tletq
{d r uc r n r rdr rinivr fl L3n
I
1a
un
;
uu
nrTulafi nr rnu tu rt
nri.rfi 13 (cDiC
6rurfiryrfrrr,rl.Jrl.r.:1u'tn?'rnrror.rrunrrflo.rri'unnrililnon.ri'flfl0:;nnrorfirtnof
[?0.r
20r4\ fi.rfrruuurfrrr
1. CDlC201-4 Agenda
uflorfrrflLSlivrnunfiu ud'nrlofn 6ilLlofn,irfi'Fr rilu{nflduuuunv?eiloonln16n{fiudrnrfl"lu{ru
iott.l" uunyuyrnrTulnfirrvirrrfi
.1.t.^-
255?
*
r{nrlpr fl drfnrufizuur4vr
fi
fl
r fi r 6 mi
(6,tilx.)milrilurieflrrunrnrig nlFr[0ntultnvuilot.lrunixilrvtuntrvu'jrt4'ufi 3o-Et
#.ru
drnrn"lu'rrut6'finrr{nr
d'llurnrt'1fr'fi'r{o "The Next Generation of Cybersecurity Intelligence: Protecting our nation against cybe r th reats" lnfl fi ilunv tds
or
ntl
uo
ndra uuuLfr'rfl Fi v
6o3<qIdv^^.q-g-.^-.^^^y--'vi
tut0n16us.t tnrrrLorrtuufiruyiru
nunRu
r{rtt.lru
CDlC2O14lu{uttnvtQnrd'lnairr vlfoltElltl.tqn rLo.tlSuvt
r urnyjrufinQrililry6rri-[flltN,t'tu tLnrudQflmorilulndTorud'lndr-lr:lndnolilHrfr finfl4nr qan
(fi'n) email :
sinsupa@kanoksin.com nlnlu{ufi zs ntnt.^u *.^.
2971-8000
n1o
369
r,lSo
z
-
084-438-7308
Best regards & Thank you very much,
Sinsupa Kusol
finfl4nr qnn
rru ridr,*rsnrt drfintifl
rt
r,:i5
nrr
gl? h t-tqt ti.ti.txp.l,f.r.r...fl .qp.lnotrlult.ile.r!:r ,?l
;q.9.,tr*nb d
gmuJne.sr^d9.r.
:,
r,:gb. h.:.
g:ip.Jrt.s.. trp. :.g. p.
q,
Sales Executive
n . f.qj. .r.tl .q'gp. t K'. r li.q Ap. n d 3 g ?. :! o,n {l^ y c't*t)nn r, af mt ua". rrg J',or,"l t, n n ,a
s ttto
\
lr\r
ot
no.rr rra.fNrrnO
b . gnr>otr 1o, 00 o. n)lnJoo( .r)qr ron
KANOKSIN EXPORT IMPORT CO.,LTD.
162 Kanoksin Building, Ramintra,
,toal Anusaowaree, Bangkhean, Bangkok tO22O
Office
:+662-97L-8000#369
cs
r$r
h
e"+ b'Bo.o.N
il
gO5n},Par\t\
q^ro.loton r'Jiirv JstD*1 -
4'/-'-
vT '' / rr
;,j'1r
rt'"'r! a'
\e'tt ao'EJ i
^'I i f'nt.)
I'l-l:.*'ai''
i-yn
^
i?
SYBTR
IItfEil$T IilITIRTIUT GO}I]TRTIICT
ffiffiWffic3OIq BAtGtt0lt
lllrlnllAll0llfl.
