หนังสือรับเลขที่ 1890 2557

9
{d r uc r n r rdr rinivr fl L3n 1 a un ; uu nrTulafi nr rnu tu rt 6rurfiryrfrrr,rl.Jrl.r.:1u'tn?'rnrror.rrunrrflo.rri'unnrililnon.ri'flfl0:;nnrorfirtnof nri.rfi 13 (cDiC fi.rfrruuurfrrr 1. CDlC201-4 Agenda uflorfrrflLSlivrnunfiu ud'nrlofn 6ilLlofn,irfi'Fr rilu{nflduuuunv?eiloonln16n{fiudrnrfl"lu{ru iott.l" fi r{nrlpr fl drfnrufizuur4vr fl r fi r 6 mi uunyuyrnrTulnfirrvirrrfi (6,tilx.)milrilurieflrrunrnrig nlFr[0ntultnvuilot.lrunixilrvtuntrvu'jrt4'ufi 3o-Et .1.t.^- 255? * #.ru drnrn"lu'rrut6'finrr{nr d'llurnrt'1fr'fi'r{o "The Next Generation of Cybersecurity Intelligence: Protecting our nation against cybe r th reats" lnfl fi ilunv tds or ntl uo ndra uuuLfr'rfl Fi v 6o3<qIdv^^.q-g-.^-.^^^y--'vi tut0n16us.t tnrrrLorrtuufiruyiru r{rtt.lru CDlC2O14lu{uttnvtQnrd'lnairr vlfoltElltl.tqn rLo.tlSuvt nunRu r urnyjrufinQrililry6rri-[flltN,t'tu tLnrudQflmorilulndTorud'lndr-lr:lndnolilHrfr finfl4nr qan (fi'n) email : [email protected] nlnlu{ufi zs ntnt.^u *.^. z - 2971-8000 n1o 369 r,lSo 084-438-7308 tletq I [?0.r 20r4\ Best regards & Thank you very much, Sinsupa Kusol finfl4nr qnn Sales Executive KANOKSIN EXPORT IMPORT CO.,LTD. 162 Kanoksin Building, Ramintra, Anusaowaree, Bangkhean, Bangkok tO22O Office :+662-97L-8000#369 rt rru ridr,*rsnrt drfintifl r,:i5 nrr ,?l ;q.9.,tr*nb d r,:gb. h.:. gl? h t-tqt ti.ti.txp.l,f.r.r...fl .qp.lnotrlult.ile.r!:r gmuJne.sr^d9.r. :, g:ip.Jrt.s.. trp. :.g. p. q, n . f.qj. .r.tl .q'gp. t K'. r li.q Ap. n d 3 g ?. :! o,n {l^ y c't*t)nn r, af mt ua". rrg J',or,"l t, n n ,a \ s ttto lr\r ot no.rr rra.fNrrnO b . gnr>otr 1o, 00 o. n)lnJoo( .r)qr ron cs r$r h il e"+ b'Bo.o.N ,toal gO5n},Par\t\ - JstD*1 q^ro.loton r'Jiirv rt'"'r! a' 4 '/-'- tt ao'EJ vT \e' '' / rr i ;,j'1r ^'I i f'nt.) i-yn ^ i? I'l-l:.*'ai''

description

 

Transcript of หนังสือรับเลขที่ 1890 2557

{d r uc r n r rdr rinivr fl L3n 1 a un ; uu nrTulafi nr rnu tu rt

6rurfiryrfrrr,rl.Jrl.r.:1u'tn?'rnrror.rrunrrflo.rri'unnrililnon.ri'flfl0:;nnrorfirtnof nri.rfi 13 (cDiC

fi.rfrruuurfrrr 1. CDlC201-4 Agenda

uflorfrrflLSlivrnunfiu ud'nrlofn 6ilLlofn,irfi'Fr rilu{nflduuuunv?eiloonln16n{fiudrnrfl"lu{ru

iott.l" fi r{nrlpr fl drfnrufizuur4vr fl r fi r 6 mi

uunyuyrnrTulnfirrvirrrfi (6,tilx.)milrilurieflrrunrnrig nlFr[0ntultnvuilot.lrunixilrvtuntrvu'jrt4'ufi 3o-Et

