資安研討會及活動

ICANN APAC-TWNIC Engagement Forum

活動時間:2019/4/16 – 4/17
活動地點:臺大醫院國際會議中心
活動網站:https://forum.twnic.net.tw/2019/
活動概要:
ICANN 及TWNIC共同舉辦合作交流論壇 (ICANN APAC-TWNIC Engagement Forum),集合了網路相關利害關係人與國際相關網路社群,針對域名、IP位址及網路安全等主題,進行深入議題探討,這將是台灣與國際網路利害關係人共同面對面討論全球網路議題的最佳機會。
ICANN 及TWNIC建立論壇平台的目的,是讓地區內之網路相關利害關係人,可在「一個世界、一個網路」的目標下,以合作交流論壇建立一個共同合作、討論與鏈結的全球網路社群。
我們需要您的參與,為「一個世界、一個網路」共同發聲!

The ICANN APAC-TWNIC Engagement Forum is a joint effort of the two Internet organizations to bring the stakeholders of the Internet together with the local and international communities to share and discuss the latest topics on Internet policies, domain name, IP address allocation, and cybersecurity. It is the best chance to meet, discuss and share your opinions on the latest issues and know the stakeholders in Taiwan.
It is also our goal to establish a platform for the communities to ignite the discussions from a variety of aspects of stakeholders and to keep pace with dynamic technologies and rapid innovation. With our goal “One World. One Internet.”, facilitating we work together, discuss together, connect together under the global community as One.
We need you to participate and voice out for the One Internet!


2019年資訊安全列車系列-政府暨教育界資訊安全研討會

活動時間:2019/4/23、2019/4/25、2019/4/26
活動地點:

  • 台北場—集思台大國際會議中心蘇格里底廳
  • 台中場—順天經貿廣場
  • 高雄場—國立科學工藝館S105階梯教室

活動網站:http://www.software.acer.net/webc/html/activity/show.aspx?num=283&page=1

活動概要:

  • 指導單位:行政院人事行政總處
  • 主辦單位:中華民國資訊安全學會
  • 協辦廠商:宏碁資訊服務(股)商用軟體事業單位公營業務處
  • 演講主題:
    資安專題演講/台北場:區塊鏈應用之限制與安全性考量
    資安專題演講/台中高雄場:區塊鏈在數據分析與保全的應用
    機關資安實務分享:公務機關落實資安法的挑戰
    基礎建設的資安防禦
    政府暨企業進階管理與安全防護:以windows 10為例
    全方位公務機關辦公環境:資安/效率/維護

2019亞太資訊安全論壇暨展會

活動時間:2019/5/8 – 5/10
活動地點:台北世貿南港展覽館
活動網站:https://secutechinfosecurity.tw.messefrankfurt.com/taipei/zh-tw/visitors/welcome.html
活動概要:2019年第十八屆(年) 亞太資訊安全論壇暨展會,《資安人》媒體,將於三天展覽會會場上,從四個主軸出發深入探討資訊安全議題: 觀念 : 與法規同步,與協同合作夥伴共同推動資安關鍵角色的重要性。

  • 組織:企業組織設立專職單位與專職資訊安全人員。
  • 管理:採用工具的評估讓觀念具體呈現其效力。
  • 技術:新型態網路部署規劃,建置。

3天論壇,10個關鍵資安主題,50場演講 + 攤位展示。

  • 資安議題方向:
    資安管理與法規 (Security Management and Compliance)
    網際威脅 (Cybersecurity )
    雲端與行動安全 ( Cloud & Mobile Info Security )
  • 資安與監控安防聯網
    資安議題:Infra Security、Endpoint、Application Security、Wireless、Cloud、Mobile Security、SIEM、Incident Response、Identity Management …..

