9/20 (Tue)
9/20 (Tue)
- LOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL General SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL General SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/20 10:20 - 10:40
Keynote
Information and Communications Technology Supply Chain Risk Management
Katharine Willers
CISA National Risk Management Center Initiative Manager, ICT SCRM Task ForceLOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL General SESSION TYPE Pre-recorded Video LANGUAGE EnglishLOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL IntermediateSESSION TOPIC BlockchainEV SecurityAISESSION TYPE Onsite LANGUAGE Chinese9/20 11:10 - 11:40
Keynote
Technology Roadmap for Designing Enterprise Cybersecurity
READ MORESecurity concepts such as Security by Design are rapidly becoming the new norm as Electric Vehicles (EV) and Software-defined Vehicles are becoming more widely discussed. In the past two years, not only have new automotive cybersecurity standards been introduced but also promulgated, such as with the WP29, R155/R156, and ISO/SAE 21434. This presentation will showcase CyCraft research on security regarding self-driving cars.
Tsung Peikan ( aka PK )
CyCraft Technology Corporation Co-Founder & CSOHacks in Taiwan CommitteeSEMI Taiwan Cybersecurity CommitteeLOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL GeneralSESSION TOPIC Cyber ResilienceSecurity by DesignSecurity StrategySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/20 12:30 - 14:30
Enforcing Zero Trust Security in the Face of Pervasive Intrusion Threats – Get First-hand Experience of Intrusion Techniques and Rethink Your Defense Strategy
READ MOREToday, people connect to corporate networks, cloud databases, and a variety applications from everywhere with all kinds of devices. Enterprises can no longer make the assumption that authenticated or trusted devices/users are secure. Therefore, the zero trust security model is an important strategy for strengthening the security of critical data and systems, especially in a hybrid, dynamic workplace. It is a more advanced, agile, and effective approach to security, compared to the traditional security model.
Comprehensive visibility and understanding of risks are the foundation of effective security prioritization and automated zero trust access controls. Unfortunately, a lot of solutions labeled as "zero trust" do not really understand how to evaluate trust.
Activities of this session include:
1.) Attack and defense drills. Get first-hand experience of hackers' stealthy intrusion techniques.
2.) Hands-on labs. From the defender's perspective, learn how to identify the root cause of an incident and determine the scope of its impact.
3.) Incident investigations. Collect evidence and think how to response with remediation measures, how to implement such measures with existing defenses, and how to stand in the executives' shoes to provide critical information for CISO and SOC teams to make informed decisions.
Peter Chiu
Trend Micro Technical ConsultantLOCATION Taipei Nangang Exhibition Center, Hall 2
4CLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/20 12:30 - 14:30
InfoSec Card Game Play Test
READ MOREExperience a highly interactive cybersecurity card game! Players not only have fun but also learn the basic concepts of the Cyber Defense Matrix (CDM) security model. By abstractly simulating real-world security incidents, players learn common attacker techniques, the effectiveness of current defensive techniques, and how to use CDM concepts to build an effective and efficient defense—on a budget!
This course is divided into three parts: lecture, discussion, and game!
First, we will introduce the importance and usefulness of security models used by researchers and analysts, such as CDM, NIST CSF, and Mitre ATT&CK. We will then compare the security models and explain how researchers and analysts use these models to break down cyberattacks into individual techniques and their intended uses, stretching from initial access to data exfiltration and impact. Attendees will learn how cybersecurity analysts map out—and eventually predict—attack behavior and how to use CDM with various information security frameworks to formulate effective security strategies and fill gaps. Most importantly, attendees will be able to immediately use this knowledge in our new highly interactive card game that leverages CDM concepts in a fun, educational, and approachable way highlighting the importance of cybersecurity.
Dange Lin
CyCraft Cyber Security ResearcherGary Sun
CyCraft Cyber Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4DLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/20 14:00 - 14:30
Tech Briefing
Ensure the security of enterprise network with MDR
READ MOREManaged detection and response (MDR) is an outsourced service that provides organizations with threat hunting services and responds to threats once they are discovered.
The speech will share MDR how to apply the unique Threat Intelligence collection data, verification mechanism, and machine learning analysis technology. Our total solution will help company to defend against unknown threats and 0-day attacks to ensure enterprises’ network security.
C.Y.C
NEITHNET Technical ManagerLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL GeneralSESSION TOPIC Managed Detection & ResponseThreat Detection & ResponseThreat IntelligenceSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL GeneralSESSION TOPIC Zero Trust ArchitectureEndpoint SecurityData Loss PreventionSESSION TYPE Onsite LANGUAGE Chinese9/20 14:00 - 14:30
Tech Briefing
Turning the Tables on Cyber-Attackers with a Continuous AI Loop Approach
READ MOREIn the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and harden their systems against attacks. In this session, Darktrace presents a newly announced, ambitious new vision for security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from threats. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organisation.
Neil Chang
Darktrace Senior Cyber Security TechnologistApril Huang
Darktrace Commercial Team LeadLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL IntermediateSESSION TOPIC AI SecurityThreat Detection & ResponseSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL General SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
702LEVEL IntermediateSESSION TOPIC Zero Trust NetworkData Loss PreventionWeb SecuritySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL IntermediateSESSION TOPIC RansomwareCyber CrimePublic Private PartnershipSESSION TYPE Pre-recorded Video LANGUAGE English / Chinese9/20 14:00 - 14:30
Cyber Leadership Forum (Invite-only)
CXO Information Security Thinking and Chanllenges under the ESG Trend
READ MOREIn the wave of ESG and digitization, the definition and value of "information security" has changed dramatically. With the corporate's information security management has been included in the evaluation project of the Dow Jones Sustainability Index (DJSI) and more well-known sustainability awards, which will be an issue and a challenge that needs to be addressed more seriously at the CXO level. In this digital transformation wave that everyone can relate to, the ecosystem of the industry has turned over and reshaped the information security battlefield.
Peter Pu
BSI, the British Standards Institution Managing Director, NE Asia RegionLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL GeneralSESSION TOPIC GovernanceCyber ResilienceDigital TransformationSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL IntermediateSESSION TOPIC Endpoint SecurityCloud SecurityThreat HuntingSESSION TYPE Onsite LANGUAGE Chinese9/20 14:00 - 14:30
Brand Day - Trend Micro
Automotive Attack Matrix
READ MOREWith the growth of Internet of Vehicle (IoV) devices, while give user more convenience, it also allows hackers to have more weakness point to penetrate. In this presentation, we will share the security issues of various automotive components from attacker’s vision in real cases and provide prevention solutions.
Aaron Luo
VicOne Senior Staff EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL IntermediateSESSION TOPIC Hardware SecurityReverse EngineeringSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL GeneralSESSION TOPIC Zero Trust ArchitectureSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL GeneralSESSION TOPIC Network Access ControlZero Trust NetworkNetwork SecuritySESSION TYPE Onsite LANGUAGE Chinese9/20 14:30 - 15:00
Cyber Leadership Forum (Invite-only)
Cybersecurity management key risk indicators (KRI) & key performance indicators
READ MORECybersecurity risk trends are changing rapidly, and companies need to proactively establish mechanisms to detect whether cyber risks affect the enterprise environment.
I will discuss the NISTIR 8286 ERM, COBIT 2019 framework, the concept of risk monitoring and risk response, and let the audience understand the use of Key Risk Indicator (KRI) and Key Performance Indicator (KPI) in information security risk management, so as to realize enterprise business goals.
Kuro Huang
EY Consulting Cyber Security ConsultantGriffin Lin
EY Consulting Deputy ManagerLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL IntermediateSESSION TOPIC Risk ManagementSecurity StrategySecurity by DesignSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
702LEVEL GeneralSESSION TOPIC Business Continuity ManagementSecurity ArchitectureAccess ControlSESSION TYPE Onsite LANGUAGE Chinese9/20 14:45 - 15:15
Tech Briefing
Kenny Lee
International Society of Automation, Taiwan Section Membership ChairLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL GeneralSESSION TOPIC StandardsIoT SecurityOT SecuritySESSION TYPE Onsite LANGUAGE Chinese9/20 14:45 - 15:15
Threat Research Forum
Modern Malware Evasion Strategies: Bypass Real-Time Protection in Temporal Pincer Methods
READ MOREReal-Time Protection is an essential design for all modern anti-virus and endpoint protection, which scans the executed binaries, detects and blocks the malware immediately. To achieve this protection, the security vendors have used APIs provided by Microsoft to embed their hooks at the Ring0 kernel level. However, is that game of cat and mouse over? ;)
In this session, we will reverse engineer the Windows OS. To understand the Process Creation, Userland IRP, and Kernel Driver design for learning the modern attacker's strategies to escape virus-scan.At the end of the session, we will use several PoC as examples used in the wild to demonstrate how attackers can abuse the issue of scanning timeline, to launch temporal pincher move to avoid anti-virus scan, and we will provide suggestions on mitigation measures and suggestions on select security products for users .
Sheng-Hao Ma
TXOne Networks Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL AdvancedSESSION TOPIC Malware ProtectionAPTExploit of VulnerabilitySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC Breach DetectionAdvanced Threat ProtectionRansomwareSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL IntermediateSESSION TOPIC Zero Trust ArchitectureCritical Infrastructure ProtectionSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL GeneralSESSION TOPIC OT SecuritySESSION TYPE Onsite LANGUAGE Chinese9/20 14:45 - 16:45
Enforcing Zero Trust Security in the Face of Pervasive Intrusion Threats – Get First-hand Experience of Intrusion Techniques and Rethink Your Defense Strategy
READ MOREToday, people connect to corporate networks, cloud databases, and a variety applications from everywhere with all kinds of devices. Enterprises can no longer make the assumption that authenticated or trusted devices/users are secure. Therefore, the zero trust security model is an important strategy for strengthening the security of critical data and systems, especially in a hybrid, dynamic workplace. It is a more advanced, agile, and effective approach to security, compared to the traditional security model.
Comprehensive visibility and understanding of risks are the foundation of effective security prioritization and automated zero trust access controls. Unfortunately, a lot of solutions labeled as "zero trust" do not really understand how to evaluate trust.
Activities of this session include:
1.) Attack and defense drills. Get first-hand experience of hackers' stealthy intrusion techniques.
2.) Hands-on labs. From the defender's perspective, learn how to identify the root cause of an incident and determine the scope of its impact.
3.) Incident investigations. Collect evidence and think how to response with remediation measures, how to implement such measures with existing defenses, and how to stand in the executives' shoes to provide critical information for CISO and SOC teams to make informed decisions.
Peter Chiu
Trend Micro Technical ConsultantLOCATION Taipei Nangang Exhibition Center, Hall 2
4CLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/20 14:45 - 16:45
InfoSec Card Game Play Test
READ MOREExperience a highly interactive cybersecurity card game! Players not only have fun but also learn the basic concepts of the Cyber Defense Matrix (CDM) security model. By abstractly simulating real-world security incidents, players learn common attacker techniques, the effectiveness of current defensive techniques, and how to use CDM concepts to build an effective and efficient defense—on a budget!
This course is divided into three parts: lecture, discussion, and game!
First, we will introduce the importance and usefulness of security models used by researchers and analysts, such as CDM, NIST CSF, and Mitre ATT&CK. We will then compare the security models and explain how researchers and analysts use these models to break down cyberattacks into individual techniques and their intended uses, stretching from initial access to data exfiltration and impact. Attendees will learn how cybersecurity analysts map out—and eventually predict—attack behavior and how to use CDM with various information security frameworks to formulate effective security strategies and fill gaps. Most importantly, attendees will be able to immediately use this knowledge in our new highly interactive card game that leverages CDM concepts in a fun, educational, and approachable way highlighting the importance of cybersecurity.
Dange Lin
CyCraft Cyber Security ResearcherGary Sun
CyCraft Cyber Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4DLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/20 14:45 - 15:15
Brand Day - Trend Micro
In-depth introduction to Automotive TARA
READ MOREIn order to protect the rights of road users and promote the safety awareness of vehicle manufacturers, all new vehicles in the EU after July 2022 and all new production vehicles after 2024 must comply with the UNECE WP.29/R155 standard, while the ISO21434 standard, inherited from ISO26262, will soon be fully implemented. Regardless of the standard, Automotive TARA is the core component. What is TARA? How should vehicle manufacturers implement TARA? What makes Automotive TARA special? This topic will give you an in-depth understanding of Automotive TARA, from the purpose and necessity of TARA, the implementation of Automotive in the real world and the current status of ISO Regulation.
Shin Li
Trend Micro Automotive Threat ExpertLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL IntermediateSESSION TOPIC Supply Chain SecurityThreat Analysis & ProtectionRisk AssessmentSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL GeneralSESSION TOPIC API SecuritySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL GeneralSESSION TOPIC Network Detection & ResponseFirewallZero Trust NetworkSESSION TYPE Onsite LANGUAGE Chinese9/20 14:45 - 15:15
Tech Briefing
The New Generation of Distributed Networking Architecture Disrupts Data Center Networking and Information Security Thinking
READ MOREAruba combines best-of-breed Aruba data center L2/3 switching with the industry's only, fully programmable DPU (Pensando Elba) to introduce the industry's first Distributed Services Switch the Aruba CX 10000 Series Switch. Its key features include:
- IT organizations no longer need additional firewalls to control east-west traffic when building data centers, delivering 100x the scale and 10x the performance at 1/3 the TCO of traditional approaches
- Stateful firewall
- Extend micro segmentation capability to any type of hosts in the data center
- The encapsulated remote switch port analyzer (ERSPAN), telemetry and DDoS protection related features will be introduced gradually
Alex Chen
Aruba Aruba Taiwan Technical Vice PresidentLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL IntermediateSESSION TOPIC Network SecurityNetwork VisibilitySESSION TYPE Onsite LANGUAGE Chinese9/20 15:00 - 15:20
Cyber Leadership Forum (Invite-only)
Protect corporate data by implementing cybersecurity framework
READ MOREAdopting cybersecurity framework could be meaningful to protect corporate data, as well as a trust relationship between supply chain. Starting from choosing a cybersecurity framework that suites your business, defining guidelines to different operating systems, selecting tools to fulfill the requirement of compliance and certification. This sharing would share a real world example on how to obtain and utilize associated resources, apply management tools to different OSes
LOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL GeneralSESSION TOPIC Cyber ResilienceEndpoint Detection & ResponseZero Trust NetworkSESSION TYPE Onsite LANGUAGE Chinese9/20 15:50 - 16:20
Cyber Leadership Forum (Invite-only)
How Insurance Company Determine Cyber Risks of Enterprise?