TRnrE a
f
IXlllBlll0ll ctlllRt tBlrIGI
uly S0-31 ,2014
f;nnr:luournnuo:nrtuscufionrnS1la:tanuuiuqdttuu tublic-Privole Portnership iuds:rr-rn1nu rirEJnoods:aunrgnfouriru14druronrs, runqCI6"rHns$uuottJciltoj ds:rnn'lnEJ
nruro6uua diuor Julru:uiuSnrss:tiua:drnsdu{,ia:tun'Jntntonuu
tn:
sSnurnrrudun:LJaond€Jdtulutuosltrilutfr "Cyber seouriiy 2020" ?uXr u.qndrnroolurt:or:nryu]q, tl,sy. rqnruJ lu1ru:qndrnroo [o:dntsuntuVJ rlruqsr:nu itqnru
tta: ursu.31,o3uqsnssunl usu.it.oruqsnssun' JolaRnsouna u't1uL nrsns:fi r0nrfr s:riunou0tnoS ila: ;unrsnrtutjunrtJaaodalutuoSttri:utfr rirucirs:cirundJraurqnrsRru:nssunl [Htotionol Cyber Securily Committee: NCSC]
3oth July, 2014 08:30
Welcome Speech: narrciousuanrsduuul cDlc2014
r
n:t uiir u il on t nSlt a: on u uiu q U u u luds:rnnlnu Portnership Public-Privote The Future Direciion of Public-privote parinership [pppJ in Thoilond fr n n t :?u
ou t n n u o:
t
t
rr
g nruroauuJ8 diuol rfr
08:45
d',urunrs,'roqna',nnssuuoulnrr:5ds=tnRln€J
Iuor.rJnrlrStr.lrSnJ
0pening Rddress:
I
cDlc2914 L ilu1n1Jn15UJruU1llUJUnl55nU]R]] UUURJuaO0nUnl nar:qunsmLltclnJluduuul
U
1
lUlUOSlllliul r|
Cybersecurify 2020: The Notionol Hgendo
g ulJasrJRrul t'lUn]uj lr
q01u3€Jnls
d-tUn:tuuiruurqsnssunl:0t5nnso0na Io:nnrsuntuuJIausa. Cyber Defense Inltlotive Conference
/^nla^tn1/4
J
Kevnote Soeech
r riucl0
nl
nru ni:in qju uhnoou'lauq n?n ri Risk the Big Picture - Chollenging the Threot to Our Digitol World Big Ouesiion * Whol ore the risks lo the security ond privocy of lhe informotion in lhis dioitol world? How con we chollen"ge the threot to the digitol world to sofeguord our informotion? Wheh cqn we siort to toke up this chollenge?
t
u
u
rdu.rrra.ncr
u fi r
Professor Edword Humphreys Choir of the lS0/lEC Working Group, SC27 WG1 Convenor Chortered Fellow of the BCS * FBCS CITP, CISM Founder of the Internotionol Hegister for ISMS Certificotes
Updote Future Trends & Threots:
o
||
u sILi u
rr
a: fr n
nt
:Ju o u I R n d I u Rt r u ti u n : U a oo nu al ra: n nfulad arsau n fl qt
s a u In
fl R31 u u:u
R
J
n I tpisode J Worldwide Informotion Security, Cybersecurity ond Future rJ
aoo
n€J'l u I u o5r
I
I
n ntrJla
I
lT Trends & Threots 2014-2A15: Direct Experience from Eisenhower Fellowships Progromme 51 Doys in USfi ntanonrt nils:au ntsru ns:cit u lnformotion Securiiy tta: Cybersqc-urity IIU?RONUURRA -l"--"-i --r_'
St iunlcruhi:ultu tO5115 r0ojurJs:rnnanslorp5nrfiaritutltnsr:naniuntudiu Cybersgcurity uo.: Us:rnnlnujrudausurianurlulurr,rosarnarrlnr:Jn srufi.t Fulure lT Trends & Threots frdta-:utttst
Ju-tJ
r
r
nrt. 2aw-2o15
The Cyber Ronge/Cyber Simulolion : Preporing Cybersecurily professionols lo detecl, prevent ond thwqrt cyber oilocks in o reql-world setfing fn*Depth Rnolysis, Threot Horizon 2AA-2015: Monoging risks when threots collide ond More donger from unknown threats
g o.dSryc$
o Privocy, Cybasecvrity ond Power of Infrymotion Shoring
r
The Economics of Cybersecurity ond Informolion Seo.dty
r
In-Depth Rnolysis, Oboma's Executive Order in Cvbersecurilv for Critical Infrosiructure Proteclion ond Public Piivcte Portnerships [pppJ colloborofion
iloutoun
CGEIT, CRISC, CISSP, CSSLP, CISR, CISM, CBCI, CFE, SSCP, ITIL EXPCTT V3, lRCfi: ISMS Leod Rudiior, COBIT 5 Licensed Troiner, [tSCJz Rsion Rdvisory Boord ISRCR - Bongkok Chopter Committee, ITSMF Thoilond Boord
Thoilond Inforpotion Security flssogioiion [TlSnJ Committee iJs:srurra:r!riotir uSu'n ro8a fijsruJa8ufa rIutnos'irrin l.1....'.',....
