AUG. 11 Tue.

Master Agenda

Time Topic
Location 7F_701
10:00-10:05
keynote 英文開場
10:05-10:10
keynote 總統致詞
10:10-10:40
keynote Securing the Digital Now
Ziv Chang
Trend Micro Senior Associate of Global Core Technology Department
  • Digital Transformation
  • Threat Intelligence Sharing
10:40-11:10
keynote From passive to active Build up an intranet platform for cybersecurity
Chester Huang
e-SOFT CORP. Technical manager
  • Law Enforcement
  • Network Visibility
  • Security Orchestration
11:10-11:40
keynote From reactive protection to proactive detection: How to block suspicious activities
Victor Chen
Information Security Manager & information security consultant Manager of Information Technology Systems Integration & MIS Manager
  • Endpoint Detection & Response
  • Data Loss Prevention
  • Insider Threat
11:40-12:10
keynote CyCarrier
Birdman Chiu
CyCarrier Technology Co-Founder
12:10-14:00 Lunch & Expo Tour
  4F_4A 4F_4B 4F_4C 7F_701 A 7F_701 B 7F_701 C 7F_701 D 7F_701 E 7F_701 F 7F_701 G 7F_701 H 7F_703 7F_702 AB 7F_702 C
14:00-14:30 Attack & Defense Camp
中華電信
CYBERSEC 101
Know yourself and the enemy
Zero Chen
Talent-Jump Director of Information Security Department
  • Security Awareness
  • Risk Management
  • Security Strategy
Cyber Leadership Forum
14:00-14:05
Opening
Cyber Leadership Forum
Pre-recorded Video 14:05-14:25
Case Study: Iron Mountain's move to the NIST Cyber Security Framework
Cyber Oak Solutions LLC CISO Lance Dubsky
  • NIST Cybersecurity Framework
  • Security by Design
Tech Briefing
Build It Right, Monitor Continuously - Strategic and State-of-the-Art Cybersecurity Architecture
Francis Li
DXC Technology Security Consulting Integration & Compliance
  • Digital Transformation
  • Security Strategy
  • Security Operation

 

 
Tech Briefing
Real cases, real challenges and the real power of AI on Cyber Defense
Dragon Chang
Microsoft Security P.M.M.
  • Advanced Threat Protection
  • Managed Detection & Response
  • AI Security
Tech Briefing
CrowdStrike
Tech Briefing
New Privacy in Android 11 與 OWASP 行動開發安全-Albert Hsieh
Albert Hsieh
SinoPac Securities Information Security Dept. Senior Vice President
Attack & Defense Camp
Protecting your Internet route integrity
Jie Liau
IBM Security Engineer
  • Network Security
Tech Briefing
Coming Soon
Tech Briefing
Best Practices for Cloud Security
Hank Yu
Freedom CEO
  • Cloud Security
  • Advanced Threat
  • Data Security
CyberLAB
13:00-15:00
TeamT5 Cyber Range
Tom
TeamT5 Security Engineer
Zet
TeamT5 R&D Engineer
CyberLAB
13:00-15:00
Real case scenarios: Discovering how hackers compromise organizations and how to stop them
Albert Jen
Trend Micro Technical Consultant
14:45-15:15 Attack & Defense Camp
Exploit Development 101 - Attack & Defense History of Windows BufferOverflow
Peter Chi
IBM Taiwan CDL - Staff Software Engineer
  • Application Security
  • Exploit of Vulnerability
  • Penetration Testing
CYBERSEC 101
Cybersec 101: Kubernetes Security
YSc
Secview Founder
  • Kubernetes Security
  • Security Operation
  • Container Security
Cyber Leadership Forum
14:25-14:55
The philosophical thinking on information security governance of the board and senior executives.
HSIN-CHIH HUANG
EC-Council Certified Incident Handler (ECIH) Global Test Questions Committee
  • Governance
  • Security by Design
Tech Briefing
HENNGE
IR & CSIRT Forum
14:40-14:45
(開場致詞) IR & CSIRT 及資安人才發展論壇
IR & CSIRT Forum
14:45-15:15
How Strong is Your Business' Digital Resilience? Best Practices for Responding to Security Incidents
Trend Micro Security Consultant Louis Liu
  • Incident Response
  • Cyber Resilience
  • CSIRT
HealthCareSec Forum
14:30-14:40
Opening
HealthCareSec Forum
14:40-15:10
HealthCareSec Forum
Tech Briefing
In the war of cybersecurity, will you be the next factory to be blackmailed?
Alex Chen
Aruba Senior Solution Team Lead
  • IoT Security
CyberConnect 15:30-17:00
【CyberConnect】
Tech Briefing
新世代端點防護-特殊威脅解決方案 助您阻擋大多數先進攻擊
Kenneth Yip
VMware Carbon Black Senior Reginal Sales Manager
  • Advanced Threat
  • Advanced Threat
  • Threat Management
Tech Briefing
Create a Digital Business That is Secure by Design
Jason Yang
NTT Taiwan Solutions Ltd. Security Senior Client Manager
  • Security by Design
  • Managed Security Service
Tech Briefing
亞利安

