Cyber Risks – from abstract risk to everyday reality

The Europa Institut at the University of Zurich (EIZ) is one of the leading centres of expertise for European Law and is an important provider of advanced legal training in Switzerland. The EIZ will organize a seminar on "ICT - Law and Practice" in autumn 2019.

 

Under the direction of Dr. Rolf Auf der Maur and Dr. Peter Neuenschwander, the seminar will deal with the possible consequences of data loss and misuse. What are the legal obligations? Which options for action are available?

 

Extract form the programme (German-speaking): 

  • Global cyber threats
  • Cyber crime and reputation
  • Cyber risiks in the cross-hairs of legal requirements
  • Responsibility of administrative board and management
  • Insurance of cyber risks
  • Compass co-founder Ivan Bütler will show how easily hackers can bypass security measures. His presentation will raise the awareness of ICT security aspects.

 

Date Tuesday, September 10, 2019

Venue: Lake Side, Bellerivestrasse 170, 8008 Zurich

Target audience: Lawyers, corporate lawyers, government representatives and interested specialists in the fields of IT, digital business models, telecommunications and online platforms

 

For more information about this seminar please visit the EIZ website: www.eiz.uzh.ch

NEWS

So leicht wird dein Handy gehackt

Die Blick-Reporterin weiss dank Ivan Bütler, warum man auch bei einer SMS von Mami kritisch sein soll. Read more

Rückblick Digitaltag 2019

Ivan Bütler von Compass Security hat einen aufregenden Digitaltag hinter sich. Seine Live Hacks am Züricher Hauptbahnhof waren ein Publikumsmagnet. Read more

Wie steht es um die Sicherheit der Schweizer Stromversorgung?

Im Bericht der Eidgenössischen Elektrizitätskommision kommt die Schweizer Stromversorgung diesbezüglich nicht gut weg. Studerus AG hat dazu Cyrill... Read more

ARCHIVES

Compass Security Blog

enOcean Security

In this post, we are going to take a closer look at the enOcean technology, how security is implemented, and if the security measures and options available are sufficient. mehr

Privilege escalation in Windows Domains (3/3)

In this last article about privilege escalation in Windows domains, we demonstrate how to extract credentials from running systems to compromise high-privileged accounts. mehr

ZUM BLOG