หนังสือรับเลขที่ 1890 2557

Page 1

tletq

{d r uc r n r rdr rinivr fl L3n

I

1a

un

;

uu

nrTulafi nr rnu tu rt

nri.rfi 13 (cDiC

6rurfiryrfrrr,rl.Jrl.r.:1u'tn?'rnrror.rrunrrflo.rri'unnrililnon.ri'flfl0:;nnrorfirtnof

[?0.r

20r4\ fi.rfrruuurfrrr

1. CDlC201-4 Agenda

uflorfrrflLSlivrnunfiu ud'nrlofn 6ilLlofn,irfi'Fr rilu{nflduuuunv?eiloonln16n{fiudrnrfl"lu{ru

iott.l" uunyuyrnrTulnfirrvirrrfi

.1.t.^-

255?

*

r{nrlpr fl drfnrufizuur4vr

fi

fl

r fi r 6 mi

(6,tilx.)milrilurieflrrunrnrig nlFr[0ntultnvuilot.lrunixilrvtuntrvu'jrt4'ufi 3o-Et

#.ru

drnrn"lu'rrut6'finrr{nr

d'llurnrt'1fr'fi'r{o "The Next Generation of Cybersecurity Intelligence: Protecting our nation against cybe r th reats" lnfl fi ilunv tds

or

ntl

uo

ndra uuuLfr'rfl Fi v

6o3<qIdv^^.q-g-.^-.^^^y--'vi

tut0n16us.t tnrrrLorrtuufiruyiru

nunRu

r{rtt.lru

CDlC2O14lu{uttnvtQnrd'lnairr vlfoltElltl.tqn rLo.tlSuvt

r urnyjrufinQrililry6rri-[flltN,t'tu tLnrudQflmorilulndTorud'lndr-lr:lndnolilHrfr finfl4nr qan

(fi'n) email :

sinsupa@kanoksin.com nlnlu{ufi zs ntnt.^u *.^.

2971-8000

n1o

369

r,lSo

z

-

084-438-7308

Best regards & Thank you very much,

Sinsupa Kusol

finfl4nr qnn

rru ridr,*rsnrt drfintifl

rt

r,:i5

nrr

gl? h t-tqt ti.ti.txp.l,f.r.r...fl .qp.lnotrlult.ile.r!:r ,?l

;q.9.,tr*nb d

gmuJne.sr^d9.r.

:,

r,:gb. h.:.

g:ip.Jrt.s.. trp. :.g. p.

q,

Sales Executive

n . f.qj. .r.tl .q'gp. t K'. r li.q Ap. n d 3 g ?. :! o,n {l^ y c't*t)nn r, af mt ua". rrg J',or,"l t, n n ,a

s ttto

\

lr\r

ot

no.rr rra.fNrrnO

b . gnr>otr 1o, 00 o. n)lnJoo( .r)qr ron

KANOKSIN EXPORT IMPORT CO.,LTD.

162 Kanoksin Building, Ramintra,

,toal Anusaowaree, Bangkhean, Bangkok tO22O

Office

:+662-97L-8000#369

cs

r$r

h

e"+ b'Bo.o.N

il

gO5n},Par\t\

q^ro.loton r'Jiirv JstD*1 -

4'/-'-

vT '' / rr

;,j'1r

rt'"'r! a'

\e'tt ao'EJ i

^'I i f'nt.)

I'l-l:.*'ai''

i-yn

^

i?


SYBTR

IItfEil$T IilITIRTIUT GO}I]TRTIICT

ffiffiWffic3OIq BAtGtt0lt

lllrlnllAll0llfl.

TRnrE a

f

IXlllBlll0ll ctlllRt tBlrIGI

uly S0-31 ,2014


f;nnr:luournnuo:nrtuscufionrnS1la:tanuuiuqdttuu tublic-Privole Portnership iuds:rr-rn1nu rirEJnoods:aunrgnfouriru14druronrs, runqCI6"rHns$uuottJciltoj ds:rnn'lnEJ

nruro6uua diuor Julru:uiuSnrss:tiua:drnsdu{,ia:tun'Jntntonuu

tn:

sSnurnrrudun:LJaond€Jdtulutuosltrilutfr "Cyber seouriiy 2020" ?uXr u.qndrnroolurt:or:nryu]q, tl,sy. rqnruJ lu1ru:qndrnroo [o:dntsuntuVJ rlruqsr:nu itqnru

tta: ursu.31,o3uqsnssunl usu.it.oruqsnssun' JolaRnsouna u't1uL nrsns:fi r0nrfr s:riunou0tnoS ila: ;unrsnrtutjunrtJaaodalutuoSttri:utfr rirucirs:cirundJraurqnrsRru:nssunl [Htotionol Cyber Securily Committee: NCSC]

