Don't miss this unique opportunity where cybersecurity execs exchange ideas and knowledge with leaders from different industries. Gain valuable insights from the sharing of managerial perspectives and strategies for tackling challenges.
Adopting a Zero Trust Architecture is an important goal, albeit one that requires considerable investment and organizational culture change. In this session, David will deep dive into ZT pillars and share his experiences from implementing ZT in US Government . He will also provide recommendations for challenges organization might face during the journey.
The improvement of digital resilience and strengthening of information security governance is key to the sustainable operation of healthcare and education institutions. As Taipei Medical University and its affiliate hospitals have grown rapidly over the past years, the need for the hardening of its defenses against increasing security risks is greater than ever. Taipei Medical University has led Asia in being the first medical university to move its entire learning platform onto the cloud, and preparations for moving its hospital information systems (HIS) onto the cloud are also underway. In addition to serving as a leader in the medical field in terms of the adoption and utilization of cloud technologies, the implementation of strategies for the strengthening of the school’s information security defenses against future attacks must also be prioritized. More specifically, questions such as “what preparations must be made to ensure the sustainable operation of core information systems?”, “how can a multi-cloud and hyper-converged infrastructure be used to maximize energy saving and sustainability?”, “how can a universal information security management (ISMS) system be introduced using new cloud infrastructure”, “how to train and bring employees up to date on new security practices”, “how to use digital transformation to drive sustainable development of information systems”, and “how to evaluate and select AI based security products ” need to be answered as the Taipei Medical University continues the shift of services to the cloud. We welcome all those that are interested to join us in the discussion and sharing of experiences on the topic of InfoSec within the medical and educational fields.
Digital transformation is an inevitable trend, however, the stronger the intensity of an organization or enterprise's digital transformation, the greater the amplified cybersecurity risk. Facing a constant stream of hacking techniques, fraud and ransomware threats globally, the trust in digital technology by the public is also facing enormous challenges. All organizations must transform into resilient organizations, creating a digital trust and sustainable environment, which will be the key to strengthening organizational resilience.
This session will share how organizations and enterprises can refer to international standards to establish information security systems and governance, strengthen organizational resilience, and integrate ESG to build a digital trust ecosystem, achieve sustainable business operations and competitiveness in the process of establishing digital trust.
The three features of a trade secret include economically valuable, reasonable restrictions, and measures to protect secrecy. The need of level of reasonable protection measures for enterprises is often unclear. If companies have their files encrypted, is it considered a reasonable protection measure? It has always been difficult to have a standard baseline. Through the discussion of court judgments, this lecture puts forward suggestions on the protection measures that enterprises should take, and provides enterprises with reference.
Established in 1999, e-SOFT Corporation has been focusing on the software development of enterprise network information management platform. The experienced R&D team develops an enterprise information system and an end-point information integration platform to assist customers in real-time control and manage internal network equipments. By solving the problem that enterprise need to spend a lot of human resources on maintaining information security, the management efficiency is remarkably increased and the information is quickly responded, the products are therefore well received by the market. From 1999, e-SOFT has been deeply involved in the financial industry, the semiconductor industry, government and health care industry and enterprise users markets. Continuously provide high standards product and services, emphasizing the optimization according to customer needs, so as to achieve the best and most comprehensive security management performance on ISAC.
Furthermore, from2012, the e-SOFT internal network and cloud application related product series have achieved the procurement standard of government computer software contract procurement tender and become a certified product on the government procurement system. At present, it is the best solution for enterprise and organization in IoT security, information security defense, internal security policy management and audit.
In the future, we will continue to develop and improve the products in IoT and big data security management system with our greatest enthusiasm, and keep providing best services to customers.
CYBERSEC 2023 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy .