Bytedance’s “Safe Style” salon has been successfully held for three sessions
So far, a total of 10,000 people have participated
⏰ 14:00, July 10th
🗺️ Beijing Fangheng Fashion Center
We are hosting the fourth Bytedance “Safe Style” salon
“Attack and defense actual combat” special!
In the heat of summer
This most “burning” salon must not miss 3 big highlights
4 industry giants, face to face with security tycoon exchange interaction
Many surprise gifts, participate in fun interactive games to win the car home
Enter ByteDance and visit its youthful office building
Introduction of salon Topics
Practice sharing of Enterprise Red-blue Confrontation Tactics
Zirui Hu is a researcher in the Attack and Defense Lab of Bytedance Security and Risk Control team, focusing on mobile security, cloud security and red-blue confrontation.
Topic brief: Want to know how external hackers launch attacks on target enterprises? The topic is combined with several practical red-blue confrontation drill cases that “do not talk about martial virtue” to introduce the key links such as enterprise boundary breakthrough means commonly used by hackers, horizontal penetration skills of Intranet, concealed permanent residence, trace clearing and reverse tracing.
Boundary Breakthrough Detection Scheme in Actual Combat Attack and Defense
Introduction of lecturer: Yuan Wenyu, head of security operation of Qianxin Network Security Department, focuses on intrusion detection, security incident response and emergency response.
Topic introduction: How to establish effective border breach detection schemes in increasingly complex attack scenarios? The lecturer will analyze the detection methods of phishing, 0Day, Webshell and other common attack methods in an all-round way based on real attack and defense cases.
Bytedance Security Operation Practice and Offensive and Defensive Combat
Introduction to lecturer: Chen Ming, head of security incident operations for ByteDance’s security and Risk Control team. Focus on party A’s security operation, intrusion prevention system construction and implementation
Topic introduction: Based on bytedance’s security operation practice and offensive and defense practice, the topic will introduce how to build in-depth security defense system, as well as the key and difficult points in the construction of enterprise security operation and countermeasures through bytedance’s real offensive and defense cases.
IoT Security Capability Building in didi Scenario
Introduction of lecturer: Liu Wenling, senior mobile security engineer of Didi Network Security Department. Continue to explore the direction of Android in the field of mobile security to address the risks of Didi’s specific business scenarios.
Topic Introduction: In the Internet of Everything era, IoT products are facing many threats and challenges. This topic will share didi’s IoT product security assessment ideas, and bring detailed case explanation and specific security practices.
Want to hear a real case of red versus blue?
Want to know more about cyber attacks?
Want to know how a defensive team can split moves?
Want to see the security risks of IoT?
Come on, this salon is gonna be a blast!
Registration form
14 o ‘clock, July 10th, Fangheng Fashion Center, Beijing
See you at bytedance’s Fourth Safe Style Salon!
Poke links: www.huodongxing.com/event/76015…