READ MOREBased upon Aon global database of cyber insurers’ survey and many years of local practice, will share with enterprises how insurance companies evaluate corporates’ cyber risks and define insurance policy terms. If a company plans to purchase cyber security insurance, what information or actions should be prepared in advance, and how to communicate with insurers to obtain the best terms? During a cybersecurity incident, how to cooperate with insurance companies to optimize the policy.
Maggie Hsieh
Aon Taiwan Ltd. Associate DirectorLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL GeneralSESSION TOPIC Cyber InsuranceCyber ResilienceIncident ResponseSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL IntermediateSESSION TOPIC Zero Trust ArchitectureSESSION TYPE Onsite LANGUAGE Chinese9/20 16:00 - 16:30
Threat Research Forum
To Loot or Not to Loot? That Is Not a Question When State-Nexus APT Targets Online Entertainment Industry
READ MOREThe online entertainment business is not a notable victim when we talk about Advanced Persistent Threat (APT) attacks. Previously, APT research emphasized the victims in the public sector, such as the government, military, or critical infrastructure. It was not until 2020 that security researchers started to shed light on APT attacks against the online entertainment industry. For instance, TrendMicro's "Operation DRBControl" suggested that China-nexus APT41 and APT27 had targeted gambling and betting entities.
This talk will focus on APT's targeted attack against online entertainment companies which have solid cash flow and a massive amount of personal data. Previously, many cases were believed to be financially-motivated attacks because of the usage of ransomware. However, based on our observation in the past few years, APT attacks against online entertainment companies are also driven by espionage purposes.
We will dissect more than 20 targeted attack operations TeamT5 has tracked since 2018. Our analysis shows technical links between these targeted attacks and the infamous Chinese APT, including APT10 (aka menuPass), APT41 (aka Winnti, Amoeba), and APT27 (aka GreedyTaotie). Our presentation will cover these attacks' Tactic Technique and Procedures (TTPs). We have seen those APT groups adopt different TTPs aimed at the online entertainment industry. We detected the well-known China-origin weapons such as PlugX, ZxShell, and APT's shared tools such as Hyperbro, PlugX2016, and CoinDrop. Many campaigns even deployed ransomware for double extortion.
More importantly, these cases gave us a peek into China's strategic move. We believe that these APT attacks are the preliminary work of the Chinese government. After these intensive attacks of APT, we have seen China is officially purging the online entertainment and gambling industry. Our strategic intelligence indicates several possible scenarios which could lead us to believe the ultimate goal of these APT attacks.
Charles Li
TeamT5 Chief AnalystChe Chang
TeamT5 Cyber Threat AnalystLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL AdvancedSESSION TOPIC Threat IntelligenceReverse EngineeringSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL IntermediateSESSION TOPIC Application SecurityCloud AutoMLCloud SecurityBackup and RecoverySESSION TYPE Onsite LANGUAGE EnglishLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL GeneralSESSION TOPIC Application SecurityDDoS ProtectionSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL GeneralSESSION TOPIC Data SecuritySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL GeneralSESSION TOPIC SIEMSESSION TYPE Onsite LANGUAGE Chinese9/20 16:00 - 16:30
Tech Briefing
Using artificial intelligence to control remote/home/outsourced work environments
READ MOREUse Artificial Intelligence and Machine Learning technology to help companies control remote/home/outsourced work environments, such as:
- User identification
- Identification of bystanders in the work environment
- Identification of objects in the work environment that could lead to a data breach, such as cell phones, cameras, keyboards, screens, notes, and papers
- Recognition of behaviors explicitly prohibited by the company in the work environment, such as taking pictures of the screen with a mobile phone/camera
- Actions for violations such as warning messages, blank screen, mandatory shutdown
This solution allows enterprises to fully control the Human Factor, protect data security, improve work efficiency, and assist Call Center to comply with the CLEAN DESK policy.
Julian Su
iSecurity Inc. PresidentLOCATION Taipei Nangang Exhibition Center, Hall 2
702LEVEL GeneralSESSION TOPIC Human FactorAI SecuritySESSION TYPE Onsite LANGUAGE Chinese9/20 16:00 - 16:30
Brand Day - Trend Micro
Securing C.A.S.E.: Putting the brakes on cyber threats to keep you in the fast lane
READ MORELearn how Trend Micro's automotive security solutions can help you detect and respond to future potential threats.
Chelsea Chen
Trend Micro Senior manager of BDLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL GeneralSESSION TOPIC EV SecuritySoftware SecurityHardware SecuritySESSION TYPE Onsite LANGUAGE Chinese9/20 16:00 - 16:30
Tech Briefing
OWASP Top 10 2021 Overview with Angle of Cyber Security Management
READ MOREThe well-known project - OWASP Top 10 was updated last year. The issues are shuffled and merged according to their importance. Also, the present software development flow affects application security which evolve in recent years. Few new issues such as software supply chain attacks were introduced in the new OWASP Top 10. How enterprises should change the way of security development according to the new OWASP Top 10?
New trends and details would be introduced in this session.
Wayne Tseng
DigiCentre Cyber Security Department ManagerElmo Hsiao
Digicentre Cybersecurity Assistant ManagerLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL IntermediateSESSION TOPIC Application SecurityWeb SecuritySecDevOpsSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL GeneralSESSION TOPIC Endpoint Detection & ResponseThreat Detection & ResponseThreat HuntingSESSION TYPE Onsite LANGUAGE Chinese9/20 16:45 - 17:15
Tech Briefing
Establish robust endpoint protection and enforce compliance in the digital age
READ MOREThe pandemic accelerates the digital transformation of enterprises, but digital transformation brings more severe security challenges. The hackers use malicious attacks across a variety of endpoint devices and systems. Thus, the authorities from industry and government agency built various supervision systems and regulations to implement the security protection, therefore, how to effectively implement IT compliance, ensure information security and meet the regulatory requirements of specific industries through international common security practices such as CIS, DISA STIG, PCI-DSS, etc., is an important cornerstone for the success of enterprise digital transformation.
Riley Liao
HCL Software, HCL Tech Head of North Asia BigFixLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL IntermediateSESSION TOPIC Endpoint SecurityComplianceVulnerability ManagementSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL IntermediateSESSION TOPIC OT SecurityICS/SCADA SecurityIndustrial SecuritySESSION TYPE Onsite LANGUAGE Chinese9/20 16:45 - 17:15
Tech Briefing
Solution Tips for The Challenges of Big Data Network Traffic Analytics
READ MOREWith the advent of the 5G era and prevalence of IoT (Internet of Things), network traffic continues to grow at exponential rate with unprecedented diversity and complexity in its content and behavior, leading to more challenges to network visibility and forensic analysis for carrier-grade networks. In this session, we take a deep dive into how GenieAnalytics assists network operators in overcoming the various challenges of large-scale network traffic analysis through methods like diverse traffic data collection, big data database building, heterogeneous network data correlation and enrichment, and multi-dimensional analytics to provide a fast, in-depth, network-wide solution for carrier-grade traffic analysis.
Jacob Chiang
Genie Networks CTOLOCATION Taipei Nangang Exhibition Center, Hall 2
702LEVEL AdvancedSESSION TOPIC Network VisibilityBig DataSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/20 16:45 - 17:15
A Beacon of Light in the Darkest AD: Attack Path Visualization with AI Simulation
READ MORECompleting our CyCraft trilogy of CyberSec talks, we will discuss the critical importance of proper privilege management. Windows AD is the heart of Enterprise IT cybersecurity. Yet while it is a top security priority, it can also be the darkest enigma and a monster to unravel. AD security is difficult to measure. In this presentation, we will introduce a new AI analysis method for AD security, combining the confrontational thinking between red and blue teams to better help outline the boundaries of enterprise cybersecurity and increase visibility and metrics for AD security. This is a Birdman session you cannot miss.
Jeremy Chiu / Birdman
CyCraft Technology Corporation Founder & CTOLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC Machine LearningSESSION TYPE Onsite LANGUAGE Chinese9/20 16:45 - 17:15
Buidling Cybersecurity Center of Excellence: Embracing Adademia, Startups, and Communities
READ MOREAfter the incubation of around one year, CCoE (Cybersecurity Center of Excellence) is to be established early next year. Positioned to be a provider of cybersecurity assessment technologies, a trainng camp of cybersecurity blue teams, a diplomacy to collaborate with well-known international cyberseucirty organizations, CCoE shall embrace academia, entreprenurs, cyber communities, and other institutional bodies, with one third of its budget. Under three laboratories, cyber threat defense lab, cyber data analytics lab, and post quantum crypto lab, we are developing several platforms: vulerabilitiy mining, threat intelligence, cyber range, social network analytics, disinformation detection, deepfake detection, and post quantum crypto eco-system. In this talk, we argue the differences between the technologies for cyber players and the ones for assessors, the differences between training blue teams and training red teams, why spending one third of budget externally, and how we shall differ from the other institutional bodies. With these, we hope to recruit talents to build this CCoE together.
Ying-Dar Lin
NARLabs CCoE Program Chair ProfessorLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL GeneralSESSION TOPIC CyberwarfareDisinformationSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL GeneralSESSION TOPIC Container SecurityDevSecOpsSESSION TYPE Onsite LANGUAGE Chinese9/20 16:45 - 17:15
Brand Day - Trend Micro
Attack and Response (Protection) Interactive Demo
READ MOREAside from historical vehicle hacking cases, it is predicted that future attacks will increase when more and more connected vehicles are on the road. We will demo a hackers attack on the IVI, TCU, and Gateway, and how our In-Vehicle Security is purpose-built to protect against these threats. At the same time, you will have the opportunity to visualize how Vehicle One (a cloud-based management console) detects and responds to these threats. Furthermore, OEMs require suppliers to manage vulnerability in compliance with UNECE R155. We will also demo the Vulnerability Management functionality, which focuses on Vulnerability, Back Door, and Malware scanning, which benefits suppliers in gaining OEMs' trust while hardening device security.
Reece Chen
Trend Micro Technical ManagerLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL GeneralSESSION TOPIC EV SecuritySoftware SecurityHardware SecuritySESSION TYPE Onsite LANGUAGE Chinese9/20 16:45 - 17:15
Threat Research Forum
Attack an opponent use their valid management tool.
READ MOREWhen attackers are familiar with the methods and intelligence that blue teams use to detect threats, can the intelligence at our disposal still help us detect signs of an attacker's intrusion?
Zero Chen
eCloudvalley Digital Technology MSSP DirectorLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL GeneralSESSION TOPIC Threat IntelligenceThreat Detection & ResponseThreat Intelligence SharingSESSION TYPE Onsite LANGUAGE Chinese
9/21 (Wed)
- LOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/21 10:05 - 10:25
Keynote
Keynote Session
Audrey Tang
Executive Yuan Ministry of Digital Affairs MinisterLOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/21 10:25 - 10:55
Keynote
Defining an XDR Strategy
READ MOREXDR (eXtended Detection and Response) is the hot new buzzword in the security industry but so far there isn't a lot of agreement on what defines XDR. The goal makes sense. Extend your detection capabilities across your hybrid network to catch advanced threats like zero days, supply chain attacks, and insider threats, and respond quickly before damage can be done. This talk will explore the data sources that XDR leverages as well as the pros and cons of XDR such as: is it realistic that one vendor can offer you all the tools you need for detection and response or will you need to create a strategy to achieve your own extended detection and response ecosystem.
Daniel Chu
ExtraHop VP of Systems Engineering, APJLOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL GeneralSESSION TOPIC Network Detection & ResponseThreat Detection & ResponseNetwork VisibilitySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701LEVEL GeneralSESSION TOPIC Security StrategyThreat HuntingThreat IntelligenceSESSION TYPE Onsite LANGUAGE Chinese9/21 12:30 - 14:30
Hack x Forensics
In this lesson, you will be introduced to digital forensics tools and guided through hands-on lab. You will also learn about how to use the tools to analyze and evaluate the impact scope during real-world investigation and response to incidents. For an immersive experience, a hands-on lab will give participants the chance to investigate cases, experience cybersecurity experts' course of investigation, simulate hackers' tracks via remaining PC data, and to write a basic report, with our team's guidance.
MA, Hung-Wen
CHT Security EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
4DLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/21 12:30 - 14:30
Enforcing Zero Trust Security in the Face of Pervasive Intrusion Threats – Get First-hand Experience of Intrusion Techniques and Rethink Your Defense Strategy
Today, people connect to corporate networks, cloud databases, and a variety applications from everywhere with all kinds of devices. Enterprises can no longer make the assumption that authenticated or trusted devices/users are secure. Therefore, the zero trust security model is an important strategy for strengthening the security of critical data and systems, especially in a hybrid, dynamic workplace. It is a more advanced, agile, and effective approach to security, compared to the traditional security model.
Comprehensive visibility and understanding of risks are the foundation of effective security prioritization and automated zero trust access controls. Unfortunately, a lot of solutions labeled as "zero trust" do not really understand how to evaluate trust.
Activities of this session include:
1.) Attack and defense drills. Get first-hand experience of hackers' stealthy intrusion techniques.
2.) Hands-on labs. From the defender's perspective, learn how to identify the root cause of an incident and determine the scope of its impact.
3.) Incident investigations. Collect evidence and think how to response with remediation measures, how to implement such measures with existing defenses, and how to stand in the executives' shoes to provide critical information for CISO and SOC teams to make informed decisions.
