因應新型冠狀病毒肺炎疫情,CYBERSEC 2020 臺灣資安大會延期至2020年8月12日(三)-8月14日(五) 舉行。大會持續受理報名,並將更新相關規劃於網站。

×

8 / 12 - 14

南港展覽二館

MAKE IT SAFER

持續改善‧全面強化

資安新知

Speaker Interview

中込剛 Nakakomi Go

台灣惠頂益股份有限公司 董事總經理

我們來到台灣的這三年以來,HENNGE 台灣都有一直在客戶之間和網路上找尋關於雲端和資安的資訊。這也正是我們講座想分享的主題與心得。我們有漸漸的看到台灣的雲端市場的成長,隨之雲端的增長,雲端資安的需求也有一起在增加。

深入了解

Andrew Tsonchev

Darktrace Director of Technology

Hackers launch AI-powered attacks

In 2020, we can expect artificial intelligence to be used by hackers to target businesses.
 
Incorporating AI in attacks will allow cyber-criminals to achieve greater scale and speed than ever seen before. This is because the manual effort of tailoring an attack to specific individuals will, in large part, be automated.

‘Offensive AI’ malware will be able to learn about its environment and use the information that it sees to better direct the attack, while identifying the most valuable data to steal. 

‘Impersonation attacks’ will become more common as AI is used to automatically generate spear-phishing emails that expertly mimic the writing style of trusted contacts and colleagues, or even to create ‘deep fake’ videos designed to confuse. While human attacks would need hours of social network research to perform such an attack, the AI attacker can do this in seconds. 

Ransomware is not going away – it’s getting smarter and more targeted 

Ransomware ran riot in 2019, devasting more than 70 local governments across the US alone. And it’s not going anywhere soon – in fact, we can expect the ransomware deployed in 2020 to be smarter than ever before.

While most ransomware to date has infiltrated traditional IT networks, and is financially-motivated, attackers are likely to develop more advanced ransomware that is specifically designed to disrupt critical national infrastructure. These fast-moving campaigns will target industrial control networks within the energy, telecommunications, water, and transportation sectors, as well as other systems on which public services rely. For these state-sponsored hackers, the interruption of services is not a by-product of a money-making mission – it’s their key objective. 

Cyber weapon developers lose control of their creations
In 2020, the collateral damage of state-sponsored attacks will reach new heights. 
 
Governments are pouring money into offensive and defensive cyber capabilities, developing   highly advanced attack tools - but the intelligence needed to deploy them correctly cannot always be bought. Predicting the potential force and impact of an attack requires a deep understanding of an adversary’s network, yet this is too often out of reach. Even ransomware developers cannot foresee how many organizations will be hit in their attack and how they will be affected. 

A cyber weapon designed to shut down the power of a military compound could leak from the intended system, and inadvertently plunge large parts of the country into darkness – prompting its governments to respond in kind. The prospect of an all-out cyber war involving the world’s major players is no longer a distant fiction. 

The Machine fights back: ‘Autonomous Response’ goes mainstream

2020 will be the year where businesses fully embrace Autonomous Response – or AI that fights against cyber-threats automatically.
 
While 1,000 organizations have already deployed Autonomous Response technology, we can expect the transition to AI-powered response to accelerate. Humans are struggling to keep up with the speed of attacks, and as AI attacks threatens to take things to the next level, Autonomous Response is crucial for survival. 

Organizations will effectively delegate the response to an emerging cyber-threat to machine algorithms, allowing them to react at computer-speed to fast-moving attacks. But it will happen in stages: at first, security teams will only allow the AI to have control out of office hours, when no one is there to manually respond, but soon will extend the scope, having them handle the first-line response to any significant security incident. 
 
This active, defensive use of AI will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage. AI on AI battles are coming, but with the defenders starting to regain the advantage. 

