-
Notifications
You must be signed in to change notification settings - Fork 15
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #56 from oasis-open/workshop-2024-05
Update workshop information
- Loading branch information
Showing
1 changed file
with
4 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -95,11 +95,11 @@ | |
</div> | ||
<div class="item-content text-white"> | ||
<div> | ||
<h5 class="item-subtitle mbr-semibold mbr-fonts-style display-4">12-15 December, 2023<br>Location: Germany, Information Securtiy Hub at Munich Airport (Südallee 1, 85356 München, Germany)</h5> | ||
<h4 class="item-title mb-3 mbr-fonts-style display-2"><strong>Exclusive Workshops and Ask-the-Expert Sessions about the Common Security Advisory Framework (CSAF)</strong></h4> | ||
<h5 class="item-subtitle mbr-semibold mbr-fonts-style display-4">14-16 May, 2024<br>Location: Germany, University of the Bundeswehr Munich (Werner-Heisenberg-Weg 39, 85579 Neubiberg, Germany)</h5> | ||
<h4 class="item-title mb-3 mbr-fonts-style display-2"><strong>Exclusive Workshops about the Common Security Advisory Framework (CSAF)</strong></h4> | ||
</div> | ||
<div> | ||
<p class="mbr-text mbr-fonts-style display-4"><br>Vulnerabilities in hardware and software are omnipresent. After all, all software and hardware is flawed beyond a certain level of complexity, and such flaws can potentially lead to security-relevant vulnerabilities that are exploited accordingly. Such security-relevant vulnerabilities are like open wounds. They need to be taken care of. To do this, it must be known where the “wound” is located, what kind of “wound” it is and how it can be healed or at least initially treated as quickly as possible.<br><br>The digital solution for all these issues is CSAF (<a href="https://csaf.io" class="text-success" target="_blank">https://csaf.io</a>): The Common Security Advisory Framework (CSAF) is a standardised and open-source framework for the communication and automated distribution of machine-processable vulnerability and mitigation information, so-called security advisories or security information.<br><br>CSAF significantly reduces the manual effort required to search for security information and to determine whether products are affected or not. It allows manufacturers, users, operators and the administration to automatically retrieve information on individual vulnerabilities and to determine whether they are affected. Being not affected can also be communicated in a scalable manner (Vulnerability Exploitability eXchange (VEX) as a profile in CSAF). In the course of an increasingly networked and complex world, the number of security-relevant vulnerabilities will grow significantly and modern vulnerability management using CSAF documents will become indispensable. The BSI promotes and demands CSAF and is organising a total of three free workshops and Ask-the- Expert sessions on the topic of CSAF (Common Security Advisory Framework) as part of the ACS (Alliance for Cyber Security), from 12.12.23 to 15.12.23.<br><br>All workshops will be recorded and afterwards edited for teaching purposes and made publicly available. No personal data of participants will be processed or disclosed in the publicly available videos. The workshops will be held in English and in presence.<br><br>All workshops are limited to 40 participants. Secure your place quickly (first come, first served) and register by 27.11.2023 at <a href="mailto:[email protected]" class="text-success">[email protected]</a>. <br /><br /> The Ask-the-Expert sessions will be held in English.Virtual participation is possible for the sessions (not the workshops) - there is no limit to the number of participants.</p> | ||
<p class="mbr-text mbr-fonts-style display-4"><br>Vulnerabilities in hardware and software are omnipresent. After all, all software and hardware is flawed beyond a certain level of complexity, and such flaws can potentially lead to security-relevant vulnerabilities that are exploited accordingly. Such security-relevant vulnerabilities are like open wounds. They need to be taken care of. To do this, it must be known where the “wound” is located, what kind of “wound” it is and how it can be healed or at least initially treated as quickly as possible.<br><br>The digital solution for all these issues is CSAF (<a href="https://csaf.io" class="text-success" target="_blank">https://csaf.io</a>): The Common Security Advisory Framework (CSAF) is a standardised and open-source framework for the communication and automated distribution of machine-processable vulnerability and mitigation information, so-called security advisories or security information.<br><br>CSAF significantly reduces the manual effort required to search for security information and to determine whether products are affected or not. It allows manufacturers, users, operators and the administration to automatically retrieve information on individual vulnerabilities and to determine whether they are affected. Being not affected can also be communicated in a scalable manner (Vulnerability Exploitability eXchange (VEX) as a profile in CSAF). In the course of an increasingly networked and complex world, the number of security-relevant vulnerabilities will grow significantly and modern vulnerability management using CSAF documents will become indispensable. The BSI promotes and demands CSAF and is organising a total of three free workshops on the topic of CSAF (Common Security Advisory Framework) as part of the ACS (Alliance for Cyber Security), from 14.05.2024 to 16.05.2024.<br><br><!--All workshops will be recorded and afterwards edited for teaching purposes and made publicly available. No personal data of participants will be processed or disclosed in the publicly available videos.--> The workshops will be held in English and in presence.<br><br>All workshops are limited to 80 participants. Secure your place quickly (first come, first served) and register by 01.05.2024 at <a href="mailto:[email protected]" class="text-success">[email protected]</a>. <!--<br /><br /> The Ask-the-Expert sessions will be held in English.Virtual participation is possible for the sessions (not the workshops) - there is no limit to the number of participants.--></p> | ||
|
||
</div> | ||
</div> | ||
|
@@ -185,7 +185,7 @@ <h1 class="mbr-section-title mbr-fonts-style display-1"><strong>Workshops</stron | |
</div> | ||
<div> | ||
|
||
<p class="mbr-text mbr-fonts-style display-7"><strong>Workshop 1: CSAF writing boot camp (for beginners)<br></strong>12.12.2023 - 13.12.2023<br>13:30-18:00 and 8:00-12:30<br>(limited to 40 participants)<br><br><strong>Workshop 2: The CSAF Writer Guild - Advancing Your Experience<br></strong>13.12.2023 - 14.12.2023<br>13:30-18:00 and 8:00-12:30<br>(limited to 40 participants)<br><br><strong>Workshop 3: CSAF distribution - from scratch to publication<br></strong>14.12.2023 - 15.12.2023<br>13:30-18:00 and 8:00-12:30<br>(limited to 40 participants)<br><br><strong>Ask-the-Expert Sessions<br></strong><br><strong>Session 1:</strong> Ask-the-Expert-Session (virtual)<br>11.12.2023, 17-18:00<br><br><strong>Session 2:</strong> Ask-the-Expert session (onsite and virtual)<br>15.12.2023 14:00-16:30</p> | ||
<p class="mbr-text mbr-fonts-style display-7"><strong>Workshop 1: CSAF writing boot camp (for beginners)<br></strong>14.05.2024<br>08:00-18:00<br>(limited to 60 participants)<br><br><strong>Workshop 2: The CSAF Writers' Guild - Advancing Your Experience<br></strong>15.05.2024<br>08:00-18:00<br>(limited to 60 participants)<br><br><strong>Workshop 3: CSAF distribution - from scratch to publication<br></strong>16.05.2024<br>08:00-18:00<br>(limited to 60 participants)<br><br></p> | ||
<div class="mbr-section-btn"><a class="btn btn-secondary-outline display-4" href="#"><span class="mobi-mbri mobi-mbri-right mbr-iconfont mbr-iconfont-btn"></span>Read More</a></div> | ||
</div> | ||
</div> | ||
|