Á¤º¸¾È³»°øÁö»çÇ×
Ŭ¶ó¿ìµåº¸¾ÈÄÁÆÛ·±½º CLOUDSEC 2015 Âü°¡½Åû ¾È³» 
 

Çà»ç¼Ò°³

CLOUDSEC 2015´Â Ŭ¶ó¿ìµå º¸¾ÈÀÇ ¼¼°èÀû ¸®´õ Æ®·»µå¸¶ÀÌÅ©·Î¿Í (»ç)Çѱ¹Å¬¶ó¿ìµåº¸¾ÈÇùȸ°¡ °øµ¿ ÁÖÃÖÇÏ´Â ±¹³» ÃÖ´ëÀÇ Å¬¶ó¿ìµåº¸¾ÈÄÁÆÛ·±½ºÀÔ´Ï´Ù. Ŭ¶ó¿ìµå·ÎÀÇ ÀüȯÀ» °í·ÁÇÏ°í ÀÖ´Â »ç¿ëÀÚ¿Í Å¬¶ó¿ìµå ¼­ºñ½º¸¦ Á¦°øÇÏ´Â »ç¾÷ÀÚ¿¡°Ô Ŭ¶ó¿ìµå º¸¾È¿¡ °üÇÑ ´Ù¹æ¸éÀÇ Á¤º¸¸¦ Á¦°øÇÏ°í ÃÖÀûÀÇ Àü·«À» ¼¼¿ï ¼ö ÀÖ´Â ¹æ¹ýÀ» ¸ð»öÇÕ´Ï´Ù. Âü¼®Çϼż­ ¸¹Àº Á¤º¸¸¦ ¾ò¾î°¡½Ã±æ ¹Ù¶ø´Ï´Ù.

¡Ø ÀÚ¸®¿¡ ÇÑÁ¤ÀÌ ÀÖ¾î Âü°¡½ÅûÀ» ÇϽŠÈÄ 
¡®»çÀüµî·Ï ¿Ï·á¡¯ ¸ÞÀÏÀ» ¹ÞÀ¸½ÅºÐ¿¡ ÇÑÇÏ¿© Âü¼® °¡´ÉÇÕ´Ï´Ù.

¾ÆÁ¨´Ù

½Ã°£

¹ßÇ¥³»¿ë

9:30

µî·Ï ¹× ÀÔÀå

10:00

°³È¸»ç
(
»ç)Çѱ¹Å¬¶ó¿ìµåº¸¾ÈÇùȸ À±¼®Áø ȸÀå / EYÇÑ¿µ Àü¹«ÀÌ»ç

10:05

ȯ¿µ»ç: Ŭ¶ó¿ìµå º¸¾ÈÀÌ ¿Ö À̽´·Î ´ëµÎµÇ´Â°¡?
Á¤º¸º¸È£GRC Æ÷·³ ÀÇÀå, ±èÁ¤´ö ±³¼ö / Áß¾Ó´ë »ê¾÷º¸¾ÈÇаú

10:10

±âÁ¶¿¬¼³ 1: Expect the unexpected
CSA Korea Chair
¹Ú»óÇö

10:40

±âÁ¶¿¬¼³ 2: New Paradigm of Enterprise IT Outsourcing and its Security
KT
Á¤¹®Á¶ »ó¹«