深入了解

Jayakumar (Jay) Kurup

Morphisec Technical Director

2020年網絡資安面臨的最大挑戰是零日攻擊的頻率增加。 儘管企業已經在保護平台上進行了投資,但其對於保護自己免受零日攻擊的準備仍是不足。

深入了解

Jonathan Trull

Microsoft Global Director, Global Chief Cybersecurity Advisor, Cybersecurity Solutions Group

(1) 供應鏈安全:由於企業已建置不少資安預防方案,現在的攻擊目標改為攻擊供應鏈後端,例如嵌入惡意程式至開放原始碼的內容中,像是 Docker Image,或者侵入更新服務來當作攻擊跳板。

(2) 雲端管理問題(Cloud Sprawl):由於雲端服務帶來的諸多點,在美國很多大型企業用了數千個雲端應用程式,但就像建置在本地的系統一樣,使用越多種伺服器、雲端應用程式、runtime 以及不同種類的函式庫,企業就越難管理。已經有越來越多企業需著手解決此問題。

(3) 其它包括工業物聯網系統、企業網路環境等都仍然讓企業十分棘手,因為企業未必能像以往防護應用服務去保護它們。

(4) 網路應用服務的漏洞也持續是攻擊者用來快速入侵的切入點,此一入侵手法最為常見,未來也持續有效。

(5) 以更創新的社交工程騙取帳密:除了透過釣魚郵件外,利用 WhatsApp、Facebook 等即時傳訊軟體,以及遊戲當中的聊天室或檔案分享功能來發動社交工程也越來越常見。而傳統的防禦系統只過濾電子郵件、URL 或附件,但現今在微軟的調查中,約 90% 以上的攻擊事件都是源自於此類管道所發動的社交工程。尤其最大的問題是許多人社群軟體的帳號密碼與其公司帳號的設定完全相同,或是在不同的社群軟體、雲端服務使用相同帳密,而攻擊者十分聰明、往往會去猜測你可能使用的服務並多方比對,因而能鎖定對象並成功地發動目標式攻擊。

深入了解

Myla V. Pilao

Trend Micro Research 總監

The hyperconnectivity of the world is the result of combined technological advancements in the past decade. While it ushers in a new space for innovation and bridges expansive distances and borders, it also poses a challenge especially in cybersecurity.

In the hyperconnected world cyberthreats can have unpredictable and even unprecedented consequences. It is the principal task of cybersecurity in the upcoming decade to not only keep up with the threats borne from this new space but also anticipate how these threats will evolve in parallel to further technological advancements.

深入了解

Pat Shueh

Zimperium 亞太區技術銷售副總

移動裝置的安全於企業無法有效管理 BYOD,於個人而言多數人尚未認知手機上的風險,但攻擊趨勢早已從其他終端設端大量轉移到個人手機上,也成為跳板攻擊企業內部的最薄弱一環。

深入了解

王亮權

思訊電腦 技術部 經理

隨著雲端應用盛行,各項資訊服務的維運,以及資料交換的安全性,勢必遭遇前所未有的衝擊,無論企業採取何等形式取得需要的IT服務,包含人員所使用的端末設備、網路傳輸以及資料等的安全性,都將面臨較以往更艱鉅的考驗,此時如欲導入資安方案,應考量的重點,除了根本的安全技術與機制外,如何能在不影響使用者既有的工作方式,以及維持高效能生產力上取得平衡,將是巨大挑戰。 

深入了解

王信富

中華資安國際 (中華電信關係企業) 協理

隨著 5G、工業物聯網 IIoT、智慧聯網 AIoT、車聯網、自駕車、區塊鏈等新技術、新應用的開展,勢必帶來新的資安缺口。隨著時間演進,幾乎每天都會發現新的系統、應用或技術的缺口、漏洞。如果企業沒能及時防患於未然,就可能給了駭客可乘之機,造成政府或企業的嚴重損失。

深入了解

王建忠

眾至資訊股份有限公司 產品行銷副總

2019是釣魚郵件攻擊最盛行的一年,惡意者常利用正常的網域、偽造的網域、借用別人的伺服器或公開免費的郵箱,以合法的寄送方式避開郵件系統的偵測,用戶如果點了郵件中有害的網址,或是開啟了有問題的檔案,檔案自動連結惡意的網址,就可能會讓企業成為受災戶,輕則癱瘓公司網路設備、重則公司商業機密被盜取。
隨雲端服務興起,企業在選擇自建或上雲端有不同的考慮方式,但不可忽視的是,郵件安全的防護與資料保存是必須重視的問題,企業如何讓郵件在上雲與落地之間能兼顧兩者需求,相信是管理者未來最大挑戰。

深入了解