หนังสือรับเลขที่ 1890 2557
Post on 01-Apr-2016
229 Views
Preview:
DESCRIPTION
TRANSCRIPT
{d r uc r n r rdr rinivr fl L3n 1 a un ; uu nrTulafi nr rnu tu rt
6rurfiryrfrrr,rl.Jrl.r.:1u'tn?'rnrror.rrunrrflo.rri'unnrililnon.ri'flfl0:;nnrorfirtnof nri.rfi 13 (cDiC
fi.rfrruuurfrrr 1. CDlC201-4 Agenda
uflorfrrflLSlivrnunfiu ud'nrlofn 6ilLlofn,irfi'Fr rilu{nflduuuunv?eiloonln16n{fiudrnrfl"lu{ru
iott.l" fi r{nrlpr fl drfnrufizuur4vr fl r fi r 6 mi
uunyuyrnrTulnfirrvirrrfi (6,tilx.)milrilurieflrrunrnrig nlFr[0ntultnvuilot.lrunixilrvtuntrvu'jrt4'ufi 3o-Et
.1.t.^- 255? * #.ru drnrn"lu'rrut6'finrr{nr
d'llurnrt'1fr'fi'r{o "The Next Generation of Cybersecurity Intelligence: Protecting our nation against
cybe r th reats" lnfl fi ilunv tds or ntl uo ndra uuuLfr'rfl Fi v
6o3<qIdv^^.q-g-.^-.^^^y--'vitut0n16us.t tnrrrLorrtuufiruyiru r{rtt.lru CDlC2O14lu{uttnvtQnrd'lnairr vlfoltElltl.tqn rLo.tlSuvt
nunRu r urnyjrufinQrililry6rri-[flltN,t'tu tLnrudQflmorilulndTorud'lndr-lr:lndnolilHrfr finfl4nr qan
(fi'n) email : sinsupa@kanoksin.com nlnlu{ufi zs ntnt.^u *.^. z -
2971-8000 n1o 369 r,lSo 084-438-7308
tletq I
[?0.r
20r4\
Best regards & Thank you very much,
Sinsupa Kusol
finfl4nr qnn
Sales Executive
KANOKSIN EXPORT IMPORT CO.,LTD.
162 Kanoksin Building, Ramintra,
Anusaowaree, Bangkhean, Bangkok tO22O
Office :+662-97L-8000#369
rt rru ridr,*rsnrt drfintifl r,:i5 nrr
,?l ;q.9.,tr*nb d r,:gb. h.:. gl? h t-tqt
ti.ti.txp.l,f.r.r...fl .qp.lnotrlult.ile.r!:rgmuJne.sr^d9.r. :, g:ip.Jrt.s.. trp. :.g. p.q, n . f.qj. .r.tl .q'gp. t K'. r li.q Ap. n d 3 g ?. :! o,n
{l^ y c't*t)nn r, af mt ua". rrg J',or,"l t, n n,a \
s ttto lr\r ot no.rr rra.fNrrnO
b . gnr>otr 1o, 00 o. n)lnJoo(
.r)qr ron cs r$r h il
e"+b'Bo.o.N
,toal gO5n},Par\t\
- JstD*1 q^ro.loton r'Jiirv rt'"'r! a'
4'/-'- tt ao'EJvT \e''' / rr i
;,j'1r ^'I i f'nt.) i-yn ^
i?
