主題論壇
Cloud Security Forum
Cloud Security Forum

The power of cloud applications is driving digital transformation, and cybersecurity is a top priority for cloud players seeking to strengthen their services. Discover the latest strategies and techniques for optimizing your cloud services while maintaining the highest levels of security. 

More
TIME & LOCATION
5/11 (Thur.) 09:30 - 12:15 | 701 B Meeting Room
SPONSORED BY
Radware
AGENDA
09:30 - 10:00

With the increasing adoption of public cloud, more and more government departments are willing to migrate to the cloud, not to mention private enterprises that have long been using cloud resources to provide services. Naturally, hackers have already set their sights on the cloud environment. However, facing the threats from hackers, whether the internal security personnel of the organization can effectively monitor and respond to cloud security threats will be an important issue. Especially, the convenience of the cloud makes users have a false sense of no security risks, often ignoring the security damage caused by the cloud. How to monitor and respond to such risks has become a new challenge for security managers. In the agenda, we will share experiences and practices of SOC cloud monitoring, and highlight several key points that can be used for monitoring in the cloud, hoping to provide better understanding for current security personnel facing cloud monitoring.

More
Yan-Ming Chen CHT Security Co., Ltd. Senior Cybersecurity Engineer
Cloud Security Blue Team Security Operation
10:15 - 10:45
詹凱富 (Mika Chan) Radware 亞太區 雲端架構師
National Security Network Security
11:00 - 11:30

Recently, many enterprises have adopted ISO 27001 to establish their information security management systems, while many of them have achieved control over their ISMS through the use of cloud security services. However, simply implementing security software or services does not necessarily meet the relevant ISO standards. This session will provide insights into the relationship between ISO 27001 and cloud security services, as well as relevant examples.

More
Kevin Chang HENNGE Taiwan Marketing Manager
Enterprise Security Cloud Security
11:45 - 12:15

In the speech, I will share. 

The information security that needs attention in the cloud can be divided into the following parts. Describe the purpose of the mechanism and possible difficulties in its implementation.

1. Authentication and Authorization

2. Data encryption and data protection

3. Cloud network security architecture

4. management of risk protection, EOSL version Issues, and upgrade management

5. How to monitor and quickly discover problems to face of abnormal behavior

6. Cloud backup SRP plan and Enterprise cloud architecture

Ensure that the enterprise can reduce information risk to an acceptable level when using the cloud. 

More
Ivan Hsieh Far EasTone Telecom Director
Cloud Security Governance