CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
Follow the trail to the APT crime scene and use the proper tools
to find unexpected traces left behind by hackers. Each
simulation drill serves as the best way to enhance defensive
capabilities!
CYBERSEC CyberLAB has invited senior experts
from the cybersecurity industry to personally take you through
simulations of various cyberattack scenarios, as well as share
practical experience, investigative tools, and their own
analytical processes. Each session of the CyberLAB simulation
offense/defense drills is expected to be packed. Don't miss the
opportunity to boost your combat power with intensive simulation
exercises.
Cyber attacks today are an inevitable threat modern organizations must face. How an organization detects, labels, responds, and remediates existing decifiencies in their cyber defense while also effectively utilizing their limited resources has become a necessary skill for infosec management teams for all organizations. One method that has helped alleviate this issue for infosec management teams has been the Cyber Defense Matrix (CDM), a well-known security model from recent years, and combining it with the use of various infosec frameworks.
Our course will focus on the concept of CDM, how to successfully supplement it via other infosec frameworks, and the analysis of cyber attack methods in terms of defense. Participants will learn how to think like and defend themselves from threat actors by learning how to properly analyze an attack, succesfully construct an attack storyline, understand each step of the attack from the attacker’s perspective, and, finally, how to properly defende themselves at each phase of the attack.
At the end of the course, participants will experience the latest in infosec edutech—an interactive CDM game. Through the game, participants will gain a deeper understanding of CDM concepts, common offensive and defensive techniques, how to successfully build an effective modern defense against today’s threats. This course will help participants evolve into valuable and effective information security personnel and prepare them for the inevitable frontline experience against a modern threat.
Participants will gain a deeper understanding behind the logic of cyber security methodologies and strategies through a detailed analysis of common adversarial attack techniques. Participants will gain valuable experience in how to look beyond the individual alerts and see the larger attack storyline unfolding in front of them.
1. Introduction to Cyber Security Models & Frameworks (CDM, NIST, CSF, ATT&CK)
2. How to use CDM to Analyze Attack Techniques
3. InfoSec Management / Combining CDM & Defense Methods
4. CDM Cyber Security Game Tournament
non
IT-related work experience and basic understanding of red team attack techniques
While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.
This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.
While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.
This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.
By practicing of incident response, you will understand the various TTPs of APT attack.Learn how to resolve the encoded content of script and find the way of persistence, lateral movement and how the shellcode is loaded.
You will be devided into teams and help each other to see the whole scope of incident from an single alert.
Learn how to see the whole scope of incident from an single alert.
a. Tools for Investigation
b. Practice of Incident Response
c. Sample Analysis
d. Powershell Script Analysis
e. Case Report and Review
Laptop with Chrome or Firefox
Experience of Investigation / Malware Analysis / Linux OS / Windows event log / Tools for Investigatoin(ex. sysinternals)