2015 China Internet Security Conference

Chaoyang District National Convention Center, Beijing, 9, 29, 9, 2015, 30,, 2015

Meeting

All second participants of the conference ticket purchase stage, will be at ISC value of 600 yuan luxury spree.

 

 

Purchase discount

 

Ticket types First stage
7.13-8.9
Second stage
8.10-9.15
Third stage
9.16-9.27
General assembly two pass $1080 $1440 $1800
Group tickets (5 or more) $980 $1340 $1600
Student ticket $360 (Limited Edition)
Rights and interests Two days of the General Assembly admission authority + two days of a rich lunch + conference data + + exquisite gift + guests PPT Download

Note: the purchase of student tickets, the need to show the students in the hall to show their student card. If you can not produce a student card, you need to fill in the field of the difference between the students and non students.

Activity introduction

2015 China Internet Security Conference (ISC) will be held at the National Convention Center in Beijing from September 30th to September 28, 2015. The general assembly by the people's Republic of China National Internet Information Office Network Security Coordination Bureau, the Ministry of industry and Information Network Security Management Bureau, Ministry of Public Security Network Security Bureau guidance, China Internet association and the 360 Internet Security Center jointly sponsored by the national computer network emergency technology processing coordination center, the national computer virus emergency treatment center, China Information Security Evaluation Center, China Network Space Security Association and China Information Security Certification Center and other relevant agencies to support.

As Asia's largest information security field, the most professional annual meeting, 2015 China Internet security conference, will further explore the global information security trends, share the most cutting-edge security technology research results and practice, focusing on national network space security, information security industry development, cloud security, security, mobile security, data security, emerging threats, software security, electronic evidence and other popular technology and industry topics. 2015 ISC will also increase the threat intelligence and other topics of concern, as well as the support of security innovation. 2015 ISC will set up 12 forums for the discussion and exchange of popular security issues.

2015 ISC evolution of the higher standards of the guests, the lineup is more powerful. Both United States of network security forces commander and other domestic and foreign officials, including burner, Palo Alto networks, such as Google well-known enterprises technology executives, and all kinds of new corporate security technical supervisor. 2015 ISC will be a feast of information security technology.

In addition to the wonderful speech of the experts, the 2015 Internet security conference will include security training, exhibition, offensive and defensive, business exchanges and other forms, designed to create more opportunities for business and users to exchange and learn.

2015 China Internet security conference ahead of scale. ISC 2013 participants were nearly 1.5 people, more than 40 exhibitors; ISC 2014 more than 2 participants, exhibitors as many as 80. ISC2015 audience will be expected to more than 2.5 people, more than 120 exhibitors.

Activity schedule

  • September 29th
  • September 30th
Security Leaders Summit
9:00-9:05

Opening speech

Wu Hequan, academician of Chinese Academy of Engineering

9:05-9:10

The message

Guo Qiquan, chief engineer of the Ministry of public security, network security, researcher, doctoral tutor

9:10-9:15

Welcome speech

President Qi Xiangdong 360

9:15-10:00

Cyber warfare and infrastructure security; national network security and security industry

Commander Keith B. Alexander - former director of the national security agency's first USA Cyber Command

10:00-10:30

In the face of pain, seeking win-win: to create a new network space security order

Hao Yeli, vice president of the national development and innovation strategy

10:30-11:00

Cloud security and security in the future

Heiser Gartner - vice president of Jay research

11:00-11:30

National network security strategy

Tension - China Institute of modern international relations, President of the Institute of information and information and social development director, researcher

11:30-12:00

See: to give the user, especially the ability to see the security threat is the key

Zhou Hongyi - 360 company chairman and CEO

New threat Forum
13:30-14:00

Emerging malware constitutes a new threat to global security

Alto Palo - Technical Director of Asia Pacific

14:00-14:30

Detection of unknown threats on the terminal by artificial intelligence technology