Peter Chiu
Trend Micro Technical ConsultantLOCATION Taipei Nangang Exhibition Center, Hall 2
4CLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/21 14:00 - 14:30
Tech Briefing
Hacking trends after epidemic
READ MOREMany countries have gradually adopted an attitude of coexistence with the epidemic, and it is expected that the time for the global reopen is getting closer. However, due to the push of the epidemic, work and life styles have changed dramatically, and hackers are constantly changing to evolve their attack methods and targets. Therefore, in the post-epidemic era, enterprises need to update their thinking and strategies, and start to plan the cyber security as soon as possible. This agenda will share actual cases to analyze the evolution trends of hackers' attacks under this wave of pandemic, and provide corresponding defense strategies and solutions.
Peter Peng
NEITHNET Technical managerLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL GeneralSESSION TOPIC Threat Analysis & ProtectionThreat Detection & ResponseThreat HuntingSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL GeneralSESSION TOPIC Endpoint SecurityData Loss PreventionData SecuritySESSION TYPE Onsite LANGUAGE Chinese9/21 14:00 - 14:30
Threat Research Forum
Speedrun! The Shortest Attack Path to Breaching Linux Servers!
READ MORELinux server security becomes more vital as more enterprises go through digitization and cloud migration. This presentation discusses both real-world attack techniques used when targeting Linux systems as well as effective defense strategies defenders can leverage to rapidly improve and harden their defenses. Understanding the attackers’ methods is only the beginning. Defenders need to understand how to properly detect, identify, and respond to each and every technique attackers have at their disposal.
Ann Tsai
CyCraft Cyber Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL GeneralSESSION TOPIC Network SecurityPenetration TestingDigital ForensicsSESSION TYPE Onsite LANGUAGE Chinese9/21 14:00 - 14:30
Cryptography Forum
Standardization of Post-Quantum Cryptography
READ MOREThe confidentiality of modern communication and storage is highly dependent on cryptographic algorithms such as encryptions and digital signature schemes. The development of quantum computers continues to progress. In the future, large-scale universal quantum computers are able to crack all todays’ public-key cryptosystems. In order to resist the threat posed by quantum computing, PQC (Post-Quantum Cryptography) has emerged. Using PQC can resist quantum cryptanalysis.
Jimmy Chen
LOCATION Taipei Nangang Exhibition Center, Hall 2
702LEVEL IntermediateSESSION TOPIC Post Quantum CryptographyQuantum ComputingStandardsSESSION TYPE Onsite LANGUAGE Chinese9/21 14:00 - 14:30
Zero Trust Forum
Zero Trust Strategy, Action Plan, and Maturity
READ MOREZero trust must initialize from the top strategy, make an appropriate action plan based on the actual requirements of the organization, promote it step by step, and design suitable measureable indicators to confirm the implementation effect. Practical operations can refer to the US CISA zero trust maturity model and the US Department of Defense's promotion practices, starting from needs, considering risks, seeking the best technology and making economical methods.
David Hsiu
KPMG Advisory Services, Partner Cybersecurity ServicesLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL IntermediateSESSION TOPIC Zero Trust ArchitectureSecurity ArchitectureRisk ManagementSESSION TYPE Onsite LANGUAGE Chinese9/21 14:00 - 14:30
5G Security Forum
Yeali Sun
National Taiwan University Information Management/ProfessorLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL IntermediateSESSION TOPIC 5G SecuritySESSION TYPE Onsite LANGUAGE Chinese9/21 14:00 - 14:30
Cybersecurity Deployment of Smart Manufacturing Forum
Build production line information security protection from scratch
READ MORE1. In the process of digital transformation, what are the industrial demands and information security challenges that HOPAX faces?
2. How does HOPAX effectively find relevant resources for assistance?
3. HOPAX's information security strategy and improvement structure: strengthen self-improvement + supply chain joint defense
4. Supply chain identity zero trust
5. Uninterrupted intrusion detection and defense
6. The protection of industrial control and information security is not neglected
7. Information security team establishment and threat monitoring analysis
Aaron Wang
HOPAX Chief Information OfficerLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL GeneralSESSION TOPIC Security ArchitectureOT SecuritySupply Chain SecuritySESSION TYPE Onsite LANGUAGE Chinese9/21 14:00 - 14:30
OT Security Forum
OT Challenges and threats faced from the perspective of dam facility safety
READ MORETraditional industrial control system lacks security considerations. With limited human resources, the popularization of networking technology and remote control is becoming a possible solution. In this situation, these industrial control systems would be more likely to be targeted by hackers. This speech will allow the audience to understand common safety deficiencies in industrial control architecture from the actual example of dam safety, and propose relevant suggestions.
Jung-Shian Li
National Cheng Kung University full professor, electrical engineering departmentLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL IntermediateSESSION TOPIC Critical Infrastructure ProtectionICS/SCADA SecurityOT SecuritySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL GeneralSESSION TOPIC Threat ManagementCyber ExposureCyber HuntingSESSION TYPE Onsite LANGUAGE Chinese9/21 14:00 - 14:30
Vehicle Security Forum
EV Supply Chain Security: An Exploration on Adoption and Impacts
READ MOREConnected Vehicle brings EV, Smart City and next-generation Vehicle applications. Like more automated, electric vehicles, conncted vehicle applications in our smart city face many of the same security challenges. It is imperative that the supply chain partners adopt policies that will improve both the active testing and security of the materials supply needed to enable a secured vehicle compoent.
Chris Chiang
LOCATION Taipei Nangang Exhibition Center, Hall 2
4BLEVEL IntermediateSESSION TOPIC Threat Detection & ResponseSecurity by DesignEV SecuritySESSION TYPE Onsite LANGUAGE Chinese9/21 14:00 - 14:40
Security Certified Day (Cyber Talent)
From IT to CyberSecurity, which is the most valuable cert. for you?
READ MORECertificates are an evaluation system for ability. After passing through the certificate certification system, ability is affirmed. Information security is a collection of multiple sciences. Through the acquisition of certificates, bonus points are given to careers, and those certificates are the identity of the information security industry. Certificate, those who have substantial benefits, the preparation and mental journey of the examination process, the Abbot will recite the scriptures for you!!
Jason Huang (Abbot)
iTop Digital Technology PresidentISC2 Taipei Chapter Membership chairLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC Security TrainingSecurity JobCertificationSESSION TYPE Onsite LANGUAGE Chinese9/21 14:00 - 14:30
CISO Workshop (Invite-only)
IEI's experience in implementing best practices in information management and information security governance
READ MOREThis session covers practical information management and information security governance at the enterprise level. Topics include the responsibilities of the Chief Information Officer and Chief Information Security Officer and how the roles complement each other.
Sofia Chang
IEI Integration Corp. Vice PresidentLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL IntermediateSESSION TOPIC GovernanceRisk ManagementComplianceSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL GeneralSESSION TOPIC Threat Intelligence SharingSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL Intermediate SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL General SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL GeneralSESSION TOPIC Zero Trust ArchitectureNetwork VisibilitySSLSESSION TYPE Onsite LANGUAGE Chinese9/21 14:45 - 15:15
Vehicle Security Forum
The next battlefield for Taiwan's ICT industry Convergence with international standards for vehicle cybersecurity
READ MOREExplaining the information security risks of Internet of Vehicles(IoV) and the future operating model in this Cyber Security Management ecosystem through the framework of ISO 21434.
CJ Chang
PricewaterhouseCoopers Risk Consulting Taiwan Ltd. PartnerLOCATION Taipei Nangang Exhibition Center, Hall 2
4BLEVEL IntermediateSESSION TOPIC EV SecuritySupply Chain SecurityCyber Security Management System (CSMS)SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL GeneralSESSION TOPIC SOARManaged Security ServiceSecurity OperationThreat Detection & ResponseSESSION TYPE Onsite LANGUAGE Chinese9/21 14:45 - 15:15
5G Security Forum
5G LBO can help the enterprise network security
READ MOREThe insufficient visibility of enterprise intranets, caused by no common communication hub for each endpoint that brings trouble to network monitoring, has been a worry. We did learn how serious it could be in WannaCry and SolarWinds security cases. Surprisingly, private 5G technology may help. Since each 5G device should connect to some base stations (eNB or gNB), theoretically, we could inspect the complete communication data of the 5G devices when the base stations connected by them are monitored. It also implies that enterprise intranet visibility can be easily achieved if the enterprise adopts 5G, also known as the private 5G network. However, its cost could be too high to be accepted by most enterprises.
There still exists the alternative: to enable local-break-out, LBO, function on 5G operator’s network: Mobile phones or IoT devices can then directly connect to enterprise Intranet through the operator’s base stations.
We will share the details in this session about LBO technology and the business model for “5G improves enterprise security”.
Tony Wang
PacketX CTOLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL IntermediateSESSION TOPIC 5G SecurityNetwork VisibilityIoT SecuritySESSION TYPE Onsite LANGUAGE Chinese9/21 14:45 - 15:15
Threat Research Forum
APT41 Resurfaces as Earth Baku With New Cyberespionage Campaign
READ MOREIn this talk, I'll introduce analysis of Earth Baku (aka APT41)'s new cyberespionage campaign, particularly the group's use of advanced malware tools and multiple attack vectors.
Ted Lee
Trend Micro Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL IntermediateSESSION TOPIC Advanced ThreatReverse EngineeringSESSION TYPE Onsite LANGUAGE Chinese9/21 14:45 - 16:45
Hack x Forensics
In this lesson, you will be introduced to digital forensics tools and guided through hands-on lab. You will also learn about how to use the tools to analyze and evaluate the impact scope during real-world investigation and response to incidents. For an immersive experience, a hands-on lab will give participants the chance to investigate cases, experience cybersecurity experts' course of investigation, simulate hackers' tracks via remaining PC data, and to write a basic report, with our team's guidance.
MA, Hung-Wen
CHT Security EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
4DLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/21 14:45 - 15:15
Cryptography Forum
Introduction to homomorphic encryption and its application: threshold signature scheme
READ MOREIn this talk, we will introduce the fundamental definition and properties of homomorphic encryption and its application on threshold signature. Lastly, we focus on the management of private keys through threshold signature scheme.
CYC
AMIS Technologies Co., Ltd. Cryptography EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
702LEVEL IntermediateSESSION TOPIC BlockchainCryptographyDigital WalletSESSION TYPE Onsite LANGUAGE Chinese9/21 14:45 - 16:45
Enforcing Zero Trust Security in the Face of Pervasive Intrusion Threats – Get First-hand Experience of Intrusion Techniques and Rethink Your Defense Strategy
Today, people connect to corporate networks, cloud databases, and a variety applications from everywhere with all kinds of devices. Enterprises can no longer make the assumption that authenticated or trusted devices/users are secure. Therefore, the zero trust security model is an important strategy for strengthening the security of critical data and systems, especially in a hybrid, dynamic workplace. It is a more advanced, agile, and effective approach to security, compared to the traditional security model.
Comprehensive visibility and understanding of risks are the foundation of effective security prioritization and automated zero trust access controls. Unfortunately, a lot of solutions labeled as "zero trust" do not really understand how to evaluate trust.
Activities of this session include:
1.) Attack and defense drills. Get first-hand experience of hackers' stealthy intrusion techniques.
2.) Hands-on labs. From the defender's perspective, learn how to identify the root cause of an incident and determine the scope of its impact.
3.) Incident investigations. Collect evidence and think how to response with remediation measures, how to implement such measures with existing defenses, and how to stand in the executives' shoes to provide critical information for CISO and SOC teams to make informed decisions.
Peter Chiu
Trend Micro Technical ConsultantLOCATION Taipei Nangang Exhibition Center, Hall 2
4CLEVEL Intermediate SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL IntermediateSESSION TOPIC Purple TeamCyber RangeRed TeamSESSION TYPE Onsite LANGUAGE Chinese9/21 14:45 - 15:15
OT Security Forum
Cybersecurity for Smart Manufacturing with Zero Trust Approach
READ MOREZero Trust is one of the new countermeasures that has been proposed recently to achieve effective protection and co-work with industrial AIoT technologies. In this speech, we will outline the complete solutions to realize Zero Trust cybersecurity protection, and provide the practical examples for smart manufacturing applications.
LOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL IntermediateSESSION TOPIC Identity GovernanceZero Trust NetworkIoT SecuritySESSION TYPE Onsite LANGUAGE Chinese9/21 14:45 - 15:15
Cybersecurity Deployment of Smart Manufacturing Forum
The Link bewteen Information Safety and Supply Chain Management
READ MOREAfter IIOT, the information security problem cannot be prevented solely from within. A complete protection mechanism from both internal and external to handle information security issue brought by the suppliers and to improve privacy requested from the clients is imperative.
In the speech, we will be discussing: How to control the entrance of the suppliers? How to visuallise secrurity information to raise awareness? What strategy the organisation need to deploy to improve protection? The impact of improved security protection to the industry?
Shang-Chih Lee
EISO Enterprise Co., Ltd General ManagerLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL GeneralSESSION TOPIC Supply Chain SecuritySecurity StrategyIoT SecuritySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL IntermediateSESSION TOPIC Email SecuritySecurity AwarenessCyber CriminalSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL GeneralSESSION TOPIC Identity GovernanceIdentity ManagementSESSION TYPE Onsite LANGUAGE Chinese9/21 14:55 - 15:35
Security Certified Day (Cyber Talent)
Transformation Thinking:Getting started with security governance
READ MOREWhen information security governance has become a trend, have you ever thought about what is the correct concept of information security governance?
The agenda will share the four information security certificates (CISA/CISM/CRISC/CGEIT) of ISACA, and introduce why they are the goal of information security practitioners, and talk about some ways to prepare for the exam. Finally, discuss the benefits and help of the research certificate.
Kuro Huang
EY Consulting Cyber Security ConsultantLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC Security TrainingGovernanceCertificationSESSION TYPE Onsite LANGUAGE Chinese9/21 15:00 - 15:20
CISO Workshop (Invite-only)
Are you ready for the next Zero Day?
