Next Monday 17th the last session of the Docker Security Guidelines Web Seminar will be held. Registration are now open.

Abstract:

Container technologies have seen a rise in popularity in recent years. They provide a convenient way of packaging applications for deployment in production and offer lightweight alternatives to virtual machines (VMs). However, containers do not offer the same security benefits as VMs and - from a security perspective - many things can be done wrong when developing and running containerized workloads.

This web-seminar gives an overview of security threats and common vulnerability patterns related to designing, developing, and deploying docker containers. The focus are the most common docker vulnerability patterns, as seen "in the wild" from the experience of security assessments and based on security best practices. Insecure practices, potential misconfigurations and common pitfalls related to the building of docker images, containers at runtime, and the host environment are covered. For every issue, secure solutions, available protection mechanisms, as well as examples are provided.

The target audience of this web-seminar are developers with a basic understanding of docker who want and need to ensure they build and run containerized workloads in a secure manner. Only issues to docker and docker-compose are covered. More complex container orchestration tools, such as Kubernetes or OpenShift, are out of scope. As preparation we suggest reading Section 4.5.3 of 5GCroCo Deliverable D3.2

Speaker bio:

Fabian Würfl works as Security Consultant at SEC Consult. His main areas of work are web application pen tests, network security assessments and Docker/Kubernetes/OpenShift security assessments. He regularly holds secure coding trainings for developers and works on internal software development projects.

 

REGISTRATION

NEW DATES!

Next Monday 10th of May a new Web Seminar on Docker Security will be held. The seminar is divided in two sessions of 2 hours, starting at 12:00 CE.

Abstract:

Container technologies have seen a rise in popularity in recent years. They provide a convenient way of packaging applications for deployment in production and offer lightweight alternatives to virtual machines (VMs). However, containers do not offer the same security benefits as VMs and - from a security perspective - many things can be done wrong when developing and running containerized workloads.

This web-seminar gives an overview of security threats and common vulnerability patterns related to designing, developing, and deploying docker containers. The focus are the most common docker vulnerability patterns, as seen "in the wild" from the experience of security assessments and based on security best practices. Insecure practices, potential misconfigurations and common pitfalls related to the building of docker images, containers at runtime, and the host environment are covered. For every issue, secure solutions, available protection mechanisms, as well as examples are provided.

The target audience of this web-seminar are developers with a basic understanding of docker who want and need to ensure they build and run containerized workloads in a secure manner. Only issues to docker and docker-compose are covered. More complex container orchestration tools, such as Kubernetes or OpenShift, are out of scope. As preparation we suggest reading Section 4.5.3 of 5GCroCo Deliverable D3.2

 

Speaker bio:

Fabian Würfl works as Security Consultant at SEC Consult. His main areas of work are web application pen tests, network security assessments and Docker/Kubernetes/OpenShift security assessments. He regularly holds secure coding trainings for developers and works on internal software development projects.

 

REGISTRATION

Next 5GCroCo Web-Seminar on Challenges and Solutions for V2X Interoperability will be held next Monday 12 of April 2021. Registration here.

 

Abstract:

Section 3.3.5 of the recently published 5GCroCo Deliverable D3.1 on "Final Application Architecture" explains the challenges and solutions for interoperability around the Anticipated Cooperative Collision Avoidance (ACCA) use case. This use case serves as example to uncover challenges if information, in this case hazard warnings, must be shared between different automotive OEMs and between OEMs and different Road Traffic Authorities (RTAs).

“Standardization” is often considered necessary in this context. This presentation introduces the current and near-future eco-system of information sharing for connected vehicles. It describes how different solutions, beyond everyone just following the same standard, can be used to achieve service-level interoperability among different ITS systems and stakeholders. For each solution, involved stakeholders are identified and their respective effort to establish and maintain (evolve / upgrade) the interoperability solution.

Spekar Bio:

Maciej Muehleisen received his PhD on “Voice over LTE” from RWTH Aachen University in 2015 and worked as a group leader for vehicular communication at Hamburg University of Technology (TUHH) from 2012 until 2016 focusing on highly reliable aircraft and maritime networks.