3oth July, 2014 08:30

Welcome Speech: narrciousuanrsduuul cDlc2014

r

n:t uiir u il on t nSlt a: on u uiu q U u u luds:rnnlnu Portnership Public-Privote The Future Direciion of Public-privote parinership [pppJ in Thoilond fr n n t :?u

ou t n n u o:

t

t

rr

g nruroauuJ8 diuol rfr

08:45

d',urunrs,'roqna',nnssuuoulnrr:5ds=tnRln€J

Iuor.rJnrlrStr.lrSnJ

0pening Rddress:

I

cDlc2914 L ilu1n1Jn15UJruU1llUJUnl55nU]R]] UUURJuaO0nUnl nar:qunsmLltclnJluduuul

U

1

lUlUOSlllliul r|

Cybersecurify 2020: The Notionol Hgendo

g ulJasrJRrul t'lUn]uj lr

q01u3€Jnls

d-tUn:tuuiruurqsnssunl:0t5nnso0na Io:nnrsuntuuJIausa. Cyber Defense Inltlotive Conference

/^nla^tn1/4

J


Kevnote Soeech

r riucl0

nl

nru ni:in qju uhnoou'lauq n?n ri Risk the Big Picture - Chollenging the Threot to Our Digitol World Big Ouesiion * Whol ore the risks lo the security ond privocy of lhe informotion in lhis dioitol world? How con we chollen"ge the threot to the digitol world to sofeguord our informotion? Wheh cqn we siort to toke up this chollenge?

t

u

u

rdu.rrra.ncr

u fi r

Professor Edword Humphreys Choir of the lS0/lEC Working Group, SC27 WG1 Convenor Chortered Fellow of the BCS * FBCS CITP, CISM Founder of the Internotionol Hegister for ISMS Certificotes

Updote Future Trends & Threots:

o

||

u sILi u

rr

a: fr n

nt

:Ju o u I R n d I u Rt r u ti u n : U a oo nu al ra: n nfulad arsau n fl qt

s a u In

fl R31 u u:u

R

J

n I tpisode J Worldwide Informotion Security, Cybersecurity ond Future rJ

aoo

n€J'l u I u o5r

I

I

n ntrJla

I

lT Trends & Threots 2014-2A15: Direct Experience from Eisenhower Fellowships Progromme 51 Doys in USfi ntanonrt nils:au ntsru ns:cit u lnformotion Securiiy tta: Cybersqc-urity IIU?RONUURRA -l"--"-i --r_'

St iunlcruhi:ultu tO5115 r0ojurJs:rnnanslorp5nrfiaritutltnsr:naniuntudiu Cybersgcurity uo.: Us:rnnlnujrudausurianurlulurr,rosarnarrlnr:Jn srufi.t Fulure lT Trends & Threots frdta-:utttst

Ju-tJ

r

r

nrt. 2aw-2o15

The Cyber Ronge/Cyber Simulolion : Preporing Cybersecurily professionols lo detecl, prevent ond thwqrt cyber oilocks in o reql-world setfing fn*Depth Rnolysis, Threot Horizon 2AA-2015: Monoging risks when threots collide ond More donger from unknown threats

g o.dSryc$

o Privocy, Cybasecvrity ond Power of Infrymotion Shoring

r

The Economics of Cybersecurity ond Informolion Seo.dty

r

In-Depth Rnolysis, Oboma's Executive Order in Cvbersecurilv for Critical Infrosiructure Proteclion ond Public Piivcte Portnerships [pppJ colloborofion

iloutoun

CGEIT, CRISC, CISSP, CSSLP, CISR, CISM, CBCI, CFE, SSCP, ITIL EXPCTT V3, lRCfi: ISMS Leod Rudiior, COBIT 5 Licensed Troiner, [tSCJz Rsion Rdvisory Boord ISRCR - Bongkok Chopter Committee, ITSMF Thoilond Boord

Thoilond Inforpotion Security flssogioiion [TlSnJ Committee iJs:srurra:r!riotir uSu'n ro8a fijsruJa8ufa rIutnos'irrin l.1....'.',....

