TOGETHER, WE
RESPOND
FASTER
CYBERSEC 2019
MAR. 19 – 21
Taipei
International Convention Center
Taipei World Trade Center Hall 1, 2F
Security breaches increase daily as hacker techniques consistently evolve. In order to reduce the damage and recover from the losses, we have to examine the treats and take action then. There are many penetration testing courses provided by those industry leaders in CyberLAB. Through these courses, you will learn about the latest and most common risk scenarios encountered by modern enterprises. You will be able to understand the latest offensive techniques and learn the most effective counterattacks.
Speaker
Speaker
Attendee:20
Course Description
Historically, digital extortion has been carried out with malicious emails, compromised websites, or malvertisements, which infect victims' computers with ransomware. But as multiple recent cases have shown, cybercriminals are beginning to leverage targeted attack techniques in digital extortion. They compromise corporate systems from the outside and gain access to the systems and sensitive data. Then, they navigate across corporate networks with lateral movement techniques while encrypting files on critical servers along the way using legitimate tools to prevent the security teams from effectively investigate their attacks.
Faced with increasingly rampant cybercrime, how can security teams actively look for signs of attacks and discover how their systems are breached, while at the same time helping their companies build an investigative defense mechanism and promote security awareness?
This workshop will show you:
Course objectives
Through hands-on experience, this workshop will allow students to quickly understand and learn how hackers can attack a system without using malware and the investigative defense measures to counter the attacks.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Attendee:20; Auditor:10
Course Description
The main Purpose of this course is to deliver to our attendees of an introduction and demonstration in how to use AlienVault to analysis event correlations and find out the real threat. Users will be experiment from evaluating a risk to generating a real alarm and steps of incident report.
Course Benefits:
Course objectives
This integration platform is based on meeting the compliances of the National Cybersecurity Law. Therefore, this course will provide attendees with information of security concepts and basic maintenance knowledge by experiencing our automated information security management platform.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Attendee:20; Auditor:10
Course Description
Malware is getting more and more complicated and they are overwhelming everywhere, posing serious threats to your organization. It is true challenge to security officer to adapt new technology to tackling the treat.
In this session, we will analyze couple notorious malware tools damaging the community, and you will learn not only the behavior of the tool but also the ecosystem why the tool is prevailing. Not just lecturing, during the hands-on lab you will witness the tool in action and learn how Zyxel advanced multilayer technology mitigating the threat – spotting the threat at the first place and destroy it!
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Attendee:30
Course Description
Introduce recent several important security incidents, and how to investigate / control incident by log management.
Introduce importance of log management in information security
Base on some real incident , to review whole picture of incident, and introduce ALog「detect internal fraud in advance」, and「how to trace when incident occurred」
By hands on and basic operation to easily understand how to use ALog, also introduce some software management /maintenance.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Attendee:25; Auditor:5
Course Description
Give attendees a general idea of unknown malware, and then inject and run a sample on the virtual machine. Teach them how to use various free tools with iForensics eDetector for to detect malware, analyze and retrieve the evidence. Then use Magnet AXIOM, the professional forensics software, with simulated sandbox for forensics investigation.
Malware detection and
analysis:Explain how to identify a malware by analyzing its behavior in the
memory, such as:internet connection, program injection, start-up sequence,
whether it’s service, auto-run program, hidden…, etc.
Evidence Collection
and Forensics: Using the complete tracing and evidence collection functions of
eDetector with other tools to retrieve various samples associated with the
malware, such as files and memory blocks. Next, teach the attendees how to
conduct a deep investigation with AXIOM or sandbox software to draw the
contextual map of malware infection.
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Attendee:30
Course Description
The threat of business is rapidly evolving. The number of targeted threats such as malware, ransomware, data theft, and phishing is increasing, and the ability of malicious attackers to circumvent traditional security measures has intensified. Coupled with the adoption of SaaS, the cloud and the Internet of Things, the more sophisticated methods of threat delivery have triggered new challenges, control point complexity and security gaps that cannot be ignored.
With Akamai's global insights into the Internet and the Domain Name System (DNS), Enterprise Threat Protector enables security teams to proactively block and mitigate targeted threats and enforce the principles of proper use across the enterprise for security. The team is proactive in identifying, blocking, and defending against targeted threats such as malware, ransomware, phishing, data breaches, and more using the Domain Name System (DNS). Leverage real-time intelligence from Akamai Cloud Security Intelligence and Akamai's proven, recursive DNS platform around the world to deliver enterprise security, control and visibility efficiently, while easily integrating with your existing network defenses.
This hands-on course will give you an in-depth understanding of Akamai ETP's operating mechanism and hands-on experience to experience the speed, convenience, and high availability of Akamai ETP.
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Attendee:20; Auditor:10
Course Description
Recently, we face a lot of cyber attack all around, especially APT is persist to increase.
Due to the issue, we are using security products and services to reduce cyber security losses.
But these products and services will increase our loading in daily work.
In order to solve the problem, we provide a service which canl do a wide range of incident response in time.
The service we named IPaaS.
In this lesson, you will know how to hunting threat, tracing hacker’s behaviors, analysis malware, do incident response with cloud and get cyber security incident response of experience.
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Attendee:30
Course Description
Did you feel lost and doesn’t know where to start when dealing cyber-attacks? This course is designed for personnel who is new to Information Security and covers the fundamental techniques and tools to digital forensics, includes information analysis to locate malicious connections and malwares. Practices involve with memory blocks extraction of malicious process for potential C&C(Command & Control) server and furthermore, the attacker’s tactics and techniques.
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Attendee:20
Course Description
The number of disclosures of vulnerabilities in industrial control systems has risen sharply in recent years. The industrial control environment and even the critical incidents of critical infrastructure intrusion in the country have been frequently occurred. However, compared with the IT environment, the industrial control environment mostly uses proprietary protocols, proprietary equipment (such as PLC, RTU). For the security researchers, the entry threshold is relatively high. Through this course, students can not only quickly acquire the basic knowledge of industrial control system information security, but also learn how to penetrate into the industrial control network, and analyze industrial control system protocol packets, industrial control system protocol attacks and so on.
Course objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Attendee:30
Course Description
This course takes leads you to understand the various hacking attacks in the form of hacking games, and experience the hacker economy.
Course objectives
The course shows how the hacker completes the thinking and process of a successful attack, and defends each endpoint from the various attack points of the hacker to enhance the security awareness.
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
Speaker
Speaker
Attendee:30
Course Description
From time to time we need to
provide evidence after attacks but wonder where to look. This course is designed
for personnel involved in incident investigation, to locate attacker’s traces
and entry points for corresponding records as well as attacker’s tactics and
techniques.
Course
objectives
Course Outline
Suggested equipment specifications for Attendee
Attendee Prerequisite Skills for the Course
-