.1.t.^- 255? * #.ru drnrn"lu'rrut6'finrr{nr

d'llurnrt'1fr'fi'r{o "The Next Generation of Cybersecurity Intelligence: Protecting our nation against

cybe r th reats" lnfl fi ilunv tds or ntl uo ndra uuuLfr'rfl Fi v

6o3<qIdv^^.q-g-.^-.^^^y--'vitut0n16us.t tnrrrLorrtuufiruyiru r{rtt.lru CDlC2O14lu{uttnvtQnrd'lnairr vlfoltElltl.tqn rLo.tlSuvt

nunRu r urnyjrufinQrililry6rri-[flltN,t'tu tLnrudQflmorilulndTorud'lndr-lr:lndnolilHrfr finfl4nr qan

(fi'n) email : [email protected] nlnlu{ufi zs ntnt.^u *.^. z -

2971-8000 n1o 369 r,lSo 084-438-7308

tletq I

[?0.r

20r4\

Best regards & Thank you very much,

Sinsupa Kusol

finfl4nr qnn

Sales Executive

KANOKSIN EXPORT IMPORT CO.,LTD.

162 Kanoksin Building, Ramintra,

Anusaowaree, Bangkhean, Bangkok tO22O

Office :+662-97L-8000#369

rt rru ridr,*rsnrt drfintifl r,:i5 nrr

,?l ;q.9.,tr*nb d r,:gb. h.:. gl? h t-tqt

ti.ti.txp.l,f.r.r...fl .qp.lnotrlult.ile.r!:rgmuJne.sr^d9.r. :, g:ip.Jrt.s.. trp. :.g. p.q, n . f.qj. .r.tl .q'gp. t K'. r li.q Ap. n d 3 g ?. :! o,n

{l^ y c't*t)nn r, af mt ua". rrg J',or,"l t, n n,a \

s ttto lr\r ot no.rr rra.fNrrnO

b . gnr>otr 1o, 00 o. n)lnJoo(

.r)qr ron cs r$r h il

e"+b'Bo.o.N

,toal gO5n},Par\t\

- JstD*1 q^ro.loton r'Jiirv rt'"'r! a'

4'/-'- tt ao'EJvT \e''' / rr i

;,j'1r ^'I i f'nt.) i-yn ^

i?

I'l-l:.*'ai''

SYBTR IItfEil$T IilITIRTIUT GO}I]TRTIICT

ffiffiWffic3OIqBAtGtt0lt lllrlnllAll0llfl. TRnrE a IXlllBlll0ll ctlllRt tBlrIGI

f uly S0-31 ,2014

tn:

f;nnr:luournnuo:nrtuscufionrnS1la:tanuuiuqdttuu tublic-Privole Portnership

iuds:rr-rn1nu rirEJnoods:aunrgnfouriru14druronrs, runqCI6"rHns$uuottJciltoj

ds:rnn'lnEJ nruro6uua diuor Julru:uiuSnrss:tiua:drnsdu{,ia:tun'Jntntonuu

sSnurnrrudun:LJaond€Jdtulutuosltrilutfr "Cyber

[o:dntsuntuVJ rlruqsr:nu itqnru lu1ru:qndrnroonrsns:fi r0nrfr s:riunou0tnoS tta: usu.it.oruqsnssun'

rqnruJ ?uXr u.qndrnroolurt:or:nryu]q, tl,sy.ila: ursu.31,o3uqsnssunl JolaRnsouna u't1uL

;unrsnrtutjunrtJaaodalutuoSttri:utfr

seouriiy 2020"

rirucirs:cirundJraurqnrsRru:nssunl[Htotionol Cyber Securily Committee: NCSC]

