Academician of the Chinese Academy of Engineering and Chairman of the Internet Society of China Wu Hequan, senior researcher and director of the Technology and Public Policy Program at the U.S. think tank Center for Strategic and International Studies (CSIS) James Lewis, CEO of AV-Test anti-virus testing company Andreas Marx, research vice president of Gartner Consulting Company Peter Fosterbrook, chairman and CEO of 360 Company Zhou Hongyi, and president of 360 Company Qi Xiangdong and other heavyweight guests gave wonderful speeches on hot topics in the security industry.
With the widespread application of virtualization, big data, cloud applications, BYOD and wearable smart devices, Internet information security is facing more new challenges, especially the recently exposed Snowden "Prism Gate" incident, which has triggered strong attention from the whole society to Internet information security.
At the conference, 360 Chairman and CEO Zhou Hongyi delivered a keynote speech, sharing how to deal with cybersecurity in an innovative way. James Lewis, a cybersecurity think tank of the US government, brought the latest international trends in Internet security analysis on "Coping with New Challenges in Internet Security", exchanged the latest security technologies and solutions, and explored the possibility of international cybersecurity cooperation. Peter Fosterbrook and Andreas Marx were also invited to deliver keynote speeches on "Emerging Threats and Challenges on the Internet" and "Trends in Anti-Virus Technology".
As the PRISM incident fermented, national network security has become a hot topic in the information field. Gartner, an internationally renowned information technology research and analysis company, jointly released this year's heavyweight research report, "Enterprise Security Development Trends in the Internet Era", at ISC. The report analyzes the security challenges that enterprises will face in the future, such as the inevitable APT (Advanced Persistent Threat) attacks, the decline in the share of IT industry's consumption equipment or services for most users, and the huge information security costs spent by enterprises to prevent attacks.
The conference also set up several sub-forums, which are equally exciting and should not be missed. In the mobile security sub-forum, Ning Peng, the vice president of Samsung, the largest manufacturer of Android phones, gave a keynote speech on the integrity measurement architecture based on TrustZone, proposing that solving security problems from the bottom-level architecture may become an important means to solve mobile security problems.
As for the most popular issue of Android phone security, Jiang Xuxian, chief scientist of 360 Company and associate professor of North Carolina State University, started from the source and discussed in detail the security risks of customized Android phones and the methods of trying to solve the security problems; Song Chengyu, a doctoral student from Georgia Institute of Technology in the United States, had a more interesting speech topic. He explained in detail all kinds of incredible malicious behaviors, such as "modifying fake Apple chargers to attack mobile phones."
At the Enterprise Security Summit Forum, the industry's most concerned topics and cutting-edge technologies were discussed in depth. 360 Vice President Tan Xiaosheng delivered a keynote speech on "The Way Out for Enterprise Network Security and Website Security"; the famous expert and well-known white hat Yu Yang (tombkeeper) shared a mysterious "Hackintosh method that does not invade the server but is effective for all websites"; the professionals attending the meeting also held a roundtable discussion on "Next Generation Firewall".
In addition to mobile security and enterprise security, this year's ISC also held a number of special forums on emerging security threat technologies, APT attacks, software security, cloud computing, web security forums, cybercrime and prevention, cloud-based data disaster recovery and storage security, etc., attracting nearly 10,000 people from the Internet, finance, telecommunications, energy, industrial manufacturing, information technology, public security and other industries at home and abroad to attend the conference. Top experts in various information security fields gave more than 50 special lectures in 9 branch venues.
According to the organizers, under the influence of the new Internet security situation, the original network security protection technology system has basically become ineffective, and innovative methods must be used to meet and respond to these new challenges. This ISC aims to build a communication platform for the latest information security technologies and solutions for industry colleagues at home and abroad who are concerned about Internet security.
It is reported that this Internet Security Conference has received support and in-depth participation from many well-known domestic and foreign institutions, including the National Engineering Laboratory for Cybersecurity Emergency Technology, the National Engineering Laboratory for Disaster Recovery Technology, OWASP, Gartner, etc., and introduced professional security and forward-looking technology summits such as SyScan360. The scale, professionalism and influence of the conference have set the highest precedent for domestic information security conferences.
Previous article:Embedded system engineer, a small software code error can kill people!
Next article:Supercapacitors installed on light rail trains can be used for electromagnetic catapults
- Popular Resources
- Popular amplifiers
- High signal-to-noise ratio MEMS microphone drives artificial intelligence interaction
- Advantages of using a differential-to-single-ended RF amplifier in a transmit signal chain design
- ON Semiconductor CEO Appears at Munich Electronica Show and Launches Treo Platform
- ON Semiconductor Launches Industry-Leading Analog and Mixed-Signal Platform
- Analog Devices ADAQ7767-1 μModule DAQ Solution for Rapid Development of Precision Data Acquisition Systems Now Available at Mouser
- Domestic high-precision, high-speed ADC chips are on the rise
- Microcontrollers that combine Hi-Fi, intelligence and USB multi-channel features – ushering in a new era of digital audio
- Using capacitive PGA, Naxin Micro launches high-precision multi-channel 24/16-bit Δ-Σ ADC
- Fully Differential Amplifier Provides High Voltage, Low Noise Signals for Precision Data Acquisition Signal Chain
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Analysis of the application of several common contact parts in high-voltage connectors of new energy vehicles
- Wiring harness durability test and contact voltage drop test method
- From probes to power supplies, Tektronix is leading the way in comprehensive innovation in power electronics testing
- From probes to power supplies, Tektronix is leading the way in comprehensive innovation in power electronics testing
- Sn-doped CuO nanostructure-based ethanol gas sensor for real-time drunk driving detection in vehicles
- Design considerations for automotive battery wiring harness
- Do you know all the various motors commonly used in automotive electronics?
- What are the functions of the Internet of Vehicles? What are the uses and benefits of the Internet of Vehicles?
- Power Inverter - A critical safety system for electric vehicles
- Analysis of the information security mechanism of AUTOSAR, the automotive embedded software framework
- Has anyone used the air quality sensor of the rsl10-sense-gevk board?
- Sound interference gyroscope experiment three ultrasonic interference
- Free evaluation - Topmicro intelligent display module (4) displays Chinese characters
- Women's football wins!!!
- nand flash interface switch
- Please tell me about the LCD controller of RL78
- Generation of IP cores in FPGA
- Electronics Engineer (FPGA)
- [National Technology N32G430] 4. Make a simple and easy-to-use multi-task scheduling system
- [Anxinke UWB indoor positioning module NodeMCU-BU01] 02. AT command distance measurement