrastructure. The transition introduces substantial complexity, particularly regarding certificate renewal cycles, key custodianship models, and the re‑encryption of sensitive archived documents. |
| 11:00 | |
|
Frank Morgner
Bundesdruckerei GmbH
Jan Klaußner
Bundesdruckerei GmbH
|
PQC Migration
|
| 11:30 | |
|
Adrian Marotzke
NXP Semiconductors N.V.
|
Post-Quantum Secure Trusted Execution Environment on RISC-V
A Trusted Execution Environment (TEE) is a secure area of the main processor of a connected device that ensures sensitive data is stored, processed, and protected in an isolated and trusted environment. A TEE is a key component to enable secure applications such as identification and payment. However, there are currently no suitable & mature TEE solutions for RISC-V, and current TEEs are also not yet secure against the threat of quantum computers. This talk will present our ongoing research work on enabling post-quantum security for TEEs on RISC-V, based on the open-source RISC-V SoC framework Chipyard and the open-source TEE framework Keystone. This includes algorithm selection, implementation optimization and hardware acceleration. Our results show that a post-quantum secure TEE is feasible for RISC-V, though more work is needed for a mature commercial solution. |
| 12:00 | Mittagspause (60 min) |
| 13:00 | |
|
Johannes Mittmann
BSI / Referat V 31 - Grundlagen kryptographischer Verfahren
|
Linux Random Number Generator and AIS 20/31 Compliance
|
| 13:30 | |
|
Arno Fiedler
Nimbus Technologieberatung GmbH
|
Identity- and Trust Service as Regulated Technologies in Europe: who will survive?
|
| 14:00 | Kaffeepause (20 min) |
| 14:20 | |
|
Stefane Mouille
Cabinet Louis Reynaud
|
European standard(s) on essential cybersecurity requirements for identity management systems and privileged access management software and hardware, including authentication and access control readers, including biometric readers
|
| 14:50 | |
|
Florian Domin
secunet Security Networks AG
|
Synthetische Identitäten, Deepfakes und Entscheidungsunterstützung
|
| 15:20 | |
|
Markus Mösenbacher
Infineon Technologies AG
Christian Stengel
Deutsche Telekom Security GmbH
|
Digital ID – EU initiatives and different options to achieve Level of Assurance High
|
| 15:50 | End |
| 16:00 | Break / Conclusions |
Generell können Sie sich bis zum Veranstaltungstag anmelden. Stichtag für eine Anmeldung zum Frühbucherrabatt ist der 08.02.2026, danach gilt der normale Teilnehmerbetrag. Um den Workshop optimal vorbereiten zu können bitten wir Sie, von dieser Möglichkeit Gebrauch zu machen. Für Schüler, Auszubildende und Studenten können Sonderkonditionen eingeräumt werden.
| Bei Anmeldung ... | bis zum Stichtag | nach dem Stichtag |
|---|---|---|
| Teilnahmegebühr des Workshops | 590,00 € | 640,00 € |
| für Inhaber eines CAST-Leistungspaketes | 450,00 € | 500,00 € |
| Behörden | 250,00 € | 300,00 € |
| Studierende | 100,00 € | 100,00 € |
Alle Preise inkl. 7% MwSt.
Informationen zum CAST Leistungspaket finden Sie hier.
Wenn Sie noch Fragen haben, wenden Sie sich bitte an:
Simone Zimmermann
CAST e.V. Geschäftsstelle
Tel.: +49 (0) 6151/869 230
E-Mail: info@castforum.de
Simone Zimmermann
CAST e.V.
Tel.: +49 6151 869-230
E-Mail: simone.zimmermann
cast-forum.de
Bitte beachten Sie, dass wir Anmeldungen zu unseren Veranstaltungen nur über das Online-Formular nicht jedoch über unsere Fax-Nummern entgegen nehmen können.