Led by cybersecurity experts, this hands-on CyberLAB immerses participants in real-world IT security scenarios and practical security management applications. Through live simulations of key cybersecurity challenges, participants will strengthen their response capabilities and build a robust defense system!
Before registering, please refer to the “More" section in the CyberLAB agenda to understand the pre-session preparation.
Cybersecurity challenges are becoming increasingly diverse as cloud computing and AI technologies advance rapidly. This session takes a thorough look at the critical risks faced by AI applications, including data breaches, AI hallucinations caused by incorrect RAG data, and cyberattacks in which users trick AI into generating sensitive content. Also discussed in this session are: how to protect AI infrastructures, as well as how to achieve higher levels of security in cloud environments, offering comprehensive and practical solutions for securing AI.
Join us for an interactive workshop designed to strengthen your organisation’s identity security. Through a dynamic capture-the-flag lab, participants will engage in an exclusive red team/blue team simulation, secured by the Proofpoint Identity Threat Defence platform. Your mission: infiltrate a simulated casino network, steal a slot machine code file, and execute a mock ransomware attack—all while avoiding detection. The exercise is legal, educational, and fun, with prizes for top performers.
Many organisations struggle with identity security gaps, especially between traditional Identity and Access Management (IAM) controls and the advanced tools attackers use to bypass them. These vulnerabilities are particularly critical after an initial compromise, where attackers employ sophisticated methods to escalate privileges and access sensitive data. Tools like Mimikatz, Lazagne, and Nmap are often used in such attacks, underscoring the importance of robust detection and response capabilities. Solutions like Proofpoint Identity Threat Defence address these challenges by delivering high-fidelity detection and effective mitigation.
This workshop offers a unique opportunity to explore the attacker lifecycle, from initial compromise to full breach execution. Participants will gain hands-on experience with common attack tools and learn how deception-based endpoint technologies can effectively detect and stop threats. By stepping into the role of a white-hat hacker, attendees will deepen their understanding of attacker tactics while enhancing their defensive skills.
Don’t miss this chance to elevate your identity security knowledge in a hands-on, engaging environment. Reserve your spot today and take the first step towards closing critical security gaps!
This course is designed for development teams. It eliminates the need to learn complex penetration testing tools (which are not typically used in daily work), install any additional tools (keeping computers clean and uncontaminated), and generate any attack traffic (so companies don't have to worry about accidental misoperations by trainees).
This CyberLab provides a simulate environment with various vulnerabilities from OWASP Top 10 A01-A02. In this course, students will actually use these vulnerabilities to practice attack behaviors, gaining a deeper understanding of how security vulnerabilities are exploited and their effects.
Google Cloud Platform Microsegmentation Lab - 2-Hour Course Structure
Learn the fundamentals of microsegmentation using Shared VPC and VPC Service Controls.
GCP Services Used:
1. Networking & Compute: VPC, Shared VPC, Subnets, Compute Engine
2. Security & Control: VPC Service Controls, Firewall Rules, Cloud Armor (optional)
3. IAM & Resource Management: IAM Policy Binding, Service Perimeters
This course is an introduction to digital forensics, guiding students into the world of digital investigation and analysis, where they will learn to use professional tools to analyze digital evidence. The first half of the course will introduce the subtle differences between digital forensics and incident response. The middle section will provide hands-on instruction to familiarize students with digital forensic techniques and investigation procedures. Finally, the course will simulate an investigation environment through a lab environment, allowing students to simulate participation in case analysis, experience the investigative process of cybersecurity professionals, and develop practical skills and response capabilities.
In today's hybrid management architecture, enterprises face a wide range of cybersecurity threats. When an attack results in business losses, incident response teams often encounter attackers covering their tracks (Covered Track), making it impossible to trace the root cause, which can lead to repeated breaches. Managing a hybrid environment further complicates attack investigations due to architectural and policy-related challenges. Therefore, building a SIEM solution capable of monitoring various hybrid infrastructures is crucial for preserving critical logs and enhancing threat detection.
This hands-on course will guide participants through practical exercises to understand SIEM principles and explore its diverse and powerful capabilities.
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。