This is joint presentation with Buherátor where we show the phenomenon of young hackers’ involvement in organized crime and reckless hacktivist groups and how they become victims. We also presented possible diversion and awareness techniques to prevent such IT crimes.
Lack of financial resources, emigration of experts. Just two examples of the most serious problems of Hungarian IT security market. In this presentation I analyzed the problems and potential solutions with Julianna Bozsó.
There is a frequent question with cloud services: can we trust in them? I presented at the conference those assurances that come from methodologies such as SAS 70/SSAE 16/ISAE 3402, Safe Harbor or PCI DSS.
In my PhD thesis I studied three topics. In the first chapter I developed a Common Criteria based Protection Profile toolkit for e-government applications. In the second chapter I analyzed the Common Criteria assurance requirements for development environment regarding the Hungarian regulations. In the third chapter I proposed some vulnerability assessment procedures for e-government applications.
Consumerization, cloud, mobility, social networks, cyberthreats. Five areas that influence the near future of IT security. In my presentation I examine the effects of these trends.
More and more standards and regulations require secure application development. In my presentation I summarize the requirements of widely used standards from developers. I also present the requirements of vulnerability assessment.
In my presentation I shared the principles and practical experiences of cyber warfare with the audience. All of this is to avoid tabloids, and to highlight the approach of military science.
Introduction to cloud computing, focusing on the basics and IT security.
The sudden proliferation of smart phones are a serious challenge for professionals responsible to the regulation and control of information security all over the world. In my lecture I reviewed the recommendations of ISACA in this area, and their extent of usability in practice. I gave an overview of audit support functionality of the market-leading solutions, and analyzed to what extent they support the implementation of the principles laid down by the ISACA.
A short discussion about cyber-terrorism and hacktivism and their relationship. In the presentation I analyzed the potential threat of cyberterror in Hungary.