With the rising demand for software and automated solutions, there also comes a high risk with it. Cyber Security is more important than ever before and therefore we have invited a bunch of professionals on this topic so they can share their knowledge with you. From ransomware and how to fight it to cloud security and IoT, you will gain insights into the most recent practices to make your project even better and much safer! Get ready to tune in for our WeAreDevelopers Live - Security Day!
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Save Your SpotTogether with BOSCH we invite you to a full day of learning more about the intersection of mobility and code. Get to know more about how modern mobility is defined by an intricate interplay of hardware and software and how cars are not only connected to the road, but also to the cloud.
Coding the Future of Mobility features a variety of talks and a workshop, that give you valuable insights into the world of mobility - wether you join in-person or online.
Together with Bosch we invite you to a full day of learning more about the intersection of mobility and code. Get to know more about how modern mobility is defined by an intricate interplay of hardware and software and how cars are not only connected to the road, but also to the cloud.
Coding the Future of Mobility features a variety of talks and a workshop, that give you valuable insights into the world of mobility - wether you join in-person or online.
Hackers attacking companies are “daily business” in every newspaper. In most cases the company is down for some hours or even days. For a company running critical infrastructure to serve the citizens of Munich, this scenario is a nightmare. How can this vital systems be protected against cyberattacks? What challenges do we face? Which developments do we expect in the future?
Let’s have a look and dive a bit into the world of Operational Technology.
After studying electrical power engineering at the Technical University Munich he had a variety of positions at the maintenance and project surrounding, including control systems project manager. Certified as Professional at Governance, Risk and Compliance in ISMS (IEC 27000) he’s active in the DSO Entity Cybersecurity Expert Group.
The Bosch Group is a leading global supplier of technology and services in the automotive sector. So get in and let me take you on a short road-trip through the current threat landscape. Let me show you how we pick up speed on vulnerability and incident management, put the brakes on emerging threats and put the pedal to the metal on new security features and solutions. New standards and regulations are popping up as traffic signs to lead the way, but there are many other challenges we have to navigate through with car manufacturers, such as holistic vehicle system security.
Davor completed his master’s degree at TU Vienna in telecommunications with focus on network security. Currently he is assessing security risks and working on security concepts for development projects at Bosch, conducting trainings and is part of the product vulnerability and incident management team for Bosch Engineering. So far, he has worked on security concepts for a wide range of products: from autonomous driving and e-mobility components, automotive gateways to motor sports. Previously, he also gathered experience as a software coordinator for security feature development.
No one wants their keys and secrets on GitHub, but one bad push can mean you are suddenly exposed. In the best-case scenario, you discover the issue and fix it before something bad happens, but in the worse case, you don’t find out until it is far too late.
Most devs are familiar with using .gitignore files to prevent Git from tracking specific files and folders, but did you know that you can leverage Git hooks and some open source awesomeness to keep you from accidentally committing your secrets in the first place?
If you are not actively using Git hooks in your workflows, then this talk is for you. Let's look into the .git folder and unlock a whole world of automation possibilities!
Dwayne has been working as a Developer Relations professional since 2015 and has been involved in tech communities since 2005. He loves sharing his knowledge, and he has done so by giving talks at over a hundred events worldwide. Dwayne currently lives in Chicago. Outside of tech, he loves karaoke, live music, and performing improv.
What if we could end data breaches for good? That possibility might be closer than you’d think with the adoption of Confidential Computing.
In this session, attendees will learn about Confidential Computing: encrypting data in use within a secure hardware environment called a Trusted Execution Environment (TEE).
We’ll cover why this technology matters, how it works, and deploy working demos of healthcare and fintech use cases. Attendees will leave with ideas of how they can leverage CC using open source software to protect their data.
Liz Moy is a Developer Advocate at Evervault, a platform that provides encryption infrastructure for developers. Previously she served on the Developer Evangelism team at Twilio, scaling an international team focused on hackathons and workshops for developers at Fortune 500 companies. Her software engineering origin story started writing Python at a company where she had a mouse for a boss. You can find her console logging her way through a demo or curled up with a book next to her fluffy tuxedo cat, Sanderson.
With the plans of increasing the number of reverse vending machines in Europe, it is relevant to take a look at the implemented security mechanisms of such vending machines [1,2]. Currently, in Austria, most stores provide such machines for the return of glass bottles, however, the government wants to also have an addition of vending machines for plastics. Security plays an important role with these machines, as they exchange the bottles for money and an insufficient security mechanism could allow attackers to practically print money. It is not uncommon for such machines to be targets of malicious actors. [3,4,5] We took a look at the vending machines present in most supermarkets in Vienna and figured out that some machines are not secured enough. In many cases, we found that the generated receipts – used at the cash register to be exchanged for money – are not secure enough. By analyzing several previously printed receipts, attackers can use an ESC printer to create forged receipts. Furthermore, we tested our attack with one store and were able to exchange our forged receipt for real goods. Our results show that this is not a single store that is improperly secured, but rather whole supermarket chains. This makes the vulnerability even more severe as, as far as we can tell, it affects whole supermarket chains that provide such reverse vending machines.
Jovan Zivanovic is a researcher at SBA Research. Jovan’s research focuses on web application security testing and in particular, on combinatorial testing. He has developed combinatorial testing approaches for SQLi in web applications.