Blog

Workshop – Enhancing Organizational Defense through Purple Team Collaboration and AI Technology

Map Unavailable

Date/Time
Date(s) - 20/07/2024
9:00 am - 5:00 pm

Categories


ISACA One-Day Workshop on 20 July 2024 (Saturday)

 

Topic:

Enhancing Organizational Defense through Purple Team Collaboration and AI Technology

Speaker:

Mr. Calvin Yung

Head of Consulting and Advisory, Ensign InfoSecurity

CISSP, CCSP, CISA, CISM, OSCP, OSWE, OSEP, CRTE, GCFA

 

——————————————————————————————————————————————

Topic Enhancing Organizational Defense through Purple Team Collaboration and AI Technology
Speaker

Calvin is a seasoned cybersecurity expert with over a decade of experience in offensive security. He excels in managing security risks and enhancing cyber attack detection for multinational corporations across Hong Kong, Taiwan, and mainland China. His expertise includes penetration testing, red teaming, incident response, and security risk assessment, impacting sectors like banking, finance, insurance, retail, aviation, healthcare, and energy utilities. In consulting roles, Calvin has delivered tailored security solutions and played a key role in designing detection use cases for a major bank, ensuring iCAST compliance. His proficiency in both offensive and defensive cybersecurity makes him a strong advocate for Purple Team collaboration, leveraging AI technology to bolster defenses. Committed to community education, Calvin promotes cybersecurity awareness through Safe and Secure Online events and co-founded HK CTF, a capture-the-flag community in Hong Kong. He continues to inspire and educate future cybersecurity professionals through workshops and speaking engagements.

Synopsis In today’s dynamic cyber threat landscape, traditional defenses are insufficient against sophisticated attacks. A proactive and collaborative approach is crucial. Our workshop, “Enhancing Organizational Defense through Purple Team Collaboration and AI Technology,” bridges the gap between red and blue teams, integrating offensive and defensive strategies for optimal protection. Participants will engage in hands-on exercises and simulations, emphasizing collaboration between penetration testers (red team) and defense analysts (blue team). We will explore real-world attack scenarios to show how attackers exploit vulnerabilities and how defenders can respond in real-time. Additionally, the workshop will highlight AI’s dual role, demonstrating risks from poorly trained bots and benefits from AI-enhanced threat detection.

 

Workshop Learning Outcome

After completing the workshop, the participants will

  • Understand the importance of Purple Team collaboration in cybersecurity defense strategies;
  • Acquire practical skills in identifying and mitigating real-world cyber threats through hands-on exercises and simulations;
  • Learn effective strategies for integrating offensive and defensive security measures to enhance organizational resilience;
  • Develop insights into the risks and opportunities associated with AI technology in cybersecurity;
  • Gain practical knowledge in leveraging AI technology for threat detection, including infiltration attacks, phishing sites, and deepfake content.

 

Workshop Outline

I.        Cyber Threat Landscape in Greater China Region

–       Overview of major cyber attacker groups operating in the region

–       Industries most targeted by cyber attacks in Greater China

–       Case studies of significant cyber attacks in the region

–       Common tactics, techniques, and procedures (TTPs) used by attackers

 

II.       Purple Team Collaboration on Windows Active Directory

–       Introduction of MITRE ATT&CK Framework

–       Overview of the Lab Environment

–       Simulation of Common Attacks

    • Discovery: Techniques for network and system discovery
    • Credential Access: Methods for obtaining user credentials
    • Privilege Escalation: Exploiting vulnerabilities to gain higher privileges
    • Lateral Movement: Techniques for moving within the network
    • Exfiltration: Methods for data extraction and exfiltration

–       Strategies for detecting each type of simulated attacks

–       Leveraging AI for Infiltration Attack Detection

 

III.     Exploring AI in Cybersecurity

–       Hands-on practice with exploiting vulnerabilities in AI-powered chatbots

–       Real-time demonstration of AI models identifying and mitigating phishing sites

–       Techniques for detecting and countering deepfake content using AI

 

Target Audience Offensive and defensive security professionals, system and network administrators, and those seeking insights into artificial intelligence in cybersecurity
Prerequisites Students should have a basic understanding of cybersecurity concepts and familiarity with Windows system and offensive security.
Speaker Contact Info https://www.linkedin.com/in/calvin-yung-8b1969b9/
Workshop Lab Preparation (optional) Prior to the workshop, each participant needs to prepare a laptop computer with Internet access, equipped with:

• Kali Linux (guest OS)

• OpenVPN client

The instructor can provide onsite advice on the above.

Date 20 July 2024 (Saturday)
Time 9:00 am – 5:00 pm
Venue Room 302, 3/F, Pico Tower, 66 Gloucester Road, Wan Chai, HK

Map: Click Here

Fees
Early Bird

 

Deadline On or Before

Friday 12 July 2024

Regular

 

Deadline On
Tuesday 16 July 2024

ISACA China Hong Kong Chapter Member HK$2,500 HK$2,700
Member of Other ISACA Chapters/ HKACFE/ CPA Canada/ HKCS/ HKICPA/ IIA HK/ ASIS HK HK$2,900 HK$3,100
Non-Member HK$3,500 HK$3,700
Language Conducted in English
CPE Hour 8 CPE Hours
Deadline [Early Bird]:     12 July 2024 (Friday)

[Regular]:        16 July 2024 (Tuesday)

Registration Register Here
Remarks 1.     The workshop will be rescheduled if registrant number is less than 10.

2.     There is no refund once payment is made except the course is cancelled.

3.     Please keep the certificate as a CPE proof.

Enquiries Please contact our Administrative Team at (+852) 2528 3772 or email to events@isaca.org.hk