2021 Agenda

  • Day One
    14th December
  • Day Two
    15th December
14 December,2021 (Tuesday)
Time Main Conference
9:00-9:30 Registration & Networking Breakfast
9:30-9:45 Open Ceremony
Keynote: Security, the Key to Digital Economy
Moderator:William Jin, Executive Vice Chairman, Cyber Security Association of Sichuan
9:45-10:05 Build A Trusted and Active Immunity Ecosystem of Cyberspace
Changxiang Shen, Academician, China Academy of Engineering (CAE); Consultant, Advisory Committee for Office of the Central Cyberspace Affairs Commission
10:05-10:25 The Future of Security and Privacy
Bart Preneel, Member, The Academia Europaea; President, The IACR
10:25-10:45 The future of Security is in the Cloud
Lei Zheng, Vice President, SANGFOR TECHNOLOGIES INC.
10:45-11:05 Industrial Internet Security Practices in Digital Transformation Era
Samuel Lv, General Manager of Strategic Development Center, Tencent Security
11:05-11:25 Insight of Data Security
Xiaosheng Tan, Founder & CEO, Beijing Genius Cyber Tech Co., Ltd.
11:25-11:45 The Cybersecurity Dilemma – Fight against Ransomware
Dr. Erdal Ozkaya, CISO, Comodo Cybersecurity
11:45-12:00 The Release of Cyber Security Capability Graph by DWC
Shaopeng Li, Founder & General Manager, Digital World Consulting
12:00-13:30 Lunch
Conference Room A: Financial Industry (Banking&Securities&Insurance) Security Conference Room B: CSO Conference Room C: Vulnerability A&D and Security Research Conference Room D: Data Security & Cloud Security
Moderator: Cheng Yin, Head of Risk Control Center of Information Security Department, Jingdong Group Moderator: Wei Guo, Director of Technical Operations, Tencent Security Moderator: Robin Wang, CEO/Founder, Shanghai Yinian Information Technology Co., Ltd. Moderator: Xin Li, Secretary General, Sichuan Cryptography Industry Association
13:30-14:00 The Growth Path of Information Security Team
Yong Xue, Information Security Officer, Hello Inc.
Challenges and Solutions to Privacy Compliance and Data Security in the Era of Strong Supervision
Framework and Method of Network Attack Tracing Based on Graph Model
Kaida Tang, General Manager, Nanjing Juming Network Technology Co., Ltd.
Evolution Trends of Data Disaster Tolerance Technology in Cloud Native Scene
Xiaoqin Hu,CEO,Chengdu Vinchin Technology Co., Ltd.
14:00-14:30 From 0 to 1: Best Practices for Building Security Development Lifecycle
Mingwei Xue, Chief Security Development Architect, Hangzhou MoreSec Technology Co., Ltd.
To Fight Against Advanced Threats, CSO Plans The Key Choice for Endpoint Security
Grace Xiang, Head of KA/Great China, Anxinsec (Beijing) Technology Co., Ltd.
Ransomware All in One
Junliang Liu, Director of Safety Laboratory, HANGZHOU MEICHUANG TECHNOLOGY CO., LTD
Several Best Practices for Infrastructure as Code Security
Ryan Xu, Senior Security Architect, SYNOPSYS
14:30-15:00 How Memory Protection Responds to “Deadly Attacks” of the Financial System
Linxer, CTO, Anxinsec (Beijing) Technology Co., Ltd.
IINSEC Threat Landscape
Vishal Salvi, Chief Information Security Officer & Head of Cyber Security Practice, Infosys
Exploring the Main Scenarios of APT Attacks Based on the SolarWinds Incident and How Software R&D Companies Respond
Siming Pang, Security Architect, SANGFOR TECHNOLOGIES INC.
The Exploration of API Security Surfing the Digital Tide
Joey Shao, COO, Shenzhen Eversafe Online Technology Co., Ltd.
15:00-15:15 Tea Break
15:15-15:45 DevSecOps’s Landing Practice in Large Banks
Jihai Zhou, Head of DevSecOps, HSBC Technology China
Exploration on Improving the Comprehensive Quality of CSO
Weichun Li, Director of IT Security, Essence Securities Co., Ltd.
Can You Stop Cyber Attacks at Their Planning Stages?
Roy Zinman,CEO,Brandefender
Cyber Security Challenges and Solutions in Medical and Health Industry
Great Gu,Global CISO of A Biopharmaceutical Company, Board Director of IAPP Asia Pacific Consulting
15:45-16:15 Pending How to Quantify Risk Calculation More Accurately——Stepping Forward Intelligent Risk Decision
Chris Fu, CTO, Shanghai Wuzhi Intelligence Technology Co., Ltd.
Json Web Token Attack Introduction
Caudevilla Louis, Senior Cyber Risk Advisory Consultant, Deloitte
How Standards Can Help Manage Information Security and Achieve Carbon Neutrality
Paulo Lopes,Director Strategic,BSI
15 December,2021 (Wednesday)
Time Main Conference Hall
Keynote: Fintech Security
Moderator: Xiaosheng Tan, Founder & CEO, Beijing Genius Cyber Tech Co., Ltd.
9:30-10:00 Practices of Application Security
Zhicheng Hu, Security Expert, Pingan Bank
10:00-10:30 Cloud Native Secure Traffic Challenges and Opportunities
Pansin Liu,Information Security Center Director,Lexin
10:30-11:00 Practice of Advanced Threat Defense in Digital Banking: Trusted Defense
Yuanchao Zhang,CISO,mybank
11:00-11:30 Data Security Practices of WeBank
Qinglei Feng, Deputy General Manager of Information Security Department, Shenzhen Qianhai WeBank Co., Ltd.
11:30-12:00 The Application and Development of Zero-Trust in The Financial Industry
Jianming Su, Financial Technology Expert, Business R&D Center of Industrial and Commercial Bank of China (ICBC)
12:00-13:30 Lunch
Conference Room A: Intelligent Security Operation Conference Room B: Critical Information Infrastructure Security Protection Forum Conference Room C: Security Innovation Conference Room D: Advanced Training
Moderator:Mingkun Yuan, Chief Security Operation Officer, Senior Vice President,DAS-Security Moderator:Hao Wu, Director of Member Services, Cyber Security Association of Sichuan Moderator:Qing Yang, Head of Tianma Lab, Tencent Security Application of Deception Defense in Active Security Defense System
13:30-14:00 How Microsoft Defines the Next Generation of Modern SOC
Meibo Zhang, Director of Cybersecurity, Chief Architect of Cybersecurity, Microsoft (China) Co., Ltd.
CSAS Supporting Service to CII
William Jin, Executive Vice Chairman, Cyber Security Association of Sichuan
Content Generation Risks and Defense Strategies in Large-Scale Pre-Training Models in Artificial Intelligence
Keyun Luo, AI Security Researcher, Tencent
Lecturer:Shoukun Qiu,Chief Security Architect, Hangzhou MoreSec Technology Co., Ltd.
14:00-14:30 How to Integrate Security Scanning of Software Supply Chain into DevSecOps System?
Wang Qing,China Chief Architect, JFrog
Cyber Security Insurance Application on CII Management
Rui Hou, Executive Secretary General, Sichuan GuoXun Cyber Security and Information Technology Institute
Improve Threat Hunting with Automatic Breach Emulation
Yu Yin, Product Expert, QI-ANXIN
Course 1: Through the Perspective of Attack, Understand the Deception Technology that Emerged in the Security Protection System
14:30-15:00 AiCSO-Sharing of Intelligent Security Operation
Penny Xiao, Vice President, DAS-Security
Key Information Infrastructure Security Service Framework
Pat C.Luo, Vice President, Venustech Group Inc.
WASM Fundamental Security Flaw & Software-Based Fault Isolation
Jianxin Lai, Director of Development, Xcalibyte Yuning Liang, Founder & CEO, Xcalibyte
15:00-15:15 Tea Break
15:15-15:45 Prioritizing Human Risk Management to Improve Security Operations
Hardy Xie, Chief Security Evangelist, Shanghai Yinian Information Technology Co., Ltd.
Accelerate Cloud Native Security Deployment
Travis, CEO, Tensor Security
Vulnerability Mining with Software Defined Radio
Qiren Gu, Security Researcher, Tencent
Course 2: Best Practice and Case Analysis of Deception Defense System Implementation
15:45-16:15 XSOAR Automated Orchestration and Reorganization of Safety Operation System
Shizhong Wang, Senior Security Consultant of West District, Palo Alto Networks
Vulnerability Management Proactive Defense System Vulnerability of CII
Jacky Chen, Vice GM of Tech, Chief Security Solution Architect, Tophant
Man Machine Verification Countermeasure
wkong、, Attack Security Expert, Xi`an Clover Cyber Technology Co.,Ltd.
16:15-16:45 Building Security Best Practices Based on Amazon Web Service
Mingyue Zhang, Partner Solution Architect, Amazon Web Service

The timeline will be confirmed according to on-site arrangement