“Talent is both saturated and scarce.” Some people in the industry evaluate the current situation of the security industry, the upper lack of talent, the lower talent saturation.


Under the strict management of the information security major, there are not many talents in China who have been trained in information security. But in such inadequate resource conditions, still born a batch of a batch of top security people.


When the change in security came in a gentle but powerful way, they left the campus and threw themselves into the mysterious wheat field of cybersecurity.


If the enterprise can be divided into different groups according to the strategy, then the “people” in the enterprise can also be analyzed according to some characteristics of the law.


Now, the relevant senior executives are sorted and distinguished according to the urban regions where their colleges and universities are located. They can be roughly divided into seven factions: Xi ‘an, Hefei, Harbin, Shanghai, Hangzhou, Wuhan and Beijing.


The universities of these cities produce students scattered in the security circles of various fields.


The seven schools, or by research and development, or scientific research, or management, or investment, or strategy, have become the hot entrepreneurial group, and also become the incubator cradle of many technology enterprise executives.


With China’s network security to the top of the journey, they have sweat and tears, there are ideals have high light, in the security of this theme constantly polished, tempered, for security into the power of The Times.

First, to introduce the 20 big guns?

Xi ‘an: Xi ‘an Jiaotong University, Xi ‘an Electric Power University, Xi ‘an University of Technology

Chairman and CEO of 360 Group: Zhou Hongyi

Zhou Hongyi studied in the Department of Computer Science, School of Telecommunication and Telecommunications, Xi ‘an Jiaotong University, and then got a master’s degree in System Engineering, School of Management, Xi ‘an Jiaotong University.

When Zhou Hongyi appeared in the industry in 1999, it came across as more of a technologist.

3721, the company he founded, provides users with Chinese Internet service, users do not need to remember complex domain name, in the browser address bar directly enter the Chinese name, can direct to the enterprise website or find the enterprise, product information.

He led 360 to go public on the New York Stock Exchange in the US, and then to return to A-shares from the privatization of US stocks. Two years later, 360 Enterprise Security changed its name to 360 Government and Enterprise Security. 360 under his leadership, the birth of numerous network security giants.

From a 15-year-old determined to be engaged in computer, to recommended to Xi ‘an Jiaotong University computer major; From selling anti-virus cards when I was in school to leaving Peking University Founder, founded 3721; From becoming the president of China Yahoo, to change the Internet pattern of the 3Q war; From free antivirus to 360 successfully listed in the United States……

With the obsession and love for computers, the growth of Zhou Hongyi is due to the rise of the tide of the Internet in China, and also due to my personal persistence.

The self-described “never get the order of the society of the little red flower” bear child, in the Internet industry for more than 30 years, now Zhou Hongyi manages a huge network security empire.

CyberTech CEO: Tan Xiaosheng



Tan graduated from the Computer Science and Engineering Department of Xi ‘an Jiaotong University in 1992, majoring in Computer Applications.

Technical background, a wide range of experience but extremely rich.

During the university, as the second author published “disk encryption and decryption practical technology”.

Then I started my own business. I did program development, research and development management, project management, operating system, system integration, and even sales. I became the vice president of sales in South China region.

Since 2003 he has served as director of technology development at 3721, chief technology officer of MySpace China, chief operating officer of MySpace China and chief technology officer of Yahoo China.

With more than 20 years of experience in the security circle, based on his familiarity with various positions, Tan Xiausheng is adept in the construction, management and talent training of technical teams.

Although they are not named as mentors, they can be found in Internet companies such as Tencent, Alibaba and Sina, and are known as “President Tan”.

In July 2009, at the invitation of our alumni Zhou Hongyi, we joined 360 and became the brothers of Zhou Hongyi and Qi Xiangdong.

In 360, Tan Xiausheng did not have a fixed Title, and he was in charge of a variety of businesses successively. He served as strategic investment director, vice president, chief privacy officer, deputy general manager, chief security officer and other positions. He was also named as “fire captain” because he was ordered in times of crisis.

During the nearly 10 years of tenure, 360 has experienced A rapid period of development, including listing on the New York Stock Exchange, completion of privatization, and return to A-shares. In 2019, Tan Xiaosheng, who left 360, founded CyberTech and turned it into a security company incubator.

It has recognized several major problems in the field of security:

First, the network security industry is extremely fragmented, so the innovation point is extremely rich; Second, too many entrepreneurs are technology-oriented or product-oriented, ignoring business operations.

Tan founded Zhengqi Academy to provide training and consulting services for security entrepreneurs, and to pool resources from the perspective of the industry, so that domestic security companies will step less pit, reduce the death rate and develop steadily.

Tencent Vice President: Ding Ke



Ding Ke, vice president of Tencent and head of Tencent security, graduated from Xidian University and is a famous security expert in China.

Prior to joining Tencent, he worked at Cisco China and Lucent Technologies with outstanding achievements.

He joined Tencent in 2003 and served as the first person in charge of nine business departments of Tencent. He is one of the founders of several product business lines of Tencent.

Ding Ke is currently responsible for Tencent security business covering wireless security, desktop security, cloud security, industrial security and other security services.

They want to integrate Tencent’s security brand through business strategy.

Ding Ke under the leadership of Tencent security joint laboratory, its seven security laboratory to attract scattered all corners of the country hackers.

The people at the helm of the seven laboratories were the top seven “white hat hackers” in China at that time — Ma Jinsong, Li Xuyang, Li Wei, Wu Shi, Yu Yang, Yuan Renguang and Dong Zhiqiang. Together, they built the wall of Tencent security.

Ali Yun: Wu Hanqing



Wu hanqing, his nickname is quite many, said thorn, aullik5, strong wind, daoge, little black, but he is most known in the world or “daoge”.

As the top white hat of China’s young generation, her experience captures people’s imagination of gifted and high-achieving students.

At the age of 15, he was admitted to the youth class of Xi ‘an Jiaotong University. In 2001, at the age of 16, Wu Hanqing founded the Phantom Brigade.

After graduation, I applied for Ali. At the age of 23, I became the youngest senior technical expert in Ali. I participated in the creation of the application security system of Alibaba, Taobao, Alipay and Ali Cloud.

In September 2012, Wu Hanqing left Alibaba and joined Ananbao Venture Team as vice president. In September 2014, Ali acquired the business and products of Ananbao, and Wu Hanqing returned to Ali to shoulder the security burden of Ali “Cloud Shield”.

In 2015, Ali Cloud security team led by Wu Hanqing successfully defended the largest HTTPS SSL/CC attack in the history of the world’s Internet, with a total attack volume of 500 million requests, making it famous all over the world.

At the age of 32, he became the first person in China to be selected for TR35 in the field of Internet security.

In the video Internet of Things era, the security of the physical world and the security of the virtual world are interlaced and inseparable.

Wu Hanqing also from the virtual world, toward the physical world of the security field. Three years ago, Wu Hanqing was ordered to set up A group in Ali cloud, Ali network security from the patron saint of A group in charge of the cloud.

CTO&COO: Yang Jilong



I know Yang Jilong, CTO and COO of Chuangyu, who graduated from Northwestern Polytechnical University.

As a teenager, Yang Jilong was obsessed with science fiction movies and science magazines. When he first touched a computer in high school, he knew where to go.

It is reported that he has won the provincial prize in Sichuan Province in the National Computer Youth Olympic Program Competition.

In 1998, Yang Jilong was admitted to the computer department of Northwestern Polytechnical University and began his career with computers.

At that time, China did not have the concept of information security, and there were few related majors. Yang Jilong learned by himself based on his interest.

After graduating from university, Yang Jilong joined Lvmeng Technology and was responsible for product research and development. In 7 years, he witnessed Lvmeng grow from a small company with dozens of employees to a large company with thousands of employees.

He then left the group to found what is now known as Know-Chuangyu with a like-minded friend, Zhao Wei.

“Cool” is the domestic recognition of Chuangyu. There are many stories about Chuangyu in the industry. For example, Zhao Wei, the CEO of Chuangyu, who is known by his French name ICBM, boasts that he is “a shining wonderful work in the field of loophole mining”.

Yang Jilong has a lot of unique understanding of the market in the process of starting his own business.

He boldly declared that “many CTO’s are egoistic, and I came from the same way”. He summarized the demand for a five-horse split body diagram, which aroused hot discussion in the security circle. He said that “if you hammer more and have more experience, you will be beaten more miserably than others”, which revealed the bitterness behind entrepreneurship.

