CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

CyberLAB
  • May 5th (Wed)
  • 13:00 - 14:30
  • 7F 702C

Cyber Armchair Strategy vs Real-World Breach Experience
Chinese Onsite

Course Introduction:

Cyber attacks today are an inevitable threat modern organizations must face. How an organization detects, labels, responds, and remediates existing decifiencies in their cyber defense while also effectively utilizing their limited resources has become a necessary skill for infosec management teams for all organizations. One method that has helped alleviate this issue for infosec management teams has been the Cyber Defense Matrix (CDM), a well-known security model from recent years, and combining it with the use of various infosec frameworks.


Our course will focus on the concept of CDM, how to successfully supplement it via other infosec frameworks, and the analysis of cyber attack methods in terms of defense. Participants will learn how to think like and defend themselves from threat actors by learning how to properly analyze an attack, succesfully construct an attack storyline, understand each step of the attack from the attacker’s perspective, and, finally, how to properly defende themselves at each phase of the attack.


At the end of the course, participants will experience the latest in infosec edutech—an interactive CDM game. Through the game, participants will gain a deeper understanding of CDM concepts, common offensive and defensive techniques, how to successfully build an effective modern defense against today’s threats. This course will help participants evolve into valuable and effective information security personnel and prepare them for the inevitable frontline experience against a modern threat.

Course Objectives:

Participants will gain a deeper understanding behind the logic of cyber security methodologies and strategies through a detailed analysis of common adversarial attack techniques. Participants will gain valuable experience in how to look beyond the individual alerts and see the larger attack storyline unfolding in front of them. 

Course Outline:

1. Introduction to Cyber Security Models & Frameworks (CDM, NIST, CSF, ATT&CK)

2. How to use CDM to Analyze Attack Techniques

3. InfoSec Management / Combining CDM & Defense Methods

4. CDM Cyber Security Game Tournament

Suggested Equipment Specifications for Attendee:

non

Attendee Prerequisite Skills for the Course:

IT-related work experience and basic understanding of red team attack techniques

Maximum Number of Attendee:
20
John Jiang

John Jiang

Cyber Security Researcher, CyCraft

John Jiang is a member of the Research Team of CyCraft and UCCU Hacker.

He has presented technical presentations in non-academic technical conferences, such as HITCON, Black Hat USA, CodeBlue and HITB.

Currently, he focuses on research about Incident Response and Intranet Security.

Tien-Chih Lin

Tien-Chih Lin

Research Team Lead, CyCraft Technology

Dange Lin is a cybersecurity researcher at CyCraft Technology and focuses on automotive security, cloud security, machine learning, and threat intelligence analysis. He is currently responsible for cybersecurity for MIH Working Groups. He has delivered speeches at various seminars including HITCON, MOPCON, and CYBERSEC.