Seminars / Security of data for DMLM technology

Lets write in this column something new about our experience (to ensure the feeling that we are the right people to work with in case of presented seminar --->


Maciej 'Matt' Tusz With his background in materials science and aerospace engineering, Maciej has spent his career characterizing aerospace materials and bringing manufacturing processes to production readiness. In this capacity, he has supported aerospace and formula 1 customers in process development and qualification in metal AM. Through the last four years he has supported OEMs and their suppliers in AM by fast-tracking their learning curve and bringing critical applications into production. Maciej's LinkedIn profile

Maciej 'Matt' Tusz

With his background in materials science and aerospace engineering, Maciej has spent his career characterizing aerospace materials and bringing manufacturing processes to production readiness. In this capacity, he has supported aerospace and formula 1 customers in process development and qualification in metal AM.

Through the last four years he has supported OEMs and their suppliers in AM by fast-tracking their learning curve and bringing critical applications into production.

Maciej's LinkedIn profile


Piotr Domeracki Piotr has a deep understanding of the AM process with regards to the tooling industry. He has completed hundreds of rapid manufacturing projects and brought complex applications into serial production. His background as a mechanical engineer is instrumental in meeting the needs of our industrial customers.  Piotr's LinkedIn profile

Piotr Domeracki

Piotr has a deep understanding of the AM process with regards to the tooling industry. He has completed hundreds of rapid manufacturing projects and brought complex applications into serial production. His background as a mechanical engineer is instrumental in meeting the needs of our industrial customers. 

Piotr's LinkedIn profile


Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Photo by vm/iStock / Getty Images
  • imagine that months or years of your and your team work are unauthorizedly copied and possessed by other organization. 
    It might be not only frustrating, but also dangerous in terms of NDAs agreements
  • what actions does your organization take to prevent internal or external consultants, service technicians, ISO auditors, or even your own employees from copying data?
  • how to secure developed process parameters?
  • how to protect your confidential data?
  • what is the information flow for DMLM technology? How to spot weak points?

 

Benefits for customers

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

  • full understanding of information flow (with risk assessment)
  • risk minimization for confidential data leakage
  •  

 

Where to apply?

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. 

  •  
  •  

 

Target group

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. 

  • every company which develops they own DMLM-related knowledge
    • improved process parameters
    • new metal alloys
  • every company which manufactures parts under NDA agreements

 

picture
Module / 1
Assessment: Security of data management system

  • how to ensure maximum level of secutrity of confidental data?
  • what actions do you take to prevent consultants, service technicians, ISO auditors or even your employess from copying data and possessing your knowledge?
picture
Module / 2
Work session: Implementation of security data management system
  • implementation of safety procedures with regard to data management
  • reduction of the risk of fragile information leackage
 

Do not hesitate to contact us!

 

or email us at info@mgntd.co