CyberLAB

Experts-lead CyberLAB : Enhance cybersecurity defense capabilities

Led by cybersecurity experts, this hands-on CyberLAB immerses participants in real-world IT security scenarios and practical security management applications. Through live simulations of key cybersecurity challenges, participants will strengthen their response capabilities and build a robust defense system!

Registering for CYBERSEC grants you eligibility for free on-site registration to participate in CyberLAB. Please note that seats are limited for each session and will be allocated on a first-come, first-served basis.
CyberLAB
Overview

Before registering, please refer to the “More" section in the CyberLAB agenda to understand the pre-session preparation.

  • 4/15 12:30-14:30
  • 4/15 15:00-17:00
Case Study - Building a Fully Protected AI Environment

Cybersecurity challenges are becoming increasingly diverse as cloud computing and AI technologies advance rapidly. This session takes a thorough look at the critical risks faced by AI applications, including data breaches, AI hallucinations caused by incorrect RAG data, and cyberattacks in which users trick AI into generating sensitive content. Also discussed in this session are: how to protect AI infrastructures, as well as how to achieve higher levels of security in cloud environments, offering comprehensive and practical solutions for securing AI.

More
  • 4/16 12:30-14:30
Proofpoint Discovery: Hands-on Lab - Strengthen Identity Security

Join us for an interactive workshop designed to strengthen your organisation’s identity security. Through a dynamic capture-the-flag lab, participants will engage in an exclusive red team/blue team simulation, secured by the Proofpoint Identity Threat Defence platform. Your mission: infiltrate a simulated casino network, steal a slot machine code file, and execute a mock ransomware attack—all while avoiding detection. The exercise is legal, educational, and fun, with prizes for top performers.


Many organisations struggle with identity security gaps, especially between traditional Identity and Access Management (IAM) controls and the advanced tools attackers use to bypass them. These vulnerabilities are particularly critical after an initial compromise, where attackers employ sophisticated methods to escalate privileges and access sensitive data. Tools like Mimikatz, Lazagne, and Nmap are often used in such attacks, underscoring the importance of robust detection and response capabilities. Solutions like Proofpoint Identity Threat Defence address these challenges by delivering high-fidelity detection and effective mitigation.


This workshop offers a unique opportunity to explore the attacker lifecycle, from initial compromise to full breach execution. Participants will gain hands-on experience with common attack tools and learn how deception-based endpoint technologies can effectively detect and stop threats. By stepping into the role of a white-hat hacker, attendees will deepen their understanding of attacker tactics while enhancing their defensive skills.


Don’t miss this chance to elevate your identity security knowledge in a hands-on, engaging environment. Reserve your spot today and take the first step towards closing critical security gaps!

More
  • 4/16 15:00-17:00
Designed for Development Teams: Hands-on Practice Course on Common Web Vulnerabilities

This course is designed for development teams. It eliminates the need to learn complex penetration testing tools (which are not typically used in daily work), install any additional tools (keeping computers clean and uncontaminated), and generate any attack traffic (so companies don't have to worry about accidental misoperations by trainees).


This CyberLab provides a simulate environment with various vulnerabilities from OWASP Top 10 A01-A02. In this course, students will actually use these vulnerabilities to practice attack behaviors, gaining a deeper understanding of how security vulnerabilities are exploited and their effects.

More
  • 4/17 09:30-11:30
Implementing Google Cloud Platform micro-segmentation through Shared VPC and VPC Service Controls to prevent unauthorized cross-project access and data leakage.

Google Cloud Platform Microsegmentation Lab - 2-Hour Course Structure

Learn the fundamentals of microsegmentation using Shared VPC and VPC Service Controls.

GCP Services Used:

1. Networking & Compute: VPC, Shared VPC, Subnets, Compute Engine

2. Security & Control: VPC Service Controls, Firewall Rules, Cloud Armor (optional)

3. IAM & Resource Management: IAM Policy Binding, Service Perimeters

More
  • 4/17 12:30-14:30
Hidden Mode ON: Uncover the secrets lurking deep within your hard drive

This course is an introduction to digital forensics, guiding students into the world of digital investigation and analysis, where they will learn to use professional tools to analyze digital evidence. The first half of the course will introduce the subtle differences between digital forensics and incident response. The middle section will provide hands-on instruction to familiarize students with digital forensic techniques and investigation procedures. Finally, the course will simulate an investigation environment through a lab environment, allowing students to simulate participation in case analysis, experience the investigative process of cybersecurity professionals, and develop practical skills and response capabilities.

More
  • 4/17 15:00-17:00
Cloud-Native SIEM Threat Detection Hands-on

In today's hybrid management architecture, enterprises face a wide range of cybersecurity threats. When an attack results in business losses, incident response teams often encounter attackers covering their tracks (Covered Track), making it impossible to trace the root cause, which can lead to repeated breaches. Managing a hybrid environment further complicates attack investigations due to architectural and policy-related challenges. Therefore, building a SIEM solution capable of monitoring various hybrid infrastructures is crucial for preserving critical logs and enhancing threat detection.


This hands-on course will guide participants through practical exercises to understand SIEM principles and explore its diverse and powerful capabilities.

More
CyberLAB Agenda
4th Floor, Conference Room 4D
Date
Time
Session
Speaker
4/15
Case Study - Building a Fully Protected AI Environment
任宗偉 (Albert Jen)

Trend Micro Senior Technical Consultant

邱柏翰 (Peter Chiu)

Trend Micro Senior Technical Consultant

More
Case Study - Building a Fully Protected AI Environment
任宗偉 (Albert Jen)

Trend Micro Senior Technical Consultant

邱柏翰 (Peter Chiu)

Trend Micro Senior Technical Consultant

More
4/16
Proofpoint Discovery: Hands-on Lab - Strengthen Identity Security
Bruce Chai

Proofpoint Senior Sales Specialist

More
Designed for Development Teams: Hands-on Practice Course on Common Web Vulnerabilities
Sola Chen

Galaxy Software Services Corporation

More
4/17
Implementing Google Cloud Platform micro-segmentation through Shared VPC and VPC Service Controls to prevent unauthorized cross-project access and data leakage.
余俊宏 (Albert Yu)

Microfusion Director of MS Operations

More
Hidden Mode ON: Uncover the secrets lurking deep within your hard drive
馬洪雯

CHT Security Co., Ltd. Senior Engineer

More
Cloud-Native SIEM Threat Detection Hands-on
鄭宇翔 (Sean Zheng)

eCloudvalley Digital Technology Co., Ltd. Cybersecurity Security Analyst

More
  • CyberLAB does not require advance registration. Please proceed to the service desk on the day of the session to check-in, and then go to the course venue to register for participation.
  • Due to limited resources and to allow more participants to experience the CyberLAB hands-on sessions, each participant is limited to registering for one time slot and one session.
  • The teaching content of the same session is the same in different time slots.