IC ECCO - 2024
18 October 2024
Cybersecurity Practices
Building 3 TUM, 3-628
WHAT IS THE AIM OF THE WORKSHOP?
This workshop explores key cybersecurity challenges in decentralized applications, threat detection, and IoT systems. Sessions will cover smart contract vulnerabilities and mitigation methods, honeypot deployment for threat monitoring, and IoT security practices for protecting devices against common exploits. Participants will gain essential insights into advanced threat detection and security resilience techniques.ย
Session chairman
Marius Dumitraศcu
Session Program
# | Session | Speaker | Time | Venus |
---|---|---|---|---|
1 | Smart Contracts Vulnerabilities. A deep dive into smart contracts, exploring different kinds of vulnerabilities, analysing the discovery and the patching processes. | Emil Cebotaros | 09:00 | Senior Cyber Security Analyst, CODWER |
2 | Honeypots: A how to guide. A practical guide on setting up honeypots for cybersecurity, detailing the steps for deployment, configuration, and effective monitoring to identify and analyze cyber threats. | Ciprian Zariciuc | 9:30 | CSIRT Engineer, ASC |
3 | Exploitation techniques in IoT. IoT vulnerabilities like weak authentication, insecure firmware, and poor encryption. How attackers exploit these weaknesses to gain control or access networks and best practices for securing IoT devices, including strong authentication and secure firmwareโฏupdates. | Alexandru Tocan | 10:30 | Software Engineer, CODWER |