TOGETHER, WE
RESPOND
FASTER
CYBERSEC 2019
MAR. 19 – 21
Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F
Cyber threats are constantly evolving. Purchasing anti-malware products is no longer sufficient for keeping an enterprise safe. It is just as important to have training in incident response and defensive techniques. While the Red Team is focused on simulated attack drills that uncover system vulnerabilities, the Blue Team is focused on how to respond to threats and incident handling. More and more companies are realizing the value of a skilled Blue Team. Offensive simulation drills, which have begun to appear on the market, are great ways for enterprises to accumulate experience and fortitude in combating cyber attacks.
The conference has specially invited the industry leader, Cisco as well as Cyber Range, which has cooperated with TSTI, RangeSeed from the Institute for Information Industry, the Israeli-based Cyberbit Range, the Cyber Defense Exercise from the National Center for High Performance Computing and the Blue Team CTF exercise courses from the CyCarrier. Registration for CYBERSEC is free!
Sign up for CYBERSEC 2019 and get a voucher to learn through practice. Sign up for our courses on-site following the instructions below:
Speaker
Attendee:20; Auditor:10
Course Description
The Cyber Range is a simulated cyber security war-game environment. It provides a training facility to the cyber security workers to learn how to defense by replaying various cyber threat incidents in an enterprise network environment. This process will give a realistic experience of defense thinking and operations. During the exercise, the TA will provide necessary assistance to the trainee to follow the defense process and capture the idea behind the cyber-attacks. After finishing each exercise, the instructor will discuss in depth about the hacker’s thinking, the defense techniques and the way to improve the detection and defense process. For example, when facing the ransomware, Advanced Persistent Threat or DDoS attack, the playbook will replay of realistic security incidents to let the trainee to learn security incident detection and defense plaining ability for various attacks. By providing various simulated attacks, the trainee can learn how to defend the cyber-attacks and to elevate their capabilities in cyber threat detection, incident analysis and cyber security threat assessment. The ultimate goal is to gain the ability to prevent future cyber security incidents, knowledge of the advanced cyber security defense techniques, and the ability to utilize security equipment and software applications. Having these capabilities, the cyber security workers shall be able to defend future cyber-attacks and reduce the risks of intrusion to the enterprise and guarantee continuous and uninterrupted network operations.
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Attendee:30
Course Description
Students will be connected to the CDX platform course environment through VPN.
The stuednt will be practice attack or defensive.
The target host in the course environment will be used as a practice object to simulate the small company website being hacked.
In the course, the instructor leads the students who cosplay hacker to intrusion/DDoS target hosts step by step, and then leads the students who cosplay defensive role to solve the intrusion/DDoS events.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Attendee:25
Course Description
In the face of inevitable cyber breaches today, the National Institute of Standards and Technology (NIST) has released the new framework of cybersecurity. Traditional cybersecurity model is used to make sure the enterprises are not breached, while the new cybersecurity strategies focus on sustainable business operation and agile systems recovery when being compromised. Therefore, incident response and resilience have become the survival techniques in this unpredictable environment when cyber threats occur.
In this session, we will use BlueTeam CTF for training monitoring, hunting, and investigating skills as our main goal. There will be some kinds of real cases for students to think and forensic as a hacker from different attacking situations. Through these situations, students can create timeline and attacker activity mapping and find out the tactic, techniques, and procedures the hacker is using, which can improve their visibility and sensibility. Also from this session students can improve their resilience ability from this practice. By investigating and analyzing different scenario, this session will bring a great support in real scenario and strengthen enterprise cyber security strategies.
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Attendee:12; Auditor:6
Course Description
The cybersecurity simulation training system is Israel’s well-known Cyberbit Range Training system.
We will practice the most three common threats as for the CyberSec 2019 CyberLAB program, they are: Apache Shutdown, Trojan Data Leakage, and SQL Injection.
Through hand-on practice of the complete scenario, the trainees will know how to judge different attack behaviors and then propose proper response measures. Each exercise will take around 1.5 hours. The simulations are as following:
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Attendee:12; Auditor:6
Course Description
The cybersecurity simulation training system is Israel’s well-known Cyberbit Range Training system.
We will practice the most three common threats as for the CyberSec 2019 CyberLAB program, they are: Apache Shutdown, Trojan Data Leakage, and SQL Injection.
Through hand-on practice of the complete scenario, the trainees will know how to judge different attack behaviors and then propose proper response measures. Each exercise will take around 1.5 hours. The simulations are as following:
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Attendee:12; Auditor:6
Course Description
The cybersecurity simulation training system is Israel’s well-known Cyberbit Range Training system.
We will practice the most three common threats as for the CyberSec 2019 CyberLAB program, they are: Apache Shutdown, Trojan Data Leakage, and SQL Injection.
Through hand-on practice of the complete scenario, the trainees will know how to judge different attack behaviors and then propose proper response measures. Each exercise will take around 1.5 hours. The simulations are as following:
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
-