9–11 Apr 2024
Grandior Hotel
Europe/Prague timezone

Security Days Organisational Committee

Session

Security Products

10 Apr 2024, 13:30
Grandior Hotel

Grandior Hotel

Prague, Czechia

Conveners

Security Products: Session 4

  • Alf Moens

Description

In cybersecurity there are a lot of ideas and concepts for products and services but how does that work in the real world? What makes an product successful and when do you need to scale up or down? How do you implement, migrate and operate eduVPN across three universities, how can you train users for phishing and awareness regularly in an automated fashion and what new technologies can be used to improve cyber resilience.

Presentation materials

There are no materials yet.

  1. Joost Gadellaa
    10/04/2024, 13:30
    Presentation
    Presentation (25 minutes)

    In the realm of cybersecurity, the true test of any protective measure lies in its real-world performance. While institutions have to cover a broad range of possible attack vectors, an attacker only needs a few holes to attain their goals. At SURF, we are exploring how we can help the sector with red teaming and other types of resilience tests to asses their IT landscape from a hacker's...

    Go to contribution page
  2. Mr Markus Meschederu
    10/04/2024, 14:00
    Presentation
    Presentation (25 minutes)

    The Leibniz-Supercomputing Centre (Leibniz Rechenzentrum, LRZ) is the computing center of both Munich Universities of Excellence: Ludwig-Maximilians University and Technical University Munich and is a National Supercomputing Centre. The LRZ operates the Munich Scientific Network (MWN) for all universities and other research institutions in the greater area of Munich. MWN connects more than...

    Go to contribution page
  3. Martin Šebela (CESNET)
    10/04/2024, 14:30
    Presentation (25 minutes)

    At CESNET, we develop Phishingator software, which we use to train users in phishing and social engineering. Phishingator allows to prepare and automatically send phishing training emails to selected recipients on a defined date and time and then monitor users activities. Sent phishing emails contain a link to fraudulent training websites created in Phishingator. Users are automatically...

    Go to contribution page
Building timetable...