iSecurity was founded in 2004 by senior members of the Institute for Information Industry(III), the premier IT think tank in Taiwan. Our mission is to provide leading edge world class cybersecurity solutions and consulting services. We have introduced, over the years, into Taiwan a number of security trends and solutions, including DLP(2004), source code inspection (2005), least privilege (2010), whitelist (2012), one-way network (2013), open source security (2014), EDR (2015), CDR (2015), Web Isolation (2016), Industrial Cyber Security (2017), CASB (2019), Supply Chain Security Audit, IoT/Embedded System Security (2020), AI Virtual Supervisor (2021), Enterprise Account Data Leakage (2022), AD Security (2022), Supply Chain Mapping & Modeling (2023), GAI Security (2024), API Security (2024).
Product Type
AD (Active Directory) is the central nerve linking all IT systems in a company. Unfortunately, AD was born toward the end of the last century (1996), an innocent time with no cyber attacks. The fundamental architecture of AD did not anticipate the types of cybersecurity threats that corporations must face today. Moreover, coupled with years of overlapping patch/version updates and organizational growth and expansion, AD has become the primary target to hackers globally when they attack corporations. Semperis has the greatest collection of Microsoft AD-related MVPs (Most Valuable Professional) in the industry. We will share relevant cases and Best Practices over AD security health check, threat detection, incidence response/remediation, as well as backup & recovery.
Cyber attacks resulting in physical operations downtime and equipment damage changed from a theoretical problem to a real problem in 2020 - the world changed and nobody noticed. Cybersecurity systems are changing as well - "engineering grade" security solutions are increasingly demanded when public safety is at risk. Such solutions are deterministic - the degree of protection they provide is constant, no matter how sophisticated the cyber attacks launched at them. Join us to understand how both cyber attacks are changing and how cyber defenses are evolving to meet the threat.
Nowadays the frequent occurrence of cyber-attacks has made enterprises pay more attention to the field of information security and strengthened the protection of enterprises by establishing and implementing comprehensive information security regulations. However, under such circumstances, hackers have gradually shifted their targets to the supply chain and launched flanking attacks through the suppliers, thereby posing a threat to business owners.
In such an environment, how to strengthen the Third Party Risk Management(TPRM) of the supply chain, and even prevent the risk caused by the supply chain in advance will be a test that business owners need to face up to.
Therefore, it is necessary to use a comprehensive information security risk management platform to strengthen the suppliers' various information security aspects. While improving the company's own information security defenses, can also prevent the risk of indirect attacks.
Use Artificial Intelligence and Machine Learning technology to help companies control and manage work environments, such as:
• User identification(initial/Continuous)
• Identification of bystanders in the work environment
• Identification of objects in the work environment that could lead to a data breach, such as cell phones, cameras, keyboards, screens, notes, and papers
• Recognition of behaviors explicitly prohibited by the company in the work environment, such as taking pictures of the screen with a mobile phone/camera
• Monitoring employee behaviors such as surfing the Internet and using applications with computer
• Actions for violations such as warning messages, blank screen, mandatory shutdown
This solution allows enterprises to fully control the Human Factor, protect data security, improve work efficiency, and assist Call Center to comply with the CLEAN DESK policy.
CYBERSEC 2023 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy .