PARTNER
iSecurity
iSecurity
886-2-7702-1088

iSecurity was founded in 2004 by senior members of the Institute for Information Industry(III), the premier IT think tank in Taiwan. Our mission is to provide leading edge world class cybersecurity solutions and consulting services. We have introduced, over the years, into Taiwan a number of security trends and solutions, including DLP(2004), source code inspection (2005), least privilege (2010), whitelist (2012), one-way network (2013), open source security (2014), EDR (2015), CDR (2015), Web Isolation (2016), Industrial Cyber Security (2017), CASB (2019), Supply Chain Security Audit, IoT/Embedded System Security (2020), AI Virtual Supervisor (2021), Enterprise Account Data Leakage (2022), AD Security (2022), Supply Chain Mapping & Modeling (2023), GAI Security (2024), API Security (2024).

Product Type

  • Data Leak Protection
  • IT Vendor Risk Management
  • Incident Response
  • Insider Threat Management
  • OT Security
  • Contact Blaire
  • Title Marketing / Admin Assistant
  • Tel 02-7702-1088#221
  • Mail
1
2
3
SPEECH
05/09 (Tue.) 15:45 - 16:15
Ransomware risk & recovery – Protecting your hybrid Active Directory

AD (Active Directory) is the central nerve linking all IT systems in a company. Unfortunately, AD was born toward the end of the last century (1996), an innocent time with no cyber attacks. The fundamental architecture of AD did not anticipate the types of cybersecurity threats that corporations must face today. Moreover, coupled with years of overlapping patch/version updates and organizational growth and expansion, AD has become the primary target to hackers globally when they attack corporations. Semperis has the greatest collection of Microsoft AD-related MVPs (Most Valuable Professional) in the industry. We will share relevant cases and Best Practices over AD security health check, threat detection, incidence response/remediation, as well as backup & recovery.

More
iSecurity Inc. President
  • TOPIC
    Tech Briefing
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2 7F
  • TAGS
    Active Directory Security
    Ransomware
    Backup and Recovery
05/10 (Wed.) 15:45 - 16:15
OT Security - Changed Forever

Cyber attacks resulting in physical operations downtime and equipment damage changed from a theoretical problem to a real problem in 2020 - the world changed and nobody noticed. Cybersecurity systems are changing as well - "engineering grade" security solutions are increasingly demanded when public safety is at risk. Such solutions are deterministic - the degree of protection they provide is constant, no matter how sophisticated the cyber attacks launched at them. Join us to understand how both cyber attacks are changing and how cyber defenses are evolving to meet the threat.

More
iSecurity Inc. Technical Manager/Technology Division
  • TOPIC
    OT Security Forum
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2 7F
  • TAGS
    OT Security
    Critical Infrastructure Protection
    SCADA Security
05/11 (Thu.) 11:00 - 11:30
Monitoring the cybersecurity risk of your third party in a comprehensive manner

Nowadays the frequent occurrence of cyber-attacks has made enterprises pay more attention to the field of information security and strengthened the protection of enterprises by establishing and implementing comprehensive information security regulations. However, under such circumstances, hackers have gradually shifted their targets to the supply chain and launched flanking attacks through the suppliers, thereby posing a threat to business owners.

In such an environment, how to strengthen the Third Party Risk Management(TPRM) of the supply chain, and even prevent the risk caused by the supply chain in advance will be a test that business owners need to face up to.

Therefore, it is necessary to use a comprehensive information security risk management platform to strengthen the suppliers' various information security aspects. While improving the company's own information security defenses, can also prevent the risk of indirect attacks.

More
iSecurity Inc. Support Engineer/Technology Division
  • TOPIC
    Cyber Supply Chain Forum
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2 7F
  • TAGS
    Supply Chain Security
    Cyber Supply Chain Security
    Cyber Supply Chain
05/11 (Thu.) 14:00 - 14:30
Continuous MFA - Next Gen Zero Trust with AI

Use Artificial Intelligence and Machine Learning technology to help companies control and manage work environments, such as:

• User identification(initial/Continuous)

• Identification of bystanders in the work environment 

• Identification of objects in the work environment that could lead to a data breach, such as cell phones, cameras, keyboards, screens, notes, and papers

• Recognition of behaviors explicitly prohibited by the company in the work environment, such as taking pictures of the screen with a mobile phone/camera

• Monitoring employee behaviors such as surfing the Internet and using applications with computer

• Actions for violations such as warning messages, blank screen, mandatory shutdown

This solution allows enterprises to fully control the Human Factor, protect data security, improve work efficiency, and assist Call Center to comply with the CLEAN DESK policy.

More
iSecurity Inc. Sales Engineer/Technology Division
  • TOPIC
    Tech Briefing
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2 7F
  • TAGS
    Human Factor
    AI Security
    Endpoint Security