Following a successful event in 2016, Hong Kong’s premier security research group Dragon Threat Labs is hosting DragonCon, possibly the most technically-intensive security conference borne out of Hong Kong.
Come join us, make friends and see the cyber city!
Charles Mok, is the Legislative Councillor representing the Information Technology Functional Constituency, member of The Professionals Guild. He has been serving the ICT industry for more than 20 years. He is currently the Vice Chairman of the Professional Commons, Honorary President of the Hong Kong Information Technology Federation and Founding Chairman of the Internet Society Hong Kong. Charles is active in public services with a view to upholding the core values of Hong Kong of which include democracy, liberty, human rights, rule of law and integrity, and is serving on various advisory bodies in the Hong Kong government, Hospital Authority, WKCDA, and higher educational institutions etc. Charles graduated from Purdue University in the United States with his Bachelor and Master degrees of Science in Computer and Electrical Engineering.
Mei Nelson is a Security Principal of the Geopolitical and Strategic Intelligence team at iDefense (now part of Accenture Security). She focuses on East Asia region specific analysis of cyber-threat actors and motivations, and strategic cyber-threat analysis related to client organizations’ processes and strategic objectives.
Bart is an Incident Response and Forensics Specialist in MANDIANT's Security Consulting Services team helping clients restore confidence in an event of a breach. He holds a degree in Computer Forensics, is a keen developer, enjoys inspecting network traffic and specialises in Windows forensics with fascination in volatile memory.
Having worked on Incident Response engagements around the world, Bart routinely develops new tools and ideas to solve on-the-job problems and to ensure Mandiant remains an industry leader. Some of these developments led to Bart's contributions to the Volatility project.
After spending 8 years in England, Bart recently relocated to APJ region as he believes it's still the most fascinating, culturally diverse, and opportunistic region in the world. The relative immaturity in Cyber Security in most countries, but also the "hunger to learn" that most businesses and government organizations display, offer a significant growth opportunity.
Industrial safety expert and an experienced security product architect, who worked in communications equipment R & D in Huawei, and in a number of security companies engaged in security research, such as cnns, topsec, kuangn. He has obtained CISSP certification. He is the founder of ArtisanLab and leader of the research team. One of his recent findings include the study of worms in ICS. The findings were successfully demonstrated in a number of safety conferences.
Jay Spreitzer has over 19 years of information security experience in government and private sector. Jay retired from the US Army, after 23 years of service working in various technology and information security roles. He also has 11 years of experience in the financial sector working in the cyber threat intelligence role. Jay is the co-founder and CISO of Protocol 46, a US-based company extending cyber security to small and medium businesses.
Jay has completed his Bachelor of Science in Information Technology and a Master of Science in Information Assurance and Security. Some of his other training includes Network Penetration Testing and Ethical Hacking, Cyber Threat Intelligence, Advanced Security Essential, the Criminal Intelligence Analyst Course, and the FBI Citizen’s Academy. He holds GIAC Enterprise Defender and Incident Handler certifications.
Jay is a member of InfraGard and the High Technology Crime Investigators Association. Jay has been an active member of the Board of Directors for the FBI Citizens Academy Alumni Association and Minnesota InfraGard.
Matt is a malware researcher with an interest in malware used to target civil society. In addition to private malware research, he has experience in intelligence and incident response in the US government and private sectors.
Chris Chan is a senior engineer for ASTRI Security Lab where he is an ethical hacker. He is a cybersecurity researcher for the lab where he discovered vulnerabilities in several brands of routers. He gained his CEH certificate in 2013 and started security research on web assessment. He joined the Information Security Summit HK 2015 and shared his case on the DDoS Attack. He also gave a technical sharing for PISA after the training at Black Hat 2016 and was involved in the Cyber Intelligence Sharing Platform (CISP) development.
Roland Cheung is an information security manager responsible for security incident handling and emerging threat analysis. He is the founding member of the Honeynet Project HK chapter (aka Honeybird) and has rich experience on Honeypot deployment and attack data analysis.
09:30am - 10:00am
Welcome & opening speech
Dan Kelly & Charles Mok
10:00am - 10:45am
Attacker Antics: Illustrations of Ingenuity
10:45am - 11:00am
11:00am - 11:45am
Real World Threat Intelligence
11:45am - 12:30pm
A step by step guide of writing a worm to infect PLC-based systems using ladder logic
Dr. Siu Ming Yiu and 姜双林
12:30pm - 13:15am
Targeting the Vote: Attempted Surveillance of Hong Kong’s Democracy Community
Matt Brooks and Anthony Lai
13:15pm - 14:45pm
14:45pm - 15:30pm
Lazarus and Friends
15:30pm - 16:15pm
Fall in Love with Honeypot
To share the experience on deploying honeypot to collect a variety of attack data, including port scans, vulnerability exploits, password brute force attack etc. and how to learn the attacker’s behavior.
16:15pm - 16:30pm
16:30pm - 17:15pm
17:15pm - 18:00pm
As Close as Lips and Teeth - North Korean Operations and Chinese Support
Over the past few years, global industry has witnessed an uptick in the number of campaigns attributed to North Korea while the West has experienced a sharp decrease in Chinese campaigns, especially against aerospace and defense related targets. This talk will explore the deep rooted relationship between China and North Korea, especially in terms of training and infrastructure/tool support.
18:00pm - 18:45pm
Malware Command and Control using Social Media Platform
18:45pm - 18:55pm
14 Dec 2017
10:00am - 17:00pm
Introduction to Cyber Threat Intelligence
Jay P. Spreitzer
An introduction to cyber threat intelligence that explains what it is and what it is not. Take attendees through an explanation of the intelligence life cycle and the different processes surrounding them. A description of actionable intelligence and introduction to different open sources tools that can be used to enrich intelligence. The workshop will cover operational security considerations of using some opensource tools. Important parts of analysis to develop a hypothesis. The importance and usage on indicators of compromise and types of reporting. Students will have an opportunity to use different tools sets in scenarios using their own laptop.
15 Dec 2017
09:30am - 12:30pm
Monitoring and protecting industrial control systems
Dr. Siu Ming Yiu and 姜双林
15 Dec 2017
14:00pm - 17:00pm
We are seeking sponsors. If you are interested in sponsoring, please contact the following at Dragon Threat Labs.
For the donation, you can donate through the eventbrite donation ticket at here ! For further donation options, please contact the following at Dragon Threat Labs.
if you wish to sponsor DragonCon please contact Frankie Li.
Copyright © 2017 Dragon Threat Labs