IC ECCO - 2024

18 October 2024

Cybersecurity Practices

Building 3 TUM, 3-628

WHAT IS THE AIM OF THE WORKSHOP?

This workshop explores key cybersecurity challenges in decentralized applications, threat detection, and IoT systems. Sessions will cover smart contract vulnerabilities and mitigation methods, honeypot deployment for threat monitoring, and IoT security practices for protecting devices against common exploits. Participants will gain essential insights into advanced threat detection and security resilience techniques.ย 

Session chairman
Marius Dumitraศ™cu

Session Program

#SessionSpeakerTimeVenus
1Smart Contracts Vulnerabilities. A deep dive into smart contracts, exploring different kinds of vulnerabilities, analysing the discovery and the patching processes. Emil Cebotaros 09:00 Senior Cyber Security Analyst, CODWER
2Honeypots: A how to guide. A practical guide on setting up honeypots for cybersecurity, detailing the steps for deployment, configuration, and effective monitoring to identify and analyze cyber threats. Ciprian Zariciuc 9:30CSIRT Engineer, ASC
3Exploitation techniques in IoT. IoT vulnerabilities like weak authentication, insecure firmware, and poor encryption. How attackers exploit these weaknesses to gain control or access networks and best practices for securing IoT devices, including strong authentication and secure firmwareโ€ฏupdates. Alexandru Tocan 10:30Software Engineer, CODWER