CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
For the past many years, companies have been committed to making their supply chains follow the standard operating procedure(SOP) and automation as much as possible to reduce costs;in this way, most companies have established efficient supply chain management systems, and the cooperation model between upstream and downstream manufactures or end customers are inseparable.
However, with the continuous evolution of cyber threats and the rapid growth of digital assets of cooperative manufacturers, events of hackers launching indirect attacks through third parties emerge one after another. Therefore, how to comprehensively strengthen Third Party Risk Management (TPRM) will be the focus of this agenda.
• Current position: CEO in iSecurity Inc. (35 years of Cyber security industry experience)
• Master of Technology Management, Johns Hopkins University, USA in 1991
• Master of Computer Science, New York Institute of Technology, USA in 1986
• Awarded the company's first honorary award by ATS when returned to Taiwan in 1997.
• iSecurity Inc. was invested by Macnica, Inc. in 2016, a leading brand of information security group in Japan
iSecurity Inc. brings in the latest security concepts and solutions over the years included: DLP (2004), source code inspection (2005), least privilege (2010), whitelist (2012), one-way network (2013), open source security (2014) ), EDR/CDR (2015), Web Isolation (2016), Industrial Cyber Security (2017), CASB (2019), Supply Chain Security Audit (2020), IoT/Embedded System Security (2020), IoT/Embedded System Security(2020), AI Virtual Supervisor(2021), Enterprise Account Data Leakage(2022), AD Security(2022), Supply Chain Mapping & Modeling(2023)