Brand Day - uniXecure
Brand Day - uniXecure

As a 100% reinvested subsidiary of the SYSTEX Corporation, uniXecure is committed to being Asia's leading provider of information security services and agents, providing one-stop information security services of "prevention, detection, and response", and MSSP (Managed Security Services Provider) information security services. uniXecure is going to introduce the four major solutions of Zero-Trust, DevSecOps, Supply Chain Information Security, and Cloud Compliance, to defense together with clients in response to the increasingly severe challenges of information security, helping clients to develop their core business without any worries.

 

We look forward to the Brand Day event to explore the frontier of information security and uniXecure will lay down the new concept of information security for enterprises in the future. Sincerely invite you to engage in this event together.

 

The program will introduce the information security layout of Defense Together 2.0 this afternoon:

 

  • Enterprise Zero Trust Assessment and Practical Implementation Strategies
  • Managing information security and development operations through DevSecOps automation tools
  • How to effectively minimize human negligence resulting in confidential information falling into the targets of hackers
  • How to lead the sustainable management through supply chain security?
TIME & LOCATION
  • 5/14 (Tue.) 14:00 - 17:00 | 701A
SPONSORED BY
uniXecure
AGENDA
5 / 14
14:00 - 14:30
Sunrise Chen / Phd. uniXecure

In the face of the global trend driven by governments and key infrastructure industries advocating for the Zero Trust security framework, enterprises often grapple with avoiding mere compliance, aligning with trends, or making investments without clear direction. Leveraging CISA's Zero Trust maturity assessment criteria and NIST CSF framework, the Systex Group Cybersecutiry team & uniXecure Tech. Ltd integrate years of practical cybersecurity experience. We introduce a pioneering 'Zero Trust Maturity Assessment Methodology,' offering insights from real-world implementations within the group. This approach enables organizations across various industries to balance theoretical and practical aspects of cybersecurity. Collaboratively aligning information infrastructure, networks, application development, and cybersecurity teams with a shared understanding, we help craft phased Zero Trust security implementation plans that effectively garner support from top management.

  • Zero Trust Architecture
  • Security Development Lifecycle
  • Security Orchestration
5 / 14
14:45 - 15:15
Lambert Lin / VP Docutek Solutions

In the development and maintenance of application systems, information security has become a necessary item. Therefore, the goals of Security by Design have become increasingly clear, and the team has gradually reached a consensus. The earlier the development stage of the system, the earlier security will be included in the design. Overall The cost is lower. However, in the process of digital transformation, the old system already exists, and maintenance and operation have to be worried about, and loopholes are constantly being discovered, and they have to be repaired in a hurry. In the process of pursuing agile development, the information security team, R&D team, and maintenance team have different perceptions of each other, resulting in team conflicts. This agenda explores how to use automated security tools to meet security needs at all stages of SDLC and CI/CD, and explores successful cases of best practices.

  • DevSecOps
  • Application Security
  • Application Security Testing
5 / 14
15:45 - 16:15
Fio Lee / Senior Solutions Engineer SecurityScorecard

According to the IBM Data Breach Yearly Report, from March 2022 to March 2023, the global healthcare industry emerged as the primary target for cyberattacks, marking 13 consecutive years of high data breach costs, with an average loss of $11 million per incident. Healthcare providers are prime targets for ransomware attacks due to the sensitive patient data they possess. Establishing supplier lists, continuous monitoring, and providing comprehensive technical support will be the greatest challenges for healthcare institutions.

SecurityScorecard offers insights and analysis on corporate security posture, with scores ranging from A (100) to F (0), representing security assessments using letters. Combining artificial intelligence and ten years of big data analysis, different scores and grades reflect the likelihood of attacks on enterprises, assisting in enhancing cybersecurity levels.

  • Cyber Supply Chain Security
  • Risk Management
  • Cyber Risk Quantification
5 / 14
16:30 - 17:00
Peter Peng / Technical manager NEITHNET

Intelligent management of enterprise internet access, observing hackers' every move from external to internal perspectives.

  • APT
  • Mobile Security
  • Cyber Hunting
PARTNERS
uniXecure