BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//6G IA - ECPv6.16.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:6G IA
X-ORIGINAL-URL:https://6g-ia.eu
X-WR-CALDESC:Events for 6G IA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Berlin
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20200329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20201025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20210328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20211031T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20220327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20221030T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20210906T120000
DTEND;TZID=Europe/Berlin:20210906T133000
DTSTAMP:20260520T192442
CREATED:20210831T104541Z
LAST-MODIFIED:20210831T104541Z
UID:16724-1630929600-1630935000@6g-ia.eu
SUMMARY:5GCroCo Lunchtime Webinar 8: SECURITY WITH MQTT V3.1.1
DESCRIPTION:Lunchtime Webinar Nr.8  \nWelcome to the 8th in a planned series of 5GCroco Lunchtime Webinars.  These webinars will address different aspects of the technical work of the 5GCroco project in detail with some time for questions and discussions on the work presented. \nAGENDA: \n\n\n5GCROCO: SECURITY WITH MQTT V3.1.1 \n\nMQTT stands for “Message Queuing Telemetry Transport”. This protocol was designed 1999 for machine-to-machine telemetry in low bandwidth environments for TCP/IP networks. \nMQTT started as a proprietary protocol\, it was released Royalty free in 2010 and became OASIS standard in 2014. MQTT was fast becoming one of the main protocols of IOT (internet of things) deployments. \nMQTT v3.1.1 is in Common Use\, the new version MQTT v5 has been approved in Jan 2018 and is currently in Limit use. \nThis web-seminar gives an overview of security threats and common vulnerability patterns of the MQTT v3.1.1 protocol if you don’t use today’s state-of-the-art security features of TCP/IP. \nThe web-seminar shows methods to put security into MQTT v3.1.1 protocol and pinpoints the advantages and disadvantages for each case that will be discussed. \nThe target audience of this web-seminar are developers with a good understanding of TCP/IP and MQTT-protocol. As preparation we suggest reading Section 4.5.2 of 5GCroCo Deliverable D3.2. \nSpeaker: Erik Wegscheider was engaged in military projects (DOD-STD-2167A) and was working most of the time for customers with attentions in data security (PII-data\, health data). \nHe has more than 25 years’ security experience with IT-Network architecture with deep Knowledge of IP protocols\, in particular with Firewalls and other security appliances. Erik has best practice with security in data centers and field experience as auditor for IT-Security-Audits. \nREGISTRATION: \n\n\n\nError: Contact form not found.
URL:https://6g-ia.eu/event/5gcroco-lunchtime-webinar-8/
END:VEVENT
END:VCALENDAR