On Design of Security Requirement for Permissioned Chain
Shi-Cho Cha
National Taiwan University Professor
  • Blockchain & Distributed Ledger
  • Information Governance
16:00-16:30 HITCON Talk
The Distance Between NAS and CVE
ddaa
HITCON CTF Security Analyst
  • Firmware Security
  • Exploit of Vulnerability
  • Secure Coding
CYBERSEC 101
NG-SOC in Taiwan The realities , the difficulties and the future
Jack Chou
Information Security Service Digital United Inc Senior Technical Consultant
  • Threat Detection & Response
  • Incident Response
  • Threat Intelligence
Cyber Leadership Forum
14:55-15:35
網銀的縱深防禦部署策略
Wang-Tun Chou
Next Bank CIO
  • Governance
  • Security Strategy
  • Security Operation
Tech Briefing
Radware
IR & CSIRT Forum
Frenemy of red and blue team
John Jiang
CyCarrier Technology Cyber Security Researcher
  • Security Operation
  • MITRE ATT&CK
  • Blue Team
HealthCareSec Forum
15:10-15:30
HealthCareSec Forum
HealthCareSec Forum
15:30-15:50
HealthCareSec Forum
Tech Briefing
The Final Frontier of Threat Intelligence is Exploring the Unknowns
Raymund Lin
IBM Security Analytics Team Taipei Lead, AI Invention Development Team Greater-China Chair
  • Threat Intelligence
  • Security Analytics
  • Unified Threat Management
Tech Briefing
WPS+ Cloud Security Total Solution
Elton Chen
Kingsoft Office Software General Manager
  • Data Security
  • Content Security
  • Data Loss Prevention
Tech Briefing
突破多重環境的壁壘—提供高彈性的資安營運戰略
Roger HSU
Taiwan Mobile Manager
  • Cloud Security
  • IoT Security
  • Endpoint Security
Tech Briefing
Implementation of Identity Management
Andy Wu
WeiCloud Technology Co., Ltd Senior Consultant
  • Identity Governance
  • Privilege Management
Tech Briefing
Lightweight PostgreSQL security strategies for enterprise
Yung-Chung Ku
PostgreSQL Organizer, Taiwan PostgreSQL User Group
  • Security Strategy
  • Access Control
  • Data Security
CyberLAB
15:30-17:30
TeamT5 Cyber Range
Tom
TeamT5 Security Engineer
Zet
TeamT5 R&D Engineer
CyberLAB
15:30-17:30
Real case scenarios: Discovering how hackers compromise organizations and how to stop them
Albert Jen
Trend Micro Technical Consultant
16:45-17:15
 
