BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//6G IA - ECPv6.16.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:6G IA
X-ORIGINAL-URL:https://6g-ia.eu
X-WR-CALDESC:Events for 6G IA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Berlin
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20200329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20201025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20210328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20211031T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20220327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20221030T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20210517T120000
DTEND;TZID=Europe/Berlin:20210517T133000
DTSTAMP:20260522T101356
CREATED:20210423T095818Z
LAST-MODIFIED:20210423T095818Z
UID:16702-1621252800-1621258200@6g-ia.eu
SUMMARY:5GCroCo Lunchtime Webinar 5: Security Guideline for MQTT Protocol
DESCRIPTION:Lunchtime Webinar Nr.5  \nWelcome to the 5th in a planned series of 5GCroco Lunchtime Webinars.  These webinars will address different aspects of the technical work of the 5GCroco project in detail with some time for questions and discussions on the work presented. \nAGENDA: \n Security Guideline for MQTT Protocol \nSection 4.5.2 “Security Guideline for MQTT Protocol” of the recently published 5GCroCo Deliverable D3.2 on “Intermediate E2E\, MEC & Positioning Architecture” describes ways to put security into the “publish/subsribe messaging protocol”\, that was designed 1999 for machine to machine telemetry in low bandwidth environments for TCP/IP networks. \nMQTT started as a proprietary protocol\, it was released royalty free in 2010 and became OASIS standard in 2014. MQTT stands for Message Queuing Telemetry Transport and was fast becoming one of the main protocols of IOT (internet of things) deployments. MQTT v3.1.1 is in common use\, the new version MQTT v5 has been approved in Jan 1018 and is currently in limited use. \nThe presentation shows methods to put security into MQTT v3.1.1 protocol and pinpoints the advantages and disadvantages for each case that is pictured. \nAs preparation we suggest reading Section 4.5.2 of 5GCroCo Deliverable D3.2 on https://5gcroco.eu/images/templates/rsvario/images/5GCroCo_D3_2.pdf \nSPEAKER: \nErik Wegscheider was engaged in military projects (DOD-STD-2167A) and was working most of the time for customers with attentions in data security (PII-data\, health data). \nHe has more than 25 years’ security experience with IT-Network architecture with deep Knowledge of IP (LAN- and WAN-protocols)\, in particular with Firewalls and security appliances\, best practice with security in data centers and some years field experience as auditor for IT-Security-Audits. \nHe has successfully completed a lot of certifications\, such as from Cisco (Firewalls\, Router\, Switches)\, Microsoft (MCP\, MCSA\, MCSE) and the Practitioner Certificate Information Assurance Architecture (PCiIAA). \nREGISTRATION: \nError: Contact form not found.
URL:https://6g-ia.eu/event/5gcroco-lunchtime-webinar-5/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20210517T120000
DTEND;TZID=Europe/Berlin:20210517T140000
DTSTAMP:20260522T101356
CREATED:20210423T094426Z
LAST-MODIFIED:20210423T094426Z
UID:19912-1621252800-1621260000@6g-ia.eu
SUMMARY:5GCroCo Lunchtime Webinar 4-2: Docker Security Part 2
DESCRIPTION:Lunchtime Webinar Nr.4-2  \nWelcome to the second part of the 4th in a planned series of 5GCroco Lunchtime Webinars.  These webinars will address different aspects of the technical work of the 5GCroco project in detail with some time for questions and discussions on the work presented. \nAGENDA: \nSecurity Guideline for Docker  \nContainer technologies have seen a rise in popularity in recent years. They provide a convenient way of packaging applications for deployment in production and offer lightweight alternatives to virtual machines (VMs). However\, containers do not offer the same security benefits as VMs and – from a security perspective – many things can be done wrong when developing and running containerized workloads. \nThis web-seminar gives an overview of security threats and common vulnerability patterns related to designing\, developing\, and deploying docker containers. The focus are the most common docker vulnerability patterns\, as seen “in the wild” from the experience of security assessments and based on security best practices. Insecure practices\, potential misconfigurations and common pitfalls related to the building of docker images\, containers at runtime\, and the host environment are covered. For every issue\, secure solutions\, available protection mechanisms\, as well as examples are provided. \nThe target audience of this web-seminar are developers with a basic understanding of docker who want and need to ensure they build and run containerized workloads in a secure manner. Only issues to docker and docker-compose are covered. More complex container orchestration tools\, such as Kubernetes or OpenShift\, are out of scope. \n**Note** This web-seminar is split into two parts. This second part continues where the first part (presented on the 10th May) leaves off . \nAs preparation we suggest reading Section 4.5.3 of 5GCroCo Deliverable D3.2 on https://5gcroco.eu/images/templates/rsvario/images/5GCroCo_D3_2.pdf \nSPEAKER: \nFabian Würfl works as Security Consultant at SEC Consult. His main areas of work are web application pen tests\, network security assessments and Docker/Kubernetes/OpenShift security assessments. He regularly holds secure coding trainings for developers and works on internal software development projects. \nREGISTRATION: \nError: Contact form not found.
URL:https://6g-ia.eu/event/5gcroco-lunchtime-webinar-4-2/
END:VEVENT
END:VCALENDAR