We have a variety of “Open Port” events during which renowned cyber security experts will come to ETH to discuss their field's current state with a small group of students.
In cyber security, an “Open Port” is an integral part of internet communication. Similarly, our Open Port events are there to communicate, connect and learn from each other. These events are an excellent opportunity for ETH students to gain an insight into the industry and public services. Additionally, in good ETH fashion, there will be an apero after most of our events. In particular circumstances, Open Ports are held virtually in highly interactive settings to the delight of speakers and students alike.
Do you have valuable insights in current cyber security topics and want to share them with a small group of students? We are always looking for cyber security experts who will take a speaker's role at our events. As a speaker you will benefit from an interested and engaged audience.
Get in touch with us! We will be delighted to discuss with you how to bring your cyber experience to ETH.
Join us for "Cyber Security Governance in Global Operations", a unique event with Huawei Switzerland exploring best practices in managing risk and compliance within global organizations. Designed for students eager to see the bigger picture, this session goes beyond technical details to focus on strategic insights and governance challenges in cybersecurity. You will gain valuable knowledge to understand how top organizations navigate complex security landscapes.
We invite you to an exclusive workshop to explore the role of Large Language Models (LLMs) in cybersecurity, where you'll collaborate with industry experts from Julius Baer to address key challenges in applying LLMs to cybersecurity standards, regulations, and policies while evaluating their potential to support architects, information security officers, and application owners in meeting evolving regulatory demands.
In this interactive workshop, you'll delve into the world of LLMs and discover how these advanced language models can be leveraged to enhance compliance and risk management within the financial services sector. You'll work alongside experienced professionals to assess the capabilities and limitations of LLMs in addressing specific pain points related to regulatory compliance, such as data protection, anti-money laundering, and more. By working together, we'll develop creative solutions to overcome these challenges and unlock the full potential of LLMs in enhancing our collective cybersecurity posture.
By joining this workshop, you'll gain:
Cybersecurity might look scary, complex, and even magical. In a sense, it is! Join our workshop to learn how to protect yourself in your daily life and how to move your first steps in cybersecurity.
In this workshop, we will bring our experience and guide you through the world of cybersecurity. You will learn how to protect yourself by using MFA to secure your login, by using strong passwords that you don't have to remember and by recognizing malicious texts or emails.
One thing is protecting, the other is attacking. In fact, we will give you a glimpse on the cyber world from the point of view of a hacker: what information they can learn about you and how they find it.
Curious? Our workshop is open to everybody without previous knowledge in cybersecurity or IT! Register, bring you smartphone and take the first step to protect yourself from cyber risks.
Join our workshop to explore the role of AI in Cyber Security! Saskia and Prof. Laskov will guide us through the three faces of AI in network attack detection. We will start from how AI can find applications in cyber security, we'll explore the security of AI itself and finally dive into the use of AI for Offensive Security.
Dive into the world of web security. Join us for a hands-on session where you'll take turns acting as attackers and security engineers. In the role of a security engineer, you will gain vital skills in identifying and mitigating web threats, while as an attacker you will dissect various strategies to catch up to the defense mechanisms.
All you need to be part of this experience is your laptop equipped with a Firefox or Chrome browser and Internet access. Led by Reto Ischi, Head of Security Product Development, and Alexander Born, Senior Data Scientist at Airlock – a web security product by Ergon Informatik AG, both seasoned experts in cyber defense and machine learning, this workshop is designed to elevate your understanding of web security.