資安研討會及活動

「網路社群與數位合作」專家座談會

活動時間:2019/5/13
活動地點:IEAT會議中心8F國貿講堂
活動網站:https://twnic-icann.kktix.cc/events/108-3
活動概要:全球社會在數位時代中面臨了如安全、公平、道德和人權等問題,而當前的國際合作方式與合作程度仍不足以因應這些挑戰。國內外的社群成員面對這些新的科技發展議題衝擊時所形成的意見與想法也需要表達及參與討論的管道。在多方利害關係人的模式下,鼓勵各個層面的利害關係人積極參與網路治理議題的討論,即為促進利害關係人合作、瞭解相關議題,並建立對議題共識的方法之一,本次座談旨在鼓勵臺灣的網路社群作為利害關係人,一同探討國內科技發展、數位發展以及需要優先行動的領域所產生的議題。
藉由提出議題,與相關領域(學界、網路組織、公民社會等)之其他利害關係人代表交換數位科技發展情形、可協同合作的形式等方面的意見,幫助臺灣的網路社群瞭解國內網路公共政策議題可能的影響,同時提升對數位合作相關議題的認知。


TANET 2019 – 臺灣網際網路研討會 資訊展望 X 5新啟航

活動時間:2019/9/25–9/27
活動地點:高雄國際會議中心
活動網站:https://tanet2019.nsysu.edu.tw/index.php
活動概要:TANET2019臺灣網際網路研討會以「資訊展望、5新起航」為主題。因科技的日新月異,使物聯網絡擴大成熟,經濟和生活將迎來重大變革,同時影響智慧校園的發展,也為教學形式上碰撞出新的火花。本次大會圍繞著五大主軸「物聯新通訊、智慧新生活、雲端新服務、資安新防護、軟體新應用」擴展,全方面探討物聯網絡時代帶來的關鍵課題。
5新議題延伸的子議題涵蓋5G網路通訊、人工智慧及其應用、前瞻資安研發、網路規劃建置、物聯網(IOT)、深度學習、網際網路技術、區塊鏈、軟體工程等多達55個領域,將徵求各方資訊從業人員於本次大會發表優質論文,進行深度探索,交流切磋。大會也將邀請產、官、學界資深專家進行精彩的專題演講,以及各類議題討論、論壇分享、資安體驗營、戶外參訪等活動,藉由不同交流形式,共覽學術面及實務面的最新技術發展,使與會者從5新啟航,激發創意思維,共同展望智能時代的美麗新境界。


Taiwan Cloud Edge 台灣

活動時間:2019/5/15
活動地點:台北國際會議中心 (TICC)
活動網站:https://cloudsummit.ithome.com.tw/index.html
活動概要:

  • 把握數位轉型的決勝之年
    隨著5G商轉在即,可望加速邊緣運算起飛,密集催生大量的創新產品與服務,順勢揭開下一波市場淘汰賽的序幕。面對生存保衛戰,企業不容遲疑觀望,急需武裝自己、提高競爭力;透過本活動,您可深入了解混合雲、DevOps、IoT、AI…等數十種雲端技術內涵,進一步理解如何活用它們,快速強化數位創新能量。
  • 將資安內化於數位創新
    不少企業因懼怕遭受網路攻擊,延緩數位轉型的腳步。有鑑於此,本活動不僅引領您躍上雲端、擁抱科技融匯的 IT 新世界,也不忘帶您掌握企業雲端應用安全邊界,知道如何將資訊安全融入數位發展戰略,在業務創新、風險控制天平兩端之間建立最佳平衡。
  • 結合案例分享,創造臨場體驗
    臺灣雲端大會處在新技術浪潮尖端,屢屢放送包括 Cloud Native Computing、AI、IoT、Edge Computing、DevOps、Microservices、Serverless、Blockchain…等大量新知;難能可貴的是,大會不只關切技術理論,更重視管理與應用實務,因而致力規劃案例分享議程,使學員得以增加臨場感,更懂得將新技術運用在企業 IT 發展實務。
  • 互動Hands-on Lab,練就實戰功力
    一直以來,「實機體驗課」(Hands-on Lab, HOL)始終是臺灣雲端大會的一大亮點,2019 活動現場也不例外!除了特別設計互動式實機環境外,更搭配專業講師的教學引導,帶學員深入了解雲端新技術或新服務的應用環境,學習相關設定、流程或指令,透過做中學、不空談,把這份能力帶回企業工作崗位。
  • 新世代雲端資料中心
    邁向新世代雲端機房,實現雲端運算理念,滿足企業雲端商務應用!雲端主導未來新商業模式的創新與發展,資料中心則是現代數位經濟的核心能力。新世代雲端資料中心議程,旨揭分享各產業且不同規模的企業所需要的雲端資料中心專業案例。