08:30

08:45

Cyber Defense Inltlotive/^nla^tn1/4

3oth July, 2014Welcome Speech:r narrciousuanrsduuul cDlc2014

fr n n t :?u ou t n n u o: n:t uiir u il on t nSlt t a: t on u uiu q U r r u uPublic-Privote Portnership luds:rnnlnuThe Future Direciion of Public-privote parinership [pppJ in Thoilondg nruroauuJ8 diuol

rfr d',urunrs,'roqna',nnssuuoulnrr:5ds=tnRln€J Iuor.rJnrlrStr.lrSnJ

0pening Rddress:I nar:qunsmLltclnJluduuul cDlc2914 L 1

ilu1n1Jn15UJruU1llUJUnl55nU]R]] UUURJuaO0nUnl U lUlUOSlllliul r|Cybersecurify 2020: The Notionol Hgendog ulJasrJRrul t'lUn]ujlr

q01u3€Jnlsd-tUn:tuuiruurqsnssunl:0t5nnso0na Io:nnrsuntuuJIausa. J

Conference

Kevnote Soeechr riucl0 u nl u rdu.rrra.ncr u fi r nru ni:in qju uhnoou'lauq n?n ri

Risk the Big Picture - Chollenging the Threot to Our Digitol WorldBig Ouesiion * Whol ore the risks lo the security ond privocy of lheinformotion in lhis dioitol world?How con we chollen"ge the threot to the digitol world to sofeguordour informotion? Wheh cqn we siort to toke up this chollenge?

t Professor Edword HumphreysChoir of the lS0/lEC Working Group, SC27 WG1 ConvenorChortered Fellow of the BCS * FBCS CITP, CISM

Founder of the Internotionol Hegister for ISMS Certificotes

Updote Future Trends & Threots:o | | u sILi u r r a: fr n n t :Ju o u I R n d I u Rt r u ti u n : U a oo nu al s a u I n fl R31 u u:u R J

rJ aoo n€J'l u I u o5r ra: I n nfulad arsau I n fl qt n ntrJla n I tpisode I J

Worldwide Informotion Security, Cybersecurity ond FuturelT Trends & Threots 2014-2A15: Direct Experience from EisenhowerFellowships Progromme 51 Doys in USfintanonrt nils:au ntsru ns:cit u lnformotion Securiiy tta: Cybersqc-urity

IIU?RONUURRA"--"-i --r_' -l-

St iunlcruhi:ultu tO5115 r0ojurJs:rnnanslorp5nrfiaritutltnsr:naniuntudiu Cybersgcurity uo.:

Us:rnnlnujrudausurianurlulurr,rosarnarrlnr:Jn srufi.t Fulure lT Trends & Threots frdta-:utttstJu-tJ nrt. 2aw-2o15

r The Cyber Ronge/Cyber Simulolion : PreporingCybersecurily professionols lo detecl, preventond thwqrt cyber oilocks in o reql-world setfing

r fn*Depth Rnolysis, Threot Horizon 2AA-2015:Monoging risks when threots collide ond More

donger from unknown threats

g o.dSryc$ iloutoun

o Privocy, Cybasecvrity ond Power of Infrymotion Shoring

r The Economics of Cybersecurity ond Informolion Seo.dty

r In-Depth Rnolysis, Oboma's Executive Order inCvbersecurilv for Critical Infrosiructure Proteclionond Public Piivcte Portnerships [pppJ colloborofion

CGEIT, CRISC, CISSP, CSSLP, CISR, CISM, CBCI, CFE, SSCP, ITIL EXPCTT V3,

lRCfi: ISMS Leod Rudiior, COBIT 5 Licensed Troiner, [tSCJz Rsion Rdvisory Boord

ISRCR - Bongkok Chopter Committee, ITSMF Thoilond Boord

Thoilond Inforpotion Security flssogioiion [TlSnJ CommitteeiJs:srurra:r!riotir uSu'n ro8a fijsruJa8ufa rIutnos'irrin

l.1....'.',....