I'l-l:.*'ai''
SYBTR IItfEil$T IilITIRTIUT GO}I]TRTIICT
ffiffiWffic3OIqBAtGtt0lt lllrlnllAll0llfl. TRnrE a IXlllBlll0ll ctlllRt tBlrIGI
f uly S0-31 ,2014
tn:
f;nnr:luournnuo:nrtuscufionrnS1la:tanuuiuqdttuu tublic-Privole Portnership
iuds:rr-rn1nu rirEJnoods:aunrgnfouriru14druronrs, runqCI6"rHns$uuottJciltoj
ds:rnn'lnEJ nruro6uua diuor Julru:uiuSnrss:tiua:drnsdu{,ia:tun'Jntntonuu
sSnurnrrudun:LJaond€Jdtulutuosltrilutfr "Cyber
[o:dntsuntuVJ rlruqsr:nu itqnru lu1ru:qndrnroonrsns:fi r0nrfr s:riunou0tnoS tta: usu.it.oruqsnssun'
rqnruJ ?uXr u.qndrnroolurt:or:nryu]q, tl,sy.ila: ursu.31,o3uqsnssunl JolaRnsouna u't1uL
;unrsnrtutjunrtJaaodalutuoSttri:utfr
seouriiy 2020"
rirucirs:cirundJraurqnrsRru:nssunl[Htotionol Cyber Securily Committee: NCSC]
08:30
08:45
Cyber Defense Inltlotive/^nla^tn1/4
3oth July, 2014Welcome Speech:r narrciousuanrsduuul cDlc2014
fr n n t :?u ou t n n u o: n:t uiir u il on t nSlt t a: t on u uiu q U r r u uPublic-Privote Portnership luds:rnnlnuThe Future Direciion of Public-privote parinership [pppJ in Thoilondg nruroauuJ8 diuol
rfr d',urunrs,'roqna',nnssuuoulnrr:5ds=tnRln€J Iuor.rJnrlrStr.lrSnJ
0pening Rddress:I nar:qunsmLltclnJluduuul cDlc2914 L 1
ilu1n1Jn15UJruU1llUJUnl55nU]R]] UUURJuaO0nUnl U lUlUOSlllliul r|Cybersecurify 2020: The Notionol Hgendog ulJasrJRrul t'lUn]ujlr
q01u3€Jnlsd-tUn:tuuiruurqsnssunl:0t5nnso0na Io:nnrsuntuuJIausa. J
Conference
Kevnote Soeechr riucl0 u nl u rdu.rrra.ncr u fi r nru ni:in qju uhnoou'lauq n?n ri
Risk the Big Picture - Chollenging the Threot to Our Digitol WorldBig Ouesiion * Whol ore the risks lo the security ond privocy of lheinformotion in lhis dioitol world?How con we chollen"ge the threot to the digitol world to sofeguordour informotion? Wheh cqn we siort to toke up this chollenge?
t Professor Edword HumphreysChoir of the lS0/lEC Working Group, SC27 WG1 ConvenorChortered Fellow of the BCS * FBCS CITP, CISM
Founder of the Internotionol Hegister for ISMS Certificotes
Updote Future Trends & Threots:o | | u sILi u r r a: fr n n t :Ju o u I R n d I u Rt r u ti u n : U a oo nu al s a u I n fl R31 u u:u R J
rJ aoo n€J'l u I u o5r ra: I n nfulad arsau I n fl qt n ntrJla n I tpisode I J
Worldwide Informotion Security, Cybersecurity ond FuturelT Trends & Threots 2014-2A15: Direct Experience from EisenhowerFellowships Progromme 51 Doys in USfintanonrt nils:au ntsru ns:cit u lnformotion Securiiy tta: Cybersqc-urity
IIU?RONUURRA"--"-i --r_' -l-
St iunlcruhi:ultu tO5115 r0ojurJs:rnnanslorp5nrfiaritutltnsr:naniuntudiu Cybersgcurity uo.:
Us:rnnlnujrudausurianurlulurr,rosarnarrlnr:Jn srufi.t Fulure lT Trends & Threots frdta-:utttstJu-tJ nrt. 2aw-2o15
r The Cyber Ronge/Cyber Simulolion : PreporingCybersecurily professionols lo detecl, preventond thwqrt cyber oilocks in o reql-world setfing
r fn*Depth Rnolysis, Threot Horizon 2AA-2015:Monoging risks when threots collide ond More
donger from unknown threats
g o.dSryc$ iloutoun
o Privocy, Cybasecvrity ond Power of Infrymotion Shoring
r The Economics of Cybersecurity ond Informolion Seo.dty
r In-Depth Rnolysis, Oboma's Executive Order inCvbersecurilv for Critical Infrosiructure Proteclionond Public Piivcte Portnerships [pppJ colloborofion
CGEIT, CRISC, CISSP, CSSLP, CISR, CISM, CBCI, CFE, SSCP, ITIL EXPCTT V3,
lRCfi: ISMS Leod Rudiior, COBIT 5 Licensed Troiner, [tSCJz Rsion Rdvisory Boord
ISRCR - Bongkok Chopter Committee, ITSMF Thoilond Boord
Thoilond Inforpotion Security flssogioiion [TlSnJ CommitteeiJs:srurra:r!riotir uSu'n ro8a fijsruJa8ufa rIutnos'irrin
l.1....'.',....