I
ttutnr:nts{nntsntlufun:Uaocrni€JrruuorFsrufrtn5us:uutngoulcJuoJoJnns Integroiion of Next 0enerqiion Security ocross Enterprise Neiworks
t O
I
Mr.Timothy Snow, cctr Consulting Systems Engineer (securityl Cisco Systems ffPfiC lUong Kong]
R3t u uJSOUSu ri onrsrrJds u ttdaJdl u
nSEJU
nls5nul
R31
uiiu n:rjaoodsl
rnnlulagarsaut n nq ninr) lT Security For The Twenty First Cenfury
s:u
u
3 Mr.Kennth
Hee
Director, iDM Solution SPeciolist 0rocle Hsio Pocific
3I 11:00
I
nlt
th
July, 2014
I o ofi s n u n €Jfi ndl u n u u o: {u u u du n nlula 6 n ts I t n a : Ua nsti u q t fr I : ri r f ri 4 ru o I ai ut u In-depth ond Rdvcnced MolWore Flnclysis for the Enterprise; You Con Know Whot You Don't Know n r s | | r\ [l t
t
cut{t cir
u
udun t t
J LJ
r
r
t
Mr.Bryce Bolond, Vice President/Cr0, flsio Pocific FireEye lnc., Porlnerlink Distribution Co., Ltd.
rt ilLlJtuuuo-r rnt I rJtuuu tnULilunJ tuuunJuctuLtI rucr t)clull lrlilJ luuurlJ rJaonn€Jlu ruoSrra:r n niuhg arsau n nt n nrla n I Episode | J The Future Trends of Informotion Security, Cybersecurity ond Informotion Technology from RSR Conference 2414, |
r
Son Froncisco, Colifornio. nru non Ljs:aunrsruns;lt n:t uduuur Cvbersecuritrl s:dulan RSfi Conference zoil N ns:or u ujsi u I aln rsu u $rdo: n nfula0?n rlr ?u nrsila;iiu c vber Rttock r{nuarla urbounar nnaruiSnrsf ufi ;:dunnnr udrun:i udun;daanhEiuruoS c i -")L -il nfirlannra: fnnrr uau f'l r
tl
*
Ldfesl Updote: Informr:tion Security, Cybersecurity and lT Trends from HSfi Conference 2014, Ssn Frcncisco.
o The New Bllsck Vector on your Privocy: When
o
Your
World's Intelligence Crisis, Edword Snowden's
N5fi leoks: The Changing Threots Londscope from fiPT to lnsider Threais: How to monoge Insider Threats in your Orgonizclion
Smort TVs Could Rllow Remoie Spying
3
Sn In-depih lmplementotion of 20 Criticol Securil Conirols from The Council on Cybersecurity
o.dSqcgr Houroun
CGTIT, CRISC, CISSP, CSSLP, CISR, CISM, CBCI, CFE, SSCP, ITIL EXPCT1 V3, lRCfi: ISMS Leod fiuditor, C0BIT 5 Licensed Troiner, [lSC]' Rsion fidvisory Boord ISRCR - Bongkok Chopter Committee, ITSMF Thoilond Boord
Thoilond Informalion Securily Rssociotion IftSnJ Committee ds:srurra:uinon: uS$n roSa fusrujariuUa rfi utnoS'itrin
Lunch
I
rulnrtunrsrnsEJUoJnnslunrsrit:qrnniuiad Cloud otjt:daondu Tronsforming your 0ffice to secured Cloud
3_')4CUUqUln r1n31i
Security Solution rnaa no5dorsrju [ds:rnnlnoJ'lrrin