He is with Ericsson Research since 2017 and leads the architecture work package of the EU funded 5GCroCo projects on 5G for CCAM in cross-border environments. where he also serves as deputy Technical Coordinator. As “Industry Verticals Coordination” in the Research Area “Networks” he is furthermore supporting the technical coordination of Ericsson’s efforts in the Automotive Edge Computing Association (AECC) and 5G Automotive Association (5GAA).

His key research interest is in end-to-end design, evaluation, and approval of safety critical communication services. 

REGISTRATION

Next 5GCroCo Web-Seminar on Cross-border/- MNO Handover Architecture and Trial Results  will be held next Mondays 19 April 2021.

 

Abstract:

Cooperative, Connected and Automated Mobility (CCAM) will enrich assisted and automated driving by exchange of information among vehicles (V2V), as well as between vehicles and the network, commonly also called ”cloud” or ”backend”, (V2N). CCAM services should not be interrupted when crossing a country border and with that also switching between different Mobile Network Operators (MNOs).

This webinar will present the 3GPP-complient network architecture applied in the 5GCroCo project to achieve cross-border / MNO (Inter-PLMN) handover. Furthermore, first results and experience from trials will be presented and discussed.

Spekar Bio:

Maciej Muehleisen received his PhD on “Voice over LTE” from RWTH Aachen University in 2015 and worked as a group leader for vehicular communication at Hamburg University of Technology (TUHH) from 2012 until 2016 focusing on highly reliable aircraft and maritime networks.

He is with Ericsson Research since 2017 and leads the architecture work package of the EU funded 5GCroCo projects on 5G for CCAM in cross-border environments. where he also serves as deputy Technical Coordinator. As “Industry Verticals Coordination” in the Research Area “Networks” he is furthermore supporting the technical coordination of Ericsson’s efforts in the Automotive Edge Computing Association (AECC) and 5G Automotive Association (5GAA).

His key research interest is in end-to-end design, evaluation, and approval of safety critical communication services. 

 

REGISTRATION

Next Monday 29th of  March 2021 at 12:00 CE it will be launched  the 5GCroCo Web-Seminars Series starting with " Result Confidence Assessment and Trial Planning: Experience from 5GCroCo", presented by Dr Maciej Muehleisen (ERICSSON)You can register here.

Result Confidence Assessment and Trial Planning: Experience from 5GCroCo - Monday 29th March 2021 (12:00 -13:30 CE)

Abstract:

This webinar will cover the following topics based on experience from trials conducted in the 5GCroCo project and analysis of obtained results:

  • Plan trials to obtain the required number of result samples
  • Tweak applications to allow faster trials still providing realistic KPIs
  • Result analysis with different methods to determine confidence for different kinds of statistics:
    • Sanity checking
    • Batch Means method for Student-t Confidence Intervals
    • Binomial Proportion Confidence Intervals for simple estimation of confidence of statistical distributions (e.g. latency CCDFs)
    • Limited Relative Error (LRE) Algorithm for statistical distribution confidence (e.g. latency CCDFs)

As preparation we suggest reading Section 3.1 of 5GCroCo Deliverable D4.2 on "First Phase Trial Execution Report and Analysis of 5GCroCo KPIs"

 

Speaker Bio:

Maciej Muehleisen received his PhD on “Voice over LTE” from RWTH Aachen University in 2015 and worked as a group leader for vehicular communication at Hamburg University of Technology (TUHH) from 2012 until 2016 focusing on highly reliable aircraft and maritime networks.

He is with Ericsson Research since 2017 and leads the architecture work package of the EU funded 5GCroCo projects on 5G for CCAM in cross-border environments. where he also serves as deputy Technical Coordinator. As “Industry Verticals Coordination” in the Research Area “Networks” he is furthermore supporting the technical coordination of Ericsson’s efforts in the Automotive Edge Computing Association (AECC) and 5G Automotive Association (5GAA).

His key research interest is in end-to-end design, evaluation, and approval of safety critical communication services. 

REGISTRATION

 

­
We use cookies to facilitate navigation and improve your experience across our website. By clicking "Accept", you will be storing these cookies.