BRAND DAY
Brand Day - Microsoft Taiwan
Brand Day - Microsoft Taiwan

In this session, the following topics will be covered:

  1. Share the latest Microsoft Security Copilot, allowing defenders to quickly detect and respond to threats through natural language conversations!
  2. Microsoft Taiwan will share how to implement a zero-trust strategy, explore the challenges and solutions of implementing Zero Trust Architecture, and provide practical advice and case studies.
  3. Introduce Microsoft's Zero Trust strategy and solutions to enhance enterprise security while balancing information security and employee productivity.
  4. Introduce the latest passwordless authentication technologies and Microsoft's solutions to help establish stronger security protection.
  5. Explore how to sort an organization's data using data mapping, build data fortresses through machine learning, and automate data encryption, access control, compliance management, and leak prevention.
More
TIME & LOCATION
5/11 (Thur.) 9:30 - 12:15 | 701D Meeting Room
AGENDA
09:30 - 10:00

This session will share Microsoft's AI-integrated security solutions, including discussions on Microsoft Security Copilot, how to introduce the new generation of AI into the field of network security defense, and how to combine OpenAI's large language model (LLM) with Microsoft's proprietary security model. This will enable defenders to quickly detect and respond to threats through natural language conversations, taking security protection to a new level and empowering organizations to build cyber resilience.

More
Stanley Chou Microsoft Taiwan Security Sr. Specialist manager
AI Security Security Analytics Security Operation
10:15 - 10:45

This speech will showcase how Microsoft accomplish effective information security management by taking information security and employee productivity into consideration, as well as putting Zero Trust strategies into practice. In addition, the speech will also discuss the challenges corporates might face and their and solutions when implementing Zero Trust strategies, along with other useful tips and case studies. We will provide 4 scenarios regarding Microsoft's Zero-Trust strategy and corresponding tactics.

  • Scenario 1: Applications and services are equipped with corresponding mechanisms, and are able to perform multi-factor verification and device health verification.
  • Scenario 2: Employees can register their devices on a modern management system in which it could guarantee the operation of the devices and control the corporate's access permissions.
  • Scenario 3: Employees and corporate visitors can access corporate resources when using regulated devices.
  • Scenario 4: Providing only minimum access rights for performing specific job duties.
More
Stanley Chou Microsoft Taiwan Security Sr. Specialist manager
Zero Trust Architecture Access Control Identity Management
11:00 - 11:30

The current password authentication method no longer meets the security needs of the modern digital world. To enhance enterprise security, more and more companies are adopting passwordless authentication technologies, such as biometrics, smart cards, and mobile devices. This session will introduce the latest authentication technologies and how to use Microsoft's passwordless authentication solutions to build stronger security defenses. The session will cover:

  1. Exploring the advantages and challenges of passwordless authentication
  2. Introducing Microsoft's passwordless authentication solution and how to deploy it quickly
  3. Best practices and case studies of passwordless authentication
  4. How to integrate passwordless authentication technology to enhance enterprise security
  5. This session will provide you with a comprehensive understanding and practical use of passwordless authentication solutions, tools, and technologies to make your business more secure.
More
Jaron Lin Microsoft Taiwan Technical Specialist
Authentication Identity Management Password Management
11:45 - 12:15

AI-based data security management involves using machine learning algorithms to analyze data and detect patterns that may indicate potential security threats. The potential applications of AI in data security management include the automatic identification and classification of sensitive data and the use of natural language processing (NLP) to identify potentially sensitive information in unstructured data sources such as emails or documents. This can help organizations expand and improve their data protection measures and reduce the risk of data breaches.

This Session will focus on how information security governance personnel should use data maps to take stock of the data within an organization, and how machine learning can address the pain points encountered during traditional data inventories. It will cover the construction of data fortresses and the use of automated methods for data encryption, access control, compliance management, and leak prevention.

More
Lisa Chen Microsoft Taiwan Technical Specialist
Information Governance AI Security Governance Risk & Compliance
Microsoft

Microsoft (Nasdaq“MSFT” @microsoft) enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.

了解更多