8 / 12 - 13


Resilience Matters



Speaker Interview

中込剛 Nakakomi Go

台灣惠頂益股份有限公司 董事總經理

我們來到台灣的這三年以來,HENNGE 台灣都有一直在客戶之間和網路上找尋關於雲端和資安的資訊。這也正是我們講座想分享的主題與心得。我們有漸漸的看到台灣的雲端市場的成長,隨之雲端的增長,雲端資安的需求也有一起在增加。


Andrew Tsonchev

Darktrace Director of Technology

Hackers launch AI-powered attacks

In 2020, we can expect artificial intelligence to be used by hackers to target businesses.
Incorporating AI in attacks will allow cyber-criminals to achieve greater scale and speed than ever seen before. This is because the manual effort of tailoring an attack to specific individuals will, in large part, be automated.

‘Offensive AI’ malware will be able to learn about its environment and use the information that it sees to better direct the attack, while identifying the most valuable data to steal. 

‘Impersonation attacks’ will become more common as AI is used to automatically generate spear-phishing emails that expertly mimic the writing style of trusted contacts and colleagues, or even to create ‘deep fake’ videos designed to confuse. While human attacks would need hours of social network research to perform such an attack, the AI attacker can do this in seconds. 

Ransomware is not going away – it’s getting smarter and more targeted 

Ransomware ran riot in 2019, devasting more than 70 local governments across the US alone. And it’s not going anywhere soon – in fact, we can expect the ransomware deployed in 2020 to be smarter than ever before.

While most ransomware to date has infiltrated traditional IT networks, and is financially-motivated, attackers are likely to develop more advanced ransomware that is specifically designed to disrupt critical national infrastructure. These fast-moving campaigns will target industrial control networks within the energy, telecommunications, water, and transportation sectors, as well as other systems on which public services rely. For these state-sponsored hackers, the interruption of services is not a by-product of a money-making mission – it’s their key objective. 

Cyber weapon developers lose control of their creations
In 2020, the collateral damage of state-sponsored attacks will reach new heights. 
Governments are pouring money into offensive and defensive cyber capabilities, developing   highly advanced attack tools - but the intelligence needed to deploy them correctly cannot always be bought. Predicting the potential force and impact of an attack requires a deep understanding of an adversary’s network, yet this is too often out of reach. Even ransomware developers cannot foresee how many organizations will be hit in their attack and how they will be affected. 

A cyber weapon designed to shut down the power of a military compound could leak from the intended system, and inadvertently plunge large parts of the country into darkness – prompting its governments to respond in kind. The prospect of an all-out cyber war involving the world’s major players is no longer a distant fiction. 

The Machine fights back: ‘Autonomous Response’ goes mainstream

2020 will be the year where businesses fully embrace Autonomous Response – or AI that fights against cyber-threats automatically.
While 1,000 organizations have already deployed Autonomous Response technology, we can expect the transition to AI-powered response to accelerate. Humans are struggling to keep up with the speed of attacks, and as AI attacks threatens to take things to the next level, Autonomous Response is crucial for survival. 

Organizations will effectively delegate the response to an emerging cyber-threat to machine algorithms, allowing them to react at computer-speed to fast-moving attacks. But it will happen in stages: at first, security teams will only allow the AI to have control out of office hours, when no one is there to manually respond, but soon will extend the scope, having them handle the first-line response to any significant security incident. 
This active, defensive use of AI will change the role of security teams, and improve companies’ ability to defend their data and networks from future compromises, breaches, and sabotage. AI on AI battles are coming, but with the defenders starting to regain the advantage. 


Jayakumar (Jay) Kurup

Morphisec Technical Director

2020年網絡資安面臨的最大挑戰是零日攻擊的頻率增加。 儘管企業已經在保護平台上進行了投資,但其對於保護自己免受零日攻擊的準備仍是不足。


Jonathan Trull

Microsoft Global Director, Global Chief Cybersecurity Advisor, Cybersecurity Solutions Group

(1) 供應鏈安全:由於企業已建置不少資安預防方案,現在的攻擊目標改為攻擊供應鏈後端,例如嵌入惡意程式至開放原始碼的內容中,像是 Docker Image,或者侵入更新服務來當作攻擊跳板。

(2) 雲端管理問題(Cloud Sprawl):由於雲端服務帶來的諸多點,在美國很多大型企業用了數千個雲端應用程式,但就像建置在本地的系統一樣,使用越多種伺服器、雲端應用程式、runtime 以及不同種類的函式庫,企業就越難管理。已經有越來越多企業需著手解決此問題。

(3) 其它包括工業物聯網系統、企業網路環境等都仍然讓企業十分棘手,因為企業未必能像以往防護應用服務去保護它們。

(4) 網路應用服務的漏洞也持續是攻擊者用來快速入侵的切入點,此一入侵手法最為常見,未來也持續有效。

(5) 以更創新的社交工程騙取帳密:除了透過釣魚郵件外,利用 WhatsApp、Facebook 等即時傳訊軟體,以及遊戲當中的聊天室或檔案分享功能來發動社交工程也越來越常見。而傳統的防禦系統只過濾電子郵件、URL 或附件,但現今在微軟的調查中,約 90% 以上的攻擊事件都是源自於此類管道所發動的社交工程。尤其最大的問題是許多人社群軟體的帳號密碼與其公司帳號的設定完全相同,或是在不同的社群軟體、雲端服務使用相同帳密,而攻擊者十分聰明、往往會去猜測你可能使用的服務並多方比對,因而能鎖定對象並成功地發動目標式攻擊。


Myla V. Pilao

Trend Micro Research 總監




Pat Shueh

Zimperium 亞太區技術銷售副總

移動裝置的安全於企業無法有效管理 BYOD,於個人而言多數人尚未認知手機上的風險,但攻擊趨勢早已從其他終端設端大量轉移到個人手機上,也成為跳板攻擊企業內部的最薄弱一環。



思訊電腦 技術部 經理




中華資安國際 (中華電信關係企業) 協理

隨著 5G、工業物聯網 IIoT、智慧聯網 AIoT、車聯網、自駕車、區塊鏈等新技術、新應用的開展,勢必帶來新的資安缺口。隨著時間演進,幾乎每天都會發現新的系統、應用或技術的缺口、漏洞。如果企業沒能及時防患於未然,就可能給了駭客可乘之機,造成政府或企業的嚴重損失。


刑廣耀 Terence Heah

Fidelis Cybersecurity Regional Security Architect, APAC

Building Cybersecurity without Agents

隨著物聯網(IoT)設備在企業組織內越來越普遍且輕量化、不適合被植入代理程式(Agent),導致用戶無法有效監控它們。從駭客角度來看,不僅能利用外網、內網、端點、雲端等途徑,設法將惡意程式送入用戶環境中,如今IoT 設備的加入,勢必讓用戶的被攻擊面擴大,駭客成功潛入後,會以合法使用者權限建立後門、橫向擴散、偷竊帳密與資料,過程中資安設備均不會發出告警,此類設備明明很危險、監控面向卻受限,等於奉送給駭客絕佳的攻擊管道,而 Fidelis Cybersecurity 正是期望補強這道缺口。