歡迎各界、資安領域廠商們參與,展現您們的優秀產品與高品質的服務。


DEF CON 27

活動時間:2019/8/8 – 8/11
活動地點:Paris Las Vegas (Las Vegas, NV 89109, US)
活動網站:https://www.defcon.org/
活動概要:

  • The DEF CON 27 Theme: ‘Technology’s Promise’:
    DEF CON 26 was about the inflection point between disorder and dystopia – the moment before the point of no return. The DEF CON 27 theme, in a way, responds to ‘1983’ with new questions. What does it look like when we make the better choice? What kind of world do we hack together in the sunniest timeline? How does our real best-case scenario compare to the future we’ve been dreaming of for generations?
    Extra consideration will be granted for submissions that tie into this year’s theme. We want you to hear about your hacks and research, and how will it relate to the discussions below.
  1. Cypherpunk and “engineering out of the problem”.:
    Tim May was once quoted saying anonymity online would “alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret.” At the time his manifesto was for “both a social and economic revolution” and so began the newly formed “Cypherpunks”. Cypherpunks invented cryptography with the aim of abolishing big brother, but 30 years later we have big corporations in their place. Large corporations have insured that the 21st century hasn’t come without compromises.
    Crypto-anarchism is still alive and well today in well known examples like Tor, Freenet, cryptocurrencies, etc. Tell us what you’re doing now to circumvent the future we’re living in? Corporations are developing advanced facial recognition and becoming “the new big brother”. Social media is exchanging a false sense of freedom at the expense of a total removal of anonymity. The Cypherpunk ethos will have to adapt now that we have merged the “instagram-able” life, biometrics, ML, IOT, and micro-targeting. To build a future that doesn’t limit our love of modern technology and socialization at the expense of freedom will require decentralization and anonymity technology breakthroughs. What are you doing to engineer your way out of these problems?
  2. “Keep InfoSec out of Hacking”:
    DEF CON wants to support the culture of hacking. Between the TV interviews and the assessments we are still the same people with funny names threading the eye of the needle to make the next breakthrough. Hackers have become mainstream, seemingly to leave the underground to make a “legitimate” living. The industry has developed policies for ethical hacking, multimillion dollar pentesting orgs, bug bounty programs, and set the foundations of security for behemoth corporations. Being paid for hacking was the dream, but now it is an industry unto itself that focuses predominantly on enterprise.
    DEF CON is a hacker con, not an InfoSec conference. Hackers are more focused on the joy of discovery, irreverence, novel if impractical approaches. InfoSec is more focused on enterprise, frameworks, and protecting the interests of share holders. There is great value in both types of content, but our con is a hacker con by design.
    Activities that enable the hacker mindset and demonstrate how to master a certain technique are always going to be selected over a great enterprise InfoSec talk. DEF CON has always tried to provide a way to amplify the work of hackers, to create a venue for research that allows for others to grow. The idea that technology should be free was written into the subtext of “The Hacker Manifesto” and is just as valid today as it was 33 years ago.
  3. We want the computer from Star Trek, what we’re getting is HAL 9000.:
    At DEF CON 24 we hosted DARPA’s Grand Cyber Challenge, a challenge to the innovation community with a $2M prize to build a computer that can hack and patch software with no one at the keyboard. This was a lot of fun, and yet there were whispers among us of a future where artificial intelligence will render some human jobs irrelevant. We can see ourselves approaching an event horizon of automation. This technology is not without a price, but how do we get to the utopian world where we ask a computer to make us a cup of earl grey without landing ourselves in a black mirror dystopia? Engineers are developing smart home devices with disembodied voices, while hackers are quick to shout tropes of “NSA listening devices”. Is the reckless misuse of technology leading us to a dark future? What can hackers do to help achieve the sunniest timeline?
    Above are some suggested topics that loosely align with the theme, we consider all talk subjects. If your talk doesn’t fit in one of these topics don’t worry, the suggested themes are just a starting point. We’ve dozens of speaking slots, the tracks will be filled with a clustering of subjects; hardware hacking, lock picking, mobile hacking, reverse engineering, legalities of hacking, and more.
Scroll to Top