2019 Agenda

  • Day One
  • Day One
Day One: Oct.22nd, 2019(Tuesday)
Time Hall 9, Western China International Expo City
9:00-9:20 Registration & Networking Breakfast
9:20-9:30 Opening Ceremony
Moderator: Xiaosheng Tan
9:30-10:30 Importance of Public Key Cryptography to Information Security
Martin Hellman
10:30-10:45 Tea Break
10:45-11:15 Achieve Build-in Security in New Technology-System
Yunkun Wu
11:15-11:45 One’s & Zeroes Were Just the Beginning: A Transformational Roadmap for the Backroom to Boardroom
Tim Virtue
11:45-13:30 Lunch
Conference Hall A Conference Hall B Conference Hall C
Track A: CSO Forum
(Moderator : Xiangyu Jin)
Track B: Vulnerability A&D
(Moderator:Lisa Zhang )
Track C: Data Security & Cloud Security
(Moderator: Wei Gu)
13:30-14:00 Exploration on the Construction of Enterprise Security Mid-platform
Jian Chen
Making Products Secure yet Intentionally Hackable
Craig Smith
Data Backup Development Trend Analysis Under Cloud Environment
Xiaoqin Hu
14:00-14:30 Information Security System Construction Ideas and Practice of China Minsheng Bank
Jihui Li
Adverserial Attacks on Machine Learning
David Glance
Five Most Dangerous Data Theft Tactics and Mitigations in APIs & Microservices
Jing Dong
14:30-15:00 Overall Risk Management
Zuoyu Zhang, DingTalk CRO, Alibaba Group
Super Root: A New Powerful and Stealthy Rooting Technique to Hacking ARM Devices
Zhangkai Zhang
How to Fight Advanced “AI” Fraud Attacks with Unsupervised Learning
Hongyu Cui
15:00-15:15 Tea Break
15:15-15:45 Internet Bank Security Construction Practice
Feifei Wu
Unauthorized Exploit of Industrial Control Protocol
Siting Jian
Disinformation Attacks as an Emerging Form of Cyber Threat
Roy Zinman
15:45-16:15 Trustworthy, Controllable, and Manageable – Identity Security in Digital Transformation
Tony Tan
Two Bytes to Pwn Adobe Reader: The Black Magic Behind the Byte Order Mark
Ke Liu
Key and Difficult Points in Personal Information and Privacy Protection
Tianbin Ye
16:15-16:45 Data Security for Large Internet Companies
Yefei Qian
Oh! Auth: Pitfalls of OAuth 2.0 & attacking the fallen
Samit Anwer
Digital Technology Security Challenge and Thinking
Minghao Liu
16:45-17:15 Panel:Security Debate
Moderator: Xiaosheng Tan
Day Two: Oct.23rd, 2019(Wednesday)
Time Hall 9, Western China International Expo City
Moderator: Sara Peters
9:00-9:30 Registration & Networking Breakfast
9:30-10:00 Cultivate the Entrepreneurship of Security Entrepreneurs in Cyberspace
Xiaosheng Tan
10:00-10:30 Intelligent Security Powered by Threat Intelligence
Feng Xue
10:30-10:45 Tea Break
10:45-11:15 Making Sense of Chaos: The Evolution of Operational Security
Kevin O’Leary
11:15-11:45 Effective Protection for the Future to Escort Digital Transformation for Enterprises
Yi Hao
11:45-12:15 Intelligent Data Security in Smart City
Bo Liu
12:15-14:00 Lunch
Conference Hall A Conference Hall B Conference Hall C
Track D: Incident Response/ Security Operation (Moderator: Tony Liu) Track E: Talent Development (Moderator: Hui Lu) Track F: Security Innovation (Moderator: Qing Yang)
14:00-14:30 Consideration on Network Security Protection of Industrial Control System
Bing Li
Exploring the Mechanism of Collaborative Education between Government, Industry, University and Research Institutes to Build a First-class Cybersecurity School
Liu Jianwei
Application of Graph Neural Network (GNN) in Vulnerability Discovery
Jiqiang Feng
14:30-15:00 The Challenge and Practice of National Cyber Threat Intelligence
Nengqiang He
Exploration and Practice of Innovative Mode for Training Cybersecurity Talents
Zhihong Tian
The New Generation of High Efficiency, Precision and Flexibility Program Static Applications Security Testing
Shin Ming Liu
Yuning Liang
15:00-15:15 Understanding and Reducing the Enterprise Security Risks
Yang Zhao
Information Security Compound Talent Training Experience Sharing
Zheli Liu
Zero-Sum Game – A New Battleground against Cybercrime
Ruidong Zhang
15:15-15:45 Tea Break
15:45-16:15 Creating an “Unattended” Security Operation Center
Kui Fu
Talent Safety for Security Talents
Ting Wu
Instant Communication in the New Information Era
Kunzhe Chai
Zhengxian Lin
16:15-16:45 Threat Hunting Based on Trusted Clue Mining
Runzi Zhang
Network Security Application-oriented Talent Training Practice
Yang Li
5G Is Coming – Don’t Worry about Security
Lin Huang
16:45-17:15 Digital Brand Protection, an Active Defense Practice of Business Security
Dalu Yang
Panel Discussion: Talent Training: Frontier Leading, Demand Driven
Moderator: Hongwei Li
Liu Jianwei, Zhihong Tian, Zheli Liu, Ting Wu, Yang Li