4/15 (Tue.) 12:00 - 12:30 4F 4C

Your Network Devices Are Betraying You: From Silent Operation to Becoming the Core of Threats

After breaching the internal network, attackers exploit network devices as footholds to compromise switches, ultimately taking control of core network infrastructure to enable lateral movement. This presentation will analyze the attack chain and technical methodologies involved, while also exploring actionable strategies to prevent network devices from being weaponized by attackers.

Lyn Chuang
SPEAKER
Trend Micro
Technical Consultant

TOPIC / TRACK
Threat Research Forum
Lunch Learning Session
Live Translation Session

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4C

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese
Real-Time Chinese & English Translation

SUBTOPIC
Incident Response
Critical Infrastructure Protection