CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
• Current position: CEO in iSecurity Inc. (35 years of Cyber security industry experience)
• Master of Technology Management, Johns Hopkins University, USA in 1991
• Master of Computer Science, New York Institute of Technology, USA in 1986
• Awarded the company's first honorary award by ATS when returned to Taiwan in 1997.
• iSecurity Inc. was invested by Macnica, Inc. in 2016, a leading brand of information security group in Japan
iSecurity Inc. brings in the latest security concepts and solutions over the years included: DLP (2004), source code inspection (2005), least privilege (2010), whitelist (2012), one-way network (2013), open source security (2014) ), EDR/CDR (2015), Web Isolation (2016), Industrial Cyber Security (2017), CASB (2019), Supply Chain Security Audit (2020), IoT/Embedded System Security (2020), IoT/Embedded System Security(2020), AI Virtual Supervisor(2021), Enterprise Account Data Leakage(2022), AD Security(2022), Supply Chain Mapping & Modeling(2023)
#
Use Artificial Intelligence and Machine Learning technology to help companies control remote/home/outsourced work environments, such as:
This solution allows enterprises to fully control the Human Factor, protect data security, improve work efficiency, and assist Call Center to comply with the CLEAN DESK policy.
#
Nowadays, the cooperation of the global supply chain is as complex as the Gordian knot in ancient Greek mythology, but today, unlike Alexander the Great in ancient times, we do not have the ability to cut off problems with a single sword. Therefore, how to deal with effective management and examination of cyber supply chain security has always been the goal of enterprises. This agenda will focus on providing corresponding solutions for the strengthening of third-party cyber security risk management.