Date: 29-Jul (Sat)
Time: 9:00am – 12:30pm
Venue: ADC 202, HKU SPACE Admiralty Centre, Admiralty
Register: https://bit.ly/pisajam2023 (Priority would be accorded to PISA members)
Let’s have a Security Jam!
Mark your calendars for PISA Jam 2023, our upcoming annual event focused on cybersecurity. Join us for a day of informative sessions and engaging activities designed to enhance your understanding of the latest trends, threats, and solutions in the field. From expert speakers to hands-on workshops, PISA Jam 2023 has it all. Whether you’re a seasoned cybersecurity professional or just starting out, this event offers valuable insights and networking opportunities. Don’t miss out on this exciting event – register today!
[9:00-9:15] Registration / Social Networking
[9:15-9:30] Opening Speech – by PISA
[9:30-10:05] Topic: Physical Protection System basics and design – by Mr. Rex Lam, ASIS HK Chapter
[10:05-10:40] Topic: From Personal Data Protection to Cybersecurity – How do they work under employment laws in Hong Kong – by Ms. Milly Hung, Head of Employment, Litigation, Disputes Resolution & Arbitration (Profile)
[10:45-12:15] – Hands-on Workshop: The new challenges in DFIR – by Mr. Frankie Li, Cybersecurity practitioner
In the Workshop, Frankie will share his knowledge on the difference between Digital Forensics and DFIR. He will provide insights on the latest development of how to investigate cyber attacks with DFIR tools.
The attendants will be provided with a VM installed with tools to perform a triage on DFIR case.
To know more:
- Kroll Artifact Parser and Extractor (KAPE) Official Demo (in English) https://youtu.be/DXE0INTu9ek
- Triage with KAPE (in Cantonese) https://youtu.be/MhcjlUOabjo
Please bring and prepare your laptop computer for the Hands-on Workshop session.
PISA and (ISC)2 HK Chapter members have higher priority to join this seminar.
Three CPE can be claimed for (ISC)2 for each attendance.
For any question, please send an email to email@example.com or send a message via m.me/pisahkg to seek our support, thanks.