On April 25th, bytedance security Center successfully concluded the third online salon of “Security Style” — “Emergency Response and Business Empowerment”. The live broadcast of the salon was watched by more than 6 million people, and the interaction of the bullet screen was more than 1 million. The topic was not only full of dry goods, but also the guests were full of golden words.
Sharon review
In this special session of “Emergency Response and Business Empowerment”, four industry leaders from Bytedance, Huawei, Changting Technology and other companies talked about real cases and practical practices in emergency response. Salon’s partners Xray community and Ansiga also interacted warmly with the cloud audience through the form of cloud booth.
Let’s review the highlights of this salon.
“Security risk control is a process of long-term game, and the offensive and defensive sides are dynamically evolving strategies.”
Deng Bo, head of big data for Bytedance risk Control, shared with the audience from three perspectives: understanding black ash industry, entering risk control business, and how risk control can help Douyin CCTV Gala Red envelopes in his speech titled “How Risk Control Technology can Help Douyin Gala Red Envelopes Security Test”. Through the wool pulling, diversion cheating, cheating channels, brush quantity cheating classic cases to reveal the essence of black ash production, the essence of black ash production is to profit, risk control to do is to enhance the black ash production of evil costs. Also mentioned that the current black ash production has been a complete industry, with industrialization, specialization, concealment of these three characteristics.
Security risk control against black ash production process is actually a game, attraction by complete gala trill bonus scheme, tells the story of activity in the face of complex and huge gala flow, bytes to beat more APP exchange, internal multiple participants, outside the black ash to produce disturbance under the difficult point, risk control department how to smooth customs clearance trill gala red envelopes.
“Anti-fraud monitoring system construction is divided into five layers, edge recognition, fast recognition, depth recognition, asynchronous recognition, offline recognition.”
Jesseyan, risk control product manager of huawei terminal cloud service, has many years of experience in risk control and has been engaged in risk identification and countermeasures in the fields of account number, payment, marketing, anti-fraud and so on for a long time. He brought the topic of “those things about huawei payment risk control” to share.
The whole speech is divided into three parts, which are the business introduction of Huawei Pay, the risks encountered by Huawei Pay, the solutions for black industry, and the five-layer risk detection system of payment risk control. Finally, the three lines of defense, namely, holding the bottom line of the amount, striking the known logic of fraud and controlling the unknown risks, are used for all-round security protection. As soon as possible to detect and block the danger, reduce the user’s capital loss.
“The key to emergency response from the PERSPECTIVE of HIDS is rapid location, screening and killing.”
Chen Jingyuan, a security researcher from Changting Technology Product RESEARCH and development Center, shared the topic of “Emergency Response from the PERSPECTIVE of HIDS”.
Jing Chen far for emergency response to break up the process of analysis, positioning, stop, counter, etc, and through the three cases of real scene, vivid tells the story of complementary with HIDS that works system how to quickly locate the intruder trace, how to quickly screen out rebounded Shell process, how to quickly locate killing memory, to the side of the host security emergency response provides more thought.
“Attack and defense drill and threat perception two wheel drive business enablement.”
Bytedance wuheng laboratory business blue head Liu Jinrui, brought “security attack and defense Contradiction and shield” to share the topic.
Liu Jinrui first through the flow of hacking program protocol cheating, group control cheating, supply chain attack, operator attack cases to illustrate the challenges in the field of attack and defense. After that, it introduces the black production risk of diversion and brush quantity, and finally provides the situation of how Wuheng Laboratory in each stage of black production attack and defense through attack and defense drill and visualization threat perception method to empower business.
At this point, the third bytedance Security Style Salon — “Emergency Response and Business Enabling” special event has officially come to a close. Thanks to all the white hats, security practitioners and security enthusiasts for their continuous attention and support to the Security Style Salon!
If you have any better ideas for the next salon, please leave a comment and let us know 👏👏👏!
【 PPT 】
If you want to get PPT, you can pay attention to [bytedance Security Center] wechat public account, reply keywords [0425PPT] to get PPT
[Salon replay here]
Want to see salon playback, can copy link 🔗 watch: bytedance. Feishu. Cn/file/boxcnh…
【 Safety Style salon 】
“Safety rocks” salon, launched by bytes to beat security center, industry builds with activities in the form of a communication bridge, technical communication and security professionals to share, expand each other’s horizons, to attract more people to join, to help security staff growth, ecological together, promote the orderly operation of security industry and flourish.
To broaden the safety technology vision is also to enrich the better life.
Empower Security,Enrich Life!