In the era of big data, the historical opportunity of new technology innovation and development is mixed with security risks and challenges, which puts forward new requirements for network and information security. It is becoming more and more important and critical to excavate and analyze information security vulnerabilities and comprehensively control network security risks. Recently, the 8th Information Security Vulnerability Analysis and Risk Assessment Conference (VARA20 15) was held. The theme is "Vulnerability analysis and risk assessment technology in the era of big data". The conference was hosted by China Information Security Evaluation Center, hosted by Beijing Jiaotong University and co-organized by Tsinghua University. More than 800 guests from government departments, universities, research institutions, information security industry and application units attended.
Li Shoupeng, deputy director of China Information Security Evaluation Center, presided over the meeting, Zhu Shengtao, director of China Information Security Evaluation Center, and Ning Bin, president of Beijing Jiaotong University, delivered welcoming speeches respectively, and Hu Xiao, deputy director of the Network Security Coordination Bureau of the Central Network Information Office, made an important speech. Academician He Dequan from China Academy of Engineering, Academician Wang Yue from both academies, Academician Ni Guangnan and Academician Fei from China Academy of Engineering, and Party Secretary Wu Shizhong from China Information Security Evaluation Center attended the meeting. Academician He and Academician Ni made important speeches. Director Wang Na of the High-tech Industry Department of the National Development and Reform Commission gave a keynote speech on "Promoting the Innovation and Development of Big Data and Strengthening the Security of Big Data". National information security authorities, relevant national ministries and commissions, experts and scholars, large-scale industry representatives and well-known enterprises shared the latest achievements in theory, methods, technology and practice in this field around the theme of the conference.
At the same time, the conference held the awarding ceremony of the third batch of technical support units of China National Information Security Vulnerability Database (CNNVD), and thirteen units were awarded the titles of first, second and third level support units of the vulnerability database respectively. Among them, there are 3 first-class companies: CLP Great Wall Internet System Application Co., Ltd., Beijing Yun Jian Youdao Technology Co., Ltd. and Beijing Jiangnan Tianan Technology Co., Ltd.; Grade II * * * III: Beijing Anxin Tianxing Technology Co., Ltd., Beijing Jinlong Xin 'an Technology Co., Ltd. and Beijing Yongxin Zhicheng Technology Co., Ltd.; Seven third-class * * * companies: Beijing Zhongce Anhua Technology Co., Ltd., Shanghai Douxiang Information Technology Co., Ltd., Shenzhen Mibai Xin 'an Technology Co., Ltd., Beijing Yangpu Ye Wei Technology Development Co., Ltd., Yuanjiang Shengbang (Beijing) Information Technology Co., Ltd., Chengdu Kelai Software Co., Ltd. and Donglun Technology (Beijing) Co., Ltd. In addition, in order to better commend and reward CISP Certification staff who has made outstanding contributions to his work, Further promote the construction of information security professionals training system. CISP Operation Center of China Information Security Evaluation Center and China Information Security magazine jointly held the first CISP Outstanding Person selection activity. The conference presented awards to 10 outstanding people, namely, Kong, senior engineer of China Unicom Hebei Branch, Liu Yuan, engineer of China Petrochemical Information Management Department, Liu Zhile, chief security officer of Hangzhou Anheng Information Technology Co., Ltd., Yang Lei, general manager of Jiangsu Tianchuang Technology Co., Ltd., senior engineer of China Insurance Information Technology Management Co., Ltd., and Ban Xiaofang, associate researcher of China Information Security Evaluation Center. Xie, President of Shenzhen Luoan Technology Co., Ltd., Department Manager of Beijing Jiangnan Tianan Technology Co., Ltd., Lei Min, Deputy Director of Information Security Department of Beijing University of Posts and Telecommunications Information Security Center, and Cai Jingjing, Chairman of Beijing Yongxin Zhicheng Technology Co., Ltd.
The conference set up four sub-venues, namely vulnerability analysis, risk assessment, big data security analysis and information security in internet plus era, for special discussion. It reflects the new technologies and methods of vulnerability analysis in the era of big data from many angles and levels, shows the new ideas and practices of risk assessment in complex network and system environment, communicates the new progress in the development and assessment of information security technology in industrial control systems, and discusses the new measures of active defense of information security from a broader perspective.
Cyberspace is increasingly becoming the strategic commanding height of international competition, and network security is related to the core interests of the future prosperity and development of all countries. In recent years, information technology software and hardware vulnerabilities are becoming the main source of all kinds of information security problems in the world, and the social and economic operation that relies heavily on network information systems is facing serious attacks from cyber crimes such as hacker attacks. China has seized the development opportunity of globalization and informatization, made advantages and avoided disadvantages, and its comprehensive strength has been continuously enhanced. Now it has become a global informatization development power. However, with the deepening of the informatization process, the problems of network and information security have become increasingly prominent, which has become a new comprehensive challenge facing China.
As an important platform for communication among industry experts, academic researchers, governments, industries and users in the field of information security, the conference on information security vulnerability analysis and risk assessment has been successfully held for seven times before, which is playing an increasingly important role in timely and comprehensively reflecting China's innovative achievements and research capabilities in the field of information security vulnerability analysis and risk assessment, exploring new ideas and methods of national information security, promoting the progress of information security technology and improving the level of information security. The successful convening of this conference has built a bridge of cooperation for the integrated development of technical exploration, industrial progress and application promotion in the field of information security, and provided a good communication platform for sharing the latest achievements and research progress of theories, methods, technologies, standards and practices in related fields.
The above is what Bian Xiao shared with you, focusing on vulnerability analysis and risk assessment in the era of big data. For more information, you can pay attention to Global Ivy and share more dry goods.