Insider trading trade secrets? Traces could be found. (Part 1)

EventIn-Person OnlyCommunity Sharing

time

07:25 ~ 08:25

site

Workshop

Cybersecurity has been given more attention and has become an important element of business operation in recent years. What should be done during a cyber incident? What needs to be taken heed of? You will see this in this immersive workshop.

Pre-roll

Recommended Equipments
None

Two2

Two2

Two2 from CHT Security, is the technical supervisor of the digital forensics lab. She is specialized in incident investigation, digital forensics and has delivered speeches to governmental and non-governmental institutions, local hacker community called 台灣好厲駭, etc.

English interpretations will be provided for all sessions not presented in English.

Agenda Table

Use event local timezone
TimeZone

00:30

  • Attendant Registration Time

01:20

  • Welcome Speech & Event Introduce

02:10

03:00

  • Break

03:15

04:05

  • Lunch

05:00

05:45

  • Break

06:00

06:45

  • Tea Time

07:00

07:25

08:10

  • Break

08:25

09:10

  • Closing

09:25