Slide Download
Cybersecurity maturation and Zero Turst Architecture (ZTA) implementation experience in US Governme

5/9 10:30 - 11:00

Cybersecurity maturation and Zero Turst Architecture (ZTA) implementation experience in US Governme
David Chow
David Chow
Trend Micro

5/9 14:00 - 14:30

Belinda Lai
Belinda Lai
Forcepoint
Arising challenges of digital banking fraud and vulnerabilities facing banks, and how AI can help

5/9 14:00 - 14:30

Arising challenges of digital banking fraud and vulnerabilities facing banks, and how AI can help
汪逸雲
汪逸雲
How would you address Highly Evasive Adaptive Threats in the future of Workplace where the premise of Detection is no longer sufficent.

5/9 14:00 - 14:30

How would you address Highly Evasive Adaptive Threats in the future of Workplace where the premise of Detection is no longer sufficent.
Boon Peng Lau
Boon Peng Lau
Menlo Security
The key for great company to establish the trust - Best Practice for Vulnerability Remediation

5/9 14:00 - 14:30

The key for great company to establish the trust - Best Practice for Vulnerability Remediation
Riley Liao
Riley Liao
HCL Software, HCL Tech
翻轉戰線,讓端點防護成為資料最強堡壘

5/9 14:00 - 14:30

翻轉戰線,讓端點防護成為資料最強堡壘
許祐福
許祐福
精品科技

5/9 14:00 - 14:30

林育辰 (Tony Lin)
林育辰 (Tony Lin)
Synology

5/9 14:45 - 15:15

林俊仁 (Benson)
林俊仁 (Benson)

5/9 14:45 - 15:15

林孟忠 (Sam Lin)
林孟忠 (Sam Lin)
ExtraHop
Application Secure Testing Automation, Secure DevOps best practice

5/9 14:45 - 15:15

Application Secure Testing Automation, Secure DevOps best practice
Kevin Chia
Kevin Chia
HCL Software
Implementing Zero Trust while meeting ISA/IEC62443 requirements

5/9 14:45 - 15:15

Implementing Zero Trust while meeting ISA/IEC62443 requirements
Kenny Lee
Kenny Lee
International Society of Automation, Taiwan Section

5/9 14:45 - 15:15

陳昶旭
陳昶旭
Thales

5/9 14:45 - 15:15

Mars Chen
Mars Chen
F5

5/9 14:45 - 15:15

王添龍
王添龍
亞利安科技
Credential Stuffing Protection: How Websites Defend Against Lightning-Fast Password Cracking Attempts

5/9 15:45 - 16:15

Credential Stuffing Protection: How Websites Defend Against Lightning-Fast Password Cracking Attempts
Alex Chen
Alex Chen
HiTRUST Co., Ltd.
Data anonymization, feel free with data

5/9 15:45 - 16:15

Data anonymization, feel free with data
Yung-Chung Ku
Yung-Chung Ku
PostgreSQL Taiwan
Enable security in modern industry for Cyber Physical System

5/9 15:45 - 16:15

Enable security in modern industry for Cyber Physical System
Jason Chan
Jason Chan
Claroty
The best practices of endpoint security management for zero trust architecture

5/9 15:45 - 16:15

The best practices of endpoint security management for zero trust architecture
C. K. Lin
C. K. Lin
HCL Software
The Journey to Upgrading Enterprise Security Development Processes

5/9 15:45 - 16:15

The Journey to Upgrading Enterprise Security Development Processes
Lung-Yu Tsai
Lung-Yu Tsai
Digicentre Co., Ltd
We should pay attention to Web and API security to maintain business continuity

5/9 15:45 - 16:15

We should pay attention to Web and API security to maintain business continuity
Holmes Fan
Holmes Fan
Imperva

5/9 15:45 - 16:15

林皇興
林皇興
Discussion on reasonable measures for trade secrets from relevant judgments

5/9 16:10 - 16:40

Discussion on reasonable measures for trade secrets from relevant judgments
Christina Tseng
Christina Tseng
EY Advisory Services Inc.
How to achieve enterprise application security hardening and implement risk management

5/9 16:30 - 17:00

How to achieve enterprise application security hardening and implement risk management
Kevin Chia
Kevin Chia
HCL Software
LMAO I'm dying :)) - why should I bypass If I can totally shut it off? From token forgery to quarantine AV/EDR into sandbox

5/9 16:30 - 17:00

LMAO I'm dying :)) - why should I bypass If I can totally shut it off? From token forgery to quarantine AV/EDR into sandbox
Sheng-Hao Ma
Sheng-Hao Ma
TXOne Networks
Dexter Chen
Dexter Chen
TXOne Networks

5/9 16:30 - 17:00

Vincent Wu
Vincent Wu
Lenovo

5/9 16:30 - 17:00

林皇興
林皇興