I ttutnr:nts{nntsntlufun:Uaocrni€JrruuorFsrufrtn5us:uutngoulcJuoJoJnnsIntegroiion of Next 0enerqiion Security ocross Enterprise Neiworks
t Mr.Timothy Snow, cctrConsulting Systems Engineer (securitylCisco Systems ffPfiC lUong Kong]
O I nSEJU R3t u uJSOUSu ri onrsrrJds u ttdaJdl u nls5nul R31 uiiu n:rjaoodsls:u u rnnlulagarsaut n nq ninr)lT Security For The Twenty First Cenfury
3 Mr.Kennth HeeDirector, iDM Solution SPeciolist0rocle Hsio Pocific
3 I th July, 2014
I n r s | | r\ [l cut{t cir u nlt u d u n J LJ I o ofi s n u n €Jfi ndl u r n u u o: r {uu u du t n nlula 6 n ts I t t t n a : Ua t nsti u q t fr I : ri r f ri 4 ru o I ai ut uIn-depth ond Rdvcnced MolWore Flnclysis for the Enterprise;
You Con Know Whot You Don't Know
t Mr.Bryce Bolond, Vice President/Cr0,flsio Pocific FireEye lnc., Porlnerlink Distribution Co., Ltd.
11:00
rt ilLlJtuuuo-r rnt I rJtuuu tnULilunJ tuuunJuctuLtI rucr t)clull lrlilJ luuurlJrJaonn€Jlu ruoSrra:r n niuhg arsau r n nt n nrla n I Episode | | J
The Future Trends of Informotion Security, Cybersecurity ondInformotion Technology from RSR Conference 2414,Son Froncisco, Colifornio.nru non Ljs:aunrsruns;lt n:t uduuur Cvbersecuritrl s:dulan RSfi Conferencezoil N ns:or u ujsi u I aln rsu u $rdo: r n nfula0?n rlr ?u nrsila;iiu c vber Rttockr{nuarla urbounar nnaruiSnrsf ufi ;:dunnnr udrun:i udun;daanhEiuruoS-il c i -")Lnfirlannra: fnnrr uau f'l
tl Ldfesl Updote: Informr:tion Security, Cybersecurityand lT Trends from HSfi Conference 2014, Ssn Frcncisco.
o The New Bllsck Vector on your Privocy: When YourSmort TVs Could Rllow Remoie Spying
3 o.dSqcgr Houroun
LunchI rulnrtunrsrnsEJUoJnnslunrsrit:qrnniuiad Cloud otjt:daondu
Tronsforming your 0ffice to secured Cloud_')3 4CUUqUln r1n31i
Security Solutionrnaa no5dorsrju [ds:rnnlnoJ'lrrin
* Sn In-depih lmplementotion of 20 Criticol SecurilConirols from The Council on Cybersecurity
o World's Intelligence Crisis, Edword Snowden'sN5fi leoks: The Changing Threots Londscopefrom fiPT to lnsider Threais: How to monogeInsider Threats in your Orgonizclion
CGTIT, CRISC, CISSP, CSSLP, CISR, CISM, CBCI, CFE, SSCP, ITIL EXPCT1 V3,
lRCfi: ISMS Leod fiuditor, C0BIT 5 Licensed Troiner, [lSC]' Rsion fidvisory BoordISRCR - Bongkok Chopter Committee, ITSMF Thoilond BoordThoilond Informalion Securily Rssociotion IftSnJ Committeeds:srurra:uinon: uS$n roSa fusrujariuUa rfi utnoS'itrin