uuriufi u n nnt utt n Sunplv choi n [J runt?uour nno u?ndii o:nnsol't't: no'hifi: nrsT-nrnsguing:i$i:rlu1ruuoing nuiurLdoso:$unrsrirrrr)rqqn rrri.tn:ruUun:Uaonn€,lutuoSotlt:tfrustJttuutta:ulun-ut5o:stltta:ldunt.l qnludrrEruoJnlsuJfr uu;-aruuo:utnslrudr urnnlula€rarsautnRnrsait.t rirs:llo:iiuo.rrinscrnd€rlutuos l ut nlJtta:tUttuunrsiuilonufiiiutuoS ri'r : ri r?ri o: d n sdr u'r s n d r tl u gs fi r'l d od r : ci o ri o: I
I
-
qnsRransrra:5iruutntsdtu nrt udu n:daoonu'lurr;asua:rJs:tnno-:n qu qlSl o u i S rr'a : d s: n n a n sq ot u S nt [l cr u u d o J'{ 5 J a : ff o ula n ii o u nr d r ur rirlu{.: naursnltlu'Li?rirSo:irudnciolj tia:nts5uriotiu'l ?unrsfi ra:ns ns'lt\u$audtuSuril.ltJs:auntsnitta: rflurri uriurra:rnnlulad?crr:d:uo.tn t
r
||
u 3 n o d r u n"r s U o :
n-
u
da
t
t
q t s s : ct- u 4 n n I u ri u u ur al u u o
3oth July, 2014 13:30
7 naq n SnrsuSnts{o nrsquB LJfl Ufi nls s 0C oEjt:[ttJs:6n Sn] u 7 Stroiegies io set up o successful SOC [securiiy 0perotions CentreJ
t
Mr.Vinod Vosudevon C00, Polodion Networks
14:00
o Ins:aSr cr.:-:
Il
n0
ut u I tl os UAOONB IUIUOSOgIJINUSUIIUU :.,'tI u
u u oJ
H
o
J
5u nt
s
dt r zir 4q t
n
u
n:
n:l
udunJ
The Legol Frqmework for Prouctive Cybersecurity Defense
&
cls.uss€J: rfi:dru:EJ or -l
r t sd nr
u]r a: n
R5
ul5
Ff
I
n ss u R o u
sni u Htl n€,rdu
fi r t n
oi
R
ru : J fi 3 n ss u nt a n 5
r
r
tJ
s : tn
n
lutl lls'{ouJl I lsuJeluu,d luuuJU ltls: lutl lull lllluliiu drsau n fi rnsriiJo:n u o: nnsqrnn-s'lu uoS The lntegroted Fromeworks ond Success Story of COB|T5 Progmotic lmplementotion in Thqilond t5uJ5 rJriruil lJqlf lJ
r
I
g o.ritu;a Rssu:SnU 14
dr uru nrs
uJr u r n
nlulad
a1 s
au n fi a: nr s d o a t s r
||
drdnrunru:nssunrsritr\unatondnnSuatta:narQna-nn5nr€J
& Networking Breok
Refreshment 16.,45
o
u3 n1J||a:sdrr u uln u1u nts5u fi -l -\. o1 | u u ssn't lo oul Jnolu oJ ||
In.a.n.]
onurislu ru oSriq:rirlrio: nnsat u1sn
Driving Cyber Resilience: Building o Defense Strotegy thot Works
t-
4ru5aan oulnuna
ujtcrnrsdtrunaqnf rnhlulaoarsaurnn uSt}n Unn.{tnn [untuu]
1l
unsflt6n6rra:iiruurnrsJunrsrlruutqnsFlraosdtunrtutiun:daonn€iuruo5uo:tJs:tnrt d:nqurra:anSloruSnt The fvolution of the UK ond US Cybersecurity Strotegy I
g o.LJ5ryoJt Houtoun cGElT, CRISC, CISSP, CSSLP, Clsft, CISM, CBCI, CFt, SSCP, lTlL Expert V3, lRCfi: ISMS Leod fluditor, C0BIT 5 Licensed Troiner [tSCJ, Rsion ffdvisory Bocrd, ISRCR - Bongkok Chopter Committee ITSMF Thoilond Boord
Thoilond Inforpotion Security Rssqciotion (TlSRl-Committee uls:sr utra:{rioti: uSu-n oI a ItJsruJ adu Ua 6 u no5 4r rin r
r
r
Slth July , 2014
|
08:45
tdo:rs: a:t fr ouh n ii ou nt dt uniSlu u oSJu ntsfi t at nst u The Reol world stote*sponsored cyber Espionoge ond Militory Cyber Inlelligence Cose StudY -rl
|
o r rxu
g
I
t
ula.n.usstio tfruunoJd r{t nsutn nlulad ar sau
rn rt
tta,ornt
fl
natll u
ns:nsl:narlnu
09:15
09:45
r
rnnfuladFrriuaUt,dtnsunsrq{utta:ijo:du Rdvonced Molwore Rdvonced Molwore Defense SYstem
&
4ru-rf,rigg Qqe; nssunlsu10nls u5u-n uq8ust'itrict
09:45
|
16J'fij3u5u,ilxJs:aunrs,rurra:rruthnrilunr[Jo:riufiu4nntucitu"lutuo5nuuiuSnts s:du4tuo: Hdrsr u nlu tju nts:ciu ut fl poneiDiscussion: Notionol Level Cybersecurily Threots Defense, Countermeasures ond Progmotic Controls
g u;a.n.usstto tfr€Junot6 r{rnsurnnfqlasarsaulnntta,alnt Rnallnu ns:nsunatlnu
g nruo-srsul:d dnsrnu soJt{o1u3Bn1s
drunurrnso:ttri:utfr
a
uJ.n.0.onsuJa n1af,ssru crc mor u:u nrsRudrn n)u'laiarsdu
rn Ft
dr Un-rr u n rurn ssu nr stl o.lriu rra:dst u tJst u
nrsqrsnriirurn
ILi.r.l.u.J
Moderotor a
I
o.USnJnI npuroun ds:srurra:uiriod: l , - "c, usun roua lusrujauuua tuutnos ,llnn
Refreshment
& Networking
Breok
ururiurnnrlntrn:lSnrselns:n"ur:!uutfiJrs:i:ngrRnnru?rinsutni{o: rriorn*Ju
n:ruusoulunp5uilanupaluruori riarr:S ri4hnruo:nnsuulnSoutud:nu ooq'lqu uioun:r6qu$drJunouurnslrquo:iru.rutruunnrtuJun:UaoonEJ rnnlulafiarsaurnnJunrsrr Jr u,uoJRnstuJatnsuudrSu0ofi ufialutuo5 lurioiia:?r s0 / tEc ztoot r:a5riu 2013 rrj6€rurrda:rrdlnu rdutiuodr:ls Jrinndo:drnSJnru ririra:rnS€rudr{ndt I s0 / EC 27001 ifi nuarrins I
|
rtJnnfilunaun 6nt srIruut dnunt urunat ns'l nudrun:r uilu n:daondalo tuoS
uuuJjou't^onr un:iurjun:ulaocinalqruoSuo;o:nnslns:air:,rilu1ruriu n :r u dt rirus : n- u ut n U ru n r dt u n :t u u- u n : d a o n n otiu li€i il n fr u o : ti fr u ,rlnr in nt itooSrrr rya.uaii:5Ju 4:rir:rirlnnru nralrtrutta:nrssuUonuhs I
lu
r
uosriu ut nsnt
su u 4.tuo: a nt
Uunt stlu
I
t
n€J
3oth July, 2014 13:30
- 14:00 i c
tmilItffiffiffi
uausqnu:prs'l gnlso€jl J H U oIu s:u ulj H€Jn u:in ...RtuRllonntaonlcl Vqlue UPS soluiion, Modulorize the future ! di
t
I
14:00
-
14:45
I
Mr.Dovid Tsoi cTo (Chief fechnology 0fficer) 0f Huowei fnterprise Network Energy Product Line
I" Utnsn'lsSu0ouattrS$u?nurra.uu - nouJuntsnOUduOJlilooJdnsnnRnnlU ,u'r,si,iiii;udJl;ti The Next Generation Molwore & Incident Response Procedures to Sociol Network Threots : Lessons Leqrned from the Front Line of Defense
g os.ascUuri i::q5nu
qdiurunts dtrinnrtuf un:daonfiu drdn:rurfruulqsnssunl:itFnnsoUnd [o:nnrsuttiou] [auso']
qolulunls-:,1,1 4'
- 15:30 ),t#{,t'rffi
14:45
O
uiftJ s: ar u ntsSnut
nrt
u u-u
n:
ul
aoo
nu s:u
un
au CIr n o5 d s:t n n t
I
nu
[ | nu t u 5 n
]
ulu u o5otu uJ u u u n n:t u 0 u n: d a on n-s n RIUIa€J nss:du tJ s: n Fl riu ur fr n c\t u ntsll Jl uJ u u u n dt u nrl u fl u-un:daonn-sats6utnR Cybersecurity Policy ond lT Sea"rrity Moster Plsn * fi Cnrciql Policy & Moster Plon to Enhance 0rganizotion's Cybersecurity Copobility * ic r
nS€J u
dr 5u
rl o riu fi
||
I
sd u I n fl o: n
I
||
I
||
I
||
g 4NnuJflnn nllsru
nt:nfi rrruu nRlununlrudaondun't utnnlula5 arsauInrr nrsluJriJiaru40ni n
Cyber Defense Initiotive Conference
cDlc20l4
www, cdicconference.com
Refreshment
r luriofo:h rso/rEc 2too1 j
r
,
& Networking Breok
zotl
1 ?r'
rrjdsurda:rrnlnu
tsunuoulJlslnnnCI0J The Transition to New Revision of lS0/lEC 21oat2A13 a r1ru5g1r flSn5ng dn5urnrsurnslru Sturqnts
drdn:runru:nssuntsrtri:utfl jtdr€jntsSt".tsots:ut"l:tu [runc] Srdn:r uur nslr u udnn-cufi qnat nnssu [auo. ] [lt st J, ns:ns]rqnarHnssu
16:45
I
- '17:30
{lllli|itll
lllllilllliil
uuuoJournndrunluuun:rjaoonuluruoSuo:o:nns fns:ah:rlu1r u ni,n:r udt fr qs:ou ut fr uo:rJs:tn nl n€J Ponel : Thoilond Criticol Infrostructure Security: fin tnd-to*E"rd View of Stoie [nterprise Exectrl"ives
l|;lli;l&;
* 4ruqafrS sssualsu
qurur4irnrs I gsrlrarsautnnla:doatsJ nrs luJrijra:un0nrn
g nruarls'lu unslns qdr uru nrs?qdrilra:r
I
u
usnrsrn nlulassrsdutnfi
u5un nts0ulnu {trjn luxtuul
4ru8;8u riiuufrnSuru{ uidt uru nisult r ulruut s:u u.tt
u
tjs:u n n
rirsluJriJtunsna:"r
g
Moderotor o.rlu;uS urBu rudr
ursnrsu]tu iidBnut
Lis$n ra8a hjsrujariuua tsurno6
{rrin
3lth July , 2014 08:45
- 09:15 s
V*1,iif'tl1\,t:;1i.!lg;t{i7;si1
r
tl n r r [J u n a€J n S nt s rIru u r rJ nu n r uJ u n ar n sl n
rJaonns"luruoi In*depth ond The Humon Element Cybersecurity Ccpability
:,
'3
:: '.:.
-
EJ
dtun
I t u u' u n J
Building Thoilcnd
u.n.o.ryrruua ei:6u u'l€lndurnunrtuuun:daoofi ets:uudtsaulnn[rtsR]
a
t, it
09:15
-
Og.45
t-1 ;
-
|I
t!
Uf
l:r-1 RCI | H U r U
1
nrSUSntS'l-O n'ls
,---
nlr u 0u n:d aonriu uot n n sfr rn6qu rarir f
r
loualunltunun
Responsive"Security: Be Reody io Be Secure fxplores the chollenges, issu*s, und dilenrnnus of monoging infornrolion s*curity risk, ond introduces an oppronch for nddressing concerns from bolh c praotilioner nnd org*nizotioncl rnonogernsnt slcndpoint.
I 09:4b_10:30,e )
i rl
Dr.Meng-Chow Kong CISSP, ClSn, IlSC]? Fsion fidvisory Boord, RRISI Forurn founder
oriufqslu ru oSriu ut nsntsu'uq:u o: sut ntsl nu The Molwore Wcr: Flesponding to the Evolution of Blending Httocks nrsSu
ri
g ns.frnfr fuu:5and q{n
tl.
Ii
nr suJiu
nrt u tJaon n-ur n nfulad arsau
surR'rsnEJrnul
r
n
n
{trin Iuntuu]
ri
Refreshment Cvber Defense Initlotive Conference
cDlc20l4
& Networking Breck www.cdicconference.com
nlorndudru n$flusul8 nrsllo:riu Network Infrostructure lla:nls Response Cyber Crime lou5Snrsnrriogar8:6n
3oth July, 2014 30
- 17:30 |
Defensive Cybersecurily C-hollenge Workshop
@!;:iJ#aTffii#:[\l}iJY'',::?J'Tx!3ll,'l,Hfil.'*.oufr-|ciurns1tulta:55nts[Jo:r\u
th
3I
July, 2014
Cybercrime Intelligent InvesiigotiBn Teqhnjqu,es Workshop [tlfJ -s "l n r :"a n 3 n r s n r t o U A a : n r s I r :s : u u I u n u fr il fr o 5 or dr 16 J u 1'1 n rnnntsruta0ou'lsiuntsltu.]Uu Hockinq Contest ut0tiunou
08:45
||
oei i : a : r drr
g
cr
u
5
ountnd
f
I
t
I
,,
r
d fr ii ar u r s n ri rl tJ d s :q n n?81
di s :
o.iusua :Jrlod€J clssP,
CIlnc, GCFR,
sscr, rlcsn, clEH, cNE6, security+, Network+, ccNff
Snur ns /uit8€nui aJ uJr€.ruSntsilJnousu
usun rdai frJsrujauuua ruurnos lrno l[luradHuo:.rru cDlc ?unaonduaruiJduiruur lnu Live show fiot[lu ur:lc'lanuo.ruratiunao.tuotnuduuurlunnij iuU[fr unu RclS Beseorch LHB rra: H c s Hed teo m I ci5tassn urailului iulu5uorri rir urnuuli]ci ?u Gooole n3a YouTub" rirlrt ntnucit0ufruluidnu:ru ncts tiliqrit I
i u?n ri
r
ri
orr a
cufuiiu :r u 0
r
ri
or r uJ u
riu
{r
r
ri
c nt
c
ln€r o un t
=
3l th July,2O14 o a
I o
t o
Live Show 1: Voice Sliffing dmS: rfru.rtS; dnr5: - luiaot dnilJ:ntsaunutnt:lnsriun Live Show 2: ShellGhosi - No One See Me LiIijoni:aunq - nrsrrujtci:tritutuo:ltJsttnsudunsat{I5naaos:uUnsl'l'lu4nuIn Live Show 3: ft New Woy to Hock Public Wireless LflN n,a:.:aralStdu - ntsttons:uur41nuSntstnSodtulSataatilsru: Live Show 4: Breoking Cyber Bunker n'r,rlsrnisciru4or\rs - rirsnonsria [oist EncryptionJ rdortrfi; Sofe House uo:toga Live Show 5: Neor Foo Communicotion $ocking rj:?ndri:r{u - ntsuluusouauu Nrc ttuuttuulfra Live Show 6: Rospberry ni - fi Hocker Toy Box [CyUer Criminols Swiss-firmy KnifeJ inuonnao;or:huo:rronrhoS - SSnrsair:qdnsrurronttuuunut "froo:ls tton'ldtau!"
Refreshment o o
& Networking
Live Show 7: Home Spplionce Hocking s:5:! [nudndru - rrjotnSo:]t'lulUtr?udruqniuurtau Internet Live Show 8: Get Inside to Mobile Treosure
Breok
?
qun5u.rtlUu6ohn - ntsttonftJsttnsuu uausnluJullu u n un tddon Live Show 9: Escoping Plon from Digitol's Prison UnsnrsnHnrlnfrinoa - n.lStlilns:uunru4ufrudnS [nnMJ uuuSntsnar:ci Live Show 10: Public lnfrostructure Threots on the Rise rqr:s:uuSnr0o: * ntst&Sns:uuar stsqdlnntlu ulSnr:Uodu
ar
o
I
g
RCIS Technicgl Teom tlrnuloq o.UugS ur8u ui 6r uru nrs rijr€J ri d3n ur, uS$n to8 a ltjst rrja u'u da rfr ur n o5 {r
Cyber Defense Initiolive Confsr€nce
cDrc20l 4
rTn
www.cdicconference.com