Information on the processing of personal data

Before you give your consent in the sign-up form, we are obligated to inform about the processing of personal data based on Databeskyttelsesforordningen.

We are obligated to inform you about the details of our processing of your data and furthermore inform you about your rights in reference to this.

 

Legal basis

Our processing of personal data is based on article 6, paragraph 1, item a (consent) of Databeskyttelsesloven.

The data will be stored safely with Aarhus Kommune for as long as you wish to receive news from Tech City Aarhus. Your data will be deleted permanently if you choose to unsubscribe. The information will not be shared with others and data will exclusively be processed by Aarhus Kommune Erhverv.

 

Your rights

You have the right to request insight in the information we hold about you.

You have the right to request eligibility or deletion of the information.

 

Who is using your information?

The data responsible is part of Aarhus Kommune and your personal data is processed only by:

 

Data responsible:

Borgmesterens Afdeling
Erhverv og Bæredygtig Udvikling
Aarhus Kommune Erhverv

Rådhuspladsen 2
8000 Aarhus C

E-mail: aarhuskommuneerhverv@aarhus.dk
Telephone: +45 89 40 22 00

 

If you have any questions in connection to the processing of your data by Aarhus Kommune, please contact the advisor of data protection of Aarhus Kommune at: databeskyttelsesraadgiver@aarhus.dk

Finally, we will inform you that it is possible to address a complaint to Datatilsynet about our processing of personal data at: www.datatilsynet.dk

681A5bfc9117fa5a7076a0d9 Hjemmeside

Details

Date:

Time:

15:30- 17:00

Systematic, Søren Frichs Vej 39, 8000 Aarhus

Passwords as Authentication Mechanism - Obligations of Users and Service Providers

A presentation that addresses the most widespread authentication mechanism of our time – passwords – and the responsibility we have for the final security, both as users and developers of password authentication solutions. We delve into the theory behind passwords and why they are structured the way they are. We examine how passwords are attacked with practical examples from "the dark side" and how to mitigate the various types of attacks. Not least, you will learn how we, as users and developers, are an important part of the final security surrounding the use of passwords.

Speaker - Michael Ustrup

Michael Ustrup is a Software Security Architect and Security Champion at Systematic. Michael graduated as a computer scientist from Aarhus University in 2006 and has worked for Systematic since 2007. He also holds a Master's Degree in Cyber Security from 2023. His work with security started in 2011 and has increased through the years.

He spends 50% of his time as a Security Champion, having created Systematic’s Secure Development Lifecycle (SDL) and a 3-day course in Software Security, including Threat Modelling and Secure Design & Coding Practices. The course is offered to people involved in developing software at Systematic. Lastly, he founded and leads Systematic’s Security Red Team, which offers both blue and red team services to internal projects at Systematic. The rest of his time is shared between a practical project as a Software Security Architect, developing security components and group security, doing strategic security work for Systematic.