uuriufi u n nnt utt n Sunplv choi n [J runt?uour nno u?ndii o:nnsol't't:no'hifi: nrsT-nrnsguing:i$i:rlu1ruuoing nuiurLdoso:$unrsrirrrr)rqqnrrri.tn:ruUun:Uaonn€,lutuoSotlt:tfrustJttuutta:ulun-ut5o:stltta:ldunt.lqnludrrEruoJnlsuJfr uu;-aruuo:utnslrudr urnnlula€rarsautnRnrsait.trirs:llo:iiuo.rrinscrnd€rlutuos l ut nlJtta:tUttuunrsiuilonufiiiutuoSri'r : ri r?ri o: d n sdr u'r s n d r I tl u gs fi r'l d od r : ci o I ri o:
-qnsRransrra:5iruutntsdtu nrt udu n:daoonu'lurr;asua:rJs:tnno-:n qurr'a : d s: r n n a n sq ot u S nt t [l cr u u t d o J'{ 5 J a : t ff o ula n r ii o u nr d r ur qlSl o r u i S
?unrsfi ra:ns tia:nts5uriotiu'l naursnltlu'Li?rirSo:irudnciolj rirlu{.:rflurri uriurra:rnnlulad?crr:d:uo.tn ns'lt\u$audtuSuril.ltJs:auntsnitta:| | u 3 n o d r u n"r s U o : n- u da 4 n n I u ri u q u ur al u t u o s s : ct- u tJ s : t n n
13:30
3oth July, 20147 naq n SnrsuSnts{o nrsquB LJfl Ufi nls s 0C oEjt:[ttJs:6n Sn] u7 Stroiegies io set up o successful SOC [securiiy 0perotions CentreJ
t Mr.Vinod VosudevonC00, Polodion Networks
14:00cr.:-:o Ins:aSr :.,'tI u Il u u oJ n0 H ut u I tl os o J 5u nt s dt r t zir 4q n u n : n:l u d u n J
UAOONB IUIUOSOgIJINUSUIIUU
The Legol Frqmework for Prouctive Cybersecurity Defense
& cls.uss€J: rfi:dru:EJor r t sd nr R 5 ul5 Ff I n ss u R o u fi r t n oi R ru : J fi 3 n ss u nt a n 5
-l u]r a: n sni u Htl n€,rdu
08:45
t5uJ5 rJriruil lJqlf lJ lutl lls'{ouJl I lsuJeluu,d luuuJU ltls: lutl lull lllluliiudrsau I n fi rnsriiJo:n u o: nnsqrnn-s'lu r uoSThe lntegroted Fromeworks ond Success Story of COB|T5Progmotic lmplementotion in Thqilond
g o.ritu;a Rssu:SnU14 dr uru nrs uJr u r n nlulad a1 s au r n fi | | a: nr s d o a t sdrdnrunru:nssunrsritr\unatondnnSuatta:narQna-nn5nr€J In.a.n.]
Refreshment & Networking Breok
o || u3 n1J||a:sdrr u uln u1u nts5u fi onurislu ru oSriq:rirlrio: nnsat u1sn-\. -l
o1 | u u ssn't lo oul Jnolu oJ
Driving Cyber Resilience: Building o Defense Strotegy thot Works
t 4ru5aan oulnuna- ujtcrnrsdtrunaqnf rnhlulaoarsaurnnuSt}n Unn.{tnn [untuu]
1l unsflt6n6rra:iiruurnrsJunrsrlruutqnsFlraosdtunrtutiun:daonn€iuruo5uo:tJs:tnrtI
d:nqurra:anSloruSntThe fvolution of the UK ond US Cybersecurity Strotegy
g o.LJ5ryoJt HoutouncGElT, CRISC, CISSP, CSSLP, Clsft, CISM, CBCI, CFt, SSCP, lTlL Expert V3,