READ MOREWe will review what are some of the latest trends in the security threat landscape in the past few years.
General best practices & concept that can help us keep up with the zero day threats and deep dive into how Edgio security solution can help you respond quickly to the next critical zero day security incidence.
Sky Yu
Edgio SENIOR SECURITY SOLUTIONS ARCHITECT-APEC LeadLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL GeneralSESSION TOPIC Application SecurityWeb SecuritySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC Career PathSecurity JobSESSION TYPE Onsite LANGUAGE Chinese9/21 15:50 - 16:20
CISO Workshop (Invite-only)
How to shift the CSIRT/PSIRT from cost center to OPPORTUNITY center
READ MOREIn most enterprises, information and product security are still positioned as the cost center. How does the C ISO turn this situation around?
How to strategize and take action to demonstrate that security is not only critical to business success, but is as much a driver and competitive advantage for business continuity as the digital infrastructure and smart information it protects.
Edward Yu
Zyxel Group Corporation CISOLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL IntermediateSESSION TOPIC CSIRTPSIRTCISOSESSION TYPE Onsite LANGUAGE Chinese9/21 15:50 - 16:20
Security Certified Day (Cyber Talent)
The tips for passing and obtaining internationally competitive cybersecurity certificates : OSCP and OSEP
READ MOREOSCP and OSEP are certifications for professional Red Teamer.
Gang-Cheng Huang
National Chung-Shan Institute of Science and Technology Information Security Center Assistant Research FellowLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL IntermediateSESSION TOPIC Penetration TestingRed TeamSESSION TYPE Onsite LANGUAGE Chinese9/21 16:00 - 16:30
OT Security Forum
A View of Organizational Resources for Cybersecurity Standard Implementation: Take IEC/ISA 62443 as Example
READ MOREInternational cybersecurity standards have drawn great attention from high-technology industry, particularly automotive electronics in a post-covid period. However, business logic behind those standards are little unknown. In the past, top management thinks cyberseurity standards only as an international certificate. The current and emerging trends of cyber resilience, cybersecurity standards cover both functional and organizational purposes of cybersecurity. This talk will share insight on organizational resources for standard implementation by taking IEC/ISA 62443 as an example.
Bright Wu
ISC2 Taipei Chapter AmbassadorLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL GeneralSESSION TOPIC Industrial SecurityGovernance Risk & ComplianceCyber ResilienceSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL IntermediateSESSION TOPIC Advanced Threat ProtectionBackup and RecoverySESSION TYPE Onsite LANGUAGE Chinese9/21 16:00 - 16:30
Cryptography Forum
The Introduction of FIPS 140-3 Standard from the Perspectives in Security Development Lifecycle
READ MOREThis session of agenda brings you a brief review about the Secure Software Development Life Process (SSDLC). Then the speaker will introduce the new Cryptography Module Verification Standard from NIST: "FIPS 140-3", with the perspectives of SSDLC, and discover the needs and impacts what FIPS 140-3 brings to SSDLC, and leads you understand the benefits and difficulties of upgrading to FIPS 140-3.
Aspen Yang
LOCATION Taipei Nangang Exhibition Center, Hall 2
702LEVEL GeneralSESSION TOPIC StandardsSecurity Development LifecycleCryptographySESSION TYPE Onsite LANGUAGE Chinese9/21 16:00 - 16:30
Threat Research Forum
How to process vulnerability management and new vulnerbility response with a nice attitude?
READ MOREDue to the COVID-19 situation , working style is changing from office to remote. To make the enterprise works properly , more and more external systems are used for replacing physical work flow.
This systems like document signing or meeting services become popular and also more vulnerabilities found on them. In this presentation , the speaker will start from introducing what is a vulnerability , CVE and the interaction that enterprise should take.
Then , managers should understand the impact and place priority to fix the issue. The speaker will take 2021 Log4J as example to share some experience about how to mitigate the damage of new dangerous CVE appears.
Vic Huang
UCCU Hacker MemberLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL GeneralSESSION TOPIC Security StrategyVulnerability ManagementSESSION TYPE Onsite LANGUAGE Chinese9/21 16:00 - 16:30
Vehicle Security Forum
Driving Safely: Next-Gen Autonomous Vehicle Safety Analysis
READ MOREThis presentation will discuss the evolution of attack and defense techniques for vehicle security systems, starting from the common architecture and components of today’s vehicles and ending in an analysis of potential attack and defense techniques for the autonomous vehicles (AV) of the future. We will also discuss the potential impact and risk posed by supply chain attacks as well as the mitigations we can take today to secure the safe arrival of passengers tomorrow.
Dange Lin
CyCraft Cyber Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4BLEVEL IntermediateSESSION TOPIC EV SecuritySecurity by DesignRed TeamSESSION TYPE Onsite LANGUAGE Chinese9/21 16:00 - 16:30
5G Security Forum
Case Studies for 5G Core Network Penetration
READ MORERecent years have seen 4G and 5G gaining increasing popularity and moving towards all IP technology, leading to the booming of the Open Radio Access Network (ORAN). Seeing the increase of attacks on mobile networks, we will be sharing a few case studies in this session about how mobile networks can be compromised, in addition to two fuzz testing tools specifically designed for 5G.
Edgar Wu
Trend Micro Senior Technical ManagerSalim S. I.
Trend Micro Senior Technical ManagerLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL IntermediateSESSION TOPIC 5G SecurityPenetration TestingSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL IntermediateSESSION TOPIC Zero Trust ArchitectureIdentity ManagementThreat Detection & ResponseSESSION TYPE Onsite LANGUAGE Chinese9/21 16:00 - 16:30
Cybersecurity Deployment of Smart Manufacturing Forum
The cybersecurity guide and opportunity in smart factory
READ MOREThe IT and OT security protection capabilities with " Cyber Network Threat Scanning ", " Cybersecurity Enhancement and Deployment " and " Building a Dedicated Cybersecurity Team and System " followed by international standards IEC 62443 in smart factories. It helps users to analyze the insufficient system and assist team to operate and manage the security system efficiently.
In response to the business opportunities of OT cybersecurity in the future, ICP DAS proposes a solution that uses machine learning to quickly establish cybersecurity detection technologies and environments for industrial network protocol anomaly detection. We solve the cybersecurity issues faced by factories in the field of IIoT, and a systematic OT cybersecurity threat detection system has also been developed at the same time.
Anold Chao
ICP DAS RD directorLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC OT SecurityIndustrial SecurityIntrusion DetectionSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL IntermediateSESSION TOPIC Security StrategyBlue TeamGovernance Risk & ComplianceSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL IntermediateSESSION TOPIC Network VisibilityZero Trust NetworkThreat Detection & ResponseSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL GeneralSESSION TOPIC Red TeamSESSION TYPE Onsite LANGUAGE Chinese9/21 16:45 - 17:15
OT Security Forum
Pwning HVAC Control System
READ MORENowadays heating, ventilation, and air conditioning (HVAC) system are indispensable in many places, such as hospitals, factories, office buildings and even in residentials. Most of HVAC systems have a Human Machine Interface (HMI) and can be easily managed remotely. While convenience is improved, the security of HVAC control systems is often neglected.
This time, we have investigated popular HVAC control systems that have web-accessible HMIs. During our research, some products were found to be vulnerable to attacks such as credentials disclosure and privilege escalation. Furthermore, many of them could be found on the Internet. Since HVAC control systems are usually connected to other building systems and facility equipment, if HVAC control system is taken over, other systems would be attacked easily. In this session, we will introduce possible attack scenarios and how to mitigate these attacks.
Chicoyama
TXOne / TrendMicro 資安威脅研究員Canaan Kao
TXOne Networks DirectorLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL IntermediateSESSION TOPIC ICS/SCADA SecurityOT SecurityIndustrial SecuritySESSION TYPE Onsite LANGUAGE Chinese9/21 16:45 - 17:15
Threat Research Forum
Type Confusion in the Wild: from the security Blindspot to Abuse
READ MOREObfuscated File Extension (OFE) is a classic Web exploit technique. Hackers simply upload a JPG file to the server with arbitrary upload vulnerabilities, then use the contents of the image file as a PHP WebShell to execute. Boom! Take down the entire server.
However, in today's world of cyber attacks, has this technique never been used to attack non-Web enterprises and home computers? The answer is absolutely yes!
In this session, we will talk from the modern malware analyzer to the defense design of today's security solutions and their 1% defense blind spot. Then use several PoCs to explain how the attacker was able to increase the 1% to 100% blind spot for spoofing and winning the trust by security products by OFE tricks.
Sheng-Hao Ma
TXOne Networks Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL AdvancedSESSION TOPIC Malware ProtectionCyberwarfareAPTSESSION TYPE Onsite LANGUAGE Chinese9/21 16:45 - 17:15
5G Security Forum
Security Challenges in 5G O-RAN
READ MOREWith an open architecture and interface, O-RAN is designed to build the next-generation RANs with intelligent control. It can provide a certain degree of flexibility and customization and allow new communication interfaces between network components (e.g., O-CU, O-DU) and Radio Access Network Intelligent Controllers (RICs). Moreover, it can work with real-time detection, response, and management with machine learning (ML) algorithms on applications (xAPPs). However, the open architecture and interface also significantly increase the possibility of being attacked. This presentation not only explores the current development of the O-RAN alliance in information security, but also integrates O-RAN and Software Defined Radio (SDR) to realize an experimental network and explores the possible threats of new network components and interfaces in this experimental environment. Finally, we would also discuss the implementation of information security-related xAPP on O-RAN to enhance the security of O-RAN.
Shin-Ming Cheng
National Taiwan University of Sciecne and Technology Professor, Department of Computer Science and Information EngineeringLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL GeneralSESSION TOPIC Network SecurityMobile SecurityTelecom SecuritySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL IntermediateSESSION TOPIC Backup and RecoveryRansomwareData SecuritySESSION TYPE Onsite LANGUAGE Chinese9/21 16:45 - 17:15
Zero Trust Forum
Fighting Ransomware with Zero-Trust Strategy
READ MORERansomware is the most soaring type of security incident recently. Due to the ecosystem formation of ransomware and double extortion approach, ransomware threat to enterprises is continuously expanding. At the same time, since the US National Institute of Standards and Technology (NIST) published the SP 800-207, Zero Trust Architecture document in 2019, zero trust architecture has become the most discussed topic among security industries and enterprises. This session will describe how to take a Zero Trust security strategy to mitigate the threat of ransomware.
Albert Hsieh
EY Advisory Services Inc. Director, Enterprise Security Architecture ( ESA )LOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL GeneralSESSION TOPIC Security StrategyRansomwareSecurity ArchitectureSESSION TYPE Onsite LANGUAGE Chinese9/21 16:45 - 17:15
Cybersecurity Deployment of Smart Manufacturing Forum
How You Respond to a Customer Security Audit Matters
READ MOREBe Truthful: Use content directly from your security and compliance program
The best way to answer a question is by sharing information directly from your security and compliance program (should you have one…and you should). Share a control and/or policy document that describes how you do something. You should try to avoid making up custom answers for a question because it is difficult to keep track of the nuances in each answer in the future, in case a customer asks you about it down the line.
If you don’t have a control or policy, but it’s in your roadmap, state that, along with an approximate timeline on when you will adopt the new controls and policies. Always expect the customer to ask for proof, so don’t make up an answer you cannot back up with evidence.
Vado Yang
TUL Corporation MIS Dept. ManagerLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC Supply Chain SecuritySecurity OperationSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL GeneralSESSION TOPIC Information GovernanceGovernance Risk & ComplianceSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL GeneralSESSION TOPIC Network Detection & ResponseNetwork MonitoringSESSION TYPE Onsite LANGUAGE Chinese9/21 16:45 - 17:15
Cryptography Forum
An introduction to the development of cybersecurity laws and policies in Australia
READ MOREOver the past few years new laws and policies were introduced by the Australian Government to prevent the misuse of the Internet. The Australian Government has also emphasised the importance of equal access and has strengthened its cyber diplomacy. This session will discuss current challenges the Australian government faces in combating cybercrime. It will also briefly introduce Australia's new cyber security and cybercrime laws and policies.
Lennon Chang
Monash University Senior lecturerLOCATION Taipei Nangang Exhibition Center, Hall 2
702LEVEL GeneralSESSION TOPIC GovernanceDisinformationSESSION TYPE Onsite LANGUAGE Chinese
9/22 (Thu)
9/22 09:30 - 10:00
Manufacturing Security Forum
High-Tech Industry Analysis of Cybersecurity Posture: Comparing IT and Risk Management Views
READ MOREThe current discussion on international cybersecurity standards tends to focus more on posture than maturity. This talk will take some examples to explain the difference between posture and maturity. Based on our third-party review experiences on NIST Cybersecurity Framework, the differences between IT and risk management views are examined. In addition, due to the implementation of NIST Cybersecurity Framework by SEMI Taiwan, its implication to semiconductor industry will be updated.
Bright Wu
ISC2 Taipei Chapter AmbassadorLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL GeneralSESSION TOPIC NIST Cybersecurity FrameworkGovernance Risk & ComplianceCyber ResilienceSESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 10:00
Threat Research Forum
Threat Intelligence: APT41's New Subgroup? Dissecting Chinese APT "Tianwu" Latest Operations in the APAC Region
READ MOREAPT41 (aka Winnti, Amoeba) is a notorious Chinese APT group. In recent years, TeamT5 CTI team observes that the group has developed into multiple subgroups and it has posed a serious threat to companies in the APAC region. In this talk, we will cover an emerging Chinese APT group named "Tianwu," which was first spotted in 2020. We found that there are several TTPs overlap between Tianwu and APT41. Tianwu's proprietary tool, Pangolin8RAT, is a modular trojan that supports at least 8 communication protocols. Our talk will also provide our outlook on the group's future development as well as actionable intelligence for enterprises.