11:10

±âÁ¶¿¬¼³ 3: ±â¾÷»ç¿ëÀÚ °üÁ¡ÀÇ Å¬¶ó¿ìµå º¸¾È °úÁ¦
LG
ÀüÀÚ Á¤º¸º¸¾È½Ç ±èÀç¼ö ½ÇÀå

11:40

±Û·Î¹ú Ŭ¶ó¿ìµå ¼­ºñ½º ºÐÀï»ç·Ê¿Í ±³ÈÆ
Å×Å©¾Ø·Î ±¸Å¾𠺯ȣ»ç

12:10

Á¡½É½Ä»ç & Àü½ÃºÎ½º °ü¶÷

Æ®·¢ 1

Æ®·¢ 2

½Ç½À°­ÀÇ

13:20

VMware ±â¹Ý SDDC ȯ°æ¿¡¼­ÀÇ Security
ÀϾƿÀÇ Àå¸í½Ä »ó¹«

Ŭ¶ó¿ìµå º¸¾È Best Practies
Æ®·»µå¸¶ÀÌÅ©·Î ±è¼®ÁÖ Â÷Àå

ÇÁ¶óÀ̺ø, ÆÛºí¸¯, ÇÏÀ̺긮µå Ŭ¶ó¿ìµå¸¦ À§ÇÑ ÀÚµ¿È­ º¸¾È ½Ç½À °­ÀÇ

Àå¼Ò : ¼³¾Ç·ë

¼¼¼Ç 1
13:15
14:00

¼¼¼Ç 2
14:15
15:00

¼¼¼Ç 3
15:15
16:00

¼¼¼Ç 4
16:15
17:00

14:00

Ŭ¶ó¿ìµå ±â¹Ý À¥¼­ºñ½º¸¦ À§ÇÑ ÅëÇÕ º¸¾È Àü·«
UMV
±â¼ú ±è»ó¹Î »ó¹«

Event-driven security for next-generation applications
MARKKU LEPISTÖ, PRINCIPAL TECHNOLOGY EVANGELIST, AWS

14:40

Microsoft Trusted Cloud
¸¶ÀÌÅ©·Î¼ÒÇÁÆ® ½ÅÁ¾È¸ ÀÌ»ç

Ŭ¶ó¿ìµå º¸¾È À§ÇùÀÇ »ç·Ê, AWS¸¦ Áß½ÉÀ¸·Î
¸Þ°¡Á¸ ±â¿µ»ï »ó¹«

15:20

È޽Ľð£

15:40

Ŭ¶ó¿ìµå À¥ º¸¾È ¹æ¾È
Æ柽ÃÅ¥¸®Æ¼ ±èÀǼ® ÀÌ»ç

Ŭ¶ó¿ìµå»ó¿¡¼­ÀÇ µ¥ÀÌÅÍ ¾Ïȣȭ ¹æ¾È
º¸¸ÞÆ®¸¯

16:20

¡®Man in the Cloud¡¯ Attack
½ºÆ¿¸®¾ð ½Åµ¿ÈÖ ±â¼úÀÌ»ç

±Û·Î¹ú ÇÁ·¹ÀÓ¿öÅ© ±â¹Ý¿¡¼­ÀÇ Å¬¶ó¿ìµå À§Çè ½Äº°°ú °ü¸® ÇÁ·Î¼¼½º
BSI Korea
¼ÛÀϼ· À§¿ø

17:00

°æÇ°Ãß÷ ¹× Æóȸ

Çà»ç¾È³»

¡¤         º»Çà»ç´Â ¹«·áÀ̸ç, ´çÀÏ ¹«·á ÁÖÂ÷±ÇÀÌ Á¦°øµË´Ï´Ù.

¡¤         ¼±Âø¼øÀ¸·Î ¿À½Ã´Â 350ºÐ²²´Â Á¡½É½Ä»ç ¹× Àü½ÃºÎ½º °ü¶÷ÀÌ Á¦°øµË´Ï´Ù.

¡¤                   ÀÚ¸®¿¡ ÇÑÁ¤ÀÌ ÀÖ¾î Âü°¡½Åû ÇϽŠÈÄ ¡®»çÀüµî·Ï ¿Ï·á¡¯ ¸ÞÀÏÀ» ¹ÞÀ¸½ÅºÐ¿¡ ÇÑÇÏ¿© Âü¼® °¡´ÉÇÕ´Ï´Ù.

°æÇ°¾È³» *½ÇÁ¦ Á¦°øµÇ´Â °æÇ°Àº À̹ÌÁö¿Í ´Ù¸¦ ¼ö ÀÖ½À´Ï´Ù.

Âü¼®ÀÚ ±â³äÇ°

¾ó¸®¹öµå ±â³äÇ°

Àü½ÃºÎ½º Åõ¾î °æÇ°


Jazz
ÀÌÁߺ¸¿Â
º¸³Ã ÅÒºí·¯


¹«¼±¸¶¿ì½º
(
¼±Âø¼ø ÀÔÀå 30¸í)


³×½ºÇÁ·¹¼Ò
Ä¿ÇǸӽÅ


º¸½º ºí·çÅõ½º
½ºÇÇÄ¿


¿õÁø
°ø±âûÁ¤±â


È£ÅÚ 2ÀÎ
ºßÆä±Ç

ÁÖÃÖ

Ç÷¡Æ¼´½ ½ºÆù¼­

°ñµå ½ºÆù¼­

½Ç¹ö ½ºÆù¼­


Çà»ç¹®ÀÇ

CLOUDSEC 2015 Çà»ç ¹®ÀÇ
Tel. 02-6425-6515
¤Ó E-mail. admin@cloudsec.co.kr

Copyright Trend Micro Incorporated. All rights reserved. 
www.cloudsec.com/kr