lRCfi: ISMS Leod fluditor, C0BIT 5 Licensed Troiner
[tSCJ, Rsion ffdvisory Bocrd, ISRCR - Bongkok Chopter CommitteeITSMF Thoilond BoordThoilond Inforpotion Security Rssqciotion (TlSRl-Committee
uls:sr utra:{rioti: uSu-n r oI a ItJsruJ adu Ua r 6 u r no5 4r rin
Slth July , 2014| |
-rl o r rxu tdo:rs: a:t fr ouh n t ii ou nt dt uniSlu I u oSJu ntsfi t at nst u
The Reol world stote*sponsored cyber Espionoge ond MilitoryCyber Inlelligence Cose StudY
g ula.n.usstio tfruunoJdr{t nsutn nlulad ar sau rn rt tta,ornt fl natll uns:nsl:narlnu
16.,45
09:4509:15 r rnnfuladFrriuaUt,dtnsunsrq{utta:ijo:du Rdvonced Molwore
Rdvonced Molwore Defense SYstem
& 4ru-rf,rigg Qqe;nssunlsu10nlsu5u-n uq8ust'itrict
09:45 | 16J'fij3u5u,ilxJs:aunrs,rurra:rruthnrilunr[Jo:riufiu4nntucitu"lutuo5nuuiuSntss:du4tuo: Hdrsr u nlu tju nts:ciu ut flponeiDiscussion: Notionol Level Cybersecurily Threots Defense, Countermeasuresond Progmotic Controls
g u;a.n.usstto tfr€Junot6r{rnsurnnfqlasarsaulnntta,alnt Rnallnuns:nsunatlnu
g nruo-srsul:d dnsrnusoJt{o1u3Bn1sdrunurrnso:ttri:utfr
a
aI
uJ.n.0.onsuJa n1af,ssru- crc
mor u:u nrsRudrn n)u'laiarsdu rn Ft
dr Un-rr u n rurn ssu nr stl o.lriu rra:dst u tJst unrsqrsnriirurn ILi.r.l.u.J
Moderotoro.USnJnI npurounds:srurra:uiriod:
- "c, , lusun roua lusrujauuua tuutnos ,llnn
Refreshment & Networking Breok
ururiurnnrlntrn:lSnrselns:n"ur:!uutfiJrs:i:ngrRnnru?rinsutni{o: rriorn*Jun:ruusoulunp5uilanupaluruori riarr:S ri4hnruo:nnsuulnSoutud:nuooq'lqu uioun:r6qu$drJunouurnslrquo:iru.rutruunnrtuJun:UaoonEJrnnlulafiarsaurnnJunrsrr Jr u,uoJRnstuJatnsuudrSu0ofi ufialutuo5
lurioiia:?r I s0 / tEc ztoot r:a5riu 2013 rrj6€rurrda:rrdlnu rdutiuodr:lsJrinndo:drnSJnru ririra:rnS€rudr{ndt I s0 / | EC 27001 ifi nuarrins
rtJnnfilunaun 6nt srIruut dnunt urunat ns'l nudrun:r uilu n:daondalo tuoS
uuuJjou't^onr un:iurjun:ulaocinalqruoSuo;o:nnslns:air:,rilu1ruriun :r u dt rirus : n- u ut n U ru n r dt u n :t u u- u n : d a o n n otiu li€i il n fr u o : I ti t fr u
,rlnr in nt itooSrrr rya.uaii:5Ju 4:rir:rirlnnru nralrtrutta:nrssuUonuhslu r uosriu ut nsnt su u 4.tuo: a nt Uunt stlu I n€J
13:30 - 14:00 i
tmilItffiffiffi
14:00 - 14:45
14:45 - 15:30
),t#{,t'rffi
Cyber Defense Initiotive
cDlc20l4
3oth July, 2014c t di uausqnu:prs'l gnlso€jl J I H U oIu s:u ulj H€Jn u:in
...RtuRllonntaonlclVqlue UPS soluiion, Modulorize the future !
