BACK

IT SECURITY WORKSHOPS – SECURI-TEA 🫖

We’re kicking off 2022 with a new event about IT security! Our guide and “in-house” expert will be Andi Polereczki! 

We’re happy when someone chooses us, because of the similarity of the values we share. This is the case with Andrea, who found KAPTÁR to be the seat of her business. 

Teamworker, negotiator, and experienced IT-Security Officer, a voluntary teacher of the international “Safer Internet Project” coordinated by the International Children’s Safety Service. A former military ITC (NATO S6) leader, a regular sportsman, and a big fan of TRX and Hand Pan. A dedicated environmentalist, and a “geocaching expert”.

You can join for the events with a daily ticket or with a community membership too: 

 

23th of February, Wednesday, 5pm

The Cloud Security Alliance defines the shared responsibility models as internal security teams owning apps, data, containers, and workloads in the cloud while the cloud service providers (CSPs) take on the physical security of the cloud infrastructure. Ensuring the integrity and security of the cloud is a two-party responsibility. More often than not, customers understand what’s expected of CSPs, but confusion grows in the varying security requirements between infrastructure, platform, and software cloud environments.

30th of March, Wednesday, 5pm

Keeping businesses cyber-secure is even more critical from the beginning for every company. Businesses are responsible for their data leaks or breaches if the correct security protections/protocols have not been put in place. In addition, hefty regulatory fines can be levied, and costly lawsuits can follow for a cyber-attack or security breach victims. Therefore, we have to check regularly our security posture according to the regulations and new technologic trends.

27th of April, Wednesday, 5pm

If you want a simple DevSecOps definition, it is short for development, security, and operations. Its mantra is to make everyone accountable for security with the objective of implementing security decisions and actions at the same scale and speed as development and operations decisions and actions. But is it true? Could security hold the same speed as development? DevSecOps ensures security considerations are embedded in every decision. It entails thinking through infrastructure, database, and application security from the get-go.

25th of May, Wednesday, 5pm

Today, we are seeing the rise of the Internet of Things or IoT. Billions of devices are increasingly connected to the Internet and sharing the information and data they collect. These could be simple devices like a thermostat or a light bulb or more complex devices like small file-sharing devices (NAS), CCTV cameras and printers. We will take a trip around the security settings of all of these devices to make a more secure environment for Our work.

29th of June, Wednesday, 5pm

Developed by John Kindervag in 2010 while a principal analyst at Forrester Research, a zero-trust architecture is a broad framework that promises effective protection of an organization’s most valuable assets. It works by assuming that every connection and endpoint is considered a threat. The framework protects against these threats, whether external or internal, even for those connections already inside.

Tetszett? ...Akkor ne felejtsd el megosztani 🙂