GET /congress/2025/event/973409bf-4354-41a0-b41b-19a041bfc724/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": "973409bf-4354-41a0-b41b-19a041bfc724",
    "kind": "sos",
    "name": "Emergente Systeme, nachhaltige Konflikte, Warum unsere IT nicht an Hacks scheitert – sondern an sich selbst",
    "slug": "emergente-systeme-nachhaltige-konflikte-warum-unse",
    "url": "https://api.events.ccc.de/congress/2025/event/973409bf-4354-41a0-b41b-19a041bfc724/?format=api",
    "track": null,
    "assembly": "sos",
    "room": "d477e5d4-4700-4317-896c-ca39c0720eed",
    "location": null,
    "language": "de",
    "description": "Most IT systems fail not because someone makes a mistake.\r\nThey fail because no one understands the overall behavior.\r\n\r\nThis SOS deals with emergent system effects:\r\nsituations in which correctly built components together produce something\r\nthat no one planned, modeled, or controlled.\r\n\r\nUsing real-world examples from IT infrastructure, cloud dependencies, API designs, AI usage, update cascades, and financial and identity systems, we show\r\nhow technical decisions can create lasting stress and conflict – often without a classic attacker, without an exploit, without a clear trigger.\r\n\r\nIn line with the 39C3 motto “Power Cycles – Rethink, Reboot, Restart,” the session asks the question:\r\n\r\nWhat do we need to rethink before we restart?\r\nWhat can be rebooted – and what needs a fundamental rethink?\r\n\r\nThe term “sustainable war” is understood not in a military sense, but in a systemic sense:\r\n- as a state of permanent repurposing, \r\n- overstretching, and creeping destabilization of IT systems,\r\nwhich \r\n- drives innovation, \r\n- undermines resilience, \r\n- and generates social side effects.\r\n\r\nEspecially in times of global upheaval – geopolitical, technological, social –\r\nautonomy, dependencies, and resilience must be reevaluated.\r\nNot as buzzwords, but as concrete system properties.\r\n\r\nThe session is aimed at:\r\n- Administrators, security engineers, CISOs\r\n- Architects, technical decision-makers\r\n- People from think tanks, regulation, and technology impact assessment",
    "schedule_start": "2025-12-29T23:00:00+01:00",
    "schedule_duration": "01:20:00",
    "schedule_end": "2025-12-30T00:20:00+01:00"
}