Silvia Yeh
TeamT5 Cyber Threat Intelligence Team / Cyber Threat AnalystLeon Chang
TeamT5 Cyber Threat Intelligence Team / Cyber Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL IntermediateSESSION TOPIC APTThreat IntelligenceReverse EngineeringSESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 10:00
Blue Team Forum
Taking Apart Misconfiguration - The Attack Path in Active Directory Environment
READ MOREThis talk briefly presents several misconfigurations that are abused by attacker to compromised domain controller. In advance, taking apart an attack path from usually ignored misconfigurations allowing attacker to control entire Active Directory service.
Mars Cheng
TXOne Networks Manager, PSIRT and Threat ResearchDexter Chen
TXOne Networks Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4BLEVEL IntermediateSESSION TOPIC Red TeamActive Directory SecurityEnterprise SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 10:00
ISG Forum
Cyber Risk Quantification, a business focused approach to cyber risk management.
READ MOREHow much cyber risk do we have? Is our cyber budget aligned with the business operational risk? Are our cyber risk management options cost-effective? In order to answer aforementioned questions, we must approach cyber from a business risk perspective where we review business processes, technology applications and risk scenarios. The FAIR approach can guide us to perform both qualification and quantification cyber risk analysis. Help us clarify any uncertainty in cyber risk, and quantify risks in financial values. This will allow cyber risk to be a crucial part of financial liquidity management.
Anthony Lee
Marsh AsiaLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL IntermediateSESSION TOPIC Risk ManagementGovernance Risk & ComplianceCyber Risk QuantificationSESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 10:00
xSecurity Forum
A Beacon of Light in the Darkest AD: Attack Path Visualization with AI Simulation
READ MORECompleting our CyCraft trilogy of CyberSec talks, we will discuss the critical importance of proper privilege management. Windows AD is the heart of Enterprise IT cybersecurity. Yet while it is a top security priority, it can also be the darkest enigma and a monster to unravel. AD security is difficult to measure. In this presentation, we will introduce a new AI analysis method for AD security, combining the confrontational thinking between red and blue teams to better help outline the boundaries of enterprise cybersecurity and increase visibility and metrics for AD security. This is a Birdman session you cannot miss.
Jeremy Chiu / Birdman
CyCraft Technology Corporation Founder & CTOLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL IntermediateSESSION TOPIC Machine LearningRed TeamSESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 10:00
Cloud Security Forum
How to Best Assess Your Cloud Security
READ MOREMany threats to your cloud security result from improper IAM or insecure configuration settings; such threats typically need to be prevented through inventory and risk assessments. Unfortunately, many services are out of the network admins’ control, complicating assessments and severely raising risk. In this presentation, we will discuss how to best assess cloud security; how to use different frameworks/methods to examine cloud assets, their corresponding risks, and security levels; and discuss real-world security incidents.
Boik Su
CyCraft Technology Senior Cyber Security ResearcherDange Lin
CyCraft Cyber Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL IntermediateSESSION TOPIC Cloud SecurityIdentity ManagementPolicy ManagementSESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 10:00
Public-Private Sector Partnerships: The Key to Success in Confronting Cyber Threats
READ MOREThreat actors anonymously carry out attacks at their will, stealing sensitive information, deploying ransomware on critical infrastructures, and conduct denial-of-service attacks to disrupt services, inflicting damages to the economy and causing wide-spread panic in society.
Government agencies, as capable as they are, cannot defend against and mitigate these threats alone. It must be a coordinated effort between governments, corporations, NGOs, sharing information and intelligence. There must also be a change in people’s mindset on cybersecurity, from the end user to IT administrators, to the managers, to minimize the risks of the human factor.
James H
U.S. Law Enforcement ProfessionalLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL GeneralSESSION TOPIC Threat Intelligence SharingHuman FactorSESSION TYPE Pre-recorded Video LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 11:30
Security! The website has been hacked again!
The security flaws seem to be unrelated, yet altogether could cause a catastrophe? Vulnerabilities already patched, yet your website is still constantly hacked? Let the cybersecurity consultant with years of real-world experience from CHT Security share with you. Common website offensive techniques and countermeasures will be explained. You will also learn how to uncover root cause and block hackers from the defensive web via hands-on lab.
(Suitable for: website administrator/system developer/those interested in information security)
WANG, Kai-Ching
CHT Security Cybersecurity ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
702CLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 11:30
We found the problem, then what ? How to effectively reduce the risk after vulnerability scanning and penetration testing
This lab will focus on security problems that cannot be solved by software updates. We choose some common website security issues as examples. After analyzing root cause of issues. First try to modify the code from the inside to solve the problem, and try to solve the problem. Block the problem from the outside, and use a series of implementations to understand the common handling methods of vulnerabilities in practice and the impact on the original service. The goal is to help who are begin to fix security issues after completing a vulnerability scan or penetration test.
Nick
Cymetrics Senior Security EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
4CLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 11:30
Automatic IoT Firmware Emulation and Dynamic Analysis
Dyanmic analysis is a useful solution for malware analysis while the complicated IoT hardware architecture and peripherals make automatic emulation of IoT devices challenging. This course will focus on how to apply recent firmware rehosting technologies (such as Firmadyne, FirmAE) to operate commerical firmware in emulated IoT systems. Moreove, we will introduce well known vulnerability discoverying tools to enable dynamic analysis to the emulated IoT devices.
Shin-Ming Cheng
National Taiwan University of Sciecne and Technology Professor, Department of Computer Science and Information EngineeringLOCATION Taipei Nangang Exhibition Center, Hall 2
4DLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 11:30
Practical Threat Hunting
This course will introduce attendees to the basics of threat analysis, threat detection and designing behavioral solutions. Attendees will learn to perform threat hunting to facing red-team tactics. To keep the attendees focus on hunting thread, we leverage open source tool to design our behavioral solutions.
Will Huang
Team T5 R & D EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
702ABLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 10:00
Zero Trust Forum
Building Zero Trust Architecture from the CISO Perspective
READ MORECurrently, the trend of digital transformation has brought several new channels to access organizational resources. Therefore, the advanced persistent threat (APT) attacks become more and more serious. If organizations just deploy security mechanism on perimeter, once cracks can access the organizational internal network, they may move laterally to attack any organizational resources. Therefore, several countries have requested their agencies and organizations in the countries to adopt measures to achieves strategic goals of zero trust. The requirements can be used for CISOs to define security blueprints for their organizations. In this speech, I will introduce how to adapt security architecture to meet the requirements of zero trust.
Shi-Cho Cha
National Taiwan University of Science and Technology Professor and Chair of the Departmemt of Information Management, and Director of TWISC@NTUSTLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL IntermediateSESSION TOPIC Security ArchitectureAccess ControlSESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 10:00
Supply Chain Security Forum
The Way from PSIRT to Security by Default
READ MOREProduct safety is no longer a sunk cost but a sharp tool for future business competition.
How to use the PSIRT operation experience to make rapid progress in product design towards the goal of "Security by Default", in line with general information security standards and a sound information security certification system, and strengthen product competitiveness.
Neko C. Y. Lee
Unizyx Holding Corporation Information & Product Security Management Division / DirectorLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC Security by DesignPSIRTComplianceSESSION TYPE Onsite LANGUAGE Chinese9/22 09:30 - 09:35
FINSEC Forum
Opening Remarks
LOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/22 09:35 - 09:45
FINSEC Forum
【FINSEC Forum】Distinguished Guest’s Remark
READ MOREDistinguished Guest’s Remark
JEAN CHIU
Financial Supervisory Commission Vice ChairpersonLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/22 09:45 - 10:15
FINSEC Forum
Financial Supervisory Commission Director General of Department of InformationLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 10:00 - 10:25
Cyber Talent Forum (Cyber Talent)
From CTF to Threat Research
LOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL Intermediate SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL GeneralSESSION TOPIC Network SecurityIoT SecurityInternet of ThingsSESSION TYPE Onsite LANGUAGE Chinese9/22 10:15 - 10:45
Blue Team Forum
Adaptive Blue Team - How Enterprise Blue Team survive under Regulation , Threats , and Resillence
READ MOREThis topic first discusses the various requirements of regulations, threats, and resilience that corporate blue teams need to face, and then, based on the above-mentioned requirements, if an enterprise needs to build an autonomous blue team, the capabilities and resource requirements it needs to have, and through the concepts of BAS and MITRE ATT&CK and related tools or solutions to discuss how to conduct blue team verification, and finally integrate the enterprise blue team theory of how to continuously evolve.
Jack Chou
GERTECH Technology Threat ConsultantLOCATION Taipei Nangang Exhibition Center, Hall 2
4BLEVEL IntermediateSESSION TOPIC Blue TeamCyber HuntingThreat Detection & ResponseSESSION TYPE Onsite LANGUAGE Chinese9/22 10:15 - 10:45
ISG Forum
How to cope with the risk and control of information security system?
READ MOREIntroduce the situational crime prevention theory and information security internal control, and how to apply to coping strategies.
Carey Sung
TRI Head of internal auditLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL GeneralSESSION TOPIC ComplianceRisk ManagementSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC Supply Chain SecurityOT SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 10:15 - 10:45
Manufacturing Security Forum
The Four Steps to CISO Success: Plan, Predict, Prepare, Practice
READ MOREThe digitalization of business in the 21st century continues to dramatically increase convenience and severe security risks. The CISO is tasked with navigating leadership through the ever-changing and treacherous cyber landscape. This presentation will discuss four common challenges every CISO must face:
The CEO: Is your InfoSec budget not enough?
The Board: Isn’t it safe enough for now?
The CFO: Do you really need to spend so much?
Yourself: Are we ready for a Red Team assessment?
Each of these questions requires regularly assessing and having a comprehensive understanding of your environment’s digital assets; protection practices and policies; current cybersecurity technologies and tools; operational protocols; and the capabilities of your security team.
Benson Wu
CyCraft Co-Founder & CEO, CyCraft TechnologyLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL IntermediateSESSION TOPIC Cyber ResilienceCISOCDMSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL GeneralSESSION TOPIC RansomwareEndpoint Detection & ResponseData Loss PreventionSESSION TYPE Onsite LANGUAGE Chinese9/22 10:15 - 10:45
Zero Trust Forum
From "Work-from-Home" to "Work-from-Anywhere"- post-pandemic Digital Transformation in a Zero Trust approach
READ MOREAre you ready to the extend your Work-from-Home to Work-from-Anywhere? Join our speaker to know more about how to prepare for your next phase of digital transformation in a Zero Trust approach.
Aaron Tseng
Zscaler Senior Technical Consultant, ASEAN & GCR,LOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL GeneralSESSION TOPIC Zero Trust ArchitectureCloud SecurityDigital TransformationSESSION TYPE Onsite LANGUAGE Chinese9/22 10:15 - 10:45
Threat Research Forum
Collecting In the Dark: Tropic Trooper Targets Transportation and Government
READ MOREIn this session, we'll be talking about an APT group that targets organizations in Taiwan -- the Tropic Trooper, which is dubbed "Earth Centaur" by Trend Micro. As our research shows, this group has targeted multiple government agencies and transportation companies using customized backdoors such as SmileSvr, ChiserClient, and Lilith RAT tailored to individual targets. According to our observation, this campaign has been going on for at least over a year now.
Ted Lee
Trend Micro Threat ResearcherVickie Su
Trend Micro Threat ResearcherNick Dai
Trend Micro Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL IntermediateSESSION TOPIC APTThreat IntelligenceSupply Chain SecuritySESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL IntermediateSESSION TOPIC Threat IntelligenceThreat Analysis & ProtectionHackers & ThreatsSESSION TYPE Onsite LANGUAGE Chinese9/22 10:15 - 10:45
xSecurity Forum
Capture the key from the air ! Security discussion of side-channel attack
READ MOREThe agenda will introduce several common side-channel attack techniques to explain the prerequisites and difficulties needed to implement these types of attacks, and further analyze how existing technologies solve these difficulties and their advantages and disadvantages. Finally, through encryption Signal positioning technology demonstrates the automation of the side-channel attack process with a low threshold, showing the importance of side-channel attack detection.
CHIHWEI CHEN
INSTITUTE FOR INFORMATION INDUSTRY Deputy Director, Cybersecurity Technology InstituteLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL IntermediateSESSION TOPIC Side-chanel AttackHardware SecurityHackers & ThreatsSESSION TYPE Onsite LANGUAGE Chinese9/22 10:15 - 11:15
FINSEC Forum
Financial Supervisory Commission Director General of Department of InformationDr. Pei-Wen Liu
First Commercial Bank Executive Vice President & CISOEric Hsin
CTBC Financial Holding Executive Vice PresidentFrank Su
Fubon Financial Holding Co., Ltd CISO and CIO Vice PresidentConee Lin
Cathay Financial Holdings Co., Ltd Executive Vice President陳斌
Chang Hwa Commercial Bank Head Office / Executive Vice PresidentRomance Su
Mega International Commercial Bank Information Security Department / VICE PRESIDENT & DEPUTY GENERAL MANAGERLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL Intermediate SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC Threat Intelligence SharingSESSION TYPE Pre-recorded Video LANGUAGE Chinese9/22 10:50 - 11:15
Cyber Talent Forum (Cyber Talent)
From Navy to Think Tank
READ MOREBased on her own experience, she will present her career from military preparations to cyber security professions, as well as the true meaning of “Cyber Security is National Security” in INDSR.
Hung,Chia-Ling
INDSR Division of Cyber Security and Decision-Making Simulation Assistant Research FellowLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC National SecuritySecurity JobSESSION TYPE Onsite LANGUAGE Chinese9/22 11:00 - 11:30
Cloud Security Forum
The way to sign-in is transforming! Typing passwords is becoming a legacy method.
READ MOREIn the B2B world, many systems are still using ID and password to sign-in. However, it is changing rapidly. As more companies use SaaS/cloud services and as those services become more crucial to the business, many companies are now concerned about how securely they can access. Today, not only has the use of MFA(Multi-Factor Authentication) become the “must” method but also there are several new ways of keeping access secure. This session will explain the latest trend of securing access to SaaS and cloud.
