CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

bg-inner
Dange Lin

SPEAKER

Dange Lin

CyCraft Cyber Security Researcher

Dange Lin is a cybersecurity researcher at CyCraft Technology and focuses on automotive security, cloud security, machine learning, and threat intelligence analysis. He is currently responsible for cybersecurity for MIH Working Groups. He has delivered speeches at various seminars including HITCON, MOPCON, and CYBERSEC.


Speech

Vehicle Security Forum

SEP 21

#

Driving Safely: Next-Gen Autonomous Vehicle Safety Analysis

09/21 (Wed) 16:00 - 16:30 4F 4B
CyCraft Cyber Security Researcher / Dange Lin

This presentation will discuss the evolution of attack and defense techniques for vehicle security systems, starting from the common architecture and components of today’s vehicles and ending in an analysis of potential attack and defense techniques for the autonomous vehicles (AV) of the future. We will also discuss the potential impact and risk posed by supply chain attacks as well as the mitigations we can take today to secure the safe arrival of passengers tomorrow. 

Cloud Security Forum

SEP 22

#

How to Best Assess Your Cloud Security

09/22 (Thu) 09:30 - 10:00 7F 701F
CyCraft Technology Senior Cyber Security Researcher / Boik Su
CyCraft Cyber Security Researcher / Dange Lin

Many threats to your cloud security result from improper IAM or insecure configuration settings; such threats typically need to be prevented through inventory and risk assessments. Unfortunately, many services are out of the network admins’ control, complicating assessments and severely raising risk. In this presentation, we will discuss how to best assess cloud security; how to use different frameworks/methods to examine cloud assets, their corresponding risks, and security levels; and discuss real-world security incidents.

CyberLAB

SEP 20

# CyberLAB

InfoSec Card Game Play Test

09/20 (Tue) 12:30 - 14:30 4F 4D
CyCraft Cyber Security Researcher / Dange Lin
CyCraft Cyber Security Researcher / Gary Sun

Experience a highly interactive cybersecurity card game! Players not only have fun but also learn the basic concepts of the Cyber Defense Matrix (CDM) security model. By abstractly simulating real-world security incidents, players learn common attacker techniques, the effectiveness of current defensive techniques, and how to use CDM concepts to build an effective and efficient defense—on a budget!


This course is divided into three parts: lecture, discussion, and game! 


First, we will introduce the importance and usefulness of security models used by researchers and analysts, such as CDM, NIST CSF, and Mitre ATT&CK. We will then compare the security models and explain how researchers and analysts use these models to break down cyberattacks into individual techniques and their intended uses, stretching from initial access to data exfiltration and impact. Attendees will learn how cybersecurity analysts map out—and eventually predict—attack behavior and how to use CDM with various information security frameworks to formulate effective security strategies and fill gaps. Most importantly, attendees will be able to immediately use this knowledge in our new highly interactive card game that leverages CDM concepts in a fun, educational, and approachable way highlighting the importance of cybersecurity. 

CyberLAB

SEP 20

# CyberLAB

InfoSec Card Game Play Test

09/20 (Tue) 14:45 - 16:45 4F 4D
CyCraft Cyber Security Researcher / Dange Lin
CyCraft Cyber Security Researcher / Gary Sun

Experience a highly interactive cybersecurity card game! Players not only have fun but also learn the basic concepts of the Cyber Defense Matrix (CDM) security model. By abstractly simulating real-world security incidents, players learn common attacker techniques, the effectiveness of current defensive techniques, and how to use CDM concepts to build an effective and efficient defense—on a budget!


This course is divided into three parts: lecture, discussion, and game! 


First, we will introduce the importance and usefulness of security models used by researchers and analysts, such as CDM, NIST CSF, and Mitre ATT&CK. We will then compare the security models and explain how researchers and analysts use these models to break down cyberattacks into individual techniques and their intended uses, stretching from initial access to data exfiltration and impact. Attendees will learn how cybersecurity analysts map out—and eventually predict—attack behavior and how to use CDM with various information security frameworks to formulate effective security strategies and fill gaps. Most importantly, attendees will be able to immediately use this knowledge in our new highly interactive card game that leverages CDM concepts in a fun, educational, and approachable way highlighting the importance of cybersecurity.