CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

CyberLAB

Follow the trail to the APT crime scene and use the proper tools to find unexpected traces left behind by hackers. Each simulation drill serves as the best way to enhance defensive capabilities!
CYBERSEC CyberLAB has invited senior experts from the cybersecurity industry to personally take you through simulations of various cyberattack scenarios, as well as share practical experience, investigative tools, and their own analytical processes. Each session of the CyberLAB simulation offense/defense drills is expected to be packed. Don't miss the opportunity to boost your combat power with intensive simulation exercises.

Sign up for CYBERSEC 2021 and become eligible to register on-site for free. Each session has only limited spots – please register early.

CyberLAB Course Introduction

CHT Security Session

Room NO. 7F 702AB
Pin-Ren Chiou
Pin-Ren Chiou
Deputy Manager, CHT Security
Course Introduction:

Coming Soon

Maximum Number of Attendee:
20
Back to Overview

CyCraft Technology Corporation Session

Room NO. 7F 702C
Boik Su
Boik Su
Cybersecurity Researcher, CyCraft
Course Introduction:

Coming Soon

Maximum Number of Attendee:
20
Back to Overview

Cyber Armchair Strategy vs Real-World Breach Experience

Room NO. 7F 702C
Shang-De Jiang
Shang-De Jiang
Cyber Security Researcher, CyCraft
Dange Lin
Dange Lin
Cybersecurity Researcher, CyCraft
Course Introduction:

Cyber attacks today are an inevitable threat modern organizations must face. How an organization detects, labels, responds, and remediates existing decifiencies in their cyber defense while also effectively utilizing their limited resources has become a necessary skill for infosec management teams for all organizations. One method that has helped alleviate this issue for infosec management teams has been the Cyber Defense Matrix (CDM), a well-known security model from recent years, and combining it with the use of various infosec frameworks.


Our course will focus on the concept of CDM, how to successfully supplement it via other infosec frameworks, and the analysis of cyber attack methods in terms of defense. Participants will learn how to think like and defend themselves from threat actors by learning how to properly analyze an attack, succesfully construct an attack storyline, understand each step of the attack from the attacker’s perspective, and, finally, how to properly defende themselves at each phase of the attack.


At the end of the course, participants will experience the latest in infosec edutech—an interactive CDM game. Through the game, participants will gain a deeper understanding of CDM concepts, common offensive and defensive techniques, how to successfully build an effective modern defense against today’s threats. This course will help participants evolve into valuable and effective information security personnel and prepare them for the inevitable frontline experience against a modern threat.

Course Objectives:

Participants will gain a deeper understanding behind the logic of cyber security methodologies and strategies through a detailed analysis of common adversarial attack techniques. Participants will gain valuable experience in how to look beyond the individual alerts and see the larger attack storyline unfolding in front of them. 

Course Outline:

1. Introduction to Cyber Security Models & Frameworks (CDM, NIST, CSF, ATT&CK)

2. How to use CDM to Analyze Attack Techniques

3. InfoSec Management / Combining CDM & Defense Methods

4. CDM Cyber Security Game Tournament

Suggested Equipment Specifications for Attendee:

non

Attendee Prerequisite Skills for the Course:

IT-related work experience and basic understanding of red team attack techniques

Maximum Number of Attendee:
20
Back to Overview

Oh my gosh! That's how container security should be done. What's involved in container security.

Room NO. 7F 703AB
Albert Jen
Albert Jen
Senior Technical Consultant, Trend Micro
Course Introduction:

While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.

This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.

Maximum Number of Attendee:
20
Back to Overview

Oh my gosh! That's how container security should be done. What's involved in container security.

Room NO. 7F 703AB
Albert Jen
Albert Jen
Senior Technical Consultant, Trend Micro
Course Introduction:

While container has increasingly become a much applied technology in recent years, its architecture is utterly different from the traditional IT environment, rendering most of the existing security defenses ineffective in protecting containers.

This session demonstrates how to leverage tools to enforce security policies in the development process to ensure that everything works as intended in the container. It involves protecting not just the container images used in the build process but also the container host, the platform, and the application layer during runtime. Some of the mistakes in deploying containers will also be explained, along with the consequences and preventive measures.

Maximum Number of Attendee:
20
Back to Overview

TeamT5 Cyber Range

Room NO. 7F 703C
Tom
Tom
Cyber Security Consultant, TeamT5
Zet
Zet
R&D Engineer, TeamT5
Course Introduction:

By practicing of incident response, you will understand the various TTPs of APT attack.Learn how to resolve the encoded content of script and find the way of persistence, lateral movement and how the shellcode is loaded.

You will be devided into teams and help each other to see the whole scope of incident from an single alert.

Course Objectives:

Learn how to see the whole scope of incident from an single alert.

Course Outline:

a. Tools for Investigation

b. Practice of Incident Response

c. Sample Analysis

d. Powershell Script Analysis

e. Case Report and Review

Suggested Equipment Specifications for Attendee:

Laptop with Chrome or Firefox

Attendee Prerequisite Skills for the Course:

Experience of Investigation / Malware Analysis / Linux OS / Windows event log / Tools for Investigatoin(ex. sysinternals)

Maximum Number of Attendee:
20
Back to Overview