2021 Agenda
14 December,2021 (Tuesday) | ||||
Time | Main Conference | |||
9:00-9:30 | Registration & Networking Breakfast | |||
9:30-9:45 | Open Ceremony | |||
Keynote: Security, the Key to Digital Economy Moderator:William Jin, Executive Vice Chairman, Cyber Security Association of Sichuan |
||||
9:45-10:05 | Build A Trusted and Active Immunity Ecosystem of Cyberspace Changxiang Shen, Academician, China Academy of Engineering (CAE); Consultant, Advisory Committee for Office of the Central Cyberspace Affairs Commission |
|||
10:05-10:25 | The Future of Security and Privacy Bart Preneel, Member, The Academia Europaea; President, The IACR |
|||
10:25-10:45 | The future of Security is in the Cloud Lei Zheng, Vice President, SANGFOR TECHNOLOGIES INC. |
|||
10:45-11:05 | Industrial Internet Security Practices in Digital Transformation Era Samuel Lv, General Manager of Strategic Development Center, Tencent Security |
|||
11:05-11:25 | Insight of Data Security Xiaosheng Tan, Founder & CEO, Beijing Genius Cyber Tech Co., Ltd. |
|||
11:25-11:45 | The Cybersecurity Dilemma – Fight against Ransomware Dr. Erdal Ozkaya, CISO, Comodo Cybersecurity |
|||
11:45-12:00 | The Release of Cyber Security Capability Graph by DWC Shaopeng Li, Founder & General Manager, Digital World Consulting |
|||
12:00-13:30 | Lunch | |||
Conference Room A: Financial Industry (Banking&Securities&Insurance) Security | Conference Room B: CSO | Conference Room C: Vulnerability A&D and Security Research | Conference Room D: Data Security & Cloud Security | |
Moderator: Cheng Yin, Head of Risk Control Center of Information Security Department, Jingdong Group | Moderator: Wei Guo, Director of Technical Operations, Tencent Security | Moderator: Robin Wang, CEO/Founder, Shanghai Yinian Information Technology Co., Ltd. | Moderator: Xin Li, Secretary General, Sichuan Cryptography Industry Association | |
13:30-14:00 | The Growth Path of Information Security Team Yong Xue, Information Security Officer, Hello Inc. |
Challenges and Solutions to Privacy Compliance and Data Security in the Era of Strong Supervision Xinkai Liu, Founder & CEO, SHENZHEN HONGTU TECHNOLOGY CO., LTD. |
Framework and Method of Network Attack Tracing Based on Graph Model Kaida Tang, General Manager, Nanjing Juming Network Technology Co., Ltd. |
Evolution Trends of Data Disaster Tolerance Technology in Cloud Native Scene Xiaoqin Hu,CEO,Chengdu Vinchin Technology Co., Ltd. |
14:00-14:30 | From 0 to 1: Best Practices for Building Security Development Lifecycle Mingwei Xue, Chief Security Development Architect, Hangzhou MoreSec Technology Co., Ltd. |
To Fight Against Advanced Threats, CSO Plans The Key Choice for Endpoint Security Grace Xiang, Head of KA/Great China, Anxinsec (Beijing) Technology Co., Ltd. |
Ransomware All in One Junliang Liu, Director of Safety Laboratory, HANGZHOU MEICHUANG TECHNOLOGY CO., LTD |
Several Best Practices for Infrastructure as Code Security Ryan Xu, Senior Security Architect, SYNOPSYS |
14:30-15:00 | How Memory Protection Responds to “Deadly Attacks” of the Financial System Linxer, CTO, Anxinsec (Beijing) Technology Co., Ltd. |
IINSEC Threat Landscape Vishal Salvi, Chief Information Security Officer & Head of Cyber Security Practice, Infosys |
Exploring the Main Scenarios of APT Attacks Based on the SolarWinds Incident and How Software R&D Companies Respond Siming Pang, Security Architect, SANGFOR TECHNOLOGIES INC. |
The Exploration of API Security Surfing the Digital Tide Joey Shao, COO, Shenzhen Eversafe Online Technology Co., Ltd. |
15:00-15:15 | Tea Break | |||
15:15-15:45 | DevSecOps’s Landing Practice in Large Banks Jihai Zhou, Head of DevSecOps, HSBC Technology China |
Exploration on Improving the Comprehensive Quality of CSO Weichun Li, Director of IT Security, Essence Securities Co., Ltd. |
Can You Stop Cyber Attacks at Their Planning Stages? Roy Zinman,CEO,Brandefender |
Cyber Security Challenges and Solutions in Medical and Health Industry Great Gu,Global CISO of A Biopharmaceutical Company, Board Director of IAPP Asia Pacific Consulting |
15:45-16:15 | Pending | How to Quantify Risk Calculation More Accurately——Stepping Forward Intelligent Risk Decision Chris Fu, CTO, Shanghai Wuzhi Intelligence Technology Co., Ltd. |
