CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
Shi-Cho Cha received the B.S. and Ph.D. degrees in information management from
National Taiwan University in 1996 and 2003, respectively. He is currently a Professor at the Department of Information Management, National Taiwan University of Science and Technology, where he has been a Faculty Member since 2006. He is a certified PMP, CISSP, CSSLP, CCFP, and CISM. Before he worked at NTUST, he worked in eLand Technologies, Inc, and PricewaterhouseCoopers, Taiwan. His current research interests include security and privacy of blockchain applications, IoT security and privacy, and information security risk management.
#
Currently, the trend of digital transformation has brought several new channels to access organizational resources. Therefore, the advanced persistent threat (APT) attacks become more and more serious. If organizations just deploy security mechanism on perimeter, once cracks can access the organizational internal network, they may move laterally to attack any organizational resources. Therefore, several countries have requested their agencies and organizations in the countries to adopt measures to achieves strategic goals of zero trust. The requirements can be used for CISOs to define security blueprints for their organizations. In this speech, I will introduce how to adapt security architecture to meet the requirements of zero trust.