I

ttutnr:nts{nntsntlufun:Uaocrni€JrruuorFsrufrtn5us:uutngoulcJuoJoJnns Integroiion of Next 0enerqiion Security ocross Enterprise Neiworks

t O

I

Mr.Timothy Snow, cctr Consulting Systems Engineer (securityl Cisco Systems ffPfiC lUong Kong]

R3t u uJSOUSu ri onrsrrJds u ttdaJdl u

nSEJU

nls5nul

R31

uiiu n:rjaoodsl

rnnlulagarsaut n nq ninr) lT Security For The Twenty First Cenfury

s:u

u

3 Mr.Kennth

Hee

Director, iDM Solution SPeciolist 0rocle Hsio Pocific

3I 11:00

I

nlt

th

July, 2014

I o ofi s n u n €Jfi ndl u n u u o: {u u u du n nlula 6 n ts I t n a : Ua nsti u q t fr I : ri r f ri 4 ru o I ai ut u In-depth ond Rdvcnced MolWore Flnclysis for the Enterprise; You Con Know Whot You Don't Know n r s | | r\ [l t

t

cut{t cir

u

udun t t

J LJ

r

r

t

Mr.Bryce Bolond, Vice President/Cr0, flsio Pocific FireEye lnc., Porlnerlink Distribution Co., Ltd.


rt ilLlJtuuuo-r rnt I rJtuuu tnULilunJ tuuunJuctuLtI rucr t)clull lrlilJ luuurlJ rJaonn€Jlu ruoSrra:r n niuhg arsau n nt n nrla n I Episode | J The Future Trends of Informotion Security, Cybersecurity ond Informotion Technology from RSR Conference 2414, |

r

Son Froncisco, Colifornio. nru non Ljs:aunrsruns;lt n:t uduuur Cvbersecuritrl s:dulan RSfi Conference zoil N ns:or u ujsi u I aln rsu u $rdo: n nfula0?n rlr ?u nrsila;iiu c vber Rttock r{nuarla urbounar nnaruiSnrsf ufi ;:dunnnr udrun:i udun;daanhEiuruoS c i -")L -il nfirlannra: fnnrr uau f'l r

tl

*

Ldfesl Updote: Informr:tion Security, Cybersecurity and lT Trends from HSfi Conference 2014, Ssn Frcncisco.

o The New Bllsck Vector on your Privocy: When

o

Your

World's Intelligence Crisis, Edword Snowden's

N5fi leoks: The Changing Threots Londscope from fiPT to lnsider Threais: How to monoge Insider Threats in your Orgonizclion

Smort TVs Could Rllow Remoie Spying

3

Sn In-depih lmplementotion of 20 Criticol Securil Conirols from The Council on Cybersecurity

o.dSqcgr Houroun

CGTIT, CRISC, CISSP, CSSLP, CISR, CISM, CBCI, CFE, SSCP, ITIL EXPCT1 V3, lRCfi: ISMS Leod fiuditor, C0BIT 5 Licensed Troiner, [lSC]' Rsion fidvisory Boord ISRCR - Bongkok Chopter Committee, ITSMF Thoilond Boord

Thoilond Informalion Securily Rssociotion IftSnJ Committee ds:srurra:uinon: uS$n roSa fusrujariuUa rfi utnoS'itrin

Lunch

I

rulnrtunrsrnsEJUoJnnslunrsrit:qrnniuiad Cloud otjt:daondu Tronsforming your 0ffice to secured Cloud