DEF CON 27

活動時間:2019/8/8–8/11
活動地點:Paris Las Vegas. Las Vegas, NV 89109, US
活動網站:https://www.defcon.org/
活動概要:
The DEF CON 27 Theme: ‘Technology’s Promise’:
DEF CON 26 was about the inflection point between disorder and dystopia – the moment before the point of no return. The DEF CON 27 theme, in a way, responds to ‘1983’ with new questions. What does it look like when we make the better choice? What kind of world do we hack together in the sunniest timeline? How does our real best-case scenario compare to the future we’ve been dreaming of for generations?
Extra consideration will be granted for submissions that tie into this year’s theme. We want you to hear about your hacks and research, and how will it relate to the discussions below.

  1. Cypherpunk and “engineering out of the problem”.:
    Tim May was once quoted saying anonymity online would “alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret.” At the time his manifesto was for “both a social and economic revolution” and so began the newly formed “Cypherpunks”. Cypherpunks invented cryptography with the aim of abolishing big brother, but 30 years later we have big corporations in their place. Large corporations have insured that the 21st century hasn’t come without compromises.
    Crypto-anarchism is still alive and well today in well known examples like Tor, Freenet, cryptocurrencies, etc. Tell us what you’re doing now to circumvent the future we’re living in? Corporations are developing advanced facial recognition and becoming “the new big brother”. Social media is exchanging a false sense of freedom at the expense of a total removal of anonymity. The Cypherpunk ethos will have to adapt now that we have merged the “instagram-able” life, biometrics, ML, IOT, and micro-targeting. To build a future that doesn’t limit our love of modern technology and socialization at the expense of freedom will require decentralization and anonymity technology breakthroughs. What are you doing to engineer your way out of these problems?
  2. “Keep InfoSec out of Hacking”:
    DEF CON wants to support the culture of hacking. Between the TV interviews and the assessments we are still the same people with funny names threading the eye of the needle to make the next breakthrough. Hackers have become mainstream, seemingly to leave the underground to make a “legitimate” living. The industry has developed policies for ethical hacking, multimillion dollar pentesting orgs, bug bounty programs, and set the foundations of security for behemoth corporations. Being paid for hacking was the dream, but now it is an industry unto itself that focuses predominantly on enterprise.
    DEF CON is a hacker con, not an InfoSec conference. Hackers are more focused on the joy of discovery, irreverence, novel if impractical approaches. InfoSec is more focused on enterprise, frameworks, and protecting the interests of share holders. There is great value in both types of content, but our con is a hacker con by design.
    Activities that enable the hacker mindset and demonstrate how to master a certain technique are always going to be selected over a great enterprise InfoSec talk. DEF CON has always tried to provide a way to amplify the work of hackers, to create a venue for research that allows for others to grow. The idea that technology should be free was written into the subtext of “The Hacker Manifesto” and is just as valid today as it was 33 years ago.
  3. We want the computer from Star Trek, what we’re getting is HAL 9000.:
    At DEF CON 24 we hosted DARPA’s Grand Cyber Challenge, a challenge to the innovation community with a $2M prize to build a computer that can hack and patch software with no one at the keyboard. This was a lot of fun, and yet there were whispers among us of a future where artificial intelligence will render some human jobs irrelevant. We can see ourselves approaching an event horizon of automation. This technology is not without a price, but how do we get to the utopian world where we ask a computer to make us a cup of earl grey without landing ourselves in a black mirror dystopia? Engineers are developing smart home devices with disembodied voices, while hackers are quick to shout tropes of “NSA listening devices”. Is the reckless misuse of technology leading us to a dark future? What can hackers do to help achieve the sunniest timeline?
    Above are some suggested topics that loosely align with the theme, we consider all talk subjects. If your talk doesn’t fit in one of these topics don’t worry, the suggested themes are just a starting point. We’ve dozens of speaking slots, the tracks will be filled with a clustering of subjects; hardware hacking, lock picking, mobile hacking, reverse engineering, legalities of hacking, and more.

發佈留言

發佈留言必須填寫的電子郵件地址不會公開。 必填欄位標示為 *