Don't miss this unique opportunity where cybersecurity execs exchange ideas and knowledge with leaders from different industries. Gain valuable insights from the sharing of managerial perspectives and strategies for tackling challenges.
Phishing emails are the starting point for hackers' attacks. We will focus on discussing the application of generative AI and digital transformation technologies. Through actual case studies, we will explore seven optimizable points in traditional phishing email drills :
Through this presentation, the audience can expect to learn how to apply generative AI and digital transformation technologies to enhance employee cybersecurity awareness and prevent social engineering attacks, thereby building a more resilient enterprise-wide cybersecurity awareness defense line to effectively address the growing cybersecurity threats.
Facing the government’s cybersecurity policies and the world’s cybersecurity trends, how to pragmatically introduce cybersecurity protection, not only the response strategy of legal compliance, but more is the sharing of practical experience. Whether in management, strategy, or technology, how should we plan and promote? How to coordinate and solve when encountering difficulties? The content of the speech not only provides a reference for cybersecurity workers from the perspective of Party A, but also the related procurement thinking is suitable for Party B’s evaluation, allowing the team to understand the key points and difficulties of introducing various products, and creating a win-win future through the narration of practice and experience sharing. It will also explain the actual cases of auditing public agencies and teaching cybersecurity professional courses, so that all walks of life can understand the actual focus and promotion of information security.
Due to the rise of the technology industry in Taiwan and the government's promotion of related digital transformation, it has been ongoing for many years. However, in statistics, the number of information security attacks suffered by Taiwan still ranks first in the Asia-Pacific region, among which DDoS is the most common, followed by ransomware, vulnerability intrusions, and botnets.
Starting this year, the targets of hacker attacks have gradually shifted to manufacturing and traditional industries. We should be vigilant. I often emphasize that information security matters.
Many incidents are caused by people. Almost 90% of information security incidents are caused by "people." But how do we protect information security? I believe this is a pain point for many manufacturing and traditional industries.
If information security incidents occur in banks, will traditional industries and manufacturing industries have to face the growing number of network information security incidents more cautiously?
This agenda will take the CISO's annual cybersecurity governance report to the board of directors as an example, focusing on key points closely related to the company's operations, such as cybersecurity strategy, quantitative results, compliance status, and future blueprints, so that the board of directors can clearly grasp the context and value of cybersecurity work and provide support and resource allocation.
Content Summary :
CYBERSEC 2024 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。