2020 Agenda

  • Day One
    26th November
  • Day Two
    27th November
Day One 26 November,2020 (Thursday)
Time Hall 9, Western China International Expo City
8:30-9:15 Registration&Networking Breakfast
9:15-9:30 Opening Ceremony
Moderator: Xiaojun Zhu
9:30-10:00 New Infrastructure Security Challenges and Build-in Security Highlights
Jiangxing Wu
10:00-10:30 Trusted Network Architecture Based on Blockchain
Dr. Jie Li
10:30-10:50 Cyber Security in Today’s World
Christophe Poisson
10:50-11:00 Tea Break
11:00-11:20 Drive “Security Native” into Fabric of Hybrid Cloud Business
Liang Feng
11:20-12:20 Hacker TALK Panel Discussion: China’s 【First Generation White Hat】 Hacker TALK
Moderator: Quan Peng (PP)
Guests: Wei Gong (goodwell), Xin Huang, Ben Ji, Yong Lin (Lion),
Junqing Wang (la0wang), Zhaoxia Xie (Frankie), Xundi Zhang
12:20-12:40 Norms of Responsible State Behavior in Cyberspace
John Davis
11:45-13:30 Lunch
Conference Room A Conference Room B Conference Room C
Track A:CSO
(Moderator:Bin Wang)
Track B:Vulnerability A&D and Security Research
(Moderator:Lisa Zhang)
Track C:Data Security & Cloud Security
(Moderator:Wei Gu)
13:30-14:00 Towards Design and Implementation of Modern Security Infrastructure and Product
Qidan He
The Trend of Offensive and Defensive Technology and our Threat Hunting Capacity Building Practice
Siming Pang
Data Backup Technology Development in Hybrid Cloud Scenarios
Xiaoqin Hu
14:00-14:30 Security Policy – Is Yours Built for DevOps
Tony Li
Zero-Trust: Reinventing the Concept of Cybersecurity
Richard Li
14:30-15:00 The Practise of Trace and Retaliation in Red Team/Blue Team Exercises
Wei Guo
A practice in anti-Bot under “New Infrastructure Construction”
Lonny Li
Research and Practice of Risk Assessment of Masked Data from the Perspective of Compliance
Lei Chen
15:00-15:15 Tea Break
15:15-15:45 Infrastructure Security of Large-scale World-class Enterprises
Brian Wang
Cyberbit Range: Beginning of Efficient Cyber Security Blue Team
Kevin Zhu
To Harness Data to a New Infrastructure on the Basis of Security– To Build a Multi-dimension Data Security Framework for New Infrastructure
Jie Zhou
15:45-16:15 Usable Security – Making Users a strong Link in Security
Tiger Deng
Use Fuzzing to Discover Vulnerabilities Related to the rdp Protocol
Songlin Li
Zero Trust Practice in Cloud-Native Applications
Nicloe Zhang
16:15-16:45 Data Theft and Intelligence Detection of Isolated Intranet
Rui Zhao
Day Two 27 November,2020 (Friday)
Time Hall 9, Western China International Expo City
9:00-9:30 Registration&Networking Breakfast
Moderator:Yaojiang Zhang
9:30-10:00 Public Blockchains: How can You Build one Ethically?
Bill Roscoe
10:00-10:20 Build the Solid Foundation for Cybersecurity in the Era of New Infrastructure
Steven Lin
10:20-10:40 Lighting it Up – Playbook Heat Maps
Derek Manky
10:40-10:50 Tea Break
10:50-11:10 Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
Diana Kelley
11:10-11:30 Analysis of Satellite System Security and New Ideas on Security Education of New Infrastructure Construction
Qing Yang
11:30-12:30 Panel Discussion:CSO and Security Innovation
Moderator:Yaojiang Zhang
Guests:Feng Liu,Weichun Li,Xinkai Liu,Robin Wang,Joey Xiang
12:30-13:30 Lunch
Conference Room A Conference Room B Conference Room C
Track D:Intelligent Security Operation
(Moderator:Mingkun Yuan)
Track E:Industrial Control Security
(Moderator:Chenglin Lei)
Track F:Security Innovation
(Moderator:Qing Yang)
13:30-14:00 Security Operation Theory and Practice
Po Hu
Analysis of Security Threats and Hidden Dangers of IP Verification Enabled Industrial Internet
Zhiguo Liu
New Generation Formal Verification Technology with High Speed and Efficiency Guarantees No False Negative
Long Li
Gavin Bu
14:00-14:30 Next Generation Security Defense and Response
Collin Chang
Analysis of C2 Attack Chain Based on OPC DA Protocol
Yang Hu
Innovative Experience of Multi-port Visualization Technology for Security Business
Xin Huang
15:00-15:15 Intelligent Security Operations under Digital Transformation
Mingkun Yuan
Industrial IoT System Security Practice
Mcgill Wang
Thoughts on Frontier Security Research in Enterprises
Bo Zhang
15:00-15:15 Tea Break
15:15-15:45 Security Operation under Zero Trust Framework
Yi He
Security Analysis of IOV Platform
Xianwen Fu
Qiling Framework: Modern Reverse Engineering Experience
Ziqiao Kong
Chenxu Wu
15:45-16:15 AISecOps : Multi-dimensional and Scalable Alarm Evaluation for Enterprise
Zijian Wu
Fudi Wu
Lost in Translation: When Industrial Protocol Translation goes Wrong
Dr. Marco Balduzzi
Philippe Lin
Security Threats to AI×IoT
Shuai Xie

*The timetable will be confirmed according to on-site arrangement.