Json Web Token Attack Introduction Caudevilla Louis, Senior Cyber Risk Advisory Consultant, Deloitte |
How Standards Can Help Manage Information Security and Achieve Carbon Neutrality Paulo Lopes,Director Strategic,BSI |
15 December,2021 (Wednesday) | ||||
Time | Main Conference Hall | |||
Keynote: Fintech Security Moderator: Xiaosheng Tan, Founder & CEO, Beijing Genius Cyber Tech Co., Ltd. |
||||
9:30-10:00 | Practices of Application Security Zhicheng Hu, Security Expert, Pingan Bank |
|||
10:00-10:30 | Cloud Native Secure Traffic Challenges and Opportunities Pansin Liu,Information Security Center Director,Lexin |
|||
10:30-11:00 | Practice of Advanced Threat Defense in Digital Banking: Trusted Defense Yuanchao Zhang,CISO,mybank |
|||
11:00-11:30 | Data Security Practices of WeBank Qinglei Feng, Deputy General Manager of Information Security Department, Shenzhen Qianhai WeBank Co., Ltd. |
|||
11:30-12:00 | The Application and Development of Zero-Trust in The Financial Industry Jianming Su, Financial Technology Expert, Business R&D Center of Industrial and Commercial Bank of China (ICBC) |
|||
12:00-13:30 | Lunch | |||
Conference Room A: Intelligent Security Operation | Conference Room B: Critical Information Infrastructure Security Protection Forum | Conference Room C: Security Innovation | Conference Room D: Advanced Training | |
Moderator:Mingkun Yuan, Chief Security Operation Officer, Senior Vice President,DAS-Security | Moderator:Hao Wu, Director of Member Services, Cyber Security Association of Sichuan | Moderator:Qing Yang, Head of Tianma Lab, Tencent Security | Application of Deception Defense in Active Security Defense System | |
13:30-14:00 | How Microsoft Defines the Next Generation of Modern SOC Meibo Zhang, Director of Cybersecurity, Chief Architect of Cybersecurity, Microsoft (China) Co., Ltd. |
CSAS Supporting Service to CII William Jin, Executive Vice Chairman, Cyber Security Association of Sichuan |
Content Generation Risks and Defense Strategies in Large-Scale Pre-Training Models in Artificial Intelligence Keyun Luo, AI Security Researcher, Tencent |
Lecturer:Shoukun Qiu,Chief Security Architect, Hangzhou MoreSec Technology Co., Ltd. |
14:00-14:30 | How to Integrate Security Scanning of Software Supply Chain into DevSecOps System? Wang Qing,China Chief Architect, JFrog |
Cyber Security Insurance Application on CII Management Rui Hou, Executive Secretary General, Sichuan GuoXun Cyber Security and Information Technology Institute |
Improve Threat Hunting with Automatic Breach Emulation Yu Yin, Product Expert, QI-ANXIN |
Course 1: Through the Perspective of Attack, Understand the Deception Technology that Emerged in the Security Protection System |
14:30-15:00 | AiCSO-Sharing of Intelligent Security Operation Penny Xiao, Vice President, DAS-Security |
Key Information Infrastructure Security Service Framework Pat C.Luo, Vice President, Venustech Group Inc. |
WASM Fundamental Security Flaw & Software-Based Fault Isolation Jianxin Lai, Director of Development, Xcalibyte Yuning Liang, Founder & CEO, Xcalibyte |
|
15:00-15:15 | Tea Break | |||
15:15-15:45 | Prioritizing Human Risk Management to Improve Security Operations Hardy Xie, Chief Security Evangelist, Shanghai Yinian Information Technology Co., Ltd. |
Accelerate Cloud Native Security Deployment Travis, CEO, Tensor Security |
Vulnerability Mining with Software Defined Radio Qiren Gu, Security Researcher, Tencent |
Course 2: Best Practice and Case Analysis of Deception Defense System Implementation |
15:45-16:15 | XSOAR Automated Orchestration and Reorganization of Safety Operation System Shizhong Wang, Senior Security Consultant of West District, Palo Alto Networks |
Vulnerability Management Proactive Defense System Vulnerability of CII Jacky Chen, Vice GM of Tech, Chief Security Solution Architect, Tophant |
Man Machine Verification Countermeasure wkong、, Attack Security Expert, Xi`an Clover Cyber Technology Co.,Ltd. |
|
16:15-16:45 | Building Security Best Practices Based on Amazon Web Service Mingyue Zhang, Partner Solution Architect, Amazon Web Service |
The timeline will be confirmed according to on-site arrangement