2019 Agenda
Day One: Oct.22nd, 2019(Tuesday) | |||
Time | Hall 9, Western China International Expo City | ||
9:00-9:20 | Registration & Networking Breakfast | ||
9:20-9:30 | Opening Ceremony | ||
Keynote Moderator: Xiaosheng Tan |
|||
9:30-10:30 | Importance of Public Key Cryptography to Information Security Martin Hellman |
||
10:30-10:45 | Tea Break | ||
10:45-11:15 | Achieve Build-in Security in New Technology-System Yunkun Wu |
||
11:15-11:45 | One’s & Zeroes Were Just the Beginning: A Transformational Roadmap for the Backroom to Boardroom Tim Virtue |
||
11:45-13:30 | Lunch | ||
Conference Hall A | Conference Hall B | Conference Hall C | |
Track A: CSO Forum (Moderator : Xiangyu Jin) |
Track B: Vulnerability A&D (Moderator:Lisa Zhang ) |
Track C: Data Security & Cloud Security (Moderator: Wei Gu) |
|
13:30-14:00 | Exploration on the Construction of Enterprise Security Mid-platform Jian Chen |
Making Products Secure yet Intentionally Hackable Craig Smith |
Data Backup Development Trend Analysis Under Cloud Environment Xiaoqin Hu |
14:00-14:30 | Information Security System Construction Ideas and Practice of China Minsheng Bank Jihui Li |
Adverserial Attacks on Machine Learning David Glance |
Five Most Dangerous Data Theft Tactics and Mitigations in APIs & Microservices Jing Dong |
14:30-15:00 | Overall Risk Management Zuoyu Zhang, DingTalk CRO, Alibaba Group |
Super Root: A New Powerful and Stealthy Rooting Technique to Hacking ARM Devices Zhangkai Zhang |
How to Fight Advanced “AI” Fraud Attacks with Unsupervised Learning Hongyu Cui |
15:00-15:15 | Tea Break | ||
15:15-15:45 | Internet Bank Security Construction Practice Feifei Wu |
Unauthorized Exploit of Industrial Control Protocol Siting Jian |
Disinformation Attacks as an Emerging Form of Cyber Threat Roy Zinman |
15:45-16:15 | Trustworthy, Controllable, and Manageable – Identity Security in Digital Transformation Tony Tan |
Two Bytes to Pwn Adobe Reader: The Black Magic Behind the Byte Order Mark Ke Liu |
Key and Difficult Points in Personal Information and Privacy Protection Tianbin Ye |
16:15-16:45 | Data Security for Large Internet Companies Yefei Qian |
Oh! Auth: Pitfalls of OAuth 2.0 & attacking the fallen Samit Anwer |
Digital Technology Security Challenge and Thinking Minghao Liu |
16:45-17:15 | Panel:Security Debate Moderator: Xiaosheng Tan |
Day Two: Oct.23rd, 2019(Wednesday) | |||
Time | Hall 9, Western China International Expo City | ||
Keynote Moderator: Sara Peters |
|||
9:00-9:30 | Registration & Networking Breakfast | ||
9:30-10:00 | Cultivate the Entrepreneurship of Security Entrepreneurs in Cyberspace Xiaosheng Tan |
||
10:00-10:30 | Intelligent Security Powered by Threat Intelligence Feng Xue |
||
10:30-10:45 | Tea Break | ||
10:45-11:15 | Making Sense of Chaos: The Evolution of Operational Security Kevin O’Leary |
||
11:15-11:45 | Effective Protection for the Future to Escort Digital Transformation for Enterprises Yi Hao |
||
11:45-12:15 | Intelligent Data Security in Smart City Bo Liu |
||
12:15-14:00 | Lunch | ||
Conference Hall A | Conference Hall B | Conference Hall C | |
Track D: Incident Response/ Security Operation (Moderator: Tony Liu) | Track E: Talent Development (Moderator: Hui Lu) | Track F: Security Innovation (Moderator: Qing Yang) | |
14:00-14:30 | Consideration on Network Security Protection of Industrial Control System Bing Li |
Exploring the Mechanism of Collaborative Education between Government, Industry, University and Research Institutes to Build a First-class Cybersecurity School Liu Jianwei |
Application of Graph Neural Network (GNN) in Vulnerability Discovery Jiqiang Feng |
14:30-15:00 | The Challenge and Practice of National Cyber Threat Intelligence Nengqiang He |
Exploration and Practice of Innovative Mode for Training Cybersecurity Talents Zhihong Tian |
The New Generation of High Efficiency, Precision and Flexibility Program Static Applications Security Testing Shin Ming Liu Yuning Liang |
15:00-15:15 | Understanding and Reducing the Enterprise Security Risks Yang Zhao |
Information Security Compound Talent Training Experience Sharing Zheli Liu |
Zero-Sum Game – A New Battleground against Cybercrime Ruidong Zhang |
15:15-15:45 | Tea Break | ||
15:45-16:15 | Creating an “Unattended” Security Operation Center Kui Fu |
Talent Safety for Security Talents Ting Wu |
Instant Communication in the New Information Era Kunzhe Chai Zhengxian Lin |
16:15-16:45 | Threat Hunting Based on Trusted Clue Mining Runzi Zhang |
Network Security Application-oriented Talent Training Practice Yang Li |
5G Is Coming – Don’t Worry about Security Lin Huang |
16:45-17:15 | Digital Brand Protection, an Active Defense Practice of Business Security Dalu Yang |
Panel Discussion: Talent Training: Frontier Leading, Demand Driven Moderator: Hongwei Li Panelists: Liu Jianwei, Zhihong Tian, Zheli Liu, Ting Wu, Yang Li |