Aug 12 - 13

Taipei Nangang Exhibition Center, Hall 2

Resilience Matters

CyberLAB

Cybersecurity attacks have become a regular occurrence that is nearly impossible to avoid. In particular, corporations must be able to swiftly respond and recover to attacks, while maintaining proper operations limiting the scope of damage.
CYBERSEC 2020 CyberLAB gathers leading cybersecurity experts to serve as guides who take you step-by-step through simulations of all types of cyberattack scenarios. Referring to past cases of cyberattacks, they will present investigative tools and situational analysis methodologies to hone your capabilities in handling cybersecurity incidents. You will learn to quickly detect cyberattack original appearances and recover normal operations within the practical considerations of limited corporate resources and staff, while utilizing a complex variety of cybersecurity tools that are difficult to manage.

You are entitled to have free on-site enrollment for CyberLAB when you are done registration at CYBERSEC 2020!

CyberLAB Course Introduction

CyberLAB

Number of Attendee: 20
Course Introduction:

Coming Soon

Course Objectives:
Course Outline:
Suggested Equipment Specifications for Attendee:
Attendee Prerequisite Skills for the Course:
to Course
Overview

CyberLAB

Number of Attendee: 20
Course Introduction:

Coming Soon

Course Objectives:
Course Outline:
Suggested Equipment Specifications for Attendee:
Attendee Prerequisite Skills for the Course:
to Course
Overview

CyberLAB

Number of Attendee: 20
Course Introduction:

Coming Soon

Course Objectives:
Course Outline:
Suggested Equipment Specifications for Attendee:
Attendee Prerequisite Skills for the Course:
to Course
Overview

Real case scenarios: Discovering how hackers compromise organizations and how to stop them

Number of Attendee: 20
Trend Micro Technical Consultant Albert Jen
Course Introduction:
Today's advanced threats are designed to evade traditional security defenses, aiming to steal sensitive corporate information or encrypt corporate data for ransom.
This session shows you how hackers infiltrate your organization as they bypass your security defenses and stay hidden to conduct extortion againt you. It also shows how system administrators can investigate such events with tools that allow them to dig into system logs and uncover events and behaviors indicating an attack.
You will learn how to quickly follow the tracks of a sophisticated attack and deploy immediate protection against further attacks to secure the systems and data of your organization.
Course Objectives:

Understanding how hacker techniques work and how to prevent them through hands-on activities

Course Outline:

1. Common hacker techniques
2. Conducting root cause analysis for system administrators
3. Hands-on solution implementation

Suggested Equipment Specifications for Attendee:

Twenty-two (22) notebook computers to be prepared by the organizer

Attendee Prerequisite Skills for the Course:

Computer operations and networking knowledge and skills

to Course
Overview

TeamT5 Cyber Range

Number of Attendee: 20
Team T5 Security Engineer Tom
Team T5 R&D Engineer Zet
Course Introduction:

By practicing of incident response, you will understand the various TTPs of APT attack. Learn how to resolve the encoded content of script and find the way of persistence, lateral movement and how the shellcode is loaded.
You will be devided into teams and help each other to see the whole scope of incident from an single alert.

Course Objectives:

Learn how to see the whole scope of incident from an single alert.

Course Outline:

a. Tools for Investigation
b. Practice of Incident Response
c. Sample Analysis
d. Powershell Script Analysis
e. Case Report and Review

Suggested Equipment Specifications for Attendee:

CPU QUAD-CORE / 8GB RAM / CHROME or FIREFOX browser

Attendee Prerequisite Skills for the Course:

Experience of Investigation / Malware Analysis / Linux OS / Windows event log / Tools for Investigatoin(ex. sysinternals)

to Course
Overview

The Devil is Hidden in the Network Traffic: Attack and Defense Exercises and Network Forensics

Number of Attendee: 20
CHT Security Co., Ltd. Senior Analyst Shadow Liu
Course Introduction:

Nowadays, the ever-changing hacking techniques makes analysis more challenging. However, be it just or evil, everything is traceable on the Internet. With years of practical experiences, the cyber security consultant from CHT Security will talk about the latest attacking techniques and countermeasures, in the meantime introducing powerful network forensics tools to guide you in search of any malicious activity throughout the interconnected computer networks and of the root cause, and eventually block hackers from intruding.

Course Objectives:

As an emerging cyber threat, a hacker group will erase or encrypt their tracks in a cyber attack. The only record that cannot be deleted is the network log of intrusion. In this training, you will learn basic attacking and defensive skills and how to find suspicious and malicious activities in network traffic.

Course Outline:

This course includes introduction to hacking techniques, digital forensics mindset and tools, attack and defense exercises, and network forensics practices and CTF competition.

Suggested Equipment Specifications for Attendee:

1. Laptop memory: 4G RAM
2. OS: Windows 7 or higher
3. Browser: Chrome or Firefox
4. Able to connect to Wi-Fi
5. Notepad++ installation is recommended.

Attendee Prerequisite Skills for the Course:

Suitable for those with basic knowledge of networking.

to Course
Overview

Threat Hunting Exercise to Improve Corporate Security Resilience

Number of Attendee: 20
CyCarrier Technology Security Analyst Wave Lo
Course Introduction:

Cyber attacks on companies are becoming more common and sophisticated. In response, the National Institute of Standards and Technology (NIST) is updating their policy framework to address this new trend. The standard cyber security model is shifting from cyber security (securing the system from being hacked) to cyber resilience (being able to quickly pinpoint the root cause and recover from the breach).  Companies are increasingly concentrating their efforts in being able to quickly recover and resume operations in the event of an attack. 
In this course, you will learn blue-team tactics and strategies. The tools and processes on how to monitor, hunt, and investigate cyber threats will be introduced. Several cyber intrusion cases will be used to explain how a digital forensic investigation is conducted to delineate the storyline of breach. Through these cases, you will understand the tactics, techniques, and procedures that a hacker uses, and utilize this knowledge to better identify indicators of compromise and suspicious behavior. There will be hands-on exercises to walk you through different cyber attack cases. Through these exercises, you will understand the inner workings of hackers and have a better idea on how to conduct high-quality analysis of future cyber attacks. 

Course Objectives:

The hands-on training of this course will help you understand the different cyber attack scenarios and investigation methods. Additionally, you will become more familiar with the tools that are employed during each investigation phase and develop the critical thinking skills and mindset. By the end of this course, you will have a stronger understanding on how to better detect and respond to a cyber threat and to ensure that the company assets are protected. 

Course Outline:

1. Cyber Threat Hunting Introduction
2. Case Sharing
3. Hands-on Practice and Review
4. Summary and Discussion

Suggested Equipment Specifications for Attendee:

Bring your own laptop. The laptop should be equipped with at least 4G of memory and have the Google Chrome web browser installed.

Attendee Prerequisite Skills for the Course:

IT related work experience; some basic entry-level understanding of red team attack tactics.

to Course
Overview