Jul
08
2021
Free Scademy webinars only this Summer
This summer, we invite you all to a free Scademy webinars: Modern IT Security & You and Hidden secrets behind device identification security chips.The webinars will be conducted by experienced trainers Dániel Szpisják and Zoltán Hornák.
Modern IT Security & You 21.07.2021 12:00-13:00:
Let's take a look at some recent security events and the vulnerabilities causing them. As a developer you have the power and the responsibility to thwart such attacks. We'll help you connect the dots behind the scenes and show you some techniques to defend your services.
Learning outcomes: Participants will be able to define some modern IT Security events, identify the vulnerabilities behind them and come up with common defense mechanisms..
About trainer Dániel Szpisják: We are surrounded by complex systems both in our everyday lives and at work, and these systems always have flaws. I have been looking for flaws like this ever since I can remember, and luckily, constantly searching for mistakes is not just myjob but also my hobby. This is a way of thinking for me, making it easier for me to tune into how hackers work and find possible vulnerabilities before an actual attack occurs. However, this wouIdn’t be enough to pass on my knowledge. I have an extraordinary trust in knowledge sharing, continuous learning, and development. To my great delight, I can awaken the motivation in participants to become secure coders. This area is totally unique, and I believe that the more developers who take security seriously, the better society and communities will work.
Register for free: https://webinar.freshmail.pl/896-662-464
Hidden secrets behind device identification security chips 11.08.2021 12:00-13:00
In several industries, including automotive, the unique and cryptographic identification of IT devices is mandatory. Various Hardware Security Module (HSM) solutions have been developed for this purpose. Currently, version 2.0 of the Trusted Platform Module (TPM) specified by the Trusted Computing Group (TCG) is one of the most widely used standards. Programming these security chips requires special attention; however, even in cases with awareness, some details could remain untreated.
This presentation reveals some hidden secrets behind the scenes.
About trainer Zoltán Hornák: Research & development and getting to know the unknown have always fascinated me. If we look back at the evolution of mankind, we can see that most people have not really made lasting contributions to the advancement of our world, our present or our future. Without a narrow group of researchers, scientists and explorers, we would be living the same way people lived a hundred or a thousand years ago. I am also driven by this inner fire. To be among those who are actively involved in shaping the future. The field of security technology itself has been attractive to me from the very beginning due to the technical tasks to be solved. And it turned out that the biggest challenge in this area was how to reverse the rapidly deteriorating state of cybersecurity. I believe that one of the building blocks of the solution is to train software developers to write more secure programs. I want to help make the world a better place by reversing the deteriorating trend in cybersecurity.