Cyber Risks – from abstract risk to everyday reality

The Europa Institut at the University of Zurich (EIZ) is one of the leading centres of expertise for European Law and is an important provider of advanced legal training in Switzerland. The EIZ will organize a seminar on "ICT - Law and Practice" in autumn 2019.

 

Under the direction of Dr. Rolf Auf der Maur and Dr. Peter Neuenschwander, the seminar will deal with the possible consequences of data loss and misuse. What are the legal obligations? Which options for action are available?

 

Extract form the programme (German-speaking): 

  • Global cyber threats
  • Cyber crime and reputation
  • Cyber risiks in the cross-hairs of legal requirements
  • Responsibility of administrative board and management
  • Insurance of cyber risks
  • Compass co-founder Ivan Bütler will show how easily hackers can bypass security measures. His presentation will raise the awareness of ICT security aspects.

 

Date Tuesday, September 10, 2019

Venue: Lake Side, Bellerivestrasse 170, 8008 Zurich

Target audience: Lawyers, corporate lawyers, government representatives and interested specialists in the fields of IT, digital business models, telecommunications and online platforms

 

For more information about this seminar please visit the EIZ website: www.eiz.uzh.ch

NEWS

Vulnerability in Mailster

Thierry Viaccoz identified an XSS vulnerability in Mailster (email newsletter plugin for WordPress). Read more

Secure Payments on th Internet

More and more goods and services are bought and paid on the internet. Ivan Bütler summarizes security relevant information on online shopping and... Read more

Vulnerability in Froala WYSIWYG HTML Editor

Security Analyst Emanuel Duss identified a DOM XSS vulnerability in the Froala WYSIWYG HTML Editor Read more

ARCHIVES

Compass Security Blog

Yet Another Froala 0-Day XSS

Compass found a DOM-based cross-site scripting (XSS) in the Froala WYSIWYG HTML Editor. HTML code in the editor is not correctly sanitized when inserted into the DOM. This allows an attacker that can... mehr

Relaying NTLM authentication over RPC

Since a few years, we - as pentesters - (and probably bad guys as well) make use of NTLM relaying a lot for privilege escalation in Windows networks. In this article, we propose adding support for... mehr

ZUM BLOG