It was great to participate in the Ditact women’s IT studies (Aug 20 – Sept 1, 2018) in Salzburg. Both as a lecturer and as a participant. 208 female participants were able to choose from more than 50 course offers. It could be chosen from the modules: Data Protection, IT Security and Privacy, Machine Learning, Web and Introduction to Computer Science and many more.
I addition there were a lot of interesting lunch lectures, e.g. „Medicine meets Artificial Intelligence ‑ Neural Networks & Smarter Diagnosis“ held by Dr. Jana Kemnitz.
With my lecture: “Is the password dead? Safe authentication methods” I hit the nerve of the time. In everyday life, as well as in business life, secure authentication procedures become more and more urgent. But the users are largely left to their own devices to ensure that everything is safe. I gave an overview of the currently available authentication methods and a country comparison between Sweden, Austria and Germany. Because of the abundance of my facts, many practical tests of multiple factor authentication, and the urgency of the topic, I would like to extend my lecture to a whole course day next year.
Instead of course materials I designed a website (http://ccc.ziske.de). For that I’ve quickly taught myself WordPress. I was very happy to be able to deepen my knowledge in the course <Wordpress compact> to be better prepared for the next work on this website.
During the opening event, the keynote and subsequent panel discussion were about identifying ways to get more women interested in IT, and how mono-educational computer science programs favored the influx. In sum, the overall picture of the discussion and contributions showed that women’s degree programs in IT and computer science study courses still make sense.
The ECCWS2018 held in Oslo was a great event, two days full of interesting subjects.
After the keynotes the conference split into many interesting topics as: Cross-discipline Research, Recent trends in Multimedia Security and Forensics, Networks issues, Mobile Technology, Hackers and Cyber Coercion, Ontologies and Theory Building, IACS-based Critical Infrastructures, Legal Issues, Digital Forensics, Understanding Cyber Events, Cyber Warfare and Cyber Issues as well as Practical Applications and Cyber Security for Internet of Things. The PhD Colloquium made up a large part with many interesting topics. In sum 77 presentations were held by people coming from about 20 countries.
We succeeded in getting across our ideas about “Get ahead of Coming Disruptions in Cyber Security by working Collaboratively“ in the space of 20 minutes. Our presentation was based on an online demo of our app “Scrambled Secrets”. Which was unique because most people dare not fail in a demo.
We are very proud that our topics has been published in the conference materials. It is our first academic publication!!!
Proceedings of the 17th Conference on Cyberwarfare and Security, University of Oslo, Norway, 28-29 June 2018
Please download the paper:
Get ahead Coming Disruptions in Cyber Security by Working Collaboratively
The next event, the 18th European Conference on Cyber Warfare and Security is taking place on 4‑5 July 2019 at the University of Coimbra. Maybe we would like to participate again with new ideas.
Our abstract entitled: ‘’Get ahead Coming Disruptions in Cyber Security by Working Collaboratively’’ has been selected as a contribution to the 17th European Conference on Cyber Warfare and Security (ECCWS) 2018.
We are looking forward to demonstrating our thinking regarding Collaborative Security and PassSpace by showing ONLINE how multiple instances together authenticate access to sensitive data using different platforms and different tools.
Come and see us in Oslo
Together with over 900 participants we attended the Sweden game conference in Skövde between October 18-20.
We got insight to the game developing business and which problems it faces.
In the expo area we experienced the newest gaming technology and ideas. The variety of the games to test was wide, from mystery games to VR-games.
The games were great, and it didn’t matter if they were developed by veterans in the business or by new comers.
Even if game development and IT security don’t deal with the same topic we can learn from this business how a good user interface can look like.
During our stay in Washington and Pittsburgh from 11 to November 21 we have collected many valuable information and impressions.
About 11 companies of the German cybertechnology and security industry took part in the business trip to Washington and Pittsburgh to meet potential partners.
The start was a one-day symposium. During the next days, we have met many companies and could make many contacts.
We could present our app to the Password Guru Professor Lujo Bauer. We are looking forward to the detailed feedback.
Pittsburgh as the Secret Capital of Cyber and Internet security on the US East coast was worth the trip. The visits at the CyLAB (NSA) at Carnegie Mellon University and the Cyber Forensics Training Alliance were very interesting.
