CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

bg-inner
Allen Own

SPEAKER

Allen Own

DEVCORE CEO

Allen Own is the Executive Director of Hacker in Taiwan Association and CEO of DEVCORE. Allen is not only experienced in hacker technique research and penetration testing but also serves as a full-time lecturer and consultant for academic and government organizations. He is keen on community management and sharing. Allen specializes in website application security, penetration testing, professional education, and training in the cybersecurity field.

Speech

Red Team Forum

SEP 22

#

How to use Red Team Assessment properly?

09/22 (Thu) 14:00 - 14:30 7F 701F
DEVCORE CEO / Allen Own

The red team assessment has entered its fifth year in Taiwan, and when companies are at different levels of information security maturity, they have completely different ideas and expectations for the execution and results of the red team assessment. We hope that through this speech, enterprises can know how to choose targets, determine the suitable scope, coordinate attack methods, organize blue team response methods, and plan follow-up information security improvement measures for different information security maturity levels, so that enterprises can set a truly suitable red team assessment service for themselves. 

FINSEC Forum

SEP 22

#

The gap between realistic risk and ATT&CK

09/22 (Thu) 15:30 - 16:00 7F 701A
DEVCORE CEO / Allen Own

With the widespread use of ATT&CK, companies have begun to use it to assess current threats and priorities for hardening. However, enterprises should not just use these TTPs to infer the risks of the enterprise, which may fall into the misunderstanding of the cause and effect, and then ignore the existence of more high-risk vulnerabilities that are easily exploited. This talk will share thinking and suggested ways of using ATT&CK correctly to reduce the risk of misplaced defense resources by chasing potential attackers aimlessly