There are four featuring topics in HITCON Enterprise 2015:
Security of Things: Security of Thigs is an extension of Internet of Things (IoT). As the IoT industry experiencing intense growth, and will likely be all around us in the future, deeply intertwined with our lives, its security is not something that we can ignore. Convience almost always brought about insecurities, and while expecting the convience brought by IoT, can it really protect our privacy?
Cyber Threat Intelligence: The topic of Cyber Threat Intelligence is getting popular recently, but what exactly is Cyber Threat Intelligence? As it is gaining significance everyday, we should discuss why it matters and how is it applicable to enterprises. Furthermore, discuss how Cyber Threat Intelligence can be used to properly identify the threat when under attack, and thus react and respond appropriately, in order to reduce the losses caused by these attacks.
Cyber Security Crisis Management: There’s no lack of encounters with hackers whether is life or in corporate environment, however, should a cyber security crisis arises, how should we respond to it? Are there any case studies that can be discussed?
Training of Information Security Personnels: How should information security professionals be cultivated from the government standpoint, and how should information security awareness be blended into education? What are the ways of recruiting and locating information security talents for corporations?
Contact
联系人:
telephone:
Security of Things: Security of Thigs is an extension of Internet of Things (IoT). As the IoT industry experiencing intense growth, and will likely be all around us in the future, deeply intertwined with our lives, its security is not something that we can ignore. Convience almost always brought about insecurities, and while expecting the convience brought by IoT, can it really protect our privacy?
Cyber Threat Intelligence: The topic of Cyber Threat Intelligence is getting popular recently, but what exactly is Cyber Threat Intelligence? As it is gaining significance everyday, we should discuss why it matters and how is it applicable to enterprises. Furthermore, discuss how Cyber Threat Intelligence can be used to properly identify the threat when under attack, and thus react and respond appropriately, in order to reduce the losses caused by these attacks.
Cyber Security Crisis Management: There’s no lack of encounters with hackers whether is life or in corporate environment, however, should a cyber security crisis arises, how should we respond to it? Are there any case studies that can be discussed?
Training of Information Security Personnels: How should information security professionals be cultivated from the government standpoint, and how should information security awareness be blended into education? What are the ways of recruiting and locating information security talents for corporations?
Contact
联系人:
telephone: