Christopher Werny

Christopher Werny ist langjähriger Auditor und Penetrationstester mit umfassender Erfahrung in großen bis sehr großen Unternehmensnetzen.In dieser Funktion ist er auch beratend in der Strategieplanung IT-Security in verschiedenen sehr großen Unternehmen tätig. Sein Spezialgebiet liegt im Bereich der Sicherheit in virtualisierten Umgebungen sowie IPv6. Als langjähriger Referent hat er auf unterschiedlichen Konferenzen Vorträge gehalten, wie zum Beispiel dem Heise IPv6-Kongress im Jahr 2011 und 2012, sowie auf internationalen Konferenzen wie ITU und der DayCon. Seit 2007 widmet er sich dem Thema der Sicherheit in virtualisierten Umgebungen und ist beratend für sehr große Unternehmen tätig, um diese bei der Einführung von Virtualisierungstechnologien zu unterstützen. Bei ERNW leitet er das Team Network Security und arbeitet eng mit Matthias Luft aus dem Team Virtualization and Cloud Security zusammen.

Since 2006 Christopher Werny has been working for ERNW and is the head of ERNW's network security team. He has been involved in network security implementation and assessment projects in several very large environments and is widely regarded as one of the main specialists for IPv6 and IPv6 security. His research topics include 802.1x, IPv6 and virtualization security. He started his Training Career in 2006 with the focus of primarily networking and security topics. Since 2007, he has dedicated a lot of time in IPv6 Research and the security implications of the new protocol. He has given IPv6 Workshops since that time on multiple occasions all over the globe. His most recent Workshop (Advanced IPv6 Security) was done at the Troopers 2012 Conference in Heidelberg. He holds a number of Cisco certifications and loves to dive into the depth of protocol analysis."


CodeCourse TitleStart DateFinish dateLocationPrice*
M50-20-12Sicherheitsaspekte von Unified Communication - Umgebungen - Online WorkshopDec 1, 2020Dec 3, 2020online1990.00 EUR Full
M56-20-12Sicherheitsaspekte in WLAN-UmgebungenDec 9, 2020Dec 10, 2020Berlin1990.00 EUR pro PlatzCanceled
M37-21-03Advanced Network Security - Online WorkshopMar 9, 2021Mar 11, 2021online1990.00 EUR
M50-21-05Sicherheitsaspekte von Unified Communication - Umgebungen - Online WorkshopMay 4, 2021May 6, 2021online1990.00 EUR
*VAT excl.


Troopers20 16.-17. March 2020, Heidelberg



Docker, Kubernetes & Security in Enterprise Environments
Jan Harrie, Simon Janz

Hacking 101
Sven Nobis, Julian Suleder

Hacking Mobile Apps
Tobias Kopf, Ahmad Abolhadid

Hardening Microsoft Environments
Heinrich Wiederkehr, Friedwart Kuhn

Incident Analysis
Dr.-Ing. Andreas Dewald, Frank Block, Florian Bausch

Insight into Windows Internals
Dr. Aleksandar Milenkoski, Dominik Phillips

TLS in the Enterprise
Michael Thumann

Windows & Linux Binary Exploitation
Oliver Matula, Dennis Mantz

ATTACK based hunt engineering on Windows
Eduardo Gerosa, Olaf Hartong

Advanced Deployment and Architecture for Network Traffic Analysis
Peter Manev, Eric Leblond

Advanced Pwning & Fixing of Node.js & Electron apps, shells, injections and fun!
Anirudh Anand, Abraham Aranguren

Assessing Business-Critical Systems: Attack & Secure SAP Platforms
Yvan Genuer, Pablo Artuso

Attack and Defense in AWS: Chaining vulnerabilities to go beyond the OWASP 10
Bharath, Riyaz Walikar 

Fuzzing source-code &  binary-only targets like a pro
Marc ''van Hauser'' Heuse

Hacking the USB World with FaceDancer & USB-Tools 
Kate Temkin, Mikaela Szekely 

Hands-on BloodHound - Intro to Cypher Workshop
Walter Legowski

Machine Learning for Security & Security for Machine Learning
Nikhil Joshi

Mastering Mimikatz 
Carlos Perez

Pentesting Industrial Control Systems
Arnaud Soullié

Pentesting the Modern Application Stack
Francis Alexander

Practical Exploitation of IoT Networks and Ecosystems
Sumanth Naropanth, Sunil Kumar

RFID/NFC: Rise of Proxmark3 - directors' cut
Philippe Teuwen

SensePost Unplugged; Modern WiFi Hacking

Software Defined Radio
Michael Ossmann

Web Application Security
Hannes Molsen

Windows Instrumentation With Frida
Hannes Molsen

Automation with Ansible - Radically simplify IT Operations
Maximilian Eschenbacher



We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not. Please note that if you reject them, you may not be able to use all the functionalities of the site.