CEO/ Stuart founder McClure Cylance

14:30-15:00

CA APT attack and defense

Symantec Asia Pacific Technology Director, the global CA/Browser forum and code signed the chairman of the working group

15:00-15:30

APT attack case analysis

Hu Xingru 360 senior security expert

15:30-16:00

From the 0day analysis of the Chinese government agencies APT capture

Li Baisong - the first deputy chief engineer of antiy Labs

16:00-16:30

ROP detection of 0day detection by dynamic detection

Wu Zhuoqun Hangzhou, head of the Research Institute of safety

16:30-17:00

SIM 3G/4G card using a PC and oscilloscope

Yu Yu Shanghai Jiao Tong University

Network Space Security Strategy Forum
14:05-14:10

Guest address

TBD

14:10-14:30

Topic: national network space security system construction in the era of big data

He Dequan, academician of Chinese Academy of Engineering

14:30-14:50

Topic: Network Security Law on the national network of the significance and impact of the construction of security

Ma Minhu Xi'an Jiao Tong University law school professor, director of Information Security Law Research Center

15:10-16:00

Peak dialogue: new challenges and new order in Cyberspace

Moderator: Tan Xiaosheng - vice president of Qihoo 360 intends to invite the guests: Wang Shiwei - Shanghai Academy of Social Sciences Information Research Institute Li Yuxiao - Beijing University of Posts and telecommunications, Internet Governance and law research center director Fang Xingdong - internet lab director Hai Xin Duan - Tsinghua University network science and cyberspace Institute of network and information security laboratory director Wang Chunhui - Nanjing University of Posts and Telecommunications Professor, Information Industry Development Strategy Research Institute President Xiao Xinguang - Lab Antian chief architect

16:00-16:50

Peak dialogue: the network development strategy in the "one way" strategy

Host: Professor Lvben Fu - University of Chinese Academy of Sciences Institute of management intends to invite guests: Wang Yukai - the National Advisory Committee for information technology committee, director of the National School of administration Professor Yang Yixian - Beijing University of Posts and telecommunications information security center an associate professor of Institute of Institute of world economy, Li Jianhua, Shanghai Jiaotong University School of information security engineering, vice president of the Xu Weidi - National Defense University Institute for Strategic Studies Shen Yi - Fudan University International Relations and School of public affairs Baisheng - Ministry of Commerce International Trade and economic cooperation

16:50-17:00

 

Free exchange

Cloud Computing Security Forum
13:30-14:00

Adaptive security architecture for cloud computing platform

Zhang Xiaobing 360 security expert

14:00-14:30

Security Cloud Storage and transportation of the scene of the practice

Shell (Xu Zhixiang) seven cattle Safety Supervisor

14:30-15:00

How to solve the problem of massive DDoS attacks

Ou Huaigu, chief security officer ChinaNetCenter

15:00-15:30

Thinking of enterprise security protection under the new IT environment

Li Yanbin, China three communications security products department minister

15:30-16:00

Intrusion detection and threat detection in cloud computing platform

Fang Yong UCloud security center director

16:00-16:30

Security architecture analysis of Docker

Ai Qiwei (Eagle), a senior vice president of the network space Safe Technology Ltd /CTO

16:30-17:00

The practice of secure cloud platform SDN

Wang Yi like cloud CEO

Security Management Forum
13:30-14:00

Differences and trends in the IT security operation between the US and China

Liu Jingping "network operation and maintenance and management," the magazine director

-14:20 14:00

Network security emergency response of the new normal

He Shiping CNCert senior engineer

14:20-14:40

Customer safety operation and maintenance practice

TBD

14:40-15:00

Data leakage prevention

TBD

15:00-15:20

Virtual platform for its own protection

Yu Xiong, three communications product manager

15:20-15:40

How to determine the safe operation and maintenance structure and design

Guo Feng Taiji Computer Corp information security and self controlled IT SBU consulting department general manager

