{"guid":"bfc3327c-2af0-56fd-8845-4440c9421e87","title":"IoT-Security nach ETSI/EN303645","subtitle":null,"slug":"gpn20-36-iot-security-nach-etsi-en303645","link":"https://cfp.gulas.ch/gpn20/talk/PSA8ND/","description":"Betrachtung Norm ETSI/EN 303 645 \"Cyber Security for Consumer Internet of Things\"\n\nUm eine Basis für sichere IoT Hardware zu schaffen, hat die ETSI die praktische Norm EN 303 645 \"Cyber Security for Consumer Internet of Things\" herausgebracht.\n\nIm Talk betrachten wir u.a.\n\n- Aufbau und Inhalte der Norm EN303645\n- Ganzheitlicher Ansatz zu sicheren IoT-Geräten\n- Best Practices zur Umsetzung einzelner Punkte","original_language":"deu","persons":["Kevin Heneka"],"tags":["gpn20","36","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":258,"promoted":false,"date":"2022-05-21T21:15:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2026-03-11T02:00:05.512+01:00","length":1825,"duration":1825,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/36-bfc3327c-2af0-56fd-8845-4440c9421e87.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/36-bfc3327c-2af0-56fd-8845-4440c9421e87_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/36-bfc3327c-2af0-56fd-8845-4440c9421e87.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/36-bfc3327c-2af0-56fd-8845-4440c9421e87.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-36-iot-security-nach-etsi-en303645","url":"https://api.media.ccc.de/public/events/bfc3327c-2af0-56fd-8845-4440c9421e87","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[],"recordings":[{"size":324,"length":1825,"mime_type":"video/webm","language":"deu","filename":"gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2022-05-22T11:56:00.886+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/webm-hd/gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/59387","event_url":"https://api.media.ccc.de/public/events/bfc3327c-2af0-56fd-8845-4440c9421e87","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"},{"size":104,"length":1825,"mime_type":"video/webm","language":"deu","filename":"gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2022-05-22T11:15:29.238+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/webm-sd/gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/59382","event_url":"https://api.media.ccc.de/public/events/bfc3327c-2af0-56fd-8845-4440c9421e87","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"},{"size":27,"length":1817,"mime_type":"audio/mpeg","language":"deu","filename":"gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2022-05-22T10:53:47.386+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/mp3/gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/59378","event_url":"https://api.media.ccc.de/public/events/bfc3327c-2af0-56fd-8845-4440c9421e87","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"},{"size":18,"length":1817,"mime_type":"audio/opus","language":"deu","filename":"gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2022-05-22T10:52:52.841+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/opus/gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_opus.opus","url":"https://api.media.ccc.de/public/recordings/59377","event_url":"https://api.media.ccc.de/public/events/bfc3327c-2af0-56fd-8845-4440c9421e87","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"},{"size":74,"length":1825,"mime_type":"video/mp4","language":"deu","filename":"gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2022-05-22T02:22:23.943+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/h264-sd/gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_sd.mp4","url":"https://api.media.ccc.de/public/recordings/59318","event_url":"https://api.media.ccc.de/public/events/bfc3327c-2af0-56fd-8845-4440c9421e87","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"},{"size":340,"length":1825,"mime_type":"video/mp4","language":"deu","filename":"gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2022-05-22T01:48:08.064+02:00","recording_url":"https://cdn.media.ccc.de/events/gpn/gpn20/h264-hd/gpn20-36-deu-IoT-Security_nach_ETSI_EN303645_hd.mp4","url":"https://api.media.ccc.de/public/recordings/59306","event_url":"https://api.media.ccc.de/public/events/bfc3327c-2af0-56fd-8845-4440c9421e87","conference_url":"https://api.media.ccc.de/public/conferences/gpn20"}]}