Due to the outbreak of the coronavirus, CYBERSEC 2020 will be rescheduled to August 12 (Wednesday) to August 14 (Friday), 2020. We apologize for any inconvenience this may have caused and your consideration will be much appreciated. CYBERSEC 2020 will continue open for registration. New updates regarding the event will also continue to be posted on the official website.

×
AUG. 12 Tue.

KEYNOTE

10:00 - 10:05
KEYNOTE
Opening Remarks
  • AUG. 12
  • 10:00
  • 701

Keynote Speaker

Merton Wu
iThome   Chief Editor

Tech Briefing

14:00 - 14:30
Tech Briefing
Zero Trust Access to Internet Requires a New Approach to Enterprise Security
  • AUG. 12
  • 14:00
  • 701 G

The greatest threat to enterprise security today is the user. Threat actors rely on a mix of psychological tactics that play upon users’ fears, curiosity and insecurities, getting them to think they are clicking on trusted links.  At the same time, most websites today are made up of hundreds or thousands of third-party components such as advertisements, plugins and content feeds, each one carrying the possibility of having malicious code hardwired onto a trusted site without the owner or user knowing.  You simply can’t trust anything on the web to be safe.  Limiting access to the internet is both counterproductive and stretches an already overburdened IT support team. Yet, you can’t just throw open the gates, and with hundreds or thousands of attacks per month, traditional detect and respond enterprise security strategies are at risk of being overwhelmed. There is no simple way for security professionals to differentiate safe content from malicious content, putting the organization at risk while inhibiting the productivity of users.  The only way to completely prevent today’s web-based threats is to employ a zero trust security strategy that treats all content the same. All it takes is one person to click on a web link in a phishing email delivering malware, ransomware, trying to steal credentials, or worse, and a company is hacked, their data breached, open to monetary fines and damages, and a reputation years being built is in tatters. With this perspective, is security that is “good enough” still good enough?  Menlo Security Isolation Platform provide a safe and secure platform for users’ web access. The solution prevent & segregates malicious threats away from users, creating a perfect web isolation strategy against adversaries.

  • Web Security
  • Cloud Security

Speaker

Lau Boon Peng
Menlo Security Director, Sales Engineering - Asia Pacific
14:45 - 15:15
16:00 - 16:30
16:45 - 17:15

AI Security Forum

Cyber Free Talk

Disinformation Forum

FinSec Forum

GovSec Forum

HealthCareSec Forum

IoT Security Forum

IR & CSIRT Forum

Attack & Defense Camp

OT Security Forum

Supply Chain Security Forum

AUG. 13 Wed.

Tech Briefing

14:00 - 14:30
14:45 - 15:15
15:50 - 16:20
16:30 - 17:00

AI Security Forum

Cyber Free Talk

Cyber Free Talk

FinSec Forum

GovSec Forum

HealthCareSec Forum

IR & CSIRT Forum

Attack & Defense Camp

Supply Chain Security Forum

Tech Demo

CyberLAB

AUG. 14 Thu.

Tech Briefing

10:00 - 10:30
10:45 - 11:15
11:30 - 12:00
14:00 - 14:30
14:45 - 15:15
16:00 - 16:30

AI Security Forum

Cyber Leadership Forum

CYBERSEC 101

Disinformation Forum

IoT Security Forum

IoT Security Forum
Understanding the IoT Threat Landscape and a Home Appliance Manufacturer's Approach to Counter Threats to IoT
  • AUG. 14
  • 10:00
  • 701 E

As we live in a world where billions of IoT devices are connected to the Internet, there are streams of news articles that depict damages caused by malware and other threats that target such devices. While there are some things that users can do to prevent such damages, consumers expect manufacturers to consider security as part of the product design in the development lifecycle. Panasonic, being a device manufacturer is able to collect information on these threats by connecting our own devices in the development / pre-shipment phases to a honeypot that we have developed. Since its deployment, Panasonic has been able to find 179 million attack cases and 25 thousand malware samples, of which 4,800 were unique samples targeting IoT. 20% of the samples were new and hashes for them did not exist when querying Virustotal. We have developed a system where information being collected through the honeypot is sent to a Sandbox for automated analysis, to address our concern for having a limited number of security experts. What this system allows Panasonic to do is collect "malware targeting/exploiting Pansonic IoT devices" for quicker remediation, in addition to "popular malware" targeting a wide-range of IoT devices. In this session, we will discuss the details of this project and share some analysis of malware that have been collected. By leveraging this information, Panasonic aims to develop products that are resilient to malware. In addition, we are looking for ways to use this threat and remediation information to develop an IoT SOC.

  • IoT Security
  • Security Development Lifecycle
  • Internet of Things

Speaker

Chih-Hsiang Chang
Panasonic Corporation Cyber Security Lab - Staff Engineer

IR & CSIRT Forum

OT Security Forum

Supply Chain Security Forum

Tech Demo

CyberLAB

* The organizer reserves the rights to amend all agenda and activities.