Very impressive was the inspiring presentation of the work of the UPCM Information Security team and the problems it is faced with.
Additional we made our first experiences with the app UBER. We are eager to see when the first taxis will really become driverless in Pittsburgh.
Unfortunately, we didn’t get the chance to visit the NSA in Fort Meade.
Instead we were given the possibility to meet representatives of the Computer Security Division of NIST.
The German Federal Ministry for Economic Affairs and Energy (BMWi), AHP International and the German American Chamber of Commerce, Pittsburgh Chapter, have organized a delegation of German cybersecurity companies for the collaboration with and business development in the United States from November 13 to November 18, 2016.
See us at the German –American Cooperation Forum on Cybersecurity Trends and Solutions,
When: 14th November 2016
Where: Pittsburgh, Carnegie Mellon University
Click here for more information.
We are presenting: 8 Agents i a Pass Space – Scramble Your Secrets.
Are you curious?
Click here for a 3-minutes-preview!
Click here for a little longer version with a higher resolution!
November 3, 2015 – time again! The Nordic IT Security Forum opened its doors again, this time at Stockholmsmässan and with a TeleTrust Partner Booth!!!
64 Speakers, 45 Exhibitor and 614 Delegates took part in this event. The event is growing bigger year after year.
This year we put the focus on the demonstration of the App Scrambled Secrets which is visualizing the Multi-Instance-Mode. That means how several instances could collaborate to improve authentication.
We met many interested people in our booth.
Hopefully we will come back next year together with much more German companies standing together in the TeleTrust Partner Booth.
Our demo was followed by the audience with great interest and was awarded with a big applause.
We hope that we were able to convey our ideas on the subject of
Collaborated Security versus Keyhole Security / Multi-Instance-Authentication versus Multi-Factor-Authentication / Scrambled Secrets versus Security through Obscurity
in a convincing manner.
See the video clip of our live demo!
At the Cyber Security Challenge Germany Conference we are going to present for the first time:
“Tutorial on Collaborated Security – 8 Agents in a Pass Space: how to overcome the defensive strategy of building taller walls and digging deeper moats?“
The Keyhole-security has to be gradual transferred into the world of collaborated security and diversification.
Movie clips illustrate how „hacked“ identification and authentication in well-known movies is presented.
What about 8 agents in a Pass Space? A live demo is lifting the veil !
We won ’t show how to hack something rather we are going to demonstrate how several agents jointly perform authentication and how the access to „sensitive goods“ of young people (Photos, app-in-purchases, access to social media platforms) could be made safer.
Additionally following aspects will be discussed: Multi Instance Authentication vs. Multifactor Authentication, Pass Space & Entropy, Scrambled Secrets -Encryption by Scrambling.
When: 16. September 2015
Where: Humboldt Carré am Gendarmenmarkt, Berlin
Im Rahmen der Cyber Security Challenge Germany Konferenz werden wir erstmalig vorstellen:
“Tutorial zur Collaborated Security – 8 Agenten in einem Pass Space: Wie kann die defensive Strategie der immer höheren Burgmauern und tieferen Gräben überwunden werden?”
Eine Überwindung der Keyhole-Security durch die schrittweise Überführung in eine Welt der Collaborated Security (Sicherheit durch Zusammenarbeit) und Diversifikation ist notwendig.
Videoclips illustrieren, wie “gehackte” Identifizierung und Authentifizierung in bekannten Filmen dargestellt wird.
Eine Live-Demo lüftet den Schleier, der über den 8 Agenten in einem Pass Space liegt.
Demonstriert wird: nicht wie man etwas hackt, sondern wie mehrere Agenten bzw. Instanzen gemeinsam eine Authentifizierung durchführen und wie man den Zugang zu “schützenswerten Gütern” eines Jugendlichen (Fotos, App-In-Einkäufe, Zugang zu Social Media Plattformen) sicherer machen kann.
Parallel werden folgende Aspekte diskutiert: Multi Instance Authentifizierung vs. Multifaktor Authentifizierung, Pass Space & Entropie, Scrambled Secrets -Verschlüsselung durch Vermischung.
Wann: 16. September 2015
Wo: Humboldt Carré am Gendarmenmarkt, Berlin