3_')4CUUqUln r1n31i

Security Solution rnaa no5dorsrju [ds:rnnlnoJ'lrrin

uuriufi u n nnt utt n Sunplv choi n [J runt?uour nno u?ndii o:nnsol't't: no'hifi: nrsT-nrnsguing:i$i:rlu1ruuoing nuiurLdoso:$unrsrirrrr)rqqn rrri.tn:ruUun:Uaonn€,lutuoSotlt:tfrustJttuutta:ulun-ut5o:stltta:ldunt.l qnludrrEruoJnlsuJfr uu;-aruuo:utnslrudr urnnlula€rarsautnRnrsait.t rirs:llo:iiuo.rrinscrnd€rlutuos l ut nlJtta:tUttuunrsiuilonufiiiutuoS ri'r : ri r?ri o: d n sdr u'r s n d r tl u gs fi r'l d od r : ci o ri o: I

I

-

qnsRransrra:5iruutntsdtu nrt udu n:daoonu'lurr;asua:rJs:tnno-:n qu qlSl o u i S rr'a : d s: n n a n sq ot u S nt [l cr u u d o J'{ 5 J a : ff o ula n ii o u nr d r ur rirlu{.: naursnltlu'Li?rirSo:irudnciolj tia:nts5uriotiu'l ?unrsfi ra:ns ns'lt\u$audtuSuril.ltJs:auntsnitta: rflurri uriurra:rnnlulad?crr:d:uo.tn t

r

||

u 3 n o d r u n"r s U o :

n-

u

da

t

t

q t s s : ct- u 4 n n I u ri u u ur al u u o

3oth July, 2014 13:30

7 naq n SnrsuSnts{o nrsquB LJfl Ufi nls s 0C oEjt:[ttJs:6n Sn] u 7 Stroiegies io set up o successful SOC [securiiy 0perotions CentreJ

t

Mr.Vinod Vosudevon C00, Polodion Networks

14:00

o Ins:aSr cr.:-:

Il

n0

ut u I tl os UAOONB IUIUOSOgIJINUSUIIUU :.,'tI u

u u oJ

H

o

J

5u nt

s

dt r zir 4q t

n

u

n:

n:l

udunJ

The Legol Frqmework for Prouctive Cybersecurity Defense

&

cls.uss€J: rfi:dru:EJ or -l

r t sd nr

u]r a: n

R5

ul5

Ff

I

n ss u R o u

sni u Htl n€,rdu

fi r t n

oi

R

ru : J fi 3 n ss u nt a n 5

r

r

tJ

s : tn

n


lutl lls'{ouJl I lsuJeluu,d luuuJU ltls: lutl lull lllluliiu drsau n fi rnsriiJo:n u o: nnsqrnn-s'lu uoS The lntegroted Fromeworks ond Success Story of COB|T5 Progmotic lmplementotion in Thqilond t5uJ5 rJriruil lJqlf lJ

r

I

g o.ritu;a Rssu:SnU 14

dr uru nrs

uJr u r n

nlulad

a1 s

au n fi a: nr s d o a t s r

||

drdnrunru:nssunrsritr\unatondnnSuatta:narQna-nn5nr€J

& Networking Breok

Refreshment 16.,45

o

u3 n1J||a:sdrr u uln u1u nts5u fi -l -\. o1 | u u ssn't lo oul Jnolu oJ ||

In.a.n.]

onurislu ru oSriq:rirlrio: nnsat u1sn

Driving Cyber Resilience: Building o Defense Strotegy thot Works

t-

4ru5aan oulnuna

ujtcrnrsdtrunaqnf rnhlulaoarsaurnn uSt}n Unn.{tnn [untuu]

1l

unsflt6n6rra:iiruurnrsJunrsrlruutqnsFlraosdtunrtutiun:daonn€iuruo5uo:tJs:tnrt d:nqurra:anSloruSnt The fvolution of the UK ond US Cybersecurity Strotegy I

g o.LJ5ryoJt Houtoun cGElT, CRISC, CISSP, CSSLP, Clsft, CISM, CBCI, CFt, SSCP, lTlL Expert V3, lRCfi: ISMS Leod fluditor, C0BIT 5 Licensed Troiner [tSCJ, Rsion ffdvisory Bocrd, ISRCR - Bongkok Chopter Committee ITSMF Thoilond Boord

Thoilond Inforpotion Security Rssqciotion (TlSRl-Committee uls:sr utra:{rioti: uSu-n oI a ItJsruJ adu Ua 6 u no5 4r rin r

r

r

Slth July , 2014

|

08:45

tdo:rs: a:t fr ouh n ii ou nt dt uniSlu u oSJu ntsfi t at nst u The Reol world stote*sponsored cyber Espionoge ond Militory Cyber Inlelligence Cose StudY -rl

|

o r rxu

g

I

t

ula.n.usstio tfruunoJd r{t nsutn nlulad ar sau

rn rt

tta,ornt

fl

natll u

ns:nsl:narlnu

09:15

09:45

r

rnnfuladFrriuaUt,dtnsunsrq{utta:ijo:du Rdvonced Molwore Rdvonced Molwore Defense SYstem

&

4ru-rf,rigg Qqe; nssunlsu10nls u5u-n uq8ust'itrict

09:45

|

16J'fij3u5u,ilxJs:aunrs,rurra:rruthnrilunr[Jo:riufiu4nntucitu"lutuo5nuuiuSnts s:du4tuo: Hdrsr u nlu tju nts:ciu ut fl poneiDiscussion: Notionol Level Cybersecurily Threots Defense, Countermeasures ond Progmotic Controls

g u;a.n.usstto tfr€Junot6 r{rnsurnnfqlasarsaulnntta,alnt Rnallnu ns:nsunatlnu

g nruo-srsul:d dnsrnu soJt{o1u3Bn1s

drunurrnso:ttri:utfr


a

uJ.n.0.onsuJa n1af,ssru crc mor u:u nrsRudrn n)u'laiarsdu

rn Ft

dr Un-rr u n rurn ssu nr stl o.lriu rra:dst u tJst u

nrsqrsnriirurn

ILi.r.l.u.J

Moderotor a

I

o.USnJnI npuroun ds:srurra:uiriod: l , - "c, usun roua lusrujauuua tuutnos ,llnn

Refreshment

& Networking

Breok

ururiurnnrlntrn:lSnrselns:n"ur:!uutfiJrs:i:ngrRnnru?rinsutni{o: rriorn*Ju

n:ruusoulunp5uilanupaluruori riarr:S ri4hnruo:nnsuulnSoutud:nu ooq'lqu uioun:r6qu$drJunouurnslrquo:iru.rutruunnrtuJun:UaoonEJ rnnlulafiarsaurnnJunrsrr Jr u,uoJRnstuJatnsuudrSu0ofi ufialutuo5 lurioiia:?r s0 / tEc ztoot r:a5riu 2013 rrj6€rurrda:rrdlnu rdutiuodr:ls Jrinndo:drnSJnru ririra:rnS€rudr{ndt I s0 / EC 27001 ifi nuarrins I

|

rtJnnfilunaun 6nt srIruut dnunt urunat ns'l nudrun:r uilu n:daondalo tuoS

uuuJjou't^onr un:iurjun:ulaocinalqruoSuo;o:nnslns:air:,rilu1ruriu n :r u dt rirus : n- u ut n U ru n r dt u n :t u u- u n : d a o n n otiu li€i il n fr u o : ti fr u ,rlnr in nt itooSrrr rya.uaii:5Ju 4:rir:rirlnnru nralrtrutta:nrssuUonuhs I

lu

r

uosriu ut nsnt

su u 4.tuo: a nt

Uunt stlu

I

t

n€J

3oth July, 2014 13:30

- 14:00 i c

tmilItffiffiffi

uausqnu:prs'l gnlso€jl J H U oIu s:u ulj H€Jn u:in ...RtuRllonntaonlcl Vqlue UPS soluiion, Modulorize the future ! di

t

I

14:00

-

14:45

I

Mr.Dovid Tsoi cTo (Chief fechnology 0fficer) 0f Huowei fnterprise Network Energy Product Line

I" Utnsn'lsSu0ouattrS$u?nurra.uu - nouJuntsnOUduOJlilooJdnsnnRnnlU ,u'r,si,iiii;udJl;ti The Next Generation Molwore & Incident Response Procedures to Sociol Network Threots : Lessons Leqrned from the Front Line of Defense

g os.ascUuri i::q5nu

qdiurunts dtrinnrtuf un:daonfiu drdn:rurfruulqsnssunl:itFnnsoUnd [o:nnrsuttiou] [auso']

qolulunls-:,1,1 4'

- 15:30 ),t#{,t'rffi

14:45

O

uiftJ s: ar u ntsSnut

nrt

u u-u

n:

ul

aoo

nu s:u

un

au CIr n o5 d s:t n n t

I

nu

[ | nu t u 5 n

]

ulu u o5otu uJ u u u n n:t u 0 u n: d a on n-s n RIUIa€J nss:du tJ s: n Fl riu ur fr n c\t u ntsll Jl uJ u u u n dt u nrl u fl u-un:daonn-sats6utnR Cybersecurity Policy ond lT Sea"rrity Moster Plsn * fi Cnrciql Policy & Moster Plon to Enhance 0rganizotion's Cybersecurity Copobility * ic r

nS€J u

dr 5u

rl o riu fi

||

I

sd u I n fl o: n

I

||

I

||

I

||

g 4NnuJflnn nllsru

nt:nfi rrruu nRlununlrudaondun't utnnlula5 arsauInrr nrsluJriJiaru40ni n

Cyber Defense Initiotive Conference

cDlc20l4

www, cdicconference.com


Refreshment

r luriofo:h rso/rEc 2too1 j

r

,

& Networking Breok

zotl

1 ?r'

rrjdsurda:rrnlnu

tsunuoulJlslnnnCI0J The Transition to New Revision of lS0/lEC 21oat2A13 a r1ru5g1r flSn5ng dn5urnrsurnslru Sturqnts

drdn:runru:nssuntsrtri:utfl jtdr€jntsSt".tsots:ut"l:tu [runc] Srdn:r uur nslr u udnn-cufi qnat nnssu [auo. ] [lt st J, ns:ns]rqnarHnssu

16:45

I

- '17:30

{lllli|itll

lllllilllliil

uuuoJournndrunluuun:rjaoonuluruoSuo:o:nns fns:ah:rlu1r u ni,n:r udt fr qs:ou ut fr uo:rJs:tn nl n€J Ponel : Thoilond Criticol Infrostructure Security: fin tnd-to*E"rd View of Stoie [nterprise Exectrl"ives

l|;lli;l&;

* 4ruqafrS sssualsu

qurur4irnrs I gsrlrarsautnnla:doatsJ nrs luJrijra:un0nrn

g nruarls'lu unslns qdr uru nrs?qdrilra:r

I

u

usnrsrn nlulassrsdutnfi

u5un nts0ulnu {trjn luxtuul

4ru8;8u riiuufrnSuru{ uidt uru nisult r ulruut s:u u.tt

u

tjs:u n n

rirsluJriJtunsna:"r

g

Moderotor o.rlu;uS urBu rudr

ursnrsu]tu iidBnut

Lis$n ra8a hjsrujariuua tsurno6

{rrin

3lth July , 2014 08:45

- 09:15 s

V*1,iif'tl1\,t:;1i.!lg;t{i7;si1

r

tl n r r [J u n a€J n S nt s rIru u r rJ nu n r uJ u n ar n sl n

rJaonns"luruoi In*depth ond The Humon Element Cybersecurity Ccpability

:,

'3

:: '.:.

-

EJ

dtun

I t u u' u n J

Building Thoilcnd

u.n.o.ryrruua ei:6u u'l€lndurnunrtuuun:daoofi ets:uudtsaulnn[rtsR]

a

t, it

09:15

-

Og.45

t-1 ;

-

|I

t!

Uf

l:r-1 RCI | H U r U

1

nrSUSntS'l-O n'ls

,---

nlr u 0u n:d aonriu uot n n sfr rn6qu rarir f

r

loualunltunun

Responsive"Security: Be Reody io Be Secure fxplores the chollenges, issu*s, und dilenrnnus of monoging infornrolion s*curity risk, ond introduces an oppronch for nddressing concerns from bolh c praotilioner nnd org*nizotioncl rnonogernsnt slcndpoint.

I 09:4b_10:30,e )

i rl

Dr.Meng-Chow Kong CISSP, ClSn, IlSC]? Fsion fidvisory Boord, RRISI Forurn founder

oriufqslu ru oSriu ut nsntsu'uq:u o: sut ntsl nu The Molwore Wcr: Flesponding to the Evolution of Blending Httocks nrsSu

ri

g ns.frnfr fuu:5and q{n

tl.

Ii

nr suJiu

nrt u tJaon n-ur n nfulad arsau

surR'rsnEJrnul

r

n

n

{trin Iuntuu]

ri

Refreshment Cvber Defense Initlotive Conference

cDlc20l4

& Networking Breck www.cdicconference.com


nlorndudru n$flusul8 nrsllo:riu Network Infrostructure lla:nls Response Cyber Crime lou5Snrsnrriogar8:6n

3oth July, 2014 30

- 17:30 |

Defensive Cybersecurily C-hollenge Workshop

@!;:iJ#aTffii#:[\l}iJY'',::?J'Tx!3ll,'l,Hfil.'*.oufr-|ciurns1tulta:55nts[Jo:r\u

th

3I

July, 2014

Cybercrime Intelligent InvesiigotiBn Teqhnjqu,es Workshop [tlfJ -s "l n r :"a n 3 n r s n r t o U A a : n r s I r :s : u u I u n u fr il fr o 5 or dr 16 J u 1'1 n rnnntsruta0ou'lsiuntsltu.]Uu Hockinq Contest ut0tiunou

08:45

||

oei i : a : r drr

g

cr

u

5

ountnd

f

I

t

I

,,

r

d fr ii ar u r s n ri rl tJ d s :q n n?81

di s :

o.iusua :Jrlod€J clssP,

CIlnc, GCFR,

sscr, rlcsn, clEH, cNE6, security+, Network+, ccNff

Snur ns /uit8€nui aJ uJr€.ruSntsilJnousu

usun rdai frJsrujauuua ruurnos lrno l[luradHuo:.rru cDlc ?unaonduaruiJduiruur lnu Live show fiot[lu ur:lc'lanuo.ruratiunao.tuotnuduuurlunnij iuU[fr unu RclS Beseorch LHB rra: H c s Hed teo m I ci5tassn urailului iulu5uorri rir urnuuli]ci ?u Gooole n3a YouTub" rirlrt ntnucit0ufruluidnu:ru ncts tiliqrit I

i u?n ri

r

ri

orr a

cufuiiu :r u 0

r

ri

or r uJ u

riu

{r

r

ri

c nt

c

ln€r o un t

=

3l th July,2O14 o a

I o

t o

Live Show 1: Voice Sliffing dmS: rfru.rtS; dnr5: - luiaot dnilJ:ntsaunutnt:lnsriun Live Show 2: ShellGhosi - No One See Me LiIijoni:aunq - nrsrrujtci:tritutuo:ltJsttnsudunsat{I5naaos:uUnsl'l'lu4nuIn Live Show 3: ft New Woy to Hock Public Wireless LflN n,a:.:aralStdu - ntsttons:uur41nuSntstnSodtulSataatilsru: Live Show 4: Breoking Cyber Bunker n'r,rlsrnisciru4or\rs - rirsnonsria [oist EncryptionJ rdortrfi; Sofe House uo:toga Live Show 5: Neor Foo Communicotion $ocking rj:?ndri:r{u - ntsuluusouauu Nrc ttuuttuulfra Live Show 6: Rospberry ni - fi Hocker Toy Box [CyUer Criminols Swiss-firmy KnifeJ inuonnao;or:huo:rronrhoS - SSnrsair:qdnsrurronttuuunut "froo:ls tton'ldtau!"

Refreshment o o

& Networking

Live Show 7: Home Spplionce Hocking s:5:! [nudndru - rrjotnSo:]t'lulUtr?udruqniuurtau Internet Live Show 8: Get Inside to Mobile Treosure

Breok

?

qun5u.rtlUu6ohn - ntsttonftJsttnsuu uausnluJullu u n un tddon Live Show 9: Escoping Plon from Digitol's Prison UnsnrsnHnrlnfrinoa - n.lStlilns:uunru4ufrudnS [nnMJ uuuSntsnar:ci Live Show 10: Public lnfrostructure Threots on the Rise rqr:s:uuSnr0o: * ntst&Sns:uuar stsqdlnntlu ulSnr:Uodu

ar

o

I

g

RCIS Technicgl Teom tlrnuloq o.UugS ur8u ui 6r uru nrs rijr€J ri d3n ur, uS$n to8 a ltjst rrja u'u da rfr ur n o5 {r

Cyber Defense Initiolive Confsr€nce

cDrc20l 4

rTn

www.cdicconference.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.