Go Nakakomi
HENNGE Taiwan Managing DirectorLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL GeneralSESSION TOPIC Cloud SecurityAccess ControlMulti-Factor AuthenticationSESSION TYPE Onsite LANGUAGE English9/22 11:00 - 11:30
Attack Surface Management (ASM) & DNS Security: Facts and Challenges for Major Taiwanese Brands.
READ MOREASM (Attack Surface Management) of enterprise information security is an important task for large enterprises around the world in recent years, from using domain names and IP addresses to strengthening their management models and raising them to the information security level. The keynote speech on ASM will reveal how well-known brands in Taiwan handle ASM, and the whole management cycle of ASM will also be explored, with examples from world-renowned financial institutions and Internet service providers.
Ching Chiao
WhoisXMLAPI Senior AdvisorLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/22 11:00 - 11:30
Threat Research Forum
Tech War: EDR vs Windows Malware
READ MOREBecause ETW can record detailed and diverse logging information, it has become an important source of information in tools and services such as incident response, antivirus software, and EDR. With a focus on .NET malware, this presentation will discuss how to best leverage ETW to monitor system behavior and detect malicious activity as well as how to identify critical system events, locate key digital forensic evidence of malicious activity, and filter malicious from suspicious activity.
Gary Sun
CyCraft Cyber Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL IntermediateSESSION TOPIC Endpoint SecurityEndpoint Detection & ResponseThreat Analysis & ProtectionSESSION TYPE Onsite LANGUAGE Chinese9/22 11:00 - 11:30
ISG Forum
The sustainable Road of Cyber Security of Taipei City Government
READ MOREHow does Taipei City respond to the diverse governmental organization culture and structure, and how to do a good job of sustainable cyber security operations under the legal compliance of the Cyber Security Law, including management organizations, platforms, exposure management and sustainable cyber security practices, Allow government investment to effectively exert sustainable benefits.
1. Management organization: government-level cyber security chief committee, government cyber security audit committee, audit tracking review meeting, red and blue team structure.
2. Management Platform: Threat and Vulnerability Management Platform.
3.Threat Exposure management: Tier-Model permission control model, firewall information security review.
4.Sustainable Cyber Security:Secure By Default、Continous Compliance(Cyber Security check and GCB)、DevOps、SOAR。
Shih Yu Yang
Ministry of Health and. Welfare. System AnalystLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL IntermediateSESSION TOPIC ComplianceDevSecOpsSecurity by DesignSESSION TYPE Onsite LANGUAGE Chinese9/22 11:00 - 11:20
Manufacturing Security Forum
Equip yourself with XDR solutions for Advanced Threats
READ MOREAccording to the research report, the proportion of the global manufacturing industry attacked by advanced threats has been increasing in recent years. It simply not enough to meet the ever-evolving threats by using the traditional security tools. Organizations require more open and comprehensive solutions that provide deeper visibility, more intelligent automation and situational insights across endpoints, networks, clouds, and applications. This session will introduce you a new approach to threat detection and response: the industry's first comprehensive Extended Detection and Response (XDR) solutions.
Ted Liu
IBM Taiwan Senior Technical Consultant of Software Business GroupMike
Pershing Data Corporation Product ManagerLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL GeneralSESSION TOPIC Threat ManagementZero Trust ArchitectureData SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 11:00 - 11:30
Blue Team Forum
DNS security - Hidden Threats: A study on Top 100 Firms in Taiwan
READ MOREDNS security is a lesser known and often overlooked field in cybersecurity. Did you know that it only takes a few button presses and commands to completely take over a company’s website or retrieve all their subdomains? DNS vulnerabilities are mind-blowingly naive, easily neglected, ubiquitous, yet surprisingly powerful.
In this session, we will explore a few common DNS vulnerabilities and their causes, then demonstrate the severity of these issues with a study on the top 100 companies. We hope to raise awareness on DNS security and teach the audience how to detect and fix these issues.
Crystal Wu
Gimmemeat 成員 PlayerLOCATION Taipei Nangang Exhibition Center, Hall 2
4BLEVEL GeneralSESSION TOPIC Cyber ExposureDNS SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 11:00 - 11:30
xSecurity Forum
Attack surface on Metaverse
READ MOREMetaverse is a term that catches a lot of attention lately. Are you keeping up with its pace? This session will start with a discussion of Web3, which is the economic foundation of Metaverse, then moves on to topics such as crypto-currencies, decentralization, and their connection with Metaverse, rounding out with foreseeable attacks.
Sam Ku
Trend Micro Head of Metaverse SecurityLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL GeneralSESSION TOPIC BlockchainFraud PreventionSESSION TYPE Onsite LANGUAGE Chinese9/22 11:00 - 11:30
Supply Chain Security Forum
Gordian knot - Globalization of Supply Chain
READ MORENowadays, the cooperation of the global supply chain is as complex as the Gordian knot in ancient Greek mythology, but today, unlike Alexander the Great in ancient times, we do not have the ability to cut off problems with a single sword. Therefore, how to deal with effective management and examination of cyber supply chain security has always been the goal of enterprises. This agenda will focus on providing corresponding solutions for the strengthening of third-party cyber security risk management.
Julian Su
iSecurity Inc. PresidentLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL GeneralSESSION TOPIC Supply Chain SecurityCyber Supply Chain SecurityCyber Supply ChainSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL GeneralSESSION TOPIC RansomwareIncident ResponseSESSION TYPE Onsite LANGUAGE Chinese9/22 11:00 - 11:30
Zero Trust Forum
The importance of Privilege Access Management in Modern Workforce
READ MOREZero Trust Privilege / Elevation & Delegation
Jacky Su
Delinea Taiwan Regional Senior Sales ManagerLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL IntermediateSESSION TOPIC Privilege ManagementPassword ManagementZero Trust ArchitectureSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL IntermediateSESSION TOPIC Digital TransformationSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL General SESSION TYPE Pre-recorded Video LANGUAGE Chinese9/22 11:20 - 11:50
Manufacturing Security Forum
Practical Attack Vectors and Their Ideal Defensive Strategies for Critical Manufacturing
READ MOREIn this talk, we surveyed firsthand many real ICS and SCADA systems, performing penetration testing on several of them. We counted the attack vectors present in this real ICS environment. In our presentation, we will share serveral real-world ICS and SCADA examples on Critical Manufacturing. We will also give a behind-the-scenes view (starting with real-world ICS security assessment) based on different ICS/SCADA systems in several CI sectors. Finally, we will provide serveral sample attack demos. We recreated these in our lab to demonstrate the attacks against real-world ICS equipment in-depth. We will also review 6 common defense strategies to help secure an ICS environment. We believe that such an analysis will help the enhancement of subsequent defense strategies.
Mars Cheng
TXOne Networks Manager, PSIRT and Threat ResearchCanaan Kao
TXOne Networks DirectorLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL IntermediateSESSION TOPIC ICS/SCADA SecurityRed TeamCritical Infrastructure ProtectionSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/22 11:35 - 12:05
FINSEC Forum
供應鏈攻擊手法解析與抵禦之道
READ MORETechnology powers everything in our lives from our personal day-to-day lives to the day-to-day operations of the world’s largest industries and enterprises. Supply chain attacks pose grave risk as their impact is far more reaching and their damage far more severe than ever before.
In Nov 2021, it was reported that several well-known securities firms—as well as Taiwan’s greater financial sector—were targeted by credential stuffing attacks. However, an in-depth digital forensic investigation and detailed malware analysis by CyCraft concluded that the China-sponsored threat group APT10 had launched this series of sophisticated intrusions by exploiting one supply chain vulnerability, affecting multiple Taiwan institutions across the financial sector.
In this talk, we will share our forensic investigation results into this novel attack, including analyses of the leveraged tools, attack techniques, and malware. We will also discuss what this new attack behavior in China-state threat groups means for Taiwan, our financial institutions, and Taiwan’s cyber defense strategies against supply chain attacks.
Jeremy Chiu / Birdman
CyCraft Technology Corporation Founder & CTOLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL IntermediateSESSION TOPIC Cyber Supply Chain SecurityBlue TeamFinTechSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL GeneralSESSION TOPIC Governance Risk & CompliancePenetration TestingCyber Supply Chain SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 12:15
xSecurity Forum
Research on the Security of Smart Contracts in Decentralized Financial Applications
READ MOREDecentralized finance began to flourish in the second half of 2020, and information security incidents broke out one after another, mainly related to code security.This research intends to use the current attack process of various common DeFi projects to analyze the vulnerabilities, including flash loans, oracles, governance projects, etc., and provide smart contract security writing or solutions for cases, so that decentralized financial projects can be more intelligent The contract part can fundamentally slow down attacks from outside.
Alice Hsu
Trend Micro Metaverse Security / EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL IntermediateSESSION TOPIC BlockchainCryptographySESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 12:15
Blue Team Forum
AD Security and Maintenance: Cumulative Assessment of AD Security Issues and Expanding Security Boundaries
READ MORECybercriminals are capable of penetrating your defenses, accessing your Active Directory (AD), and planting backdoors to maintain persistence. This presentation covers traditional AD attack methods, explains the root causes of AD vulnerabilities, and goes into more recent AD attack methods observed in real-world security incidents. By better understanding the breadth of AD attack techniques, AD managers and defenders can better defend against active and emerging security threats.
John Jiang
CyCraft Cyber Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4BLEVEL AdvancedSESSION TOPIC Incident ResponseHackers & ThreatsThreat Analysis & ProtectionSESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 12:15
Threat Research Forum
There's no S(Security) in macOS SIP
READ MORESix years ago, since the advent of System Integrity Protection (SIP) framework on macOS Yosemite, a protection mechanism protects files from being modified even with elevated privileges, which Apple deeply trusts to stop systems being maliciously tampered with or having data being stolen. Apple does not believe in empowering the users and went down a road of taking away privileges from users.
However, during these six years, we have seen more and more attacks allowing bypassing SIP to make modification to crucial files within the system. Moreover, multiple articles on the Internet instruct you to disable SIP entirely. We will introduce multiple bypasses for SIP in this session, and how Apple implemented this protection in the first place.
Ta-Lun Yen
TXOne Networks Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL IntermediateSESSION TOPIC Exploit of VulnerabilityMalware ProtectionSESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 13:45
Security! The website has been hacked again!
The security flaws seem to be unrelated, yet altogether could cause a catastrophe? Vulnerabilities already patched, yet your website is still constantly hacked? Let the cybersecurity consultant with years of real-world experience from CHT Security share with you. Common website offensive techniques and countermeasures will be explained. You will also learn how to uncover root cause and block hackers from the defensive web via hands-on lab.
(Suitable for: website administrator/system developer/those interested in information security)
WANG, Kai-Ching
CHT Security Cybersecurity ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
702CLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 13:45
We found the problem, then what ? How to effectively reduce the risk after vulnerability scanning and penetration testing
This lab will focus on security problems that cannot be solved by software updates. We choose some common website security issues as examples. After analyzing root cause of issues. First try to modify the code from the inside to solve the problem, and try to solve the problem. Block the problem from the outside, and use a series of implementations to understand the common handling methods of vulnerabilities in practice and the impact on the original service. The goal is to help who are begin to fix security issues after completing a vulnerability scan or penetration test.
Nick
Cymetrics Senior Security EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
4CLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 13:45
What is threat intel about anyways?
What is threat intelligence about? What do the researchers do exactly? Where do I even begin looking into malware? All and more will be answered in our lab session!
Still Hsu
TeamT5 Cyber-threat Intelligence ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4DLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 13:45
Practical Threat Hunting
This course will introduce attendees to the basics of threat analysis, threat detection and designing behavioral solutions. Attendees will learn to perform threat hunting to facing red-team tactics. To keep the attendees focus on hunting thread, we leverage open source tool to design our behavioral solutions.
Will Huang
Team T5 R & D EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
702ABLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 12:15
Supply Chain Security Forum
Software Supply Chain Attacks and Weaponization - Open Source Software and Mitigation Strategies
READ MORETake a look at the supply chain attack solutions offered by vendors and review recent months of supply chain attacks.
Ant Yi-Feng Tzeng
TGONetworks Taipei Chapter MemberLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC Supply Chain SecurityCyber Supply ChainCyber Supply Chain SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 12:15
Ransomware Solution Forum
Interpret REvil Ransomware Defense Using MITRE ATT&CK Framework
READ MOREThis session provides introduction to the MITRE ATT&CK Framework and how to analyze notoriously REvil Ransomware based on this framework.
Lastly, MITRE ATT&CK Framework's defense will be covered.
Billy
Crypto.com 資安工程師LOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL IntermediateSESSION TOPIC MITRE ATT&CKSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 12:15
ISG Forum
Business Continuity & Cyber Resilience in Digital Transformation
READ MOREIn this agenda, lecturers share the current status of digital transformation in the industry, as well as the trends in business continuity management regulations and corporate response trends, and discuss current corporate challenges and put forward suggestions, hoping to enable companies to promote operational transformation while also taking into account risk management.
Christina Tseng
EY Consulting Managing DirectorLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL GeneralSESSION TOPIC Cyber ResilienceBusiness Continuity & Disaster RecoverySESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 12:15
Cloud Security Forum
How to Build a Secure network Platform on AWS
This session are talking about creating a cloud network and security architecture that meets requirements for scale, performance and automation.
We will introduce for creating a cloud architecture, how to design network subnet and what benefit with IAM in AWS. This will take into account critical operational and autoscaling and troubleshooting requirements.
LOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL IntermediateSESSION TOPIC Cloud SecuritySecurity by DesignSESSION TYPE Onsite LANGUAGE Chinese9/22 11:45 - 12:00
Cyber Talent Forum (Cyber Talent)
Turkey Li
TeamT5 D39 Vulnerability Research Team Project ManagerLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC Threat IntelligenceHackers & ThreatsCareer PathSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC Security JobCareer PathSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/22 14:00 - 14:30
Tech Briefing
數位身分識別與存取管理策略藍圖
READ MOREEnterprises are facing great challenges due to the epidemic, but they are also accelerating the pace of digital transformation. In the post-epidemic era, while applying emerging technologies to sustainably operate, they should also pay attention to the importance of identity identification and access management. Enterprises should properly define and manage the identity role of each network user and the access rights of the resources required, and manage the access rights of the resources required by the identity role life cycle, and implement privileged account management and identity governance. and customer identification and access management.
