Cybersecurity maturation and Zero Turst Architecture (ZTA) implementation experience in US Governme
David Chow
Trend Micro
5/9 14:00 -
14:30
Belinda Lai
Forcepoint
5/9 14:00 -
14:30
Arising challenges of digital banking fraud and vulnerabilities facing banks, and how AI can help
汪逸雲
5/9 14:00 -
14:30
How would you address Highly Evasive Adaptive Threats in the future of Workplace where the premise of Detection is no longer sufficent.
Boon Peng Lau
Menlo Security
5/9 14:00 -
14:30
The key for great company to establish the trust - Best Practice for Vulnerability Remediation
Riley Liao
HCL Software, HCL Tech
5/9 14:00 -
14:30
翻轉戰線,讓端點防護成為資料最強堡壘
許祐福
精品科技
5/9 14:00 -
14:30
林育辰 (Tony Lin)
Synology
5/9 14:45 -
15:15
林俊仁 (Benson)
5/9 14:45 -
15:15
林孟忠 (Sam Lin)
ExtraHop
5/9 14:45 -
15:15
Application Secure Testing Automation, Secure DevOps best practice
Kevin Chia
HCL Software
5/9 14:45 -
15:15
Implementing Zero Trust while meeting ISA/IEC62443 requirements
Kenny Lee
International Society of Automation, Taiwan Section
5/9 14:45 -
15:15
陳昶旭
Thales
5/9 14:45 -
15:15
Mars Chen
F5
5/9 14:45 -
15:15
王添龍
亞利安科技
5/9 15:45 -
16:15
Credential Stuffing Protection: How Websites Defend Against Lightning-Fast Password Cracking Attempts
Alex Chen
HiTRUST Co., Ltd.
5/9 15:45 -
16:15
Data anonymization, feel free with data
Yung-Chung Ku
PostgreSQL Taiwan
5/9 15:45 -
16:15
Enable security in modern industry for Cyber Physical System
Jason Chan
Claroty
5/9 15:45 -
16:15
The best practices of endpoint security management for zero trust architecture
C. K. Lin
HCL Software
5/9 15:45 -
16:15
The Journey to Upgrading Enterprise Security Development Processes
Lung-Yu Tsai
Digicentre Co., Ltd
5/9 15:45 -
16:15
We should pay attention to Web and API security to maintain business continuity
Holmes Fan
Imperva
5/9 15:45 -
16:15
林皇興
5/9 16:10 -
16:40
Discussion on reasonable measures for trade secrets from relevant judgments
Christina Tseng
EY Advisory Services Inc.
5/9 16:30 -
17:00
How to achieve enterprise application security hardening and implement risk management
Kevin Chia
HCL Software
5/9 16:30 -
17:00
LMAO I'm dying :)) - why should I bypass If I can totally shut it off? From token forgery to quarantine AV/EDR into sandbox
Sheng-Hao Ma
TXOne Networks
Dexter Chen
TXOne Networks
5/9 16:30 -
17:00
Vincent Wu
Lenovo
5/9 16:30 -
17:00
林皇興
CYBERSEC 2023 uses cookies to provide you with the best user
experience possible. By continuing to use this site, you agree to the
terms in our
Privacy Policy .