[b][center][color=0054a6] [h1][u]πŸ‡―πŸ‡¦πŸ‡°πŸ‡΄πŸ‡§ πŸ‡²πŸ‡¦πŸ‡ΉπŸ‡ΈπŸ‡ͺπŸ‡³[/u] [/h1] [/color][/center][/b] [h3][color=0054a6][u]Class[/u][/color][/h3] [b]InfoSec[/b] [h3][u][color=0054a6]Handle[/color][/u][/h3] [b]unknown or not sticking to one[/b] [h3][u][color=0054a6]Name[/color][/u][/h3] [b]Prof. apl. Jakob Matsen[/b] [h3][u][color=0054a6]Origin[/color][/u][/h3] [b]Germany[/b] [h3][u][color=0054a6]Organizations[/color][/u][/h3] [b]Siegaue University[/b] [h3][u][color=0054a6]Known Details[/color][/u][/h3] [b]Jakob took a very academical approach to becoming a security expert.[/b] At a rather young age he started to toy around with computers and hung out a lot with his older cousins who fiddled with hardware. Soon enough he did the same and step by step learned about hardware and programming as the information age progressed on. He decided to study computer science - a very promising area in his student days - and started to learn things in a more structured way. He had already learned about hackers and the dangers connected to them, but being just a young student he did not care so much. The threat did not seem too apparent, after all it was less dangerous than in this day and age. He rather continued fiddling with hardware and slid into the more technical inclined groups. His professors were happy with his success and he found a position as a doctoral researcher. One of the first conferences he attended changed his mind. A very passionate speaker laid out the dangers of corruption through hackers and for the first time he felt the same, maybe because he was more aware of the easiness of the attacks, or maybe because of the speaker. In the end it brought him to shifting his own research into the vulnerabilities and possibilities to secure embedded systems. After receiving his doctoral degree, he went to an american university as part of a small research group engaged in the research of interaction between hardware security and prevention of social engineering. His contract ended after two years, but a partner of the group offered him the possibility to be employed as a consultant. He stayed four more years, travelling the US and consulting different enterprises on their hardiness against social engineering, and choice and hardening of security systems. In the end he admitted to himself that he missed the academical life, especially the open field of possibilities that research offered. After sending out a few applications he got accepted at his current university as an interim professor in embedded systems. His research still makes him travel often, as he tightly connects it to work with real world enterprises. [h3][u][color=0054a6]Image[/color][/u][/h3] [img]https://cdn.pixabay.com/photo/2019/04/19/06/55/sound-recording-4138727_960_720.jpg[/img] [sub][url=https://pixabay.com/photos/sound-recording-sound-microphone-4138727/]Image by Marcel Gnauck from Pixabay[/url][/sub]