15:40-16:00

Next generation security operation and maintenance management platform

Wang Gang netlegend Technology (Beijing) vice president of Limited by Share Ltd

16:00-16:20

Internet Security Management in the cloud Era

Zuo Yingnan, vice president of Health Technology

16:20-17:00

Round table: no boundary

All the guests

Mobile Security Forum
13:30-14:00

Secret latest mobile malicious attack method

Professor Chen Yan USA Northwestern University Department of electrical engineering and computer science, Zhejiang University Professor

14:00-14:30

Major flaws in Android vulnerability

Zhou Yajin 360 Wireless Security Research Institute

14:30-15:00

The latest iOS platform significant security improvements as well as potential attacks

Pangu team chief scientist Wang Tielei

15:00-15:30

Research on TrustZone security attack and defense of Android system

Di Di 360 company security researcher

15:30-16:00

The latest trends in mobile virus sharing

General manager Pan Xuanchen antiy labs Wuhan mobile security company

16:00-16:30

APP Android security analysis

Tang Zhushou Mobei, founder of Shanghai Jiao Tong University science and technology

16:30-17:00

Mobile security architecture and defense strategy

Mobile phone equipment manufacturers

报名及缴费流程

1
注册购票账号:已有CSDN账号的购票者可直接使用CSDN ID登陆进行购票,没有CSDN账号的购票者需先注册CSDN账号,再进行购票。
2
选择购票类型:选择您所需门票类型,点击”立即购买”;
3
填写订单信息:包括订单人基本信息以及联络电话等;
4
购买流程:确认订单信息,选择支付方式并填写发票信息以及参会者信息,提交订单;
5
付款:Can choose any kind of payment: A, Alipay B, enterprise transfer;
Six
After payment, you can check system sends out messages in the links, "payment" page of "my order", into the "I", click on the corresponding conference "view ticket information", after entering the "attendance", on the right side of the page, click "print tickets", fill in the attendance information, print tickets, you can. After the success of the ticket you will receive email and SMS confirmation.
 
If you encounter any problems, please contact the logistical team please print electronic tickets to the site to participate in the general assembly.

Payment instructions

Alipay payment

Account information:Meeting@PROG3.COM

Reminder: Alipay account for real-time system, please keep your Alipay has the enough amount of payment

Enterprise transfer payment

Company name: Jiangsu is known as the Computer Co., Ltd.

Bank: Beijing branch of China Merchants Bank Wangjing branch

Address: No. 15, No. 1, Beijing South Road, Chaoyang District, No.

Bank account:110914311910104

Ticket description

1 different discount period, the ticket is not to enjoy the preferential price, in September 16, 2015, in order to avoid missed the discount period, please buy your ticket as soon as possible.

2 one-time purchase of more than 5 copies (including 5) of the general assembly of the tickets, you can enjoy the group price.

. buy conference two days pass, can participate in the September 29 and 30, all agendas and activities (only limited by invite someone to agenda except), enjoy free lunch meeting on the 29th and 30th, get the free catalogue, fine gifts and conference speakers ppt.

4 if you need to open the invoice, please fill in the purchase information, fill in the invoice information, invoice content for training fees, conference fees.

Common problem

Q1: if you want a refund, if you can return the full payment?

A: as of September 18th, 23:59 can be a full refund of the full invoice, net of 300 yuan fee; after September 19th 00:00 will not refund.

Q2: the day of the assembly can be on-site ticket?

A: yes. Conference site as well as in September 16th, the full price ticket price recovery.

Q3: if the mail deleted leading ticketing lost, how to ensure the normal ticket or attend the meeting?

A: you can contact the ticket business for you to send an electronic ticket, or in your participants the day by identity card and ticket purchase invoice ticket.

Number of participants:
One Two Eight
People

Time and place

  • Time: 29, 8, 9, 0, 0, 18, 30, 9
  • Setting: Chaoyang District National Convention Center, Beijing

Contact us

If you want to publish a meeting at the CSDN conference platform, please contact us: Contact: Miss Geng Phone: 010-64720135
Email: isc2015@PROG3.COM