CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
The relationship between the APT organization’s attacks and the threat of ransomware threats to many companies has caused many corporate images and assets to be damaged and affected greatly.
How to deal with the challenges faced by traditional information security under the wave of technology?
The international framework for reference sharing in this agenda With the defense-in-depth strategy, discuss with the audience the simple and concise key points of the three management aspects of People / Process / Technology, assist the enterprise in creating the technical management process and response strategy, and share about the security configuration parameter evaluation
Finally, share the experience of evaluating the overall defense-in-depth mechanism, assisting clients in completing the information security blueprint planning, and analyzing the gap in information security technology maturity.
Kuro is currently an cyber security consultant of EY Consulting, and likes to participate in information security community activities. Experience in information security audit, and network architecture security design. At present, I focus on serving enterprise security architecture blueprint planning, information security maturity assessment, information system risk control assessment, and strive to create cost-effective information security solutions for enterprises. Possess valid ISC2 CISSP、 ISACA CISM、CISA、CGEIT and CRISC.