CyberLAB

Experts-lead CyberLAB : Enhance cybersecurity defense capabilities.

Learn from cybersecurity experts who have years of experience in the field. Selecting a diverse range of practical cybersecurity topics. Through small-group instruction, participants will be guided through various cybersecurity scenarios and practical applications commonly faced in enterprise IT environments. By hands-on CyberLAB, participants will enhance their own capabilities, becoming the solid backbone of frontline defense for enterprise cybersecurity.

Registering for CYBERSEC grants you eligibility for free on-site registration to participate in CyberLAB. Please note that seats are limited for each session and will be allocated on a first-come, first-served basis.
CyberLAB
Overview
  • CyberLAB does not require advance registration. Please proceed to the service desk on the day of the session to check-in, and then go to the course venue to register for participation.
  • Before registering, please refer to the “More Details" section in the CyberLAB agenda to understand the pre-session preparation.
  • Due to limited resources and to allow more participants to experience the CyberLAB hands-on sessions, each participant is limited to registering for one time slot and one session.
  • The teaching content of the same session is the same in different time slots.
Conference room at 4th floor
Time / Venue
Conference room 4C
Time / Venue
Conference room 4D
12:30 - 14:30
12:30 - 14:30
15:00 - 17:00
When threats are everywhere, how to implement zero trust security?

Today, enterprises are facing increasingly complex and serious security challenges. People will connect to corporate networks, cloud databases or various applications from various locations and using various devices. This also makes it easier for hackers to impersonate corporate employees. or certified third parties to carry out targeted attacks such as data theft or encryption and ransomware. Simply relying on traditional firewalls, VPNs and other network security protections is no longer able to cope with evolving threats and attacks. Enterprises can no longer assume that pre-verified or trusted devices and user identities are safe.

In the face of a complex and frequently changing workplace, "zero trust" is an important strategy to strengthen the security of critical data and critical systems. Compared with traditional information security architecture, this is a more advanced, flexible and effective information security method. More and more organizations are turning to Zero Trust Secure Access (ZTSA) architecture. This architecture assumes that both internal and external networks are not trustworthy and takes appropriate security measures to ensure the safety of data and assets.

This agenda will share and implement how to use Zero Trust Secure Access to help enterprises implement a zero-trust architecture and protect their data and assets based on information security priority judgment and zero-trust automated access control.

more
邱柏翰 (Peter Chiu)
邱柏翰 (Peter Chiu)
Senior Technical Consultant Trend Micro
15:00 - 17:00