Chris Chen
Deloitte Taiwan VPLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL IntermediateSESSION TOPIC Identity GovernanceSESSION TYPE Onsite LANGUAGE Chinese9/22 14:00 - 14:30
OT Security Forum
Declare war against Cyberattack!A practical guide toward Cyber Security responsibility of Level-B.
READ MOREThe agenda makes an outline with the matters about the specific non-goverment agency of Cyber Security responsibility of Level-B. By sharing experiences and recommanding useful tips, lecturer will analyze the system aspect conducted.
Caron Oran
State-Owned Enterprises Computer and Information Security EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL GeneralSESSION TOPIC LawISO 27001SESSION TYPE Onsite LANGUAGE Chinese9/22 14:00 - 14:30
Ransomware Solution Forum
No More Ransomware in Critical Infrastructure!
READ MOREAttacks on critical infrastructure are becoming more and more rampant, especially since 2019. Ransomware has become a necessary subject of study for stakeholders and personnel, and has also had a substantial operational impact on industrial control system (ICS) environments. The continuous evolution of ransomware and the peculiarities of the ICS environment make it difficult to ensure that ICSes are protected from ransomware attacks under operating conditions. In this talk, in addition to in-depth analysis of the ransomware behaviors and ransomware-related techniques that have affected ICS environments, we also propose effective defense methods and strategies perfected to ICS environments to strengthen protection against ransomware.
Mars Cheng
TXOne Networks Manager, PSIRT and Threat ResearchHank Chen
TXOne Networks Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL IntermediateSESSION TOPIC RansomwareICS/SCADA SecurityThreat Detection & ResponseSESSION TYPE Onsite LANGUAGE Chinese9/22 14:00 - 14:30
Threat Research Forum
Attacking Web without JavaScript - CSS injection
READ MOREWhen speaking of web security in front-end, XSS is the first thing that comes to mind. But, even without JavaScript, the attacker can still use other attack vectors like HTML injection and CSS injection!
Cymetrics Cymetrics Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL IntermediateSESSION TOPIC Web SecurityWeb Service SecuritySide-chanel AttackSESSION TYPE Onsite LANGUAGE Chinese9/22 14:00 - 14:30
Red Team Forum
How to use Red Team Assessment properly?
READ MOREThe red team assessment has entered its fifth year in Taiwan, and when companies are at different levels of information security maturity, they have completely different ideas and expectations for the execution and results of the red team assessment. We hope that through this speech, enterprises can know how to choose targets, determine the suitable scope, coordinate attack methods, organize blue team response methods, and plan follow-up information security improvement measures for different information security maturity levels, so that enterprises can set a truly suitable red team assessment service for themselves.
Allen Own
DEVCORE CEOLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL IntermediateSESSION TOPIC Red TeamPenetration TestingRisk AssessmentSESSION TYPE Onsite LANGUAGE Chinese9/22 14:00 - 14:30
Blue Team Forum
The Imitation Game: From Christopher to Modern Warfare
READ MOREIn today's asymmetric cyberwarfare, how do you decipher the concepts and methods behind hackers' techniques, or even their targets? And how do security teams demonstrate their value by ramping up their defenses through higher accuracy intelligence and resources? This session will show you how to decipher hackers' attack patterns across different time and locations in order to defend against such attack.
Trend Micro Technical ConsultantLOCATION Taipei Nangang Exhibition Center, Hall 2
4BLEVEL GeneralSESSION TOPIC Blue TeamThreat Intelligence SharingRansomwareSESSION TYPE Onsite LANGUAGE Chinese9/22 14:00 - 14:30
xSecurity Forum
Mandarin-language Information Operations Regarding Russia’s Invasion of Ukraine
READ MOREIn this speech, we take the Chinese and Russian media combining the Azov Battalion with Hong Kong's "Anti-ELAB Movement" as an example to illustrate how China and Russia cooperate to spread disinformation to the Mandarin-speaking world and influence the attitudes of Chinese readers. In addition, we also analyze Weibo and Facebook's data from February 22 to March 8, with "Nazis" and "Azov Battalion" as keywords, to see the trends on different platforms.
Jerry
Doublethink Lab AnalystLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL GeneralSESSION TOPIC Information OperationDisinformationSESSION TYPE Onsite LANGUAGE Chinese9/22 14:00 - 14:30
FINSEC Forum
Zero Trust Architecture: a paradigm shift in cybersecurity and privacy
READ MOREIncreasingly complex cyber-attacks and a reactive but sophisticated regulatory landscape are pushing companies’ cybersecurity capabilities to the limits. A paradigm shift in IT security architecture – Zero Trust – has attracted increasing attention as a way of responding to these challenges. By enforcing a ‘no trust without verification’ policy, Zero Trust strengthens a company’s cybersecurity posture by making cyber issues more visible and facilitating compliance with data and system protection requirements.
Wayne
PwC Taiwan Executive DirectorLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL GeneralSESSION TOPIC Network Access ControlEndpoint SecurityComplianceSESSION TYPE Onsite LANGUAGE Chinese9/22 14:00 - 14:30
AI Security Forum
AI in Security and Security in AI
Yuh-Jye Lee
National Yang Ming Chiao Tung University ProfessorLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL GeneralSESSION TOPIC AI SecurityAISESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC ComplianceSESSION TYPE Onsite LANGUAGE Chinese9/22 14:00 - 14:10
Security Vision Forum
【Security Vision Forum】Distinguished Guest’s Remark
READ MOREDistinguished Guest’s Remark
Ms. Kao, Ching-Ping
Financial Supervisory Commission Securities and Futures Bureau Deputy Director-GeneralLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL General SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC Network SecurityIndustrial SecuritySecurity OperationSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL GeneralSESSION TOPIC ComplianceSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL General SESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC Security StrategyCyber Supply Chain SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 14:30 - 16:30
Automatic IoT Firmware Emulation and Dynamic Analysis
Dyanmic analysis is a useful solution for malware analysis while the complicated IoT hardware architecture and peripherals make automatic emulation of IoT devices challenging. This course will focus on how to apply recent firmware rehosting technologies (such as Firmadyne, FirmAE) to operate commerical firmware in emulated IoT systems. Moreove, we will introduce well known vulnerability discoverying tools to enable dynamic analysis to the emulated IoT devices.
Shin-Ming Cheng
National Taiwan University of Sciecne and Technology Professor, Department of Computer Science and Information EngineeringLOCATION Taipei Nangang Exhibition Center, Hall 2
4CLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 14:30 - 16:30
What is threat intel about anyways?
What is threat intelligence about? What do the researchers do exactly? Where do I even begin looking into malware? All and more will be answered in our lab session!
Still Hsu
TeamT5 Cyber-threat Intelligence ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4DLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 14:30 - 14:55
Cyber Talent Forum (Cyber Talent)
Blockchain Security: How to Become The Most Sought-After Talent In the Coming Era
READ MOREIn this session, Tim will share his experience and stories to walk the audience through what he's learned about the cybersecurity industry over the years.
The presentation will cover a wide ranges of topics, including: brief introduction to blockchain, trend analysis of the blockchain security industry, tips to entrenpreneurship in the blockchain industry, how to cooperate with experts across the globe, and an overview of the competitive package available for blockchain security talents.
Tim Hsu
CYBAVO Co-FounderLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC Secure CodingBlockchainDevSecOpsSESSION TYPE Onsite LANGUAGE Chinese9/22 14:30 - 15:00
Security Vision Forum
Discloses Practice of Information Security Management in Annual Report
READ MOREIn November 2011, the Financial Supervisory Commission revised the " Regulations Governing Information to be Published in Annual Reports of Public Companies ", requiring all listed companies and publicly issued companies to disclose the operational overview of the information security management in their annual reports, including: information security risk management structure, information security policies, information security specific management plans, and resources invested in information security management, etc.. If there is a major information security incident, the losses suffered, possible impacts and countermeasures should also be explained. This year (111) is the first implementation of this requirement, and the content disclosed by each company can be viewed in the annual report. In this sharing, I will analyze the information related security actions disclosed by major listed companies, and discuss the direction and principles of disclosure from the information security practice, how to let investors and the public understand the efforts of each company to bet on information security, And strike a balance with over-disclosure of astute information.
Jemmy
EY Business Advisory Service Inc. Senior DirectorLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL GeneralSESSION TOPIC ComplianceGovernance Risk & ComplianceSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/22 14:45 - 15:15
Blue Team Forum
Why is MITRE Promoting the Engage Framework?
READ MOREWith the help of MITRE ATT&CK, EDR technologies have improved steadily over the last few years to their current level of high maturity and sophistication. According to MITRE evaluation results, many vendors can now detect 80%, 90% of the steps of simulated attacks, while the best performing vendor can even provide 100% coverage. It is indeed a great achievement. However, in real-world scenarios, there will be a lot of noise that the attackers can leverage to hide their operation, and the task of detecting attackers is similar to “looking for a needle in a haystack.” This is the main reason why MITRE is now promoting the new Engage Framework, an active defense thinking to engage with the attackers in real-time, accurately detect their presence at very early stage of the security breach, and then cut them off to prevent damage to enterprise.
Dr. Cheng Kun Wang
LOCATION Taipei Nangang Exhibition Center, Hall 2
4BLEVEL GeneralSESSION TOPIC Breach DetectionAdvanced Threat ProtectionRansomwareSESSION TYPE Onsite LANGUAGE Chinese9/22 14:45 - 15:15
AI Security Forum
AI meets MITRE ATT&CK: Let's capture the tactics, techniques, and procedures (TTPs) of threat actors
READ MOREIn this talk, I will share my experience in malware behavior analysis (MAMBA) using neural networks and MITRE ATT&CK framework for understand the tactics, techniques and procedure of malware. Help security analysts to better understand the captured malicious behavior, the associated API calls and manipulated system resources constitute observable evidence.
Yi-Ting Huang
National Taiwan University of Science and Technology Department of Electrical Engineering / Assistant ProfessorLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL IntermediateSESSION TOPIC MITRE ATT&CKBehavioral AnalyticsSESSION TYPE Onsite LANGUAGE Chinese9/22 14:45 - 15:15
Red Team Forum
Experience sharing of red teaming project
READ MOREIn recent years, “Red Team Assessment” has been adopted across different industries as a method of assessing an organization’s ability to handle hackers’ attacks in their production environment. But it is hard to know how to prepare for the assessment and what kind of mindset to have before implement the assessment. The service providers are always eloquent about their red team assessment. But is it really that safe as they say? Would there be any accident happens during the assessment? We invite personnel who works in finance industry and conducted the red team assessment to share his experience.
Smith
Chinese Cyber Law Association (CCLA) ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL GeneralSESSION TOPIC Red TeamVulnerability AssessmentBlue TeamSESSION TYPE Onsite LANGUAGE Chinese9/22 14:45 - 15:15
Threat Research Forum
Building Next-Generation Semantic-aware Signature Engine from Disassembly
READ MOREIn the era of endless new exploits, Active Defense of Antivirus have already collapsed. Also, the efficient Static Scan is the most important feature of modern antivirus against malware, designed to provide AV/EDR with the ability to detect immediately when it discovers an unknown file that is or is not a known threat, so as to avoid infection.
This technique has evolved from the originally file hash fingerprint, to the now well-known pattern matching (YARA), and even the heuristic-based ML methods to produce patterns automatically against high variant samples as much as possible.
As a result, hackers have advanced their pattern-bypassing tactics to identify and remove anti-virus signature in no time. This allows variant-enhanced malware in the wild to increase rather than decrease even against state-of-the-art AI based detections. However, do we want such detection techniques that chase behind attackers? The blame goes to the fact that classic pattern matching design never considers semantics of execution behavior, making it easy for hackers to bypass.
In this session, we will talk about how the latest variant samples can beat the major pattern matching techniques heavily with simple tricks such as obfuscation, FLA (OLLVM) and RC4 encryption.
To fight against this, we will present a next-generation static scanning idea. Instead of optical scanning of files, a full set of decompilers will be built in to analyze all the static functions in a program file and use symbolic definition of malicious functions to achieve a semantic-aware malware detection engine. Researchers can elastically define malware templates and use this engine to perform excellent detection results on multiple heavily obfuscated samples.
Sheng-Hao Ma
TXOne Networks Threat ResearcherHank Chen
TXOne Networks Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL GeneralSESSION TOPIC Malware ProtectionWindowsReversingSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/22 14:45 - 15:15
OT Security Forum
The Data Distribution Service (DDS) Protocol is Critical: Let's Use it Securely!
READ MOREIn this research, we discovered and disclosed multiple vulnerabilities in most of the DDS (Data Distrubiton Service) implementations. DDS enables crucial technologies, such as autonomous driving, military tactical systems, or time-sensitive machineries. We approached DDS from the bottom up, and we'll show you how we dissected, fuzzing with and without source code, then found multiple vulnerabilities within it, including a standard-level vulnerability and others, including remote code execution and DoS.
Ta-Lun Yen
TXOne Networks Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL IntermediateSESSION TOPIC OT SecurityNetwork SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 14:45 - 15:15
xSecurity Forum
Dramatic rise in fraud and scam complaints
READ MORE1. How Is Digital Fraud Becoming More Sophisticated As Technology Advances?
2. How to spot a scam with new information technology.
Paul Liu
Gogolook BU HeadLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL GeneralSESSION TOPIC Cyber CriminalFake newsFraud ProtectionSESSION TYPE Onsite LANGUAGE Chinese9/22 14:45 - 15:15
Ransomware Solution Forum
Peter Fan
CrowdStrike North Asia Cyber Security SpecialistLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL IntermediateSESSION TOPIC RansomwareEndpoint Detection & ResponseSecurity StrategySESSION TYPE Onsite LANGUAGE Chinese9/22 14:45 - 15:15
FINSEC Forum
Cyber Angle of Russian Ukrainian Conflict
READ MOREThis presentation shares insights on the cyber angle of a military conflict that unfortunately takes place on the territory of Ukraine. From insights into disinformation campaigns to denial of service and targeted attacks on both sides, this presentation dives into the nature of the cyber conflict and illustrates it with a number of case studies, sharing tools and methods that could be used to analyze, detect, and possibly prevent or minimize impact from such activities.