Cyber Leadership Forum
15:35-17:00
Cyber Executive Lounge 交流時間
Tech Briefing
Countermeasures to the Cybersecurity Threat from Quantum Computing
Jimmy Chen
Chairman, WiSECURE Technologies; Adjunct Assistant Professor, National Taiwan University
  • Cryptography
  • Quantum Computing
  • Quantum Decryption
IR & CSIRT Forum
【IR & CSIRT Forum】 Panel Discussion
Ken Lee
Synology Inc. Security Incident Response Team Manager
TT Tsai
TeamT5 Founder and CEO
Joseph Chiu
Trend Micro Senior Manager of Cyber Security Incident Response Team
HealthCareSec Forum
16:00-17:00
[HealthCareSec Forum] Panel Discussion
Tech Briefing
Confront the operational challenges inside a closed network.
Stev Hsu
Taiwan Stock Exchange Corporation Department of System Operating - System Operations Engineer
  • Critical Infrastructure Protection
  • Security Operation
  • Incident Response
Tech Briefing
果核數位
Tech Briefing
Blockchain security over three generations For Dummies
Vic Huang
LINE TW Security - Application Security Engineer
  • Blockchain & Distributed Ledger
  • Cyber Criminal
Attack & Defense Camp
Digital Signature? Nah, You Don't Care About That Actually ;)
Sheng-Hao Ma
CHROOT Core Member
  • APT
  • Cyberwarfare
  • Phishing
Attack & Defense Camp
SELinux : The Control Freak
Yu-Hsuan Wang (Hank Wang)
Industrial Technology Research Institute ICL, F - Intern
  • Access Control
  • Endpoint Security
  • Application Security
AUG. 12 Wed.

Master Agenda

Time Topic
Location 4F_4A 4F_4B 4F_4C 7F_701 A 7F_701 B 7F_701 C 7F_701 D 7F_701 E 7F_701 F 7F_701 G 7F_701 H 7F_702 AB 7F_702 C 7F_703 AB
10:00-10:30 Attack & Defense Camp
Abnormal Activities of Insider Threat: Encoding, Steganography, Device Hacking, Obfuscation
Victor Chen
Information Security Manager & information security consultant Manager of Information Technology Systems Integration & MIS Manager
  • Insider Threat
  • Data Loss Prevention
  • Behavioral Analytics

金融犯罪的舞弊偵測 - 曾韵
Cyber Leadership Forum
10:00-12:00
Cyber Executive Lounge 交流時間
FinSec Forum
10:30-10:35
【FINSEC FORUM】Opening Remarks
FinSec Forum
10:35-10:40
【FINSEC FORUM】⾦管會主委致詞

5G Taking off : its Security Challenges
Yeali Sun (Sunny Sun)
National Communications Commission Member
  • Mobile Security
CyberConnect
10:00-12:00
【CyberConnect】
Jyan, Hong-Wei
Director General of Department of Cyber Security of Executive Yuan
IoT Security Forum
10:00-10:05
(開場致詞) 物聯網安全論壇
IoT Security Forum
10:00-10:30
Understanding the IoT threat landscape and a home appliance manufacturer's approach to counter threats to IoT
Panasonic Corporation Cyber Security Lab - Staff Engineer Jimmy Chang
  • IoT Security
  • Security Development Lifecycle
  • Internet of Things
Supply Chain Security Forum
10:00-10:05
(開場致詞) 供應鏈安全論壇
Supply Chain Security Forum
Pre-recorded Video 10:00-10:30
Insights From Supply Chain Attacks Investigations
Kaspersky Director, Global Research & Analysis Team, APAC Vitaly Kamluk
  • Cyber Supply Chain Security
  • Hackers & Threats
Disinformation Forum
The Disinformation Chain
Puma Shen
Assistant Professor, National Taipei University / Chairman, Doublethink Lab
  • Disinformation
  • Fake news
  • Information warfare
OT Security Forum
ICS / OT Cybersecurity Framework
Chin-Jui Chang
PwC Taiwan Partner, Risk Assurance
  • ICS Security
  • OT Security
  • Risk Management
AI Security Forum
I See You. Tracking Down Hackers from Billions of Quad9 Data with AI.
Tiffany Kuo
IBM Security Software Engineer
  • AI Security
  • Malware Protection
  • Threat Intelligence

 

 

 
10:45-11:15 Attack & Defense Camp
Coming Soon
Jiun-Peng Chen
National Taiwan University Adjunct Professor, Department of Electrical Engineering
  • Hardware Security
  • Cryptography
  • Standards
Cyber Free Talk
【大大們的Free Talk】Birdman 大大
Birdman Chiu
CyCarrier Technology Co-Founder
FinSec Forum
10:40-11:00
Financial Policy and Cyber Security Defense
Vice Chairperson of Financial Supervisory Commission JEAN CHIU
  • Governance Risk & Compliance
  • Law
FinSec Forum
11:00-11:40
Coming Soon
British Standards Institution NE Asia Managing Director Peter Pu
  • Cyber Resilience
  • ISO 27001
  • Governance Risk & Compliance

Pre-recorded Video 10:45-11:15
Coming Soon
IoT Security Forum
SELinux-Based Embedded Devices - Strengthen Cybersecurity Defense
Yi-Ting Chao
Industrial Technology Research Institute Technical Deputy Manager of the System Software Division
  • IoT Security
  • Access Control
  • NIST Cybersecurity Framework
Supply Chain Security Forum
Semi Supply Chain Security Enhancement Practice Sharing
Leon Chang
TSMC Information Technology Security Project Manager SEMI Information Security Working Group Leader
  • OT Security
  • Endpoint Security
  • Supply Chain Security
Disinformation Forum
Islander : AI-Empowered Real-Time News Monitoring
Yun-Nung Chen
National Taiwan University Assistant Professor
  • Disinformation
  • News Media
  • Natural Language Processing
OT Security Forum
Seize the last chance of preventing OT Cyberattack proactively
Gwen Hsieh
IBM Senior Offering Manager of Worldwide Threat Protection
  • OT Security
  • ICS Security
  • IoT Security
Attack & Defense Camp
Security with AI (ML in Fraud Buster)
Sam Kuo
Trend Micro Software Engineer
  • AI Security
  • Email Security
  • Fraud Protection
11:30-12:00 Attack & Defense Camp
Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data
Joey Chen
Trend Micro Senior Threat Researcher
  • APT
  • Threat Intelligence
Cyber Free Talk
【大大們的Free Talk】Allen 大大
Allen Own
DEVCORE CEO
FinSec Forum
11:40-12:00
【FINSEC FORUM】數位轉型下的資安思維與策略
王信富
中華資安國際 (中華電信關係企業) 協理
  • Security Consulting
  • Security Strategy
IoT Security Forum
Linux Kernel Hardening - Security Patches
SZ Lin
Moxa Inc. Assistant Project Manager, Software Development Center
  • Linux Kernel Security Hardening
  • Vulnerability Management
Supply Chain Security Forum
The Trend of Supply Chain Attacks from the Review of Taiwan's APT Attacks in 2019
Peikan Tsung
CyCarrier Technology Co-Founder
Disinformation Forum
Information Operations: Drawing Lessons from Immunization Combat
Yisuo Tzeng
Institute for National Defense and Security Research, INDSR Division Director, Cyber Warfare and Information Security
  • Information warfare
  • Disinformation
  • National Security
OT Security Forum
The Day After WannaCry
Steven Hsu
Trend Micro Inc TXOne PMM
  • ICS Security
  • Business Continuity & Disaster Recovery
  • OT Security
AI Security Forum
Apply Machine Learning for Practical Security
Chung-Kuan Chen
CyCarrier Senior Researcher
  • Machine Learning
  • APT
  • Threat Hunting
14:00-14:30 Tech Briefing
Agentless and Zero Trust IoT Security
Jarvett Lin
Armia Regional Sales Director (North Asia)
  • IoT Security
  • Threat Management
  • OT Security
Cyber Free Talk
【大大們的Free Talk】TT 大大
TT Tsai
TeamT5 Founder and CEO
Cyber Leadership Forum
14:00-14:05
Openning
Cyber Leadership Forum
14:05-14:35
數位轉型的科技風險管理之道
SinoPac Holdings Director School of law, Soochow University - Adjunct Assistant Professor Thomas Wan
FinSec Forum
13:30-14:00
【FINSEC FORUM】⼀銀資安推動經驗
First Bank Executive Vice President Pei Wen Liu
FinSec Forum
14:00-14:30
How to Secure Your Open API ?
National Chengchi University Professor Kung Chen
  • API Security
Attack & Defense Camp
Discover Invisible Fileless Webshell in the APT attack
Dove Chiu
Trend Micro Senior Threat Researcher
Tim Yeh
Trend Micro Senior Threat Researcher
  • Incident Response
  • Threat Detection & Response
  • APT
CyberConnect
14:00-17:00
【CyberConnect】
Jyan, Hong-Wei
Director General of Department of Cyber Security of Executive Yuan
IoT Security Forum
Incident Response in Practice for Product Security: Past, Present, and Future
Ken Lee
Synology Inc. Security Incident Response Team Manager
  • PSIRT
  • Bug Bounty
National Defense Forum
國防資安產業論壇
Tech Briefing
Security Next - 無硝殺戮下的省思與因應無硝殺戮下的省思與因應
Johnson Lin
Microsoft Operation Risk & Security Program Manager
  • Threat Analysis & Protection
  • Cloud Security
  • Digital Transformation
Tech Briefing
智弘軟體
AI Security Forum
An Eye for an Eye. AI for AI - Detecting Adversarial Samples
Ryan Chang
IBM Security User Behavior Analytics & Software Engineer
  • AI Security
  • Machine Learning
  • Intrusion Detection
CyberLAB
13:00-15:00
Threat Hunting Exercise to Improve Corporate Security Resilience
Wave Lo
CyCarrier Technology Security Analyst
CyberLAB
13:00-15:00
The Devil is Hidden in the Network Traffic: Attack and Defense Exercises and Network Forensics
Shadow Liu
CHT Security Co., Ltd. Senior Analyst
CyberLAB
13:00-15:00
IBM CyberLAB
14:45-15:15 Black Hat Awarded Forum
CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms
Tsung-Yi Ho
National Tsing Hua University Professor
Yun-Yun Tsai
National Tsing Hua University Research assistant
  • Cloud Security
  • AI Security
  • Machine Learning
Cyber Free Talk
【大大們的Free Talk】Tim大大
Tim Hsu
HITCON Founder
Cyber Leadership Forum
14:35-15:05
Cyber Leadership Forum
Renwei Chen
Chinese Culture University CIO, School of Continuing Education
FinSec Forum
14:30-15:00
FinSec 4.0: From AI to ATT&CK
CyCarrier Technology Founder Benson Wu
  • MITRE ATT&CK
  • AI
  • Blue Team
FinSec Forum
15:00-15:20
【FINSEC FORUM】Break
Tech Briefing
Security, Visibility and Intelligent Automation for 5G Mobile and Multi-Cloud Networks
Nick Chen
A10 Networks SE Manager
  • Network Security
  • Network Visibility
  • DDoS Protection
IoT Security Forum
Chaos Of Vehicle Communications
NotSurprised Chuang
Industrial Technology Research Institute Information and Communications Research Laboratories - Deputy Engineer
  • Standards
  • Network Security
  • IoT Security
National Defense Forum
國防資安產業論壇
Tech Briefing
思訊電腦
Tech Briefing
Hackers are Everywhere in the IoT world! An unlimited protection , the Zero-Trust Model will Become Prominent in Cybersecurity.
Kent Wang
Aruba Senior Solution Manager
AI Security Forum
Malware Classification with Graph Hash
Shih-Hao Weng
Trend Micro Threat Researcher
Vico Fang
Trend Micro Threat Researcher
  • Threat Hunting
  • Threat Intelligence
  • Threat Intelligence Sharing
15:50-16:20 Black Hat Awarded Forum
Operation Semi Chimera – APT Operation targets Semiconductor Vendor
Inndy Lin
CyCarrier Technology Research Team - Cyber Security Researcher
  • Hackers & Threats
  • APT
  • Threat Intelligence