I ttutnr:nts{nntsntlufun:Uaocrni€JrruuorFsrufrtn5us:uutngoulcJuoJoJnnsIntegroiion of Next 0enerqiion Security ocross Enterprise Neiworks

t Mr.Timothy Snow, cctrConsulting Systems Engineer (securitylCisco Systems ffPfiC lUong Kong]

O I nSEJU R3t u uJSOUSu ri onrsrrJds u ttdaJdl u nls5nul R31 uiiu n:rjaoodsls:u u rnnlulagarsaut n nq ninr)lT Security For The Twenty First Cenfury

3 Mr.Kennth HeeDirector, iDM Solution SPeciolist0rocle Hsio Pocific

3 I th July, 2014

I n r s | | r\ [l cut{t cir u nlt u d u n J LJ I o ofi s n u n €Jfi ndl u r n u u o: r {uu u du t n nlula 6 n ts I t t t n a : Ua t nsti u q t fr I : ri r f ri 4 ru o I ai ut uIn-depth ond Rdvcnced MolWore Flnclysis for the Enterprise;

You Con Know Whot You Don't Know

t Mr.Bryce Bolond, Vice President/Cr0,flsio Pocific FireEye lnc., Porlnerlink Distribution Co., Ltd.

11:00

rt ilLlJtuuuo-r rnt I rJtuuu tnULilunJ tuuunJuctuLtI rucr t)clull lrlilJ luuurlJrJaonn€Jlu ruoSrra:r n niuhg arsau r n nt n nrla n I Episode | | J

The Future Trends of Informotion Security, Cybersecurity ondInformotion Technology from RSR Conference 2414,Son Froncisco, Colifornio.nru non Ljs:aunrsruns;lt n:t uduuur Cvbersecuritrl s:dulan RSfi Conferencezoil N ns:or u ujsi u I aln rsu u $rdo: r n nfula0?n rlr ?u nrsila;iiu c vber Rttockr{nuarla urbounar nnaruiSnrsf ufi ;:dunnnr udrun:i udun;daanhEiuruoS-il c i -")Lnfirlannra: fnnrr uau f'l

tl Ldfesl Updote: Informr:tion Security, Cybersecurityand lT Trends from HSfi Conference 2014, Ssn Frcncisco.

o The New Bllsck Vector on your Privocy: When YourSmort TVs Could Rllow Remoie Spying

3 o.dSqcgr Houroun

LunchI rulnrtunrsrnsEJUoJnnslunrsrit:qrnniuiad Cloud otjt:daondu

Tronsforming your 0ffice to secured Cloud_')3 4CUUqUln r1n31i

Security Solutionrnaa no5dorsrju [ds:rnnlnoJ'lrrin

* Sn In-depih lmplementotion of 20 Criticol SecurilConirols from The Council on Cybersecurity

o World's Intelligence Crisis, Edword Snowden'sN5fi leoks: The Changing Threots Londscopefrom fiPT to lnsider Threais: How to monogeInsider Threats in your Orgonizclion

CGTIT, CRISC, CISSP, CSSLP, CISR, CISM, CBCI, CFE, SSCP, ITIL EXPCT1 V3,

lRCfi: ISMS Leod fiuditor, C0BIT 5 Licensed Troiner, [lSC]' Rsion fidvisory BoordISRCR - Bongkok Chopter Committee, ITSMF Thoilond BoordThoilond Informalion Securily Rssociotion IftSnJ Committeeds:srurra:uinon: uS$n roSa fusrujariuUa rfi utnoS'itrin

uuriufi u n nnt utt n Sunplv choi n [J runt?uour nno u?ndii o:nnsol't't:no'hifi: nrsT-nrnsguing:i$i:rlu1ruuoing nuiurLdoso:$unrsrirrrr)rqqnrrri.tn:ruUun:Uaonn€,lutuoSotlt:tfrustJttuutta:ulun-ut5o:stltta:ldunt.lqnludrrEruoJnlsuJfr uu;-aruuo:utnslrudr urnnlula€rarsautnRnrsait.trirs:llo:iiuo.rrinscrnd€rlutuos l ut nlJtta:tUttuunrsiuilonufiiiutuoSri'r : ri r?ri o: d n sdr u'r s n d r I tl u gs fi r'l d od r : ci o I ri o:

