CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

bg-inner
Peter Chiu

SPEAKER

Peter Chiu

Trend Micro Technical Consultant

Speech

CyberLAB

SEP 20

# CyberLAB

Enforcing Zero Trust Security in the Face of Pervasive Intrusion Threats – Get First-hand Experience of Intrusion Techniques and Rethink Your Defense Strategy

09/20 (Tue) 12:30 - 14:30 4F 4C
Trend Micro Technical Consultant / Peter Chiu

    Today, people connect to corporate networks, cloud databases, and a variety applications from everywhere with all kinds of devices. Enterprises can no longer make the assumption that authenticated or trusted devices/users are secure. Therefore, the zero trust security model is an important strategy for strengthening the security of critical data and systems, especially in a hybrid, dynamic workplace. It is a more advanced, agile, and effective approach to security, compared to the traditional security model.

     Comprehensive visibility and understanding of risks are the foundation of effective security prioritization and automated zero trust access controls. Unfortunately, a lot of solutions labeled as "zero trust" do not really understand how to evaluate trust. 

    Activities of this session include:

     1.) Attack and defense drills. Get first-hand experience of hackers' stealthy intrusion techniques.

     2.) Hands-on labs. From the defender's perspective, learn how to identify the root cause of an incident and determine the scope of its impact. 

     3.) Incident investigations. Collect evidence and think how to response with remediation measures, how to implement such measures with existing defenses, and how to stand in the executives' shoes to provide critical information for CISO and SOC teams to make informed decisions.

CyberLAB

SEP 20

# CyberLAB

Enforcing Zero Trust Security in the Face of Pervasive Intrusion Threats – Get First-hand Experience of Intrusion Techniques and Rethink Your Defense Strategy

09/20 (Tue) 14:45 - 16:45 4F 4C
Trend Micro Technical Consultant / Peter Chiu

    Today, people connect to corporate networks, cloud databases, and a variety applications from everywhere with all kinds of devices. Enterprises can no longer make the assumption that authenticated or trusted devices/users are secure. Therefore, the zero trust security model is an important strategy for strengthening the security of critical data and systems, especially in a hybrid, dynamic workplace. It is a more advanced, agile, and effective approach to security, compared to the traditional security model.

     Comprehensive visibility and understanding of risks are the foundation of effective security prioritization and automated zero trust access controls. Unfortunately, a lot of solutions labeled as "zero trust" do not really understand how to evaluate trust. 

    Activities of this session include:

     1.) Attack and defense drills. Get first-hand experience of hackers' stealthy intrusion techniques.

     2.) Hands-on labs. From the defender's perspective, learn how to identify the root cause of an incident and determine the scope of its impact. 

     3.) Incident investigations. Collect evidence and think how to response with remediation measures, how to implement such measures with existing defenses, and how to stand in the executives' shoes to provide critical information for CISO and SOC teams to make informed decisions.

CyberLAB

SEP 21

# CyberLAB

Enforcing Zero Trust Security in the Face of Pervasive Intrusion Threats – Get First-hand Experience of Intrusion Techniques and Rethink Your Defense Strategy

09/21 (Wed) 12:30 - 14:30 4F 4C
Trend Micro Technical Consultant / Peter Chiu

    Today, people connect to corporate networks, cloud databases, and a variety applications from everywhere with all kinds of devices. Enterprises can no longer make the assumption that authenticated or trusted devices/users are secure. Therefore, the zero trust security model is an important strategy for strengthening the security of critical data and systems, especially in a hybrid, dynamic workplace. It is a more advanced, agile, and effective approach to security, compared to the traditional security model.

     Comprehensive visibility and understanding of risks are the foundation of effective security prioritization and automated zero trust access controls. Unfortunately, a lot of solutions labeled as "zero trust" do not really understand how to evaluate trust. 

    Activities of this session include:

     1.) Attack and defense drills. Get first-hand experience of hackers' stealthy intrusion techniques.

     2.) Hands-on labs. From the defender's perspective, learn how to identify the root cause of an incident and determine the scope of its impact. 

     3.) Incident investigations. Collect evidence and think how to response with remediation measures, how to implement such measures with existing defenses, and how to stand in the executives' shoes to provide critical information for CISO and SOC teams to make informed decisions.

CyberLAB

SEP 21

# CyberLAB

Enforcing Zero Trust Security in the Face of Pervasive Intrusion Threats – Get First-hand Experience of Intrusion Techniques and Rethink Your Defense Strategy

09/21 (Wed) 14:45 - 16:45 4F 4C
Trend Micro Technical Consultant / Peter Chiu

    Today, people connect to corporate networks, cloud databases, and a variety applications from everywhere with all kinds of devices. Enterprises can no longer make the assumption that authenticated or trusted devices/users are secure. Therefore, the zero trust security model is an important strategy for strengthening the security of critical data and systems, especially in a hybrid, dynamic workplace. It is a more advanced, agile, and effective approach to security, compared to the traditional security model.

     Comprehensive visibility and understanding of risks are the foundation of effective security prioritization and automated zero trust access controls. Unfortunately, a lot of solutions labeled as "zero trust" do not really understand how to evaluate trust. 

    Activities of this session include:

     1.) Attack and defense drills. Get first-hand experience of hackers' stealthy intrusion techniques.

     2.) Hands-on labs. From the defender's perspective, learn how to identify the root cause of an incident and determine the scope of its impact. 

     3.) Incident investigations. Collect evidence and think how to response with remediation measures, how to implement such measures with existing defenses, and how to stand in the executives' shoes to provide critical information for CISO and SOC teams to make informed decisions.