Now Yang Jilong is not only one of the authors of the Chinese original information security classic best-seller “Network Penetration Technology”, but also a core member of the famous security organization XFocus. He is good at exploiting vulnerabilities and developing security software, and has found a large number of AIX, Solaris and HP-UX vulnerabilities.

“We will do cyber security for the long term.”

For many years, the young man who fell in love with this field for the first time because he touched the hard shell of computer should still be there.

Hefei: University of Science and Technology of China, Medical University of Annan

Convinced CEO: He Chaoxi



He graduated from the University of Science and Technology of China in 1998 with a double bachelor’s degree in automatic control and economic management.

He joined Huawei in research and development after graduation. He left in 2000 to set up the company with two other classmates and became the CEO.

Since the foundation of deep conviction, He Chaoxi is constantly achieving a breakthrough.

At the early stage of the establishment, he realized that a relatively single R&D team could only make the company a single product manufacturer, so he chose a path of “subdivision and addition combination of products” to make the R&D team break through product singularity.

After that, it avoided the traditional switch market and focused on solving the core problem of “how to carry out critical business applications faster and more safely under the existing network conditions” for enterprises to carry out differentiated competition.

He Chaoxi believes that cloud computing, whether enterprises are chasing it or resisting it, it is doomed to be an unavoidable step in the digital transformation of enterprises.

In order to meet the diversified needs of enterprise cloud, Shenconvincing has long started to layout and research and development, and constantly layout the major cloud computing product lines.

During the period, deep conviction many times at an astonishing speed, in a few years time quickly cut into the safety market.

In May 2018, He Chaoxi led the company to go public on the Shenzhen Stock Exchange.

He Zhaoxi has witnessed the development of China’s network security and cloud computing since he started his business 21 years ago with about 4,000 employees.

360 Chief Scientist: Pan Jianfeng



Pan Jianfeng was admitted to the Department of Automation at the University of Science and Technology of China in 1999.

I heard that Pan Jianfeng took the Western District Library of HKUST as another home when he was in college. This low-key and simple style has been continued to this day.



In the early 2000s, when viruses were rampant, an anti-rootkit security tool, iCesword, was introduced. Its ability to detect Trojan horses and backdoors in the system surprised the industry, and IT was almost well known in foreign IT circles.

To what extent? At that time, Icesword was used in the Korean drama “Ghost”, which mainly focused on members of the Internet investigation department.

Pan Jianfeng, the independent author of Icesword, is known as “Pan God”, nicknamed PJF.

In 2017, 360 found about 600 bugs, many of which were dug by Bingblade Lab, which Pan oversees.

At the beginning, Pan Jianfeng was responsible for 360’s two core businesses of main defense and engine. They developed an automated Windows vulnerability mining system — Digtool.

It does not need to be based on source code to complete vulnerability mining, but also can achieve automation, mass work.

In the context of the days when white hats were mostly looking at code and digging for bugs with the naked eye, this framework was quite an artifact.

As a result, the team’s DigTool: Usenx Security was selected as one of the “Virtualization-Based Framework for Deriving Kernel Vulnerabilities”, one of the “four top academic conferences in the field of information Security.

Pan Jianfeng is also one of the first specially invited experts in China’s National Information Security Vulnerability Database, and has developed several national defense projects and sub-projects of the national “863 Plan”.

Tencent security: TK master



Yu Yang, known as the “Master of TK”, is the head of Tencent Security Basalt Lab and an internationally renowned white hat hacker.

There is no shortage of great gods and legends in the safety circle. In terms of “great gods and legends”, Yang Yangyang’s experience still ranked top.

In the security circle, most people were not trained, at least in the field of IT or science and engineering, and the yangyang professional, and “hacker” is far from thousands of miles away.

Yu Yang graduated from Anhui Medical University. As a medical student, TK was respected as “the holy hand of gynecology” by the hacker circle. I heard that when Yu Yang found the first leak, she was still working as an intern in a hospital. Later, Meng Xinyu in the hacker field solved several problems that had not been solved by the big names in the domestic security circle with one night.