-qnsRransrra:5iruutntsdtu nrt udu n:daoonu'lurr;asua:rJs:tnno-:n qurr'a : d s: r n n a n sq ot u S nt t [l cr u u t d o J'{ 5 J a : t ff o ula n r ii o u nr d r ur qlSl o r u i S

?unrsfi ra:ns tia:nts5uriotiu'l naursnltlu'Li?rirSo:irudnciolj rirlu{.:rflurri uriurra:rnnlulad?crr:d:uo.tn ns'lt\u$audtuSuril.ltJs:auntsnitta:| | u 3 n o d r u n"r s U o : n- u da 4 n n I u ri u q u ur al u t u o s s : ct- u tJ s : t n n

13:30

3oth July, 20147 naq n SnrsuSnts{o nrsquB LJfl Ufi nls s 0C oEjt:[ttJs:6n Sn] u7 Stroiegies io set up o successful SOC [securiiy 0perotions CentreJ

t Mr.Vinod VosudevonC00, Polodion Networks

14:00cr.:-:o Ins:aSr :.,'tI u Il u u oJ n0 H ut u I tl os o J 5u nt s dt r t zir 4q n u n : n:l u d u n J

UAOONB IUIUOSOgIJINUSUIIUU

The Legol Frqmework for Prouctive Cybersecurity Defense

& cls.uss€J: rfi:dru:EJor r t sd nr R 5 ul5 Ff I n ss u R o u fi r t n oi R ru : J fi 3 n ss u nt a n 5

-l u]r a: n sni u Htl n€,rdu

08:45

t5uJ5 rJriruil lJqlf lJ lutl lls'{ouJl I lsuJeluu,d luuuJU ltls: lutl lull lllluliiudrsau I n fi rnsriiJo:n u o: nnsqrnn-s'lu r uoSThe lntegroted Fromeworks ond Success Story of COB|T5Progmotic lmplementotion in Thqilond

g o.ritu;a Rssu:SnU14 dr uru nrs uJr u r n nlulad a1 s au r n fi | | a: nr s d o a t sdrdnrunru:nssunrsritr\unatondnnSuatta:narQna-nn5nr€J In.a.n.]

Refreshment & Networking Breok

o || u3 n1J||a:sdrr u uln u1u nts5u fi onurislu ru oSriq:rirlrio: nnsat u1sn-\. -l

o1 | u u ssn't lo oul Jnolu oJ

Driving Cyber Resilience: Building o Defense Strotegy thot Works

t 4ru5aan oulnuna- ujtcrnrsdtrunaqnf rnhlulaoarsaurnnuSt}n Unn.{tnn [untuu]

1l unsflt6n6rra:iiruurnrsJunrsrlruutqnsFlraosdtunrtutiun:daonn€iuruo5uo:tJs:tnrtI

d:nqurra:anSloruSntThe fvolution of the UK ond US Cybersecurity Strotegy

g o.LJ5ryoJt HoutouncGElT, CRISC, CISSP, CSSLP, Clsft, CISM, CBCI, CFt, SSCP, lTlL Expert V3,

lRCfi: ISMS Leod fluditor, C0BIT 5 Licensed Troiner

[tSCJ, Rsion ffdvisory Bocrd, ISRCR - Bongkok Chopter CommitteeITSMF Thoilond BoordThoilond Inforpotion Security Rssqciotion (TlSRl-Committee

uls:sr utra:{rioti: uSu-n r oI a ItJsruJ adu Ua r 6 u r no5 4r rin

Slth July , 2014| |

-rl o r rxu tdo:rs: a:t fr ouh n t ii ou nt dt uniSlu I u oSJu ntsfi t at nst u

The Reol world stote*sponsored cyber Espionoge ond MilitoryCyber Inlelligence Cose StudY

g ula.n.usstio tfruunoJdr{t nsutn nlulad ar sau rn rt tta,ornt fl natll uns:nsl:narlnu

