Archive for the talk Category

Abstract:
IoT completely changes our way of live. Fridges know about its contents and help keeping your food storage up to date. Cars or machines know about the abrasion of their parts and are able to order the new part in time and contact your service. Everything will be connected everywhere – you’re able to control your lights and heating at home from where ever you are. Your home or system is always connected to the Internet. For this reason it’s very important to know about the enemies and threats which result about everything is connected everywhere at any time.

Currently a lot of embedded and low cost systems designed for IoT are low hanging fruits for many attacks. The challenge will be to implement security and safety into the SDLC for IoT systems and applications. IT security becomes more an more an important part for IoT applications and systems.

This talk indicates problems we need to address in development of applications for IoT to make them secure against common hacking attacks. It is necessary to evaluate the applicability of the Security Development Life Cycle for rapid prototyping. The goal are IoT applications which fulfill their requirements, are handy and smart and secure. This talk will introduce potential methodologies and tools to achieve this.

Bio:
Christopher Scheuring has 8 years experience as a software developer and architect for embedded systems, automation software and web applications. Since 2010 he worked as security expert, architect, auditor and penetration tester at several projects (web applications, multi tier, car-it, mobile and ICS) for a German car manufacturer. He’s giving lectures on web engineering and IT security at the University of Corporate Education Mosbach, Germany.

Abstract:
The “Moscow Rules” were never officially published but they seem like a reasonable set of behaviors that would help an operative stay alive in hostile territory. Looking at the way things have turned online I believe it’s a good time to remember these and adapt them to our approach to cyber security.

Bio:
Alper Basaran studied Banking an Finance at the university and holds a MBA degree. He has worked in the field of information security in various companies providing information security solutions and telecom operators. He currently works as an information security consultant to government agencies and military commands in Turkey.

Abstract:
The presentation will cover the journey that we have taken to develop the USB armory board from scratch, explaining the lessons learned and its prospected applications.

Inverse Path recently introduced the USB armory project, an open source hardware design, implementing a flash drive sized computer for security applications. The USB armory is a compact USB powered device that provides a platform for developing and running a variety of applications.

The security features of the USB armory System on a Chip (SoC), combined with the openness of the board design, empower developers and users with a fully customizable USB trusted device for open and innovative personal security applications.

The presentation will cover the journey that we have taken to develop the USB armory board from scratch, explaining the lessons learned and its prospected applications.

Presenter: Andrea Barisani