During the 2008 Beijing Olympic Games, Yu Yang served as the technical expert of the Olympic Games Information and Network Security Headquarters of the Ministry of Public Security. He was the original designer of the course “Malicious Code” for CISP Certification. He was also one of the two global winners of Microsoft Vulnerability Mitigation Technology Bypass Award of US $100,000.

From then on, he gradually became the well-known TK in Yangyang.

In 2016, she was the only Asian nominated for the “Most Innovative Research Award” of the Pwnie Awards since its establishment ten years ago. After joining Tencent, he founded Tencent Security Basalt Lab.

Xuanwu Lab has two missions: on the one hand, release security research results to the public; on the other hand, support the safety of Tencent’s entire series of products internally.

The main research direction focuses on the mining, utilization, detection and defense of various types of vulnerabilities, as well as complex security risks involving hardware, wireless and other aspects.

CEO of Yunshen Internet: Chen Benfeng



Chen Benfeng, founder and CEO of Yunshen Internet, is also a self-taught non-professional student who entered network security.

In 1998, Chen Benfeng was admitted to the Department of Electronic Engineering of the University of Science and Technology of China (USTC) with the third place in science in the university entrance examination. After entering the university, he taught himself software programming and won the first place in the University of Science and Technology of China software competition.

In 2003, Chen was admitted to the Department of Computer Science of Hong Kong University of Science and Technology (HKUST). Under the guidance of Professor Vincent Shen, Chairman of WWW, Founding Chairman of W3C Hong Kong, Founding Head of HKUST Computer Science Department and Chief Scientific Adviser to the Government of Hong Kong Special Administrative Region, He has studied the international patent technology of “custom rendering of web pages on mobile devices” and published many top international academic papers.

After graduating from graduate school in 2006, Chen Benfeng received a job offer from Microsoft and worked at its U.S. headquarters.

At Microsoft, he joined the core development team of Internet Explorer, where he experienced the grinding process of code and the meticulous pursuit of detail.

He studied under the guidance of Christian Fortini, a leading technology leader in the browser field and the founder of IE Core Dynamic Engine. Under the guidance of his team, he jointly developed the world’s first GPU hardware accelerated HTML5 rendering engine, which revolutionized the user experience of HTML5. During my work at Microsoft, I developed IE404 page and successfully released IE8, IE9 and IE10.

In 2012, Chen Benfeng returned to China to found Yunshen Internet and served as CEO, focusing on zero-trust SDP.

According to Chen Benfeng, the security concept of zero trust is based on authentication, device authentication, network isolation and access control, and is the key to protecting and managing applications and data.

Harbin: Harbin Institute of Technology, Harbin Engineering

Antian Group: Xiao Xinguang



One person I have to mention about China’s cyber security is Xiao Xinguang, the chief technical architect and one of the main founders of Antilab. He goes by the name Jiang Haike.

Born in Changchun, this Northeast Chinese also devoted his life to Northeast China.

In 1993, Xiao Xinguang was admitted to the Department of Control Engineering at Harbin Institute of Technology.

Xiao’s relationship with network security began in 1994, when he got into the security industry out of an interest in computers. He has since become a major player in anti-virus technology, data recovery and Novell.

He has his own unique views on network security.

In 1997, Xiao Xiguang began to use Jiang Haike as his pen name, and wrote a large number of popular science articles on computer terminal security, data recovery, anti-virus and other aspects. In the early chaotic era of China’s network security, it brought a lot of light to the user security and industry publicity at that time. In 2000, Xiao Xinguang founded Antilab in the spirit of geek, and has been the main technical director ever since. Antian started out as a laboratory model and began commercial transformation 10 years later. Xiao Xinguang himself has been working on the front line of cyberspace security for more than 20 years. The AVL SDK anti-virus engine and support system, large-scale malicious code capture and analysis system developed by him have been widely recognized by the industry, and he is a leading figure in the field of APT attack analysis in China.

“I was impressed by two things about him: his pursuit of original technology and his national industrial feelings.”

This is the person in the industry to Xiao Xinguang evaluation.

Today, his group, as a national team of network security, undertakes China’s major network security tasks such as the Olympic Games, manned spaceships, lunar exploration projects, space docking stations and so on. It has 7 research and development centers, monitoring and early warning capabilities covering the whole country, and products and services radiating to many countries and regions.