16.,45

09:4509:15 r rnnfuladFrriuaUt,dtnsunsrq{utta:ijo:du Rdvonced Molwore

Rdvonced Molwore Defense SYstem

& 4ru-rf,rigg Qqe;nssunlsu10nlsu5u-n uq8ust'itrict

09:45 | 16J'fij3u5u,ilxJs:aunrs,rurra:rruthnrilunr[Jo:riufiu4nntucitu"lutuo5nuuiuSntss:du4tuo: Hdrsr u nlu tju nts:ciu ut flponeiDiscussion: Notionol Level Cybersecurily Threots Defense, Countermeasuresond Progmotic Controls

g u;a.n.usstto tfr€Junot6r{rnsurnnfqlasarsaulnntta,alnt Rnallnuns:nsunatlnu

g nruo-srsul:d dnsrnusoJt{o1u3Bn1sdrunurrnso:ttri:utfr

a

aI

uJ.n.0.onsuJa n1af,ssru- crc

mor u:u nrsRudrn n)u'laiarsdu rn Ft

dr Un-rr u n rurn ssu nr stl o.lriu rra:dst u tJst unrsqrsnriirurn ILi.r.l.u.J

Moderotoro.USnJnI npurounds:srurra:uiriod:

- "c, , lusun roua lusrujauuua tuutnos ,llnn

Refreshment & Networking Breok

ururiurnnrlntrn:lSnrselns:n"ur:!uutfiJrs:i:ngrRnnru?rinsutni{o: rriorn*Jun:ruusoulunp5uilanupaluruori riarr:S ri4hnruo:nnsuulnSoutud:nuooq'lqu uioun:r6qu$drJunouurnslrquo:iru.rutruunnrtuJun:UaoonEJrnnlulafiarsaurnnJunrsrr Jr u,uoJRnstuJatnsuudrSu0ofi ufialutuo5

lurioiia:?r I s0 / tEc ztoot r:a5riu 2013 rrj6€rurrda:rrdlnu rdutiuodr:lsJrinndo:drnSJnru ririra:rnS€rudr{ndt I s0 / | EC 27001 ifi nuarrins

rtJnnfilunaun 6nt srIruut dnunt urunat ns'l nudrun:r uilu n:daondalo tuoS

uuuJjou't^onr un:iurjun:ulaocinalqruoSuo;o:nnslns:air:,rilu1ruriun :r u dt rirus : n- u ut n U ru n r dt u n :t u u- u n : d a o n n otiu li€i il n fr u o : I ti t fr u

,rlnr in nt itooSrrr rya.uaii:5Ju 4:rir:rirlnnru nralrtrutta:nrssuUonuhslu r uosriu ut nsnt su u 4.tuo: a nt Uunt stlu I n€J

13:30 - 14:00 i

tmilItffiffiffi

14:00 - 14:45

14:45 - 15:30

),t#{,t'rffi

Cyber Defense Initiotive

cDlc20l4

3oth July, 2014c t di uausqnu:prs'l gnlso€jl J I H U oIu s:u ulj H€Jn u:in

...RtuRllonntaonlclVqlue UPS soluiion, Modulorize the future !

I Mr.Dovid TsoicTo (Chief fechnology 0fficer)0f Huowei fnterprise Network Energy Product Line

I Utnsn'lsSu0ouattrS$u?nurra.uu nouJuntsnOUduOJlilooJdnsnnRnnlU" ,u'r,si,iiii;udJl;ti - -

The Next Generation Molwore & Incident Response Proceduresto Sociol Network Threots : Lessons Leqrned from the Front Lineof Defenseg os.ascUuri i::q5nu

qdiurunts dtrinnrtuf un:daonfiudrdn:rurfruulqsnssunl:itFnnsoUnd [o:nnrsuttiou] [auso']qolulunls-:,1,14' uiftJ s: ar u ntsSnut nrt u u-u n: ul a o o nu s:u u n au CIr t n o5 d s:t n n I nu [ | nu t u 5 n ]