I Mr.Dovid TsoicTo (Chief fechnology 0fficer)0f Huowei fnterprise Network Energy Product Line
I Utnsn'lsSu0ouattrS$u?nurra.uu nouJuntsnOUduOJlilooJdnsnnRnnlU" ,u'r,si,iiii;udJl;ti - -
The Next Generation Molwore & Incident Response Proceduresto Sociol Network Threots : Lessons Leqrned from the Front Lineof Defenseg os.ascUuri i::q5nu
qdiurunts dtrinnrtuf un:daonfiudrdn:rurfruulqsnssunl:itFnnsoUnd [o:nnrsuttiou] [auso']qolulunls-:,1,14' uiftJ s: ar u ntsSnut nrt u u-u n: ul a o o nu s:u u n au CIr t n o5 d s:t n n I nu [ | nu t u 5 n ]
O r nS€J u dr 5u rl o riu fi ulu I u o5otu | | uJ u | | u u n n:t u 0 u n: d a on n-s I n RIUIa€J
fl sd u I n fl o: n nss:du tJ s: I n Fl riu | | ur fr n c\t u ntsll Jl I uJ u | | u u n dt u nrl uu-un:daonn-sats6utnRCybersecurity Policy ond lT Sea"rrity Moster Plsn * fi Cnrciql Policy
& Moster Plon to Enhance 0rganizotion's Cybersecurity Copobility* i- c -g 4NnuJflnn nllsru
nt:nfi rrruu nRlununlrudaondun't utnnlula5 arsauInrrnrsluJriJiaru40ni n
Conference www, cdicconference.com
r luriofo:h rso/rEc 2too1j r , 1 ?r'tsunuoulJlslnnnCI0J
Refreshment & Networking Breok
zotl rrjdsurda:rrnlnu
16:45 - '17:30
The Transition to New Revision of lS0/lEC 21oat2A13
a r1ru5g1r flSn5ngdn5urnrsurnslru Sturqntsdrdn:runru:nssuntsrtri:utfl jtdr€jntsSt".tsots:ut"l:tu [runc]Srdn:r uur nslr u udnn-cufi qnat nnssu [auo. ] [lt st J, ns:ns]rqnarHnssu
I uuuoJournndrunluuun:rjaoonuluruoSuo:o:nnsfns:ah:rlu1r u ni,n:r udt fr qs:ou ut fr uo:rJs:tn nl n€J
Ponel : Thoilond Criticol Infrostructure Security:fin tnd-to*E"rd View of Stoie [nterprise Exectrl"ives
* 4ruqafrS sssualsuqurur4irnrs I gsrlrarsautnnla:doatsJnrs luJrijra:un0nrn
g nruarls'lu unslnsqdr uru nrs?qdrilra:r u usnrsrn nlulassrsdutnfiu5un nts0ulnu {trjn luxtuul
I 4ru8;8u riiuufrnSuru{uidt uru nisult r ulruut s:u u.tt u tjs:u n nrirsluJriJtunsna:"r
Moderotorg o.rlu;uS urBu
rudr ursnrsu]tu iidBnutLis$n ra8a hjsrujariuua tsurno6 {rrin
3lth July , 2014r tl n r r [J u n a€J n S nt s rIru u r rJ nu n r uJ u n ar n sl n EJ d t u n I t u u' u n J
rJaonns"luruoiIn*depth ond The Humon Element - Building ThoilcndCybersecurity Ccpability
'3 u.n.o.ryrruua ei:6uu'l€lndurnunrtuuun:daoofi ets:uudtsaulnn[rtsR]
{lllli|itll lllllilllliil l|;lli;l&;
08:45 - 09:15 sV*1,iif'tl1\,t:;1i.!lg;t{i7;si1
:,
::
'.:.
a
t,
it
09:15 - Og.45 ;
09:4b_10:30,e
)
irl
tl.
Ii
ri
t-1 l:r-1- | I Uf RCI | H U r U nrSUSntS'l-O n'ls nlr u 0u n:d aonriu f uot n n sfr rn6qu r rarirt! 1 ,---loualunltununResponsive"Security: Be Reody io Be Securefxplores the chollenges, issu*s, und dilenrnnus of monoging infornrolions*curity risk, ond introduces an oppronch for nddressing concerns frombolh c praotilioner nnd org*nizotioncl rnonogernsnt slcndpoint.
