Events

ElevenPaths Talks

 

Cryptography, Cryptocoins and Suchlike by Jorge Rivera and Rames Sarwat.

May 25, 2017. Our experts Rames Sarwat and Jorge Rivera, together with a special guest, will talk about solutions as Trusted PKI for IoT, cryptocoins and Blockchain, and the latter is being used by multiple sector for uses that we would never have imagined. Do not miss this webinar!


11Paths Talks: Cryptography, Cryptocoins and Suchlike

The War Against Ransomware
The War Against Ransomware Claudio Caracciolo & Pablo San Emeterio February 23, 2017
Under Attacked Network
Under Attacked Network Arsene Laurent & Claudio Caracciolo March 9, 2017
Data Access Control and De-Duplication in Cloud Computing
Data Access Control and De-Duplication in Cloud Computing Diego Espitia & Jorge Rivera March 23, 2017
Breaking Applications
Breaking Applications Pablo San Emeterio & Diego Espitia April 6, 2017
Playing with Messaging Apps
Playing with Messaging Apps Gabriel Bergel & Claudio Caracciolo April 20, 2017
Securing the Hosts (paranoid mode)
Securing the Hosts (paranoid mode) Arsene Laurent & Gabriel Bergel May 11, 2017
Cryptography, Cryptocoins and Suchlike
Cryptography, Cryptocoins and Suchlike Jorge Rivera & Rames Sarwat May 25, 2017
Is It Possible to Prevent Fraud?
Is It Possible to Prevent Fraud? Diego Espitia & Rames Sarwat June 8, 2017
Out to Capture Victims
Out to Capture Victims Gabriel Bergel & Arsene Laurent June 22, 2017
PinPay and Security in Micro Payments
PinPay and Security in Micro Payments Jorge Rivera & Pablo San Emeterio July 6, 2017
Differences between NOC, SOC and CyberSOC
Differences between NOC, SOC and CyberSOC Pablo San Emeterio & Gabriel Bergel July 20, 2017
mASAPP: Continual discovery and analysis of mobile apps
mASAPP: Continual discovery and analysis of mobile apps Víctor Mundilla & Álvaro Rodríguez July 27, 2017
DroneTinder: Continuous monitoring in Tinder with Virtual Drones
DroneTinder: Continuous monitoring in Tinder with Virtual Drones Julio García & Pablo San Emeterio August 3rd, 2017
Defensive Security vs. Offensive Security
Defensive Security vs. Offensive Security Claudio Caracciolo & Jorge Rivera August 10, 2017
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning Diego Espitia & Rames Sarwat August 24, 2017
Securing Industrial Systems
Securing Industrial Systems Gabriel Bergel & Carlos Ávila September 7, 2017
Fog / Edge / Cloudlet Computing
Fog / Edge / Cloudlet Computing Carlos Ávila & Claudio Caracciolo September 21, 2017
Monitoring and Alert Management
Monitoring and Alert Management Pablo San Emeterio & Diego Espitia October 12, 2017
The Inevitable Evolution of Managed Security
The Inevitable Evolution of Managed Security Jorge Rivera & Rames Sarwat October 26, 2017
The Hidden Face of Steganography
The Hidden Face of Steganography Pablo San Emeterio & Carlos Ávila November 9, 2017
Security in Mobile Telephony Systems
Security in Mobile Telephony Systems Claudio Caracciolo & Rames Sarwat November 23, 2017
Open Data: Much to See
Open Data: Much to See Gabriel Bergel & Diego Espitia December 7, 2017
GDPR Regulation
GDPR Regulation Francisco Oteiza & Juan Antonio Gil December 14, 2017
Security Forces and CyberCrime
Security Forces and CyberCrime Jorge Rivera & Carlos Ávila December 21, 2017
Pentesting with the new FOCA
Pentesting with the "new" FOCA Pablo González December 28, 2017

In recent years, we have seen the importance of protecting the confidentiality of the information that travels the Internet. Information encryption allows us to protect information when it’s lying stored on a computer or device, when it’s in transit or traveling through the network, or when it’s being processed by applications and algorithms.

 Encryption algorithms have been around for centuries, but in the 1970s a new type of encryption appeared, asymmetric encryption, which together with traditional symmetric encryption are now the basis of communications through PKI or public-key infrastructures. These infrastructures produce digital certificates that help us to authenticate, sign and encrypt information. The huge multiplication of devices expected by the appearance of IoT devices is going to stress out this type of solutions and, in some cases, it will force to look for alternative solutions.

The application of asymmetric cryptography has allowed the emergence of cryptocoins, BitCoin being the most popular of them. Cryptocoins are based on distributed infrastructures such as the Blockchain, that is called to redefine the model of certain businesses like the banking business when providing functions of immutable public registry at very low cost.

During this webinar, we will debate solutions like Trusted PKI for IoT, Cryptocoins and Blockchain, and how the latter is being used by multiple sectors, including the military, for uses that we would never have imagined. If you are passionate about security, and especially cryptography and its applications, you cannot miss this interesting webinar!

Related webinars:
La firma biométrica en el ámbito de la salud
Qué es el blockChain y porqué puede cambiar el mundo
Cifrado Asimétrico en IoT
La gestión de los Certificados Digitales en la Empresa

Find out more about this subject:
Seguridad criptográfica en IoT (I)