½Ã°£ |
¹ßÇ¥³»¿ë |
9:30 |
µî·Ï ¹× ÀÔÀå |
10:00 |
°³È¸»ç (»ç)Çѱ¹Å¬¶ó¿ìµåº¸¾ÈÇùȸ À±¼®Áø ȸÀå / EYÇÑ¿µ Àü¹«ÀÌ»ç |
10:05 |
ȯ¿µ»ç: Ŭ¶ó¿ìµå º¸¾ÈÀÌ ¿Ö À̽´·Î ´ëµÎµÇ´Â°¡? Á¤º¸º¸È£GRC Æ÷·³ ÀÇÀå, ±èÁ¤´ö ±³¼ö / Áß¾Ó´ë »ê¾÷º¸¾ÈÇаú |
10:10 |
±âÁ¶¿¬¼³ 1: Expect the unexpected CSA Korea Chair ¹Ú»óÇö |
10:40 |
±âÁ¶¿¬¼³ 2: New Paradigm of Enterprise IT Outsourcing and its Security KT Á¤¹®Á¶ »ó¹« |
11:10 |
±âÁ¶¿¬¼³ 3: ±â¾÷»ç¿ëÀÚ °üÁ¡ÀÇ Å¬¶ó¿ìµå º¸¾È °úÁ¦ LGÀüÀÚ Á¤º¸º¸¾È½Ç ±èÀç¼ö ½ÇÀå |
11:40 |
±Û·Î¹ú Ŭ¶ó¿ìµå ¼ºñ½º ºÐÀï»ç·Ê¿Í ±³ÈÆ Å×Å©¾Ø·Î ±¸Å¾𠺯ȣ»ç |
12:10 |
Á¡½É½Ä»ç & Àü½ÃºÎ½º °ü¶÷ |
|
Æ®·¢ 1 |
Æ®·¢ 2 |
½Ç½À°ÀÇ |
13:20 |
VMware ±â¹Ý SDDC ȯ°æ¿¡¼ÀÇ Security ÀϾƿÀÇ Àå¸í½Ä »ó¹« |
Ŭ¶ó¿ìµå º¸¾È Best Practies Æ®·»µå¸¶ÀÌÅ©·Î ±è¼®ÁÖ Â÷Àå |
ÇÁ¶óÀ̺ø, ÆÛºí¸¯, ÇÏÀ̺긮µå Ŭ¶ó¿ìµå¸¦ À§ÇÑ ÀÚµ¿È º¸¾È ½Ç½À °ÀÇ
Àå¼Ò : ¼³¾Ç·ë
¼¼¼Ç 1 13:15 – 14:00
¼¼¼Ç 2 14:15 – 15:00
¼¼¼Ç 3 15:15 – 16:00
¼¼¼Ç 4 16:15 – 17:00 |
14:00 |
Ŭ¶ó¿ìµå ±â¹Ý À¥¼ºñ½º¸¦ À§ÇÑ ÅëÇÕ º¸¾È Àü·« UMV±â¼ú ±è»ó¹Î »ó¹« |
Event-driven security for next-generation applications MARKKU LEPISTÖ, PRINCIPAL TECHNOLOGY EVANGELIST, AWS |
14:40 |
Microsoft Trusted Cloud ¸¶ÀÌÅ©·Î¼ÒÇÁÆ® ½ÅÁ¾È¸ ÀÌ»ç |
Ŭ¶ó¿ìµå º¸¾È À§ÇùÀÇ »ç·Ê, AWS¸¦ Áß½ÉÀ¸·Î ¸Þ°¡Á¸ ±â¿µ»ï »ó¹« |
15:20 |
È޽Ľð£ |
15:40 |
Ŭ¶ó¿ìµå À¥ º¸¾È ¹æ¾È Æ柽ÃÅ¥¸®Æ¼ ±èÀǼ® ÀÌ»ç |
Ŭ¶ó¿ìµå»ó¿¡¼ÀÇ µ¥ÀÌÅÍ ¾ÏÈ£È ¹æ¾È º¸¸ÞÆ®¸¯ |
16:20 |
¡®Man in the Cloud¡¯ Attack ½ºÆ¿¸®¾ð ½Åµ¿ÈÖ ±â¼úÀÌ»ç |
±Û·Î¹ú ÇÁ·¹ÀÓ¿öÅ© ±â¹Ý¿¡¼ÀÇ Å¬¶ó¿ìµå À§Çè ½Äº°°ú °ü¸® ÇÁ·Î¼¼½º BSI Korea ¼ÛÀϼ· À§¿ø |
17:00 |
°æÇ°Ãß÷ ¹× Æóȸ |