Hanoi Hacking Week
Registration
Hanoi Hacking Week
Registration
Hanoi Hacking Week
Positive Technologies Vietnam invites you to participate in The Business Track within Hanoi Hacking Week, an international conference on practical cybersecurity.
The Business Track will take place at the National Convention Center in Hanoi.
National Convention Center
Registration for speakers
Business Program
Day 1
9:30-10:50 Discussion. Why risk management doesn't work: what's top management actually interested in?
What is top management interested in from a cybersecurity perspective?
Why is risk management not working?
Non-tolerable events: what does it means?
What catastrophic consequences matter
Result-driven cybersecurity - a new word on the road to results that top management understands
How to speak to executives and the Board
11:00-12:20 Discussion. How to assess company security so it doesn't turn out fake?
What could be the outcome/result of cybersecurity?
How can the outcome/result of cybersecurity be assessed?
Bug Bounty program for businesses and countries
APT Bug Bounty vs Cyber Ranges vs pentests. What are scopes?
13:30-14:50 Discussion. How Secure Development can protect digital transformation projects?
Is DevSecOps can be friendly for you dev-teams? How can we play together with Security, with Development and DevOps?
What do you prefer: AppSec-centric methodology or Dev-centric methodology?
What is DevSecOps economic impact? Is it positive or negative?
How secure are your pipelines? How do you measure AppSec metrics?
What do you think: Appsec-expert can be expert in AI-Security or not? Why do you think that?
Future is here: MLSecOps is mandatory process for the digital transformation? How we can effectively work with AIOps and MLOps?
15:10-16:30 Discussion. Artificial intelligence in cybersecurity. Is autopilot possible?
Levels of automation in cybersecurity
The role of artificial intelligence in cyber security - successful and unsuccessful examples
Autopilot or co-pilot in cybersecurity
Where is it impossible to do without humans?
What are the security benefits of autopilot?
16:40-18:00 Discussion. The Reality of Cyber Warfare: Are We Ready?
How likely is cyber warfare in today's world and what are its possible consequences?
The landscape of cyber threats and hacker groups in Southeast Asia.
How can a state prepare for large-scale cyber attacks at the infrastructure level?
The role of interstate co-operation and international treaties in preventing cyber conflicts.
What cyber security measures can be applied at the national defense level?
Day 2
14:00-15:00 Discussion. From an incident response function to a full-fledged SOC
Basic and advanced SOC services
SOC architecture and technological stack
Lifehacks and tricks of SOC operation in public and private companies
Assessing SOC effectiveness
15:10-16:10 Discussion. Cybersecurity of finance - from banks to fintechs
Traditional banking and modern fintech from a cybersecurity perspective
What's easier, stealing from an ATM or a cryptocurrency exchange?
Responding to security incidents in FSIs
Financial sector cyber security - where to start
Registration for speakers
Fill out the form to take part in Hanoi Hacking Week.
After submitting the form, wait for confirmation from the organizers.
[{"lid":"1728051360295","ls":"10","loff":"","li_type":"nm","li_name":"fullName","li_ph":"First and last name","li_req":"y","li_inputinrow":"y","li_nm":"fullName"},{"lid":"1728051360294","ls":"20","loff":"","li_type":"in","li_name":"client_Country","li_ph":"Country","li_req":"y","li_nm":"client_Country"},{"lid":"1728051682707","ls":"30","loff":"","li_type":"in","li_name":"client_Company","li_ph":"Company","li_req":"y","li_inputinrow":"y","li_nm":"client_Company"},{"lid":"1728737767384","ls":"40","loff":"","li_type":"in","li_name":"Position","li_ph":"Position in the Company","li_req":"y","li_nm":"Position"},{"lid":"1728737824019","ls":"50","loff":"","li_type":"sb","li_name":"Discussion","li_title":"Discussion for participation","li_req":"y","li_variants":"Why risk management doesnt work: whats top management actually interested in?\nHow to assess company security so it doesnt turn out fake?\nHow Secure Development can protect digital transformation projects?\nArtificial intelligence in cybersecurity. Is autopilot possible?\nThe Reality of Cyber Warfare: Are We Ready?\nFrom an incident response function to a full-fledged SOC\nCybersecurity of finance - from banks to fintechs","li_selfirstvar":"Choose variant from the list","li_nm":"Discussion"},{"lid":"1729454808616","ls":"60","loff":"","li_type":"in","li_name":"Theses","li_ph":"Theses","li_nm":"Theses"},{"lid":"1728051489506","ls":"70","loff":"","li_type":"in","li_name":"messenger","li_ph":"Messenger account (WhatsApp, WeChat, Telegram)","li_req":"y","li_inputinrow":"y","li_nm":"messenger"},{"lid":"1728051757360","ls":"80","loff":"","li_type":"em","li_name":"email","li_ph":"Email address","li_req":"y","li_nm":"email"},{"lid":"1728052104474","ls":"90","loff":"","li_type":"tx","li_text":"Completing the registration does not guarantee acceptance. The organizers will contact you separately to confirm your registration."}]
By clicking "Submit", I consent with the
processing of my personal data
for the purpose of participation in the event.
About
Program
Participate
©2024 Positive Technologies
Privacy Notice