I Dr.Meng-Chow KongCISSP, ClSn, IlSC]? Fsion fidvisory Boord, RRISI Forurn founder
nrsSu ri oriufqslu ru oSriu ut nsntsu'uq:u o: sut ntsl nu
The Molwore Wcr: Flesponding to the Evolution of Blending Httocks
g ns.frnfr fuu:5andq{n nr suJiu nrt u tJaon n-ur n nfulad arsau r n n
surR'rsnEJrnul {trin Iuntuu]
Refreshment & Networking Breck
Cvber Defense Initlotive Conference
cDlc20l4www.cdicconference.com
n$flusul8 nlorndudrunrsllo:riu Network Infrostructure lla:nls Response Cyber Crime
lou5Snrsnrriogar8:6n
3oth July, 2014
08:45
o
a
I
o
to
o
o
o
I
July,2O14Live Show 1: Voice SliffingdmS: rfru.rtS; dnr5: - luiaot dnilJ:ntsaunutnt:lnsriunLive Show 2: ShellGhosi - No One See MeLiIijoni:aunq - nrsrrujtci:tritutuo:ltJsttnsudunsat{I5naaos:uUnsl'l'lu4nuInLive Show 3: ft New Woy to Hock Public Wireless LflNn,a:.:aralStdu - ntsttons:uur41nuSntstnSodtulSataatilsru:Live Show 4: Breoking Cyber Bunkern'r,rlsrnisciru4or\rs - rirsnonsria [oist EncryptionJ rdortrfi; Sofe House uo:togaLive Show 5: Neor Foo Communicotion $ockingrj:?ndri:r{u - ntsuluusouauu Nrc ttuuttuulfraLive Show 6: Rospberry ni - fi Hocker Toy Box [CyUer Criminols Swiss-firmy KnifeJ
inuonnao;or:huo:rronrhoS - SSnrsair:qdnsrurronttuuunut "froo:ls tton'ldtau!"
Refreshment & Networking Breok
Live Show 7: Home Spplionce Hockings:5:! [nudndru - rrjotnSo:]t'lulUtr?udruqniuurtau Internet ?
Live Show 8: Get Inside to Mobile Treosurear qun5u.rtlUu6ohn - ntsttonftJsttnsuu uausnluJullu u n un tddonLive Show 9: Escoping Plon from Digitol's PrisonUnsnrsnHnrlnfrinoa - n.lStlilns:uunru4ufrudnS [nnMJ uuuSntsnar:ciLive Show 10: Public lnfrostructure Threots on the Rise
rqr:s:uuSnr0o: * ntst&Sns:uuar stsqdlnntlu ulSnr:Uodu
g RCIS Technicgl Teom tlrnuloq o.UugS ur8uui 6r uru nrs rijr€J ri d3n ur, uS$n to8 a ltjst rrja u'u da rfr ur n o5 {r rTn
Cyber Defense Initiolive Confsr€nce
cDrc20l 4
30 - 17:30 | Defensive Cybersecurily C-hollenge Workshop
@!;:iJ#aTffii#:[\l}iJY'',::?J'Tx!3ll,'l,Hfil.'*.oufr-|ciurns1tulta:55nts[Jo:r\u
3 I th July, 2014
Cybercrime Intelligent InvesiigotiBn Teqhnjqu,es Workshop [tlfJ ,,
n r :"a n 3 -s
n r s n r t o U A | | a : n r s I I r :s : u u I u t n u fr il I fr o r 5 or dr 16 J u 1'1 "l n
rnnntsruta0ou'lsiuntsltu.]Uu Hockinq Contest ut0tiunouoei i : a : r drr cr u 5 o u n t n d f d fr ii ar u r s n ri rl tJ d s :q n n?81 di s :g o.iusua :Jrlod€J
clssP, CIlnc, GCFR, sscr, rlcsn, clEH, cNE6, security+, Network+, ccNffSnur ns /uit8€nui aJ uJr€.ruSntsilJnousuusun rdai frJsrujauuua ruurnos lrno
l[luradHuo:.rru cDlc ?unaonduaruiJduiruur lnu Live show fiot[luur:lc'lanuo.ruratiunao.tuotnuduuurlunnij iuU[fr unu RclS Beseorch
LHB rra: H c I s Hed teo m I ci5tassn urailului iulu5uorri rir urnuuli]ci?u Gooole n3a YouTub" rirlrt ntnucit0ufruluidnu:ru ncts tiliqriti u?n ri r ri orr a cufuiiu :r u 0 r ri or r uJ u riu {r r ri c nt c ln€r t o un
=
3l th
www.cdicconference.com
top related