O r nS€J u dr 5u rl o riu fi ulu I u o5otu | | uJ u | | u u n n:t u 0 u n: d a on n-s I n RIUIa€J

fl sd u I n fl o: n nss:du tJ s: I n Fl riu | | ur fr n c\t u ntsll Jl I uJ u | | u u n dt u nrl uu-un:daonn-sats6utnRCybersecurity Policy ond lT Sea"rrity Moster Plsn * fi Cnrciql Policy

& Moster Plon to Enhance 0rganizotion's Cybersecurity Copobility* i- c -g 4NnuJflnn nllsru

nt:nfi rrruu nRlununlrudaondun't utnnlula5 arsauInrrnrsluJriJiaru40ni n

Conference www, cdicconference.com

r luriofo:h rso/rEc 2too1j r , 1 ?r'tsunuoulJlslnnnCI0J

Refreshment & Networking Breok

zotl rrjdsurda:rrnlnu

16:45 - '17:30

The Transition to New Revision of lS0/lEC 21oat2A13

a r1ru5g1r flSn5ngdn5urnrsurnslru Sturqntsdrdn:runru:nssuntsrtri:utfl jtdr€jntsSt".tsots:ut"l:tu [runc]Srdn:r uur nslr u udnn-cufi qnat nnssu [auo. ] [lt st J, ns:ns]rqnarHnssu

I uuuoJournndrunluuun:rjaoonuluruoSuo:o:nnsfns:ah:rlu1r u ni,n:r udt fr qs:ou ut fr uo:rJs:tn nl n€J

Ponel : Thoilond Criticol Infrostructure Security:fin tnd-to*E"rd View of Stoie [nterprise Exectrl"ives

* 4ruqafrS sssualsuqurur4irnrs I gsrlrarsautnnla:doatsJnrs luJrijra:un0nrn

g nruarls'lu unslnsqdr uru nrs?qdrilra:r u usnrsrn nlulassrsdutnfiu5un nts0ulnu {trjn luxtuul

I 4ru8;8u riiuufrnSuru{uidt uru nisult r ulruut s:u u.tt u tjs:u n nrirsluJriJtunsna:"r

Moderotorg o.rlu;uS urBu

rudr ursnrsu]tu iidBnutLis$n ra8a hjsrujariuua tsurno6 {rrin

3lth July , 2014r tl n r r [J u n a€J n S nt s rIru u r rJ nu n r uJ u n ar n sl n EJ d t u n I t u u' u n J

rJaonns"luruoiIn*depth ond The Humon Element - Building ThoilcndCybersecurity Ccpability

'3 u.n.o.ryrruua ei:6uu'l€lndurnunrtuuun:daoofi ets:uudtsaulnn[rtsR]

{lllli|itll lllllilllliil l|;lli;l&;

08:45 - 09:15 sV*1,iif'tl1\,t:;1i.!lg;t{i7;si1

:,

::

'.:.

a

t,

it

09:15 - Og.45 ;

09:4b_10:30,e

)

irl

tl.

Ii

ri

t-1 l:r-1- | I Uf RCI | H U r U nrSUSntS'l-O n'ls nlr u 0u n:d aonriu f uot n n sfr rn6qu r rarirt! 1 ,---loualunltununResponsive"Security: Be Reody io Be Securefxplores the chollenges, issu*s, und dilenrnnus of monoging infornrolions*curity risk, ond introduces an oppronch for nddressing concerns frombolh c praotilioner nnd org*nizotioncl rnonogernsnt slcndpoint.