He is also one of the leaders of the national 863 project, responsible for and participated in a number of national scientific research projects, and personally won the first prize of science and technology progress at the ministerial level.

In the name of an engineer, he participated in and witnessed the complete change of anti-virus and anti-malicious code technology.

Chief security officer of 360 Group: Du Yuejin



When Qihoo 360 officially announced the position of chief security officer, it caused a wave in security circles.

Because the protagonist Du Yuejin, in the network security river’s lake of more than 20 years, in the security circle quite wide visibility.

Du, who studied at HIT for a decade, said later that the university’s down-to-earth, rigorous style had influenced him greatly.

Du Yuejin is not a network security professional, on this road a strange combination of circumstances.

As a student, he was a builder and administrator of the university’s network. At that time, HIT’s email servers, domain name servers and BBS servers faced daily network attacks. Realizing the widespread need for security, he plunged into the security circle after graduating with his PhD in 1999 and has been in it for more than 20 years.

He was aware of the small number of network security, it is not easy to adhere to the “East China Network Security Festival”, to help people in the industry firm heart.

He called those engaged in cybersecurity, including himself, “fools,” believing that they are faithful, persistent and hard-working.

“Life is for one big thing, and mine is China’s cyber security,” he once confessed.

Du Yuejin also had the magical qualities of a prophet.

As early as 2004, we began to study and call for attention to phishing. In 2005, we put forward the concept of botnet. In 2006, we systematically emphasized domain name security

These were later verified and valued.

He also participated in the specific landing rules and formulation of the network security law.

When he was in the system, he stood in the perspective of decision-makers of relevant government agencies, and undertook security incidents involving a large number of users, such as large-scale worms, large-scale Trojans and botnets. Now into the network security combat front line, Du Yuejin combined with its research, technical reserves and experience for the ultimate interests of enterprises and users to protect the protection, is committed to solving security pain points.

“What I’m going to do is going to take at least another 30 years.”

To the “Jinliang” who had ambitions of a lofty ambition, the road to make a career in a safe river’s lake will be the career that runs through this life.

Anxin Net Shield CEO, CTO: Jiang Xiangqian, Yao Jiwei

Anxin’s CEO, Jiang Xiangqian, and CTO, Yao Jiwei, both graduated from Harbin Engineering University with a degree in computer science and technology.

In 2006, under the upsurge of the informatization construction of colleges and universities, Jiang Xiangqian, who has excellent academic performance, chose to stay in school after graduation and participated in the informatization construction of colleges and universities.



▲ Anxin Net Shield CEO Jiang Xiangqian

During this period, Jiang Qianqian became more and more obsessed with information security. In 2009, he resigned and came to Beijing, where he co-founded the Bailui Information Security Lab with his friend Yao Jiwei.



Yao Jiwei, CTO of Anxin Shield

Under the background of virus outbreak in 100,000 units at the beginning, the anti-virus technology on the market was not only time-sensitive, but also unable to detect unknown threats. Based on this, Jiang and Yao developed the first generation of unknown threat file detection system based on code dynamic execution analysis based on behavior detection done by anti-virus virtual machine. This software has been ranked second in the world and first in China in the evaluation report of VB100, the four major international evaluation organizations.

Due to the impact of free antivirus software, Bairui failed to achieve ultimate commercial success.

In 2011, Jiang Qiangqian also founded the Internet fast bird, after Baidu strategic investment, Jiang Qiangqian also served as Baidu’s chief mobile security expert.

Ten years later, the two men started a business together for the second time.

In 2019, Anxin Network Shield was born, focusing on the development and management of intelligent memory protection systems.

At present, Anxin Network Shield has launched three security products and services, namely, Anxin Intelligent Memory Protection System, System Information Detection Platform and Unknown Threat File Detection Platform, based on cutting-edge technologies such as hardware virtualization.

Shanghai: Fudan University, Tongji University, Shanghai Jiao Tong University

Tencent Security: Wu Shi



Wu Shi, head of Tencent’s security Cohen Lab, graduated from Fudan University with a degree in mathematics.

He fell into the cyber security trap in college for the fun of “bugs”.

After graduation, Wu Shi has provided security holes for Wangwang, QQ. At that time, he found a loophole, if the hacker grasp, as long as the other side want to send a message, you can completely control the other side of the host, the power is very big. For that, Mr. Wu received a public acknowledgment from Alibaba.