Fyodor Yarochkin
Trend Micro Senior threat analystLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL IntermediateSESSION TOPIC DisinformationSESSION TYPE Onsite LANGUAGE English / Chinese9/22 14:55 - 15:20
Cyber Talent Forum (Cyber Talent)
Jackie Chen
Taiwan Mobile Co., Ltd. Deputy Director of ICT and Personal Inforamtion Security Management DivisionLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL IntermediateSESSION TOPIC Career PathSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL Intermediate SESSION TYPE Onsite LANGUAGE Chinese9/22 15:20 - 15:40
Security Vision Forum
The experience sharing of IPO companies’ information security and collaboration with public sector
READ MOREThe current status and concerns of private sector; the establishment of information security alliance & work together with public sector for compliance and resilence.
Robert Chin
ASUS Group CISO, Chairman of ASUS Information Security Committee, ASUS Server BU HeadTaiwan CISO Alliance PresidentLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL IntermediateSESSION TOPIC Governance Risk & ComplianceSupply Chain SecuritySecDevOpsSESSION TYPE Onsite LANGUAGE Chinese9/22 15:20 - 15:45
Cyber Talent Forum (Cyber Talent)
Could I be a security researcher?
READ MOREYou want to be a hacker?
What does security researcher do? What kind of job is it? How can I join?
This talk shares the experience from the security researcher and provides a reference for everyone who wants to join us.
Meh Chang
DEVCORE Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC Security JobReverse EngineeringExploit of VulnerabilitySESSION TYPE Onsite LANGUAGE Chinese9/22 15:30 - 16:00
FINSEC Forum
The gap between realistic risk and ATT&CK
READ MOREWith the widespread use of ATT&CK, companies have begun to use it to assess current threats and priorities for hardening. However, enterprises should not just use these TTPs to infer the risks of the enterprise, which may fall into the misunderstanding of the cause and effect, and then ignore the existence of more high-risk vulnerabilities that are easily exploited. This talk will share thinking and suggested ways of using ATT&CK correctly to reduce the risk of misplaced defense resources by chasing potential attackers aimlessly
Allen Own
DEVCORE CEOLOCATION Taipei Nangang Exhibition Center, Hall 2
701ALEVEL IntermediateSESSION TOPIC MITRE ATT&CKSecurity StrategyRed TeamSESSION TYPE Onsite LANGUAGE Chinese9/22 15:40 - 16:00
Security Vision Forum
Review the way been through, talking about the new situation of information security strategy
READ MOREThis agenda will share how enterprises can establish strategic thinking of information security, explain the key to implement, how to face the challenges of digital transformation, and how to integrate relevant regulatory requirements to strengthen the resilience of enterprises' information security.
Jason Chu
FETnet Chief Information Security OfficerLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL IntermediateSESSION TOPIC Security StrategySecurity ArchitectureSESSION TYPE Onsite LANGUAGE Chinese9/22 15:45 - 16:15
AI Security Forum
Detect industrial control system security over HMI image process
READ MORESince fieldbus still accounts for a part of proportion of ICS, this makes it hardly for them to deploy Ethernet based security products. This research will be targeting Windows base HMI. The concept of research including using image process and machine learning technique, finding the relation of figures and graphs to detect system security. In addition, we will share how we build our system and demo how the system work, we also propose strategies for mitigation of cyber intrusion.
Yenting Lee
TXOne Networks Sr. Threat ResearcherPatrick Kuo
TXOne Networks Senior Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL GeneralSESSION TOPIC ICS/SCADA SecurityIntrusion DetectionMachine LearningSESSION TYPE Onsite LANGUAGE Chinese9/22 15:45 - 16:15
Supply Chain Security Forum
The Last Mile in Product Security: Incident Response and SBOM
READ MOREOpensource libraries could be able to assist manufacturers to save the development resource , but it may also be the weakness that make your products be hacked. In this session, we will introduce how to utilize the software bill of materials (SBOM) to manage the open source libraries. In addition, in the era of millions of vulnerabilities, this session also explains how to correctly handle and respond the product cybersecurity incidents.
Michael
Onward Security CorporationLOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC PSIRTSecurity Development LifecycleIoT SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 15:45 - 16:15
Threat Research Forum
Prototype Pollution From Zero to One
Peter Chi
TAIWAN RAKUTEN ICHIBA, INC. Team Leader, Cyber Security Defense DepartmentLOCATION Taipei Nangang Exhibition Center, Hall 2
4ALEVEL IntermediateSESSION TOPIC Application SecurityRed TeamWeb SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 15:45 - 16:15
Red Team Forum
Domain slayer- infiltrating the Enterprise District
READ MOREIn the second half year of 2021 several critical vulnerabilities were found among active directories. From Printnightmare to sam-the-admin, the speaker will share the offensive techniques and the trending lateral movement technique, Living Off the Land Binaries, Scripts and Libraries (LOLBAS). Faced with layers of defense, hackers have turned to adopt this technique; simply put, using materials at hand, and directly bypassing defensive mechanism. The speaker aspires to promote world peace and to enable security staff to leave office early instead of taking the blame for others.
hans
CHT Security Senior ConsultantLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL IntermediateSESSION TOPIC Red TeamPenetration TestingMITRE ATT&CKSESSION TYPE Onsite LANGUAGE Chinese9/22 15:45 - 16:15
Blue Team Forum
What is Threat Hunting?
READ MOREA security event is a change in the everyday operations of a network or information technology service indicating that a security policy may have been violated or a security safeguard may have failed.
In a computing context, events include any identifiable occurrence that has significance for system hardware or software.
This talk wants to redefine security events are those that may have significance to the security of systems or data.
MING-CHIEH PAN (Nanika)
TeamT5 Chief ArchitectLOCATION Taipei Nangang Exhibition Center, Hall 2
4BLEVEL IntermediateSESSION TOPIC Threat HuntingIncident ResponseSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL General SESSION TYPE Onsite LANGUAGE Chinese9/22 15:45 - 16:15
OT Security Forum
IEC 62443 Industrial Control Cybersecurity Testing Essentials
READ MOREThe international information security standard IEC 62443-3-3 (whole system)/4-2 (component) specifies the information security standards for industrial control networking products. In addition, IEC 62443-4-1 product security development life cycle also stipulates that Relevant information security tests to check the safety and quality of products, So what's the content of these tests? How can the test be done to meet the standard requirements? What are the key ways for a product to pass the test? This agenda will reveal the mystery of IEC 62443 international standard testing.
Mars Kao
Institute for Information Industry Cybersecurity Technology Institute technical directorLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL IntermediateSESSION TOPIC Industrial SecurityCompliance TestingSESSION TYPE Onsite LANGUAGE ChineseLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL GeneralSESSION TOPIC RansomwareCloud SecurityData SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 15:45 - 16:15
xSecurity Forum
Security Risks in DeFi
READ MOREThere are lots of DeFi security incidents that happened in 2022. Besides some big incidents such as Ronin and Wormhole, more than one DeFi security incident happens almost every week and loses millions of dollars. In this topic, we will analyze different kinds of DeFi security incidents in 2022, introduce most recently used attacks, and introduce misuse in development.
Ysc
Secview FounderLOCATION Taipei Nangang Exhibition Center, Hall 2
701HLEVEL IntermediateSESSION TOPIC BlockchainFinTechSESSION TYPE Onsite LANGUAGE Chinese9/22 15:45 - 16:10
Cyber Talent Forum (Cyber Talent)
I Know Nothing but Reverse Engineering
READ MORESharing my Reverse Engineering journey that started from high school. How I neglected my studies and dropped out of college, became addicated to CTF, then work as a full-time Vulnerability Researcher, and now started a Research Team and earned hundreds of thousands of dollars from Bug Bounty Programs from some well-known software vendors.
Lays
TrapaSecurity Co-Founder & Research Team LeadLOCATION Taipei Nangang Exhibition Center, Hall 2
Cyber TalentLEVEL GeneralSESSION TOPIC Career PathSecurity JobBug BountySESSION TYPE Onsite LANGUAGE Chinese9/22 16:00 - 16:30
Security Vision Forum
New Challenges, Risks and Opportunities for Cybersecurity in 2023
READ MORE-Challenges:Under the ESG Wave, how Chief Information Security Officer become a new partner of Chief Sustainability Officer?
-Risks:What is the up to date cybersecurity risk exposure?
-Opportunities:How to acquire tax credits through cybersecurity investments?
Freddy Lee
KPMG Cybersecurity Services / Associate DirectorYang Chang
KPMG Partner, Tax & Investment DeptLOCATION Taipei Nangang Exhibition Center, Hall 2
701BLEVEL IntermediateSESSION TOPIC Governance Risk & ComplianceRisk ManagementStandardsSESSION TYPE Onsite LANGUAGE Chinese9/22 16:30 - 17:00
OT Security Forum
Mars Cheng
TXOne Networks Manager, PSIRT and Threat ResearchSelmon Yang
TXOne Networks Staff EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
703LEVEL AdvancedSESSION TOPIC ICS/SCADA SecurityExploit of VulnerabilityProtocol AnalysisSESSION TYPE Onsite LANGUAGE Chinese9/22 16:30 - 17:00
Red Team Forum
I Defend against Your Defense: LSALSASSUSELESS ;)
READ MOREIt is a well-known story that hackers are moving laterally inside organizations through Mimikatz for password theft and Credential Dumping in large cyber-army APT operations across countries.
The specifics of this technique entail a variety of high-risk behaviors, including privilege escation, accessing LSASS, and memory dumping, and so on. The major endpoint security products will undoubtedly claim that they can detect and prevent such attacks, but this is not the case.
In this session, we will focus on the tactics of password theft and take an overview of the security solutions used by modern enterprises. And to demonstrate the attacker's point of view with the Project Zero attack practice How to break each one. The end of the session will provide multiple Proof of Concept, suggestions of mitigation, and advice on selecting protection solutions.
Sheng-Hao Ma
TXOne Networks Threat ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
701FLEVEL AdvancedSESSION TOPIC Malware ProtectionCyberwarfareExploit of VulnerabilitySESSION TYPE Onsite LANGUAGE Chinese9/22 16:30 - 17:00
Supply Chain Security Forum
Open Source Developer Experience Sharing - Managing Open Source Vulnerabilities through the Product Development Process
READ MOREOpen Source Software has become the mainstream trend in information and communication in recent years, from 5G (ORAN), blockchain, AI, and Cloud, to embedded devices, etc., from the application layer to the driver layer. From consumer to industrial applications, the industry has frequently used open source software as components for integration or secondary development. However, managing open source software security vulnerabilities after product development is over can be costly. In this sharing, SZ will analyze the status and trend of Common Vulnerabilities and Exposures (CVE) of open source software in recent years and describe how to integrate into software through requirements analysis, SBOM usage, analysis of open source software components, etc. Development lifecycle to manage open source software security vulnerabilities, thereby reducing overall software development/maintenance costs. In addition, from the perspective of open source software developers for many years, SZ will share how to track and deal with open source software security vulnerabilities through systematic tools, SBOM open source tools, etc. In addition to known vulnerabilities, SZ will share how to uncover unknown vulnerabilities through testing.
Open source is managed through open source, and open source software is used to create security products with reasonable R&D costs and acceptable information security risks so that R&D personnel can spend their energy on core technology research and development.
LOCATION Taipei Nangang Exhibition Center, Hall 2
701GLEVEL IntermediateSESSION TOPIC Vulnerability ManagementSupply Chain SecuritySecurity Development LifecycleSESSION TYPE Onsite LANGUAGE Chinese9/22 16:30 - 17:00
AI Security Forum
Detecting Obfuscated Malware: Pushing the Frontiers of Machine Learning
READ MOREThe application of machine learning in malware detection and response has been at the forefront of cybersecurity research for decades. More and more research papers in this field achieve results that effectively push research and application forward with most malware detection engines leveraging machine learning algorithms. In this presentation, we will share our methodology and results from evaluating various algorithms and their effectiveness against real-world obfuscation techniques used by attackers in the wild.
LOCATION Taipei Nangang Exhibition Center, Hall 2
701DLEVEL AdvancedSESSION TOPIC Reverse EngineeringMachine LearningAI SecuritySESSION TYPE Onsite LANGUAGE Chinese9/22 16:30 - 17:00
Ransomware Solution Forum
Winning the War Against Ransomware: Mass Automated Malware Sequencing & Analysis
READ MOREIn this presentation, we will discuss our in-depth analysis of ransomware behavior, summarize several key behavior characteristics, our uniquely customized sandbox used for analysis, and propose our new and more effective methods of ransomware detection and mitigation.
oalieno
CyCraft Technology Cyber Security ResearcherLOCATION Taipei Nangang Exhibition Center, Hall 2
701CLEVEL IntermediateSESSION TOPIC RansomwareReverse EngineeringSESSION TYPE Onsite LANGUAGE Chinese9/22 16:30 - 17:00
Android native library reverse engineering and countermeasures
READ MOREAndroid application code protection consists of two types including Java layer and native layer. Java code protection has been well studied and most developers already know how to protect Java code from reverse engineering by using obfuscation or packers. However, there are relatively few studies on native layer code protection. In this session, we will introduce some techniques and countermeasures for native library reverse engineering, which will help developers improve the code protection on native layer.
Jason Wang
Fourdesire Senior Security EngineerLOCATION Taipei Nangang Exhibition Center, Hall 2
701ELEVEL AdvancedSESSION TOPIC Mobile SecurityReverse EngineeringSecure CodingSESSION TYPE Onsite LANGUAGE Chinese