PARTNER
L.K.C. Lab
L.K.C. Lab
+886-2-29500110

L.K.C. Lab is an MIT leading BAS Vendor, the only one that had the honor to be visited by the president and the vice president. Also, we are the only cybersecurity company presented in the military magazine. We've had won the champion of cybersecurity competition several times and discovered more than 10 Zero-Day Vulnerabilities.   

With our independent development BAS product - ArgusHack, and our professional cybersecurity coaching team - H1DRA Security, we are dedicated to enhancing your immunity in case of facing severe risks under hackers’ attack.

Product Type

  • Breach and Attack Simulation
  • Contact Jason Shen
  • Tel +886-911204051
  • Mail
https://www.leukocyte-lab.com/
SPEECH
05/11 (Thu.) 10:15 - 10:45
Comprehensive Enhancement of Cybersecurity Team, from Attack Drills to Investment Management.

The aim of this speech is to explore effective ways of managing a cybersecurity team and enabling cybersecurity personnel to deliver higher efficiency. From the perspective of attack simulation, the cybersecurity operation is divided into three aspects: construction, team, and investment. Focusing on the pre, during, and post stages of an event, the program explores how to improve the procurement evaluation and decision-making efficiency of cybersecurity managers at the investment level, the cybersecurity resilience measurement and product verification efficiency of cybersecurity construction, and the on-site response capability and cybersecurity exercise efficiency of the cybersecurity team.

More
Leukocyte-Lab Co., Ltd. CEO
  • TOPIC
    Blue Team Forum
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2 7F
  • TAGS
    Purple Team
    Breach and Attack Simulation
05/11 (Thu.) 14:45 - 15:00
L.K.L Lab's performance and speech slot
Leukocyte-Lab Co., Ltd. CEO
SOLUTIONS

Cybersecurity Construction: Companies can conduct “Cybersecurity Resilience Measurement"" before an incident occurs to ensure that their cybersecurity measures can effectively respond to an attack. In addition, companies can perform “Visibility Verification of Cybersecurity Construction"" to evaluate the effectiveness of their existing cybersecurity construction when an incident occurs and make timely adjustments. Finally, companies can also conduct “Digital Evidence Integrity Verification"" to ensure the authenticity and reliability of digital evidence after an incident occurs.

Cybersecurity Team: Companies can conduct “Cybersecurity Decision Evaluation Drill” before an incident occurs to ensure that their cybersecurity team is capable of responding to various types of attacks. In addition, companies can also perform “Cybersecurity Incident Response Drill” to improve their team's ability to respond to incidents. Furthermore, companies can conduct “Cybersecurity Forensics and Identification Drill” to ensure the authenticity and reliability of cybersecurity identification after an incident occurs.

Cybersecurity Investment: Companies can conduct “Cybersecurity Investment Planning and Benefit Evaluation"" before investing to ensure that their cybersecurity investment can bring practical benefits to the company. When conducting cybersecurity investments, companies can perform “Verification and Testing of Cybersecurity Solutions"" to ensure that their funds are effectively utilized. After cybersecurity investment, companies can conduct “Evaluation of Cybersecurity Investment and Protection Effectiveness"" to ensure the effectiveness of their cybersecurity investment.


WHITE PAPERS
Mobile Fortress of Cyber War: ArgusHack

Breach and Attack Simulation (BAS), as explained by Gartner, provides continuous testing within limited risk and can be used to alert IT and business stakeholders about existing gaps in security posture, or to verify that security infrastructure, planning, and defensive technologies are functioning as intended.

BAS is a solution for security validation that is not intended to replace existing third-party validation. It provides continuous testing for the test environment at a lower cost, filling the gaps between traditional validation solutions, complementing each other and optimizing the entire validation process.