China Internet Security Conference 2015

Chaoyang District National Convention Center, Beijing, September 29, 2015 - September 30, 2015

Meeting introduction

All second participants of the conference ticket purchase stage, will be at ISC value of 600 yuan luxury spree.

 

 

Ticket discount

 

Ticket type First stage
7.13-8.9
Second stage
8.10-9.15
Third stage
9.16-9.27
General assembly two pass $1080 $1440 $1800
Group tickets (5 or above) $980 $1340 $1600
Student ticket $360 (Limited Edition)
Rights and interests Two day of the conference admission rights + two days of rich lunch + meeting information + gift + guest after the PPT Download

Note: the purchase of student tickets, students need to show their student ID card. If you can not produce a student card, you need to fill in the difference between the students and non student tickets on the spot.

Activity introduction

2015 China Internet Security Conference (ISC) will be held from September 28, 2015 to September 30th at the Beijing National Convention center. This session of the general assembly of the people's Republic of China State Internet Information Office Network Security Coordination Bureau, industry and Information Technology Department of Network Safety Management Bureau, Ministry of public security and network security Security Bureau guidance, jointly organized by the China Internet association and the center for Internet Security 360, has received national computing machine network Emergency Coordination Center, the National Computer Virus Emergency Response Center, China Information Security Evaluation Center, China Association of Cyberspace Security and China Information Security Certification Center relevant state agencies support.

As the Asian region in the field of information security the largest and most professional annual meeting, 2015 China Internet security conference, will explore in depth the global trend of information security, share the forefront security technology research and practice, focus on the national cyberspace security, information security industry development, cloud security, networking security, mobile security, data security, emerging threats, security software and computer forensics hot technology and industry topics. 2015 ISC will also increase the threat of intelligence and other topics of concern, as well as support for security innovation. 2015 ISC will set up 12 forums, in depth discussion and exchange of popular security issues.

2015 ISC evolution of the guests a higher specification, more powerful lineup. Both United States of network security forces commander and other domestic and foreign officials, including burner, Palo Alto networks, such as Google well-known enterprises technology executives, and all kinds of new corporate security technical supervisor. 2015 ISC will be a feast of information security technology.

In addition to the expert's wonderful speech, the 2015 Internet security conference will include security training, exhibition, offensive and defensive games, business exchanges and other forms, designed to create more opportunities for participating enterprises and users to exchange and learning.

2015 China Internet Security Conference in advance of the scale. ISC 2013 participating passengers nearly a million people, more than 40 exhibitors; ISC 2014 more than 20 thousand people, participating institutions as many as 80. ISC2015 audience is expected to be more than a million, more than 120 exhibitors.

Activity schedule

  • September 29th
  • September 30th
Security Leadership Summit
9:00-9:05

Opening speech

Wu Hequan - academician of Chinese Academy of Engineering

9:05-9:10

The message

Guo Qiquan, chief engineer, researcher, PhD supervisor, network security and Security Bureau, Ministry of public security

9:10-9:15

Welcome speech

President Qi Xiangdong 360

9:15-10:00

Network warfare and infrastructure security protection; national network security and security industry

Commander Keith B. Alexander - former director of the U.S. National Security Agency's first cyber command

10:00-10:30

In the face of pain, to seek a win-win situation: to create a new network space security order

Order Hao Yeli - vice president of the national development and innovation strategy

10:30-11:00

Cloud security and security in the future

Heiser Gartner - vice president of Jay research

11:00-11:30

National Cyber Security Strategy

Assistant director, Institute of information and social development, associate director, Institute of information and social development, China Institute of contemporary international relations

11:30-12:00

See: given the user, in particular, the ability to see the security threat is the key

Zhou Hongyi 360 company chairman and CEO

New threat Forum
13:30-14:00

Emerging malicious software constitutes a new threat to global security

Alto Palo - Asia Pacific Technical Director

14:00-14:30

Using artificial intelligence technology to do the unknown threat detection terminal

CEO/ Cylance founder McClure Stuart

14:30-15:00

Using APT's CA attacks and defense

Symantec Asia Pacific Technology Director, global CA/Browser forum and code signing Working Group Chairman

15:00-15:30

APT attack case analysis

Hu Xingru 360 Senior Security Specialist

15:30-16:00

From 0day capture to APT analysis of Chinese government agencies

Li Baisong - the first deputy chief engineer of antiy Labs

16:00-16:30

ROP detection under the insertion of 0day dynamic detection

Wu Zhuoqun, head of the Hangzhou Institute of safety and security

16:30-17:00

Clone SIM 3G/4G card using a PC and oscilloscope

Yu Yu Shanghai Jiao Tong University

Cyber Space Security Strategy Forum
14:05-14:10

Guest address

undetermined

14:10-14:30

Theme: the construction of the national network space security system in the era of big data

He Dequan - academician of Chinese Academy of Engineering

14:30-14:50

Theme: Network Security Law on the significance and impact of the construction of national cyberspace security

Ma Minhu - Professor, Law School of Xi'an Jiao Tong University, director of the center for information security law

15:10-16:00

Peak dialogue: new challenges and new order in Cyberspace

Moderator: Tan Xiaosheng - vice president of Qihoo 360 intends to invite the guests: Wang Shiwei - Shanghai Academy of Social Sciences Information Research Institute Li Yuxiao - Beijing University of Posts and telecommunications, Internet Governance and law research center director Fang Xingdong - internet lab director Hai Xin Duan - Tsinghua University network science and cyberspace Institute of network and information security laboratory director Wang Chunhui - Nanjing University of Posts and Telecommunications Professor, Information Industry Development Strategy Research Institute President Xiao Xinguang - Lab Antian chief architect

16:00-16:50

Peak dialogue: "development strategy of network Belt and Road Initiative" strategy of the

Host: Professor Lvben Fu - University of Chinese Academy of Sciences Institute of management intends to invite guests: Wang Yukai - the National Advisory Committee for information technology committee, director of the National School of administration Professor Yang Yixian - Beijing University of Posts and telecommunications information security center an associate professor of Institute of Institute of world economy, Li Jianhua, Shanghai Jiaotong University School of information security engineering, vice president of the Xu Weidi - National Defense University Institute for Strategic Studies Shen Yi - Fudan University International Relations and School of public affairs Baisheng - Ministry of Commerce International Trade and economic cooperation

16:50-17:00

 

Free exchange

Cloud Computing Security Forum
13:30-14:00

Adaptive security architecture for cloud computing platform

Zhang Xiaobing 360 security experts

14:00-14:30

The practice of security cloud storage and transportation

Shell (Xu Zhixiang) seven cattle Safety Supervisor

14:30-15:00

How to solve the problem of massive DDoS attacks

Ou Huaigu, chief security officer ChinaNetCenter

15:00-15:30

Thinking on enterprise security protection under the new IT environment

Li Yanbin, Minister of communications security products three

15:30-16:00

Intrusion detection and threat discovery on cloud computing platform

Fang Yong UCloud security center director

16:00-16:30

Analysis of Docker security architecture

Ai Qiwei (Eagle) China tripod network space Safe Technology Ltd senior vice president /CTO

16:30-17:00

The practice of secure cloud platform SDN

Wang Yi like cloud CEO

Security Management Forum
13:30-14:00

The differences and trends of IT security operation between China and America

Liu Jingping "network operation and maintenance and management" magazine

-14:20 14:00

New normal network security emergency response

He Shiping CNCert senior engineer

14:20-14:40

Customer safety operation and maintenance practice

undetermined

14:40-15:00

Data leakage prevention

undetermined

15:00-15:20

Virtualization platform's own protection

Yu Xiong three communications product manager

15:20-15:40

How to determine the security architecture and design of operation and maintenance

Guo Feng, general manager of information security and self controlled IT SBU Consulting Department of Taiji Computer Corp

15:40-16:00

Next generation security management platform

Netlegend Wang Gang Technology (Beijing) vice president of Limited by Share Ltd

16:00-16:20

Internet Security Management in the cloud Era

Zuo Yingnan, vice president of science and technology

16:20-17:00

Round table: no boundaries

All guest

Mobile Security Forum
13:30-14:00

Secret of the latest mobile malicious attacks

Professor Chen Yan of the Northwestern University Department of electrical engineering and computer science, Zhejiang University Professor

14:00-14:30

Major flaws in Android vulnerability

Zhou Yajin 360 Wireless Security Research Institute

14:30-15:00

Significant security improvements and potential attacks on the latest iOS platform

Pangu team chief scientist Wang Tielei

15:00-15:30

Research on TrustZone security attack and defense in Android system

Shen Di 360 company security researcher

15:30-16:00

Mobile virus to share the latest trend

General manager Pan Xuanchen Wuhan antiy labs mobile security company

16:00-16:30

APP Android security analysis

Tang Zhushou, founder of Shanghai Jiao Tong University science and technology Mobei

16:30-17:00

Mobile security architecture and defense strategy

Mobile phone equipment manufacturers

报名及缴费流程

注册购票账号:已有CSDN账号的购票者可直接使用CSDN ID登陆进行购票,没有CSDN账号的购票者需先注册CSDN账号,再进行购票。
选择购票类型:选择您所需门票类型,点击”立即购买”;
填写订单信息:包括订单人基本信息以及联络电话等;
购买流程:确认订单信息,选择支付方式并填写发票信息以及参会者信息,提交订单;
付款:Can choose any kind of payment: A, B, Alipay enterprises transfer payment;
Six
After payment, you can check system sends out messages in the links, "payment" page of "my order", into the "I", click on the corresponding conference "view ticket information", after entering the "attendance", on the right side of the page, click "print tickets", fill in the attendance information, print tickets, you can. After a successful date, you will receive a confirmation email and sms.
 
If you encounter any problems, please contact the logistical team please print electronic tickets to the site to participate in the general assembly.

Payment instructions

Alipay payment

Account information:Meeting@PROG3.COM

Reminder: Alipay for real-time arrival, please keep your used Alipay within this payment enough amount

Enterprise transfer payment

Company name: Jiangsu knowledge of Computer Co., Ltd.

Bank: China Merchants Bank, Beijing branch, Wangjing branch

Address: No. 1, No. 15 South Lake South Road, Chaoyang District, Beijing, No.

Bank account:One hundred and ten trillion and nine hundred and fourteen billion three hundred and eleven million nine hundred and ten thousand one hundred and four

Ticket description

1 different discount period fare is different from the purchase price in September 16, 2015 is no longer enjoy preferential prices, in order to avoid the discount period, please purchase as soon as possible.

2 one-time purchase of more than 5 (including 5) conference tickets, you can enjoy the group price.

. buy conference two days pass, can participate in the September 29 and 30, all agendas and activities (only limited by invite someone to agenda except), enjoy free lunch meeting on the 29th and 30th, get the free catalogue, fine gifts and conference speakers ppt.

4 if you need to issue invoices, please fill in the purchase information, fill in the invoice information, invoice content for training fees, conference fees.

Common problem

Q1: if you want a refund after the purchase, you can refund the full amount?

A: as of September 18th 23:59 can be based on the invoice in full refund, net of 300 yuan fee; September 19th 00:00 will not refund.

Q2: the day of the general assembly can live ticket?

A: Yes. General assembly site and since September 16th, the price of the full price.

Q3: if the mail deleted cause ticket is lost, how to ensure the normal ticket or attend the meeting?

A: you can contact the ticket business for you to send an electronic ticket, or in your participants the day by identity card and ticket purchase invoice ticket.

Number of participants:
One Two Eight
people

Time and place

  • Time: September 29th 08 when 00 points - 18 in September 30th, 00 points
  • Venue: Chaoyang District National Convention Center, Beijing

contact us

If you want to publish a conference on the CSDN conference platform, please contact us: Contact: Miss Geng Tel: 010-64720135
Mailbox: isc2015@PROG3.COM