Wu Shi, as a loophole hunter, has shown a sharp light.

In 2007, Mr Wu was invited to join Microsoft, and then to join Keen Team at the invitation of Mr Wang. Along the way, they discovered the UAF bug, which made Keen Team a big hit at XCon, a well-known hacker conference in China.

The Team went on to win the Pwn2Own Mobile competition in November with two different poses and tens of thousands of dollars in prize money.

Soon after, Tencent extended an olive branch, and key members of the Keen Team, including Wu Shi, joined Tencent to set up Cohen Labs.

At present, their main task is the international mainstream operating system, Internet and mobile Internet applications, cloud computing technology and the Internet of Things equipment frontier security attack and defense technology research.

CEO of Qiming Star Group: Yan Wangjia



Yan Wangjia, also known as Wang Jia, was one of only four science majors admitted by Fudan University in Yunnan that year, and Yan was among them with excellent results.

After graduating from the computer software major of Fudan University in 1990, Yan Wangjia went to the United States to study in the computer department of Moore School of Electronic Engineering, a famous school of engineering and applied science.

In 1946, the school designed the world’s first fully electronic mathematical computer, the ENIAC, which ushered in the computer era and promoted the arrival of the third wave of technology. During his study, Yan Wangjia was responsible for the construction of Wharton global networking platform for the whole Wharton School of Business to ensure data and system security. During this period, Yan has accumulated a lot of experience in network security and management.

She received her PhD from the University of Pennsylvania in 1996, the same year that Yan returned to China to found and become CEO of Qiming Star.

At that time, the Internet was just emerging in China, and there were few talents in the field of information security. Yan Wangjia, 27, has since become a rare female chivalry in the field of network security.

In that forest, her friend please the tsinghua university, beihang university and Chinese Academy of Sciences, in collaboration with the state information center, the international computer security association, has edited as the foundation of network security, network security architecture design, the computer network security tools, the selection, configuration, installation and maintenance of the firewall, “the matrix analysis and prevention technology, network security, such as books, Filled the domestic gap.

In 2008, she led Qiming Star to shoulder the responsibility of cyber security during the Olympic Games.

Over the past two decades, her company has grown from nobody to a leader in domestic cybersecurity.

Tongji: Ji Xinhua



Ji Xinhua, head of UCloud, graduated from Tongji University with a major in electrical engineering automation control.

Ji Xinhua is also a legendary figure, he is one of China’s first generation of hacker representatives, known as the “computer genius,” is the industry’s eyes of the “godfather level hacker,” but also the Beijing Olympics only four from the private network security emergency experts one.

In 1996, from a poor family, he was deeply attracted by the first contact with a computer in his university. From then on, this magical computer and the network opened another window for him. After catch up with, he quickly rose from computer illiteracy to Internet expert, and became the representative of the “first generation of Chinese hackers” for his ability to crack all the Internet systems of the time.

Since his junior year in college, Ji Xinhua has tried his hand in the online world and started his own business. He founded “Allah Shanghai” website, 4E website and security company successively in three consecutive years. Ji Xinhua joined Huawei in 2002 after the security company was acquired. Two years later, he joined Tencent, which was still small at that time, to take charge of security work. He earned the title of “Chief Duty Officer” because he was on duty for the company all year round, and became Tencent’s youngest department head at 30.

In 2009, at the invitation of Chen Tianqiao, Ji Xinhua joined Shanda. Once served as Vice President, Chief Security Officer of Shanda Online and CEO of Shengda Cloud, he was fully responsible for the R&D and management of Shanda cloud computing platform, and he has rich experience and profound insights in cloud computing and network security.

Ji left Shanda in 2012 and, together with his close friends Mo Xianfeng and Hua Kun, began to build his own cloud computing company, called UCloud, which will be listed on the science and innovation board of the Shanghai Stock Exchange in 2020.

Hangzhou: Zhejiang University

Chairman of Depp Technology: Zheng Shusheng



Zheng Shusheng graduated from Zhejiang University.

This always low-key and elegant Zhejiang University people, and his magnificent life experience intersection, to him added a lot of legendary color.