I Dr.Meng-Chow KongCISSP, ClSn, IlSC]? Fsion fidvisory Boord, RRISI Forurn founder

nrsSu ri oriufqslu ru oSriu ut nsntsu'uq:u o: sut ntsl nu

The Molwore Wcr: Flesponding to the Evolution of Blending Httocks

g ns.frnfr fuu:5andq{n nr suJiu nrt u tJaon n-ur n nfulad arsau r n n

surR'rsnEJrnul {trin Iuntuu]

Refreshment & Networking Breck

Cvber Defense Initlotive Conference

cDlc20l4www.cdicconference.com

n$flusul8 nlorndudrunrsllo:riu Network Infrostructure lla:nls Response Cyber Crime

lou5Snrsnrriogar8:6n

3oth July, 2014

08:45

o

a

I

o

to

o

o

o

I

July,2O14Live Show 1: Voice SliffingdmS: rfru.rtS; dnr5: - luiaot dnilJ:ntsaunutnt:lnsriunLive Show 2: ShellGhosi - No One See MeLiIijoni:aunq - nrsrrujtci:tritutuo:ltJsttnsudunsat{I5naaos:uUnsl'l'lu4nuInLive Show 3: ft New Woy to Hock Public Wireless LflNn,a:.:aralStdu - ntsttons:uur41nuSntstnSodtulSataatilsru:Live Show 4: Breoking Cyber Bunkern'r,rlsrnisciru4or\rs - rirsnonsria [oist EncryptionJ rdortrfi; Sofe House uo:togaLive Show 5: Neor Foo Communicotion $ockingrj:?ndri:r{u - ntsuluusouauu Nrc ttuuttuulfraLive Show 6: Rospberry ni - fi Hocker Toy Box [CyUer Criminols Swiss-firmy KnifeJ

inuonnao;or:huo:rronrhoS - SSnrsair:qdnsrurronttuuunut "froo:ls tton'ldtau!"

Refreshment & Networking Breok

Live Show 7: Home Spplionce Hockings:5:! [nudndru - rrjotnSo:]t'lulUtr?udruqniuurtau Internet ?

Live Show 8: Get Inside to Mobile Treosurear qun5u.rtlUu6ohn - ntsttonftJsttnsuu uausnluJullu u n un tddonLive Show 9: Escoping Plon from Digitol's PrisonUnsnrsnHnrlnfrinoa - n.lStlilns:uunru4ufrudnS [nnMJ uuuSntsnar:ciLive Show 10: Public lnfrostructure Threots on the Rise

rqr:s:uuSnr0o: * ntst&Sns:uuar stsqdlnntlu ulSnr:Uodu

g RCIS Technicgl Teom tlrnuloq o.UugS ur8uui 6r uru nrs rijr€J ri d3n ur, uS$n to8 a ltjst rrja u'u da rfr ur n o5 {r rTn

Cyber Defense Initiolive Confsr€nce

cDrc20l 4

30 - 17:30 | Defensive Cybersecurily C-hollenge Workshop

@!;:iJ#aTffii#:[\l}iJY'',::?J'Tx!3ll,'l,Hfil.'*.oufr-|ciurns1tulta:55nts[Jo:r\u

3 I th July, 2014

Cybercrime Intelligent InvesiigotiBn Teqhnjqu,es Workshop [tlfJ ,,

n r :"a n 3 -s

n r s n r t o U A | | a : n r s I I r :s : u u I u t n u fr il I fr o r 5 or dr 16 J u 1'1 "l n

rnnntsruta0ou'lsiuntsltu.]Uu Hockinq Contest ut0tiunouoei i : a : r drr cr u 5 o u n t n d f d fr ii ar u r s n ri rl tJ d s :q n n?81 di s :g o.iusua :Jrlod€J

clssP, CIlnc, GCFR, sscr, rlcsn, clEH, cNE6, security+, Network+, ccNffSnur ns /uit8€nui aJ uJr€.ruSntsilJnousuusun rdai frJsrujauuua ruurnos lrno

l[luradHuo:.rru cDlc ?unaonduaruiJduiruur lnu Live show fiot[luur:lc'lanuo.ruratiunao.tuotnuduuurlunnij iuU[fr unu RclS Beseorch

LHB rra: H c I s Hed teo m I ci5tassn urailului iulu5uorri rir urnuuli]ci?u Gooole n3a YouTub" rirlrt ntnucit0ufruluidnu:ru ncts tiliqriti u?n ri r ri orr a cufuiiu :r u 0 r ri or r uJ u riu {r r ri c nt c ln€r t o un

=

3l th

www.cdicconference.com