Program

/

CODE BLUE 2024

Contests/Workshops

Contests/Workshops (The details of each event will be updated as needed, so please check back for the latest information. )

Contests

  • NEC Security Skills Challenge(CTF)

    The NEC Group holds the "NEC Security Skills Challenge (CTF)" for employees every year with the aim of discovering and developing security talent. NEC security professionals create questions based on their work experience, and in this workshop, employees will actually solve the questions. We look forward to seeing everyone with an interest in security take on the challenge!

    • Date :

      • Nov, 15th 9:00-16:00

    • Location :

      • Track 2(HALL A)

    • Share :

  • Car Hacking Village

    The CODE BLUE 2024 Car Hacking Village will feature a plethora of automotive cybersecurity and car hacking content! This year's village will feature scheduled workshops by vehicle security experts, sponsored exhibits by leaders in the automotive cybersecurity industry, and an open testing area - giving everyone access to automotive hardware targets and security testing tools!

    • Date :

      • Nov, 14th 10:00-16:00

      • Nov, 15th 10:00-16:00

    • Location :

      • Track 2(HALL A)

    • Share :

Workshops

  • SecuriTTX for Everyone (Tabletop Excercise)!

    Did you notice the portmanteau word created by combining “Security” and “TTX”?
    When an incident occurs in the cyber domain, a large volume of diverse and incomplete information and requests flow in from many directions, causing confusion and delay in response, which in some cases can lead to increased damage.
    As a countermeasure, our CSIRTs are experienced through TTX in preparing for cybersecurity incidents.
    This time, through the TTX of “Incident Scenarios Based on Familiar Events,” participants will consider, discuss, and gain insight into how to respond based on their own organization, position, and job title.
    Through the exercise task discussion, participants will deeply consider the importance of individual roles and key points of cooperation.

    • Date :

      • Nov, 14th 10:00-18:00

      • Nov, 15th 10:00-16:30

    • Location :

      • Track 2(HALL A)

    • Share :

  • Introduction to incident response caused by cloud configuration

    As cloud use in companies has increased in recent years, incidents such as customer data leaks caused by cloud settings have become a frequent topic of discussion.
    In this workshop, you will gain a systematic, hands-on experience of how to resolve "incidents caused by cloud settings.

    • Date :

      • Nov, 14th 10:00-18:00

    • Location :

      • Track 2(HALL A)

    • Share :

  • Hacking Active Directory

    Active Directory is used by many organizations as the core of their authentication infrastructure. Since Active Directory is a directory service that centrally manages all resources within an organization, it is the first target of an attacker who infiltrates the organization's internal network. Understanding the methods of attack against Active Directory can help prevent serious damage and, even if it is compromised, can help with early recovery and cause investigation.

    • Date :

      • Nov, 14th 10:00-18:00

      • Nov, 15th 9:00-16:30

    • Location :

      • Track 2(HALL A)

    • Share :

  • Cyber Range Exercise

    A blue team exercise centered around cybersecurity incident response. This exercise simulates cyber attacks on enterprises, where participating teams play the role of a cyber incident response team. They analyze a large volume of threat alert data and system logs to trace the attackers' footsteps and respond correctly to the attack incidents, thereby enhancing the enterprise's defense capabilities against cybersecurity threats.

    • Date :

      • Nov, 14th 10:00-18:00

    • Location :

      • Track 2(HALL A)

    • Share :

  • Offensive security operations: Building adversary emulation engagements

    The hands-on workshop is designed to give participants a better understanding of adversary emulation engagements. Attendees will learn to emulate various threat actors safely in a controlled, enterprise-level environment. All machines in the lab will be equipped with antivirus software, web proxies, EDR, and other defense systems. The training will include detailed modules on each attack vector used in the lab and step-by-step breakthroughs of the attack path across an entire enterprise network. This training aims to help attendees assess defenses and evaluate the security controls deployed in their organization against motivated adversaries. The second day of the workshop will introduce a hands-on contest to the participants, where they can use the skills learned from the workshop to solve a list of challenges and win goodies/prizes. The contest will allow the participants to perform hands-on Adversary emulation and red teaming skill-set they have learned from the workshop. There will be cool prizes and goodies for the top contest participants.

    • Date :

      • Nov, 14th 10:00-18:00

    • Location :

      • Track 2(HALL A)

    • Share :

  • Android Security - Hacker's Guide

    Android Security is not new. But when it comes to offensive or defensive side of android security, there are always challenges which looks easy to solve but at times its trivial . This workshop will take participants through journey of some of those very interesting challenges, like bypassing SSL pinning in modern android apps, hacking android deeplinks, effectively finding hardcoded secrets on android apps using MORF.

    • Date :

      • Nov, 14th 10:00-18:00

    • Location :

      • Track 2(HALL A)

    • Share :

  • Bio Hacking Village

    Biohacking Village has always been committed to bringing together experts from around the world that we unite healthcare, technology, and cybersecurity professionals to explore the latest innovations in biomedical security.

    • Date :

      • Nov, 14th 10:00-18:00

      • Nov, 15th 9:00-16:30

    • Location :

      • 1F Meetingroom 1

    • Share :

  • Kunoichi Cyber Game

    The international women’s CTF "Kunoichi Cyber Game" for young participants is not only about acquiring security skills but also about building a network with peers across countries who share an interest in cybersecurity.

    • Date :

      • Nov, 14th 9:45-15:00

      • Nov, 15th 10:00-15:00

    • Location :

      • 1F Meetingroom 2

    • Share :

  • Cyber TAMAGO :Share cybersecurity tools and ideas

    It is an space to present tools, code and ideas related to cyber security, build confidence and prepare presenter to showcase in big domestic and internationals conferences such as BlackHat Arsenal, DEFCON Demolabs, CODEBLUE Bluebox. Anyone below is welcome to join.

    • Date :

      • Nov, 15th 9:00-16:00

    • Location :

      • B1F Room 1

    • Share :