When Zheng Shusheng was faced with a choice between teaching at Zhejiang University and joining a company after he graduated from Zhejiang University majoring in communication and electronics, he declined the university’s offer to stay and went to work for a small company that had only been established for five years.

During that time, the company went from obscurity to fame, and he rose with the company, Huawei, to become a senior executive.

Li Yinan is well known, but Zheng Shusheng is less well known. In fact, Li Yinan and Zheng Shusheng with Huawei Whampoa a period, officials to vice president, with the list of successor candidate Ren Zhengfei.

At the moment when Huawei was confronted with internal turmoil and foreign invasion, Zheng Shusheng was appointed to single-handedly build H3C, and within 6 years, he beat the leader Cisco in the network market and the domestic market. During this period, the sales volume of Huasan increased by 15 times, from 600 million yuan to 10 billion yuan.

Zheng Shusheng left Huasan Communications in 2012 to become chairman of Deep Technology.

It is A high-tech enterprise integrating research and development, production and sales in the fields of network, security and application delivery. It will be listed on A-shares in 2019.

It is worth mentioning that Zheng Shusheng chose to start his own business in two of the three segments of the field, one is Yu Shi, security market exploration, one is Hongshan Technology, a quasi unicorn in the storage field.

During his 28 years in the industry, Zheng Shusheng has been at the forefront of the industry.

“To do something, you need to focus on doing it well and then let it take its course.” Looking back on his career, Zheng Shusheng is approaching the year of his destiny.

CEO of Changting: John Chen



Like many in the security world, Chen, who graduated from Zhejiang University, has no formal education.

He majored in computer science and technology at a time when information security was not an independent major and was not particularly valued, but he was driven by curiosity to enter the door of network security.

At that time, in order to exercise students’ actual combat experience, Tsinghua professors Duan Haixin and Zhuge Jianwei carefully created a “Blue-Lotus” team, Chen Yusen and Yang Kun, Zhu Wenlei, Liu Chao and other people became attached to it.

In 2014 and 2015, Blue Lotus almost swept the top three of all the heavyweight cyber security competitions in the world, and it is also the first Chinese team to be shortlisted in DEFCON CTF (Hacker World Cup).

In DEFCON CTF, the international top safety competition, the Blue Lotus and 0OPS team won the second place in the world. Then CTF was brought to China and the largest BCTF competition was held in China.

“Blue Lotus” grew into a well-known offensive and defensive team.

In 2014, when he was about to graduate, Chen Yusen, Yang Kun, Zhu Wenlei and Liu Chao, who were obsessed with CTF competition, decided to start their own business immediately, and Changting Technology was born.

Since then in many competitions at home and abroad can see Changting science and technology to win the figure.

Among them, I broke the three major operating systems in the Pwn2Own International Hacking Contest and many devices in the GeekPwn Hardware Cracking Contest and won the first prize for many times. He has won the first prize of the National “Strong Net Cup”, the first prize of the Capital Network Security Day Network Security Technology Competition, and the first prize of the China Network Security Technology Competition.

WUHAN: UNIVERSITY OF MARTIAL SCIENCE

Moan Technology CTO: Wei Xingguo

Wei Xingguo, also known as Yun Shu, is also a well-known expert on white hats in security circles.

In 2000, I was admitted by Wuhan University of Science and Technology, majoring in International Economics and Trade.

Like Ji, he had his first contact with a computer after college, which started his career in cyber security.

When others play games in the Internet bar to forget to eat and sleep, Yunshu in the Internet bar to study computer day and night.

Over the next 15 years, Yunshu worked for Green Alliance, Yahoo and Alibaba.

The technology guru became one of the main designers of Ali Cloud Computing Security and Ali Cloud Shield.

During the four years from 2009 to 2013, he was exposed to the most cutting-edge cloud computing security in Ali Cloud. At that time, cloud computing was in its pioneering period. Without previous guidance, cloud computing security was groping and struggling in the undercurrent.

Then in 2014, Ali cloud went through the pain, ushered in the product and profit, and became the star business of Ali. As one of the founders of “Cloud Shield”, Yunshu also became a pioneer in the field of cloud security in China.

In the same year, Yun Shu transferred from Ali cloud to Ali group security department, research and development of risk control and hacker intelligence, once launched the effect is pleasing.

