KEYNOTE
Keynote
Keynote

CYBERSEC 2023 opens with keynote speeches that focus on the pressing cybersecurity issues of the year, featuring perspectives from prominent experts in the field. Attendees are able to gain a macro view of cybersecurity and find inspiration by listening to the keynotes that are aligned with the most up-to-date trends and developments. 

More
TIME & LOCATION
5/9 (Tue.) 9:30 - 11:30 | 701 Meeting Room
5/10 (Wed.) 9:30 - 11:40 | 701 Meeting Room
SPONSORED BY
e-SOFT Corp.
TXOne Networks
AGENDA
09:30 - 09:35
Merton Wu CYBERSEC 2023 Chairman iThome Editor in Chief
09:35 - 09:45
09:45 - 09:55
Janet Napolitano Homeland Security Former Secretary Berkeley Center for Security in Politics Founder
10:00 - 10:30

The 2022 invasion of Ukraine tested many theories of how cyber power would be used in a major conflict. In this talk I will cover the range of what Google's TAG observed and didn't observe from various actors. More generally it will cover what this means in terms of how we should think about future threats in times of conflict and what we need to do to be prepared against serious threats in the future.

More
Shane Huntley Google Sr. Director of Google's Threat Analysis Group (TAG)
Cyber Resilience Threat Analysis & Protection
10:30 - 11:00

On the heels of President Biden's Executive Order requiring federal civilian agencies to establish plans to drive the adoption of Zero Trust Architecture by 2024 and encouraging private companies to do so, many in the cybersecurity industry are considering how to implement this properly and efficiently. Adopting a Zero Trust Architecture is an important goal, albeit one that requires considerable investment and organizational culture change. A good, well-defined XDR capability can help organizations to start achieving ZTA objectives at a foundational level today. This session will consider what is realistically achievable when balancing risk management with finite operational resources in the context of the Executive Order (EO 14028). We will also discuss what organizations in Taiwan can learn from others going through this exercise.

More
David Chow Trend Micro Chief Technology Strategy Officer
Zero Trust Architecture Risk Management Attack Surface
11:00 - 11:30

Sharing perspectives as a cyber VC living in Israel during the pandemic and cyber regulator executing Singapore’s startup industry development masterplan, the speaker will share on the ground insights and lessons learnt of: 

  • How these 2 island nations grew their startup ecosystem.
  • Why should and how can Taiwan emulate success to become a global cyber startup nation.


More
Christopher Chen CyCraft Technology Chief Commercial Officer
CISO CSIRT Career Path
09:30 - 09:35
09:35 - 10:10

The onslaught of ransomware has undermined our ability to maintain the confidentiality, integrity, and availability (CIA) of our data. As attackers refine and mature their techniques to drive irreversible outcomes, we must look at how we can become more resilient. But is securing everything by design the best way to go about it? A new paradigm, called the DIE Triad (which stands for Distributed, Immutable, and Ephemeral) enables us to truly be resilient against irreversible attacks.

More
Sounil Yu JupiterOne CISO & Head of Research
Cyber Resilience Security Strategy Security by Design
10:10 - 10:40
Governance Risk & Compliance Zero Trust Architecture NIST Cybersecurity Framework
10:40 - 11:10

We are facing an unprecedented digital revolution that affects all fields. As digitization has become a necessary competitiveness for successful enterprises, enhancing cybersecurity capabilities has become an urgent priority. During digital transformation, industries often ponder how to balance cybersecurity and operations. However, hackers on the attack side construct a network crime industry through an organized crime approach and are pioneers in launching attacks using new technologies. Especially in the scene where the Internet of Things (IoT) devices are used as digital asset applications during digitalization, how to ensure information security has become an essential issue for enterprise digitalization. In the past, enterprises only focused on cybersecurity capabilities for computer devices, which could not avoid becoming victims of hacker attacks. Through this sharing, we will introduce how enterprises should adjust their cybersecurity strategies during digitalization and use their operational characteristics to detect hacker intrusions and response strategies.

More
Terence Liu TXOne Networks Chief Executive Officer
Enterprise Security OT Security Industrial Security
11:10 - 11:40

APT and Cybercriminal organizations are converging with shared infrastructure, resources and targets within both the public and private sector. Destructive threat trends are on the rise with system wipers becoming a prominent threat. Over 16 wipers were observed just in 2022 alone, and more have arrived in 2023. The effect is an elevated level of risk, that requires a focus to shift left in defense of the attack chain. This talk will show some examples of the Advanced Persistent Cybercrime phenomenon, and also discuss a holistic approach to disruption highlighting industry effort underway.

More
Derek Manky Fortinet Chief Security Strategist & Global VP Threat Intelligence
e-SOFT Corp.

Established in 1999, e-SOFT Corporation has been focusing on the software development of enterprise network information management platform. The experienced R&D team develops an enterprise information system and an end-point information integration platform to assist customers in real-time control and manage internal network equipments. By solving the problem that enterprise need to spend a lot of human resources on maintaining information security, the management efficiency is remarkably increased and the information is quickly responded, the products are therefore well received by the market. From 1999, e-SOFT has been deeply involved in the financial industry, the semiconductor industry, government and health care industry and enterprise users markets. Continuously provide high standards product and services, emphasizing the optimization according to customer needs, so as to achieve the best and most comprehensive security management performance on ISAC.

Furthermore, from2012, the e-SOFT internal network and cloud application related product series have achieved the procurement standard of government computer software contract procurement tender and become a certified product on the government procurement system. At present, it is the best solution for enterprise and organization in IoT security, information security defense, internal security policy management and audit.

In the future, we will continue to develop and improve the products in IoT and big data security management system with our greatest enthusiasm, and keep providing best services to customers.

了解更多
TXOne Networks

About TXOne Networks

TXOne Networks is a company formed of a joint venture by Trend Micro and Moxa. We offer cybersecurity solutions to protect industrial control systems to ensure reliability and safety from cyberattacks.

What We Do 

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.

Our Mission

TXOne Networks’ mission is to provide practical cybersecurity solutions to safeguard and accelerate the progress of automation and data exchange in the industrial world.

了解更多