Coming Soon
Cyber Leadership Forum
15:05-15:35
強化後疫情時代資安韌性的新架構: NIST CSF應用實務
Yunze Hsieh
KPMG Executive Deputy General Manager of Consulting Services Department
  • NIST Cybersecurity Framework
FinSec Forum
15:20-15:50
PSD2, open banking and 3rd party banking apps
Trend Micro Senior Threat Researcher Philippe Lin
  • FinTech
  • API Security
  • Personal Identifiable Information
FinSec Forum
15:50-16:30
【FINSEC FORUM】Information Governance in FinSec 2020
SinoPac Holdings Director School of law, Soochow University - Adjunct Assistant Professor Thomas Wan
  • Critical Infrastructure Protection
  • Cyber Supply Chain Security
  • Information Governance
Tech Briefing
15:50-16:40
Is your cybersecurity strategy precise enough? Mitigate real threats previously through framework.
Allen Own
DEVCORE CEO
  • Security Strategy
  • NIST Cybersecurity Framework
  • Red Team
IoT Security Forum
Hack in the Sky: Security Analysis and Implementation of Drone Devices And Communication System
Gavin Chang
飛行日有限公司 Drone Secure CTO
  • Secure Drone
  • IoT Security
National Defense Forum
國防資安產業論壇
Tech Briefing
數位轉型新時代 一定要知道資料庫與檔案如何安全上雲
Ethan Lin
Progress Greater China Region (GCR) Technical Director
  • GDPR
  • Data Security
Tech Briefing
群環科技
Tech Briefing
Coming Soon -鏡傳媒 / 簡信昌
CyberLAB
15:30-17:30
Threat Hunting Exercise to Improve Corporate Security Resilience
Wave Lo
CyCarrier Technology Security Analyst
CyberLAB
15:30-17:30
The Devil is Hidden in the Network Traffic: Attack and Defense Exercises and Network Forensics
Shadow Liu
CHT Security Co., Ltd. Senior Analyst
CyberLAB
15:30-17:30
Core Cloud Tech CyberLAB
16:30-17:00 Black Hat Awarded Forum
Breaking Samsung's Root of Trust - Exploiting Samsung Secure Boot
Jeffxx
TeamT5 Senior Researcher
  • Exploit of Vulnerability
  • Mobile Security
  • TrustZone
HITCON Talk
Windows Malware HOT 5
Yichin
HITCON GIRLS Member
  • Threat Analysis & Protection
  • Hackers & Threats
  • Cyber Criminal
Cyber Leadership Forum
15:35-17:00
Cyber Executive Lounge 交流時間
FinSec Forum
16:30-16:40
【FINSEC FORUM】Closing Remark
IoT Security Forum
I just want to send SMS : Challenges and dilemmas in telecom security research
Shin Li
Trend Micro IoT Threat Researcher
  • Telecom Security
  • Mobile Security
  • Internet of Things

 
Tech Briefing
宏碁商軟
Tech Briefing
Insider Risk Management : Intelligently investigate and take action on insider risks
Daisuke Sato
Modern Workplace Global Black Belt, Microsoft Asia
  • Insider Threat
  • Access Control
  • AI Security
Tech Briefing
Unpack Android apps on non-rooted and factory ROM devices using virtualization technique
Jason Wang
Fourdesire Senior Security Engineer
  • Mobile Security
  • Application Security
  • Reverse Engineering

* The organizer reserves the rights to amend all agenda and activities.