In 2016, Yunshu, who has since left Alibaba, co-founded Moan Technology with Nie Wanquan, former director of Alibaba’s cloud platform, and Wang Lihui, a former senior security expert at Alibaba.

Moon is committed to integrating threat intelligence technology and artificial intelligence technology into enterprise security and defense systems, providing enterprises with integrated security solutions in the era of cloud computing and IoT.

“If you stand on the bank and tell someone who is planting rice in a field that they are not in the right position, no one will pay any attention to you,” he explained. But when you roll up your pants and jump into the water with mud on your feet and sweat on your head, your words are only powerful and valuable.”

Beijing: Tsinghua University and Peking University

Peking University: Zhuge Jianwei



In 1997, Zhuge Jianwei was admitted to Peking University, majoring in computer science. He studied for nine years with his bachelor’s degree, master’s degree and doctoral degree. In 2006, he received his doctor’s degree.

Zhuge Jianwei’s translation of “Online Phantom: The Autobiography of Mitnick, the World’s No. 1 Hacker”, as well as his own works “Network Attack and Defense Technology and Practice”, “Metasploit Penetration Test Devil Training Camp” and other books have become the most common pre-case reading for the new generation of hackers.

Later, Zhuge Jianwei moved to Tsinghua University and devoted himself to the field of network security.

In December 2010, Tsinghua professors Duan Haixin and Zhuge Jianwei carefully built a “Blue-Lotus” team in order to exercise students’ practical experience.

Under the leadership of Zhuge Jianwei, the Blue Lotus team, which symbolizes freedom and eternal traditional hacker and competitive spirit, has been breaking records and stepping onto the international stage.

Zhuge Jianwei also founded the XCTF International Cyber Defense League, which later became the No. 1 defense and defense tournament in Asia.

Jianwei zhuge and hai-xin duan, 2013, three people co-founded the ledge, jianwei zhuge CTO, lead the team to develop the better network security defense combat training system, competition platform, shooting range, large holes data knowledge base and offensive and defensive toolbox mature products, such as forming network attack and defense laboratory, cyber range, etc. Series of solutions, and offensive and defensive talent practice training system, Obtained sales revenue of tens of millions of yuan, and opened the overseas market.

Tsinghua university: In 2012, Tsinghua University established the Academy of Network Science and Cyberspace (Cyber Research Institute for short). In 2017, Tsinghua University became an independent teaching and research unit, jointly with the Department of Computer Science, the Department of Electronics and other related units. To lead the construction of the new first-level discipline of “Cyberspace Security” and the first-level discipline of “Computer Science and Technology” and “Information and Communication Engineering” in Tsinghua University. “Education is not the filling of a pail, but the lighting of a fire.”

This sentence appears in the dormitory of Tsinghua University in the doorway of a propaganda column of education concept, virtually pushing Tsinghua University’s network space security students to move forward.

Tsinghua students will soon become a pillar in the security field, such as:

Shen Jiye, Founder and Chairman of Lvmeng Technology; Luo Dongping, Chairman and CEO of Shanshi Network Science; Pan Zhiting, Senior Vice President and Chief Strategy Officer of Yongxin Zhicheng; Yang Cong ‘an, Founder and CEO of Digital Union; Guo Xiaopeng, Founder and CEO of Xinjun; Jiang Tianyi, Zhixiang Technology; Dawn Song, “Godmother of Internet Security”; and CEO of Ruilai Wisdom Tian Tian, Yang Kun, co-founder of Changting Technology, and He Wenjun, founding partner of Yuanqi Capital.

The high-achieving students of Qinghua are scattered like stars, guarding the field of cyber security with love and faith.

conclusion

<font color=#999AAA >

Mountain force pull bow, brainpower

Seven factions, such as the seven soldiers, their resumes, skills, strategies and offensive and defensive methods are not the same, but in the long march of the cause of network security, it is a promise, such as mountain force pull a bow, brainstorming together to defend the country.

These college factions are the epitome of countless network security people, it with a rhino across time, according to the network security era turbulent undercurrent.

Together with the network security industry, they have experienced ups and downs of development, with more than 20 years of time desperately to catch up.

Just to let that toddlers in the world of network security children, grow into today’s network security power.

Join me to explore more of the unknown world of network security

Source: This article comes from the network, if there is infringement, please contact us to delete.